IOC Report
c62q1qZ8kX.exe

loading gif

Files

File Path
Type
Category
Malicious
c62q1qZ8kX.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Program Files (x86)\Java\jre-1.8\lib\applet\WmiPrvSE.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft OneDrive\setup\logs\Idle.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\7-Zip\Lang\TextInputHost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows NT\Accessories\en-GB\conhost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\mmeUVmNHPOdst.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Default\mmeUVmNHPOdst.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Public\Pictures\mmeUVmNHPOdst.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nfAOklRSeu.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\blockrefSessionBrokerDll\5sVJrvWE.vbe
data
dropped
malicious
C:\blockrefSessionBrokerDll\chainMonitor.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Java\jre-1.8\lib\applet\24dbde2999530e
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\Microsoft OneDrive\setup\logs\6ccacd8608530f
data
dropped
C:\Program Files\7-Zip\Lang\22eafd247d37c3
ASCII text, with no line terminators
dropped
C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\5b884080fd4f94
ASCII text, with very long lines (565), with no line terminators
dropped
C:\Program Files\Windows Defender\en-US\1824f7f43360d2
ASCII text, with no line terminators
dropped
C:\Program Files\Windows NT\Accessories\en-GB\088424020bedd6
ASCII text, with no line terminators
dropped
C:\Recovery\1824f7f43360d2
ASCII text, with very long lines (952), with no line terminators
dropped
C:\Users\Default\1824f7f43360d2
ASCII text, with very long lines (914), with no line terminators
dropped
C:\Users\Default\AppData\Local\Microsoft\Windows\History\1824f7f43360d2
ASCII text, with very long lines (566), with no line terminators
dropped
C:\Users\Public\Pictures\1824f7f43360d2
ASCII text, with very long lines (818), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\chainMonitor.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\fontdrvhost.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\mmeUVmNHPOdst.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\QiyHNrWFuo
ASCII text, with no line terminators
dropped
C:\blockrefSessionBrokerDll\jNiINMcACfpGfudqTH4IxZpVWTbF.bat
ASCII text, with no line terminators
dropped
There are 19 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\c62q1qZ8kX.exe
"C:\Users\user\Desktop\c62q1qZ8kX.exe"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\blockrefSessionBrokerDll\5sVJrvWE.vbe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\blockrefSessionBrokerDll\chainMonitor.exe
"C:\blockrefSessionBrokerDll\chainMonitor.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 9 /tr "'C:\Users\Default\mmeUVmNHPOdst.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "mmeUVmNHPOdst" /sc ONLOGON /tr "'C:\Users\Default\mmeUVmNHPOdst.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 9 /tr "'C:\Users\Default\mmeUVmNHPOdst.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 5 /tr "'C:\Recovery\mmeUVmNHPOdst.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "mmeUVmNHPOdst" /sc ONLOGON /tr "'C:\Recovery\mmeUVmNHPOdst.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 11 /tr "'C:\Recovery\mmeUVmNHPOdst.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "mmeUVmNHPOdst" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows NT\Accessories\en-GB\conhost.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files\Windows NT\Accessories\en-GB\conhost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows NT\Accessories\en-GB\conhost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 6 /tr "'C:\Program Files\7-Zip\Lang\TextInputHost.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\TextInputHost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 11 /tr "'C:\Program Files\7-Zip\Lang\TextInputHost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\java\jre-1.8\lib\applet\WmiPrvSE.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files (x86)\java\jre-1.8\lib\applet\WmiPrvSE.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\java\jre-1.8\lib\applet\WmiPrvSE.exe'" /rl HIGHEST /f
malicious
C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe
"C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe'" /f
malicious
C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe
"C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "mmeUVmNHPOdst" /sc ONLOGON /tr "'C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe'" /rl HIGHEST /f
malicious
C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exe
"C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe"
