IOC Report
hDKY4f6gEA.exe

loading gif

Files

File Path
Type
Category
Malicious
hDKY4f6gEA.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files (x86)\Internet Explorer\RCXB6AF.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Internet Explorer\services.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Internet Explorer\services.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\Java\jre-1.8\IfYiMMRuvSUMKHkp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Java\jre-1.8\IfYiMMRuvSUMKHkp.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\Java\jre-1.8\RCXA65D.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\RCXB219.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\RuntimeBroker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\RuntimeBroker.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\WindowsPowerShell\RCX9FD4.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\WindowsPowerShell\dllhost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\WindowsPowerShell\dllhost.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\internet explorer\services.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\java\jre-1.8\IfYiMMRuvSUMKHkp.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\microsoft office\RuntimeBroker.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\windowspowershell\dllhost.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Microsoft\OneDrive\IfYiMMRuvSUMKHkp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Microsoft\OneDrive\RCXC626.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Uninstall Information\RCXB8D3.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Uninstall Information\wininit.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Uninstall Information\wininit.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Windows Defender\IfYiMMRuvSUMKHkp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows Defender\RCXA207.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows Multimedia Platform\IfYiMMRuvSUMKHkp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
modified
malicious
C:\Program Files\Windows Multimedia Platform\RCXAA37.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\MapData\RCXB47C.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\MapData\SystemSettings.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\MapData\SystemSettings.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Recovery\IfYiMMRuvSUMKHkp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\RCX9764.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\RCXC0C5.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\smss.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\All Users\Desktop\IfYiMMRuvSUMKHkp.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\All Users\Microsoft\MapData\SystemSettings.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Default\AppData\Roaming\Microsoft\IfYiMMRuvSUMKHkp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Default\AppData\Roaming\Microsoft\RCXBE25.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Default\Application Data\Microsoft\IfYiMMRuvSUMKHkp.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Public\Desktop\IfYiMMRuvSUMKHkp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Public\Desktop\RCXC366.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Public\Videos\IfYiMMRuvSUMKHkp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Public\Videos\RCX99B7.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Public\Videos\RCXBB84.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Public\Videos\dasHost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\hDKY4f6gEA.exe.log
CSV text
dropped
malicious
C:\Users\user\Desktop\RCX9531.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\hDKY4f6gEA.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\IfYiMMRuvSUMKHkp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\RCXAF2A.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\LiveKernelReports\RCXAD07.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\LiveKernelReports\System.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Registration\CRMLog\IfYiMMRuvSUMKHkp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Registration\CRMLog\RCX9C96.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Internet Explorer\c5b4cb5e9653cc
ASCII text, with very long lines (495), with no line terminators
dropped
C:\Program Files (x86)\Java\jre-1.8\047efad0ccc033
ASCII text, with very long lines (568), with no line terminators
dropped
C:\Program Files (x86)\Microsoft Office\9e8d7a4ca61bd9
ASCII text, with very long lines (588), with no line terminators
dropped
C:\Program Files (x86)\WindowsPowerShell\5940a34987c991
ASCII text, with very long lines (754), with no line terminators
dropped
C:\Program Files\Microsoft\OneDrive\047efad0ccc033
ASCII text, with no line terminators
dropped
C:\Program Files\Microsoft\OneDrive\IfYiMMRuvSUMKHkp.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Uninstall Information\56085415360792
ASCII text, with very long lines (531), with no line terminators
dropped
C:\Program Files\Windows Defender\047efad0ccc033
ASCII text, with no line terminators
dropped
C:\Program Files\Windows Defender\IfYiMMRuvSUMKHkp.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Multimedia Platform\047efad0ccc033
ASCII text, with no line terminators
dropped
