IOC Report
grace.exe

loading gif

Files

File Path
Type
Category
Malicious
grace.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\nasal\beeish.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\beeish.vbs
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\aWUFv.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\extrorsal
data
dropped
C:\Users\user\AppData\Roaming\aWUFv\aWUFv.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
modified
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\grace.exe
"C:\Users\user\Desktop\grace.exe"
malicious
C:\Users\user\AppData\Local\nasal\beeish.exe
"C:\Users\user\Desktop\grace.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\grace.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\beeish.vbs"
malicious
C:\Users\user\AppData\Local\nasal\beeish.exe
"C:\Users\user\AppData\Local\nasal\beeish.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\nasal\beeish.exe"
malicious
C:\Users\user\AppData\Roaming\aWUFv\aWUFv.exe
"C:\Users\user\AppData\Roaming\aWUFv\aWUFv.exe"
malicious
C:\Users\user\AppData\Roaming\aWUFv\aWUFv.exe
"C:\Users\user\AppData\Roaming\aWUFv\aWUFv.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.13.205
https://api.ipify.org
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://techniqueqatar.com
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com
unknown

Domains

Name
IP
Malicious
techniqueqatar.com
208.91.198.176
malicious
ip-api.com
208.95.112.1
malicious
api.ipify.org
104.26.13.205

IPs

IP
Domain
Country
Malicious
208.91.198.176
techniqueqatar.com
United States
malicious
208.95.112.1
ip-api.com
United States
malicious
104.26.13.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
aWUFv
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2FD0000
direct allocation
page read and write
malicious
30DB000
trusted library allocation
page read and write
malicious
3094000
trusted library allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
2F86000
trusted library allocation
page read and write
malicious
3700000
direct allocation
page read and write
malicious
30E3000
trusted library allocation
page read and write
malicious
2F7E000
trusted library allocation
page read and write
malicious
2F54000
trusted library allocation
page read and write
malicious
47FD000
direct allocation
page read and write
3DB2000
heap
page read and write
10D2000
trusted library allocation
page read and write
6371000
heap
page read and write
3FC5000
heap
page read and write
89F000
stack
page read and write
3F01000
heap
page read and write
3E31000
trusted library allocation
page read and write
2D6E000
stack
page read and write
69EE000
stack
page read and write
3F06000
heap
page read and write
2F7C000
trusted library allocation
page read and write
3DC0000
heap
page read and write
4F4E000
stack
page read and write
2FAC000
stack
page read and write
3FA8000
heap
page read and write
1520000
heap
page read and write
552E000
trusted library allocation
page read and write
482000
unkown
page readonly
10A4000
trusted library allocation
page read and write
3F46000
heap
page read and write
110000
heap
page read and write
400000
unkown
page readonly
6A9F000
stack
page read and write
3BCF000
stack
page read and write
10C6000
trusted library allocation
page execute and read and write
4290000
direct allocation
page read and write
6AF5000
trusted library allocation
page read and write
107D000
trusted library allocation
page execute and read and write
2F8F000
trusted library allocation
page read and write
3F68000
heap
page read and write
3F06000
heap
page read and write
45A0000
direct allocation
page read and write
1550000
heap
page read and write
2E6E000
stack
page read and write
1540000
trusted library allocation
page read and write
55D0000
heap
page read and write
10D5000
trusted library allocation
page execute and read and write
3F46000
heap
page read and write
46D0000
direct allocation
page read and write
3FA8000
heap
page read and write
1546000
trusted library allocation
page execute and read and write
3DD3000
heap
page read and write
7F78EFA000
stack
page read and write
F04000
trusted library allocation
page read and write
47FD000
direct allocation
page read and write
4530000
direct allocation
page read and write
51CE000
stack
page read and write
1360000
heap
page read and write
F1D000
trusted library allocation
page execute and read and write
7000000
heap
page read and write
46D0000
direct allocation
page read and write
3F46000
heap
page read and write
4AB000
unkown
page readonly
1050000
trusted library allocation
page read and write
4653000
direct allocation
