IOC Report
GuChedO8gw.exe

loading gif

Files

File Path
Type
Category
Malicious
GuChedO8gw.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\PorgramFilp\Start windows.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\PorgramFilp\hGvQFPreOtyfi.vbe
data
dropped
malicious
C:\Recovery\GRTlwePDrukwlpsj.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\.ms-ad\GRTlwePDrukwlpsj.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Resources\Themes\aero\en-GB\GRTlwePDrukwlpsj.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Vss\Writers\System\dwm.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\PorgramFilp\9aZCj3sb9RsPaMjByAWr5t0Ylb5q.bat
ASCII text, with no line terminators
dropped
C:\Recovery\3f98c1a9b9dc02
ASCII text, with very long lines (319), with no line terminators
dropped
C:\Users\user\.ms-ad\3f98c1a9b9dc02
ASCII text, with very long lines (382), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\GRTlwePDrukwlpsj.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Start windows.exe.log
CSV text
dropped
C:\Windows\Resources\Themes\aero\en-GB\3f98c1a9b9dc02
ASCII text, with no line terminators
dropped
C:\Windows\Vss\Writers\System\6cb0b6c459d5d3
ASCII text, with no line terminators
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\GuChedO8gw.exe
"C:\Users\user\Desktop\GuChedO8gw.exe"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\PorgramFilp\hGvQFPreOtyfi.vbe"
malicious
C:\PorgramFilp\Start windows.exe
"C:\PorgramFilp\Start windows.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "GRTlwePDrukwlpsjG" /sc MINUTE /mo 13 /tr "'C:\Recovery\GRTlwePDrukwlpsj.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "GRTlwePDrukwlpsj" /sc ONLOGON /tr "'C:\Recovery\GRTlwePDrukwlpsj.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "GRTlwePDrukwlpsjG" /sc MINUTE /mo 13 /tr "'C:\Recovery\GRTlwePDrukwlpsj.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "GRTlwePDrukwlpsjG" /sc MINUTE /mo 14 /tr "'C:\Users\user\.ms-ad\GRTlwePDrukwlpsj.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "GRTlwePDrukwlpsj" /sc ONLOGON /tr "'C:\Users\user\.ms-ad\GRTlwePDrukwlpsj.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "GRTlwePDrukwlpsjG" /sc MINUTE /mo 5 /tr "'C:\Users\user\.ms-ad\GRTlwePDrukwlpsj.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "GRTlwePDrukwlpsjG" /sc MINUTE /mo 7 /tr "'C:\Windows\Resources\Themes\aero\en-GB\GRTlwePDrukwlpsj.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "GRTlwePDrukwlpsj" /sc ONLOGON /tr "'C:\Windows\Resources\Themes\aero\en-GB\GRTlwePDrukwlpsj.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "GRTlwePDrukwlpsjG" /sc MINUTE /mo 7 /tr "'C:\Windows\Resources\Themes\aero\en-GB\GRTlwePDrukwlpsj.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\Windows\Vss\Writers\System\dwm.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\Vss\Writers\System\dwm.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Windows\Vss\Writers\System\dwm.exe'" /rl HIGHEST /f
malicious
C:\Users\user\.ms-ad\GRTlwePDrukwlpsj.exe
"C:\Users\user\.ms-ad\GRTlwePDrukwlpsj.exe"
malicious
C:\Windows\Resources\Themes\aero\en-GB\GRTlwePDrukwlpsj.exe
C:\Windows\Resources\Themes\aero\en-GB\GRTlwePDrukwlpsj.exe
malicious
C:\Windows\Resources\Themes\aero\en-GB\GRTlwePDrukwlpsj.exe
C:\Windows\Resources\Themes\aero\en-GB\GRTlwePDrukwlpsj.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\PorgramFilp\9aZCj3sb9RsPaMjByAWr5t0Ylb5q.bat" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://ct22043.tw1.ru/L1nc0In.php?6BbcjLogDDtPo=Fd549N3r9MQ1pYXccu7QADyCUtM&bYPJMm=AT576ePBOLrgPJ&k8RX0Bo3kQAtPl7GpD8=IhwAwvCj1mN7A&2f0632626ea5746bbfc407820d00cbdf=QZlRTO0IjZhFGNmJTM1ITNwQGO5YGZ0EzY2UzMmRGMwY2MiFmZlhzN0kjM4EDOzIDNxQjMxIDO&997ff955e676098e9264285c401e2329=gY0QmMzATYiRjZiVTM3EzN5UGMzczY3MTNyMDO4cTM3MzNwEDOhJGN&9dcf16bdacda8ca59d8884bac0eb3ad2=0VfiIiOiIGNjZDO3MDZwYjYlNTOzYjYyIGZkZmZhNzM1QzN3MzMiwiIiBDZ4MmZyAjN1ADZ4AzMhZjM2IzYzUGOhJmZjlTOwUjZ2ImN5gjYyIiOiYjM2QWO4QWN1UWMlJ2Y4ADMiRzMhNjZzUzYmRDMjFTMiwiIhFzM5EGO4UTMmRzMhRDNxETOlNWYiVTM1cjM3YDOiZTYmBTYhNjY0IiOiETZ2MWN4IGZlRTZycTOiJGO5YGOzY2NkJmYhlTZlZWMis3W