C:\Program Files\Windows Multimedia Platform\IfYiMMRuvSUMKHkp.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\MapData\9e60a5f7a3bd80
ASCII text, with very long lines (532), with no line terminators
dropped
C:\Recovery\047efad0ccc033
ASCII text, with no line terminators
dropped
C:\Recovery\69ddcba757bf72
ASCII text, with no line terminators
dropped
C:\Recovery\IfYiMMRuvSUMKHkp.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Recovery\smss.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\AppData\Roaming\Microsoft\047efad0ccc033
ASCII text, with no line terminators
dropped
C:\Users\Default\AppData\Roaming\Microsoft\IfYiMMRuvSUMKHkp.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Desktop\047efad0ccc033
ASCII text, with very long lines (610), with no line terminators
dropped
C:\Users\Public\Desktop\IfYiMMRuvSUMKHkp.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Videos\047efad0ccc033
ASCII text, with very long lines (914), with no line terminators
dropped
C:\Users\Public\Videos\21b1a557fd31cc
ASCII text, with very long lines (871), with no line terminators
dropped
C:\Users\Public\Videos\IfYiMMRuvSUMKHkp.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Videos\dasHost.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\047efad0ccc033
ASCII text, with very long lines (668), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\IfYiMMRuvSUMKHkp.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\dllhost.exe.log
CSV text
dropped
C:\Users\user\IfYiMMRuvSUMKHkp.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Windows\LiveKernelReports\27d1bcfc3c54e0
ASCII text, with no line terminators
dropped
C:\Windows\LiveKernelReports\System.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Windows\Registration\CRMLog\047efad0ccc033
ASCII text, with very long lines (444), with no line terminators
dropped
C:\Windows\Registration\CRMLog\IfYiMMRuvSUMKHkp.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 75 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\hDKY4f6gEA.exe
"C:\Users\user\Desktop\hDKY4f6gEA.exe"
malicious
C:\Program Files (x86)\WindowsPowerShell\dllhost.exe
"C:\Program Files (x86)\windowspowershell\dllhost.exe"
malicious
C:\Program Files (x86)\WindowsPowerShell\dllhost.exe
"C:\Program Files (x86)\windowspowershell\dllhost.exe"
malicious
C:\Program Files\Windows Defender\IfYiMMRuvSUMKHkp.exe
"C:\Program Files\Windows Defender\IfYiMMRuvSUMKHkp.exe"
malicious
C:\Recovery\IfYiMMRuvSUMKHkp.exe
C:\Recovery\IfYiMMRuvSUMKHkp.exe
malicious

URLs

Name
IP
Malicious
https://aka.ms/odirm2
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://aka.ms/Vh5j3k
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
EnableLUA
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
PromptOnSecureDesktop
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\5c97d66f5cebe7b0b47219d523e1adfb8abf6a85
e60affd00b14bb3a40123231ef4a4edccba38267
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries

Memdumps

Base Address
Regiontype
Protect
Malicious
2E81000
trusted library allocation
page read and write
malicious
32B1000
trusted library allocation
page read and write
malicious
12B81000
trusted library allocation
page read and write
malicious
27F1000
trusted library allocation
page read and write
malicious
2361000
trusted library allocation
page read and write
malicious
2BAF000
trusted library allocation
page read and write
malicious
2B71000
trusted library allocation
page read and write
malicious
132B1000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
105A000
heap
page read and write
37D1000
trusted library allocation
page read and write
1360000
heap
page read and write
1B35E000
stack
page read and write
3180000
trusted library section
page read and write
3EC6000
trusted library allocation
page read and write
1C690000
heap
page read and write
3BEF000
trusted library allocation
page read and write
7FFD9B777000
trusted library allocation
page read and write
58A000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
530000
heap
page read and write
1320000
heap
page read and write
1C6A0000
heap
page read and write
1C1CD000
heap
page read and write
3BE7000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
38F3000
trusted library allocation
page read and write
1B65E000
stack
page read and write
12801000
trusted library allocation
page read and write
35F6000
trusted library allocation
page read and write
3A74000
trusted library allocation
page read and write
4F6000
stack
page read and write
1C72A000
heap
page read and write
357D000
trusted library allocation
page read and write
1B840000
heap
page read and write
3C75000
trusted library allocation
page read and write
136B000
heap
page read and write
1790000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page read and write
1BE0E000
stack
page read and write
127F3000
trusted library allocation
page read and write
38F7000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page execute and read and write
1B94F000
stack
page read and write
1BC90000
trusted library section
page read and write
12E91000
trusted library allocation
page read and write
13569000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
1C626000
heap
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
128AC000
trusted library allocation
page read and write
1AC6D000
stack
page read and write
FE0000
trusted library allocation
page read and write
