IOC Report
WiJVUxlOHs.exe

loading gif

Files

File Path
Type
Category
Malicious
WiJVUxlOHs.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files\Reference Assemblies\Microsoft\hVZrtkHODdjkrqRpmkkd.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Reference Assemblies\Microsoft\hVZrtkHODdjkrqRpmkkd.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Windows Media Player\hVZrtkHODdjkrqRpmkkd.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows NT\TableTextService\en-US\hVZrtkHODdjkrqRpmkkd.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows NT\hVZrtkHODdjkrqRpmkkd.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows Portable Devices\backgroundTaskHost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows Portable Devices\backgroundTaskHost.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Windows Sidebar\hVZrtkHODdjkrqRpmkkd.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Package Cache\{0025DD72-A959-45B5-A0A3-7EFEB15A8050}v14.36.32532\packages\hVZrtkHODdjkrqRpmkkd.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\hVZrtkHODdjkrqRpmkkd.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\spoolsv.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\spoolsv.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Printer Shortcuts\dllhost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Printer Shortcuts\dllhost.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\WiJVUxlOHs.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Windows\Fonts\hVZrtkHODdjkrqRpmkkd.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\{AC76BA86-1033-1033-7760-BC15014EA700}\hVZrtkHODdjkrqRpmkkd.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Provisioning\hVZrtkHODdjkrqRpmkkd.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Reference Assemblies\Microsoft\13a54417f66e9d
ASCII text, with no line terminators
dropped
C:\Program Files\Windows Media Player\13a54417f66e9d
ASCII text, with very long lines (440), with no line terminators
dropped
C:\Program Files\Windows Media Player\hVZrtkHODdjkrqRpmkkd.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows NT\13a54417f66e9d
ASCII text, with very long lines (628), with no line terminators
dropped
C:\Program Files\Windows NT\TableTextService\en-US\13a54417f66e9d
ASCII text, with no line terminators
dropped
C:\Program Files\Windows NT\TableTextService\en-US\hVZrtkHODdjkrqRpmkkd.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows NT\hVZrtkHODdjkrqRpmkkd.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Portable Devices\eddb19405b7ce1
ASCII text, with no line terminators
dropped
C:\Program Files\Windows Sidebar\13a54417f66e9d
ASCII text, with very long lines (617), with no line terminators
dropped
C:\Program Files\Windows Sidebar\hVZrtkHODdjkrqRpmkkd.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Package Cache\{0025DD72-A959-45B5-A0A3-7EFEB15A8050}v14.36.32532\packages\13a54417f66e9d
ASCII text, with very long lines (861), with no line terminators
dropped
C:\ProgramData\Package Cache\{0025DD72-A959-45B5-A0A3-7EFEB15A8050}v14.36.32532\packages\hVZrtkHODdjkrqRpmkkd.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Recovery\13a54417f66e9d
ASCII text, with no line terminators
dropped
C:\Recovery\f3b6ecef712a24
ASCII text, with very long lines (552), with no line terminators
dropped
C:\Recovery\hVZrtkHODdjkrqRpmkkd.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Printer Shortcuts\5940a34987c991
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\backgroundTaskHost.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\dllhost.exe.log
CSV text
dropped
C:\Windows\Fonts\13a54417f66e9d
ASCII text, with very long lines (789), with no line terminators
dropped
C:\Windows\Fonts\hVZrtkHODdjkrqRpmkkd.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\{AC76BA86-1033-1033-7760-BC15014EA700}\13a54417f66e9d
ASCII text, with very long lines (379), with no line terminators
dropped
C:\Windows\Installer\{AC76BA86-1033-1033-7760-BC15014EA700}\hVZrtkHODdjkrqRpmkkd.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Windows\Provisioning\13a54417f66e9d
ASCII text, with no line terminators
dropped
C:\Windows\Provisioning\hVZrtkHODdjkrqRpmkkd.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 33 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\WiJVUxlOHs.exe
"C:\Users\user\Desktop\WiJVUxlOHs.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Portable Devices\backgroundTaskHost.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\backgroundTaskHost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Portable Devices\backgroundTaskHost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "hVZrtkHODdjkrqRpmkkdh" /sc MINUTE /mo 8 /tr "'C:\Windows\Fonts\hVZrtkHODdjkrqRpmkkd.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "hVZrtkHODdjkrqRpmkkd" /sc ONLOGON /tr "'C:\Windows\Fonts\hVZrtkHODdjkrqRpmkkd.exe'" /rl HIGHEST /f
