IOC Report
94e.exe

loading gif

Files

File Path
Type
Category
Malicious
94e.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\rmc\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\GuardKey Solutions\SecureKey.com
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\GuardKey Solutions\SecureKey.js
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\159893\H
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\159893\Held.com
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecureKey.url
MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Local\GuardKey Solutions\SecureKey.js" >), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\GuardKey Solutions\a
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\Beastiality
Microsoft Cabinet archive data, 487450 bytes, 10 files, at 0x2c +A "Momentum" +A "Exam", ID 5078, number 1, 29 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\Local\Temp\Belle
data
dropped
C:\Users\user\AppData\Local\Temp\Deviation
data
dropped
C:\Users\user\AppData\Local\Temp\Ds
data
dropped
C:\Users\user\AppData\Local\Temp\Episode
data
dropped
C:\Users\user\AppData\Local\Temp\Exam
data
dropped
C:\Users\user\AppData\Local\Temp\Formed
data
dropped
C:\Users\user\AppData\Local\Temp\Limit
data
dropped
C:\Users\user\AppData\Local\Temp\Lived
data
dropped
C:\Users\user\AppData\Local\Temp\Modes
ASCII text, with very long lines (678), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Modes.cmd (copy)
ASCII text, with very long lines (678), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Momentum
data
dropped
C:\Users\user\AppData\Local\Temp\Once
data
dropped
C:\Users\user\AppData\Local\Temp\Pounds
data
dropped
C:\Users\user\AppData\Local\Temp\Proceedings
data
dropped
C:\Users\user\AppData\Local\Temp\Retrieval
data
dropped
C:\Users\user\AppData\Local\Temp\Roland
data
dropped
C:\Users\user\AppData\Local\Temp\Shoot
data
dropped
C:\Users\user\AppData\Local\Temp\Sure
data
dropped
C:\Users\user\AppData\Local\Temp\This
data
dropped
C:\Users\user\AppData\Local\Temp\Toll
data
dropped
C:\Users\user\AppData\Local\Temp\Twiki
data
dropped
C:\Users\user\AppData\Local\Temp\Verde
data
dropped
There are 22 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c move Modes Modes.cmd & Modes.cmd
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "opssvc wrsa"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 159893
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "Patrick" Episode
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Proceedings + ..\Deviation + ..\Ds + ..\Lived + ..\Formed + ..\Twiki + ..\Shoot + ..\Retrieval + ..\Pounds + ..\Roland H
malicious
C:\Users\user\AppData\Local\Temp\159893\Held.com
Held.com H
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecureKey.url" & echo URL="C:\Users\user\AppData\Local\GuardKey Solutions\SecureKey.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecureKey.url" & exit
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\GuardKey Solutions\SecureKey.js"
malicious
C:\Users\user\AppData\Local\GuardKey Solutions\SecureKey.com
"C:\Users\user\AppData\Local\GuardKey Solutions\SecureKey.com" "C:\Users\user\AppData\Local\GuardKey Solutions\a"
malicious
C:\Users\user\Desktop\94e.exe
"C:\Users\user\Desktop\94e.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\extrac32.exe
extrac32 /Y /E Beastiality
C:\Windows\SysWOW64\choice.exe
choice /d y /t 5
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://geoplugin.net/json.gp
178.237.33.50
http://www.autoitscript.com/autoit3/X
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://www.autoitscript.com/autoit3/
unknown
http://www.teamviewer.com
unknown

Domains

Name
IP
Malicious
geoplugin.net
178.237.33.50
KPstIEdgjHZZFIeWPSSPTXW.KPstIEdgjHZZFIeWPSSPTXW
unknown

IPs

IP
Domain
Country
Malicious
101.99.94.64
unknown
Malaysia
malicious
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\fojdjjeuJJJnd-LZ12B2
exepath
HKEY_CURRENT_USER\SOFTWARE\fojdjjeuJJJnd-LZ12B2
licence
HKEY_CURRENT_USER\SOFTWARE\fojdjjeuJJJnd-LZ12B2
time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted

Memdumps

Base Address
Regiontype
Protect
Malicious
6FC8000
trusted library allocation
page read and write
42C000
unkown
page read and write
4460000
trusted library allocation
page read and write
1142000
heap
page read and write
686000
heap
page read and write
71A7000
trusted library allocation
page read and write
71AA000
trusted library allocation
page read and write
6F85000
trusted library allocation
page read and write
304D000
heap
page read and write
1C10000
trusted library allocation
page read and write
3F90000
trusted library allocation
page read and write
22DD000
stack
page read and write
8B3000
heap
page read and write
9D4000
heap
page read and write
2CDC000
stack
page read and write
6F84000
