IOC Report
Y5FjBvytOL.exe

loading gif

Files

File Path
Type
Category
Malicious
Y5FjBvytOL.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp60DC.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\vKSqvdpkG.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Y5FjBvytOL.exe_4a68dee481ed2133fa819029d44b83c8707bd158_d687f77a_f87a3a53-c5bb-4d36-af30-75d116a24fbf\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_vKSqvdpkG.exe_9acf8dc337b5bda9b25ef2e58fd802caf1db_05c0d69f_e3d019af-9f96-4238-b8ea-84087d186cc4\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER51B9.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Apr 28 10:10:05 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5331.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5361.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7A40.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Apr 28 10:10:15 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7C83.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7CB3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Y5FjBvytOL.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\vKSqvdpkG.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3vsnmias.aub.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_arp1db4n.xpr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bcb0tb3i.sd1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cbshwwax.4bh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cwekrrdy.34r.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o3n3ryc1.5yg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pq23e02k.phg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uoabudby.i3a.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp86E2.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\vKSqvdpkG.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Y5FjBvytOL.exe
"C:\Users\user\Desktop\Y5FjBvytOL.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Y5FjBvytOL.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\vKSqvdpkG.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vKSqvdpkG" /XML "C:\Users\user\AppData\Local\Temp\tmp60DC.tmp"
malicious
C:\Users\user\Desktop\Y5FjBvytOL.exe
"C:\Users\user\Desktop\Y5FjBvytOL.exe"
malicious
C:\Users\user\Desktop\Y5FjBvytOL.exe
"C:\Users\user\Desktop\Y5FjBvytOL.exe"
malicious
C:\Users\user\AppData\Roaming\vKSqvdpkG.exe
C:\Users\user\AppData\Roaming\vKSqvdpkG.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vKSqvdpkG" /XML "C:\Users\user\AppData\Local\Temp\tmp86E2.tmp"
malicious
C:\Users\user\AppData\Roaming\vKSqvdpkG.exe
"C:\Users\user\AppData\Roaming\vKSqvdpkG.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5088 -s 1708
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 1748
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
91.92.252.220
malicious
41.199.23.195
malicious
127.0.0.1
malicious
http://upx.sf.net
unknown
https://api.telegram.org/bot
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
saveclinetsforme68465454711991.publicvm.com
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com
unknown

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y5FjBvytOL_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y5FjBvytOL_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y5FjBvytOL_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y5FjBvytOL_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y5FjBvytOL_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y5FjBvytOL_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y5FjBvytOL_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y5FjBvytOL_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y5FjBvytOL_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y5FjBvytOL_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y5FjBvytOL_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y5FjBvytOL_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y5FjBvytOL_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y5FjBvytOL_RASMANCS
FileDirectory
\REGISTRY\A\{7b83696b-4489-f49d-4f12-0b1f421c6aa8}\Root\InventoryApplicationFile\y5fjbvytol.exe|334e7c939d586f6e
ProgramId
\REGISTRY\A\{7b83696b-4489-f49d-4f12-0b1f421c6aa8}\Root\InventoryApplicationFile\y5fjbvytol.exe|334e7c939d586f6e
FileId
\REGISTRY\A\{7b83696b-4489-f49d-4f12-0b1f421c6aa8}\Root\InventoryApplicationFile\y5fjbvytol.exe|334e7c939d586f6e
LowerCaseLongPath
\REGISTRY\A\{7b83696b-4489-f49d-4f12-0b1f421c6aa8}\Root\InventoryApplicationFile\y5fjbvytol.exe|334e7c939d586f6e
LongPathHash
\REGISTRY\A\{7b83696b-4489-f49d-4f12-0b1f421c6aa8}\Root\InventoryApplicationFile\y5fjbvytol.exe|334e7c939d586f6e
Name
\REGISTRY\A\{7b83696b-4489-f49d-4f12-0b1f421c6aa8}\Root\InventoryApplicationFile\y5fjbvytol.exe|334e7c939d586f6e
OriginalFileName
\REGISTRY\A\{7b83696b-4489-f49d-4f12-0b1f421c6aa8}\Root\InventoryApplicationFile\y5fjbvytol.exe|334e7c939d586f6e
