IOC Report
8082-x64.ps1

loading gif

Files

File Path
Type
Category
Malicious
8082-x64.ps1
ASCII text, with very long lines (63893)
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2czwuov1.a4m.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ysmgpxgf.4xc.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\EDDQAR9L4R6VK24IYBE0.temp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\8082-x64.ps1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://20.104.209.69:8082/broadcast
20.104.209.69
malicious
20.104.209.69
malicious
http://20.104.209.69:8082/1/events/com.amazon.csm.csa.prod
20.104.209.69
malicious
http://20.104.209.69:8082/broadcastashSessionKeyBackwardS
unknown
http://20.104.209.69:8082/broadcastashSessionKeyBackwards
unknown
http://nuget.org/NuGet.exe
unknown
http://20.104.209.69:8082/broadcast~
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://d22u79neyj432a.cloudfront.net/bfc50dfa-8e10-44b5-ae59-ac26bfc71489/54857e6d-c
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://www.amazon.com
unknown
https://go.micro
unknown
https://d22u79neyj432a.cloudfront.net/bfc50dfa-8e10-44b5-ae59-ac26bfc71489/54857e6d-c060-4b3c-914a-8
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://20.104.209.69:8082/broadcastashSessionKeyBackwardC
unknown
http://20.104.209.69:8082/broadcastashSessionKeyBackwardc
unknown
http://20.104.209.69:8082/broadcastashSessionKeyBackward
unknown
http://20.104.209.69:8082/broadcast0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://20.104.209.69:8082/broadcastg
unknown
There are 14 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
20.104.209.69
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
29A9CB40000
heap
page read and write
malicious
29A9461B000
trusted library allocation
page read and write
malicious
29A9CD40000
direct allocation
page execute and read and write
malicious
29A9CA20000
trusted library allocation
page read and write
29A9CE50000
trusted library allocation
page read and write
933CAC000
stack
page read and write
7FFDC8A30000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
4BFB47F000
stack
page read and write
29A825D5000
heap
page read and write
29A83FD0000
heap
page execute and read and write
29A9CD40000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
9B467FC000
stack
page read and write
29A9CA26000
trusted library allocation
page read and write
29A8587E000
trusted library allocation
page read and write
9B479CE000
stack
page read and write
7FFDC88D5000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
9B477C3000
stack
page read and write
29A9CA00000
trusted library allocation
page read and write
23A1E843000
heap
page read and write
29A9CA20000
trusted library allocation
page read and write
877047F000
stack
page read and write
29A9CB30000
trusted library allocation
page read and write
29A8550F000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CD40000
trusted library allocation
page read and write
29A85394000
trusted library allocation
page read and write
4E6547E000
stack
page read and write
29A9D1EA000
direct allocation
page read and write
29A9CE40000
trusted library allocation
page read and write
29A9CE00000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
29A85420000
trusted library allocation
page read and write
221EC846000
heap
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
25F307F0000
heap
page read and write
29A85521000
trusted library allocation
page read and write
29A83F60000
trusted library allocation
page read and write
29A9CA04000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
29A9CA07000
trusted library allocation
page read and write
29A9CA09000
trusted library allocation
page read and write
23A1E894000
heap
page read and write
29A8772C000
trusted library allocation
page read and write
29A9CDD0000
trusted library allocation
page read and write
29A9CA02000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
7FFDC89F0000
trusted library allocation
page read and write
29A853EF000
trusted library allocation
page read and write
29A9CD40000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
29A9CD40000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CD50000
trusted library allocation
page read and write
29A9CA02000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CE37000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
29A9CA11000
trusted library allocation
page read and write
29A9C697000
heap
page read and write
29A9CA10000
trusted library allocation
page read and write
29A858E4000
trusted library allocation
page read and write
29A858B8000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CE10000
trusted library allocation
page read and write
29A853FD000
trusted library allocation
page read and write
7FFDC88E0000
trusted library allocation
page read and write
29A9CA09000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
876FFFE000
stack
page read and write
29A9CA20000
trusted library allocation
page read and write
221EC841000