page read and write
6AD0000
heap
page read and write
10F0000
trusted library allocation
page read and write
12B0000
heap
page read and write
307D000
trusted library allocation
page read and write
EEE000
stack
page read and write
6F7E000
stack
page read and write
3DE8000
heap
page read and write
3F68000
heap
page read and write
10D0000
trusted library allocation
page read and write
2DA0000
heap
page execute and read and write
9CC000
stack
page read and write
4FEE000
stack
page read and write
473E000
direct allocation
page read and write
E40000
heap
page read and write
1550000
trusted library allocation
page read and write
429E000
heap
page read and write
4290000
direct allocation
page read and write
6350000
heap
page read and write
10CA000
trusted library allocation
page execute and read and write
3F46000
heap
page read and write
3F46000
heap
page read and write
3E68000
heap
page read and write
3FA8000
heap
page read and write
3F11000
heap
page read and write
3E39000
heap
page read and write
7F797FF000
stack
page read and write
3F55000
heap
page read and write
46C9000
direct allocation
page read and write
1170000
trusted library allocation
page read and write
3F68000
heap
page read and write
180E3448000
heap
page read and write
3F46000
heap
page read and write
3F4E000
heap
page read and write
A8A000
unkown
page readonly
559F000
stack
page read and write
3031000
trusted library allocation
page read and write
3E6D000
heap
page read and write
376E000
stack
page read and write
3F06000
heap
page read and write
2FF0000
trusted library allocation
page read and write
3F06000
heap
page read and write
6C5E000
stack
page read and write
43CE000
heap
page read and write
B80000
heap
page read and write
3166000
trusted library allocation
page read and write
BCE000
stack
page read and write
3E6D000
heap
page read and write
522E000
stack
page read and write
2E31000
trusted library allocation
page read and write
3FA8000
heap
page read and write
4653000
direct allocation
page read and write
3FC5000
heap
page read and write
490000
unkown
page read and write
3F68000
heap
page read and write
55AE000
stack
page read and write
3F05000
heap
page read and write
3F06000
heap
page read and write
1350000
trusted library allocation
page read and write
2D8E000
stack
page read and write
DCA000
stack
page read and write
4AB000
unkown
page readonly
3F06000
heap
page read and write
45A0000
direct allocation
page read and write
3FC4000
heap
page read and write
3F06000
heap
page read and write
46C9000
direct allocation
page read and write
46CD000
direct allocation
page read and write
100000
heap
page read and write
3FA8000
heap
page read and write
A97000
heap
page read and write
3180000
trusted library allocation
page read and write
3FA8000
heap
page read and write
3E6D000
heap
page read and write
2FFB000
trusted library allocation
page read and write
3F06000
heap
page read and write
56C0000
heap
page read and write
11D3000
heap
page read and write
3F48000
heap
page read and write
101E000
stack
page read and write
18C0000
heap
page read and write
3020000
heap
page read and write
1050000
heap
page read and write
3F06000
heap
page read and write
FAB000
heap
page read and write
1180000
heap
page read and write
3197000
trusted library allocation
page read and write
2FB0000
heap
page read and write
2F41000
trusted library allocation
page read and write
3E6D000
heap
page read and write
551E000
trusted library allocation
page read and write
89F000
stack
page read and write
401000
unkown
page execute read
37CE000
stack
page read and write
5531000
trusted library allocation
page read and write
3FA8000
heap
page read and write
3FC5000
heap
page read and write
3FA8000
heap
page read and write
473E000
direct allocation
page read and write
4010000
heap
page read and write
12B0000
heap
page read and write
3F68000
heap
page read and write
46D0000
direct allocation
page read and write
9CE000
stack
page read and write
4300000
direct allocation
page read and write
30D7000
trusted library allocation
page read and write
3E6D000
heap
page read and write
3D59000
heap
page read and write
6CCE000
stack
page read and write
180E3467000
heap
page read and write
2DC0000
trusted library allocation
page execute and read and write
4530000
direct allocation
page read and write
6AF8000
trusted library allocation
page read and write
1080000
heap
page read and write
A88000
heap
page read and write
3E91000
heap
page read and write
A80000
unkown
page readonly
678E000
stack
page read and write
473E000
direct allocation
page read and write
6A07000
trusted library allocation
page read and write
