IOC Report
vy3mvlAaCZ.exe

loading gif

Files

File Path
Type
Category
Malicious
vy3mvlAaCZ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_vy3mvlAaCZ.exe_6074d93d852c1785169ec71e797e6a243c122_d0e789f3_1326a322\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_vy3mvlAaCZ.exe_6074d93d852c1785169ec71e797e6a243c122_d0e789f3_15f13808\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER97F6.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Sep 1 06:59:26 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9A1A.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9B44.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2C8E.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Sep 1 06:51:57 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2EB2.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER300B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\vy3mvlAaCZ.exe
"C:\Users\user\Desktop\vy3mvlAaCZ.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 244
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 244

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
\REGISTRY\A\{d00e812a-86e8-84c0-8225-ffbd1764ff1a}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
ProgramId
\REGISTRY\A\{d00e812a-86e8-84c0-8225-ffbd1764ff1a}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
FileId
\REGISTRY\A\{d00e812a-86e8-84c0-8225-ffbd1764ff1a}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
LowerCaseLongPath
\REGISTRY\A\{d00e812a-86e8-84c0-8225-ffbd1764ff1a}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
LongPathHash
\REGISTRY\A\{d00e812a-86e8-84c0-8225-ffbd1764ff1a}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
Name
\REGISTRY\A\{d00e812a-86e8-84c0-8225-ffbd1764ff1a}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
Publisher
\REGISTRY\A\{d00e812a-86e8-84c0-8225-ffbd1764ff1a}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
Version
\REGISTRY\A\{d00e812a-86e8-84c0-8225-ffbd1764ff1a}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
BinFileVersion
\REGISTRY\A\{d00e812a-86e8-84c0-8225-ffbd1764ff1a}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
BinaryType
\REGISTRY\A\{d00e812a-86e8-84c0-8225-ffbd1764ff1a}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
ProductName
\REGISTRY\A\{d00e812a-86e8-84c0-8225-ffbd1764ff1a}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
ProductVersion
\REGISTRY\A\{d00e812a-86e8-84c0-8225-ffbd1764ff1a}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
LinkDate
\REGISTRY\A\{d00e812a-86e8-84c0-8225-ffbd1764ff1a}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
BinProductVersion
\REGISTRY\A\{d00e812a-86e8-84c0-8225-ffbd1764ff1a}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
Size
\REGISTRY\A\{d00e812a-86e8-84c0-8225-ffbd1764ff1a}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
Language
\REGISTRY\A\{d00e812a-86e8-84c0-8225-ffbd1764ff1a}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
IsPeFile
\REGISTRY\A\{d00e812a-86e8-84c0-8225-ffbd1764ff1a}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
001840064172BCE4
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
ProgramId
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
FileId
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
LowerCaseLongPath
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
LongPathHash
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
Name
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
Publisher
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
Version
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
BinFileVersion
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
BinaryType
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
ProductName
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
ProductVersion
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
LinkDate
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
BinProductVersion
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
Size
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
Language
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
IsPeFile
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
IsOsComponent
There are 31 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
944000
unkown
page write copy
malicious
944000
unkown
page write copy
malicious
944000
unkown
page write copy
malicious
943000
unkown
page write copy
malicious
AE22679000
stack
page read and write
1FCC1B40000