3809000
trusted library allocation
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
F8E000
unkown
page readonly
132BD000
trusted library allocation
page read and write
2C2D000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
1A820000
trusted library allocation
page read and write
1BD4E000
stack
page read and write
7FFD9B850000
trusted library allocation
page execute and read and write
3D0E000
trusted library allocation
page read and write
35BC000
trusted library allocation
page read and write
1ED34000
heap
page read and write
3470000
trusted library allocation
page read and write
38BF000
trusted library allocation
page read and write
28AF000
trusted library allocation
page read and write
3D09000
trusted library allocation
page read and write
1C58F000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
7FFD9B960000
trusted library allocation
page read and write
5A1000
heap
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
1343000
heap
page read and write
7FFD9B90C000
trusted library allocation
page read and write
F5E000
stack
page read and write
3E25000
trusted library allocation
page read and write
35BA000
trusted library allocation
page read and write
AFF000
stack
page read and write
1C5F0000
heap
page read and write
3D01000
trusted library allocation
page read and write
2A9F000
stack
page read and write
2350000
heap
page read and write
1341000
heap
page read and write
1AE2E000
stack
page read and write
7FFD9B930000
trusted library allocation
page read and write
1C65E000
heap
page read and write
1B0FD000
stack
page read and write
7FFD9B773000
trusted library allocation
page read and write
FF6000
heap
page read and write
1BC80000
heap
page execute and read and write
7FFD9B941000
trusted library allocation
page read and write
1336C000
trusted library allocation
page read and write
36E6000
trusted library allocation
page read and write
1C173000
heap
page read and write
1BCC0000
trusted library section
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
7FFD9B8AA000
trusted library allocation
page execute and read and write
1C1E2000
heap
page read and write
82F000
stack
page read and write
8D0000
trusted library allocation
page read and write
12D0000
heap
page execute and read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
1B150000
heap
page execute and read and write
3B62000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
1A8ED000
stack
page read and write
21BF000
stack
page read and write
353A000
trusted library allocation
page read and write
836000
heap
page read and write
1C754000
heap
page read and write
1410000
heap
page read and write
34B8000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
3639000
trusted library allocation
page read and write
392E000
trusted library allocation
page read and write
1300000
heap
page read and write
1C202000
heap
page read and write
7FFD9B93B000
trusted library allocation
page read and write
1C133000
heap
page read and write
10F5000
heap
page read and write
5CC000
heap
page read and write
38F9000
trusted library allocation
page read and write
1B17A000
stack
page read and write
C60000
heap
page read and write
7FFD9B7AB000
trusted library allocation
page execute and read and write
8E9000
heap
page read and write
1C770000
heap
page read and write
1C7AE000
heap
page read and write
3B68000
trusted library allocation
page read and write
7FFD9B8B7000
trusted library allocation
page execute and read and write
1C61B000
heap
page read and write
8A0000
trusted library allocation
page read and write
F30000
heap
page read and write
3AEA000
trusted library allocation
page read and write
3A6B000
trusted library allocation
page read and write
28B2000
trusted library allocation
page read and write
7FFD9B786000
trusted library allocation
page read and write
3E27000
trusted library allocation
page read and write
7FFD9B8B1000
trusted library allocation
page execute and read and write
375A000
trusted library allocation
page read and write
1AF2E000
stack
page read and write
7FFD9BA00000
trusted library allocation
page read and write
39ED000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
7FFD9B784000
trusted library allocation
page read and write
560000
heap
page read and write
3884000
trusted library allocation
page read and write
12B78000
trusted library allocation
page read and write
5CF000
heap
page read and write
35B4000
trusted library allocation
page read and write
CCD000
heap
page read and write
7FFD9B793000
trusted library allocation
page read and write
7FFD9B916000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
13AD000
heap
page read and write
56C000
heap
page read and write
102F000
heap
page read and write
368B000
trusted library allocation
page read and write
900000
heap
page read and write
3760000
trusted library allocation
page read and write
7FFD9B9FD000
trusted library allocation
page read and write
34B4000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1C712000
heap
page read and write
384A000
trusted library allocation
page read and write
E20000
unkown
page readonly
7FFD9B816000
trusted library allocation
page read and write
F50000
heap
page read and write
3D03000
trusted library allocation
page read and write
1B632000
heap
page read and write
7FFD9B943000
trusted library allocation
page read and write
3AE6000
trusted library allocation
page read and write
1C589000
heap