trusted library allocation
page read and write
71AD000
trusted library allocation
page read and write
6EE4000
trusted library allocation
page read and write
9D4000
heap
page read and write
1C10000
trusted library allocation
page read and write
3271000
heap
page read and write
9D4000
heap
page read and write
5A0000
heap
page read and write
229B000
heap
page read and write
71AE000
trusted library allocation
page read and write
46D3000
trusted library allocation
page read and write
2624A9DC000
heap
page read and write
30B0000
trusted library allocation
page read and write
3CA2000
trusted library allocation
page read and write
6E14000
trusted library allocation
page read and write
34AA000
trusted library allocation
page read and write
46DC000
trusted library allocation
page read and write
71A6000
trusted library allocation
page read and write
30B1000
trusted library allocation
page read and write
2624A7D4000
heap
page read and write
3271000
heap
page read and write
3271000
heap
page read and write
2624A7C6000
heap
page read and write
3271000
heap
page read and write
71A1000
trusted library allocation
page read and write
8C6000
heap
page read and write
6FFF000
trusted library allocation
page read and write
400000
unkown
page readonly
34A3000
trusted library allocation
page read and write
9D5000
heap
page read and write
34AA000
trusted library allocation
page read and write
30BD000
trusted library allocation
page read and write
6DA1000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
30B5000
trusted library allocation
page read and write
80E000
stack
page read and write
3582000
heap
page read and write
3BA000
stack
page read and write
34A5000
trusted library allocation
page read and write
2D6E000
stack
page read and write
3499000
heap
page read and write
34A0000
trusted library allocation
page read and write
46DB000
trusted library allocation
page read and write
2690000
heap
page read and write
EDF000
stack
page read and write
6F54000
trusted library allocation
page read and write
1C10000
trusted library allocation
page read and write
71A0000
trusted library allocation
page read and write
4478000
trusted library allocation
page read and write
46DA000
trusted library allocation
page read and write
34A5000
trusted library allocation
page read and write
30B2000
trusted library allocation
page read and write
34AA000
trusted library allocation
page read and write
7266000
trusted library allocation
page read and write
30BA000
trusted library allocation
page read and write
4810000
heap
page read and write
9D4000
heap
page read and write
268E000
unkown
page read and write
8E2000
heap
page read and write
1153000
heap
page read and write
239E000
stack
page read and write
3271000
heap
page read and write
8CA000
heap
page read and write
62E000
heap
page read and write
86E000
heap
page read and write
71AD000
trusted library allocation
page read and write
301E000
heap
page read and write
3271000
heap
page read and write
469E000
stack
page read and write
858000
heap
page read and write
420000
unkown
page read and write
34A7000
trusted library allocation
page read and write
3CA2000
trusted library allocation
page read and write
6E16000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
3582000
heap
page read and write
71A7000
trusted library allocation
page read and write
3E71000
trusted library allocation
page read and write
9D4000
heap
page read and write
2624C5B0000
heap
page read and write
3271000
heap
page read and write
6F53000
trusted library allocation
page read and write
4E6F000
stack
page read and write
6F54000
trusted library allocation
page read and write
2624A8A0000
heap
page read and write
3271000
heap
page read and write
B15000
unkown
page readonly
71A7000
trusted library allocation
page read and write
3271000
heap
page read and write
30B0000
trusted library allocation
page read and write
2624A7A1000
heap
page read and write
7C0000
heap
page read and write
30B1000
trusted library allocation
page read and write
2624A7D6000
heap
page read and write
9D4000
heap
page read and write
4474000
trusted library allocation
page read and write
500000
unkown
page readonly
6E02000
trusted library allocation
page read and write
BDC000
stack
page read and write
1153000
heap
page read and write
6E5D2FF000
stack
page read and write
6DA1000
trusted library allocation
page read and write
3271000
heap
page read and write
727A000
trusted library allocation
page read and write
30B5000
trusted library allocation
page read and write
3582000
heap
page read and write
3E71000
trusted library allocation
page read and write
4473000
trusted library allocation
page read and write
A30000
heap
page read and write
30B7000
trusted library allocation
page read and write
2624A7EE000
heap
page read and write
6F54000
