IOC Report
UnDqKnghuz.exe

loading gifFilesProcessesURLsDomainsMemdumps8642010010Label

Files

File Path
Type
Category
Malicious
Download
UnDqKnghuz.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\645238\Itunes.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\645238\RegAsm.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\645238\p
data
dropped
C:\Users\user\AppData\Local\Temp\Animals
data
dropped
C:\Users\user\AppData\Local\Temp\Apollo
data
dropped
C:\Users\user\AppData\Local\Temp\Arg
data
dropped
C:\Users\user\AppData\Local\Temp\Barbara
DIY-Thermocam raw data (Lepton 3.x), scale 25675-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, show scale bar, calibration: offset 28924494707576576933888.000000, slope 30105255213280014630912.000000
dropped
C:\Users\user\AppData\Local\Temp\Blonde
data
dropped
C:\Users\user\AppData\Local\Temp\Cemetery
data
dropped
C:\Users\user\AppData\Local\Temp\Coding
data
dropped
C:\Users\user\AppData\Local\Temp\Cornwall
data
dropped
C:\Users\user\AppData\Local\Temp\Defense
data
dropped
C:\Users\user\AppData\Local\Temp\Donald
data
dropped
C:\Users\user\AppData\Local\Temp\Examined
data
dropped
C:\Users\user\AppData\Local\Temp\Fake
ASCII text, with very long lines (1680), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Fake.cmd
ASCII text, with very long lines (1680), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\File
data
dropped
C:\Users\user\AppData\Local\Temp\Howto
data
dropped
C:\Users\user\AppData\Local\Temp\Mild
data
dropped
C:\Users\user\AppData\Local\Temp\Offered
data
dropped
C:\Users\user\AppData\Local\Temp\Paper
data
dropped
C:\Users\user\AppData\Local\Temp\Picks
data
dropped
C:\Users\user\AppData\Local\Temp\Punk
data
dropped
C:\Users\user\AppData\Local\Temp\Sofa
data
dropped
C:\Users\user\AppData\Local\Temp\Spending
data
dropped
C:\Users\user\AppData\Local\Temp\Sticky
data
dropped
C:\Users\user\AppData\Local\Temp\Takes
data
dropped
C:\Users\user\AppData\Local\Temp\Tar
data
dropped
C:\Users\user\AppData\Local\Temp\Tears
data
dropped
C:\Users\user\AppData\Local\Temp\Thereof
data
dropped
C:\Users\user\AppData\Local\Temp\Threatened
data
dropped
C:\Users\user\AppData\Local\Temp\Till
data
dropped
C:\Users\user\AppData\Local\Temp\Times
data
dropped
C:\Users\user\AppData\Local\Temp\Ultra
data
dropped
C:\Users\user\AppData\Local\Temp\Visitor
PCX ver. 2.5 image data bounding box [63573, 17803] - [35788, 62541], 106 planes each of 139-bit uncompressed
dropped
C:\Users\user\AppData\Local\Temp\Weblogs
data
dropped
C:\Users\user\AppData\Local\Temp\Worship
data
dropped
There are 29 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\UnDqKnghuz.exe
"C:\Users\user\Desktop\UnDqKnghuz.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k copy Fake Fake.cmd & Fake.cmd & exit
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa.exe opssvc.exe"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 645238
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "AxisDevicesTwikiIntimate" Paper
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b Coding + Offered + Howto + Threatened + Mild + Blonde + Sticky 645238\p
malicious
C:\Users\user\AppData\Local\Temp\645238\Itunes.pif
645238\Itunes.pif 645238\p
malicious
C:\Users\user\AppData\Local\Temp\645238\RegAsm.exe
C:\Users\user\AppData\Local\Temp\645238\RegAsm.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\timeout.exe
timeout 5
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.autoitscript.com/autoit3/J
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
https://api.ip.sb/ip
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
https://api.ip.s
unknown
http://www.fontbureau.com/designers
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://fontfabrik.com
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.autoitscript.com/autoit3/0
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://discord.com/api/v9/users/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
https://www.dropbox.com/0
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
15.164.165.52.in-addr.arpa
unknown
XEbQlQkPmiulZVUpDZeaIqpGloWqu.XEbQlQkPmiulZVUpDZeaIqpGloWqu
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
1322000
remote allocation
page execute and read and write
malicious
1966000
trusted library allocation
page execute and read and write
31F7000
heap
page read and write
1970000
trusted library allocation
page read and write
64E000
heap
page read and write
3A51000
heap
page read and write
