IOC Report
e8RKyR4TEM.exe

loading gif

Files

File Path
Type
Category
Malicious
e8RKyR4TEM.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Program Files (x86)\AutoIt3\Icons\cwxyiNpEtlalxKGPbFFnB.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Common Files\DESIGNER\cwxyiNpEtlalxKGPbFFnB.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Mozilla Maintenance Service\cwxyiNpEtlalxKGPbFFnB.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows Defender\en-US\conhost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows Media Player\cwxyiNpEtlalxKGPbFFnB.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows Sidebar\Shared Gadgets\cwxyiNpEtlalxKGPbFFnB.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\WindowsHolographicDevices\SpatialStore\StartMenuExperienceHost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\RuntimeBroker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\cwxyiNpEtlalxKGPbFFnB.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Default\OneDrive\WinStore.App.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Free_changer_fix.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\grunge cheat softwsre 0.28.4.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\j7xKo0hZ28.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\cwxyiNpEtlalxKGPbFFnB.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\ShellComponents\cwxyiNpEtlalxKGPbFFnB.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\SystemApps\cwxyiNpEtlalxKGPbFFnB.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\msDriverSessionHost\RuntimeBroker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\msDriverSessionHost\chainProvider.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\msDriverSessionHost\cwxyiNpEtlalxKGPbFFnB.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\msDriverSessionHost\myVrliqnAWGzbaQrrwFJCBOXabSQn5.vbe
data
dropped
malicious
C:\Program Files (x86)\AutoIt3\Icons\b49250d0ebe870
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\Common Files\DESIGNER\b49250d0ebe870
ASCII text, with very long lines (857), with no line terminators
dropped
C:\Program Files (x86)\Mozilla Maintenance Service\b49250d0ebe870
ASCII text, with no line terminators
dropped
C:\Program Files\Windows Defender\en-US\088424020bedd6
ASCII text, with very long lines (367), with no line terminators
dropped
C:\Program Files\Windows Media Player\b49250d0ebe870
ASCII text, with very long lines (565), with no line terminators
dropped
C:\Program Files\Windows Sidebar\Shared Gadgets\b49250d0ebe870
ASCII text, with no line terminators
dropped
C:\ProgramData\WindowsHolographicDevices\SpatialStore\55b276f4edf653
ASCII text, with very long lines (761), with no line terminators
dropped
C:\Recovery\9e8d7a4ca61bd9
ASCII text, with very long lines (981), with no line terminators
dropped
C:\Recovery\b49250d0ebe870
ASCII text, with very long lines (485), with no line terminators
dropped
C:\Users\Default\OneDrive\fd168b19609dff
ASCII text, with very long lines (370), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\chainProvider.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\cwxyiNpEtlalxKGPbFFnB.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\Wa4gCbdnDV
ASCII text, with no line terminators
dropped
C:\Users\user\b49250d0ebe870
ASCII text, with very long lines (468), with no line terminators
dropped
C:\Windows\ShellComponents\b49250d0ebe870
ASCII text, with very long lines (318), with no line terminators
dropped
C:\Windows\SystemApps\b49250d0ebe870
ASCII text, with very long lines (564), with no line terminators
dropped
C:\msDriverSessionHost\9e8d7a4ca61bd9
ASCII text, with very long lines (703), with no line terminators
dropped
C:\msDriverSessionHost\LoFbtYsm9QvENfKMo8zDNNjCY.bat
ASCII text, with no line terminators
dropped
C:\msDriverSessionHost\b49250d0ebe870
ASCII text, with very long lines (891), with no line terminators
dropped
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\e8RKyR4TEM.exe
"C:\Users\user\Desktop\e8RKyR4TEM.exe"
malicious
C:\Users\user\AppData\Local\Temp\Free_changer_fix.exe
"C:\Users\user\AppData\Local\Temp\Free_changer_fix.exe"
malicious
C:\Users\user\AppData\Local\Temp\grunge cheat softwsre 0.28.4.exe
"C:\Users\user\AppData\Local\Temp\grunge cheat softwsre 0.28.4.exe"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\msDriverSessionHost\myVrliqnAWGzbaQrrwFJCBOXabSQn5.vbe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\msDriverSessionHost\chainProvider.exe