trusted library allocation
page read and write
401000
unkown
page execute read
30B4000
trusted library allocation
page read and write
8A1000
heap
page read and write
46DD000
trusted library allocation
page read and write
2624A788000
heap
page read and write
3DA9000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
46D6000
trusted library allocation
page read and write
31C7000
heap
page read and write
9D5000
heap
page read and write
89E000
heap
page read and write
3E35000
trusted library allocation
page read and write
2624A7B6000
heap
page read and write
34AE000
trusted library allocation
page read and write
3271000
heap
page read and write
8A8000
heap
page read and write
30B4000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
898000
heap
page read and write
2624A7E6000
heap
page read and write
30B3000
trusted library allocation
page read and write
46DE000
trusted library allocation
page read and write
34A9000
trusted library allocation
page read and write
34AD000
trusted library allocation
page read and write
6E8F000
trusted library allocation
page read and write
3581000
heap
page read and write
3E71000
trusted library allocation
page read and write
34AE000
trusted library allocation
page read and write
3CA2000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
400000
unkown
page readonly
66A8000
heap
page read and write
1C10000
trusted library allocation
page read and write
3CE2000
trusted library allocation
page read and write
3320000
heap
page read and write
34AC000
trusted library allocation
page read and write
30B4000
trusted library allocation
page read and write
71AB000
trusted library allocation
page read and write
1C10000
trusted library allocation
page read and write
1C10000
trusted library allocation
page read and write
1C10000
trusted library allocation
page read and write
4476000
trusted library allocation
page read and write
34A1000
trusted library allocation
page read and write
4474000
trusted library allocation
page read and write
8C6000
heap
page read and write
2B52000
heap
page read and write
898000
heap
page read and write
620000
heap
page read and write
46D9000
trusted library allocation
page read and write
B9C000
stack
page read and write
6E5D3FF000
stack
page read and write
7272000
trusted library allocation
page read and write
2624A780000
heap
page read and write
9C0000
heap
page read and write
34A2000
trusted library allocation
page read and write
30B3000
trusted library allocation
page read and write
4EAE000
stack
page read and write
6F54000
trusted library allocation
page read and write
899000
heap
page read and write
3582000
heap
page read and write
40C000
unkown
page read and write
43F4000
heap
page read and write
8C7000
heap
page read and write
3F33000
trusted library allocation
page read and write
895000
heap
page read and write
3F1A000
trusted library allocation
page read and write
71A7000
trusted library allocation
page read and write
9D4000
heap
page read and write
310E000
stack
page read and write
46DE000
trusted library allocation
page read and write
9D4000
heap
page read and write
4071000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
318E000
heap
page read and write
3F69000
trusted library allocation
page read and write
3271000
heap
page read and write
B03000
unkown
page readonly
3F10000
trusted library allocation
page read and write
83E000
stack
page read and write
3E71000
trusted library allocation
page read and write
810000
heap
page read and write
34A6000
trusted library allocation
page read and write
98E000
stack
page read and write
30B9000
trusted library allocation
page read and write
71AA000
trusted library allocation
page read and write
3008000
heap
page read and write
7277000
trusted library allocation
page read and write
34A4000
trusted library allocation
page read and write
71A5000
trusted library allocation
page read and write
3EF1000
trusted library allocation
page read and write
6E5CCFA000
stack
page read and write
46D6000
trusted library allocation
page read and write
19A000
stack
page read and write
6F31000
trusted library allocation
page read and write
34A3000
trusted library allocation
page read and write
2D40000
heap
page read and write
282F000
stack
page read and write
3CD7000
trusted library allocation
page read and write
7D4000
heap
page read and write
872000
heap
page read and write
46D6000
trusted library allocation
page read and write
605000
heap
page read and write
68B000
heap
page read and write
3271000
heap
page read and write
34AA000
trusted library allocation
page read and write
3DCB000
trusted library allocation
page read and write
6E78000
trusted library allocation
page read and write
6E8F000
trusted library allocation
page read and write
63C000
stack
page read and write
3E71000
trusted library allocation
page read and write