5.23.50.27
http://ct22043.tw1.ru/L1nc0In.php?6BbcjLogDDtPo=Fd549N3r9MQ1pYXccu7QADyCUtM&bYPJMm=AT576ePBOLrgPJ&k8RX0Bo3kQAtPl7GpD8=IhwAwvCj1mN7A&2f0632626ea5746bbfc407820d00cbdf=QZlRTO0IjZhFGNmJTM1ITNwQGO5YGZ0EzY2UzMmRGMwY2MiFmZlhzN0kjM4EDOzIDNxQjMxIDO&997ff955e676098e9264285c401e2329=gY0QmMzATYiRjZiVTM3EzN5UGMzczY3MTNyMDO4cTM3MzNwEDOhJGN&9dcf16bdacda8ca59d8884bac0eb3ad2=QX9JSUNJiOiIGNjZDO3MDZwYjYlNTOzYjYyIGZkZmZhNzM1QzN3MzMiwiI0QDM3QmY2QzYmZGZ0ETMlN2MycDZmRjYiFGMkVTZ1MWN1EmN3cjNmJiOiYjM2QWO4QWN1UWMlJ2Y4ADMiRzMhNjZzUzYmRDMjFTMiwiIhFzM5EGO4UTMmRzMhRDNxETOlNWYiVTM1cjM3YDOiZTYmBTYhNjY0IiOiETZ2MWN4IGZlRTZycTOiJGO5YGOzY2NkJmYhlTZlZWMis3W
5.23.50.27
http://ct22043.tw1.ru/@==gbJBzYuFDT
http://ct22043.tw1.ru/L1nc0In.php?6BbcjLogDDtPo=Fd549N3r9MQ1pYXccu7QADyCUtM&bYPJMm=AT576ePBOLrgPJ&k8RX0Bo3kQAtPl7GpD8=IhwAwvCj1mN7A&2f0632626ea5746bbfc407820d00cbdf=QZlRTO0IjZhFGNmJTM1ITNwQGO5YGZ0EzY2UzMmRGMwY2MiFmZlhzN0kjM4EDOzIDNxQjMxIDO&997ff955e676098e9264285c401e2329=gY0QmMzATYiRjZiVTM3EzN5UGMzczY3MTNyMDO4cTM3MzNwEDOhJGN&92fda40e6b16f4d34cf8dfce35a9d7c7=d1nI0QDM3QmY2QzYmZGZ0ETMlN2MycDZmRjYiFGMkVTZ1MWN1EmN3cjNmJiOiYjM2QWO4QWN1UWMlJ2Y4ADMiRzMhNjZzUzYmRDMjFTMiwiIhFzM5EGO4UTMmRzMhRDNxETOlNWYiVTM1cjM3YDOiZTYmBTYhNjY0IiOiETZ2MWN4IGZlRTZycTOiJGO5YGOzY2NkJmYhlTZlZWMis3W
5.23.50.27
http://ct22043.tw1.ru/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ct22043.tw1.ru/L1nc0In.php?6BbcjLogDDtPo=Fd549N3r9MQ1pYXccu7QADyCUtM&bYPJMm=AT576ePBOLrgPJ&k8RX0Bo3kQAtPl7GpD8=IhwAwvCj1mN7A&2f0632626ea5746bbfc407820d00cbdf=QZlRTO0IjZhFGNmJTM1ITNwQGO5YGZ0EzY2UzMmRGMwY2MiFmZlhzN0kjM4EDOzIDNxQjMxIDO&997ff955e676098e9264285c401e2329=gY0QmMzATYiRjZiVTM3EzN5UGMzczY3MTNyMDO4cTM3MzNwEDOhJGN
5.23.50.27
http://ct22043.tw1.ru
unknown
http://ct22043.tw1.ru/L1nc0In.php?6BbcjLogDDtPo=Fd549N3r9MQ1pYXccu7QADyCUtM&bYPJMm=AT576ePBOLrgPJ&k8
unknown

Domains

Name
IP
Malicious
ct22043.tw1.ru
5.23.50.27

IPs

IP
Domain
Country
Malicious
5.23.50.27
ct22043.tw1.ru
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\9dd4c606a4178609535b2bc445593de0d3f84732
811150a20f8b6c66fefb45a349545a1d3b76b566
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GRTlwePDrukwlpsj_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GRTlwePDrukwlpsj_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GRTlwePDrukwlpsj_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GRTlwePDrukwlpsj_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GRTlwePDrukwlpsj_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GRTlwePDrukwlpsj_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GRTlwePDrukwlpsj_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GRTlwePDrukwlpsj_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GRTlwePDrukwlpsj_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GRTlwePDrukwlpsj_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GRTlwePDrukwlpsj_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GRTlwePDrukwlpsj_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GRTlwePDrukwlpsj_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GRTlwePDrukwlpsj_RASMANCS
FileDirectory
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
35B6000
trusted library allocation
page read and write
malicious
3011000
trusted library allocation
page read and write
malicious
3401000
trusted library allocation
page read and write
malicious
2691000
trusted library allocation
page read and write
malicious
2751000
trusted library allocation
page read and write
malicious
28DC000
trusted library allocation
page read and write
malicious
2511000
trusted library allocation
page read and write
malicious
2571000
trusted library allocation
page read and write
malicious
282A000
trusted library allocation
page read and write
malicious
2531000
trusted library allocation
page read and write
malicious
264F000
trusted library allocation