malicious
C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exe
"C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\microsoft onedrive\setup\logs\Idle.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\microsoft onedrive\setup\logs\Idle.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\microsoft onedrive\setup\logs\Idle.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 13 /tr "'C:\Users\Public\Pictures\mmeUVmNHPOdst.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "mmeUVmNHPOdst" /sc ONLOGON /tr "'C:\Users\Public\Pictures\mmeUVmNHPOdst.exe'" /rl HIGHEST /f
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\blockrefSessionBrokerDll\jNiINMcACfpGfudqTH4IxZpVWTbF.bat" "
There are 28 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\ceff8bae5fe852f6764d5a8bf8a01242fad5fa72
e86fe4d2662b86cd24fb43908629616f882b59bf
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany

Memdumps

Base Address
Regiontype
Protect
Malicious
32F2000
trusted library allocation
page read and write
malicious
32B5000
trusted library allocation
page read and write
malicious
2FC1000
trusted library allocation
page read and write
malicious
2E31000
trusted library allocation
page read and write
malicious
32F8000
trusted library allocation
page read and write
malicious
32E9000
trusted library allocation
page read and write
malicious
3371000
trusted library allocation
page read and write
malicious
32B1000
trusted library allocation
page read and write
malicious
3231000
trusted library allocation
page read and write
malicious
2D20000
heap
page read and write
8F1000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
17BF000
stack
page read and write
1510000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
328C000
trusted library allocation
page read and write
2658000
heap
page read and write
7FFD9BABA000
trusted library allocation
page execute and read and write
4F8C000
stack
page read and write
137D000
heap
page read and write
91B000
heap
page read and write
7FFD9B9AC000
trusted library allocation
page read and write
7FFD9BA76000
trusted library allocation
page execute and read and write
1370000
heap
page read and write
2EF3000
trusted library allocation
page read and write
3154000
trusted library allocation
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
1BEE0000
heap
page read and write
7FFD9BB41000
trusted library allocation
page read and write
1BE23000
stack
page read and write
1C338000
heap
page read and write
164E000
stack
page read and write
1BF51000
heap
page read and write
7FFD9BB43000
trusted library allocation
page read and write
1C86E000
stack
page read and write
1384000
heap
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
7FFD9BB40000
trusted library allocation
page read and write
1675000
heap
page read and write
13B2000
heap
page read and write
8FF000
heap
page read and write
26FF000
heap
page read and write
160E000
heap
page read and write
1C36E000
heap
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
1C1FB000
heap
page read and write
1C30E000
heap
page read and write
7FFD9BB36000
trusted library allocation
page read and write
1C2B5000
heap
page read and write
4F0E000
stack
page read and write
1610000
trusted library allocation
page read and write
7FFD9BB46000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
7FFD9BA66000
trusted library allocation
page execute and read and write
1BDAE000
stack
page read and write
214000
unkown
page read and write
236C000
stack
page read and write
15F0000
trusted library allocation
page read and write
2658000
heap
page read and write
11D2000
heap
page read and write
1C374000
heap
page read and write
1BC7E000
stack
page read and write
8F0000
heap
page read and write
13EA000
heap
page read and write
1C1C8000
heap
page read and write
17CE000
stack
page read and write
7FFD9BAB1000
trusted library allocation
page execute and read and write
1570000
trusted library allocation
page read and write
132A8000
trusted library allocation
page read and write
1BEEE000
stack
page read and write
90F000
heap
page read and write
1C368000
heap
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
1C3B3000
heap
page read and write
FB0000
heap
page read and write
1C2AD000
heap
page read and write
2620000
heap
page read and write
268A000
heap
page read and write
32DC000
trusted library allocation
page read and write
1105000
heap
page read and write
7FFD9B974000
trusted library allocation
page read and write
2AEE000
stack
page read and write
3373000
trusted library allocation
page read and write
16B0000
heap
page read and write
1BDEF000
stack
page read and write
15CE000
stack
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
302C000
trusted library allocation