heap
page read and write
29A9C74C000
unkown
page read and write
221EC855000
heap
page read and write
9B4794F000
stack
page read and write
29A85695000
trusted library allocation
page read and write
29A85369000
trusted library allocation
page read and write
29A8560F000
trusted library allocation
page read and write
29A9CD40000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
877027F000
stack
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CDC8000
trusted library allocation
page read and write
29A9CDE0000
trusted library allocation
page read and write
7FFDC8950000
trusted library allocation
page read and write
7FFDC8920000
trusted library allocation
page read and write
9343FF000
stack
page read and write
20338770000
heap
page read and write
29A9C75C000
unkown
page read and write
29A858C0000
trusted library allocation
page read and write
25F30A13000
heap
page read and write
7FFDC8882000
trusted library allocation
page read and write
7FFDC8990000
trusted library allocation
page read and write
23A1E86C000
heap
page read and write
29A9CA0A000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
9B469FE000
stack
page read and write
221EC875000
heap
page read and write
23A1F1C7000
heap
page read and write
29A85414000
trusted library allocation
page read and write
29A85594000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A855EC000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9C752000
unkown
page read and write
245E2678000
heap
page read and write
29A9CA10000
trusted library allocation
page read and write
23A1F227000
heap
page read and write
29A825D0000
heap
page read and write
29A9CB30000
trusted library allocation
page read and write
15974429000
heap
page read and write
29A945C0000
trusted library allocation
page read and write
6A563FF000
stack
page read and write
29A9CA20000
trusted library allocation
page read and write
29A9CD42000
direct allocation
page read and write
4E652FF000
stack
page read and write
29A854D1000
trusted library allocation
page read and write
29A82686000
heap
page read and write
221EC660000
heap
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
7FFDC8842000
trusted library allocation
page read and write
29A9CD40000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
6A56AFE000
stack
page read and write
29A9CD40000
trusted library allocation
page read and write
29A9CD50000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9C75C000
unkown
page read and write
6A569FE000
stack
page read and write
7FFDC8A20000
trusted library allocation
page read and write
25F30A87000
heap
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CDA0000
trusted library allocation
page read and write
29A9CD50000
trusted library allocation
page read and write
29A9CD40000
trusted library allocation
page read and write
29A9CA01000
trusted library allocation
page read and write
29A9CD40000
trusted library allocation
page read and write
29A9CB30000
trusted library allocation
page read and write
29A9C771000
direct allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
20338847000
heap
page read and write
23A1E913000
heap
page read and write
29A9CA09000
trusted library allocation
page read and write
23A1F1DF000
heap
page read and write
29A9CA20000
trusted library allocation
page read and write
4BFAFFA000
stack
page read and write
29A825F0000
heap
page read and write
23A1F154000
heap
page read and write
7FFDC86A3000
trusted library allocation
page execute and read and write
29A9CA04000
trusted library allocation
page read and write
29A9CD50000
trusted library allocation
page read and write
29A85606000
trusted library allocation
page read and write
29A9CDA0000
trusted library allocation
page read and write
29A9CB30000
trusted library allocation
page read and write
7FFDC8851000
trusted library allocation
page read and write
7FFDC8A10000
trusted library allocation
page read and write
4BFB1FE000
stack
page read and write
29A9D1D0000
direct allocation
page read and write
29A9CB30000
trusted library allocation
page read and write
C94A1FF000
stack
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CDE0000
trusted library allocation
page read and write
7FFDC885D000
trusted library allocation
page read and write
221EC82E000
heap
page read and write
245E3002000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CD50000
trusted library allocation
page read and write
29A856A4000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CD50000
trusted library allocation
page read and write
29A8559C000
trusted library allocation
page read and write
29A9CD50000
trusted library allocation
page read and write
7FFDC8A60000
trusted library allocation
page read and write
29A9C7AF000
unkown
page read and write
203387D0000
heap
page read and write
29A9CA01000
trusted library allocation
page read and write
7FFDC8890000
trusted library allocation
page execute and read and write
29A9CD70000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA02000
trusted library allocation