"C:\msDriverSessionHost\chainProvider.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "cwxyiNpEtlalxKGPbFFnBc" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\cwxyiNpEtlalxKGPbFFnB.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "cwxyiNpEtlalxKGPbFFnB" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\cwxyiNpEtlalxKGPbFFnB.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "cwxyiNpEtlalxKGPbFFnBc" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\cwxyiNpEtlalxKGPbFFnB.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Defender\en-US\conhost.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\en-US\conhost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Defender\en-US\conhost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "cwxyiNpEtlalxKGPbFFnBc" /sc MINUTE /mo 9 /tr "'C:\Users\user\cwxyiNpEtlalxKGPbFFnB.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "cwxyiNpEtlalxKGPbFFnB" /sc ONLOGON /tr "'C:\Users\user\cwxyiNpEtlalxKGPbFFnB.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "cwxyiNpEtlalxKGPbFFnBc" /sc MINUTE /mo 5 /tr "'C:\Users\user\cwxyiNpEtlalxKGPbFFnB.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "cwxyiNpEtlalxKGPbFFnBc" /sc MINUTE /mo 5 /tr "'C:\msDriverSessionHost\cwxyiNpEtlalxKGPbFFnB.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "cwxyiNpEtlalxKGPbFFnB" /sc ONLOGON /tr "'C:\msDriverSessionHost\cwxyiNpEtlalxKGPbFFnB.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "cwxyiNpEtlalxKGPbFFnBc" /sc MINUTE /mo 12 /tr "'C:\msDriverSessionHost\cwxyiNpEtlalxKGPbFFnB.exe'" /rl HIGHEST /f
malicious
C:\msDriverSessionHost\cwxyiNpEtlalxKGPbFFnB.exe
C:\msDriverSessionHost\cwxyiNpEtlalxKGPbFFnB.exe
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "cwxyiNpEtlalxKGPbFFnBc" /sc MINUTE /mo 8 /tr "'C:\msDriverSessionHost\cwxyiNpEtlalxKGPbFFnB.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "cwxyiNpEtlalxKGPbFFnB" /sc ONLOGON /tr "'C:\msDriverSessionHost\cwxyiNpEtlalxKGPbFFnB.exe'" /rl HIGHEST /f
malicious
C:\msDriverSessionHost\cwxyiNpEtlalxKGPbFFnB.exe
C:\msDriverSessionHost\cwxyiNpEtlalxKGPbFFnB.exe
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "cwxyiNpEtlalxKGPbFFnBc" /sc MINUTE /mo 9 /tr "'C:\msDriverSessionHost\cwxyiNpEtlalxKGPbFFnB.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\msDriverSessionHost\RuntimeBroker.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\msDriverSessionHost\RuntimeBroker.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\msDriverSessionHost\RuntimeBroker.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "cwxyiNpEtlalxKGPbFFnBc" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Media Player\cwxyiNpEtlalxKGPbFFnB.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "cwxyiNpEtlalxKGPbFFnB" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\cwxyiNpEtlalxKGPbFFnB.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "cwxyiNpEtlalxKGPbFFnBc" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Media Player\cwxyiNpEtlalxKGPbFFnB.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\WindowsHolographicDevices\SpatialStore\StartMenuExperienceHost.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Users\All Users\WindowsHolographicDevices\SpatialStore\StartMenuExperienceHost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\WindowsHolographicDevices\SpatialStore\StartMenuExperienceHost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "WinStore.AppW" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\OneDrive\WinStore.App.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "WinStore.App" /sc ONLOGON /tr "'C:\Users\Default User\OneDrive\WinStore.App.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "WinStore.AppW" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\OneDrive\WinStore.App.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "cwxyiNpEtlalxKGPbFFnBc" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\common files\DESIGNER\cwxyiNpEtlalxKGPbFFnB.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "cwxyiNpEtlalxKGPbFFnB" /sc ONLOGON /tr "'C:\Program Files (x86)\common files\DESIGNER\cwxyiNpEtlalxKGPbFFnB.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "cwxyiNpEtlalxKGPbFFnBc" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\common files\DESIGNER\cwxyiNpEtlalxKGPbFFnB.exe'" /rl HIGHEST /f
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\msDriverSessionHost\LoFbtYsm9QvENfKMo8zDNNjCY.bat" "
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 30 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://a0944507.xsph.ru/@==gbJBzYuFDT
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
https://gunaui.com/api/licensing.php
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
https://gunaui.com/
unknown
https://gunaui.com/pricing
unknown
There are 20 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\3dd588891f7c3b6535f48f2bcb75307d69a5f222
686a0e910aa468ef1e1ceea1892e55af518a2f77
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany

Memdumps

Base Address
Regiontype
Protect
Malicious
1AB4B04F000
trusted library allocation
page read and write
malicious
2FB9000
trusted library allocation
page read and write
malicious
1AB38F02000
unkown
page readonly
malicious
408000
unkown
page readonly
malicious
1AB3B043000
trusted library allocation
page read and write
malicious
1AB53B00000