196B000
trusted library allocation
page read and write
1547000
trusted library allocation
page read and write
31D0000
heap
page read and write
65A000
heap
page read and write
157B000
trusted library allocation
page read and write
B27000
heap
page read and write
325D000
heap
page read and write
1968000
trusted library allocation
page read and write
18D2000
trusted library allocation
page read and write
152A000
trusted library allocation
page read and write
64E000
heap
page read and write
5A50000
heap
page read and write
ABE000
stack
page read and write
15A2000
trusted library allocation
page read and write
1990000
trusted library allocation
page read and write
18D6000
trusted library allocation
page read and write
5840000
heap
page read and write
B29000
heap
page read and write
14D1000
trusted library allocation
page read and write
4241000
trusted library allocation
page read and write
64E000
heap
page read and write
541C000
stack
page read and write
18DC000
trusted library allocation
page read and write
59F0000
trusted library allocation
page read and write
5760000
heap
page read and write
14D1000
trusted library allocation
page read and write
198D000
trusted library allocation
page read and write
1987000
trusted library allocation
page read and write
3250000
heap
page read and write
64E000
heap
page read and write
14D1000
trusted library allocation
page read and write
34BC000
stack
page read and write
3A51000
heap
page read and write
1000000
trusted library allocation
page read and write
2D0F000
stack
page read and write
5D9E000
stack
page read and write
970000
heap
page read and write
18D2000
trusted library allocation
page read and write
92E000
stack
page read and write
FAF000
stack
page read and write
AE8000
heap
page read and write
18D7000
trusted library allocation
page read and write
3258000
heap
page read and write
3230000
heap
page read and write
1970000
trusted library allocation
page read and write
296A000
heap
page read and write
F40000
unkown
page readonly
15B3000
trusted library allocation
page read and write
3A51000
heap
page read and write
196A000
trusted library allocation
page execute and read and write
199E000
trusted library allocation
page read and write
6B73000
heap
page read and write
14FB000
heap
page read and write
18D9000
trusted library allocation
page read and write
18D9000
trusted library allocation
page read and write
18D2000
trusted library allocation
page read and write
18DB000
trusted library allocation
page read and write
1595000
heap
page read and write
9B000
stack
page read and write
155D000
heap
page read and write
57D0000
trusted library allocation
page read and write
712F000
stack
page read and write
145000
unkown
page readonly
195D000
trusted library allocation
page execute and read and write
14D1000
trusted library allocation
page read and write
1E0000
heap
page read and write
3A51000
heap
page read and write
B29000
heap
page read and write
337E000
stack
page read and write
18DE000
trusted library allocation
page read and write
1A0B000
trusted library allocation
page read and write
1977000
trusted library allocation
page execute and read and write
5C20000
trusted library allocation
page execute and read and write
FF4000
heap
page read and write
2967000
heap
page read and write
F1B000
heap
page read and write
1978000
trusted library allocation
page read and write
1A17000
trusted library allocation
page read and write
296C000
heap
page read and write
2969000
heap
page read and write
3D01000
trusted library allocation
page read and write
18D5000
trusted library allocation
page read and write
18D1000
trusted library allocation
page read and write
18D1000
trusted library allocation
page read and write
162C000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
15C1000
trusted library allocation
page read and write
E5C000
stack
page read and write
14D1000
trusted library allocation
page read and write
18D4000
trusted library allocation
page read and write
275E000
stack
page read and write
1597000
trusted library allocation
page read and write
153F000
trusted library allocation
page read and write
1532000
trusted library allocation
page read and write
6E5B000
heap
page read and write
5D50000
heap
page read and write
B00000
heap
page read and write
145E000
stack
page read and write
3253000
heap
page read and write
1981000
trusted library allocation
page read and write
296C000
heap
page read and write
1538000
heap
page read and write
1663000