Publisher
\REGISTRY\A\{7b83696b-4489-f49d-4f12-0b1f421c6aa8}\Root\InventoryApplicationFile\y5fjbvytol.exe|334e7c939d586f6e
Version
\REGISTRY\A\{7b83696b-4489-f49d-4f12-0b1f421c6aa8}\Root\InventoryApplicationFile\y5fjbvytol.exe|334e7c939d586f6e
BinFileVersion
\REGISTRY\A\{7b83696b-4489-f49d-4f12-0b1f421c6aa8}\Root\InventoryApplicationFile\y5fjbvytol.exe|334e7c939d586f6e
BinaryType
\REGISTRY\A\{7b83696b-4489-f49d-4f12-0b1f421c6aa8}\Root\InventoryApplicationFile\y5fjbvytol.exe|334e7c939d586f6e
ProductName
\REGISTRY\A\{7b83696b-4489-f49d-4f12-0b1f421c6aa8}\Root\InventoryApplicationFile\y5fjbvytol.exe|334e7c939d586f6e
ProductVersion
\REGISTRY\A\{7b83696b-4489-f49d-4f12-0b1f421c6aa8}\Root\InventoryApplicationFile\y5fjbvytol.exe|334e7c939d586f6e
LinkDate
\REGISTRY\A\{7b83696b-4489-f49d-4f12-0b1f421c6aa8}\Root\InventoryApplicationFile\y5fjbvytol.exe|334e7c939d586f6e
BinProductVersion
\REGISTRY\A\{7b83696b-4489-f49d-4f12-0b1f421c6aa8}\Root\InventoryApplicationFile\y5fjbvytol.exe|334e7c939d586f6e
AppxPackageFullName
\REGISTRY\A\{7b83696b-4489-f49d-4f12-0b1f421c6aa8}\Root\InventoryApplicationFile\y5fjbvytol.exe|334e7c939d586f6e
AppxPackageRelativeId
\REGISTRY\A\{7b83696b-4489-f49d-4f12-0b1f421c6aa8}\Root\InventoryApplicationFile\y5fjbvytol.exe|334e7c939d586f6e
Size
\REGISTRY\A\{7b83696b-4489-f49d-4f12-0b1f421c6aa8}\Root\InventoryApplicationFile\y5fjbvytol.exe|334e7c939d586f6e
Language
\REGISTRY\A\{7b83696b-4489-f49d-4f12-0b1f421c6aa8}\Root\InventoryApplicationFile\y5fjbvytol.exe|334e7c939d586f6e
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vKSqvdpkG_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vKSqvdpkG_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vKSqvdpkG_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vKSqvdpkG_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vKSqvdpkG_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vKSqvdpkG_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vKSqvdpkG_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vKSqvdpkG_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vKSqvdpkG_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vKSqvdpkG_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vKSqvdpkG_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vKSqvdpkG_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vKSqvdpkG_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vKSqvdpkG_RASMANCS
FileDirectory
There are 42 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3F21000
trusted library allocation
page read and write
malicious
4C6F000
trusted library allocation
page read and write
malicious
38B3000
trusted library allocation
page read and write
malicious
32B0000
trusted library section
page read and write
malicious
2B21000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2C6C000
trusted library allocation
page read and write
296E000
trusted library allocation
page read and write
390000
heap
page read and write
544C000
stack
page read and write
F5D000
trusted library allocation
page execute and read and write
390C000
trusted library allocation
page read and write
E00000
heap
page read and write
1152C000
stack
page read and write
10B6000
trusted library allocation
page execute and read and write
676000
heap
page read and write
3934000
trusted library allocation
page read and write
753F000
trusted library allocation
page read and write
7711000
trusted library allocation
page read and write
4BFE000
stack
page read and write
3910000
trusted library allocation
page read and write
7EEB000
trusted library allocation
page read and write
5240000
heap
page read and write
2470000
trusted library allocation
page read and write
E08000
heap
page read and write
2BCE000
trusted library allocation
page read and write
7EFE000
trusted library allocation
page read and write
24A0000
trusted library allocation
page read and write
2BE6000
trusted library allocation
page read and write
1128E000
stack
page read and write
C6B000
stack
page read and write
6080000
heap
page read and write
5410000
heap
page execute and read and write
F85000
heap
page read and write
31A0000
trusted library allocation
page read and write
2CDE000
trusted library allocation
page read and write
89B000
heap
page read and write
9CE000
stack
page read and write
75E000
stack
page read and write
6F80000
heap
page read and write
7F70000
trusted library allocation
page read and write
2D80000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
3922000
trusted library allocation
page read and write
8420000
trusted library allocation
page execute and read and write
2BD0000
trusted library allocation
page read and write
3912000
trusted library allocation
page read and write
318D000
trusted library allocation
page execute and read and write
319D000