malicious
C:\Program Files\Windows Portable Devices\backgroundTaskHost.exe
"C:\Program Files\Windows Portable Devices\backgroundTaskHost.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "hVZrtkHODdjkrqRpmkkdh" /sc MINUTE /mo 9 /tr "'C:\Windows\Fonts\hVZrtkHODdjkrqRpmkkd.exe'" /rl HIGHEST /f
malicious
C:\Program Files\Windows Portable Devices\backgroundTaskHost.exe
"C:\Program Files\Windows Portable Devices\backgroundTaskHost.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "hVZrtkHODdjkrqRpmkkdh" /sc MINUTE /mo 6 /tr "'C:\Recovery\hVZrtkHODdjkrqRpmkkd.exe'" /f
malicious
C:\Windows\Fonts\hVZrtkHODdjkrqRpmkkd.exe
C:\Windows\Fonts\hVZrtkHODdjkrqRpmkkd.exe
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "hVZrtkHODdjkrqRpmkkd" /sc ONLOGON /tr "'C:\Recovery\hVZrtkHODdjkrqRpmkkd.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "hVZrtkHODdjkrqRpmkkdh" /sc MINUTE /mo 13 /tr "'C:\Recovery\hVZrtkHODdjkrqRpmkkd.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "hVZrtkHODdjkrqRpmkkdh" /sc MINUTE /mo 11 /tr "'C:\Windows\Provisioning\hVZrtkHODdjkrqRpmkkd.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "hVZrtkHODdjkrqRpmkkd" /sc ONLOGON /tr "'C:\Windows\Provisioning\hVZrtkHODdjkrqRpmkkd.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "hVZrtkHODdjkrqRpmkkdh" /sc MINUTE /mo 8 /tr "'C:\Windows\Provisioning\hVZrtkHODdjkrqRpmkkd.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "hVZrtkHODdjkrqRpmkkdh" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows NT\TableTextService\en-US\hVZrtkHODdjkrqRpmkkd.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "hVZrtkHODdjkrqRpmkkd" /sc ONLOGON /tr "'C:\Program Files\Windows NT\TableTextService\en-US\hVZrtkHODdjkrqRpmkkd.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "hVZrtkHODdjkrqRpmkkdh" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows NT\TableTextService\en-US\hVZrtkHODdjkrqRpmkkd.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Users\Default\PrintHood\dllhost.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Default\PrintHood\dllhost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Users\Default\PrintHood\dllhost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "hVZrtkHODdjkrqRpmkkdh" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows NT\hVZrtkHODdjkrqRpmkkd.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "hVZrtkHODdjkrqRpmkkd" /sc ONLOGON /tr "'C:\Program Files\Windows NT\hVZrtkHODdjkrqRpmkkd.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "hVZrtkHODdjkrqRpmkkdh" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows NT\hVZrtkHODdjkrqRpmkkd.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "hVZrtkHODdjkrqRpmkkdh" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Media Player\hVZrtkHODdjkrqRpmkkd.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "hVZrtkHODdjkrqRpmkkd" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\hVZrtkHODdjkrqRpmkkd.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "hVZrtkHODdjkrqRpmkkdh" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Media Player\hVZrtkHODdjkrqRpmkkd.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "hVZrtkHODdjkrqRpmkkdh" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\Package Cache\{0025DD72-A959-45B5-A0A3-7EFEB15A8050}v14.36.32532\packages\hVZrtkHODdjkrqRpmkkd.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "hVZrtkHODdjkrqRpmkkd" /sc ONLOGON /tr "'C:\Users\All Users\Package Cache\{0025DD72-A959-45B5-A0A3-7EFEB15A8050}v14.36.32532\packages\hVZrtkHODdjkrqRpmkkd.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "hVZrtkHODdjkrqRpmkkdh" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Package Cache\{0025DD72-A959-45B5-A0A3-7EFEB15A8050}v14.36.32532\packages\hVZrtkHODdjkrqRpmkkd.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Recovery\spoolsv.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\spoolsv.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Recovery\spoolsv.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "hVZrtkHODdjkrqRpmkkdh" /sc MINUTE /mo 12 /tr "'C:\Windows\Installer\{AC76BA86-1033-1033-7760-BC15014EA700}\hVZrtkHODdjkrqRpmkkd.exe'" /f
malicious
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Printer Shortcuts\dllhost.exe
C:\Users\Default\PrintHood\dllhost.exe
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "hVZrtkHODdjkrqRpmkkd" /sc ONLOGON /tr "'C:\Windows\Installer\{AC76BA86-1033-1033-7760-BC15014EA700}\hVZrtkHODdjkrqRpmkkd.exe'" /rl HIGHEST /f