trusted library section
page read and write
malicious
2705000
trusted library allocation
page read and write
malicious
2736000
trusted library allocation
page read and write
malicious
1AB4B3AB000
trusted library allocation
page read and write
malicious
2666000
heap
page read and write
malicious
1AB53A20000
trusted library section
page read and write
malicious
2F71000
trusted library allocation
page read and write
malicious
34B0000
trusted library allocation
page read and write
malicious
2F91000
trusted library allocation
page read and write
malicious
7500000
heap
page read and write
7FFD9B7D7000
trusted library allocation
page read and write
1CBCB000
stack
page read and write
887000
heap
page read and write
8BA77FF000
stack
page read and write
1AB3941D000
heap
page read and write
1BCCE000
stack
page read and write
5BE000
unkown
page read and write
1AB394E0000
trusted library allocation
page read and write
7FFD9B7BD000
trusted library allocation
page execute and read and write
945000
heap
page read and write
88D000
heap
page read and write
15F4000
heap
page read and write
1140000
heap
page read and write
1E5000
heap
page read and write
1AB535FC000
heap
page read and write
7FFD9B80C000
trusted library allocation
page execute and read and write
1AB53910000
heap
page execute and read and write
3210000
heap
page readonly
1C0BF000
heap
page read and write
1BACF000
stack
page read and write
2F5C000
stack
page read and write
CA2000
unkown
page readonly
7FFD9BA40000
trusted library allocation
page read and write
BCF000
stack
page read and write
942000
heap
page read and write
D7F000
stack
page read and write
1C079000
heap
page read and write
874000
heap
page read and write
87C000
heap
page read and write
396000
heap
page read and write
7FFD9B7C3000
trusted library allocation
page execute and read and write
366F000
stack
page read and write
989000
heap
page read and write
1C03D000
heap
page read and write
400000
unkown
page readonly
1AB53D44000
heap
page read and write
1AB5500D000
trusted library allocation
page read and write
2F8E000
stack
page read and write
DA0000
heap
page read and write
1134000
heap
page read and write
4B4F000
stack
page read and write
879000
heap
page read and write
7FFD9B963000
trusted library allocation
page read and write
1AB53720000
trusted library section
page read and write
7FFD9B9B7000
trusted library allocation
page read and write
33B9000
trusted library allocation
page read and write
1AB3B4AA000
trusted library allocation
page read and write
7FFD9B876000
trusted library allocation
page read and write
134B000
heap
page read and write
1AB53622000
heap
page read and write
87F000
heap
page read and write
858000
heap
page read and write
893000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
80E000
stack
page read and write
7FFD9B7C0000
trusted library allocation
page read and write
1AB3AF21000
trusted library allocation
page read and write
3534000
heap
page read and write
1330000
heap
page read and write
366E000
stack
page read and write
1AB393F2000
heap
page read and write
37AC000
stack
page read and write
1AB538F0000
heap
page execute and read and write
1AB52F50000
trusted library allocation
page read and write
7FFD9B992000
trusted library allocation
page read and write
7FFD9B860000
trusted library allocation
page read and write
1BABF000
stack
page read and write
875000
heap
page read and write
401000
unkown
page execute read
1BE23000
stack
page read and write
3534000
heap
page read and write
1C0AC000
heap
page read and write
7FFD9B95E000
trusted library allocation
page read and write
7FFD9B9B3000
trusted library allocation
page read and write
4C4F000
stack
page read and write
CA0000
unkown
page readonly
52E0000
heap
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
1350000
heap
page read and write
2F6C000
stack
page read and write
8BF000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
8BF000
heap
page read and write
8BA6FFE000
stack
page read and write
7FFD9B7E2000
trusted library allocation
page read and write
26EE000
stack
page read and write
9CC000
heap
page read and write
96B000
heap
page read and write
1AB39550000
heap
page read and write
524E000
stack
page read and write
1270000
heap
page read and write
1AB393DA000
heap
page read and write
1AB54E42000
trusted library allocation
page read and write
1C335000
heap
page read and write
838000
heap
page read and write
12C0000
heap
page read and write
891000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
1C203000
heap
page read and write
1AB38F3E000
unkown
page readonly
1AB53D90000
heap
page read and write
1B4FE000
stack
page read and write
6D00000
trusted library allocation
page read and write
7FFD9B8C6000
trusted library allocation
page execute and read and write
A6D000
stack
page read and write
31AB000
trusted library allocation
page read and write
1C515000
heap
page read and write
376F000
stack
page read and write
1C330000
