IOC Report
QqHWdVqNBs.exe

loading gif

Files

File Path
Type
Category
Malicious
QqHWdVqNBs.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\LinkGuard Dynamics\r
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\369580\Origin.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\369580\Z
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Bdsm
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Convenience
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Dental
OpenPGP Public Key
dropped
malicious
C:\Users\user\AppData\Local\Temp\Falls
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Fight
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Fighting
data
modified
malicious
C:\Users\user\AppData\Local\Temp\Joke
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\June
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Mask
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Massachusetts
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Outreach
hp200 (68010) BSD
dropped
malicious
C:\Users\user\AppData\Local\Temp\Radius
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Severe
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Sig
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Stockings
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Vendor
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Alot
data
dropped
C:\Users\user\AppData\Local\Temp\Beginning
DOS executable (COM)
dropped
C:\Users\user\AppData\Local\Temp\Buck
data
dropped
C:\Users\user\AppData\Local\Temp\Chad
data
dropped
C:\Users\user\AppData\Local\Temp\Consecutive
data
dropped
C:\Users\user\AppData\Local\Temp\Creator
data
dropped
C:\Users\user\AppData\Local\Temp\Cruises
data
dropped
C:\Users\user\AppData\Local\Temp\Double
data
dropped
C:\Users\user\AppData\Local\Temp\Emotions
ASCII text, with very long lines (1341), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Emotions.cmd
ASCII text, with very long lines (1341), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Favourite
data
dropped
C:\Users\user\AppData\Local\Temp\Genre
data
dropped
C:\Users\user\AppData\Local\Temp\Hay
data
dropped
C:\Users\user\AppData\Local\Temp\Instance
data
dropped
C:\Users\user\AppData\Local\Temp\Kde
data
dropped
C:\Users\user\AppData\Local\Temp\Lcd
data
dropped
C:\Users\user\AppData\Local\Temp\Older
data
dropped
C:\Users\user\AppData\Local\Temp\Opposition
data
dropped
C:\Users\user\AppData\Local\Temp\Participants
data
dropped
C:\Users\user\AppData\Local\Temp\Portraits
data
dropped
C:\Users\user\AppData\Local\Temp\Quebec
data
dropped
C:\Users\user\AppData\Local\Temp\Race
data
dropped
C:\Users\user\AppData\Local\Temp\Referring
data
dropped
C:\Users\user\AppData\Local\Temp\Richmond
data
dropped
C:\Users\user\AppData\Local\Temp\Seek
data
dropped
C:\Users\user\AppData\Local\Temp\Sn
data
dropped
C:\Users\user\AppData\Local\Temp\Studios
data
dropped
C:\Users\user\AppData\Local\Temp\Tags
data
dropped
C:\Users\user\AppData\Local\Temp\Thereof
Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0
dropped
C:\Users\user\AppData\Local\Temp\Things
data
dropped
C:\Users\user\AppData\Local\Temp\Tokyo
data
dropped
C:\Users\user\AppData\Local\Temp\Violence
data
dropped
There are 44 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\QqHWdVqNBs.exe
"C:\Users\user\Desktop\QqHWdVqNBs.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k copy Emotions Emotions.cmd & Emotions.cmd & exit
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa.exe opssvc.exe"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 369580
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "MaskBathroomsCompoundInjection" Participants
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b Massachusetts + Radius + Dental + Vendor + Fighting + June + Stockings + Convenience + Falls + Joke + Mask + Severe + Outreach + Sig + Bdsm 369580\Z
malicious
C:\Users\user\AppData\Local\Temp\369580\Origin.pif
369580\Origin.pif 369580\Z
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST
malicious
C:\Windows\System32\wscript.exe
C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js"
malicious
C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif
"C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif" "C:\Users\user\AppData\Local\LinkGuard Dynamics\r"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\timeout.exe
timeout 15
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.autoitscript.com/autoit3/J
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.autoitscript.com/autoit3/0
unknown

Domains

Name
IP