trusted library allocation
page read and write
3A51000
heap
page read and write
408000
unkown
page readonly
2962000
heap
page read and write
6B6C000
heap
page read and write
198A000
trusted library allocation
page read and write
64E000
heap
page read and write
3A51000
heap
page read and write
59C0000
heap
page execute and read and write
492E000
stack
page read and write
2310000
heap
page read and write
18D3000
trusted library allocation
page read and write
309E000
stack
page read and write
3A51000
heap
page read and write
15E5000
trusted library allocation
page read and write
1732000
trusted library allocation
page read and write
1979000
trusted library allocation
page read and write
AE0000
heap
page read and write
970000
heap
page read and write
5820000
trusted library allocation
page read and write
1528000
heap
page read and write
64E000
heap
page read and write
1498000
heap
page read and write
3258000
heap
page read and write
3A51000
heap
page read and write
13E0000
heap
page read and write
19A000
stack
page read and write
3186000
heap
page read and write
326A000
heap
page read and write
408000
unkown
page readonly
16B7000
trusted library allocation
page read and write
6AA0000
heap
page read and write
162D000
trusted library allocation
page read and write
2969000
heap
page read and write
3A51000
heap
page read and write
14D1000
trusted library allocation
page read and write
65A000
heap
page read and write
3A51000
heap
page read and write
18D8000
trusted library allocation
page read and write
92E000
stack
page read and write
1586000
trusted library allocation
page read and write
3A51000
heap
page read and write
654D000
heap
page read and write
64E000
heap
page read and write
196B000
trusted library allocation
page read and write
19FE000
trusted library allocation
page read and write
B03000
heap
page read and write
1966000
trusted library allocation
page read and write
3241000
trusted library allocation
page read and write
96F000
stack
page read and write
3A51000
heap
page read and write
18D9000
trusted library allocation
page read and write
1A00000
heap
page read and write
3258000
heap
page read and write
197B000
trusted library allocation
page execute and read and write
170F000
trusted library allocation
page read and write
B2B000
heap
page read and write
1953000
trusted library allocation
page read and write
64E000
heap
page read and write
64DE000
heap
page read and write
64E000
heap
page read and write
14D1000
trusted library allocation
page read and write
2961000
heap
page read and write
15C0000
trusted library allocation
page read and write
1993000
trusted library allocation
page read and write
B22000
heap
page read and write
9C6000
heap
page read and write
1A3A000
trusted library allocation
page read and write
198B000
trusted library allocation
page read and write
1971000
trusted library allocation
page read and write
3D37000
trusted library allocation
page read and write
1987000
trusted library allocation
page read and write
14D1000
trusted library allocation
page read and write
3D31000
trusted library allocation
page read and write
2960000
heap
page read and write
326A000
heap
page read and write
296B000
heap
page read and write
3D8C000
trusted library allocation
page read and write
305E000
stack
page read and write
3A51000
heap
page read and write
61E000
heap
page read and write
169A000
trusted library allocation
page read and write
15B2000
trusted library allocation
page read and write
14D1000
trusted library allocation
page read and write
17A7000
trusted library allocation
page read and write
A30000
heap
page read and write
64E000
heap
page read and write
1984000
trusted library allocation
page read and write
3A51000
heap
page read and write
64E000
heap
page read and write
6C62000
heap
page read and write
1A2A000
trusted library allocation
page read and write
64E000
heap
page read and write
197A000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
15A2000
trusted library allocation
page read and write
1320000
remote allocation
page execute and read and write
3310000
trusted library allocation
page read and write
59D0000
trusted library allocation
page execute and read and write
14D1000
trusted library allocation
page read and write
18D9000
trusted library allocation
page read and write
579E000
trusted library allocation
page read and write
64B0000
heap
page read and write
15A1000
trusted library allocation
page read and write
18DA000
trusted library allocation
page read and write