heap
page read and write
2BE94876000
heap
page read and write
260000
heap
page read and write
2BE9485F000
heap
page read and write
18F1E866000
heap
page read and write
18F1F17E000
heap
page read and write
20D8B708000
heap
page read and write
AF4AD7E000
stack
page read and write
18F1F198000
heap
page read and write
18F1F14E000
heap
page read and write
29297D60000
trusted library allocation
page read and write
AF4ADFF000
stack
page read and write
29293158000
heap
page read and write
AE21F7B000
stack
page read and write
29297EA1000
trusted library allocation
page read and write
EF9A3FF000
stack
page read and write
D40637E000
stack
page read and write
18F1F17F000
heap
page read and write
18F1E83C000
heap
page read and write
20D8B63C000
heap
page read and write
2B983FA000
stack
page read and write
258CC6D0000
heap
page read and write
53E9A7E000
stack
page read and write
2BE9486E000
heap
page read and write
18F1F176000
heap
page read and write
1FCC1D13000
heap
page read and write
2225F4A7000
heap
page read and write
20D8B530000
trusted library allocation
page read and write
1FCC1C4F000
heap
page read and write
93E000
unkown
page readonly
18F1E860000
heap
page read and write
234E8658000
heap
page read and write
18F1F60A000
heap
page read and write
2031243D000
heap
page read and write
53E93FC000
stack
page read and write
18F1F18B000
heap
page read and write
234E8600000
heap
page read and write
234E910A000
heap
page read and write
18F1E908000
heap
page read and write
2C9A4FF000
stack
page read and write
29297EC0000
trusted library allocation
page read and write
25AFF43C000
heap
page read and write
18F1E85E000
heap
page read and write
292928A9000
heap
page read and write
29297F50000
trusted library allocation
page read and write
18F1E8E5000
heap
page read and write
18F1F17A000
heap
page read and write
20D8B666000
heap
page read and write
2225F4C0000
heap
page read and write
18F1E800000
heap
page read and write
18F1F11F000
heap
page read and write
2BE94845000
heap
page read and write
2BE94813000
heap
page read and write
20D8B680000
heap
page read and write
EF9A2FE000
stack
page read and write
18F1F181000
heap
page read and write
18F1F1A4000
heap
page read and write
234E8643000
heap
page read and write
2929283C000
heap
page read and write
203123E0000
trusted library allocation
page read and write
2BE94867000
heap
page read and write
2929287A000
heap
page read and write
2225F4C5000
heap
page read and write
29293100000
heap
page read and write
2BE9484D000
heap
page read and write
292928FF000
heap
page read and write
1FCC1C00000
heap
page read and write
29292800000
heap
page read and write
9F9237F000
stack
page read and write
18F1F604000
heap
page read and write
292928AC000
heap
page read and write
29292857000
heap
page read and write
25AFF350000
heap
page read and write
2225F420000
heap
page read and write
931000
unkown
page execute read
22FF000
stack
page read and write
18F1F114000
heap
page read and write
18F1F180000
heap
page read and write
18F1F178000
heap
page read and write
2225F4C6000
heap
page read and write
18F1F18D000
heap
page read and write
18F1F1A3000
heap
page read and write
234E8692000
heap
page read and write
18F1F18C000
heap
page read and write
258CC840000
heap
page read and write
2031242E000
heap
page read and write
2BE94839000
heap
page read and write
234E912A000
heap
page read and write
2BE94835000
heap
page read and write
2225F4C0000
heap
page read and write
2BE94849000
heap
page read and write
25AFF476000
heap
page read and write
25AFF3F0000
trusted library allocation
page read and write
2BE94861000
heap
page read and write
18F1E913000
heap
page read and write
18F1E85C000
heap
page read and write
20D8B651000
heap
page read and write
25AFF470000
heap
page read and write
9F9247F000
stack
page read and write
2BE945D0000
heap
page read and write
D4066F7000
stack
page read and write
29297FD0000
trusted library allocation
page read and write
234E912A000
heap
page read and write
2225F2B0000
heap
page read and write
1FCC1D26000
heap
page read and write
18F1F17E000
heap
page read and write
AF4B07F000
stack
page read and write
20D8B702000
heap
page read and write
2225F4B0000
heap
page read and write
18F1F1B9000
heap
page read and write
3CC000
stack
page read and write
2225F4C0000
heap
page read and write
2C9A6FE000
stack
page read and write
234E866A000
heap
page read and write
931000
unkown
page execute read
2C9A3F9000
stack
page read and write
292980B6000