3D7B000
heap
page read and write
3009000
trusted library allocation
page read and write
490000
unkown
page write copy
370F000
heap
page read and write
1501000
trusted library allocation
page read and write
11D6000
heap
page read and write
F3B000
trusted library allocation
page execute and read and write
123F000
stack
page read and write
3F95000
heap
page read and write
9DE000
stack
page read and write
4028000
heap
page read and write
4530000
direct allocation
page read and write
3DCC000
heap
page read and write
14EE000
trusted library allocation
page read and write
486E000
direct allocation
page read and write
3FFF000
heap
page read and write
180E3452000
heap
page read and write
584D000
stack
page read and write
54BE000
stack
page read and write
180E373E000
heap
page read and write
3F46000
heap
page read and write
1090000
trusted library allocation
page read and write
3F46000
heap
page read and write
3FA8000
heap
page read and write
10B7000
heap
page read and write
43B3000
direct allocation
page read and write
1386000
heap
page read and write
3F68000
heap
page read and write
13C0000
trusted library allocation
page read and write
3168000
trusted library allocation
page read and write
3FC5000
heap
page read and write
10BD000
trusted library allocation
page execute and read and write
3D66000
heap
page read and write
127F000
stack
page read and write
3FA8000
heap
page read and write
120000
heap
page read and write
3FEE000
heap
page read and write
401000
unkown
page execute read
11A0000
heap
page read and write
1070000
trusted library allocation
page read and write
3DF3000
heap
page read and write
17E000
stack
page read and write
6355000
heap
page read and write
4AB000
unkown
page readonly
3F06000
heap
page read and write
950000
heap
page read and write
11A0000
heap
page read and write
1297000
trusted library allocation
page execute and read and write
553D000
trusted library allocation
page read and write
43B3000
direct allocation
page read and write
3E7D000
heap
page read and write
3FD0000
heap
page read and write
6A10000
trusted library allocation
page execute and read and write
47FD000
direct allocation
page read and write
482000
unkown
page readonly
3FA8000
heap
page read and write
43B3000
direct allocation
page read and write
58BB000
stack
page read and write
690E000
stack
page read and write
3F46000
heap
page read and write
F0D000
trusted library allocation
page execute and read and write
3C00000
heap
page read and write
55C9000
trusted library allocation
page read and write
46CD000
direct allocation
page read and write
3F46000
heap
page read and write
6AF0000
trusted library allocation
page read and write
3F68000
heap
page read and write
2D8E000
stack
page read and write
1074000
trusted library allocation
page read and write
3F56000
trusted library allocation
page read and write
55CC000
stack
page read and write
3DD5000
heap
page read and write
3084000
heap
page read and write
9E0000
heap
page read and write
BD0000
heap
page read and write
3FA8000
heap
page read and write
3DB6000
heap
page read and write
1336000
heap
page read and write
8B4000
stack
page read and write
7F5F0000
trusted library allocation
page execute and read and write
15AF000
stack
page read and write
6296000
heap
page read and write
180E3735000
heap
page read and write
E45000
heap
page read and write
104E000
stack
page read and write
3F46000
heap
page read and write
3F06000
heap
page read and write
EF0000
trusted library allocation
page read and write
3FC4000
heap
page read and write
3DF3000
heap
page read and write
3FED000
heap
page read and write
10AB000
heap
page read and write
3FA8000
heap
page read and write
E0000
heap
page read and write
1530000
heap
page read and write
4530000
direct allocation
page read and write
8FE000
stack
page read and write
6C60000
trusted library allocation
page read and write
46D0000
direct allocation
page read and write
3F46000
heap
page read and write
551B000
trusted library allocation
page read and write
3B75000
heap
page read and write
180E3730000
heap
page read and write
3E6D000
heap
page read and write
3E91000
heap
page read and write
301D000
trusted library allocation
page read and write
3F46000
heap
page read and write
3F46000
heap
page read and write
A82000
unkown
page readonly
3FC5000
heap
page read and write
6375000
heap
page read and write
3FA8000
heap
page read and write
134D000
heap
page read and write
2F26000
trusted library allocation
page read and write
F03000
trusted library allocation
page execute and read and write
3F46000
heap
page read and write
8AF000
stack
page read and write
47F9000