page read and write
29A9CD40000
trusted library allocation
page read and write
221EC6D0000
heap
page read and write
29A9CD50000
trusted library allocation
page read and write
29A852FA000
trusted library allocation
page read and write
221EC86E000
heap
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A85556000
trusted library allocation
page read and write
29A9CD40000
trusted library allocation
page read and write
29A9CB30000
trusted library allocation
page read and write
29A843D4000
heap
page read and write
29A9CA09000
trusted library allocation
page read and write
29A85518000
trusted library allocation
page read and write
7FFE35616000
unkown
page readonly
C949C7B000
stack
page read and write
29A826E5000
heap
page read and write
29A9CA20000
trusted library allocation
page read and write
23A1F100000
heap
page read and write
221ED002000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9C5D4000
heap
page read and write
29A9CA00000
trusted library allocation
page read and write
245E265B000
heap
page read and write
7FFDC8930000
trusted library allocation
page read and write
245E2713000
heap
page read and write
245E2613000
heap
page read and write
29A9CE00000
trusted library allocation
page read and write
29A8632C000
trusted library allocation
page read and write
29A9CD70000
trusted library allocation
page read and write
29A84580000
trusted library allocation
page read and write
29A9CD50000
trusted library allocation
page read and write
29A9CA04000
trusted library allocation
page read and write
29A8266F000
heap
page read and write
29A855B6000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
221EC868000
heap
page read and write
29A9CB30000
trusted library allocation
page read and write
7FFDC8756000
trusted library allocation
page read and write
29A82717000
heap
page read and write
25F31202000
heap
page read and write
29A9CA10000
trusted library allocation
page read and write
29A83F40000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
29A854AD000
trusted library allocation
page read and write
29A82659000
heap
page read and write
23A1F202000
heap
page read and write
23A1E7B0000
trusted library allocation
page read and write
29A9C74A000
unkown
page read and write
29A9CE20000
trusted library allocation
page read and write
29A854B6000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
7FFDC8840000
trusted library allocation
page read and write
15974440000
heap
page read and write
221EC847000
heap
page read and write
29A9CA20000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
7DF4DB2E0000
trusted library allocation
page execute and read and write
221EC852000
heap
page read and write
29A9CA00000
trusted library allocation
page read and write
7FFE35622000
unkown
page readonly
29A84085000
heap
page read and write
29A85372000
trusted library allocation
page read and write
29A8552A000
trusted library allocation
page read and write
7FFE35620000
unkown
page read and write
29A84060000
heap
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
29A9CB41000
heap
page read and write
29A9C6B0000
unkown
page read and write
29A9CDF0000
trusted library allocation
page read and write
29A854C8000
trusted library allocation
page read and write
876FE7E000
stack
page read and write
9B46A7F000
stack
page read and write
221EC842000
heap
page read and write
9B463C5000
stack
page read and write
29A9C730000
unkown
page read and write
6A5607B000
stack
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CD40000
trusted library allocation
page read and write
6A565FD000
stack
page read and write
29A85434000
trusted library allocation
page read and write
29A9CA04000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CD80000
trusted library allocation
page read and write
221EC84A000
heap
page read and write
245E24D0000
heap
page read and write
29A85533000
trusted library allocation
page read and write
29A8554E000
trusted library allocation
page read and write
7FFDC8A00000
trusted library allocation
page read and write
29A9CD50000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
23A1E977000
heap
page read and write
29A85318000
trusted library allocation
page read and write
29A9C74A000
unkown
page read and write
15974434000
heap
page read and write
25F30860000
heap
page read and write
29A9CA02000
trusted library allocation
page read and write
4E6517E000
stack
page read and write
29A9CA20000
trusted library allocation
page read and write
29A9CD6C000
direct allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
7FFDC8887000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
7FFDC89C0000
trusted library allocation
page read and write
15974210000
heap
page read and write
29A9CDC0000
trusted library allocation
page read and write
29A9C7C7000
unkown
page read and write
23A1E88B000
heap
page read and write
29A82590000
heap
page read and write
29A9CA05000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
9B47A4B000
stack
page read and write
29A9CA20000
trusted library allocation