heap
page read and write
292982E0000
trusted library allocation
page read and write
AF4AFFD000
stack
page read and write
18F1F191000
heap
page read and write
EF99D0B000
stack
page read and write
18F1F17C000
heap
page read and write
234E85B0000
trusted library allocation
page read and write
2929801C000
heap
page read and write
258CC730000
heap
page read and write
234E8685000
heap
page read and write
1FCC1C4A000
heap
page read and write
18F1F1AD000
heap
page read and write
2BE94850000
heap
page read and write
25AFF489000
heap
page read and write
18F1F1D2000
heap
page read and write
9F91D7B000
stack
page read and write
29297F70000
trusted library allocation
page read and write
18F1E8E8000
heap
page read and write
18F1E5D0000
heap
page read and write
2CC000
stack
page read and write
260000
unkown
page read and write
6F0000
heap
page read and write
1FCC1C3C000
heap
page read and write
22FF000
stack
page read and write
234E8651000
heap
page read and write
18F1F16D000
heap
page read and write
29298000000
heap
page read and write
29297F90000
trusted library allocation
page read and write
25AFF413000
heap
page read and write
29297E80000
trusted library allocation
page read and write
83A000
heap
page read and write
234E862C000
heap
page read and write
20312452000
heap
page read and write
29298065000
heap
page read and write
18F1E855000
heap
page read and write
63B5BFF000
stack
page read and write
29297E88000
trusted library allocation
page read and write
25AFF402000
heap
page read and write
930000
unkown
page readonly
29292FF3000
trusted library allocation
page read and write
18F1F174000
heap
page read and write
20D8B67C000
heap
page read and write
18F1F179000
heap
page read and write
18F1F160000
heap
page read and write
53E9B77000
stack
page read and write
18F1F174000
heap
page read and write
25AFF360000
heap
page read and write
29292680000
heap
page read and write
29298102000
heap
page read and write
29297EB0000
trusted library allocation
page read and write
25AFF3C0000
heap
page read and write
2BE94846000
heap
page read and write
3CC000
stack
page read and write
18F1E869000
heap
page read and write
2BE9487C000
heap
page read and write
18F1F187000
heap
page read and write
2BE9487A000
heap
page read and write
18F1F16F000
heap
page read and write
AF4AEFE000
stack
page read and write
930000
unkown
page readonly
29292824000
heap
page read and write
2929804B000
heap
page read and write
20312280000
heap
page read and write
18F1E640000
heap
page read and write
1FCC1C13000
heap
page read and write
20312400000
heap
page read and write
2BE95002000
trusted library allocation
page read and write
A5F000
stack
page read and write
18F1F17D000
heap
page read and write
930000
unkown
page readonly
18F1F175000
heap
page read and write
29292813000
heap
page read and write
20D8B67C000
heap
page read and write
234E8629000
heap
page read and write
7833077000
stack
page read and write
AE21D78000
stack
page read and write
20D8B600000
heap
page read and write
2BE94879000
heap
page read and write
AF4A8EC000
stack
page read and write
959000
unkown
page read and write
2929803E000
heap
page read and write
29297CF0000
trusted library allocation
page read and write
234E9223000
heap
page read and write
25AFF400000
heap
page read and write
292980F9000
heap
page read and write
2BE9483D000
heap
page read and write
2BE94830000
heap
page read and write
29297FB0000
trusted library allocation
page read and write
292980C2000
heap
page read and write
18F1F19E000
heap
page read and write
EF9A1FE000
stack
page read and write
258CC6C0000
heap
page read and write
74E000
stack
page read and write
234E91CB000
heap
page read and write
7832E7E000
stack
page read and write
1FCC1BB0000
heap
page read and write
AE2287F000
stack
page read and write
783327F000
stack
page read and write
7C0000
remote allocation
page read and write
18F1F187000
heap
page read and write
18F1E86A000
heap
page read and write
93E000
unkown
page readonly
9F9190B000
stack
page read and write
7BE000
stack
page read and write
7BE000
stack
page read and write
700000
trusted library allocation
page read and write
29297EA4000
trusted library allocation
page read and write
18F1F604000
heap
page read and write
7833578000
stack
page read and write
18F1F1DC000
heap
page read and write
234E9231000
heap
page read and write
74E000
stack
page read and write
18F1E8EA000
heap
page read and write
18F1F176000
heap
page read and write
234E8661000
heap
page read and write