trusted library allocation
page execute and read and write
5E3E000
stack
page read and write
71B0000
trusted library allocation
page read and write
2C0E000
stack
page read and write
3908000
trusted library allocation
page read and write
5B7E000
stack
page read and write
2472000
trusted library allocation
page read and write
EB5000
heap
page read and write
551F000
stack
page read and write
3280000
trusted library allocation
page read and write
7430000
heap
page read and write
E70000
heap
page read and write
10A0000
trusted library allocation
page read and write
590E000
stack
page read and write
C20000
heap
page read and write
7090000
trusted library allocation
page read and write
4112000
trusted library allocation
page read and write
2CE5000
trusted library allocation
page read and write
5B3E000
stack
page read and write
390A000
trusted library allocation
page read and write
10F4E000
stack
page read and write
129DF000
stack
page read and write
2BB8000
trusted library allocation
page read and write
5480000
heap
page execute and read and write
26B0000
heap
page execute and read and write
4D4D000
stack
page read and write
128DE000
stack
page read and write
6B7E000
stack
page read and write
23F0000
trusted library allocation
page read and write
5DFE000
stack
page read and write
B3B000
trusted library allocation
page execute and read and write
65E000
heap
page read and write
71DD000
trusted library allocation
page read and write
106E000
heap
page read and write
13DF000
heap
page read and write
113CE000
stack
page read and write
32A000
stack
page read and write
E35000
heap
page read and write
569E000
stack
page read and write
579F000
stack
page read and write
1465000
heap
page read and write
4411000
trusted library allocation
page read and write
8AE000
stack
page read and write
70A0000
heap
page execute and read and write
1090000
trusted library allocation
page read and write
760C000
heap
page read and write
125FE000
stack
page read and write
3C51000
trusted library allocation
page read and write
10C0000
trusted library allocation
page read and write
3914000
trusted library allocation
page read and write
25BE000
stack
page read and write
2CCD000
trusted library allocation
page read and write
31B2000
trusted library allocation
page read and write
2BCD000
stack
page read and write
B1D000
trusted library allocation
page execute and read and write
2BCA000
trusted library allocation
page read and write
ED0000
heap
page read and write
7435000
heap
page read and write
17B0000
trusted library allocation
page read and write
8D35000
heap
page read and write
7730000
trusted library allocation
page execute and read and write
5E3E000
stack
page read and write
3823000
trusted library allocation
page read and write
106B000
heap
page read and write
3210000
heap
page read and write
F40000
trusted library allocation
page read and write
3411000
trusted library allocation
page read and write
107D000
trusted library allocation
page execute and read and write
F5F000
stack
page read and write
2BDE000
trusted library allocation
page read and write
83FD000
stack
page read and write
31D0000
trusted library allocation
page read and write
B26000
trusted library allocation
page execute and read and write
3926000
trusted library allocation
page read and write
5CBE000
stack
page read and write
2400000
trusted library allocation
page read and write
2D91000
trusted library allocation
page read and write
EFE000
stack
page read and write
D67000
stack
page read and write
6D50000
trusted library allocation
page read and write
26A0000
trusted library allocation
page read and write
58F0000
trusted library allocation
page read and write
F54000
trusted library allocation
page read and write
8CA0000
heap
page read and write
D67000
stack
page read and write
38FE000
trusted library allocation
page read and write
5CFE000
stack
page read and write
2D32000
trusted library allocation
page read and write
3190000
trusted library allocation
page read and write
2D2C000
trusted library allocation
page read and write
4C35000
trusted library allocation
page read and write
1237E000
stack
page read and write
8460000
heap
page read and write
2480000
trusted library allocation
page execute and read and write
8574000
heap
page read and write
7F80000
trusted library allocation
page execute and read and write
2CF0000
trusted library allocation
page read and write
568E000
stack
page read and write
391E000
trusted library allocation
page read and write
FBC000
unkown
page readonly
7BF000
stack
page read and write
F3E000
stack
page read and write
1360000
heap
page read and write
8564000
heap
page read and write
710000
heap
page read and write
5BBD000
stack
page read and write
7FBC0000
trusted library allocation
page execute and read and write
1140000
heap
page read and write
31AA000