direct allocation
page read and write
3FA8000
heap
page read and write
3F06000
heap
page read and write
B37000
heap
page read and write
6A00000
trusted library allocation
page read and write
696F000
stack
page read and write
3F06000
heap
page read and write
3FA8000
heap
page read and write
45A0000
direct allocation
page read and write
6CD0000
trusted library allocation
page read and write
93E000
stack
page read and write
3DD5000
heap
page read and write
482000
unkown
page readonly
3F68000
heap
page read and write
3B8F000
stack
page read and write
3FC4000
heap
page read and write
665E000
stack
page read and write
3F8C000
heap
page read and write
3F2F000
heap
page read and write
2E30000
heap
page read and write
89F000
stack
page read and write
2FD0000
heap
page execute and read and write
B1C000
stack
page read and write
30D9000
trusted library allocation
page read and write
6276000
heap
page read and write
401000
unkown
page execute read
116E000
stack
page read and write
10D7000
trusted library allocation
page execute and read and write
43B8000
heap
page read and write
3ED1000
heap
page read and write
1212000
heap
page read and write
46D0000
direct allocation
page read and write
1E0000
heap
page read and write
1537000
heap
page read and write
2DFE000
stack
page read and write
129B000
trusted library allocation
page execute and read and write
3F7F000
trusted library allocation
page read and write
3DE1000
heap
page read and write
2DEC000
stack
page read and write
45A0000
direct allocation
page read and write
2FC0000
trusted library allocation
page read and write
3F01000
heap
page read and write
3F06000
heap
page read and write
129E000
stack
page read and write
3FEE000
heap
page read and write
8C0000
heap
page read and write
3185000
trusted library allocation
page read and write
14C0000
heap
page read and write
6A70000
trusted library allocation
page execute and read and write
153A000
heap
page read and write
180E33D0000
heap
page read and write
1063000
trusted library allocation
page execute and read and write
10B0000
trusted library allocation
page read and write
490000
unkown
page write copy
4AB000
unkown
page readonly
3F68000
heap
page read and write
4530000
direct allocation
page read and write
588E000
stack
page read and write
3195000
trusted library allocation
page read and write
2C70000
trusted library allocation
page read and write
1520000
trusted library allocation
page read and write
139F000
stack
page read and write
5536000
trusted library allocation
page read and write
46C9000
direct allocation
page read and write
3ED1000
heap
page read and write
110000
heap
page read and write
A50000
heap
page read and write
3FCC000
heap
page execute and read and write
180E34A4000
heap
page read and write
3F06000
heap
page read and write
7270000
heap
page read and write
1273000
heap
page read and write
11C5000
heap
page read and write
4290000
direct allocation
page read and write
69AE000
stack
page read and write
303C000
trusted library allocation
page read and write
40BE000
trusted library allocation
page read and write
7F78FFE000
stack
page read and write
3E6D000
heap
page read and write
B59000
stack
page read and write
3E6D000
heap
page read and write
127F000
stack
page read and write
6BDD000
stack
page read and write
2F3D000
trusted library allocation
page read and write
6D0F000
stack
page read and write
1557000
trusted library allocation
page execute and read and write
3F88000
heap
page read and write
3FAD000
heap
page read and write
3E6D000
heap
page read and write
2EF1000
trusted library allocation
page read and write
3F46000
heap
page read and write
180E3400000
heap
page read and write
3FAE000
heap
page read and write
55DE000
stack
page read and write
3F06000
heap
page read and write
400000
unkown
page readonly
4059000
trusted library allocation
page read and write
3FAD000
heap
page read and write
7F793FF000
stack
page read and write
6CE0000
trusted library allocation
page execute and read and write
3F7F000
heap
page read and write
3FA8000
heap
page read and write
6D70000
trusted library allocation
page read and write
3F06000
heap
page read and write
3FC4000
heap
page read and write
3D76000
heap
page read and write
6D60000
trusted library allocation
page read and write
3E5D000
heap
page read and write
47F9000
direct allocation
page read and write
69F0000
trusted library allocation
page read and write
1383000
heap
page read and write
47F9000
direct allocation
page read and write
5038000
trusted library allocation
page read and write
10AD000
trusted library allocation
page execute and read and write
10F9000
stack