2CC000
stack
page read and write
29293015000
heap
page read and write
AE21E7D000
stack
page read and write
18F1F1B9000
heap
page read and write
AE2207E000
stack
page read and write
234E85D0000
trusted library allocation
page read and write
18F1E8C5000
heap
page read and write
18F1E85D000
heap
page read and write
18F1E85B000
heap
page read and write
25AFF513000
heap
page read and write
18F1E8A6000
heap
page read and write
7C0000
remote allocation
page read and write
63B577B000
stack
page read and write
234E865B000
heap
page read and write
234E878F000
heap
page read and write
18F1E8A5000
heap
page read and write
29293002000
heap
page read and write
2B9827E000
stack
page read and write
957000
unkown
page read and write
78333F8000
stack
page read and write
234E9228000
heap
page read and write
63B567F000
stack
page read and write
63B59FF000
stack
page read and write
29293840000
trusted library allocation
page read and write
18F1F180000
heap
page read and write
234E9200000
heap
page read and write
83A000
heap
page read and write
234E9002000
heap
page read and write
18F1F60A000
heap
page read and write
258CD202000
trusted library allocation
page read and write
2BE9484E000
heap
page read and write
18F1F180000
heap
page read and write
18F1F18E000
heap
page read and write
18F1F191000
heap
page read and write
18F1F181000
heap
page read and write
1FCC1C7E000
heap
page read and write
18F1F16F000
heap
page read and write
18F1E813000
heap
page read and write
234E9100000
heap
page read and write
2BE9487D000
heap
page read and write
53E997F000
stack
page read and write
2B982FE000
stack
page read and write
18F1E865000
heap
page read and write
700000
trusted library allocation
page read and write
1FCC1C51000
heap
page read and write
2BE94902000
heap
page read and write
258CC790000
remote allocation
page read and write
18F1F199000
heap
page read and write
258CC790000
remote allocation
page read and write
63B5C7E000
stack
page read and write
18F1F1DC000
heap
page read and write
18F1F178000
heap
page read and write
18F1F179000
heap
page read and write
2BE94630000
heap
page read and write
18F1F177000
heap
page read and write
1FCC1BE0000
trusted library allocation
page read and write
2225F4B6000
heap
page read and write
9F9267E000
stack
page read and write
95A000
unkown
page readonly
18F1F604000
heap
page read and write
2BE94730000
trusted library allocation
page read and write
29297EB0000
trusted library allocation
page read and write
18F1F60A000
heap
page read and write
3CC000
stack
page read and write
234E8688000
heap
page read and write
95A000
unkown
page readonly
2929801F000
heap
page read and write
959000
unkown
page read and write
258CC802000
heap
page read and write
25AFF42A000
heap
page read and write
18F1F17A000
heap
page read and write
234E87E6000
heap
page read and write
2BE94847000
heap
page read and write
25AFF45A000
heap
page read and write
29292FF0000
trusted library allocation
page read and write
258CC82A000
heap
page read and write
830000
heap
page read and write
18F1F18F000
heap
page read and write
63B50EB000
stack
page read and write
2929288C000
heap
page read and write
53E97FC000
stack
page read and write
18F1F17C000
heap
page read and write
25AFF502000
heap
page read and write
18F1F652000
heap
page read and write
7832B2B000
stack
page read and write
2929288F000
heap
page read and write
18F1F002000
heap
page read and write
18F1E902000
heap
page read and write
7832BAE000
stack
page read and write
234E91BF000
heap
page read and write
53E967E000
stack
page read and write
2BE94829000
heap
page read and write
18F1F17A000
heap
page read and write
18F1F60A000
heap
page read and write
18F1EFA0000
remote allocation
page read and write
18F1F17C000
heap
page read and write
1FCC1D02000
heap
page read and write
A5F000
stack
page read and write
20D8BE02000
trusted library allocation
page read and write
234E8667000
heap
page read and write
2BE94878000
heap
page read and write
18F1F185000
heap
page read and write
18F1F19C000
heap
page read and write
29297F50000
trusted library allocation
page read and write
234E9213000
heap
page read and write
29297D70000
trusted library allocation
page read and write
74E000
stack
page read and write
29297FE0000
trusted library allocation
page read and write
2B97FBA000
stack
page read and write
258CC813000
heap
page read and write
25AFF466000
heap
page read and write
292982C0000
trusted library allocation
page read and write
2225F4B7000