page read and write
malicious
280D000
trusted library allocation
page read and write
malicious
29B2000
trusted library allocation
page read and write
malicious
267B000
trusted library allocation
page read and write
malicious
2665000
trusted library allocation
page read and write
malicious
25B9000
trusted library allocation
page read and write
malicious
305A000
trusted library allocation
page read and write
malicious
25DB000
trusted library allocation
page read and write
malicious
283F000
trusted library allocation
page read and write
malicious
2B9B000
heap
page read and write
716A000
heap
page read and write
7FF848EC6000
trusted library allocation
page read and write
7FF848E17000
trusted library allocation
page read and write
1BF7E000
stack
page read and write
781B000
stack
page read and write
BCE000
heap
page read and write
2B95000
heap
page read and write
12582000
trusted library allocation
page read and write
84E000
heap
page read and write
1B07E000
stack
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
770000
heap
page read and write
7FF848FAC000
trusted library allocation
page read and write
C51000
heap
page read and write
1C39C000
heap
page read and write
246E000
stack
page read and write
BCF000
heap
page read and write
1C365000
heap
page read and write
85B000
heap
page read and write
10F6000
stack
page read and write
4E70000
heap
page read and write
7FF848E14000
trusted library allocation
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
7FF848FC7000
trusted library allocation
page read and write
BB5000
heap
page read and write
178E000
stack
page read and write
1C3A4000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
79A000
heap
page read and write
1C2B7000
heap
page read and write
E7E000
stack
page read and write
2B91000
heap
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
755E000
stack
page read and write
C51000
heap
page read and write
1B5C0000
heap
page read and write
24A0000
heap
page read and write
3187000
heap
page read and write
BBF000
heap
page read and write
1C34B000
heap
page read and write
1BDCE000
stack
page read and write
7FF848E00000
trusted library allocation
page read and write
4DB0000
heap
page read and write
C6F000
heap
page read and write
7FF848E2B000
trusted library allocation
page execute and read and write
7FF848E04000
trusted library allocation
page read and write
3200000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
1B9DF000
stack
page read and write
7FF848FB0000
trusted library allocation
page read and write
2749000
trusted library allocation
page read and write
C5B000
heap
page read and write
1C3F0000
heap
page read and write
2A69000
trusted library allocation
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
EB3000
unkown
page readonly
12511000
trusted library allocation
page read and write
3180000
heap
page read and write
7FF848F15000
trusted library allocation
page execute and read and write
7FF848E5C000
trusted library allocation
page execute and read and write
1301D000
trusted library allocation
page read and write
2BA8000
heap
page read and write
4DB4000
heap
page read and write
47A0000
heap
page read and write
1C355000
heap
page read and write
1B98C000
stack
page read and write
BCA000
heap
page read and write
24E0000
heap
page execute and read and write
7FF848E12000
trusted library allocation
page read and write
B32000
stack
page read and write
721000
heap
page read and write
EB3000
unkown
page readonly
7FF848FD0000
trusted library allocation
page read and write
2B11000
trusted library allocation
page read and write
2D8E000
stack
page read and write
1AE90000
heap
page read and write
2B78000
heap
page read and write
3456000
trusted library allocation
page read and write
A3E000
stack
page read and write
52D0000
heap
page read and write
EE2000
unkown
page readonly
1BBDA000
stack
page read and write
E80000
unkown
page readonly
3459000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