trusted library allocation
page execute and read and write
2BD8000
trusted library allocation
page read and write
696000
heap
page read and write
1358000
stack
page read and write
31E0000
heap
page read and write
38F0000
trusted library allocation
page read and write
1073000
trusted library allocation
page execute and read and write
134E000
stack
page read and write
1380000
heap
page read and write
71D6000
trusted library allocation
page read and write
724B000
stack
page read and write
542B000
stack
page read and write
5A0D000
stack
page read and write
8FB0000
heap
page read and write
F22000
unkown
page readonly
51CC000
stack
page read and write
3936000
trusted library allocation
page read and write
7642000
heap
page read and write
7D6E000
stack
page read and write
85EF000
heap
page read and write
CDF000
unkown
page read and write
1176F000
stack
page read and write
174E000
stack
page read and write
D1E000
stack
page read and write
10C0000
trusted library allocation
page read and write
10C7000
trusted library allocation
page execute and read and write
546E000
stack
page read and write
392C000
trusted library allocation
page read and write
326C000
trusted library allocation
page read and write
4D76000
trusted library allocation
page read and write
F20000
unkown
page readonly
38F6000
trusted library allocation
page read and write
921E000
stack
page read and write
785E000
stack
page read and write
3920000
trusted library allocation
page read and write
5F3E000
stack
page read and write
10A7000
trusted library allocation
page execute and read and write
38EE000
trusted library allocation
page read and write
2B9E000
trusted library allocation
page read and write
2BE8000
trusted library allocation
page read and write
71D1000
trusted library allocation
page read and write
28FE000
trusted library allocation
page read and write
2BA8000
trusted library allocation
page read and write
1104F000
stack
page read and write
2BD2000
trusted library allocation
page read and write
7F60000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
3904000
trusted library allocation
page read and write
3928000
trusted library allocation
page read and write
32F0000
trusted library section
page read and write
A400000
trusted library allocation
page execute and read and write
10AE000
stack
page read and write
EC0000
heap
page read and write
7550000
trusted library allocation
page read and write
8240000
trusted library allocation
page read and write
12A1C000
stack
page read and write
1263E000
stack
page read and write
249D000
trusted library allocation
page read and write
10D0000
trusted library allocation
page execute and read and write
124BD000
stack
page read and write
C50000
heap
page read and write
2D34000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
2C30000
trusted library allocation
page read and write
2BD4000
trusted library allocation
page read and write
28E8000
trusted library allocation
page read and write
3906000
trusted library allocation
page read and write
2BBE000
trusted library allocation
page read and write
7FA0000
trusted library allocation
page read and write
5890000
heap
page read and write
263D000
stack
page read and write
5A2D000
stack
page read and write
607F000
stack
page read and write
B10000
trusted library allocation
page read and write
51CC000
stack
page read and write
8CB0000
heap
page read and write
2C74000
trusted library allocation
page read and write
47BC000
stack
page read and write
F50000
trusted library allocation
page read and write
1535000
heap
page read and write
8450000
trusted library allocation
page read and write
38F8000
trusted library allocation
page read and write
12D0000
heap
page read and write
38F2000
trusted library allocation
page read and write
1162C000
stack
page read and write
3183000
trusted library allocation
page execute and read and write
71B4000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
109A000
trusted library allocation
page execute and read and write
71BB000
trusted library allocation
page read and write
768D000
heap
page read and write
2D11000
trusted library allocation
page read and write
A572000
trusted library allocation
page read and write
240F000
trusted library allocation
page read and write
5DFF000
stack
page read and write
8CD1000
trusted library allocation
page read and write
9AD000
stack
page read and write
ACF000
stack
page read and write
7F06000
trusted library allocation
page read and write
112E000
stack
page read and write
1259000
stack
page read and write
7E20000
trusted library allocation
page execute and read and write
36C1000
trusted library allocation
page read and write
75B0000
trusted library allocation
page execute and read and write
2494000
trusted library allocation
page read and write
B04000
trusted library allocation
page read and write