heap
page read and write
25AFFE02000
trusted library allocation
page read and write
D4068FF000
stack
page read and write
2031244A000
heap
page read and write
292928AF000
heap
page read and write
18F1F17E000
heap
page read and write
9F91E7F000
stack
page read and write
18F1F17E000
heap
page read and write
9F9227E000
stack
page read and write
292928A1000
heap
page read and write
2BE94840000
heap
page read and write
234E915C000
heap
page read and write
258CC859000
heap
page read and write
258CC790000
remote allocation
page read and write
18F1F176000
heap
page read and write
959000
unkown
page read and write
78332FE000
stack
page read and write
AE2196B000
stack
page read and write
29292670000
heap
page read and write
29297FA0000
trusted library allocation
page read and write
2C9A5FF000
stack
page read and write
18F1F17A000
heap
page read and write
AF4A96C000
stack
page read and write
18F1F17C000
heap
page read and write
18F1F60A000
heap
page read and write
18F1E740000
trusted library allocation
page read and write
234E863C000
heap
page read and write
1FCC1C88000
heap
page read and write
29297EC4000
trusted library allocation
page read and write
20D8B3C0000
heap
page read and write
18F1F17C000
heap
page read and write
18F1E8B0000
heap
page read and write
29298100000
heap
page read and write
D4065FF000
stack
page read and write
1FCC1D00000
heap
page read and write
203122E0000
heap
page read and write
2CC000
stack
page read and write
29297FE0000
remote allocation
page read and write
29293118000
heap
page read and write
292928BD000
heap
page read and write
29297E8E000
trusted library allocation
page read and write
18F1F19C000
heap
page read and write
20312290000
heap
page read and write
957000
unkown
page read and write
234E8649000
heap
page read and write
18F1F180000
heap
page read and write
18F1F179000
heap
page read and write
18F1E8DD000
heap
page read and write
700000
trusted library allocation
page read and write
29292927000
heap
page read and write
2225F3E0000
heap
page read and write
20D8B713000
heap
page read and write
18F1E5E0000
heap
page read and write
783347F000
stack
page read and write
234E8713000
heap
page read and write
53E96FF000
stack
page read and write
943000
unkown
page read and write
1FCC1C29000
heap
page read and write
29297FC0000
trusted library allocation
page read and write
2225F415000
heap
page read and write
9F91F7B000
stack
page read and write
2225F4A2000
heap
page read and write
292980E2000
heap
page read and write
20D8B660000
heap
page read and write
2C99EDC000
stack
page read and write
1FCC1C6F000
heap
page read and write
234E8664000
heap
page read and write
29292907000
heap
page read and write
63B57F9000
stack
page read and write
29298025000
heap
page read and write
63B5CFF000
stack
page read and write
6F0000
heap
page read and write
29293102000
heap
page read and write
18F1F160000
heap
page read and write
1FCC2602000
trusted library allocation
page read and write
234E86B3000
heap
page read and write
18F1F17D000
heap
page read and write
18F1E8BE000
heap
page read and write
2BE94874000
heap
page read and write
20312446000
heap
page read and write
29293104000
heap
page read and write
18F1F600000
heap
page read and write
234E91B1000
heap
page read and write
18F1F176000
heap
page read and write
2BE945C0000
heap
page read and write
6F0000
heap
page read and write
2B98379000
stack
page read and write
53E9C7F000
stack
page read and write
930000
unkown
page readonly
29293CC1000
trusted library allocation
page read and write
20312502000
heap
page read and write
18F1F180000
heap
page read and write
29292914000
heap
page read and write
234E87BA000
heap
page read and write
20312402000
heap
page read and write
29292902000
heap
page read and write
18F1E868000
heap
page read and write
29298031000
heap
page read and write
95A000
unkown
page readonly
1FCC1C02000
heap
page read and write
29293113000
heap
page read and write
2BE9486C000
heap
page read and write
234E868A000
heap
page read and write
234E914B000
heap
page read and write
258CC800000
heap
page read and write
2BE94864000
heap
page read and write
20D8B613000
heap
page read and write
7833177000
stack
page read and write
2225F4B0000
heap
page read and write
63B5AFE000
stack
page read and write
63B58FA000
stack
page read and write
292928FF000
heap
page read and write
18F1F179000
heap
page read and write
2BE94854000
heap
page read and write
29298059000
heap
page read and write
83A000
heap