25CF000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page read and write
148F000
stack
page read and write
1C332000
heap
page read and write
14E0000
heap
page execute and read and write
7FF848FBC000
trusted library allocation
page read and write
2BEB000
heap
page read and write
7FF848FD8000
trusted library allocation
page read and write
15D5000
heap
page read and write
13013000
trusted library allocation
page read and write
12578000
trusted library allocation
page read and write
1B430000
trusted library allocation
page read and write
2BA0000
heap
page read and write
1C97B000
stack
page read and write
B90000
heap
page read and write
7FF848EB6000
trusted library allocation
page read and write
1C3BF000
heap
page read and write
1290000
heap
page read and write
7FF848EC0000
trusted library allocation
page read and write
857000
heap
page read and write
1B17E000
stack
page read and write
1AF70000
heap
page execute and read and write
7FF848FB3000
trusted library allocation
page read and write
71C000
heap
page read and write
2AE6000
trusted library allocation
page read and write
7166000
heap
page read and write
7166000
heap
page read and write
1C372000
heap
page read and write
2E20000
heap
page read and write
C52000
heap
page read and write
2BD8000
heap
page read and write
2BB6000
heap
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
C6F000
heap
page read and write
4DAA000
trusted library allocation
page read and write
AA0000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
2BD8000
heap
page read and write
B3A000
stack
page read and write
10A4000
unkown
page readonly
17E0000
heap
page read and write
C52000
heap
page read and write
9B0000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
6DC000
heap
page read and write
57AC000
stack
page read and write
1C380000
heap
page read and write
7FF848EB6000
trusted library allocation
page read and write
B10000
stack
page read and write
630000
heap
page read and write
1298000
heap
page read and write
1A5A0000
trusted library allocation
page read and write
BCA000
heap
page read and write
2BD8000
heap
page read and write
C6F000
heap
page read and write
11F0000
heap
page read and write
7FF848E08000
trusted library allocation
page read and write
2F8E000
stack
page read and write
2BB2000
heap
page read and write
4F0F000
stack
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
6851000
heap
page read and write
7FF848FD0000
trusted library allocation
page read and write
759E000
stack
page read and write
7FF848FAC000
trusted library allocation
page read and write
2360000
trusted library allocation
page read and write
1C2DC000
heap
page read and write
52CF000
stack
page read and write
7FF848FE8000
trusted library allocation
page read and write
1605000
heap
page read and write
354F000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
1B395000
stack
page read and write
52E0000
heap
page read and write
2B97000
heap
page read and write
1251D000
trusted library allocation
page read and write
B2A000
stack
page read and write
12AB000
heap
page read and write
650000
heap
page read and write
2AC2000
trusted library allocation
page read and write
EC4000
unkown
page read and write
1B5BD000
heap
page read and write
7FF848F25000
trusted library allocation
page execute and read and write
7FF848FB3000
trusted library allocation
page read and write
2AD9000
trusted library allocation
page read and write
16E5000
heap
page read and write
473E000
stack
page read and write
C5B000
heap
page read and write
1C3AD000
heap
page read and write
2BAA000
heap
page read and write
2B1E000
stack
page read and write
7FF848E03000
trusted library allocation
page read and write
1B10000
heap
page read and write
1BF73000
stack
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
2AA7000
trusted library allocation
page read and write
2BAC000
heap
page read and write
BAF000
stack
page read and write
2640000
trusted library allocation
page read and write
76DE000
stack
page read and write
7FF849050000