malicious
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Printer Shortcuts\dllhost.exe
C:\Users\Default\PrintHood\dllhost.exe
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "hVZrtkHODdjkrqRpmkkdh" /sc MINUTE /mo 11 /tr "'C:\Windows\Installer\{AC76BA86-1033-1033-7760-BC15014EA700}\hVZrtkHODdjkrqRpmkkd.exe'" /rl HIGHEST /f
malicious
C:\Windows\Installer\{AC76BA86-1033-1033-7760-BC15014EA700}\hVZrtkHODdjkrqRpmkkd.exe
C:\Windows\Installer\{AC76BA86-1033-1033-7760-BC15014EA700}\hVZrtkHODdjkrqRpmkkd.exe
malicious
There are 30 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\e2090904578e07786fe1690fea28168af64e4c9c
edf35b04f27bd8b08b57f5a78fd52874b579ece1

Memdumps

Base Address
Regiontype
Protect
Malicious
2CBF000
trusted library allocation
page read and write
malicious
2AE1000
trusted library allocation
page read and write
malicious
32F1000
trusted library allocation
page read and write
malicious
2C71000
trusted library allocation
page read and write
malicious
2551000
trusted library allocation
page read and write
malicious
25E1000
trusted library allocation
page read and write
malicious
2C81000
trusted library allocation
page read and write
malicious
296D000
trusted library allocation
page read and write
malicious
2B21000
trusted library allocation
page read and write
malicious
2620000
trusted library allocation
page read and write
malicious
2591000
trusted library allocation
page read and write
malicious
1255F000
trusted library allocation
page read and write
malicious
132F1000
trusted library allocation
page read and write
180000
unkown
page readonly
7FFD9B79D000
trusted library allocation
page execute and read and write
2896000
trusted library allocation
page read and write
765000
heap
page read and write
1B0CE000
stack
page read and write
7CC000
heap
page read and write
9B0000
heap
page read and write
2AAE000
stack
page read and write
1B86E000
stack
page read and write
15CB000
heap
page read and write
1B964000
stack
page read and write
7FFD9B753000
trusted library allocation
page execute and read and write
1B943000
heap
page read and write
10F0000
heap
page read and write
1B87D000
stack
page read and write
770000
heap
page read and write
690000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
EF0000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
33A6000
trusted library allocation
page read and write
105A000
heap
page read and write
1140000
heap
page read and write
14F6000
stack
page read and write
1B514000
heap
page read and write
1AFB0000
trusted library section
page read and write
1265A000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
132F3000
trusted library allocation
page read and write
1AADD000
stack
page read and write
71F000
heap
page read and write
1BD63000
stack
page read and write
1AFAE000
stack
page read and write
1150000
heap
page read and write
1BA77000
heap
page read and write
12AE1000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
12AF1000
trusted library allocation
page read and write
1BA8F000
heap
page read and write
955000
heap
page read and write
1B814000
heap
page read and write
1B87D000
heap
page read and write
1B865000
heap
page read and write
10EA000
heap
page read and write
1BC90000
heap
page execute and read and write
7FFD9B7BD000
trusted library allocation
page execute and read and write
1B8B0000
heap
page read and write
33B2000
trusted library allocation
page read and write
1BB2C000
heap
page read and write
1BC6E000
stack
page read and write
12AE3000
trusted library allocation
page read and write
1BC6E000
stack
page read and write
12558000
trusted library allocation
page read and write
1B9FD000
heap
page read and write
7FFD9B94B000
trusted library allocation
page read and write
1B593000
heap
page read and write
7FFD9B836000
trusted library allocation
page read and write
1B511000
heap
page read and write
2430000
heap
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
1B986000
heap
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
12E5000
heap
page read and write
7FFD9B93E000
trusted library allocation
page read and write
7FFD9B767000
trusted library allocation
page read and write
1602000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
8B0000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page execute and read and write
291B000
trusted library allocation
page read and write
1BB47000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
2D27000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
7C9000
heap
page read and write
6F6000
stack
page read and write
1BB26000
heap
page read and write
1BA4D000
heap
page read and write
1B660000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