71AC000
trusted library allocation
page read and write
850000
unkown
page readonly
4E2E000
stack
page read and write
71AA000
trusted library allocation
page read and write
2624A7CF000
heap
page read and write
6DA1000
trusted library allocation
page read and write
6E77000
trusted library allocation
page read and write
7BE000
stack
page read and write
30B9000
trusted library allocation
page read and write
2624A7E2000
heap
page read and write
4474000
trusted library allocation
page read and write
1C10000
trusted library allocation
page read and write
3E71000
trusted library allocation
page read and write
3000000
heap
page read and write
666000
heap
page read and write
34A2000
trusted library allocation
page read and write
71A0000
trusted library allocation
page read and write
3E71000
trusted library allocation
page read and write
2624A7D4000
heap
page read and write
71A5000
trusted library allocation
page read and write
71A7000
trusted library allocation
page read and write
733E000
trusted library allocation
page read and write
71A0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
2FAC000
stack
page read and write
87E000
stack
page read and write
71A2000
trusted library allocation
page read and write
3E71000
trusted library allocation
page read and write
71A7000
trusted library allocation
page read and write
30B3000
trusted library allocation
page read and write
9D4000
heap
page read and write
3581000
heap
page read and write
1036000
heap
page read and write
71A6000
trusted library allocation
page read and write
21F0000
heap
page read and write
6DA1000
trusted library allocation
page read and write
46DA000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
3E71000
trusted library allocation
page read and write
288E000
stack
page read and write
F32000
heap
page read and write
34AD000
trusted library allocation
page read and write
7FF000
stack
page read and write
46DF000
stack
page read and write
7D4000
heap
page read and write
3F4B000
trusted library allocation
page read and write
34AE000
trusted library allocation
page read and write
34A7000
trusted library allocation
page read and write
71AB000
trusted library allocation
page read and write
3F24000
trusted library allocation
page read and write
3271000
heap
page read and write
2624A7D9000
heap
page read and write
E50000
heap
page read and write
7D4000
heap
page read and write
1025000
heap
page read and write
3F5F000
trusted library allocation
page read and write
30B6000
trusted library allocation
page read and write
4740000
trusted library allocation
page read and write
88B000
heap
page read and write
31C0000
heap
page read and write
71A9000
trusted library allocation
page read and write
30B4000
trusted library allocation
page read and write
894000
heap
page read and write
46DF000
trusted library allocation
page read and write
6DA1000
trusted library allocation
page read and write
46DE000
trusted library allocation
page read and write
2624A79C000
heap
page read and write
224E000
stack
page read and write
89D000
heap
page read and write
3271000
heap
page read and write
666000
heap
page read and write
8A4000
heap
page read and write
3271000
heap
page read and write
71AD000
trusted library allocation
page read and write
46D1000
trusted library allocation
page read and write
A37000
heap
page read and write
46D4000
trusted library allocation
page read and write
2624A7B6000
heap
page read and write
660000
heap
page read and write
46D6000
trusted library allocation
page read and write
6F54000
trusted library allocation
page read and write
3581000
heap
page read and write
662000
heap
page read and write
447C000
trusted library allocation
page read and write
3271000
heap
page read and write
30B5000
trusted library allocation
page read and write
46B000
unkown
page read and write
71A6000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
9D4000
heap
page read and write
9D4000
heap
page read and write
303A000
heap
page read and write
3582000
heap
page read and write
30B0000
trusted library allocation
page read and write
3F5E000
trusted library allocation
page read and write
6F06000
trusted library allocation
page read and write
3FE8000
trusted library allocation
page read and write
30B1000
heap
page read and write
851000
unkown
page execute read
71A8000
trusted library allocation
page read and write
BA8000
heap
page read and write
30BA000
trusted library allocation
page read and write
1C10000
trusted library allocation
page read and write
34A5000
trusted library allocation
page read and write
925000
unkown
page readonly
2624A7C6000
heap
page read and write
3F29000
trusted library allocation
page read and write
30B5000
trusted library allocation
page read and write
471E000
stack
page read and write
71AD000
trusted library allocation
page read and write