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
7FFD9B930000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
1E92E000
stack
page read and write
1BCF0000
trusted library section
page read and write
1565000
heap
page read and write
7FFD9B943000
trusted library allocation
page read and write
1B8F4000
stack
page read and write
7FFD9B923000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
D20000
heap
page read and write
870000
trusted library allocation
page read and write
7FFD9B897000
trusted library allocation
page execute and read and write
1C5D9000
heap
page read and write
39EB000
trusted library allocation
page read and write
3813000
trusted library allocation
page read and write
1BC7F000
stack
page read and write
7FFD9B793000
trusted library allocation
page read and write
11FF000
stack
page read and write
3E29000
trusted library allocation
page read and write
85B000
heap
page read and write
1241C000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
7FFD9B880000
trusted library allocation
page execute and read and write
12B73000
trusted library allocation
page read and write
127FD000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
39F3000
trusted library allocation
page read and write
28A6000
trusted library allocation
page read and write
3D97000
trusted library allocation
page read and write
7FFD9B760000
trusted library allocation
page read and write
3936000
trusted library allocation
page read and write
500000
heap
page read and write
12E83000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
35B2000
trusted library allocation
page read and write
3474000
trusted library allocation
page read and write
146F000
stack
page read and write
60B000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
22F0000
heap
page execute and read and write
7FFD9B816000
trusted library allocation
page read and write
7FFD9B947000
trusted library allocation
page read and write
9D6000
stack
page read and write
12B7D000
trusted library allocation
page read and write
1C5AE000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
375E000
trusted library allocation
page read and write
7FFD9B9A2000
trusted library allocation
page read and write
3636000
trusted library allocation
page read and write
3C7F000
trusted library allocation
page read and write
2340000
heap
page execute and read and write
1AD2E000
stack
page read and write
7FFD9B94B000
trusted library allocation
page read and write
854000
heap
page read and write
5CA000
heap
page read and write
3BED000
trusted library allocation
page read and write
1C69C000
heap
page read and write
1ED30000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
12E8D000
trusted library allocation
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
7FFD9B920000
trusted library allocation
page read and write
1C5E6000
heap
page read and write
EF6000
stack
page read and write
1B6FE000
stack
page read and write
7FFD9B9F9000
trusted library allocation
page read and write
3886000
trusted library allocation
page read and write
7FFD9B782000
trusted library allocation
page read and write
7FFD9B7A3000
trusted library allocation
page read and write
3796000
trusted library allocation
page read and write
3E2B000
trusted library allocation
page read and write
25CF000
stack
page read and write
1BB4A000
stack
page read and write
36E8000
trusted library allocation
page read and write
1BA4F000
stack
page read and write
3532000
trusted library allocation
page read and write
7FFD9B93C000
trusted library allocation
page read and write
1BCA0000
trusted library section
page read and write
3B60000
trusted library allocation
page read and write
3882000
trusted library allocation
page read and write
3798000
trusted library allocation
page read and write
39F1000
trusted library allocation
page read and write
3932000
trusted library allocation
page read and write
7FFD9B891000
trusted library allocation
page execute and read and write
800000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
35F8000
trusted library allocation
page read and write
7FF470A30000
trusted library allocation
page execute and read and write
36E4000
trusted library allocation
page read and write
1C12C000
heap
page read and write
38BB000
trusted library allocation
page read and write
83C000
heap
page read and write
1031000
heap
page read and write
7FFD9B88D000
trusted library allocation
page execute and read and write
3AE8000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
357B000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
132B8000
trusted library allocation
page read and write
1850000
heap
page read and write
3D95000
trusted library allocation
page read and write
34B2000
trusted library allocation
page read and write
7FFD9B92A000
trusted library allocation
page read and write
1306000
heap
page read and write
35F4000
trusted library allocation
page read and write
3C77000
trusted library allocation
page read and write
C98000
heap
page read and write
38BD000
trusted library allocation
page read and write
14F0000
heap
page read and write
7FFD9B9A9000
trusted library allocation
page read and write
2F41000
trusted library allocation
page read and write
3888000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
C90000
heap
page read and write
1C5E4000
heap
page read and write
380B000
trusted library allocation
page read and write
35B6000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
1B75E000
stack