page read and write
29A9CD80000
trusted library allocation
page read and write
29A8558A000
trusted library allocation
page read and write
29A83F20000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CD40000
trusted library allocation
page read and write
29A8592C000
trusted library allocation
page read and write
29A9CD40000
trusted library allocation
page read and write
7FFDC8910000
trusted library allocation
page read and write
29A9CD54000
trusted library allocation
page read and write
23A1F102000
heap
page read and write
25F30A29000
heap
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9C742000
unkown
page read and write
29A9CA20000
trusted library allocation
page read and write
29A9CD74000
trusted library allocation
page read and write
29A9CD50000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
221EC849000
heap
page read and write
9340FE000
stack
page read and write
29A85478000
trusted library allocation
page read and write
29A854BF000
trusted library allocation
page read and write
29A9CD60000
trusted library allocation
page read and write
7FFDC8960000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
23A1E843000
heap
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CE0F000
trusted library allocation
page read and write
159741A0000
heap
page read and write
29A9C5D0000
heap
page read and write
15974310000
trusted library allocation
page read and write
15974C02000
trusted library allocation
page read and write
7FFE35600000
unkown
page readonly
25F30AE1000
heap
page read and write
29A9D1D0000
direct allocation
page read and write
29A85388000
trusted library allocation
page read and write
25F31300000
heap
page read and write
29A9CD40000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CDE0000
trusted library allocation
page read and write
20338802000
heap
page read and write
23A1E800000
heap
page read and write
29A9D1D0000
direct allocation
page read and write
29A9CE30000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
29A9CA0A000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
29A9C5B0000
heap
page read and write
29A8562A000
trusted library allocation
page read and write
29A9CD90000
trusted library allocation
page read and write
25F30ACB000
heap
page read and write
29A9CA20000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
7FFDC88B0000
trusted library allocation
page read and write
9B46E3B000
stack
page read and write
29A85360000
trusted library allocation
page read and write
29A84584000
trusted library allocation
page read and write
29A9C628000
heap
page read and write
876FBFB000
stack
page read and write
29A82610000
trusted library section
page read and write
4E6567D000
stack
page read and write
7FFDC8980000
trusted library allocation
page read and write
25F30A00000
heap
page read and write
29A9CA00000
trusted library allocation
page read and write
23A1E855000
heap
page read and write
29A9CA01000
trusted library allocation
page read and write
29A85321000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CD40000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
7FFDC88F0000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A85345000
trusted library allocation
page read and write
29A9CA06000
trusted library allocation
page read and write
29A82648000
heap
page read and write
29A9CA20000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CA0E000
trusted library allocation
page read and write
29A9CB30000
trusted library allocation
page read and write
29A8542B000
trusted library allocation
page read and write
29A9C754000
unkown
page read and write
29A9CA10000
trusted library allocation
page read and write
29A8518E000
trusted library allocation
page read and write
245E263F000
heap
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CD50000
trusted library allocation
page read and write
29A8537C000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
4E6557D000
stack
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CFBD000
direct allocation
page read and write
29A9CA51000
heap
page read and write
29A8268C000
heap
page read and write
2033884A000
heap
page read and write
29A83FD7000
heap
page execute and read and write
9B4697E000
stack
page read and write
29A9CD60000
trusted library allocation
page read and write
4BFAE7B000
stack
page read and write
29A8270B000
heap
page read and write
23A1E86E000
heap
page read and write
29A9CDB0000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
7FFDC8900000
trusted library allocation
page read and write
245E2560000
trusted library allocation
page read and write
29A9CA0A000
trusted library allocation
page read and write
29A9CD60000
trusted library allocation
page read and write
4E651FE000
stack
page read and write
20339202000
trusted library allocation
page read and write
15974400000
heap
page read and write
221EC853000
heap
page read and write
29A9CDB0000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
25F3133A000
heap
page read and write
29A85ADE000
trusted library allocation