30BF000
trusted library allocation
page read and write
46D3000
trusted library allocation
page read and write
890000
heap
page read and write
8EF000
stack
page read and write
4EEF000
stack
page read and write
6DA0000
trusted library allocation
page read and write
3D32000
trusted library allocation
page read and write
2624A7DC000
heap
page read and write
3F15000
trusted library allocation
page read and write
4F2E000
stack
page read and write
1133000
heap
page read and write
5EE000
stack
page read and write
6F32000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
6E4F000
trusted library allocation
page read and write
30BC000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
6DA1000
trusted library allocation
page read and write
71A7000
trusted library allocation
page read and write
3EB0000
trusted library allocation
page read and write
68B000
heap
page read and write
40C000
unkown
page write copy
3D44000
trusted library allocation
page read and write
30B8000
trusted library allocation
page read and write
3271000
heap
page read and write
9D4000
heap
page read and write
E36000
heap
page read and write
34A0000
trusted library allocation
page read and write
6E5CDFE000
stack
page read and write
89E000
heap
page read and write
EE0000
heap
page read and write
34AF000
trusted library allocation
page read and write
27F0000
heap
page read and write
2624A7C6000
heap
page read and write
34A9000
trusted library allocation
page read and write
8E2000
heap
page read and write
34A8000
trusted library allocation
page read and write
2624A7D5000
heap
page read and write
3271000
heap
page read and write
26C0000
heap
page read and write
2624A7B4000
heap
page read and write
2DD0000
heap
page read and write
46DD000
trusted library allocation
page read and write
3271000
heap
page read and write
9D4000
heap
page read and write
314F000
stack
page read and write
46D9000
trusted library allocation
page read and write
46D2000
trusted library allocation
page read and write
6F06000
trusted library allocation
page read and write
31E0000
heap
page read and write
500000
unkown
page readonly
3E71000
trusted library allocation
page read and write
46DB000
trusted library allocation
page read and write
6F32000
trusted library allocation
page read and write
3582000
heap
page read and write
9D4000
heap
page read and write
2E6F000
stack
page read and write
34AC000
trusted library allocation
page read and write
34A5000
trusted library allocation
page read and write
921000
unkown
page write copy
6E8F000
trusted library allocation
page read and write
7D4000
heap
page read and write
30B0000
trusted library allocation
page read and write
71AA000
trusted library allocation
page read and write
71A7000
trusted library allocation
page read and write
21E0000
heap
page read and write
8C6000
heap
page read and write
447E000
trusted library allocation
page read and write
71A2000
trusted library allocation
page read and write
3271000
heap
page read and write
8CA000
heap
page read and write
881000
heap
page read and write
8CA000
heap
page read and write
2624A7B6000
heap
page read and write
2624A6A0000
heap
page read and write
47E0000
heap
page read and write
6F06000
trusted library allocation
page read and write
9D4000
heap
page read and write
71AB000
trusted library allocation
page read and write
71A7000
trusted library allocation
page read and write
66A1000
heap
page read and write
3582000
heap
page read and write
30B0000
trusted library allocation
page read and write
1C10000
trusted library allocation
page read and write
6DA1000
trusted library allocation
page read and write
91D000
unkown
page write copy
26CA000
heap
page read and write
6E0A000
trusted library allocation
page read and write
3FC000
stack
page read and write
2624A7DA000
heap
page read and write
71A5000
trusted library allocation
page read and write
3CDA000
trusted library allocation
page read and write
9D4000
heap
page read and write
703D000
trusted library allocation
page read and write
4F6F000
stack
page read and write
3E71000
trusted library allocation
page read and write
3E71000
trusted library allocation
page read and write
913000
unkown
page readonly
7272000
trusted library allocation
page read and write
E9E000
stack
page read and write
3271000
heap
page read and write
6F32000
trusted library allocation
page read and write
30BB000
trusted library allocation
page read and write
34A2000
trusted library allocation
page read and write
726F000
trusted library allocation
page read and write
46D1000
trusted library allocation
page read and write
ADD000
unkown
page readonly
6E5D4FE000
stack
page read and write
3F42000
trusted library allocation
page read and write
770000
heap
page read and write
4001000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
447C000