page read and write
18F1E82A000
heap
page read and write
29292871000
heap
page read and write
943000
unkown
page read and write
29297EA0000
trusted library allocation
page read and write
20D8B430000
heap
page read and write
18F1F181000
heap
page read and write
EF9A07E000
stack
page read and write
234E8520000
heap
page read and write
AF4B17D000
stack
page read and write
260000
unkown
page read and write
18F1F1A5000
heap
page read and write
18F1EFA0000
remote allocation
page read and write
2BE94873000
heap
page read and write
29292876000
heap
page read and write
18F1F19D000
heap
page read and write
18F1F170000
heap
page read and write
AE2227B000
stack
page read and write
18F1F181000
heap
page read and write
EF99D8E000
stack
page read and write
234E8613000
heap
page read and write
29299000000
heap
page read and write
234E8580000
heap
page read and write
7BE000
stack
page read and write
29293118000
heap
page read and write
D40627C000
stack
page read and write
234E8510000
heap
page read and write
931000
unkown
page execute read
18F1E916000
heap
page read and write
EF9A4FF000
stack
page read and write
18F1F628000
heap
page read and write
9F9257F000
stack
page read and write
2BE94800000
heap
page read and write
7833679000
stack
page read and write
29297E80000
trusted library allocation
page read and write
234E8643000
heap
page read and write
29292895000
heap
page read and write
234E9194000
heap
page read and write
18F1F19E000
heap
page read and write
18F1F18B000
heap
page read and write
20D8B602000
heap
page read and write
20312413000
heap
page read and write
234E9202000
heap
page read and write
18F1F1A5000
heap
page read and write
18F1F178000
heap
page read and write
2B9847E000
stack
page read and write
2225F49B000
heap
page read and write
29293CE0000
trusted library allocation
page read and write
292926E0000
heap
page read and write
22FF000
stack
page read and write
20D8B62A000
heap
page read and write
1FCC1B50000
heap
page read and write
292980E8000
heap
page read and write
18F1F602000
heap
page read and write
18F1F176000
heap
page read and write
18F1F100000
heap
page read and write
D4067FF000
stack
page read and write
D40647B000
stack
page read and write
18F1F178000
heap
page read and write
943000
unkown
page read and write
95A000
unkown
page readonly
29292902000
heap
page read and write
258CC902000
heap
page read and write
25AFF42C000
heap
page read and write
2225F410000
heap
page read and write
18F1F180000
heap
page read and write
931000
unkown
page execute read
830000
heap
page read and write
2BE9484B000
heap
page read and write
18F1F18F000
heap
page read and write
258CC760000
trusted library allocation
page read and write
29297FE0000
remote allocation
page read and write
2BE94842000
heap
page read and write
2BE9486B000
heap
page read and write
2225F490000
heap
page read and write
957000
unkown
page read and write
9F9217D000
stack
page read and write
93E000
unkown
page readonly
29297CE0000
trusted library allocation
page read and write
2BE94882000
heap
page read and write
63B54FA000
stack
page read and write
20D8B700000
heap
page read and write
53E98FB000
stack
page read and write
29297FE0000
remote allocation
page read and write
18F1E8F9000
heap
page read and write
20312443000
heap
page read and write
18F1EFA0000
remote allocation
page read and write
18F1F1A2000
heap
page read and write
292927E0000
trusted library allocation
page read and write
292928AF000
heap
page read and write
18F1E881000
heap
page read and write
20D8B68A000
heap
page read and write
29298108000
heap
page read and write
18F1F16D000
heap
page read and write
1FCC1D08000
heap
page read and write
2929807B000
heap
page read and write
29298078000
heap
page read and write
93E000
unkown
page readonly
18F1F60B000
heap
page read and write
18F1F16F000
heap
page read and write
18F1F602000
heap
page read and write
AE2217A000
stack
page read and write
234E9173000
heap
page read and write
29293000000
heap
page read and write
2B984FF000
stack
page read and write
29297F50000
trusted library allocation
page read and write
20D8B3D0000
heap
page read and write
830000
heap
page read and write
20312C02000
trusted library allocation
page read and write
18F1E864000
heap
page read and write
D4062FE000
stack
page read and write
20312424000
heap
page read and write
D40657B000
stack
page read and write
1FCC1C4C000
heap
page read and write
A5F000
stack
page read and write
There are 568 hidden memdumps, click here to show them.