702E000
stack
page read and write
1593000
trusted library allocation
page read and write
2D60000
heap
page read and write
B1A000
heap
page read and write
504E000
stack
page read and write
9C0000
heap
page read and write
285F000
stack
page read and write
18D1000
trusted library allocation
page read and write
56C000
stack
page read and write
88E000
stack
page read and write
15C1000
trusted library allocation
page read and write
64E000
heap
page read and write
311E000
stack
page read and write
5AC000
stack
page read and write
152C000
heap
page read and write
14D1000
trusted library allocation
page read and write
5D55000
heap
page read and write
1590000
heap
page read and write
10F4000
heap
page read and write
3A51000
heap
page read and write
18DC000
trusted library allocation
page read and write
67A000
heap
page read and write
163A000
trusted library allocation
page read and write
401000
unkown
page execute read
508F000
stack
page read and write
33C9000
trusted library allocation
page read and write
65A000
heap
page read and write
681000
heap
page read and write
400000
unkown
page readonly
4F4000
unkown
page readonly
1A20000
heap
page read and write
313F000
stack
page read and write
65A0000
heap
page read and write
2963000
heap
page read and write
158D000
trusted library allocation
page execute and read and write
153000
unkown
page write copy
18D3000
trusted library allocation
page read and write
1A10000
trusted library allocation
page read and write
64E000
heap
page read and write
82C000
stack
page read and write
6E3A000
heap
page read and write
1A27000
heap
page read and write
19F0000
trusted library allocation
page execute and read and write
197C000
trusted library allocation
page read and write
3D40000
trusted library allocation
page read and write
1587000
trusted library allocation
page read and write
3272000
heap
page read and write
461000
unkown
page read and write
1570000
trusted library allocation
page read and write
6ACE000
heap
page read and write
326A000
heap
page read and write
5833000
heap
page read and write
18DA000
trusted library allocation
page read and write
3DA5000
trusted library allocation
page read and write
167D000
trusted library allocation
page read and write
1981000
trusted library allocation
page read and write
3D01000
trusted library allocation
page read and write
B1A000
heap
page read and write
64E000
heap
page read and write
98F000
stack
page read and write
3715000
heap
page read and write
1972000
trusted library allocation
page read and write
500F000
stack
page read and write
162D000
trusted library allocation
page read and write
18D4000
trusted library allocation
page read and write
169B000
trusted library allocation
page read and write
3E04000
trusted library allocation
page read and write
6E8E000
heap
page read and write
3A51000
heap
page read and write
18D5000
trusted library allocation
page read and write
2968000
heap
page read and write
327D000
heap
page read and write
6E76000
heap
page read and write
3A51000
heap
page read and write
2D68000
heap
page read and write
65A000
heap
page read and write
14D1000
trusted library allocation
page read and write
64E000
heap
page read and write
323F000
stack
page read and write
5A4B000
stack
page read and write
649D000
stack
page read and write
16B7000
trusted library allocation
page read and write
57B1000
trusted library allocation
page read and write
18DB000
trusted library allocation
page read and write
296F000
heap
page read and write
18D6000
trusted library allocation
page read and write
3D01000
trusted library allocation
page read and write
B0B000
heap
page read and write
1787000
trusted library allocation
page read and write
B29000
heap
page read and write
15A2000
trusted library allocation
page read and write
5990000
trusted library allocation
page execute and read and write
3D01000
trusted library allocation
page read and write
B2B000
heap
page read and write
5A60000
heap
page read and write
6C06000
heap
page read and write
3A51000
heap
page read and write
1E5000
heap
page read and write
5DDE000
stack
page read and write
6E83000
heap
page read and write
5CDE000
stack
page read and write
1663000
trusted library allocation
page read and write
296F000
heap
page read and write
15C1000
trusted library allocation
page read and write
3A51000
heap
page read and write
173A000
trusted library allocation
page read and write
14F000
unkown
page write copy
18D4000
trusted library allocation
page read and write