page read and write
7FFD9B99C000
trusted library allocation
page read and write
8FC000
heap
page read and write
2CB0000
heap
page execute and read and write
938000
heap
page read and write
7FFD9BA3C000
trusted library allocation
page execute and read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
264B000
heap
page read and write
1BC6F000
stack
page read and write
30B000
stack
page read and write
16C0000
heap
page read and write
15AC000
heap
page read and write
15A0000
heap
page read and write
32A1000
trusted library allocation
page read and write
1C1DE000
heap
page read and write
132BD000
trusted library allocation
page read and write
4BD8000
heap
page read and write
1544000
heap
page read and write
911000
heap
page read and write
1BF25000
stack
page read and write
138F000
stack
page read and write
13238000
trusted library allocation
page read and write
1C370000
heap
page read and write
7FFD9B994000
trusted library allocation
page read and write
1BF8F000
stack
page read and write
4ACF000
stack
page read and write
F90000
heap
page read and write
917000
heap
page read and write
1BDDE000
stack
page read and write
938000
heap
page read and write
1C1C0000
heap
page read and write
264F000
heap
page read and write
720F000
stack
page read and write
F90000
heap
page read and write
3341000
trusted library allocation
page read and write
7FFD9BA36000
trusted library allocation
page read and write
203000
unkown
page readonly
2655000
heap
page read and write
132B3000
trusted library allocation
page read and write
2644000
heap
page read and write
26E1000
heap
page read and write
13B8000
heap
page read and write
7FFD9BA40000
trusted library allocation
page execute and read and write
1670000
heap
page read and write
7FFD9B983000
trusted library allocation
page read and write
1C2A0000
heap
page read and write
1B7D0000
heap
page read and write
2376000
stack
page read and write
3382000
trusted library allocation
page read and write
938000
heap
page read and write
7FFD9BB60000
trusted library allocation
page read and write
1C0AE000
stack
page read and write
1660000
trusted library allocation
page read and write
7FFD9B9A8000
trusted library allocation
page read and write
521E000
stack
page read and write
12F6000
stack
page read and write
31AE000
stack
page read and write
2EFC000
trusted library allocation
page read and write
1CA6D000
stack
page read and write
16C5000
heap
page read and write
4BD9000
heap
page read and write
1C2EE000
stack
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
20E000
unkown
page write copy
2399000
stack
page read and write
7FFD9BA30000
trusted library allocation
page read and write
2BC0000
heap
page read and write
2659000
heap
page read and write
7FFD9BB30000
trusted library allocation
page read and write
8F6000
heap
page read and write
1BF75000
heap
page read and write
1C320000
heap
page read and write
531F000
stack
page read and write
1C001000
heap
page read and write
1200000
heap
page read and write
911000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
3A5000
heap
page read and write
4F4E000
stack
page read and write
1C1D4000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
3244000
trusted library allocation
page read and write
1349000
heap
page read and write
1190000
heap
page read and write
3220000
heap
page read and write
1C3AC000
heap
page read and write
26FF000
heap
page read and write
23A2000
stack
page read and write
2BBA000
trusted library allocation
page read and write
938000
heap
page read and write
8EC000
heap
page read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
1B3BD000
stack
page read and write
8D0000
heap
page read and write
1160000
heap
page read and write
1C211000
heap
page read and write
2C2F000
stack
page read and write
13233000
trusted library allocation
page read and write
1B260000
trusted library allocation
page read and write
FA0000
heap
page read and write
908000
heap
page read and write
1196000
heap
page read and write
12FCD000
trusted library allocation
page read and write
1C23F000
heap
page read and write
2770000
heap
page read and write
13A9000
heap
page read and write
7FFD9BB47000
trusted library allocation
page read and write
1C018000
heap
page read and write
132AD000
trusted library allocation
page read and write
1BB80000
heap
page execute and read and write
7FFD9BB30000
trusted library allocation
page read and write
906000
heap
page read and write
1BEDE000
stack
page read and write
133C000
heap
page read and write
1C2AE000
stack
page read and write
1BE80000
heap
page execute and read and write
4BCF000
stack
page read and write
DF0000
heap
page read and write
1535000
heap
page read and write
1BF60000
heap
page read and write
4490000