trusted library allocation
page read and write
7FF848F31000
trusted library allocation
page execute and read and write
1B5DF000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
2BEB000
heap
page read and write
EBE000
unkown
page write copy
7FF848E1D000
trusted library allocation
page execute and read and write
1525000
heap
page read and write
1B8DE000
stack
page read and write
C50000
heap
page read and write
77DF000
stack
page read and write
7FF848FBA000
trusted library allocation
page read and write
197E000
stack
page read and write
1870000
heap
page read and write
1C87E000
stack
page read and write
1C319000
heap
page read and write
12571000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page execute and read and write
11E6000
stack
page read and write
7FF848F9E000
trusted library allocation
page read and write
1C308000
heap
page read and write
1540000
heap
page read and write
7167000
heap
page read and write
1874000
heap
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
7FF848E0D000
trusted library allocation
page execute and read and write
2AD0000
heap
page read and write
1270000
trusted library allocation
page read and write
9C0000
trusted library allocation
page read and write
316E000
stack
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
1520000
heap
page read and write
1C33F000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
1C3B9000
heap
page read and write
2BAE000
heap
page read and write
760000
heap
page read and write
13408000
trusted library allocation
page read and write
1C0EC000
heap
page read and write
7FF848FAA000
trusted library allocation
page read and write
1A89E000
heap
page read and write
7FF848E13000
trusted library allocation
page read and write
2BD8000
heap
page read and write
7FF849004000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
2B9D000
heap
page read and write
6BC000
heap
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
7FF848EA0000
trusted library allocation
page read and write
A90000
trusted library allocation
page read and write
1C322000
heap
page read and write
7FF848F2B000
trusted library allocation
page execute and read and write
7FF849000000
trusted library allocation
page read and write
FD0000
unkown
page readonly
2646000
trusted library allocation
page read and write
776000
heap
page read and write
2BD8000
heap
page read and write
1C392000
heap
page read and write
A36000
stack
page read and write
1C336000
heap
page read and write
ADF000
stack
page read and write
1650000
heap
page read and write
7FF848E30000
trusted library allocation
page read and write
B28000
stack
page read and write
765000
heap
page read and write
1500000
heap
page read and write
1340D000
trusted library allocation
page read and write
28D6000
trusted library allocation
page read and write
4D6E000
stack
page read and write
1520000
heap
page read and write
2400000
heap
page read and write
33FE000
stack
page read and write
AFC000
stack
page read and write
12573000
trusted library allocation
page read and write
1B5FF000
heap
page read and write
160C000
heap
page read and write
990000
trusted library allocation
page read and write
125C3000
trusted library allocation
page read and write
7FF848F1B000
trusted library allocation
page execute and read and write
1B593000
stack
page read and write
B00000
heap
page read and write
1B274000
stack
page read and write
7FF848FC3000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
E1D000
stack
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
2AF2000
trusted library allocation
page read and write
1C312000
heap
page read and write
7FF848F21000
trusted library allocation
page execute and read and write
2B96000
heap
page read and write
C5B000
heap
page read and write
25CD000
trusted library allocation
page read and write
25AC000
trusted library allocation
page read and write
769F000
stack
page read and write
1BE7E000
stack
page read and write
7FF848E14000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