page read and write
3F46000
heap
page read and write
3F06000
heap
page read and write
100D000
stack
page read and write
F48000
heap
page read and write
3F68000
heap
page read and write
14F2000
trusted library allocation
page read and write
682E000
stack
page read and write
11C0000
heap
page read and write
5360000
heap
page read and write
669E000
stack
page read and write
46CD000
direct allocation
page read and write
5370000
heap
page read and write
3FEE000
heap
page read and write
3F46000
heap
page read and write
180E3670000
heap
page read and write
3F06000
heap
page read and write
F40000
heap
page read and write
3FA8000
heap
page read and write
3D61000
heap
page read and write
125F000
heap
page read and write
A5E000
stack
page read and write
56B0000
heap
page execute and read and write
486E000
direct allocation
page read and write
3FA8000
heap
page read and write
317B000
trusted library allocation
page read and write
B0E000
heap
page read and write
13BF000
stack
page read and write
A4E000
stack
page read and write
3F87000
heap
page execute and read and write
4290000
direct allocation
page read and write
5FDF000
stack
page read and write
56DE000
stack
page read and write
3FD0000
heap
page read and write
3080000
heap
page read and write
3DED000
heap
page read and write
1513000
trusted library allocation
page execute and read and write
3E02000
heap
page read and write
6C70000
trusted library allocation
page read and write
43B3000
direct allocation
page read and write
43B3000
direct allocation
page read and write
3F3F000
heap
page read and write
3F68000
heap
page read and write
46CD000
direct allocation
page read and write
3F06000
heap
page read and write
46C9000
direct allocation
page read and write
3D64000
heap
page read and write
47F9000
direct allocation
page read and write
2C50000
heap
page read and write
3F46000
heap
page read and write
3F6F000
heap
page read and write
3FA8000
heap
page read and write
3E6D000
heap
page read and write
F14000
trusted library allocation
page read and write
12DB000
heap
page read and write
3F68000
heap
page read and write
6353000
heap
page read and write
1557000
heap
page read and write
3F00000
heap
page read and write
590E000
stack
page read and write
490000
unkown
page read and write
6D40000
heap
page read and write
3FA8000
heap
page read and write
3F06000
heap
page read and write
12FF000
stack
page read and write
3F4E000
heap
page read and write
13A4000
heap
page read and write
482000
unkown
page readonly
3FA8000
heap
page read and write
6C1E000
stack
page read and write
3F7F000
heap
page read and write
3EF1000
trusted library allocation
page read and write
3D00000
heap
page read and write
3F68000
heap
page read and write
3F06000
heap
page read and write
3F06000
heap
page read and write
A10000
heap
page read and write
570E000
stack
page read and write
9A000
stack
page read and write
61DC000
stack
page read and write
4438000
heap
page read and write
4AB000
unkown
page readonly
4031000
trusted library allocation
page read and write
3F01000
heap
page read and write
3FC5000
heap
page read and write
EF9000
stack
page read and write
3DD1000
heap
page read and write
3024000
heap
page read and write
43B3000
direct allocation
page read and write
2FB0000
direct allocation
page read and write
5522000
trusted library allocation
page read and write
3022000
trusted library allocation
page read and write
100000
heap
page read and write
401000
unkown
page execute read
150D000
trusted library allocation
page read and write
3FC5000
heap
page read and write
1020000
heap
page read and write
400000
system
page execute and read and write
2FE0000
trusted library allocation
page read and write
47F9000
direct allocation
page read and write
56CF000
stack
page read and write
4394000
direct allocation
page read and write
3F46000
heap
page read and write
401000
unkown
page execute read
E8E000
stack
page read and write
1290000
trusted library allocation
page read and write
3F68000
heap
page read and write
3028000
trusted library allocation
page read and write
3F68000
heap
page read and write
12B8000
heap
page read and write
6A0E000
stack
page read and write
3F46000
heap
page read and write
47FD000
direct allocation
page read and write
2FB5000
heap
page read and write
1120000
heap
page read and write
1070000
heap
page read and write
3F68000
heap
page read and write
3F46000
heap
page read and write
4A7000
unkown
page read and write
FD0000
heap
page read and write
3F46000
heap
page read and write
3F47000
heap
page execute and read and write
F10000
trusted library allocation
page read and write
5350000
heap