heap
page read and write
7FFD9B98B000
trusted library allocation
page read and write
1338000
heap
page read and write
1CA2E000
stack
page read and write
1C34A000
heap
page read and write
D8F000
stack
page read and write
7FFD9B804000
trusted library allocation
page read and write
7FFD9B89C000
trusted library allocation
page execute and read and write
8BF000
heap
page read and write
5E3000
unkown
page readonly
1AB391AA000
unkown
page readonly
7FFD9BA50000
trusted library allocation
page read and write
5A1C000
stack
page read and write
7FFD9BA90000
trusted library allocation
page read and write
1AB38F00000
unkown
page readonly
1AB394D0000
trusted library allocation
page read and write
7FFD9BC70000
trusted library allocation
page read and write
12F7D000
trusted library allocation
page read and write
5A70000
heap
page read and write
1B3B4000
stack
page read and write
861000
heap
page read and write
1E0000
heap
page read and write
5B3000
unkown
page readonly
52D1000
trusted library allocation
page read and write
1BDC3000
stack
page read and write
1C4B4000
heap
page read and write
7FFD9B7C7000
trusted library allocation
page read and write
1AB393A0000
heap
page read and write
1AB39570000
heap
page read and write
323F000
stack
page read and write
890000
heap
page read and write
1C317000
heap
page read and write
1BC2E000
stack
page read and write
895000
heap
page read and write
8BA63ED000
stack
page read and write
2F60000
heap
page execute and read and write
1C368000
heap
page read and write
858000
heap
page read and write
7FFD9BAF9000
trusted library allocation
page read and write
7FFD9B7C4000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
89A000
heap
page read and write
1B4FD000
stack
page read and write
162F000
stack
page read and write
1C048000
heap
page read and write
1AB38F02000
unkown
page readonly
1358000
heap
page read and write
7FFD9B7D4000
trusted library allocation
page read and write
1100000
heap
page read and write
3256000
trusted library allocation
page read and write
52F4000
heap
page read and write
11AE000
heap
page read and write
2F75000
stack
page read and write
1C1D3000
heap
page read and write
1C1E9000
heap
page read and write
7FFD9B96A000
trusted library allocation
page read and write
8C4000
heap
page read and write
1C1CA000
heap
page read and write
1AB3AED0000
heap
page read and write
895000
heap
page read and write
883000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
9F7000
heap
page read and write
1590000
trusted library allocation
page read and write
8E8000
heap
page read and write
145E000
stack
page read and write
1355000
heap
page read and write
1C1AA000
heap
page read and write
344B000
trusted library allocation
page read and write
1C261000
heap
page read and write
353B000
heap
page read and write
1C42F000
heap
page read and write
1230000
heap
page read and write
2E2E000
stack
page read and write
7FFD9BB10000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
34AA000
heap
page read and write
1AB55220000
heap
page read and write
1C04B000
heap
page read and write
1AB53D92000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
30F0000
heap
page read and write
3347000
trusted library allocation
page read and write
7FFD9B7FD000
trusted library allocation
page execute and read and write
1570000
trusted library allocation
page read and write
1B1BE000
stack
page read and write
873000
heap
page read and write
7FFD9B890000
trusted library allocation
page read and write
1AB53650000
heap
page read and write
A2F000
stack
page read and write
1AB3957A000
heap
page read and write
77FF000
stack
page read and write
6CF7000
heap
page read and write
1AB394E3000
trusted library allocation
page read and write
8BA7BFC000
stack
page read and write
7FFD9B8E1000
trusted library allocation
page execute and read and write
5523000
heap
page read and write
591E000
stack
page read and write
87E000
heap
page read and write
1C061000
heap
page read and write
C40000
heap
page read and write
830000
heap
page read and write
7FFD9B7FC000
trusted library allocation
page read and write
1AFA0000
trusted library allocation
page read and write
1AB3AF10000
heap
page execute and read and write
7FFD9B7E3000
trusted library allocation
page execute and read and write
155E000
stack
page read and write
34D3000
trusted library allocation
page read and write
1C2EB000
heap
page read and write
2EE0000
trusted library allocation
page read and write
C7F000
stack
page read and write
860000
heap
page read and write
1AB3B48F000
trusted library allocation
page read and write
7FFD9B8E0000
trusted library allocation
page execute and read and write
1150000
heap
page read and write
87D000
heap
page read and write
3532000
heap
page read and write
12FA1000
trusted library allocation
page read and write
2FE5000
trusted library allocation
page read and write
897000
heap
page read and write
C85000
heap
page read and write
13BE000
heap