Malicious
jZFqZYoOtpryMyRHD.jZFqZYoOtpryMyRHD
unknown
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted

Memdumps

Base Address
Regiontype
Protect
Malicious
1BC4115E000
heap
page read and write
13F5000
heap
page read and write
AA4000
heap
page read and write
92F000
stack
page read and write
3814000
heap
page read and write
779000
heap
page read and write
289F000
heap
page read and write
AA4000
heap
page read and write
1BC41060000
heap
page read and write
76D000
heap
page read and write
63D000
heap
page read and write
1BC413DC000
heap
page read and write
1BC41111000
heap
page read and write
1351000
heap
page read and write
1A80000
heap
page read and write
4331000
heap
page read and write
55E000
stack
page read and write
779000
heap
page read and write
779000
heap
page read and write
37B0000
trusted library allocation
page read and write
76D000
heap
page read and write
3F72000
heap
page read and write
AA4000
heap
page read and write
2893000
heap
page read and write
36B0000
heap
page read and write
101F000
stack
page read and write
3DB4000
heap
page read and write
4331000
heap
page read and write
1BC413D5000
heap
page read and write
2A9C000
stack
page read and write
1318000
heap
page read and write
33D9000
trusted library allocation
page read and write
48DF000
stack
page read and write
3B61000
heap
page read and write
3D0E000
stack
page read and write
12E0000
heap
page read and write
379A000
heap
page read and write
600000
heap
page read and write
289B000
heap
page read and write
1390000
heap
page read and write
1BC410F0000
heap
page read and write
3B61000
heap
page read and write
45E0000
heap
page read and write
3824000
heap
page read and write
302E000
stack
page read and write
779000
heap
page read and write
2E6E000
heap
page read and write
1444000
heap
page read and write
1A40000
trusted library allocation
page read and write
4331000
heap
page read and write
1BC4111F000
heap
page read and write
461000
unkown
page read and write
779000
heap
page read and write
73A000
stack
page read and write
76D000
heap
page read and write
779000
heap
page read and write
3B61000
heap
page read and write
3B61000
heap
page read and write
553000
unkown
page write copy
44BF000
stack
page read and write
3B61000
heap
page read and write
76D000
heap
page read and write
37B0000
trusted library allocation
page read and write
1BC42FB0000
heap
page read and write
65E000
heap
page read and write
4331000
heap
page read and write
779000
heap
page read and write
3B61000
heap
page read and write
500000
heap
page read and write
1BC41148000
heap
page read and write
796000
heap
page read and write
2898000
heap
page read and write
779000
heap
page read and write
4331000
heap
page read and write
1458000
heap
page read and write
4331000
heap
page read and write
2E9E000
heap
page read and write
796000
heap
page read and write
4E3F000
stack
page read and write
2B20000
heap
page read and write
779000
heap
page read and write
7FFB23B25000
unkown
page readonly
779000
heap
page read and write
2890000
heap
page read and write
3825000
heap
page read and write
37B0000
trusted library allocation
page read and write
76D000
heap
page read and write
1BC4111E000
heap
page read and write
109D000
stack
page read and write
491000
unkown
page execute read
2890000
heap
page read and write
220E000
stack
page read and write
49DF000
stack
page read and write
54F000
unkown
page read and write
6B8000
heap
page read and write
5D0000
heap
page read and write
1A40000
trusted library allocation
page read and write
C93000
unkown
page write copy
3326000
trusted library allocation
page read and write
1BC41146000
heap
page read and write
3E7A000
heap
page read and write
4331000
heap
page read and write
42953FF000
stack
page read and write
7B9000
heap
page read and write
4331000
heap
page read and write
10C0000
heap
page read and write
3B61000
heap
page read and write
16BC000
heap
page read and write
1174000
heap
page read and write
4DDF000
stack
page read and write
37B0000
trusted library allocation
page read and write
4DFE000
stack
page read and write
2E94000
heap
page read and write
1428000
heap
page read and write
1158000
heap
page read and write
1A40000
trusted library allocation
page read and write
2FA6000
heap
page read and write
1BC41350000
heap
page read and write
1174000
heap
page read and write
9B000
stack
page read and write
289D000
heap
page read and write
796000
heap
page read and write
1BC4111A000
heap
page read and write
3FF6000
heap
page read and write
3E38000
heap
page read and write
3B61000
heap