page read and write
29A9CE20000
trusted library allocation
page read and write
29A9CA21000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
221EC86C000
heap
page read and write
29A9CA00000
trusted library allocation
page read and write
29A853DE000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
221EC878000
heap
page read and write
29A9CA00000
trusted library allocation
page read and write
2033883C000
heap
page read and write
29A853E6000
trusted library allocation
page read and write
25F30A3E000
heap
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
245E2658000
heap
page read and write
29A85874000
trusted library allocation
page read and write
29A9CA01000
trusted library allocation
page read and write
29A85493000
trusted library allocation
page read and write
29A854E3000
trusted library allocation
page read and write
29A9CD60000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CD40000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A826B6000
heap
page read and write
29A9CE10000
trusted library allocation
page read and write
29A9CA01000
trusted library allocation
page read and write
29A84F2C000
trusted library allocation
page read and write
29A8549B000
trusted library allocation
page read and write
29A9CB30000
trusted library allocation
page read and write
29A9CD60000
trusted library allocation
page read and write
29A854A4000
trusted library allocation
page read and write
29A9CDC0000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
23A1E885000
heap
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
221EC832000
heap
page read and write
29A9CA20000
trusted library allocation
page read and write
29A9C5D8000
heap
page read and write
29A9D1D5000
direct allocation
page read and write
7FFDC86B3000
trusted library allocation
page read and write
29A9CDA0000
trusted library allocation
page read and write
29A85AB2000
trusted library allocation
page read and write
29A9CA04000
trusted library allocation
page read and write
29A845B1000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9C9B0000
heap
page execute and read and write
C949FFE000
stack
page read and write
29A9CB30000
trusted library allocation
page read and write
7FFDC86AD000
trusted library allocation
page execute and read and write
7FFDC8750000
trusted library allocation
page read and write
29A9CD90000
trusted library allocation
page read and write
29A9CA0E000
trusted library allocation
page read and write
29A9C79B000
unkown
page read and write
29A85506000
trusted library allocation
page read and write
23A1F002000
heap
page read and write
7FFDC88C0000
trusted library allocation
page read and write
29A9CB30000
trusted library allocation
page read and write
29A85641000
trusted library allocation
page read and write
221EC830000
heap
page read and write
23A1F1B0000
heap
page read and write
23A1F1D0000
heap
page read and write
29A9C61F000
heap
page read and write
29A9CA20000
trusted library allocation
page read and write
29A9CD90000
trusted library allocation
page read and write
9B4677D000
stack
page read and write
29A9CA04000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CD40000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
7FFDC86B0000
trusted library allocation
page read and write
29A9CA04000
trusted library allocation
page read and write
7FFDC89E0000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CD80000
trusted library allocation
page read and write
29A9CD80000
trusted library allocation
page read and write
4BFAEF9000
stack
page read and write
876FEFC000
stack
page read and write
20338902000
heap
page read and write
29A9CA00000
trusted library allocation
page read and write
245E2629000
heap
page read and write
23A1F16F000
heap
page read and write
221EC885000
heap
page read and write
29A84080000
heap
page read and write
29A9CA1A000
trusted library allocation
page read and write
29A9C7AB000
unkown
page read and write
29A85AD6000
trusted library allocation
page read and write
29A9C7CB000
unkown
page read and write
245E2530000
heap
page read and write
29A85357000
trusted library allocation
page read and write
29A9CD40000
trusted library allocation
page read and write
29A858C9000
trusted library allocation
page read and write
23A1E829000
heap
page read and write
221EC7D0000
trusted library allocation
page read and write
29A9CD50000
trusted library allocation
page read and write
29A9C5DC000
heap
page read and write
221EC800000
heap
page read and write
29A9CD40000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
7FFDC8A40000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A8532B000
trusted library allocation
page read and write
29A855E3000
trusted library allocation
page read and write
29A83EE0000
trusted library section
page read and write
29A9C758000
unkown
page read and write
29A9CE10000
trusted library allocation
page read and write
20338813000
heap
page read and write
29A9CD90000
trusted library allocation
page read and write
29A83F50000
heap
page readonly
23A1F213000