13301000
trusted library allocation
page read and write
1020000
heap
page read and write
D8C000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
EF5000
heap
page read and write
843000
heap
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
1B1FE000
stack
page read and write
950000
heap
page read and write
665000
heap
page read and write
7FFD9B941000
trusted library allocation
page read and write
F20000
heap
page read and write
7FFD9B76C000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
1AFEE000
stack
page read and write
15A0000
heap
page read and write
26A1000
trusted library allocation
page read and write
11B0000
heap
page read and write
BF0000
heap
page read and write
10EF000
heap
page read and write
7FFD9B93C000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page read and write
7FFD9B7A3000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
1BD90000
heap
page read and write
CF6000
stack
page read and write
1260A000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
1B59B000
heap
page read and write
7FFD9B792000
trusted library allocation
page read and write
1AE4E000
stack
page read and write
FE0000
heap
page read and write
1B8A8000
heap
page read and write
6B0000
heap
page read and write
1BA7E000
stack
page read and write
7FFD9B806000
trusted library allocation
page read and write
1B5FF000
stack
page read and write
1B800000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
775000
heap
page read and write
1020000
heap
page read and write
23B0000
heap
page read and write
1AFC0000
heap
page read and write
11EE000
stack
page read and write
12591000
trusted library allocation
page read and write
1B63F000
stack
page read and write
33A9000
trusted library allocation
page read and write
28D1000
trusted library allocation
page read and write
7FFD9B8B1000
trusted library allocation
page execute and read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
7FFD9B763000
trusted library allocation
page read and write
125F1000
trusted library allocation
page read and write
7FFD9B947000
trusted library allocation
page read and write
82A000
heap
page read and write
7FFD9B7AC000
trusted library allocation
page execute and read and write
DCE000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
7FFD9B77C000
trusted library allocation
page read and write
7FFD9B906000
trusted library allocation
page read and write
2C70000
heap
page read and write
1BAD9000
heap
page read and write
12C88000
trusted library allocation
page read and write
F20000
trusted library allocation
page read and write
7FFD9B8C1000
trusted library allocation
page execute and read and write
1B2EE000
stack
page read and write
1B52F000
heap
page read and write
33A3000
trusted library allocation
page read and write
1566000
heap
page read and write
12C81000
trusted library allocation
page read and write
1B3EE000
stack
page read and write
7FFD9B770000
trusted library allocation
page read and write
1B4C0000
heap
page read and write
1100000
heap
page read and write
1B8DC000
heap
page read and write
2D23000
trusted library allocation
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
7FFD9B846000
trusted library allocation
page read and write
F00000
heap
page read and write
1BA23000
heap
page read and write
1B818000
heap
page read and write
1BAE3000
heap
page read and write
840000
heap
page read and write
FFC000
heap
page read and write
7B0000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
806000
heap
page read and write
2BBE000
stack
page read and write
1105000
heap
page read and write
1C09F000
stack
page read and write
125ED000
trusted library allocation
page read and write
2727000
trusted library allocation
page read and write
1B9A9000
heap
page read and write
125E3000
trusted library allocation
page read and write
3F6000
stack
page read and write
7FFD9B903000
trusted library allocation
page read and write
1B841000
heap
page read and write
12A3B000
trusted library allocation
page read and write
1B899000
heap
page read and write
7FFD9B8FE000
trusted library allocation
page read and write
1595000
heap
page read and write
1AF1F000
stack
page read and write
F75000
heap
page read and write
1BB01000
heap
page read and write
1BA64000
stack
page read and write
1B06D000
stack
page read and write
11F0000
trusted library allocation
page read and write
1AF80000
trusted library section
page read and write
630000
heap
page read and write
D87000
heap
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
832000
heap
page read and write
10AD000
heap
page read and write
2540000
heap
page execute and read and write
7FFD9B7A4000
trusted library allocation
page read and write
7C7000