heap
page read and write
3385000
trusted library allocation
page read and write
15D1000
heap
page read and write
7FFD9B984000
trusted library allocation
page read and write
7FFD9BB71000
trusted library allocation
page read and write
2E8A000
trusted library allocation
page read and write
3309000
trusted library allocation
page read and write
2EFF000
trusted library allocation
page read and write
7FFD9B986000
trusted library allocation
page read and write
1B82C000
stack
page read and write
F46000
stack
page read and write
925000
heap
page read and write
11FA000
heap
page read and write
11F0000
heap
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
11B6000
stack
page read and write
7FFD9BB2C000
trusted library allocation
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
8FD000
heap
page read and write
925000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1340000
heap
page read and write
925000
heap
page read and write
1C170000
heap
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
1B920000
heap
page execute and read and write
268A000
heap
page read and write
2393000
stack
page read and write
1BF30000
heap
page read and write
15C0000
heap
page read and write
1BEAF000
stack
page read and write
7FFD9BB2A000
trusted library allocation
page read and write
12E33000
trusted library allocation
page read and write
7FFD9B993000
trusted library allocation
page execute and read and write
7FFD9BB20000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page read and write
231000
unkown
page read and write
2EC8000
trusted library allocation
page read and write
1361000
heap
page read and write
32AE000
stack
page read and write
4AC0000
heap
page read and write
1C2E5000
heap
page read and write
1C2D9000
heap
page read and write
136E000
heap
page read and write
13FA000
heap
page read and write
1CD9F000
stack
page read and write
8D8000
heap
page read and write
160F000
stack
page read and write
904000
heap
page read and write
1C1EF000
stack
page read and write
7FFD9BA3C000
trusted library allocation
page execute and read and write
2386000
stack
page read and write
30EB000
trusted library allocation
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
3379000
trusted library allocation
page read and write
1BADF000
stack
page read and write
237C000
stack
page read and write
1611000
heap
page read and write
26EB000
heap
page read and write
8FF000
heap
page read and write
1AE60000
trusted library allocation
page read and write
12FC8000
trusted library allocation
page read and write
1530000
heap
page read and write
8FB000
heap
page read and write
7FFD9BB60000
trusted library allocation
page read and write
179F000
stack
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
12E31000
trusted library allocation
page read and write
AAE000
stack
page read and write
1B8DE000
stack
page read and write
1540000
heap
page read and write
2675000
heap
page read and write
4E4E000
stack
page read and write
1C028000
heap
page read and write
FD0000
heap
page read and write
1BA2E000
stack
page read and write
1615000
heap
page read and write
12F0000
trusted library allocation
page read and write
1C2BB000
heap
page read and write
16F0000
heap
page read and write
917000
heap
page read and write
26EB000
heap
page read and write
29AE000
stack
page read and write
925000
heap
page read and write
1C183000
stack
page read and write
2AAF000
stack
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
14D0000
heap
page read and write
1C267000
heap
page read and write
1815000
heap
page read and write
7FFD9BA40000
trusted library allocation
page execute and read and write
700E000
stack
page read and write
7FFD9B993000
trusted library allocation
page read and write
1C196000
heap
page read and write
D32000
unkown
page readonly
7FFD9BA90000
trusted library allocation
page execute and read and write
8F3000
heap
page read and write
132B8000
trusted library allocation
page read and write
380000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1C201000
heap
page read and write
7FFD9BB20000
trusted library allocation
page read and write
1C36B000
heap
page read and write
1BCA0000
heap
page read and write
7FFD9BAA6000
trusted library allocation
page execute and read and write
535C000
stack
page read and write
3290000
heap
page execute and read and write
2610000
heap
page read and write
8B0000
heap
page read and write
1BFC6000
heap
page read and write
7FFD9BA96000
trusted library allocation
page execute and read and write
1630000
trusted library allocation
page read and write
7FFD9BB30000
trusted library allocation
page read and write
912000
heap
page read and write
319A000
trusted library allocation
page read and write
7FFD9BB4B000
trusted library allocation