2B99000
heap
page read and write
620000
heap
page read and write
B98000
heap
page read and write
7FF849060000
trusted library allocation
page execute and read and write
EE3000
unkown
page readonly
2560000
heap
page read and write
670000
heap
page read and write
EE1000
unkown
page read and write
11D0000
heap
page read and write
6860000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
7FF848FB6000
trusted library allocation
page read and write
3588000
trusted library allocation
page read and write
16A0000
heap
page execute and read and write
55D0000
heap
page read and write
2BEB000
heap
page read and write
32F0000
heap
page execute and read and write
2D4E000
stack
page read and write
C5B000
heap
page read and write
7FF848FA5000
trusted library allocation
page read and write
7DD000
heap
page read and write
12CB000
heap
page read and write
1C38D000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
1C2C1000
heap
page read and write
7FF848F1F000
trusted library allocation
page execute and read and write
7FF848FA3000
trusted library allocation
page read and write
2B71000
heap
page read and write
7FF848FB0000
trusted library allocation
page read and write
12F8000
heap
page read and write
1C2AA000
heap
page read and write
BCA000
heap
page read and write
7FF848E27000
trusted library allocation
page read and write
1C29C000
heap
page read and write
13401000
trusted library allocation
page read and write
7DB000
heap
page read and write
2B20000
heap
page read and write
EBE000
unkown
page read and write
7FF848ED0000
trusted library allocation
page execute and read and write
13011000
trusted library allocation
page read and write
17B0000
trusted library allocation
page read and write
4E0F000
stack
page read and write
2AB0000
trusted library allocation
page read and write
B06000
stack
page read and write
7FF848E02000
trusted library allocation
page read and write
C22000
heap
page read and write
2A41000
trusted library allocation
page read and write
745D000
stack
page read and write
29F0000
heap
page read and write
566F000
stack
page read and write
1BE70000
heap
page execute and read and write
1BB7F000
stack
page read and write
BE8000
heap
page read and write
2B58000
heap
page read and write
3000000
heap
page read and write
2B3B000
trusted library allocation
page read and write
125A2000
trusted library allocation
page read and write
7FF848E18000
trusted library allocation
page read and write
508D000
stack
page read and write
7FF848FC0000
trusted library allocation
page read and write
9E0000
heap
page read and write
1790000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
7FF848FD0000
trusted library allocation
page read and write
2BEB000
heap
page read and write
17F0000
trusted library allocation
page read and write
2BB7000
heap
page read and write
1C174000
stack
page read and write
CA0000
heap
page read and write
2A81000
trusted library allocation
page read and write
BFA000
heap
page read and write
C6F000
heap
page read and write
9E4000
heap
page read and write
7FF848E06000
trusted library allocation
page read and write
7FF848FCB000
trusted library allocation
page read and write
7FF848E2B000
trusted library allocation
page execute and read and write
2BB5000
heap
page read and write
85B000
stack
page read and write
7FF848FB0000
trusted library allocation
page read and write
1B294000
stack
page read and write
6B0000
heap
page read and write
1257D000
trusted library allocation
page read and write
28B6000
trusted library allocation
page read and write
2B97000
heap
page read and write
7B0000
heap
page read and write
BE8000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
BE8000
heap
page read and write
2B91000
heap
page read and write
2B92000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
1C2F1000
heap
page read and write
7FF848E3B000
trusted library allocation
page execute and read and write
2AEE000
trusted library allocation
page read and write
7FF848DF6000
trusted library allocation