heap
page read and write
760000
heap
page read and write
1B2F3000
stack
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
7FF4016F0000
trusted library allocation
page execute and read and write
1BAC7000
heap
page read and write
789000
heap
page read and write
D3B000
heap
page read and write
D29000
heap
page read and write
12598000
trusted library allocation
page read and write
803000
heap
page read and write
BF0000
heap
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
7FFD9B968000
trusted library allocation
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
1BA63000
stack
page read and write
1B874000
stack
page read and write
1980000
heap
page read and write
250E000
stack
page read and write
7FFD9B806000
trusted library allocation
page read and write
7FFD9B793000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9B8FC000
trusted library allocation
page read and write
7FFD9B7A4000
trusted library allocation
page read and write
1B936000
heap
page read and write
12C73000
trusted library allocation
page read and write
1AB6D000
stack
page read and write
1086000
heap
page read and write
7FFD9B850000
trusted library allocation
page execute and read and write
7FFD9B866000
trusted library allocation
page execute and read and write
7FFD9B762000
trusted library allocation
page read and write
1B96E000
stack
page read and write
156C000
heap
page read and write
105C000
heap
page read and write
15CD000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
2606000
trusted library allocation
page read and write
1A5C0000
trusted library allocation
page read and write
1BD70000
heap
page read and write
1B8C6000
heap
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
7FFD9B754000
trusted library allocation
page read and write
7FFD9B92E000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
12E0000
heap
page read and write
1B77F000
stack
page read and write
7FFD9B80C000
trusted library allocation
page execute and read and write
32EE000
stack
page read and write
891000
heap
page read and write
7FFD9B846000
trusted library allocation
page read and write
6F2000
heap
page read and write
77B000
heap
page read and write
1B82B000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
12CEA000
trusted library allocation
page read and write
1B86F000
stack
page read and write
7FFD9B767000
trusted library allocation
page read and write
7FFD9B913000
trusted library allocation
page read and write
276A000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
D00000
heap
page read and write
7FFD9B7BB000
trusted library allocation
page execute and read and write
1C1FE000
stack
page read and write
7FFD9B777000
trusted library allocation
page read and write
1B9B6000
heap
page read and write
5F0000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
27F4000
trusted library allocation
page read and write
7FFD9B943000
trusted library allocation
page read and write
1C293000
stack
page read and write
14A0000
heap
page read and write
7FFD9B797000
trusted library allocation
page read and write
1B920000
heap
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
7FFD9B836000
trusted library allocation
page execute and read and write
26E4000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
7FFD9B7AB000
trusted library allocation
page execute and read and write
800000
heap
page read and write
9A0000
trusted library allocation
page read and write
33AC000
trusted library allocation
page read and write
D5C000
heap
page read and write
79F000
heap
page read and write
7FFD9B76C000
trusted library allocation
page read and write
B70000
heap
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
7FFD9B8C4000
trusted library allocation
page execute and read and write
26AC000
trusted library allocation
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
2D39000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
1B67E000
stack
page read and write
125A1000
trusted library allocation
page read and write
800000
heap
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
510000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
D48000
heap
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
7FFD9B946000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
7FFD9B8FC000
trusted library allocation
page read and write
1B5BA000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
AFE000
stack
page read and write
1080000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page execute and read and write
7FFD9B930000
trusted library allocation
page read and write
1BAAD000
heap
page read and write
7FFD9B7B4000
trusted library allocation
page read and write
1B526000
heap
page read and write
1B30F000
stack
page read and write