heap
page read and write
29A826A2000
heap
page read and write
29A9CA20000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CD40000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
29A85621000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
15974340000
remote allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A945B7000
trusted library allocation
page read and write
29A9CDA0000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
221EC902000
heap
page read and write
9341F9000
stack
page read and write
C949EFE000
stack
page read and write
221EC876000
heap
page read and write
7FFDC8970000
trusted library allocation
page read and write
29A9CA09000
trusted library allocation
page read and write
29A85635000
trusted library allocation
page read and write
29A85480000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A8533C000
trusted library allocation
page read and write
7FFDC875C000
trusted library allocation
page execute and read and write
4BFB0FF000
stack
page read and write
29A9CA20000
trusted library allocation
page read and write
221EC82A000
heap
page read and write
29A945B1000
trusted library allocation
page read and write
23A1E640000
heap
page read and write
7FFDC8940000
trusted library allocation
page read and write
29A9CB30000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A83FE0000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A858B0000
trusted library allocation
page read and write
221EC87F000
heap
page read and write
876F78C000
stack
page read and write
29A9CDB0000
trusted library allocation
page read and write
221EC813000
heap
page read and write
29A854EB000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
15974458000
heap
page read and write
221EC86B000
heap
page read and write
7FFDC8870000
trusted library allocation
page execute and read and write
29A9CB30000
trusted library allocation
page read and write
7FFDC8A50000
trusted library allocation
page read and write
29A9CD70000
trusted library allocation
page read and write
23A1F1BF000
heap
page read and write
29A85619000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
15974413000
heap
page read and write
23A1E852000
heap
page read and write
29A9CA10000
trusted library allocation
page read and write
23A1F190000
heap
page read and write
29A9CA00000
trusted library allocation
page read and write
23A1E857000
heap
page read and write
29A83F90000
trusted library allocation
page read and write
29A9C72A000
unkown
page read and write
29A847B8000
trusted library allocation
page read and write
29A9CD50000
trusted library allocation
page read and write
29A8596C000
trusted library allocation
page read and write
29A855A4000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
7FFE35625000
unkown
page readonly
29A9CA10000
trusted library allocation
page read and write
29A84612000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A855C9000
trusted library allocation
page read and write
29A9C7BF000
unkown
page read and write
29A9CA0A000
trusted library allocation
page read and write
29A9CA04000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CD40000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
221EC845000
heap
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
29A9CA04000
trusted library allocation
page read and write
7FFDC8884000
trusted library allocation
page read and write
29A9C754000
unkown
page read and write
29A9D1D0000
direct allocation
page read and write
9B46D3E000
stack
page read and write
29A9CA20000
trusted library allocation
page read and write
29A9CA04000
trusted library allocation
page read and write
23A1E9E5000
heap
page read and write
25F30ABA000
heap
page read and write
29A9CA29000
trusted library allocation
page read and write
29A85544000
trusted library allocation
page read and write
7FFDC8786000
trusted library allocation
page execute and read and write
29A9CA10000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA01000
trusted library allocation
page read and write
29A9CD40000
trusted library allocation
page read and write
29A9CD60000
trusted library allocation
page read and write
29A9CDC0000
trusted library allocation
page read and write
25F30AE7000
heap
page read and write
4E64CDC000
stack
page read and write
29A9CA04000
trusted library allocation
page read and write
C949CFE000
stack
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
C94A0FE000
stack
page read and write
23A1F230000
heap
page read and write
4BFAD7F000
stack
page read and write
29A82450000
heap
page read and write
29A85AC1000
trusted library allocation
page read and write
15974502000
heap
page read and write
29A84560000
heap
page execute and read and write
245E24C0000
heap
page read and write
20338854000
heap
page read and write
20339070000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
25F30B13000
heap
page read and write
29A9CA06000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CD60000
trusted library allocation
page read and write
29A9CB30000