5A30000
heap
page read and write
2BBA000
trusted library allocation
page read and write
24B0000
heap
page read and write
EEF000
heap
page read and write
1037000
heap
page read and write
2BAA000
trusted library allocation
page read and write
1530000
heap
page read and write
DD0000
heap
page read and write
36BF000
trusted library allocation
page read and write
86E000
stack
page read and write
10E0000
heap
page read and write
267D000
stack
page read and write
17D0000
heap
page read and write
5F7E000
stack
page read and write
25FE000
stack
page read and write
3938000
trusted library allocation
page read and write
58DC000
stack
page read and write
F60000
trusted library allocation
page read and write
390E000
trusted library allocation
page read and write
BDEE000
stack
page read and write
7618000
heap
page read and write
2C40000
heap
page execute and read and write
7F12000
trusted library allocation
page read and write
820000
heap
page read and write
2BE0000
trusted library allocation
page read and write
391C000
trusted library allocation
page read and write
890000
heap
page read and write
5BBE000
stack
page read and write
6EB000
heap
page read and write
1350000
trusted library allocation
page execute and read and write
120FE000
stack
page read and write
694000
heap
page read and write
2BB4000
trusted library allocation
page read and write
7E40000
heap
page read and write
1096000
trusted library allocation
page execute and read and write
32E0000
trusted library allocation
page execute and read and write
610000
heap
page read and write
5A30000
trusted library allocation
page read and write
E20000
heap
page read and write
2BB2000
trusted library allocation
page read and write
2BE2000
trusted library allocation
page read and write
26C1000
trusted library allocation
page read and write
170E000
stack
page read and write
124FE000
stack
page read and write
8568000
heap
page read and write
6B80000
trusted library allocation
page execute and read and write
9E00000
heap
page read and write
2BDA000
trusted library allocation
page read and write
F80000
heap
page read and write
2BA4000
trusted library allocation
page read and write
7750000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
2683000
heap
page read and write
2AC6000
trusted library allocation
page read and write
1074000
trusted library allocation
page read and write
7580000
trusted library section
page readonly
32D0000
trusted library allocation
page execute and read and write
2ED000
stack
page read and write
565E000
stack
page read and write
2BD6000
trusted library allocation
page read and write
151E000
stack
page read and write
123BD000
stack
page read and write
2D8E000
trusted library allocation
page read and write
521E000
stack
page read and write
31B0000
trusted library allocation
page read and write
C10000
trusted library allocation
page read and write
2B9C000
trusted library allocation
page read and write
391A000
trusted library allocation
page read and write
AF0000
trusted library allocation
page read and write
FA7000
heap
page read and write
10AB000
trusted library allocation
page execute and read and write
F70000
heap
page read and write
392A000
trusted library allocation
page read and write
2BA6000
trusted library allocation
page read and write
8430000
trusted library allocation
page read and write
3668000
trusted library allocation
page read and write
38FA000
trusted library allocation
page read and write
2D9E000
trusted library allocation
page read and write
3932000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
117AE000
stack
page read and write
12E0000
heap
page read and write
7E30000
heap
page read and write
2405000
trusted library allocation
page read and write
2BA2000
trusted library allocation
page read and write
EB0000
heap
page read and write
23DC000
trusted library allocation
page read and write
615000
heap
page read and write
F50000
heap
page read and write
31A2000
trusted library allocation
page read and write
F20000
unkown
page execute and read and write
640000
heap
page read and write
75E0000
trusted library allocation
page execute and read and write
E29000
heap
page read and write
821B000
stack
page read and write
13D4000
heap
page read and write
13AE000
heap
page read and write
4FE5000
trusted library allocation
page read and write
59EE000
stack
page read and write
B22000
trusted library allocation
page read and write
1227E000
stack
page read and write
3EE5000
trusted library allocation
page read and write
5F40000
heap
page read and write
10E0000
trusted library allocation
page read and write
2B98000
trusted library allocation
page read and write
75F0000
heap
page read and write
C9E000
unkown
page read and write
38F4000
trusted library allocation
page read and write
9FB0000
trusted library allocation
page read and write
2BC8000