trusted library allocation
page read and write
43F0000
heap
page read and write
881000
heap
page read and write
1C10000
trusted library allocation
page read and write
9D4000
heap
page read and write
3271000
heap
page read and write
4475000
trusted library allocation
page read and write
2624A7A9000
heap
page read and write
9D4000
heap
page read and write
71AE000
trusted library allocation
page read and write
3582000
heap
page read and write
30B7000
trusted library allocation
page read and write
46DD000
trusted library allocation
page read and write
6E5D1FF000
stack
page read and write
3E71000
trusted library allocation
page read and write
8A8000
heap
page read and write
409000
unkown
page readonly
98000
stack
page read and write
46DD000
trusted library allocation
page read and write
3E71000
trusted library allocation
page read and write
30B1000
trusted library allocation
page read and write
479E000
stack
page read and write
A3B000
heap
page read and write
6E4B000
trusted library allocation
page read and write
46D5000
trusted library allocation
page read and write
740000
heap
page read and write
34AE000
trusted library allocation
page read and write
3271000
heap
page read and write
3F2E000
trusted library allocation
page read and write
2624A9D5000
heap
page read and write
46D4000
trusted library allocation
page read and write
6DA1000
trusted library allocation
page read and write
9D4000
heap
page read and write
4478000
trusted library allocation
page read and write
6DA1000
trusted library allocation
page read and write
9D4000
heap
page read and write
3CA2000
trusted library allocation
page read and write
34AD000
trusted library allocation
page read and write
6E01000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
8A1000
heap
page read and write
34AA000
trusted library allocation
page read and write
8ED000
unkown
page readonly
34A4000
trusted library allocation
page read and write
7284000
trusted library allocation
page read and write
6E67000
trusted library allocation
page read and write
2B0F000
stack
page read and write
662000
heap
page read and write
3271000
heap
page read and write
3CCF000
trusted library allocation
page read and write
46D9000
trusted library allocation
page read and write
447C000
trusted library allocation
page read and write
46D5000
trusted library allocation
page read and write
6DA1000
trusted library allocation
page read and write
2624A9B0000
heap
page read and write
2624A7C6000
heap
page read and write
2624A7D4000
heap
page read and write
30BF000
trusted library allocation
page read and write
71A0000
trusted library allocation
page read and write
30BE000
trusted library allocation
page read and write
34AB000
trusted library allocation
page read and write
2624A880000
heap
page read and write
67A000
heap
page read and write
A41000
unkown
page execute read
734F000
trusted library allocation
page read and write
66A0000
heap
page read and write
3271000
heap
page read and write
71A6000
trusted library allocation
page read and write
7D4000
heap
page read and write
3CA2000
trusted library allocation
page read and write
3E9D000
trusted library allocation
page read and write
46D1000
trusted library allocation
page read and write
3F46000
trusted library allocation
page read and write
3E71000
trusted library allocation
page read and write
3F6C000
trusted library allocation
page read and write
7BE000
stack
page read and write
3E71000
trusted library allocation
page read and write
9D4000
heap
page read and write
34AD000
trusted library allocation
page read and write
9D0000
heap
page read and write
3180000
heap
page read and write
34A4000
trusted library allocation
page read and write
23E4000
heap
page read and write
6DA1000
trusted library allocation
page read and write
2640000
heap
page read and write
707C000
trusted library allocation
page read and write
3328000
heap
page read and write
313E000
stack
page read and write
8B0000
heap
page read and write
88B000
heap
page read and write
881000
heap
page read and write
7C6000
heap
page read and write
870000
heap
page read and write
71AD000
trusted library allocation
page read and write
2624A7DB000
heap
page read and write
3581000
heap
page read and write
71A8000
trusted library allocation
page read and write
298F000
stack
page read and write
6DA1000
trusted library allocation
page read and write
8CA000
heap
page read and write
46D7000
trusted library allocation
page read and write
6DA1000
trusted library allocation
page read and write
30BC000
trusted library allocation
page read and write
89D000
heap
page read and write
8A8000
heap
page read and write
30BA000
trusted library allocation
page read and write
87D000
heap
page read and write
46D1000
trusted library allocation
page read and write
46D6000
trusted library allocation
page read and write