48EF000
stack
page read and write
B08000
heap
page read and write
3A51000
heap
page read and write
162D000
trusted library allocation
page read and write
18DE000
trusted library allocation
page read and write
1991000
trusted library allocation
page read and write
1840000
heap
page read and write
326A000
heap
page read and write
1587000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
1540000
trusted library allocation
page read and write
1997000
trusted library allocation
page read and write
64E000
heap
page read and write
B1A000
heap
page read and write
40B000
unkown
page write copy
B08000
heap
page read and write
1468000
heap
page read and write
1972000
trusted library allocation
page read and write
1587000
trusted library allocation
page read and write
160E000
trusted library allocation
page read and write
197C000
trusted library allocation
page read and write
296F000
heap
page read and write
15B3000
trusted library allocation
page read and write
8A0000
heap
page read and write
14D1000
trusted library allocation
page read and write
1663000
trusted library allocation
page read and write
1A24000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
173B000
trusted library allocation
page read and write
14D1000
trusted library allocation
page read and write
120000
unkown
page readonly
18DB000
trusted library allocation
page read and write
2965000
heap
page read and write
B29000
heap
page read and write
496F000
stack
page read and write
18DC000
trusted library allocation
page read and write
B1A000
heap
page read and write
14D1000
trusted library allocation
page read and write
57B6000
trusted library allocation
page read and write
13A1000
remote allocation
page execute and read and write
13F0000
heap
page read and write
E9C000
stack
page read and write
1A2E000
trusted library allocation
page read and write
327A000
heap
page read and write
3A51000
heap
page read and write
1962000
trusted library allocation
page read and write
221E000
stack
page read and write
6EAC000
heap
page read and write
84F000
stack
page read and write
19DE000
stack
page read and write
296E000
heap
page read and write
57BD000
trusted library allocation
page read and write
90000
unkown
page readonly
16CD000
trusted library allocation
page read and write
B0C000
heap
page read and write
1531000
trusted library allocation
page read and write
1968000
trusted library allocation
page read and write
3388000
trusted library allocation
page read and write
65A000
heap
page read and write
510000
heap
page read and write
3273000
heap
page read and write
327D000
heap
page read and write
57C2000
trusted library allocation
page read and write
1990000
trusted library allocation
page read and write
FE0000
heap
page read and write
296F000
heap
page read and write
64E000
heap
page read and write
1966000
trusted library allocation
page read and write
2860000
heap
page read and write
B08000
heap
page read and write
1583000
trusted library allocation
page execute and read and write
364F000
heap
page read and write
18DD000
trusted library allocation
page read and write
327D000
heap
page read and write
3210000
heap
page read and write
2140000
heap
page read and write
2966000
heap
page read and write
59E0000
trusted library allocation
page read and write
6EA1000
heap
page read and write
A0E000
stack
page read and write
64E000
heap
page read and write
5830000
heap
page read and write
B23000
heap
page read and write
17B0000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
3A51000
heap
page read and write
3180000
heap
page read and write
1000000
trusted library allocation
page read and write
1971000
trusted library allocation
page read and write
12F7000
stack
page read and write
1971000
trusted library allocation
page read and write
326D000
heap
page read and write
325C000
heap
page read and write
199C000
trusted library allocation
page read and write
18DC000
trusted library allocation
page read and write
14D1000
trusted library allocation
page read and write
3A51000
heap
page read and write
18D2000
trusted library allocation
page read and write
158000
unkown
page readonly
15B3000
trusted library allocation
page read and write
3A51000
heap
page read and write
296B000
heap
page read and write
65A000
heap
page read and write
B25000
heap
page read and write
1597000
trusted library allocation
page read and write
64E000
heap
page read and write
64E000
heap
page read and write
1580000
trusted library allocation
page read and write
1597000