page read and write
26FF000
heap
page read and write
2658000
heap
page read and write
1D1000
unkown
page execute read
133E000
heap
page read and write
26E1000
heap
page read and write
7FFD9BB21000
trusted library allocation
page read and write
3375000
trusted library allocation
page read and write
E02000
unkown
page readonly
443E000
stack
page read and write
4F90000
heap
page read and write
8D8000
heap
page read and write
4450000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
266B000
heap
page read and write
7FFD9BB1E000
trusted library allocation
page read and write
7FFD9B994000
trusted library allocation
page read and write
1100000
heap
page read and write
3288000
trusted library allocation
page read and write
7FFD9B98C000
trusted library allocation
page read and write
1C26D000
heap
page read and write
D30000
unkown
page readonly
1690000
heap
page execute and read and write
136A000
heap
page read and write
1D1000
unkown
page execute read
7FFD9B9AB000
trusted library allocation
page execute and read and write
7FFD9B983000
trusted library allocation
page execute and read and write
7FFD9BB60000
trusted library allocation
page read and write
90F000
heap
page read and write
7FFD9BA46000
trusted library allocation
page read and write
7FFD9B993000
trusted library allocation
page execute and read and write
2672000
heap
page read and write
D49000
heap
page read and write
135C000
heap
page read and write
4D4E000
stack
page read and write
1C294000
heap
page read and write
7FFD9B983000
trusted library allocation
page execute and read and write
BAF000
stack
page read and write
10D0000
heap
page read and write
1650000
trusted library allocation
page read and write
6FB000
stack
page read and write
7FFD9BA30000
trusted library allocation
page read and write
132A1000
trusted library allocation
page read and write
26EB000
heap
page read and write
3EE000
stack
page read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
4BDF000
heap
page read and write
16B5000
heap
page read and write
7FFD9BAC1000
trusted library allocation
page execute and read and write
137F000
heap
page read and write
7FFD9B9EC000
trusted library allocation
page execute and read and write
1C290000
heap
page read and write
11CF000
heap
page read and write
2C07000
heap
page read and write
90D000
heap
page read and write
31BD000
trusted library allocation
page read and write
12FD1000
trusted library allocation
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
1387000
heap
page read and write
915000
heap
page read and write
1C38B000
heap
page read and write
95C000
heap
page read and write
265C000
heap
page read and write
1BFA5000
heap
page read and write
7FFD9B982000
trusted library allocation
page read and write
710E000
stack
page read and write
132B000
heap
page read and write
266B000
heap
page read and write
938000
heap
page read and write
7FFD9BB70000
trusted library allocation
page read and write
1B9DF000
stack
page read and write
7FFD9B9EC000
trusted library allocation
page execute and read and write
2795000
heap
page read and write
7FFD9BB43000
trusted library allocation
page read and write
2F05000
trusted library allocation
page read and write
1165000
heap
page read and write
31EC000
trusted library allocation
page read and write
4AC2000
heap
page read and write
2C00000
heap
page read and write
1620000
trusted library allocation
page read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
1BFE5000
heap
page read and write
7FFD9BB51000
trusted library allocation
page read and write
264E000
heap
page read and write
FD0000
heap
page read and write
916000
heap
page read and write
276E000
stack
page read and write
915000
heap
page read and write
12E3D000
trusted library allocation
page read and write
2380000
stack
page read and write
18AE000
stack
page read and write
26DF000
heap
page read and write
26DF000
heap
page read and write
1BFD5000
heap
page read and write
32FA000
trusted library allocation
page read and write
13231000
trusted library allocation
page read and write
7FFD9BAB6000
trusted library allocation
page execute and read and write
1C1AA000
heap
page read and write
15CB000
heap
page read and write
DB6000
stack
page read and write
1BFE3000
stack
page read and write
91C000
heap
page read and write
1366000
heap
page read and write
15E3000
heap
page read and write
26DF000
heap
page read and write
3363000
trusted library allocation
page read and write
1110000
heap
page read and write
296E000
stack
page read and write
13A6000
heap
page read and write
7FFD9B9DC000
trusted library allocation
page execute and read and write
13B2000
heap
page read and write
134D000
heap
page read and write
7FFD9B973000
trusted library allocation