page read and write
C52000
heap
page read and write
2AE2000
trusted library allocation
page read and write
56AC000
stack
page read and write
C52000
heap
page read and write
7FF848EAC000
trusted library allocation
page execute and read and write
C51000
heap
page read and write
2B78000
heap
page read and write
7FF848DF0000
trusted library allocation
page read and write
13411000
trusted library allocation
page read and write
1C2D8000
heap
page read and write
2B52000
trusted library allocation
page read and write
1B49B000
stack
page read and write
97E000
stack
page read and write
2B50000
heap
page read and write
2AD5000
heap
page read and write
1C386000
heap
page read and write
BF9000
heap
page read and write
51CE000
stack
page read and write
7FF848EA6000
trusted library allocation
page read and write
1C30E000
heap
page read and write
7FF848E23000
trusted library allocation
page read and write
1C2F4000
heap
page read and write
2B99000
heap
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
2BB5000
heap
page read and write
BCA000
heap
page read and write
1BD74000
stack
page read and write
7FF848FC0000
trusted library allocation
page read and write
1210000
heap
page read and write
1C31E000
heap
page read and write
1C2DD000
stack
page read and write
2FFE000
stack
page read and write
2B92000
heap
page read and write
1AA9D000
stack
page read and write
50A0000
trusted library allocation
page read and write
6F3000
heap
page read and write
30FE000
stack
page read and write
2490000
trusted library allocation
page read and write
2E5A000
heap
page read and write
1C3F5000
heap
page read and write
740000
heap
page read and write
D00000
heap
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
A70000
heap
page execute and read and write
2B70000
heap
page read and write
1B5BE000
stack
page read and write
1600000
heap
page read and write
1C280000
heap
page read and write
1C273000
stack
page read and write
1BDDC000
stack
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
C6F000
heap
page read and write
7FF848E1C000
trusted library allocation
page read and write
1B14000
heap
page read and write
1AE20000
trusted library section
page read and write
1C07E000
stack
page read and write
B04000
heap
page read and write
9C3000
trusted library allocation
page read and write
1B5A0000
heap
page read and write
B23000
stack
page read and write
1B040000
trusted library allocation
page read and write
1CD10000
heap
page read and write
7FF848FB0000
trusted library allocation
page read and write
6F6000
stack
page read and write
478E000
stack
page read and write
710000
heap
page read and write
15D2000
heap
page read and write
318B000
heap
page read and write
1B3B3000
stack
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
7FF849000000
trusted library allocation
page read and write
1B4BE000
stack
page read and write
CFE000
stack
page read and write
2BAE000
heap
page read and write
1C347000
heap
page read and write
14A0000
trusted library allocation
page read and write
FD0000
unkown
page readonly
7FF47F600000
trusted library allocation
page execute and read and write
7FF848E1D000
trusted library allocation
page execute and read and write
7FF848FE0000
trusted library allocation
page read and write
13018000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
518E000
stack
page read and write
C52000
heap
page read and write
7E0000
heap
page read and write
2B8D000
heap
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
1A540000
trusted library allocation
page read and write
E80000
unkown
page readonly
12F6000
heap
page read and write
12CD000
heap
page read and write
1420000
heap
page read and write
779000
heap
page read and write
79F000
heap
page read and write
159C000
heap
page read and write
E81000
unkown
page execute read
BB9000
heap
page read and write
12B5000
heap
page read and write
7FF848F2F000
trusted library allocation
page execute and read and write
2E50000
heap
page read and write
2B9C000