trusted library allocation
page read and write
3900000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
11EF000
stack
page read and write
10BA000
trusted library allocation
page execute and read and write
4E61000
trusted library allocation
page read and write
2BB0000
trusted library allocation
page read and write
770000
heap
page read and write
2D00000
heap
page execute and read and write
100C000
heap
page read and write
2C10000
trusted library allocation
page read and write
81BE000
stack
page read and write
F53000
trusted library allocation
page execute and read and write
71CE000
trusted library allocation
page read and write
E98000
heap
page read and write
17C0000
heap
page read and write
B32000
trusted library allocation
page read and write
2C72000
trusted library allocation
page read and write
2DA5000
trusted library allocation
page read and write
3918000
trusted library allocation
page read and write
4D4E000
stack
page read and write
325E000
stack
page read and write
2680000
heap
page read and write
E00000
heap
page read and write
8660000
trusted library section
page readonly
85BF000
heap
page read and write
51E0000
heap
page read and write
5CFD000
stack
page read and write
2BC4000
trusted library allocation
page read and write
2BE4000
trusted library allocation
page read and write
3D11000
trusted library allocation
page read and write
2CC0000
trusted library allocation
page read and write
FA8000
unkown
page execute and read and write
65A000
heap
page read and write
1114D000
stack
page read and write
3480000
trusted library allocation
page read and write
3E0000
heap
page read and write
742E000
stack
page read and write
13A0000
heap
page read and write
2BBC000
trusted library allocation
page read and write
3260000
trusted library allocation
page read and write
112CE000
stack
page read and write
3902000
trusted library allocation
page read and write
118AE000
stack
page read and write
13E1000
heap
page read and write
A450000
trusted library allocation
page read and write
1213E000
stack
page read and write
2BB6000
trusted library allocation
page read and write
7EC0000
trusted library allocation
page read and write
8D10000
heap
page read and write
57DD000
stack
page read and write
57CE000
stack
page read and write
75A0000
heap
page read and write
71E2000
trusted library allocation
page read and write
2CA000
stack
page read and write
2C51000
trusted library allocation
page read and write
5CBF000
stack
page read and write
8D00000
heap
page read and write
7FB0000
heap
page execute and read and write
1040000
heap
page read and write
2C59000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page execute and read and write
10CB000
trusted library allocation
page execute and read and write
1273E000
stack
page read and write
578E000
stack
page read and write
18DF000
stack
page read and write
8C0000
heap
page read and write
A8BE000
stack
page read and write
B2A000
trusted library allocation
page execute and read and write
124F000
stack
page read and write
650000
heap
page read and write
3270000
trusted library allocation
page execute and read and write
5A33000
heap
page read and write
526E000
stack
page read and write
2B8E000
stack
page read and write
3DE000
unkown
page read and write
31A6000
trusted library allocation
page execute and read and write
38EC000
trusted library allocation
page read and write
7604000
heap
page read and write
7718000
trusted library allocation
page read and write
122E000
stack
page read and write
400000
remote allocation
page execute and read and write
23D0000
trusted library allocation
page read and write
2BDC000
trusted library allocation
page read and write
178E000
stack
page read and write
23E0000
trusted library allocation
page execute and read and write
245E000
stack
page read and write
8CE0000
trusted library allocation
page read and write
8570000
heap
page read and write
2690000
trusted library allocation
page read and write
E10000
heap
page read and write
7F5D000
stack
page read and write
554C000
stack
page read and write
DE0000
heap
page read and write
17C8000
heap
page read and write
12B20000
heap
page read and write
2BA0000
trusted library allocation
page read and write
94AE000
stack
page read and write
F78000
heap
page read and write
BBEE000
stack
page read and write
C27000
heap
page read and write
766D000
heap
page read and write
3916000
trusted library allocation
page read and write
12B1C000
stack
page read and write
A8FE000
stack
page read and write
3871000
trusted library allocation
page read and write
1130000
heap
page read and write
70F000
unkown
page read and write
E22000
heap
page read and write
BEEF000
stack
page read and write
4E4E000
stack
page read and write
C6B000
stack
page read and write
1223E000
stack
page read and write
2B9A000
trusted library allocation