page read and write
89E000
heap
page read and write
7FFD9B7B3000
trusted library allocation
page execute and read and write
1635000
heap
page read and write
7FFD9B7C2000
trusted library allocation
page read and write
7FFD9BB44000
trusted library allocation
page read and write
1AFC0000
trusted library allocation
page read and write
8BA7FFE000
stack
page read and write
7FFD9B7E4000
trusted library allocation
page read and write
12F91000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
880000
heap
page read and write
88C000
heap
page read and write
5F6000
stack
page read and write
7FFD9BA7F000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
880000
heap
page read and write
7FFD9B866000
trusted library allocation
page read and write
580000
unkown
page readonly
1AB393BC000
heap
page read and write
6CF0000
heap
page read and write
DF0000
heap
page read and write
1630000
heap
page read and write
1AB53D20000
heap
page read and write
1C13E000
heap
page read and write
7FFD9B7D3000
trusted library allocation
page read and write
7FFD9B961000
trusted library allocation
page read and write
1AB535E6000
heap
page read and write
33D0000
heap
page read and write
3430000
heap
page read and write
7FFD9B983000
trusted library allocation
page read and write
3200000
heap
page read and write
876000
heap
page read and write
2FDE000
stack
page read and write
7FFD9B7BD000
trusted library allocation
page execute and read and write
1C234000
heap
page read and write
BF0000
heap
page execute and read and write
404000
unkown
page read and write
32A5000
heap
page read and write
2669000
heap
page read and write
7FFD9B900000
trusted library allocation
page execute and read and write
1AC7E000
stack
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
126F1000
trusted library allocation
page read and write
552D000
heap
page read and write
595E000
stack
page read and write
126FD000
trusted library allocation
page read and write
353B000
heap
page read and write
B7E000
stack
page read and write
34B9000
heap
page read and write
7FFD9B96C000
trusted library allocation
page read and write
878000
heap
page read and write
581000
unkown
page execute read
1AB39580000
heap
page read and write
30B7000
trusted library allocation
page read and write
54AD000
stack
page read and write
9B000
stack
page read and write
1C030000
heap
page read and write
1AB53684000
heap
page read and write
1C92E000
stack
page read and write
8A3000
heap
page read and write
1201000
heap
page read and write
349E000
heap
page read and write
1AB58F30000
heap
page read and write
1116000
stack
page read and write
2F87000
stack
page read and write
7FFD9B9A3000
trusted library allocation
page read and write
3404000
trusted library allocation
page read and write
3046000
trusted library allocation
page read and write
87F000
heap
page read and write
11FF000
heap
page read and write
7FFD9B80B000
trusted library allocation
page execute and read and write
1B95E000
stack
page read and write
2F9A000
stack
page read and write
7FFD9BAF6000
trusted library allocation
page read and write
1B51D000
stack
page read and write
1AB3B534000
trusted library allocation
page read and write
1AB535E0000
heap
page read and write
11B2000
heap
page read and write
536F000
stack
page read and write
87A000
heap
page read and write
93E000
stack
page read and write
5C4000
unkown
page read and write
96F000
heap
page read and write
8A5000
heap
page read and write
32EA000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page read and write
44A0000
heap
page read and write
2795000
heap
page read and write
126F3000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
34DA000
trusted library allocation
page read and write
34DE000
heap
page read and write
34E0000
heap
page read and write
1190000
heap
page read and write
88D000
heap
page read and write
98E000
heap
page read and write
7FFD9B86C000
trusted library allocation
page execute and read and write
34D6000
heap
page read and write
34DE000
heap
page read and write
1AB53765000
heap
page read and write
2F83000
stack
page read and write
3478000
heap
page read and write
126F8000
trusted library allocation
page read and write
34DE000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
8BA67FE000
stack
page read and write
52EA000
trusted library allocation
page read and write
7FFD9B8D0000
trusted library allocation
page execute and read and write
6FB000
stack
page read and write
8BF000
heap
page read and write
7FFD9BB50000
trusted library allocation
page execute and read and write
1C3BF000
heap
page read and write
7FFD9B7F7000
trusted library allocation
page read and write
34AA000
heap
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
886000
heap
page read and write
1AB53760000
heap
page read and write
1C150000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9B973000
trusted library allocation
page read and write
1B93E000
stack
page read and write