475F000
stack
page read and write
30B1000
trusted library allocation
page read and write
71AC000
trusted library allocation
page read and write
A40000
unkown
page readonly
71AA000
trusted library allocation
page read and write
88B000
heap
page read and write
30B8000
trusted library allocation
page read and write
686000
heap
page read and write
71A9000
trusted library allocation
page read and write
3761000
heap
page read and write
6E5D0FF000
stack
page read and write
6E5CEFF000
stack
page read and write
3582000
heap
page read and write
850000
heap
page read and write
3CDE000
trusted library allocation
page read and write
46D4000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
34AB000
trusted library allocation
page read and write
34AB000
trusted library allocation
page read and write
9D5000
heap
page read and write
B11000
unkown
page write copy
6E8E000
trusted library allocation
page read and write
2B50000
heap
page read and write
1C10000
trusted library allocation
page read and write
71A1000
trusted library allocation
page read and write
9D4000
heap
page read and write
88B000
heap
page read and write
87C000
heap
page read and write
6DA1000
trusted library allocation
page read and write
4FB0000
heap
page read and write
2624A7EE000
heap
page read and write
9D4000
heap
page read and write
30B9000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
7D4000
heap
page read and write
34A7000
trusted library allocation
page read and write
30BD000
trusted library allocation
page read and write
3CD3000
trusted library allocation
page read and write
88B000
heap
page read and write
3271000
heap
page read and write
3271000
heap
page read and write
46DF000
trusted library allocation
page read and write
4F80000
heap
page read and write
34A7000
trusted library allocation
page read and write
B0D000
unkown
page write copy
3E71000
trusted library allocation
page read and write
3F55000
trusted library allocation
page read and write
30B4000
trusted library allocation
page read and write
1C10000
trusted library allocation
page read and write
3582000
heap
page read and write
6DA1000
trusted library allocation
page read and write
71A4000
trusted library allocation
page read and write
9D5000
heap
page read and write
3271000
heap
page read and write
1C10000
trusted library allocation
page read and write
3031000
heap
page read and write
6DA1000
trusted library allocation
page read and write
1C10000
trusted library allocation
page read and write
6F06000
trusted library allocation
page read and write
6E78000
trusted library allocation
page read and write
4473000
trusted library allocation
page read and write
1155000
heap
page read and write
3E71000
trusted library allocation
page read and write
34AD000
trusted library allocation
page read and write
6ECA000
trusted library allocation
page read and write
9D4000
heap
page read and write
3582000
heap
page read and write
2624A7CE000
heap
page read and write
3271000
heap
page read and write
71A2000
trusted library allocation
page read and write
6E0B000
trusted library allocation
page read and write
30B6000
trusted library allocation
page read and write
3F1F000
trusted library allocation
page read and write
3582000
heap
page read and write
317E000
stack
page read and write
401000
unkown
page execute read
590000
heap
page read and write
6DA1000
trusted library allocation
page read and write
46D3000
trusted library allocation
page read and write
6DA1000
trusted library allocation
page read and write
447E000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
734F000
trusted library allocation
page read and write
86E000
heap
page read and write
881000
heap
page read and write
30BC000
trusted library allocation
page read and write
34A2000
trusted library allocation
page read and write
3271000
heap
page read and write
34A7000
trusted library allocation
page read and write
89B000
heap
page read and write
1C10000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
3F64000
trusted library allocation
page read and write
2FB0000
heap
page read and write
6DA1000
trusted library allocation
page read and write
3CA2000
trusted library allocation
page read and write
2290000
heap
page read and write
23E0000
heap
page read and write
447B000
trusted library allocation
page read and write
23DE000
stack
page read and write
2DCF000
stack
page read and write
6DA1000
trusted library allocation
page read and write
4C3000
unkown
page read and write
30BA000
trusted library allocation
page read and write
30BA000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
9D4000
heap
page read and write
3E71000
trusted library allocation
page read and write
46D2000
trusted library allocation
page read and write
46D2000
trusted library allocation
page read and write
434000
unkown
page read and write
3FC000