trusted library allocation
page read and write
6A55E7B000
stack
page read and write
29A9CA00000
trusted library allocation
page read and write
29A8534E000
trusted library allocation
page read and write
29A9CD60000
trusted library allocation
page read and write
29A9CE54000
trusted library allocation
page read and write
29A9CD90000
trusted library allocation
page read and write
29A9C75A000
unkown
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CDF0000
trusted library allocation
page read and write
245E2671000
heap
page read and write
29A9CDB0000
trusted library allocation
page read and write
15974340000
remote allocation
page read and write
6A564FF000
stack
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
221EC850000
heap
page read and write
29A9CD70000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
2033882E000
heap
page read and write
29A9CA02000
trusted library allocation
page read and write
7FFDC89B0000
trusted library allocation
page read and write
29A825B0000
heap
page read and write
221EC83E000
heap
page read and write
29A9CD40000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CD50000
trusted library allocation
page read and write
9344FF000
stack
page read and write
159741B0000
heap
page read and write
29A9CA04000
trusted library allocation
page read and write
29A8540C000
trusted library allocation
page read and write
29A9CA0E000
trusted library allocation
page read and write
29A9CDB4000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A852DC000
trusted library allocation
page read and write
29A855DA000
trusted library allocation
page read and write
29A855AE000
trusted library allocation
page read and write
7FFDC88A0000
trusted library allocation
page read and write
25F30960000
trusted library allocation
page read and write
4BFB3FA000
stack
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CB30000
trusted library allocation
page read and write
29A854DA000
trusted library allocation
page read and write
9B468FE000
stack
page read and write
29A9CA06000
trusted library allocation
page read and write
29A9CA2E000
trusted library allocation
page read and write
29A945DA000
trusted library allocation
page read and write
29A8546F000
trusted library allocation
page read and write
29A9CD77000
trusted library allocation
page read and write
4BFAA7C000
stack
page read and write
29A9CDD0000
trusted library allocation
page read and write
29A9C729000
unkown
page read and write
29A8553C000
trusted library allocation
page read and write
29A85AC9000
trusted library allocation
page read and write
25F30AC9000
heap
page read and write
29A9CA01000
trusted library allocation
page read and write
25F30A6E000
heap
page read and write
221EC866000
heap
page read and write
29A9CA10000
trusted library allocation
page read and write
29A855BF000
trusted library allocation
page read and write
29A9CA01000
trusted library allocation
page read and write
25F31313000
heap
page read and write
29A826B4000
heap
page read and write
29A9C770000
unkown
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CD60000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
221EC843000
heap
page read and write
7FFDC87C0000
trusted library allocation
page execute and read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA0A000
trusted library allocation
page read and write
15974436000
heap
page read and write
20338850000
heap
page read and write
877017C000
stack
page read and write
29A9CA20000
trusted library allocation
page read and write
9B46DBE000
stack
page read and write
29A86D2C000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
7FFDC86A4000
trusted library allocation
page read and write
29A845A0000
heap
page read and write
29A85489000
trusted library allocation
page read and write
4BFB2FF000
stack
page read and write
20338829000
heap
page read and write
29A9CA00000
trusted library allocation
page read and write
23A1F143000
heap
page read and write
29A9CA20000
trusted library allocation
page read and write
221EC670000
heap
page read and write
C949D7E000
stack
page read and write
876FD7E000
stack
page read and write
29A9CDD0000
trusted library allocation
page read and write
877007B000
stack
page read and write
29A9CA00000
trusted library allocation
page read and write
29A85333000
trusted library allocation
page read and write
29A9460F000
trusted library allocation
page read and write
245E267E000
heap
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CD50000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CD40000
trusted library allocation
page read and write
29A9CA09000
trusted library allocation
page read and write
29A9CA01000
trusted library allocation
page read and write
29A9CD70000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA50000
heap
page read and write
29A9CA30000
heap
page read and write
29A9CD40000
trusted library allocation
page read and write
29A851AC000
trusted library allocation
page read and write
221EC87B000
heap
page read and write
29A9CA00000