1C328000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page execute and read and write
1C3AA000
heap
page read and write
1C0E8000
heap
page read and write
9E9000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
89A000
heap
page read and write
7FFD9B7CD000
trusted library allocation
page execute and read and write
1207000
heap
page read and write
7FFD9B7C3000
trusted library allocation
page read and write
1C27C000
heap
page read and write
15B0000
heap
page read and write
1C0CE000
stack
page read and write
4E8E000
stack
page read and write
3470000
heap
page read and write
3D0000
heap
page read and write
7FFD9BB20000
trusted library allocation
page read and write
840000
heap
page read and write
7FFD9B7E0000
trusted library allocation
page read and write
1C3E7000
heap
page read and write
1C408000
heap
page read and write
1C0FD000
heap
page read and write
1C3FB000
heap
page read and write
581E000
stack
page read and write
1C371000
heap
page read and write
1C38D000
heap
page read and write
7FFD9B963000
trusted library allocation
page read and write
7FFD9B7E0000
trusted library allocation
page read and write
32B4000
trusted library allocation
page read and write
1C130000
heap
page read and write
7FFD9B7EB000
trusted library allocation
page execute and read and write
7FFD9B7DD000
trusted library allocation
page execute and read and write
1C44B000
heap
page read and write
1AB5367F000
heap
page read and write
D72000
unkown
page readonly
337D000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1AB53D30000
heap
page read and write
88C000
heap
page read and write
1C4DB000
heap
page read and write
2F92000
stack
page read and write
7FFD9BA10000
trusted library allocation
page read and write
873000
heap
page read and write
2F66000
stack
page read and write
88E000
heap
page read and write
1C0C5000
heap
page read and write
7FFD9BB40000
trusted library allocation
page read and write
11D1000
heap
page read and write
C80000
heap
page read and write
CA0000
unkown
page readonly
5524000
heap
page read and write
30DE000
stack
page read and write
1AB54E20000
trusted library allocation
page read and write
25B0000
heap
page execute and read and write
33DB000
heap
page read and write
1C323000
heap
page read and write
1AB39230000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
88C000
heap
page read and write
349A000
heap
page read and write
7FFD9B896000
trusted library allocation
page execute and read and write
860000
heap
page read and write
894000
heap
page read and write
1C37E000
heap
page read and write
35B000
stack
page read and write
3260000
heap
page read and write
7FF412130000
trusted library allocation
page execute and read and write
25E0000
heap
page read and write
7FFD9B7D0000
trusted library allocation
page read and write
34D5000
trusted library allocation
page read and write
8B0000
heap
page read and write
1C404000
heap
page read and write
87D000
heap
page read and write
7FFD9B866000
trusted library allocation
page read and write
C10000
trusted library allocation
page read and write
7FFD9B966000
trusted library allocation
page read and write
7FFD9B98C000
trusted library allocation
page read and write
581000
unkown
page execute read
1C12E000
heap
page read and write
8E8000
heap
page read and write
13D8000
heap
page read and write
1C23B000
heap
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
760F000
heap
page read and write
88C000
heap
page read and write
2FFB000
trusted library allocation
page read and write
12F9D000
trusted library allocation
page read and write
1C30B000
heap
page read and write
1B9C0000
heap
page read and write
1B9B0000
heap
page read and write
34DE000
heap
page read and write
1B6FE000
stack
page read and write
1AB39350000
heap
page read and write
890000
heap
page read and write
599E000
stack
page read and write
7FFD9B99B000
trusted library allocation
page read and write
3E0000
heap
page read and write
353B000
heap
page read and write
1C080000
heap
page read and write
898000
heap
page read and write
9AF000
heap
page read and write
19B000
stack
page read and write
90C000
heap
page read and write
5E2000
unkown
page readonly
900000
heap
page read and write
12F98000
trusted library allocation
page read and write
7FFD9B95C000
trusted library allocation
page read and write
1C02E000
stack
page read and write
7FFD9BA60000
trusted library allocation
page execute and read and write
7FFD9B7ED000
trusted library allocation
page execute and read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
32A0000
heap
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
1C10F000
heap
page read and write
30E8000
trusted library allocation
page read and write
1AB53710000
trusted library allocation
page read and write
1BB20000
heap
page execute and read and write
7FFD9B7E4000
trusted library allocation
page read and write
1AB53770000
heap
page read and write
34DE000
heap
page read and write
3036000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