page execute and read and write
15E0000
heap
page read and write
1C2F3000
heap
page read and write
1B7BD000
stack
page read and write
7FFD9BA56000
trusted library allocation
page execute and read and write
7FFD9B993000
trusted library allocation
page read and write
1BC2E000
stack
page read and write
7FFD9BAA1000
trusted library allocation
page execute and read and write
1368000
heap
page read and write
1BCD3000
stack
page read and write
1B54C000
stack
page read and write
7FFD9BA9A000
trusted library allocation
page execute and read and write
7FFD9BB23000
trusted library allocation
page read and write
1BDAE000
stack
page read and write
4BD5000
heap
page read and write
3396000
trusted library allocation
page read and write
912000
heap
page read and write
333F000
trusted library allocation
page read and write
7FFD9B9A3000
trusted library allocation
page read and write
7FFD9B998000
trusted library allocation
page read and write
268A000
heap
page read and write
232000
unkown
page readonly
8FF000
heap
page read and write
330C000
trusted library allocation
page read and write
11FC000
heap
page read and write
1610000
heap
page read and write
8F1000
heap
page read and write
1C390000
heap
page read and write
17A5000
heap
page read and write
2BA1000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page read and write
938000
heap
page read and write
26DF000
heap
page read and write
1BCA0000
heap
page read and write
47EE000
stack
page read and write
902000
heap
page read and write
1130000
heap
page read and write
7FFD9BA46000
trusted library allocation
page read and write
1366000
heap
page read and write
1650000
trusted library allocation
page read and write
26EB000
heap
page read and write
7FFD9BB2C000
trusted library allocation
page read and write
730C000
stack
page read and write
132B1000
trusted library allocation
page read and write
D40000
heap
page read and write
8F9000
heap
page read and write
1340000
heap
page read and write
1B83D000
stack
page read and write
8F5000
heap
page read and write
7FFD9B988000
trusted library allocation
page read and write
8F0000
heap
page read and write
1C23A000
heap
page read and write
26B1000
heap
page read and write
7FFD9BA76000
trusted library allocation
page execute and read and write
1C0EE000
stack
page read and write
1BFA2000
heap
page read and write
2672000
heap
page read and write
233000
unkown
page readonly
265D000
heap
page read and write
23AA000
stack
page read and write
2688000
heap
page read and write
1C2AF000
heap
page read and write
1B2D0000
trusted library allocation
page read and write
2658000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
7FFD9B99C000
trusted library allocation
page read and write
925000
heap
page read and write
32FD000
trusted library allocation
page read and write
1B7A0000
heap
page execute and read and write
316E000
stack
page read and write
1BB2F000
stack
page read and write
11BA000
heap
page read and write
7FFD9B97D000
trusted library allocation
page execute and read and write
153E000
stack
page read and write
12FC1000
trusted library allocation
page read and write
4AA0000
heap
page read and write
7FFD9B9DC000
trusted library allocation
page execute and read and write
2C70000
trusted library allocation
page read and write
2648000
heap
page read and write
8ED000
heap
page read and write
4ECD000
stack
page read and write
1300000
heap
page read and write
1C17F000
heap
page read and write
15A6000
heap
page read and write
2672000
heap
page read and write
328E000
trusted library allocation
page read and write
1CE9B000
stack
page read and write
7FFD9B992000
trusted library allocation
page read and write
7FFD9B9AB000
trusted library allocation
page execute and read and write
32FC000
trusted library allocation
page read and write
2F9F000
stack
page read and write
FB0000
heap
page read and write
12E38000
trusted library allocation
page read and write
2FB0000
heap
page execute and read and write
91B000
heap
page read and write
1C28E000
stack
page read and write
1BFBB000
heap
page read and write
1C22E000
heap
page read and write
160C000
heap
page read and write
7FFD9B9BB000
trusted library allocation
page execute and read and write
1810000
heap
page read and write
17A0000
heap
page read and write
1300000
heap
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
30A0000
heap
page read and write
3369000
trusted library allocation
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
26E1000
heap
page read and write
90A000
heap
page read and write
F80000
heap
page read and write
1BCE0000
heap
page read and write
15E6000
heap
page read and write
232000
unkown
page write copy
7FFD9B9A3000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
26FF000
heap