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
27D0000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
12361000
trusted library allocation
page read and write
3D05000
trusted library allocation
page read and write
1BD00000
heap
page read and write
566000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
3F56000
trusted library allocation
page read and write
3472000
trusted library allocation
page read and write
10F0000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
3848000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
1CC6E000
stack
page read and write
37D3000
trusted library allocation
page read and write
12BF000
stack
page read and write
F92000
unkown
page readonly
FE0000
trusted library allocation
page read and write
1560000
heap
page read and write
CC0000
heap
page read and write
10A1000
heap
page read and write
1C1A4000
heap
page read and write
1C103000
stack
page read and write
B30000
trusted library allocation
page read and write
353C000
trusted library allocation
page read and write
1530000
heap
page read and write
7FFD9B903000
trusted library allocation
page read and write
7FFD9B92C000
trusted library allocation
page read and write
3632000
trusted library allocation
page read and write
195F000
stack
page read and write
CBE000
stack
page read and write
3725000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
FC0000
trusted library allocation
page read and write
3575000
trusted library allocation
page read and write
B50000
trusted library allocation
page read and write
3D0B000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page read and write
85F000
heap
page read and write
380D000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
1365000
heap
page read and write
37D5000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
7FFD9B7BB000
trusted library allocation
page execute and read and write
1C1F6000
heap
page read and write
8D5000
heap
page read and write
1C1E4000
heap
page read and write
38FB000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
3794000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
E22000
unkown
page readonly
37CF000
trusted library allocation
page read and write
3673000
trusted library allocation
page read and write
3811000
trusted library allocation
page read and write
3972000
trusted library allocation
page read and write
1BF0E000
stack
page read and write
CF9000
heap
page read and write
1C64A000
heap
page read and write
3844000
trusted library allocation
page read and write
1B2FD000
stack
page read and write
12F0000
trusted library allocation
page read and write
870000
heap
page read and write
3930000
trusted library allocation
page read and write
D25000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
7FFD9B797000
trusted library allocation
page read and write
C70000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
3160000
trusted library section
page read and write
1C1B3000
heap
page read and write
3758000
trusted library allocation
page read and write
38C3000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
1C7D3000
heap
page read and write
1D35B000
stack
page read and write
1855000
heap
page read and write
1B453000
stack
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
1BAFA000
stack
page read and write
3BE9000
trusted library allocation
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
7FFD9B866000
trusted library allocation
page execute and read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
2E40000
heap
page execute and read and write
384E000
trusted library allocation
page read and write
612000
heap
page read and write
12F3C000
trusted library allocation
page read and write
C20000
heap
page read and write
3AE2000
trusted library allocation
page read and write
3573000
trusted library allocation
page read and write
1B9F3000
stack
page read and write
7FFD9B923000
trusted library allocation
page read and write
7FFD9B911000
trusted library allocation
page read and write
7FFD9B7BD000
trusted library allocation
page execute and read and write
3577000
trusted library allocation
page read and write
7FFD9B777000
trusted library allocation
page read and write
7FFD9B7A7000
trusted library allocation
page read and write
7FFD9B92C000
trusted library allocation
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
CAB000
heap
page read and write
7FFD9B98D000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
3792000
trusted library allocation
page read and write
1C004000
stack
page read and write
12368000
trusted library allocation
page read and write
1B273000
stack
page read and write
7FFD9BA10000
trusted library allocation
page read and write
1C59B000
heap
page read and write
3BF3000
trusted library allocation
page read and write
38B9000
trusted library allocation
page read and write
3C73000
trusted library allocation
page read and write
35F2000
trusted library allocation
page read and write
7FFD9B7AB000
trusted library allocation
page execute and read and write
3727000
trusted library allocation
page read and write
38FD000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
BB0000
heap
page read and write
861000
heap
page read and write
1BBFE000
stack
page read and write
136D000
heap
page read and write
7FFD9B944000
trusted library allocation
page read and write
3534000
trusted library allocation
page read and write
36EA000
trusted library allocation
page read and write