12F73000
trusted library allocation
page read and write
11D3000
heap
page read and write
873000
heap
page read and write
580000
unkown
page readonly
1AB3AD3F000
heap
page read and write
1AB535F4000
heap
page read and write
7FFD9B7B4000
trusted library allocation
page read and write
851000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
52F0000
heap
page read and write
7FFD9BC40000
trusted library allocation
page read and write
1AB3B497000
trusted library allocation
page read and write
1AB39330000
heap
page read and write
1C4A5000
heap
page read and write
1250000
heap
page read and write
59DB000
stack
page read and write
3423000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
7FFD9B9F0000
trusted library allocation
page read and write
405000
unkown
page write copy
1AB59160000
trusted library allocation
page read and write
1AB3AF00000
heap
page read and write
858000
heap
page read and write
2E80000
heap
page execute and read and write
7FFD9B9B0000
trusted library allocation
page read and write
27B6000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
1AB53913000
heap
page execute and read and write
1C502000
heap
page read and write
1AB3B482000
trusted library allocation
page read and write
33EE000
stack
page read and write
1AB394A7000
heap
page read and write
874000
heap
page read and write
1BECE000
stack
page read and write
EB0000
heap
page read and write
1250000
heap
page read and write
1C2A7000
heap
page read and write
850000
heap
page read and write
1B5F3000
stack
page read and write
1AB394B0000
trusted library allocation
page read and write
7FFD9B8D0000
trusted library allocation
page execute and read and write
8C4000
heap
page read and write
4FCF000
stack
page read and write
1AB393B0000
heap
page read and write
7FFD9B7CC000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
873000
heap
page read and write
7FFD9BC20000
trusted library allocation
page read and write
7FFD9B9CD000
trusted library allocation
page read and write
1AB393F0000
heap
page read and write
1C277000
heap
page read and write
1AB53D4B000
heap
page read and write
5BE000
unkown
page write copy
97E000
stack
page read and write
B6E000
stack
page read and write
93F000
heap
page read and write
1396000
heap
page read and write
1AB53773000
heap
page read and write
7FFD9B7DC000
trusted library allocation
page read and write
870000
heap
page read and write
7FFD9B8DA000
trusted library allocation
page execute and read and write
830000
heap
page read and write
78FC000
stack
page read and write
274C000
trusted library allocation
page read and write
4D8E000
stack
page read and write
1C418000
heap
page read and write
7FFD9BB30000
trusted library allocation
page read and write
882000
heap
page read and write
444E000
stack
page read and write
8E8000
heap
page read and write
1AB3B4C9000
trusted library allocation
page read and write
7FFD9B896000
trusted library allocation
page execute and read and write
325E000
stack
page read and write
1C11A000
heap
page read and write
136D000
heap
page read and write
1AB55242000
heap
page read and write
1BD24000
stack
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
8C4000
heap
page read and write
5E1000
unkown
page read and write
1BFCE000
stack
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1AB4AF21000
trusted library allocation
page read and write
313E000
stack
page read and write
27C5000
trusted library allocation
page read and write
1C47E000
heap
page read and write
1C0F2000
heap
page read and write
7FFD9B7CD000
trusted library allocation
page execute and read and write
1AB535F0000
heap
page read and write
1C460000
heap
page read and write
89A000
heap
page read and write
1AB59188000
trusted library allocation
page read and write
4510000
heap
page read and write
1C054000
heap
page read and write
7FFD9BB06000
trusted library allocation
page read and write
929000
heap
page read and write
9DE000
heap
page read and write
7FFD9B8A6000
trusted library allocation
page execute and read and write
353B000
heap
page read and write
5B3000
unkown
page readonly
4FE0000
heap
page read and write
7FFD9B7C3000
trusted library allocation
page read and write
1BF2E000
stack
page read and write
1A720000
trusted library allocation
page read and write
33D8000
heap
page read and write
7FFD9B80C000
trusted library allocation
page execute and read and write
31FB000
trusted library allocation
page read and write
1130000
heap
page read and write
7FFD9BC50000
trusted library allocation
page read and write
5E2000
unkown
page write copy
1AB3941B000
heap
page read and write
89A000
heap
page read and write
8C4000
heap
page read and write
A90000
heap
page read and write
1C17D000
heap
page read and write
38AC000
stack
page read and write
1C3D9000
heap
page read and write
2FD8000
trusted library allocation
page read and write
89F000
heap
page read and write
2914000
heap
page read and write
1C064000
heap