trusted library allocation
page read and write
23A1E7D0000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CD40000
trusted library allocation
page read and write
29A9CA17000
trusted library allocation
page read and write
23A1E650000
heap
page read and write
23A1E866000
heap
page read and write
29A9CA20000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
4BFABFE000
stack
page read and write
25F30800000
heap
page read and write
29A9CA01000
trusted library allocation
page read and write
23A1F122000
heap
page read and write
6A561FF000
stack
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CA05000
trusted library allocation
page read and write
29A9C5E8000
heap
page read and write
23A1F200000
heap
page read and write
4E6507F000
stack
page read and write
29A826E3000
heap
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
29A9CD50000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
6A567FE000
stack
page read and write
20338800000
heap
page read and write
6A568FE000
stack
page read and write
29A9CA01000
trusted library allocation
page read and write
29A852EB000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
245E2702000
heap
page read and write
29A855FE000
trusted library allocation
page read and write
29A9CA1E000
trusted library allocation
page read and write
29A9CA08000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
29A9C5CC000
heap
page read and write
4E653FD000
stack
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A84590000
trusted library allocation
page read and write
23A1F223000
heap
page read and write
29A9CA20000
trusted library allocation
page read and write
15974402000
heap
page read and write
29A9C770000
unkown
page read and write
23A1E9B9000
heap
page read and write
29A8564C000
trusted library allocation
page read and write
29A9CA04000
trusted library allocation
page read and write
221EC84F000
heap
page read and write
7FFDC86A0000
trusted library allocation
page read and write
29A9C7C3000
unkown
page read and write
877037C000
stack
page read and write
29A9CA06000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9C750000
unkown
page read and write
29A9CD60000
trusted library allocation
page read and write
7FFE35601000
unkown
page execute read
29A9CA03000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
9342FC000
stack
page read and write
15974340000
remote allocation
page read and write
7FFDC88D0000
trusted library allocation
page read and write
221EC84C000
heap
page read and write
29A9CA10000
trusted library allocation
page read and write
29A9CD60000
trusted library allocation
page read and write
29A854F4000
trusted library allocation
page read and write
29A9C6BD000
unkown
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
221EC87C000
heap
page read and write
245E2602000
heap
page read and write
7FFDC8937000
trusted library allocation
page read and write
29A9D1ED000
direct allocation
page read and write
29A82640000
heap
page read and write
29A855D1000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CE00000
trusted library allocation
page read and write
29A9CB30000
trusted library allocation
page read and write
7FFDC89A0000
trusted library allocation
page read and write
29A9CA20000
trusted library allocation
page read and write
29A9CD50000
trusted library allocation
page read and write
23A1E813000
heap
page read and write
23A1F122000
heap
page read and write
23A1E6B0000
heap
page read and write
29A9CD40000
trusted library allocation
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CDF0000
trusted library allocation
page read and write
29A9CB30000
trusted library allocation
page read and write
29A9CA11000
trusted library allocation
page read and write
29A854FE000
trusted library allocation
page read and write
245E2600000
heap
page read and write
15974466000
heap
page read and write
29A9C649000
heap
page read and write
29A826E8000
heap
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9D1E7000
direct allocation
page read and write
29A85310000
trusted library allocation
page read and write
23A1E83C000
heap
page read and write
7FFDC89D0000
trusted library allocation
page read and write
221EC848000
heap
page read and write
29A9CA10000
trusted library allocation
page read and write
20338780000
heap
page read and write
29A9CA05000
trusted library allocation
page read and write
29A9CA0E000
trusted library allocation
page read and write
25F30A24000
heap
page read and write
29A9CA00000
trusted library allocation
page read and write
29A9CDA0000
trusted library allocation
page read and write
29A9CD40000
trusted library allocation
page read and write
29A9CA10000
trusted library allocation
page read and write
29A855F5000
trusted library allocation
page read and write
25F30B02000
heap
page read and write
29A9CA20000
trusted library allocation
page read and write
23A1E88E000
heap
page read and write
6A562FC000
stack
page read and write
6A566FF000
stack
page read and write
There are 877 hidden memdumps, click here to show them.