trusted library allocation
page read and write
3EB4000
trusted library allocation
page read and write
64B000
heap
page read and write
FEA000
stack
page read and write
5794000
trusted library allocation
page read and write
3D34000
trusted library allocation
page read and write
2962000
heap
page read and write
6E8B000
heap
page read and write
3A51000
heap
page read and write
1A2B000
trusted library allocation
page read and write
1982000
trusted library allocation
page read and write
14E4000
heap
page read and write
57F7000
trusted library allocation
page read and write
531C000
stack
page read and write
18D4000
trusted library allocation
page read and write
1534000
heap
page read and write
6EA3000
heap
page read and write
14D1000
trusted library allocation
page read and write
31CE000
stack
page read and write
3238000
heap
page read and write
B2B000
heap
page read and write
3E39000
trusted library allocation
page read and write
296F000
heap
page read and write
B29000
heap
page read and write
199E000
trusted library allocation
page read and write
29EE000
stack
page read and write
3D01000
trusted library allocation
page read and write
14D1000
trusted library allocation
page read and write
198C000
trusted library allocation
page read and write
64E000
heap
page read and write
2964000
heap
page read and write
1460000
heap
page read and write
296F000
heap
page read and write
21DE000
stack
page read and write
16E9000
trusted library allocation
page read and write
31F0000
heap
page read and write
2966000
heap
page read and write
18DA000
trusted library allocation
page read and write
1994000
trusted library allocation
page read and write
3277000
heap
page read and write
15FB000
trusted library allocation
page read and write
33B3000
trusted library allocation
page read and write
FF4000
heap
page read and write
66C2000
trusted library allocation
page read and write
F42000
unkown
page readonly
197F000
trusted library allocation
page read and write
4720000
heap
page read and write
64E000
heap
page read and write
64E000
heap
page read and write
18D5000
trusted library allocation
page read and write
FEE000
stack
page read and write
169B000
trusted library allocation
page read and write
17B1000
trusted library allocation
page read and write
3A51000
heap
page read and write
14D1000
trusted library allocation
page read and write
326E000
heap
page read and write
91000
unkown
page execute read
4F4000
unkown
page readonly
3A51000
heap
page read and write
19E0000
heap
page execute and read and write
324E000
heap
page read and write
8BDE000
stack
page read and write
59A0000
trusted library allocation
page execute and read and write
3D01000
trusted library allocation
page read and write
96F000
stack
page read and write
1646000
trusted library allocation
page read and write
14D1000
trusted library allocation
page read and write
3A51000
heap
page read and write
400000
unkown
page readonly
64BA000
heap
page read and write
AFF000
heap
page read and write
183E000
stack
page read and write
3A51000
heap
page read and write
1625000
trusted library allocation
page read and write
1960000
trusted library allocation
page read and write
18D2000
trusted library allocation
page read and write
35BC000
stack
page read and write
65A000
heap
page read and write
16B6000
trusted library allocation
page read and write
5C70000
trusted library allocation
page read and write
14E8000
heap
page read and write
1972000
trusted library allocation
page read and write
5C90000
heap
page read and write
296C000
heap
page read and write
14A4000
heap
page read and write
4FCE000
stack
page read and write
14B1000
heap
page read and write
6569000
heap
page read and write
A37000
heap
page read and write
296E000
heap
page read and write
14D1000
trusted library allocation
page read and write
194F000
stack
page read and write
1A0E000
trusted library allocation
page read and write
1392000
remote allocation
page execute and read and write
64E000
heap
page read and write
1999000
trusted library allocation
page read and write
327D000
heap
page read and write
1974000
trusted library allocation
page read and write
18D1000
trusted library allocation
page read and write
1A3F000
trusted library allocation
page read and write
2190000
heap
page read and write
296D000
heap
page read and write
6520000
heap
page read and write
40B000
unkown
page read and write
1596000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
3D01000
trusted library allocation
page read and write