page execute and read and write
3E13000
heap
page read and write
14AE000
stack
page read and write
69FD000
trusted library allocation
page read and write
14FE000
trusted library allocation
page read and write
3DA5000
heap
page read and write
3FCD000
heap
page read and write
482000
unkown
page readonly
3FC5000
heap
page read and write
3066000
trusted library allocation
page read and write
3F45000
heap
page read and write
1F0000
heap
page read and write
60DE000
stack
page read and write
5B7D000
stack
page read and write
3DDE000
heap
page read and write
2EDC000
stack
page read and write
10DB000
trusted library allocation
page execute and read and write
14E0000
trusted library allocation
page read and write
3C90000
heap
page read and write
6B60000
trusted library allocation
page execute and read and write
3E6D000
heap
page read and write
3F06000
heap
page read and write
4346000
heap
page read and write
8E0000
heap
page read and write
42D1000
heap
page read and write
3F68000
heap
page read and write
46CD000
direct allocation
page read and write
3FA8000
heap
page read and write
6B30000
trusted library allocation
page read and write
3DBE000
heap
page read and write
3018000
trusted library allocation
page read and write
180E3440000
heap
page read and write
9A000
stack
page read and write
47FD000
direct allocation
page read and write
686E000
stack
page read and write
3F06000
heap
page read and write
53AE000
stack
page read and write
4290000
direct allocation
page read and write
3FC5000
heap
page read and write
490000
unkown
page write copy
3E1F000
heap
page read and write
6AE0000
trusted library allocation
page execute and read and write
5380000
heap
page read and write
2FB0000
trusted library allocation
page execute and read and write
473E000
direct allocation
page read and write
1577000
heap
page read and write
44BA000
heap
page read and write
3F4C000
heap
page read and write
7F790FE000
stack
page read and write
FD5000
heap
page read and write
486E000
direct allocation
page read and write
626D000
heap
page read and write
3081000
trusted library allocation
page read and write
1392000
heap
page read and write
AAD000
heap
page read and write
3E41000
heap
page read and write
4308000
heap
page read and write
1570000
heap
page read and write
8B4000
stack
page read and write
18A0000
direct allocation
page read and write
6358000
heap
page read and write
3F68000
heap
page read and write
2DDE000
stack
page read and write
67ED000
stack
page read and write
2E20000
heap
page execute and read and write
3D80000
heap
page read and write
54AF000
stack
page read and write
6C6D000
trusted library allocation
page read and write
45A0000
direct allocation
page read and write
940000
heap
page read and write
16FE000
stack
page read and write
3FEE000
heap
page read and write
2E40000
heap
page read and write
2FD7000
heap
page read and write
2E41000
heap
page read and write
3FA8000
heap
page read and write
93E000
stack
page read and write
1075000
heap
page read and write
2E20000
heap
page read and write
3E87000
heap
page read and write
1064000
trusted library allocation
page read and write
B0A000
heap
page read and write
3F68000
heap
page read and write
5359000
trusted library allocation
page read and write
2C0E000
stack
page read and write
3F06000
heap
page read and write
3020000
heap
page read and write
6DD0000
trusted library allocation
page execute and read and write
58CE000
stack
page read and write
7F792FF000
stack
page read and write
3F46000
heap
page read and write
11AE000
stack
page read and write
3FA8000
heap
page read and write
655E000
stack
page read and write
3F06000
heap
page read and write
14B0000
trusted library allocation
page execute and read and write
3F46000
heap
page read and write
2FDA000
trusted library allocation
page read and write
3F06000
heap
page read and write
A80000
heap
page read and write
5542000
trusted library allocation
page read and write
10A3000
trusted library allocation
page execute and read and write
3E90000
heap
page read and write
3F46000
heap
page read and write
CF9000
stack
page read and write
F76000
heap
page read and write
6DB0000
heap
page read and write
46CD000
direct allocation
page read and write
10C2000
trusted library allocation
page read and write
4653000
direct allocation
page read and write
486E000
direct allocation
page read and write
1110000
trusted library allocation
page read and write
970000
heap
page read and write
EA0000
heap
page read and write
7F795FD000
stack
page read and write
651E000
stack
page read and write
3BD0000
heap
page read and write
3F06000
heap
page read and write
3B6F000
stack