page read and write
925000
heap
page read and write
132A3000
trusted library allocation
page read and write
F80000
heap
page read and write
7FFD9B984000
trusted library allocation
page read and write
80D000
stack
page read and write
1D0000
unkown
page readonly
D30000
unkown
page readonly
16F4000
heap
page read and write
26E1000
heap
page read and write
7FFD9B994000
trusted library allocation
page read and write
545C000
stack
page read and write
4F8E000
stack
page read and write
1C38E000
stack
page read and write
1323D000
trusted library allocation
page read and write
FD0000
heap
page read and write
8FA000
heap
page read and write
4A90000
trusted library allocation
page read and write
7FFD9B9CC000
trusted library allocation
page execute and read and write
20E000
unkown
page read and write
7FFD9BB33000
trusted library allocation
page read and write
2BE0000
heap
page read and write
7FFD9BB4B000
trusted library allocation
page read and write
2790000
heap
page read and write
7FFD9BA36000
trusted library allocation
page read and write
1180000
trusted library allocation
page read and write
2EF9000
trusted library allocation
page read and write
1BF5A000
heap
page read and write
31A0000
heap
page read and write
7FFD9BA66000
trusted library allocation
page execute and read and write
FB0000
heap
page read and write
3070000
trusted library allocation
page read and write
7FFD9BAAA000
trusted library allocation
page execute and read and write
43FE000
stack
page read and write
2C0B000
heap
page read and write
D50000
heap
page read and write
2628000
heap
page read and write
7FFD9BB2E000
trusted library allocation
page read and write
26E1000
heap
page read and write
7FFD9BB68000
trusted library allocation
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
203000
unkown
page readonly
26EB000
heap
page read and write
1BBD4000
stack
page read and write
26FF000
heap
page read and write
31E0000
heap
page execute and read and write
8B8000
heap
page read and write
2B30000
heap
page read and write
3343000
trusted library allocation
page read and write
1BF7C000
heap
page read and write
8D1000
heap
page read and write
1BFA4000
stack
page read and write
16E0000
heap
page read and write
164B000
heap
page read and write
90F000
heap
page read and write
18CF000
stack
page read and write
2689000
heap
page read and write
4E8D000
stack
page read and write
2720000
heap
page readonly
1308000
heap
page read and write
1590000
trusted library allocation
page read and write
1C1AF000
heap
page read and write
7FFD9B9AC000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
1BD29000
stack
page read and write
7FFD9BB53000
trusted library allocation
page read and write
1B2E0000
trusted library allocation
page read and write
2E2F000
stack
page read and write
14F0000
heap
page read and write
12F6000
stack
page read and write
7FF426FE0000
trusted library allocation
page execute and read and write
900000
heap
page read and write
2C40000
trusted library allocation
page read and write
2397000
stack
page read and write
370000
heap
page read and write
1BC8E000
stack
page read and write
7FFD9BB1C000
trusted library allocation
page read and write
3316000
trusted library allocation
page read and write
7FFD9BB53000
trusted library allocation
page read and write
7FFD9BB3C000
trusted library allocation
page read and write
1BF83000
heap
page read and write
1C024000
heap
page read and write
7FFD9BB26000
trusted library allocation
page read and write
119C000
heap
page read and write
4ACB000
heap
page read and write
1310000
trusted library allocation
page read and write
1C1A3000
stack
page read and write
7FFD9BB3E000
trusted library allocation
page read and write
30A0000
heap
page execute and read and write
7FFD9BA4C000
trusted library allocation
page execute and read and write
3016000
trusted library allocation
page read and write
3219000
trusted library allocation
page read and write
7FFD9BA26000
trusted library allocation
page read and write
3300000
trusted library allocation
page read and write
1C084000
stack
page read and write
1B8CF000
stack
page read and write
266B000
heap
page read and write
1D0000
unkown
page readonly
910000
heap
page read and write
4AD0000
heap
page read and write
1C3E4000
heap
page read and write
1CB6F000
stack
page read and write
3393000
trusted library allocation
page read and write
13AE000
heap
page read and write
22A6000
stack
page read and write
6710000
trusted library allocation
page read and write
7FFD9BB3C000
trusted library allocation
page read and write
1AFF0000
trusted library allocation
page read and write
2BE4000
heap
page read and write
3A0000
heap
page read and write
There are 651 hidden memdumps, click here to show them.