1AB10000
trusted library allocation
page read and write
12CFA000
trusted library allocation
page read and write
630000
heap
page read and write
1BA81000
heap
page read and write
102F000
heap
page read and write
750000
heap
page read and write
107F000
stack
page read and write
BBF000
stack
page read and write
7FFD9B752000
trusted library allocation
page read and write
2C6E000
stack
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
7FFD9B8BA000
trusted library allocation
page execute and read and write
2851000
trusted library allocation
page read and write
1B9C7000
heap
page read and write
1B3FE000
stack
page read and write
D45000
heap
page read and write
1B570000
heap
page read and write
1B0EE000
stack
page read and write
2D33000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
1ACA0000
trusted library allocation
page read and write
7FFD9B92A000
trusted library allocation
page read and write
1C49E000
stack
page read and write
1259D000
trusted library allocation
page read and write
293C000
trusted library allocation
page read and write
7FFD9B90C000
trusted library allocation
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
2704000
trusted library allocation
page read and write
7FFD9B991000
trusted library allocation
page read and write
950000
heap
page read and write
1B0CE000
stack
page read and write
1C194000
stack
page read and write
7FFD9B930000
trusted library allocation
page read and write
1040000
trusted library allocation
page read and write
7FFD9B7AB000
trusted library allocation
page execute and read and write
ED0000
heap
page read and write
1B4FE000
stack
page read and write
192F000
stack
page read and write
D5E000
heap
page read and write
730000
heap
page read and write
7FFD9B7A7000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
7FFD9B901000
trusted library allocation
page read and write
B60000
heap
page read and write
12AED000
trusted library allocation
page read and write
101E000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
EF6000
stack
page read and write
1C0FE000
stack
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
7FFD9B7AC000
trusted library allocation
page execute and read and write
7FFD9B816000
trusted library allocation
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
1B76F000
stack
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
1BB7E000
stack
page read and write
FD0000
trusted library allocation
page read and write
7FFD9B782000
trusted library allocation
page read and write
7D0000
trusted library allocation
page read and write
78B000
heap
page read and write
2627000
trusted library allocation
page read and write
25F2000
trusted library allocation
page read and write
180000
unkown
page readonly
D4B000
heap
page read and write
1C2FB000
stack
page read and write
7FFD9B7B4000
trusted library allocation
page read and write
768000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
7FFD9B75D000
trusted library allocation
page execute and read and write
125E8000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
FF6000
heap
page read and write
7FFD9B92C000
trusted library allocation
page read and write
8AF000
stack
page read and write
3338000
trusted library allocation
page read and write
9B0000
heap
page read and write
BB0000
heap
page read and write
1B4E0000
heap
page execute and read and write
1BAD1000
heap
page read and write
1BB16000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
132F8000
trusted library allocation
page read and write
7FFD9B750000
trusted library allocation
page read and write
1190000
heap
page read and write
710000
heap
page read and write
2AC000
unkown
page readonly
1B1FD000
stack
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B87A000
trusted library allocation
page execute and read and write
1AEE0000
heap
page read and write
1BB42000
heap
page read and write
7FFD9B793000
trusted library allocation
page read and write
1BAFB000
heap
page read and write
7FFD9B91B000
trusted library allocation
page read and write
112B000
heap
page read and write
730000
heap
page read and write
7FFD9B7AC000
trusted library allocation
page read and write
7FFD9B77B000
trusted library allocation
page execute and read and write
71A000
heap
page read and write
FF0000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
660000
heap
page read and write
10EC000
heap
page read and write
7FFD9B754000
trusted library allocation
page read and write
1608000
heap
page read and write
1BF9E000
stack
page read and write
6D9000
heap
page read and write
1B55D000
heap
page read and write
4F6000
stack
page read and write
7FFD9B92C000
trusted library allocation
page read and write
7FFD9B79C000