page read and write
B00000
heap
page read and write
2D90000
trusted library allocation
page execute and read and write
7F796FE000
stack
page read and write
1555000
trusted library allocation
page execute and read and write
2F98000
trusted library allocation
page read and write
12E8000
heap
page read and write
4653000
direct allocation
page read and write
63FF000
heap
page read and write
401000
unkown
page execute read
3F46000
heap
page read and write
3F46000
heap
page read and write
F69000
heap
page read and write
1D0000
heap
page read and write
1340000
trusted library allocation
page execute and read and write
558C000
stack
page read and write
6B00000
trusted library allocation
page read and write
3FED000
heap
page read and write
3F68000
heap
page read and write
2F6F000
stack
page read and write
2E25000
heap
page read and write
8EE000
heap
page read and write
46C9000
direct allocation
page read and write
3F68000
heap
page read and write
1088000
heap
page read and write
10A0000
trusted library allocation
page read and write
4AB000
unkown
page readonly
473E000
direct allocation
page read and write
400000
unkown
page readonly
45A0000
direct allocation
page read and write
3F68000
heap
page read and write
8B4000
stack
page read and write
1510000
trusted library allocation
page read and write
154A000
trusted library allocation
page execute and read and write
3000000
trusted library allocation
page read and write
30ED000
trusted library allocation
page read and write
3F06000
heap
page read and write
3FA8000
heap
page read and write
3F68000
heap
page read and write
3F68000
heap
page read and write
916000
heap
page read and write
3D8D000
heap
page read and write
3F46000
heap
page read and write
36FE000
stack
page read and write
1180000
trusted library allocation
page read and write
580E000
stack
page read and write
3FC5000
heap
page read and write
2C80000
heap
page read and write
3E6D000
heap
page read and write
47F9000
direct allocation
page read and write
46C9000
direct allocation
page read and write
3FA8000
heap
page read and write
A67000
heap
page read and write
167F000
stack
page read and write
A05000
heap
page read and write
3F46000
heap
page read and write
3E51000
trusted library allocation
page read and write
3E6D000
heap
page read and write
3ED0000
heap
page read and write
52A0000
heap
page execute and read and write
9A000
stack
page read and write
4653000
direct allocation
page read and write
2EE0000
heap
page execute and read and write
3D9B000
heap
page read and write
1552000
trusted library allocation
page read and write
486E000
direct allocation
page read and write
3F06000
heap
page read and write
8AF000
stack
page read and write
130000
heap
page read and write
3F2F000
heap
page read and write
1542000
trusted library allocation
page read and write
6C72000
trusted library allocation
page read and write
151D000
trusted library allocation
page execute and read and write
E5000
heap
page read and write
4096000
trusted library allocation
page read and write
3FA8000
heap
page read and write
14EB000
trusted library allocation
page read and write
A00000
heap
page read and write
1100000
trusted library allocation
page execute and read and write
A55000
heap
page read and write
4530000
direct allocation
page read and write
2F31000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
980000
heap
page read and write
4A7000
unkown
page read and write
6D68000
trusted library allocation
page read and write
F37000
trusted library allocation
page execute and read and write
3F46000
heap
page read and write
3F68000
heap
page read and write
549E000
stack
page read and write
3ED1000
heap
page read and write
68CE000
stack
page read and write
3176000
trusted library allocation
page read and write
2D80000
trusted library allocation
page read and write
B34000
heap
page read and write
3E48000
heap
page read and write
BD0000
heap
page read and write
4653000
direct allocation
page read and write
679E000
stack
page read and write
482000
unkown
page readonly
3DF1000
heap
page read and write
6288000
heap
page read and write
3F06000
heap
page read and write
D30000
heap
page read and write
3DB9000
heap
page read and write
10C0000
trusted library allocation
page read and write
400000
unkown
page readonly
3F19000
trusted library allocation
page read and write
BC0000
heap
page read and write
1890000
heap
page read and write
2F2F000
trusted library allocation
page read and write
3137000
trusted library allocation
page read and write
312A000
trusted library allocation
page read and write
545F000
stack
page read and write
1500000
trusted library allocation