17B0000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
379A000
trusted library allocation
page read and write
3938000
trusted library allocation
page read and write
3D07000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
12F6000
stack
page read and write
3C79000
trusted library allocation
page read and write
22BE000
stack
page read and write
7FFD9B7A4000
trusted library allocation
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
3677000
trusted library allocation
page read and write
1BE4E000
stack
page read and write
1B5F0000
heap
page read and write
7FFD9B77C000
trusted library allocation
page read and write
C40000
heap
page read and write
3978000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
1C1D6000
heap
page read and write
1C42D000
stack
page read and write
34BA000
trusted library allocation
page read and write
7FFD9B8A7000
trusted library allocation
page execute and read and write
1C1E8000
heap
page read and write
39F5000
trusted library allocation
page read and write
12E81000
trusted library allocation
page read and write
7FFD9B94B000
trusted library allocation
page read and write
1C1EA000
heap
page read and write
3BEB000
trusted library allocation
page read and write
1B37F000
stack
page read and write
3A6F000
trusted library allocation
page read and write
1C6C7000
heap
page read and write
872000
heap
page read and write
7FFD9B836000
trusted library allocation
page read and write
7FFD9B964000
trusted library allocation
page read and write
7FFD9B953000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
1236D000
trusted library allocation
page read and write
3C81000
trusted library allocation
page read and write
915000
heap
page read and write
3150000
trusted library section
page read and write
7FFD9B970000
trusted library allocation
page read and write
289D000
trusted library allocation
page read and write
3BF1000
trusted library allocation
page read and write
1C675000
heap
page read and write
2600000
heap
page read and write
3579000
trusted library allocation
page read and write
3B64000
trusted library allocation
page read and write
3B5E000
trusted library allocation
page read and write
CCB000
heap
page read and write
1B83F000
stack
page read and write
510000
heap
page read and write
14D0000
heap
page read and write
12E88000
trusted library allocation
page read and write
3C7B000
trusted library allocation
page read and write
590000
heap
page read and write
1C607000
heap
page read and write
12363000
trusted library allocation
page read and write
17E0000
trusted library allocation
page read and write
3A71000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
7FFD9B920000
trusted library allocation
page read and write
1C310000
trusted library section
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
59F000
heap
page read and write
2B60000
heap
page execute and read and write
B00000
heap
page read and write
1C6E5000
heap
page read and write
109A000
heap
page read and write
397C000
trusted library allocation
page read and write
371D000
trusted library allocation
page read and write
1C52A000
stack
page read and write
27E0000
heap
page execute and read and write
1B83D000
stack
page read and write
7FFD9BA40000
trusted library allocation
page read and write
13B5000
heap
page read and write
1C6F4000
heap
page read and write
1ABA0000
trusted library allocation
page read and write
1B074000
stack
page read and write
329E000
stack
page read and write
35FA000
trusted library allocation
page read and write
1BC43000
stack
page read and write
586000
stack
page read and write
58E000
heap
page read and write
176E000
stack
page read and write
5C0000
heap
page read and write
166E000
stack
page read and write
13F0000
heap
page read and write
241C000
trusted library allocation
page read and write
1BCB0000
trusted library section
page read and write
380F000
trusted library allocation
page read and write
3976000
trusted library allocation
page read and write
7FFD9B79C000
trusted library allocation
page read and write
38C1000
trusted library allocation
page read and write
379C000
trusted library allocation
page read and write
1D45B000
stack
page read and write
7FFD9B797000
trusted library allocation
page read and write
28A3000
trusted library allocation
page read and write
7FFD9B88A000
trusted library allocation
page execute and read and write
720000
unkown
page readonly
910000
heap
page read and write
3974000
trusted library allocation
page read and write
34F9000
trusted library allocation
page read and write
127F1000
trusted library allocation
page read and write
7FFD9B79C000
trusted library allocation
page read and write
34B0000
trusted library allocation
page read and write
3D93000
trusted library allocation
page read and write
1C77A000
heap
page read and write
3DA0000
trusted library allocation
page read and write
3880000
trusted library allocation
page read and write
1335A000
trusted library allocation
page read and write
387E000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page read and write
1C110000
heap
page read and write
1C30A000
stack
page read and write
1C570000
heap
page read and write
3723000
trusted library allocation
page read and write
3634000
trusted library allocation
page read and write
34FB000
trusted library allocation
page read and write
384C000
trusted library allocation
page read and write
28A9000
trusted library allocation