page read and write
12F78000
trusted library allocation
page read and write
1AB38F2F000
unkown
page readonly
8E0000
trusted library allocation
page read and write
76FE000
stack
page read and write
34AA000
heap
page read and write
1AB536F0000
heap
page read and write
526E000
stack
page read and write
89D000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1AB54FEE000
trusted library allocation
page read and write
390000
heap
page read and write
7FFD9B800000
trusted library allocation
page read and write
1B0BE000
stack
page read and write
8A0000
heap
page read and write
7FFD9B7B3000
trusted library allocation
page execute and read and write
2E96000
stack
page read and write
1C2FF000
heap
page read and write
12D0000
trusted library allocation
page read and write
1AB53664000
heap
page read and write
448E000
stack
page read and write
1160000
heap
page read and write
A18000
heap
page read and write
7FFD9BC60000
trusted library allocation
page execute and read and write
8BA73FC000
stack
page read and write
2F70000
stack
page read and write
7FFD9B896000
trusted library allocation
page read and write
7FFD9B7D4000
trusted library allocation
page read and write
3508000
heap
page read and write
1AB3B4BD000
trusted library allocation
page read and write
33BD000
stack
page read and write
1C48B000
heap
page read and write
3534000
heap
page read and write
10F6000
stack
page read and write
1C43A000
heap
page read and write
1AB53D81000
heap
page read and write
880000
heap
page read and write
34DE000
heap
page read and write
87C000
heap
page read and write
1AB53920000
heap
page read and write
873000
heap
page read and write
1C387000
heap
page read and write
15D0000
trusted library allocation
page read and write
34EF000
stack
page read and write
353B000
heap
page read and write
8E8000
heap
page read and write
882000
heap
page read and write
7FFD9B7DD000
trusted library allocation
page execute and read and write
352E000
stack
page read and write
3534000
heap
page read and write
1AB39310000
heap
page read and write
53AB000
stack
page read and write
1BBC0000
heap
page execute and read and write
4FD0000
heap
page read and write
1398000
heap
page read and write
86F000
heap
page read and write
7FFD9BC00000
trusted library allocation
page execute and read and write
2FCC000
trusted library allocation
page read and write
2EDE000
stack
page read and write
135B000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9B7DB000
trusted library allocation
page execute and read and write
4ECE000
stack
page read and write
3240000
heap
page read and write
1B2BE000
stack
page read and write
92F000
heap
page read and write
7FFD9B7CD000
trusted library allocation
page execute and read and write
1300000
heap
page read and write
7FFD9B87C000
trusted library allocation
page execute and read and write
7FFD9BB60000
trusted library allocation
page read and write
79FC000
stack
page read and write
362F000
stack
page read and write
8FE000
stack
page read and write
7FFD9B960000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9BAFC000
trusted library allocation
page read and write
7FFD9B987000
trusted library allocation
page read and write
1C198000
heap
page read and write
906000
heap
page read and write
87D000
heap
page read and write
980000
heap
page read and write
882000
heap
page read and write
1AB39427000
heap
page read and write
1AB38F3A000
unkown
page readonly
12C5000
heap
page read and write
1C32E000
heap
page read and write
1C436000
heap
page read and write
1AB393A5000
heap
page read and write
3534000
heap
page read and write
B00000
heap
page read and write
136B000
heap
page read and write
7D0000
heap
page read and write
1AB39585000
heap
page read and write
A9A000
heap
page read and write
BD0000
trusted library allocation
page read and write
3532000
heap
page read and write
898000
heap
page read and write
89C000
heap
page read and write
7FFD9B80D000
trusted library allocation
page execute and read and write
1AB53602000
heap
page read and write
7FFD9B7ED000
trusted library allocation
page execute and read and write
1C293000
heap
page read and write
12F71000
trusted library allocation
page read and write
1AB5363E000
heap
page read and write
861000
heap
page read and write
7FFD9B7F3000
trusted library allocation
page read and write
1C076000
heap
page read and write
86E000
heap
page read and write
86D000
heap
page read and write
6CF0000
heap
page read and write
1C12B000
heap
page read and write
1C3F2000
heap
page read and write
26F1000
trusted library allocation
page read and write
1C05D000
heap
page read and write
1AB53D96000
heap
page read and write
1C0A3000
heap
page read and write
15F0000
heap
page read and write
1AB536E0000
trusted library section
page readonly
152E000
stack
page read and write
7FFD9BAE2000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
2F89000
stack
page read and write
There are 722 hidden memdumps, click here to show them.