page read and write
3CD0000
heap
page read and write
486E000
direct allocation
page read and write
3FA8000
heap
page read and write
404F000
trusted library allocation
page read and write
67CE000
stack
page read and write
3DA1000
heap
page read and write
2E51000
trusted library allocation
page read and write
3F06000
heap
page read and write
7F9C0000
trusted library allocation
page execute and read and write
3F46000
heap
page read and write
3FC5000
heap
page read and write
113E000
stack
page read and write
6DA0000
trusted library allocation
page read and write
400000
unkown
page readonly
1190000
trusted library allocation
page read and write
55E4000
heap
page read and write
1250000
trusted library allocation
page read and write
4290000
direct allocation
page read and write
1130000
heap
page read and write
2FA0000
heap
page read and write
490000
unkown
page read and write
6ADE000
stack
page read and write
8FE000
stack
page read and write
526E000
stack
page read and write
55E0000
heap
page read and write
14DC000
stack
page read and write
3F68000
heap
page read and write
6A60000
trusted library allocation
page read and write
3FD0000
heap
page read and write
5374000
heap
page read and write
3F46000
heap
page read and write
3FA8000
heap
page read and write
2FF4000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
3F95000
heap
page read and write
9E4000
heap
page read and write
152D000
trusted library allocation
page execute and read and write
46D0000
direct allocation
page read and write
3F68000
heap
page read and write
2EEF000
heap
page read and write
318C000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
106D000
trusted library allocation
page execute and read and write
180E33E0000
heap
page read and write
3D72000
heap
page read and write
3F68000
heap
page read and write
155B000
trusted library allocation
page execute and read and write
4A7000
unkown
page read and write
2F7A000
trusted library allocation
page read and write
6C78000
trusted library allocation
page read and write
6B40000
heap
page read and write
54C0000
heap
page execute and read and write
10A4000
heap
page read and write
3FA8000
heap
page read and write
4010000
heap
page read and write
3F68000
heap
page read and write
51EE000
stack
page read and write
6C80000
trusted library allocation
page execute and read and write
532E000
stack
page read and write
1506000
trusted library allocation
page read and write
F64000
heap
page read and write
12E6000
heap
page read and write
3DF1000
heap
page read and write
8EA000
heap
page read and write
3B90000
heap
page read and write
61E0000
heap
page read and write
6A5D000
stack
page read and write
EFA000
stack
page read and write
FB1000
heap
page read and write
3E14000
heap
page read and write
11A8000
heap
page read and write
2E20000
trusted library allocation
page read and write
2FF6000
trusted library allocation
page read and write
135000
heap
page read and write
3E44000
heap
page read and write
2C4C000
stack
page read and write
2E08000
trusted library allocation
page read and write
300B000
trusted library allocation
page read and write
1514000
trusted library allocation
page read and write
3E6D000
heap
page read and write
30F5000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
921000
heap
page read and write
6D50000
trusted library allocation
page execute and read and write
473E000
direct allocation
page read and write
3F68000
heap
page read and write
3F68000
heap
page read and write
3F68000
heap
page read and write
3DA8000
heap
page read and write
8AF000
stack
page read and write
E10000
heap
page read and write
3F68000
heap
page read and write
3F06000
heap
page read and write
2E35000
heap
page read and write
3FA8000
heap
page read and write
132F000
heap
page read and write
3F3F000
heap
page read and write
2FCD000
trusted library allocation
page read and write
47FD000
direct allocation
page read and write
3FE2000
heap
page read and write
6A5E000
stack
page read and write
117E000
stack
page read and write
400000
unkown
page readonly
3159000
trusted library allocation
page read and write
3E39000
heap
page read and write
3FFF000
heap
page read and write
3FA8000
heap
page read and write
7F799FB000
stack
page read and write
3E6D000
heap
page read and write
3F6F000
heap
page read and write
180E3477000
heap
page read and write
7F798FE000
stack
page read and write
2D70000
trusted library allocation
page read and write
149E000
stack
page read and write
3E91000
heap
page read and write
140E000
stack
page read and write
1BE000
stack
page read and write
There are 878 hidden memdumps, click here to show them.