trusted library allocation
page read and write
1AF5E000
stack
page read and write
182F000
stack
page read and write
1510000
trusted library allocation
page read and write
12593000
trusted library allocation
page read and write
7FFD9B94B000
trusted library allocation
page read and write
1B1E3000
stack
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
C60000
heap
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
115D000
heap
page read and write
25D0000
heap
page execute and read and write
7FFD9B910000
trusted library allocation
page read and write
12C78000
trusted library allocation
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
1BAA6000
heap
page read and write
81F000
heap
page read and write
2CB8000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
1031000
heap
page read and write
10BF000
heap
page read and write
19A0000
heap
page read and write
6EF000
heap
page read and write
1B8C0000
heap
page read and write
2724000
trusted library allocation
page read and write
ABF000
stack
page read and write
132FD000
trusted library allocation
page read and write
1AF60000
trusted library section
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
7FFD9B763000
trusted library allocation
page read and write
2AD0000
heap
page execute and read and write
610000
heap
page read and write
10C1000
heap
page read and write
1B7FD000
stack
page read and write
7FFD9B920000
trusted library allocation
page read and write
1ACB0000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
C15000
heap
page read and write
1BA6D000
heap
page read and write
88B000
heap
page read and write
1AFA0000
trusted library section
page read and write
22FF000
stack
page read and write
31E0000
heap
page execute and read and write
7FFD9B8AA000
trusted library allocation
page execute and read and write
7FFD9B943000
trusted library allocation
page read and write
12C7D000
trusted library allocation
page read and write
7FFD9B75D000
trusted library allocation
page execute and read and write
F40000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
F70000
trusted library allocation
page read and write
7FFD9B97D000
trusted library allocation
page read and write
9C0000
heap
page read and write
1B4D3000
heap
page read and write
7FFD9B884000
trusted library allocation
page execute and read and write
BFE000
stack
page read and write
7FFD9B980000
trusted library allocation
page read and write
268F000
trusted library allocation
page read and write
7FFD9B93A000
trusted library allocation
page read and write
298F000
trusted library allocation
page read and write
1B503000
heap
page read and write
7FFD9B79C000
trusted library allocation
page read and write
1B5AA000
heap
page read and write
1BE9E000
stack
page read and write
2695000
trusted library allocation
page read and write
1B96A000
heap
page read and write
7FFD9B913000
trusted library allocation
page read and write
10B4000
heap
page read and write
1B3B4000
stack
page read and write
6DD000
heap
page read and write
12672000
trusted library allocation
page read and write
1B20C000
stack
page read and write
15D0000
heap
page read and write
7FFD9B7A3000
trusted library allocation
page read and write
7FFD9B953000
trusted library allocation
page read and write
1255D000
trusted library allocation
page read and write
253E000
stack
page read and write
105F000
heap
page read and write
1B4B3000
stack
page read and write
1B555000
heap
page read and write
9FE000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
740000
heap
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
1AFC0000
heap
page read and write
12C83000
trusted library allocation
page read and write
1BA44000
heap
page read and write
B90000
heap
page read and write
12C8D000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page read and write
7FFD9B971000
trusted library allocation
page read and write
125E1000
trusted library allocation
page read and write
2B0000
unkown
page readonly
7FFD9B940000
trusted library allocation
page read and write
FC0000
heap
page execute and read and write
101A000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
C10000
heap
page read and write
2692000
trusted library allocation
page read and write
C65000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
120F000
stack
page read and write
7FFD9B923000
trusted library allocation
page read and write
1B320000
trusted library allocation
page read and write
6B6000
heap
page read and write
785000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
2625000
trusted library allocation
page read and write
19A5000
heap
page read and write
2748000
trusted library allocation
page read and write
108C000
heap
page read and write
79C000
heap