page read and write
796000
heap
page read and write
490000
unkown
page readonly
3EBC000
heap
page read and write
779000
heap
page read and write
4D3F000
stack
page read and write
102E000
stack
page read and write
1225000
heap
page read and write
4331000
heap
page read and write
30D0000
heap
page read and write
4331000
heap
page read and write
401000
unkown
page execute read
1A40000
trusted library allocation
page read and write
7FFB23B20000
unkown
page read and write
7A0000
heap
page read and write
76D000
heap
page read and write
1BC41159000
heap
page read and write
64A000
heap
page read and write
37B0000
trusted library allocation
page read and write
2E7C000
heap
page read and write
37B0000
trusted library allocation
page read and write
62F000
heap
page read and write
3B61000
heap
page read and write
7B0000
heap
page read and write
76D000
heap
page read and write
62E000
heap
page read and write
2893000
heap
page read and write
C98000
unkown
page readonly
2E9E000
heap
page read and write
2898000
heap
page read and write
4294EFE000
stack
page read and write
1BC4114E000
heap
page read and write
1BC41154000
heap
page read and write
3D72000
heap
page read and write
4E40000
heap
page read and write
77E000
heap
page read and write
779000
heap
page read and write
C59000
stack
page read and write
4331000
heap
page read and write
1BC4111F000
heap
page read and write
AA4000
heap
page read and write
1175000
heap
page read and write
4330000
heap
page read and write
B80000
heap
page read and write
76D000
heap
page read and write
76D000
heap
page read and write
C8F000
unkown
page write copy
1353000
heap
page read and write
13EE000
heap
page read and write
37B0000
trusted library allocation
page read and write
1A40000
trusted library allocation
page read and write
37B0000
trusted library allocation
page read and write
3B61000
heap
page read and write
3810000
heap
page read and write
1164000
heap
page read and write
3410000
heap
page read and write
2895000
heap
page read and write
779000
heap
page read and write
4331000
heap
page read and write
37B0000
trusted library allocation
page read and write
45C000
stack
page read and write
309E000
stack
page read and write
22C0000
heap
page read and write
AA4000
heap
page read and write
4294FFF000
stack
page read and write
289B000
heap
page read and write
1174000
heap
page read and write
2FEE000
stack
page read and write
779000
heap
page read and write
779000
heap
page read and write
65E000
heap
page read and write
73E000
heap
page read and write
37B0000
trusted library allocation
page read and write
42951FF000
stack
page read and write
610000
heap
page read and write
77E000
heap
page read and write
3B61000
heap
page read and write
AA4000
heap
page read and write
76D000
heap
page read and write
1A40000
trusted library allocation
page read and write
1A7E000
stack
page read and write
459E000
trusted library allocation
page read and write
3B60000
heap
page read and write
130F000
heap
page read and write
2E99000
heap
page read and write
2898000
heap
page read and write
1148000
heap
page read and write
3B61000
heap
page read and write
4331000
heap
page read and write
3230000
heap
page read and write
1174000
heap
page read and write
4F0000
heap
page read and write
1BC410F8000
heap
page read and write
1FC000
stack
page read and write
2891000
heap
page read and write
3B61000
heap
page read and write
76D000
heap
page read and write
107F000
stack
page read and write
76D000
heap
page read and write
73D1F000
unkown
page readonly
2E93000
heap
page read and write
1175000
heap
page read and write
2899000
heap
page read and write
76D000
heap
page read and write
618000
heap
page read and write
AA0000
heap
page read and write
3B61000
heap
page read and write
779000
heap
page read and write
730000
heap
page read and write
1BC4111F000
heap
page read and write
45BF000
stack
page read and write
3B61000
heap
page read and write
49D000
stack
page read and write
2E8B000
heap
page read and write
54F000
unkown
page write copy
779000
heap
page read and write
76D000
heap
page read and write
2895000
heap
page read and write
1174000
heap
page read and write
C85000
unkown
page readonly
1A40000
trusted library allocation
page read and write
779000
heap
page read and write
1256000
heap
page read and write
4331000
heap
page read and write
1BC41050000
heap
page read and write
1A40000
trusted library allocation
page read and write
4331000
heap
page read and write
37B0000
trusted library allocation
page read and write
289B000
heap
page read and write
4331000
heap