page read and write
1C180000
heap
page read and write
830000
heap
page read and write
3A69000
trusted library allocation
page read and write
3E2D000
trusted library allocation
page read and write
7FFD9B90C000
trusted library allocation
page read and write
880000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1C666000
heap
page read and write
885000
heap
page read and write
5D0000
heap
page read and write
7FFD9B936000
trusted library allocation
page read and write
F70000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
3AE0000
trusted library allocation
page read and write
38F5000
trusted library allocation
page read and write
397A000
trusted library allocation
page read and write
1BCD0000
trusted library section
page read and write
1C320000
trusted library section
page read and write
35B8000
trusted library allocation
page read and write
FFC000
heap
page read and write
39EF000
trusted library allocation
page read and write
7FFD9B92E000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
1B380000
heap
page read and write
1C63B000
heap
page read and write
7FFD9B8AF000
trusted library allocation
page execute and read and write
3C7D000
trusted library allocation
page read and write
1C160000
heap
page read and write
1C7A2000
heap
page read and write
3846000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
13A73000
trusted library allocation
page read and write
13416000
trusted library allocation
page read and write
1C7B3000
heap
page read and write
28A0000
trusted library allocation
page read and write
1B2E0000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
36B0000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page read and write
3AE4000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
37D7000
trusted library allocation
page read and write
CF7000
heap
page read and write
1C171000
heap
page read and write
346E000
trusted library allocation
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
8A1000
heap
page read and write
1C530000
trusted library section
page read and write
7FFD9B7B4000
trusted library allocation
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
876000
heap
page read and write
1080000
heap
page read and write
1BCE0000
trusted library section
page read and write
830000
heap
page read and write
7FFD9B9C1000
trusted library allocation
page read and write
7FFD9B7A4000
trusted library allocation
page read and write
3571000
trusted library allocation
page read and write
C65000
heap
page read and write
7FFD9B887000
trusted library allocation
page execute and read and write
35FC000
trusted library allocation
page read and write
594000
heap
page read and write
1A390000
trusted library allocation
page read and write
7FFD9B762000
trusted library allocation
page read and write
32A0000
heap
page read and write
12371000
trusted library allocation
page read and write
7FFD9B88F000
trusted library allocation
page execute and read and write
1B7FF000
stack
page read and write
FF0000
heap
page read and write
3F58000
trusted library allocation
page read and write
B80000
trusted library allocation
page read and write
3934000
trusted library allocation
page read and write
1025000
heap
page read and write
1B540000
heap
page execute and read and write
13F9000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
C10000
heap
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
7FFD9B77C000
trusted library allocation
page read and write
3190000
heap
page execute and read and write
7FFD9B792000
trusted library allocation
page read and write
3762000
trusted library allocation
page read and write
3B66000
trusted library allocation
page read and write
3675000
trusted library allocation
page read and write
F90000
trusted library allocation
page read and write
3170000
trusted library section
page read and write
1C613000
heap
page read and write
375C000
trusted library allocation
page read and write
363B000
trusted library allocation
page read and write
3E2F000
trusted library allocation
page read and write
1D22D000
stack
page read and write
7FFD9B90A000
trusted library allocation
page read and write
3E32000
trusted library allocation
page read and write
1C20C000
heap
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
BB5000
heap
page read and write
7FFD9B7AC000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
7FFD9B923000
trusted library allocation
page read and write
2E70000
heap
page read and write
1C1BA000
heap
page read and write
8DC000
heap
page read and write
1B53E000
stack
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
3A6D000
trusted library allocation
page read and write
1AEB0000
trusted library allocation
page read and write
127F8000
trusted library allocation
page read and write
3671000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page execute and read and write
37D9000
trusted library allocation
page read and write
14D5000
heap
page read and write
1510000
heap
page read and write
1B73F000
stack
page read and write
1B0AF000
stack
page read and write
1B554000
stack
page read and write
1B25E000
stack
page read and write
89C000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
F20000
heap
page read and write
12B71000
trusted library allocation
page read and write
2F32000
trusted library allocation
page read and write
7FFD9B90E000
trusted library allocation
page read and write
There are 657 hidden memdumps, click here to show them.