page read and write
930000
heap
page execute and read and write
1180000
heap
page read and write
7FFD9B953000
trusted library allocation
page read and write
7FFD9B786000
trusted library allocation
page read and write
1B903000
heap
page read and write
12C71000
trusted library allocation
page read and write
1B984000
heap
page read and write
1C39E000
stack
page read and write
7FFD9B90B000
trusted library allocation
page read and write
1B1B0000
heap
page execute and read and write
7FFD9B820000
trusted library allocation
page execute and read and write
33AF000
trusted library allocation
page read and write
FD0000
trusted library allocation
page read and write
7FFD9B93C000
trusted library allocation
page read and write
12551000
trusted library allocation
page read and write
86B000
heap
page read and write
D20000
heap
page read and write
D89000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
7FFD9B7AC000
trusted library allocation
page read and write
C10000
trusted library allocation
page read and write
871000
heap
page read and write
D50000
heap
page read and write
3336000
trusted library allocation
page read and write
F70000
heap
page read and write
6DF000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page execute and read and write
1B4AF000
stack
page read and write
1B538000
heap
page read and write
1540000
trusted library allocation
page read and write
13C5000
heap
page read and write
1BB19000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
F90000
trusted library allocation
page read and write
1BA00000
heap
page read and write
12B5A000
trusted library allocation
page read and write
15A2000
heap
page read and write
7FFD9B936000
trusted library allocation
page read and write
1380000
heap
page execute and read and write
268C000
trusted library allocation
page read and write
12EF000
stack
page read and write
1BA38000
heap
page read and write
7FFD9B753000
trusted library allocation
page execute and read and write
7FFD9B840000
trusted library allocation
page execute and read and write
1099000
heap
page read and write
1B996000
heap
page read and write
6B9000
heap
page read and write
7FFD9B7A7000
trusted library allocation
page read and write
1000000
heap
page execute and read and write
1B5A3000
heap
page read and write
14A5000
heap
page read and write
77E000
heap
page read and write
1B56F000
heap
page read and write
1B74E000
stack
page read and write
9E0000
heap
page read and write
1185000
heap
page read and write
930000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page execute and read and write
1B973000
stack
page read and write
12C91000
trusted library allocation
page read and write
1B956000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B931000
trusted library allocation
page read and write
C00000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
2580000
heap
page execute and read and write
7FFD9B836000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
182000
unkown
page readonly
1B58F000
heap
page read and write
27B7000
trusted library allocation
page read and write
13C0000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
1B2BE000
stack
page read and write
BB6000
stack
page read and write
1B760000
heap
page execute and read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1096000
heap
page read and write
1080000
heap
page read and write
127F000
stack
page read and write
7FFD9B950000
trusted library allocation
page read and write
BD0000
trusted library allocation
page read and write
1B8AA000
heap
page read and write
7FFD9B9B2000
trusted library allocation
page read and write
1BB6E000
stack
page read and write
A5F000
stack
page read and write
7FFD9B780000
trusted library allocation
page read and write
12AE8000
trusted library allocation
page read and write
7FFD9B797000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
9B5000
heap
page read and write
1BA48000
heap
page read and write
1A580000
trusted library allocation
page read and write
1560000
heap
page read and write
1336A000
trusted library allocation
page read and write
7FFD9B923000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
1AA0D000
stack
page read and write
1B4EF000
stack
page read and write
12C81000
trusted library allocation
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
1BB6E000
stack
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
1024000
heap
page read and write
1A610000
trusted library allocation
page read and write
1B0F0000
heap
page execute and read and write
7FFD9B784000
trusted library allocation
page read and write
7FFD9B881000
trusted library allocation
page execute and read and write
There are 645 hidden memdumps, click here to show them.