page read and write
1170000
heap
page read and write
2F8F000
stack
page read and write
1BC41080000
heap
page read and write
4EE000
stack
page read and write
2897000
heap
page read and write
3B61000
heap
page read and write
1BC41148000
heap
page read and write
2896000
heap
page read and write
7FFB23B01000
unkown
page execute read
3F2C000
heap
page read and write
1BC4113D000
heap
page read and write
4F0000
heap
page read and write
76D000
heap
page read and write
289D000
heap
page read and write
76D000
heap
page read and write
76D000
heap
page read and write
3B61000
heap
page read and write
796000
heap
page read and write
796000
heap
page read and write
64C000
heap
page read and write
2890000
heap
page read and write
1A40000
trusted library allocation
page read and write
37EE000
stack
page read and write
779000
heap
page read and write
1BC41126000
heap
page read and write
289E000
heap
page read and write
44FE000
stack
page read and write
1383000
heap
page read and write
2897000
heap
page read and write
558000
unkown
page readonly
1BC41159000
heap
page read and write
65E000
heap
page read and write
76D000
heap
page read and write
78E000
stack
page read and write
1BC41126000
heap
page read and write
406E000
heap
page read and write
AA4000
heap
page read and write
779000
heap
page read and write
76D000
heap
page read and write
7A2000
heap
page read and write
37B0000
trusted library allocation
page read and write
2E99000
heap
page read and write
5D5000
heap
page read and write
289A000
heap
page read and write
779000
heap
page read and write
457E000
stack
page read and write
779000
heap
page read and write
65E000
heap
page read and write
779000
heap
page read and write
1A40000
trusted library allocation
page read and write
2896000
heap
page read and write
37B0000
trusted library allocation
page read and write
796000
heap
page read and write
40B000
unkown
page read and write
4331000
heap
page read and write
BD1000
unkown
page execute read
289D000
heap
page read and write
1BC41148000
heap
page read and write
4331000
heap
page read and write
151A000
heap
page read and write
64E000
heap
page read and write
77E000
heap
page read and write
40AF000
heap
page read and write
64E000
stack
page read and write
BD0000
unkown
page readonly
1372000
heap
page read and write
30D8000
heap
page read and write
2FA0000
heap
page read and write
76D000
heap
page read and write
289D000
heap
page read and write
2895000
heap
page read and write
2E3D000
stack
page read and write
15D6000
heap
page read and write
1BC41148000
heap
page read and write
77E000
heap
page read and write
3FF6000
heap
page read and write
64C000
heap
page read and write
289C000
heap
page read and write
76D000
heap
page read and write
4331000
heap
page read and write
3B61000
heap
page read and write
1BC41159000
heap
page read and write
1150000
heap
page read and write
4F4000
unkown
page readonly
4331000
heap
page read and write
76D000
heap
page read and write
1A40000
trusted library allocation
page read and write
4CDF000
stack
page read and write
76D000
heap
page read and write
1294000
heap
page read and write
2895000
heap
page read and write
408000
unkown
page readonly
1538000
heap
page read and write
2895000
heap
page read and write
AA4000
heap
page read and write
4331000
heap
page read and write
4610000
heap
page read and write
4294AFA000
stack
page read and write
4D7E000
stack
page read and write
4294CFE000
stack
page read and write
1BC41126000
heap
page read and write
779000
heap
page read and write
73D01000
unkown
page execute read
A2F000
stack
page read and write
AA4000
heap
page read and write
3B61000
heap
page read and write
37B0000
trusted library allocation
page read and write
1BC4111A000
heap
page read and write
79A000
heap
page read and write
779000
heap
page read and write
1A40000
trusted library allocation
page read and write
2E81000
heap
page read and write
3B61000
heap
page read and write
1174000
heap
page read and write
3B61000
heap
page read and write
558000
unkown
page readonly
4331000
heap
page read and write
779000
heap
page read and write
34CC000
stack
page read and write
73A000
heap
page read and write
2897000
heap
page read and write
4331000
heap
page read and write
76D000
heap
page read and write
779000
heap
page read and write
33E7000
trusted library allocation
page read and write
3B61000
heap
page read and write
41F000
unkown
page read and write
2896000
heap
page read and write
10BC000
stack
page read and write
63C000
heap
page read and write
2899000
heap
page read and write
12C0000