page read and write
3200000
trusted library allocation
page execute and read and write
59A0000
trusted library allocation
page read and write
8CF0000
trusted library allocation
page execute and read and write
1118D000
stack
page read and write
B0D000
trusted library allocation
page execute and read and write
518F000
stack
page read and write
EE1000
heap
page read and write
2CD0000
trusted library allocation
page read and write
36A6000
trusted library allocation
page read and write
2BC0000
trusted library allocation
page read and write
2BAE000
trusted library allocation
page read and write
1166D000
stack
page read and write
E2B000
heap
page read and write
7570000
trusted library allocation
page read and write
B37000
trusted library allocation
page execute and read and write
7F0D000
trusted library allocation
page read and write
3639000
trusted library allocation
page read and write
71AE000
stack
page read and write
BDC000
stack
page read and write
2490000
trusted library allocation
page read and write
95EE000
stack
page read and write
8410000
trusted library allocation
page read and write
3C8000
stack
page read and write
5F3E000
stack
page read and write
7740000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
B9E000
stack
page read and write
38EA000
trusted library allocation
page read and write
BE0000
heap
page read and write
6090000
heap
page read and write
3290000
trusted library allocation
page read and write
7F01000
trusted library allocation
page read and write
19DF000
stack
page read and write
95AE000
stack
page read and write
2D19000
trusted library allocation
page read and write
85A2000
heap
page read and write
555E000
stack
page read and write
8225000
heap
page read and write
3924000
trusted library allocation
page read and write
38E8000
trusted library allocation
page read and write
31B7000
trusted library allocation
page execute and read and write
347E000
trusted library allocation
page read and write
1070000
trusted library allocation
page read and write
2AD4000
trusted library allocation
page read and write
684000
heap
page read and write
EA6000
heap
page read and write
7610000
heap
page read and write
5270000
trusted library allocation
page read and write
9E9000
stack
page read and write
10B0000
trusted library allocation
page read and write
3300000
heap
page execute and read and write
F00000
heap
page read and write
8400000
heap
page read and write
758F000
trusted library section
page readonly
3184000
trusted library allocation
page read and write
4028000
trusted library allocation
page read and write
340E000
stack
page read and write
7FA30000
trusted library allocation
page execute and read and write
7530000
trusted library allocation
page read and write
1080000
trusted library allocation
page read and write
3180000
trusted library allocation
page read and write
B03000
trusted library allocation
page execute and read and write
5220000
trusted library allocation
page read and write
7654000
heap
page read and write
2BC6000
trusted library allocation
page read and write
31BB000
trusted library allocation
page execute and read and write
14C0000
heap
page read and write
7260000
trusted library allocation
page read and write
7280000
heap
page read and write
1452000
heap
page read and write
7540000
trusted library allocation
page execute and read and write
58CC000
stack
page read and write
EFB0000
trusted library section
page read and write
F22000
unkown
page execute and read and write
3930000
trusted library allocation
page read and write
38FC000
trusted library allocation
page read and write
7590000
heap
page read and write
DD0000
heap
page read and write
B50000
trusted library allocation
page read and write
1068000
heap
page read and write
14D0000
heap
page read and write
2D88000
trusted library allocation
page read and write
80BD000
stack
page read and write
901A000
heap
page read and write
392E000
trusted library allocation
page read and write
2BC2000
trusted library allocation
page read and write
D20000
heap
page read and write
2BCC000
trusted library allocation
page read and write
8220000
heap
page read and write
93F0000
trusted library allocation
page execute and read and write
53EC000
stack
page read and write
1468000
heap
page read and write
2C2E000
stack
page read and write
2CC8000
trusted library allocation
page read and write
2460000
trusted library allocation
page execute and read and write
558E000
stack
page read and write
C00000
trusted library allocation
page execute and read and write
2955000
trusted library allocation
page read and write
FBA000
unkown
page execute and read and write
E1D000
heap
page read and write
2BAC000
trusted library allocation
page read and write
5A7E000
stack
page read and write
522E000
stack
page read and write
There are 578 hidden memdumps, click here to show them.