3276000
heap
page read and write
3A51000
heap
page read and write
4970000
heap
page read and write
1965000
trusted library allocation
page read and write
1786000
trusted library allocation
page read and write
3A51000
heap
page read and write
F00000
heap
page read and write
64E000
heap
page read and write
3A51000
heap
page read and write
86C000
stack
page read and write
579B000
trusted library allocation
page read and write
697000
heap
page read and write
64E000
heap
page read and write
57E0000
trusted library allocation
page read and write
3D01000
trusted library allocation
page read and write
1508000
heap
page read and write
32F5000
trusted library allocation
page read and write
F4E000
unkown
page readonly
610000
heap
page read and write
197C000
trusted library allocation
page read and write
1105000
heap
page read and write
2968000
heap
page read and write
65A000
heap
page read and write
8E0000
heap
page read and write
3D89000
trusted library allocation
page read and write
1995000
trusted library allocation
page read and write
1984000
trusted library allocation
page read and write
41F000
unkown
page read and write
296C000
heap
page read and write
3A51000
heap
page read and write
182E000
trusted library allocation
page read and write
15AF000
trusted library allocation
page read and write
347F000
stack
page read and write
18D1000
trusted library allocation
page read and write
3E1E000
trusted library allocation
page read and write
3A51000
heap
page read and write
810000
heap
page read and write
64A0000
heap
page read and write
296D000
heap
page read and write
1000000
trusted library allocation
page read and write
2968000
heap
page read and write
3D3A000
trusted library allocation
page read and write
18DF000
trusted library allocation
page read and write
18DE000
trusted library allocation
page read and write
61A000
heap
page read and write
3D99000
trusted library allocation
page read and write
64E000
heap
page read and write
6E6C000
heap
page read and write
1587000
trusted library allocation
page read and write
14D1000
trusted library allocation
page read and write
1662000
trusted library allocation
page read and write
14D1000
trusted library allocation
page read and write
6E30000
heap
page read and write
3D3D000
trusted library allocation
page read and write
18D0000
trusted library allocation
page read and write
5F0000
heap
page read and write
197A000
trusted library allocation
page read and write
6593000
heap
page read and write
AFF000
heap
page read and write
6EAE000
heap
page read and write
18D0000
trusted library allocation
page read and write
57AE000
trusted library allocation
page read and write
2969000
heap
page read and write
18D7000
trusted library allocation
page read and write
6506000
heap
page read and write
18D5000
trusted library allocation
page read and write
3A51000
heap
page read and write
168A000
trusted library allocation
page read and write
401000
unkown
page execute read
18D4000
trusted library allocation
page read and write
1584000
trusted library allocation
page read and write
1972000
trusted library allocation
page read and write
FF0000
heap
page read and write
65A000
heap
page read and write
8ADF000
stack
page read and write
1964000
trusted library allocation
page read and write
18D5000
trusted library allocation
page read and write
199D000
trusted library allocation
page read and write
22B0000
heap
page read and write
B1A000
heap
page read and write
B2B000
heap
page read and write
196E000
trusted library allocation
page read and write
2965000
heap
page read and write
5C10000
trusted library allocation
page read and write
3249000
heap
page read and write
4F8F000
stack
page read and write
2964000
heap
page read and write
57F0000
trusted library allocation
page read and write
6586000
heap
page read and write
659E000
heap
page read and write
17FD000
trusted library allocation
page read and write
74E000
stack
page read and write
30DE000
stack
page read and write
5980000
heap
page read and write
5D1E000
stack
page read and write
6E99000
heap
page read and write
A7F000
stack
page read and write
3D7F000
trusted library allocation
page read and write
1538000
trusted library allocation
page read and write
15A2000
trusted library allocation
page read and write
14E0000
heap
page read and write
324E000
heap
page read and write
5790000
trusted library allocation
page read and write
296A000
heap
page read and write
There are 630 hidden memdumps, click here to show them.