heap
page read and write
2E99000
heap
page read and write
73D00000
unkown
page readonly
AA4000
heap
page read and write
A3E000
stack
page read and write
76D000
heap
page read and write
70E000
stack
page read and write
1BC41154000
heap
page read and write
C98000
unkown
page readonly
4331000
heap
page read and write
4038000
heap
page read and write
14DC000
heap
page read and write
289A000
heap
page read and write
1A40000
trusted library allocation
page read and write
4331000
heap
page read and write
76D000
heap
page read and write
1BC4112F000
heap
page read and write
779000
heap
page read and write
1174000
heap
page read and write
289E000
heap
page read and write
2E8B000
heap
page read and write
37B0000
trusted library allocation
page read and write
9FE000
stack
page read and write
2E58000
heap
page read and write
76D000
heap
page read and write
779000
heap
page read and write
37B0000
trusted library allocation
page read and write
AA4000
heap
page read and write
AA4000
heap
page read and write
3B61000
heap
page read and write
3B61000
heap
page read and write
7EE000
stack
page read and write
1BC41146000
heap
page read and write
3D35000
heap
page read and write
1BC4112F000
heap
page read and write
779000
heap
page read and write
1140000
heap
page read and write
2E99000
heap
page read and write
44EB000
trusted library allocation
page read and write
1310000
heap
page read and write
338F000
stack
page read and write
14FF000
heap
page read and write
545000
unkown
page readonly
3B61000
heap
page read and write
1BC4111A000
heap
page read and write
64F000
heap
page read and write
779000
heap
page read and write
105C000
stack
page read and write
7FFB23B16000
unkown
page readonly
2891000
heap
page read and write
4331000
heap
page read and write
2340000
heap
page read and write
4331000
heap
page read and write
76A000
heap
page read and write
3F08000
heap
page read and write
545000
unkown
page readonly
3DF6000
heap
page read and write
1BC41152000
heap
page read and write
1BC41159000
heap
page read and write
3D30000
heap
page read and write
76D000
heap
page read and write
68E000
stack
page read and write
4E70000
heap
page read and write
779000
heap
page read and write
AA4000
heap
page read and write
779000
heap
page read and write
3F30000
heap
page read and write
2E9E000
heap
page read and write
407A000
heap
page read and write
3B61000
heap
page read and write
4331000
heap
page read and write
40B000
unkown
page write copy
76D000
heap
page read and write
497000
unkown
page read and write
2891000
heap
page read and write
3E7A000
heap
page read and write
7FFB23B00000
unkown
page readonly
2895000
heap
page read and write
59E000
stack
page read and write
6B0000
heap
page read and write
42950FE000
stack
page read and write
4331000
heap
page read and write
2E81000
heap
page read and write
3414000
heap
page read and write
73D01000
unkown
page execute read
4331000
heap
page read and write
1BC41146000
heap
page read and write
2E81000
heap
page read and write
4038000
heap
page read and write
4331000
heap
page read and write
4331000
heap
page read and write
632000
heap
page read and write
1BC41119000
heap
page read and write
328E000
stack
page read and write
76D000
heap
page read and write
520000
unkown
page readonly
288F000
stack
page read and write
510000
heap
page read and write
76D000
heap
page read and write
3DF6000
heap
page read and write
1A3D000
heap
page read and write
4331000
heap
page read and write
520000
unkown
page readonly
2898000
heap
page read and write
3B61000
heap
page read and write
4A0000
heap
page read and write
73D1D000
unkown
page read and write
7F0000
heap
page read and write
62E000
heap
page read and write
37B0000
trusted library allocation
page read and write
4294BFF000
stack
page read and write
3E38000
heap
page read and write
37B0000
trusted library allocation
page read and write
2E99000
heap
page read and write
64C000
heap
page read and write
3B61000
heap
page read and write
2898000
heap
page read and write
3F72000
heap
page read and write
3D72000
heap
page read and write
103D000
stack
page read and write
3B61000
heap
page read and write
4331000
heap
page read and write
779000
heap
page read and write
4DBF000
stack
page read and write
779000
heap
page read and write
400000
unkown
page readonly
3B61000
heap
page read and write
3B61000
heap
page read and write
2E7B000
heap
page read and write
3B61000
heap
page read and write
2E6E000
heap
page read and write
76D000
heap
page read and write
1BC41111000
heap
page read and write
400000
unkown
page readonly