stack
page read and write
3271000
heap
page read and write
71AF000
trusted library allocation
page read and write
2624A7DD000
heap
page read and write
46DA000
trusted library allocation
page read and write
2624A7BF000
heap
page read and write
71A3000
trusted library allocation
page read and write
3271000
heap
page read and write
2295000
heap
page read and write
92E000
stack
page read and write
6E66000
trusted library allocation
page read and write
71A3000
trusted library allocation
page read and write
4473000
trusted library allocation
page read and write
34AA000
trusted library allocation
page read and write
46D3000
trusted library allocation
page read and write
71AE000
trusted library allocation
page read and write
3EB1000
trusted library allocation
page read and write
BA0000
heap
page read and write
2AA0000
heap
page read and write
6E67000
trusted library allocation
page read and write
30B3000
trusted library allocation
page read and write
2624A7EE000
heap
page read and write
3E71000
trusted library allocation
page read and write
6F08000
trusted library allocation
page read and write
628000
heap
page read and write
1C10000
trusted library allocation
page read and write
3D21000
trusted library allocation
page read and write
3E71000
trusted library allocation
page read and write
46D2000
trusted library allocation
page read and write
228E000
stack
page read and write
3271000
heap
page read and write
2624A7A8000
heap
page read and write
46D6000
trusted library allocation
page read and write
2624A7B6000
heap
page read and write
2624A7D4000
heap
page read and write
6DA1000
trusted library allocation
page read and write
71A7000
trusted library allocation
page read and write
3E71000
trusted library allocation
page read and write
3F38000
trusted library allocation
page read and write
6E5D5FE000
stack
page read and write
2D8E000
stack
page read and write
46D1000
trusted library allocation
page read and write
9D4000
heap
page read and write
34A0000
trusted library allocation
page read and write
6EA9000
trusted library allocation
page read and write
2624A9D0000
heap
page read and write
600000
heap
page read and write
71AB000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
3271000
heap
page read and write
30BE000
trusted library allocation
page read and write
2A0E000
stack
page read and write
30BF000
trusted library allocation
page read and write
34AD000
trusted library allocation
page read and write
3F78000
trusted library allocation
page read and write
727E000
trusted library allocation
page read and write
34A4000
trusted library allocation
page read and write
3F5A000
trusted library allocation
page read and write
34A2000
trusted library allocation
page read and write
71AA000
trusted library allocation
page read and write
405F000
trusted library allocation
page read and write
46DA000
trusted library allocation
page read and write
9D5000
heap
page read and write
727A000
trusted library allocation
page read and write
2624A7CF000
heap
page read and write
6E50000
trusted library allocation
page read and write
9CF000
stack
page read and write
9D5000
heap
page read and write
6F05000
trusted library allocation
page read and write
3F02000
trusted library allocation
page read and write
3271000
heap
page read and write
3581000
heap
page read and write
65B000
heap
page read and write
2B60000
heap
page read and write
34A0000
trusted library allocation
page read and write
2624A7A1000
heap
page read and write
34AA000
trusted library allocation
page read and write
2EAC000
stack
page read and write
7D4000
heap
page read and write
4051000
trusted library allocation
page read and write
A2F000
stack
page read and write
8C7000
heap
page read and write
3F50000
trusted library allocation
page read and write
7D4000
heap
page read and write
9D4000
heap
page read and write
30B5000
trusted library allocation
page read and write
71AD000
trusted library allocation
page read and write
34A7000
trusted library allocation
page read and write
6E1E000
trusted library allocation
page read and write
447E000
trusted library allocation
page read and write
34A2000
trusted library allocation
page read and write
3271000
heap
page read and write
409000
unkown
page readonly
6DA1000
trusted library allocation
page read and write
2C9C000
stack
page read and write
6A0000
heap
page read and write
30B0000
trusted library allocation
page read and write
2624A7BE000
heap
page read and write
34A3000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
8A4000
heap
page read and write
29CF000
unkown
page read and write
6DA1000
trusted library allocation
page read and write
E30000
heap
page read and write
47DF000
stack
page read and write
30BA000
trusted library allocation
page read and write
There are 776 hidden memdumps, click here to show them.