heap
page read and write
3E6000
stack
page read and write
7FF848DF4000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
2B8C000
heap
page read and write
1BFD4000
stack
page read and write
15BE000
heap
page read and write
A00000
heap
page execute and read and write
EE2000
unkown
page write copy
1C35E000
heap
page read and write
95B000
stack
page read and write
AA5000
heap
page read and write
1C07E000
stack
page read and write
2BD8000
heap
page read and write
162F000
stack
page read and write
7FF848FD3000
trusted library allocation
page read and write
1C77D000
stack
page read and write
2BEB000
heap
page read and write
791C000
stack
page read and write
1250000
trusted library allocation
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
7FF848EE6000
trusted library allocation
page execute and read and write
2BEB000
heap
page read and write
E81000
unkown
page execute read
47D0000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
1BA70000
heap
page read and write
7FF848FC0000
trusted library allocation
page read and write
2B9D000
heap
page read and write
7FF848FAE000
trusted library allocation
page read and write
DE0000
heap
page read and write
A40000
heap
page read and write
1AF3E000
stack
page read and write
1BC7E000
stack
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
556E000
stack
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
6F1000
heap
page read and write
23AF000
stack
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
10A0000
unkown
page readonly
C5B000
heap
page read and write
2AF7000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
46FF000
stack
page read and write
BC7000
heap
page read and write
7FF848E24000
trusted library allocation
page read and write
1335000
heap
page read and write
1B59E000
stack
page read and write
2AD3000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
D05000
heap
page read and write
7FF848FC3000
trusted library allocation
page read and write
2B93000
heap
page read and write
6DF000
heap
page read and write
7FF848E1C000
trusted library allocation
page read and write
7FF848E1B000
trusted library allocation
page execute and read and write
BBC000
heap
page read and write
4D91000
trusted library allocation
page read and write
2BB1000
heap
page read and write
4EA0000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
1C300000
heap
page read and write
2BFE000
heap
page read and write
1C305000
heap
page read and write
B17000
stack
page read and write
6850000
heap
page read and write
7FF848EB0000
trusted library allocation
page read and write
1AF9E000
stack
page read and write
2B9B000
heap
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
1590000
heap
page read and write
7060000
heap
page read and write
720000
heap
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
16E0000
heap
page read and write
7FF848FCB000
trusted library allocation
page read and write
CB0000
heap
page readonly
7FF848E20000
trusted library allocation
page read and write
1C3A8000
heap
page read and write
7FF848FC0000
trusted library allocation
page read and write
7FF848FBB000
trusted library allocation
page read and write
7FF848FB7000
trusted library allocation
page read and write
685B000
heap
page read and write
7B2000
heap
page read and write
E20000
heap
page read and write
71E000
heap
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
1AAFD000
stack
page read and write
1AE1E000
stack
page read and write
FD2000
unkown
page readonly
7FF848E2C000
trusted library allocation
page read and write
2B9F000
heap
page read and write
2B99000
heap
page read and write
1C0E0000
heap
page read and write
7FF848E04000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
7FF848E34000
trusted library allocation
page read and write
2BAF000
heap
page read and write
7FF848F93000
trusted library allocation
page read and write
2742000
trusted library allocation
page read and write
BC0000
heap
page read and write
There are 593 hidden memdumps, click here to show them.