1BC41126000
heap
page read and write
2E70000
heap
page read and write
1A40000
trusted library allocation
page read and write
289A000
heap
page read and write
1A40000
trusted library allocation
page read and write
490000
unkown
page readonly
1351000
heap
page read and write
3B61000
heap
page read and write
45AC000
trusted library allocation
page read and write
1A40000
trusted library allocation
page read and write
4F4000
unkown
page readonly
1BC4113D000
heap
page read and write
4331000
heap
page read and write
3F30000
heap
page read and write
BD0000
unkown
page readonly
1BC41146000
heap
page read and write
1BC4113B000
heap
page read and write
516000
heap
page read and write
1536000
heap
page read and write
1BC413D0000
heap
page read and write
3FB4000
heap
page read and write
73D16000
unkown
page readonly
796000
heap
page read and write
BD1000
unkown
page execute read
2ADC000
stack
page read and write
779000
heap
page read and write
C60000
unkown
page readonly
76D000
heap
page read and write
73D16000
unkown
page readonly
3B61000
heap
page read and write
3B61000
heap
page read and write
1A40000
trusted library allocation
page read and write
2E40000
heap
page read and write
2E8B000
heap
page read and write
149B000
heap
page read and write
4331000
heap
page read and write
3B61000
heap
page read and write
43C000
stack
page read and write
73D00000
unkown
page readonly
1BC4110C000
heap
page read and write
1689000
heap
page read and write
2897000
heap
page read and write
1BC4112F000
heap
page read and write
AA4000
heap
page read and write
BA0000
heap
page read and write
510000
heap
page read and write
12B0000
heap
page read and write
2895000
heap
page read and write
BE0000
heap
page read and write
2E9E000
heap
page read and write
3B61000
heap
page read and write
5D0000
heap
page read and write
1474000
heap
page read and write
4331000
heap
page read and write
2E8B000
heap
page read and write
1BC4113D000
heap
page read and write
401000
unkown
page execute read
76D000
heap
page read and write
4331000
heap
page read and write
15AF000
heap
page read and write
13D0000
heap
page read and write
64C000
heap
page read and write
74F000
stack
page read and write
76D000
heap
page read and write
AA4000
heap
page read and write
13DA000
heap
page read and write
12A0000
heap
page read and write
779000
heap
page read and write
796000
heap
page read and write
76D000
heap
page read and write
1BC41149000
heap
page read and write
3FB4000
heap
page read and write
1332000
heap
page read and write
19A000
stack
page read and write
1A40000
trusted library allocation
page read and write
1BC41148000
heap
page read and write
1BC41159000
heap
page read and write
1BC41146000
heap
page read and write
1BC4113C000
heap
page read and write
5B0000
heap
page read and write
76D000
heap
page read and write
3F2A000
heap
page read and write
335E000
stack
page read and write
2891000
heap
page read and write
6B0000
heap
page read and write
73D1F000
unkown
page readonly
1BC41156000
heap
page read and write
3EC6000
heap
page read and write
1BC4114D000
heap
page read and write
73D1D000
unkown
page read and write
3DB4000
heap
page read and write
1940000
heap
page read and write
779000
heap
page read and write
779000
heap
page read and write
108F000
stack
page read and write
779000
heap
page read and write
7FFB23B22000
unkown
page readonly
76D000
heap
page read and write
2E50000
heap
page read and write
1351000
heap
page read and write
4331000
heap
page read and write
2894000
heap
page read and write
2890000
heap
page read and write
3EBC000
heap
page read and write
65E000
heap
page read and write
278E000
stack
page read and write
409E000
heap
page read and write
3B61000
heap
page read and write
42952FF000
stack
page read and write
141B000
heap
page read and write
1BC4112F000
heap
page read and write
3D30000
heap
page read and write
453F000
stack
page read and write
1341000
heap
page read and write
2E81000
heap
page read and write
1A40000
trusted library allocation
page read and write
407A000
heap
page read and write
33CC000
stack
page read and write
2899000
heap
page read and write
2E73000
heap
page read and write
C60000
unkown
page readonly
C8F000
unkown
page read and write
289C000
heap
page read and write
408000
unkown
page readonly
796000
heap
page read and write
82F000
stack
page read and write
76D000
heap
page read and write
C85000
unkown
page readonly
491000
unkown
page execute read
289F000
heap
page read and write
3EFE000
heap
page read and write
There are 641 hidden memdumps, click here to show them.