IOC Report
RFQ-101432620247fl#U00e2#U00aexslx.exe

loading gif

Files

File Path
Type
Category
Malicious
RFQ-101432620247fl#U00e2#U00aexslx.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp9347.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\ywKDUBCUA.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RFQ-101432620247fl#U00e2#U00aexslx.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ywKDUBCUA.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2zrixhwo.o0a.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_53jam2fg.fk2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5d3wf5yg.gfv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cwdgkiem.2ke.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d2ffljvw.hrm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rtht3cui.0l0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vr4bb4ry.n0g.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ze1cemh5.psb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpA374.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\ywKDUBCUA.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RFQ-101432620247fl#U00e2#U00aexslx.exe
"C:\Users\user\Desktop\RFQ-101432620247fl#U00e2#U00aexslx.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\RFQ-101432620247fl#U00e2#U00aexslx.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ywKDUBCUA.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ywKDUBCUA" /XML "C:\Users\user\AppData\Local\Temp\tmp9347.tmp"
malicious
C:\Users\user\Desktop\RFQ-101432620247fl#U00e2#U00aexslx.exe
"C:\Users\user\Desktop\RFQ-101432620247fl#U00e2#U00aexslx.exe"
malicious
C:\Users\user\AppData\Roaming\ywKDUBCUA.exe
C:\Users\user\AppData\Roaming\ywKDUBCUA.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ywKDUBCUA" /XML "C:\Users\user\AppData\Local\Temp\tmpA374.tmp"
malicious
C:\Users\user\AppData\Roaming\ywKDUBCUA.exe
"C:\Users\user\AppData\Roaming\ywKDUBCUA.exe"
malicious
C:\Users\user\AppData\Roaming\ywKDUBCUA.exe
"C:\Users\user\AppData\Roaming\ywKDUBCUA.exe"
malicious
C:\Users\user\AppData\Roaming\ywKDUBCUA.exe
"C:\Users\user\AppData\Roaming\ywKDUBCUA.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.telegram.org/bot7156462915:AAE3EIUy20eRSFdNZcqhQa0y1tAvt8IT_oY/sendDocument
149.154.167.220
malicious
https://api.telegram.org
unknown
malicious
https://api.telegram.org/bot7156462915:AAE3EIUy20eRSFdNZcqhQa0y1tAvt8IT_oY/
unknown
malicious
https://account.dyn.com/
unknown
http://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown

Domains

Name
IP
Malicious
api.telegram.org
149.154.167.220
malicious

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ-101432620247fl#U00e2#U00aexslx_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ-101432620247fl#U00e2#U00aexslx_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ-101432620247fl#U00e2#U00aexslx_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ-101432620247fl#U00e2#U00aexslx_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ-101432620247fl#U00e2#U00aexslx_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ-101432620247fl#U00e2#U00aexslx_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ-101432620247fl#U00e2#U00aexslx_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ-101432620247fl#U00e2#U00aexslx_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ-101432620247fl#U00e2#U00aexslx_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ-101432620247fl#U00e2#U00aexslx_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ-101432620247fl#U00e2#U00aexslx_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ-101432620247fl#U00e2#U00aexslx_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ-101432620247fl#U00e2#U00aexslx_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ-101432620247fl#U00e2#U00aexslx_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ywKDUBCUA_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ywKDUBCUA_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ywKDUBCUA_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ywKDUBCUA_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ywKDUBCUA_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ywKDUBCUA_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ywKDUBCUA_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ywKDUBCUA_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ywKDUBCUA_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ywKDUBCUA_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ywKDUBCUA_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ywKDUBCUA_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ywKDUBCUA_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ywKDUBCUA_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
43B1000
trusted library allocation
page read and write
malicious
3211000
trusted library allocation
page read and write
malicious
3BA0000
trusted library allocation
page read and write
malicious
3262000
trusted library allocation
page read and write
malicious
2D1D000
trusted library allocation
page read and write
malicious
2D02000
trusted library allocation
page read and write
malicious
2CB1000
trusted library allocation
page read and write
malicious
327D000
trusted library allocation
page read and write
malicious
44C2000
trusted library allocation
page read and write
malicious
436000
remote allocation
page execute and read and write
malicious
12F9000
stack
page read and write
81B9000
heap
page read and write
27BF000
stack
page read and write
72E0000
trusted library allocation
page execute and read and write
5920000
heap
page read and write
50C0000
heap
page read and write
1240000
heap
page read and write
3135000
trusted library allocation
page read and write
3F0000
heap
page read and write
313F000
unkown
page read and write
48B0000
trusted library allocation
page read and write
1121000
trusted library allocation
page read and write
5930000
heap
page read and write
624F000
stack
page read and write
F30000
trusted library allocation
page read and write
B2AE000
stack
page read and write
5570000
heap
page read and write
5C4F000
stack
page read and write
7F6E0000
trusted library allocation
page execute and read and write
7F7D0000
trusted library allocation
page execute and read and write
59A0000
heap
page read and write
6807000
trusted library allocation
page read and write
16C0000
trusted library allocation
page read and write
6840000
heap
page read and write
5750000
heap
page read and write
5E7E000
stack
page read and write
55A1000
trusted library allocation
page read and write
B3ED000
stack
page read and write
3183000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
BA6000
heap
page read and write
6B0000
heap
page read and write
5850000
heap
page execute and read and write
EA0000
heap
page read and write
5E97000
trusted library allocation
page read and write
6250000
heap
page read and write
6A00000
heap
page read and write
1590000
heap
page read and write
552E000
stack
page read and write
2AB0000
heap
page read and write
5573000
heap
page read and write
A56E000
stack
page read and write
B26E000
stack
page read and write
66B0000
heap
page read and write
3142000
trusted library allocation
page read and write
60E0000
heap
page read and write
66A6000
trusted library allocation
page read and write
2C8C000
trusted library allocation
page read and write
4DE0000
heap
page read and write
150A000
heap
page read and write
1100000
trusted library allocation
page read and write
65E0000
trusted library allocation
page read and write
17C0000
heap
page read and write
166D000
trusted library allocation
page execute and read and write
71C0000
trusted library allocation
page execute and read and write
AE0000
heap
page read and write
998C000
trusted library allocation
page read and write
8190000
heap
page read and write
60F0000
heap
page read and write
BC3000
heap
page read and write
66A0000
trusted library allocation
page read and write
6AB0000
trusted library section
page read and write
105E000
stack
page read and write
66D0000
trusted library allocation
page execute and read and write
16B0000
heap
page read and write
30BB000
trusted library allocation
page read and write
179C000
stack
page read and write
6CFE000
stack
page read and write
55F0000
trusted library allocation
page read and write
5650000
trusted library allocation
page execute and read and write
503C000
stack
page read and write
73A0000
heap
page read and write
5960000
trusted library allocation
page execute and read and write
5997000
trusted library allocation
page read and write
7389000
heap
page read and write
142A000
trusted library allocation
page execute and read and write
2826000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
161A000
heap
page read and write
5350000
trusted library allocation
page read and write
5EC8000
trusted library allocation
page read and write
31FE000
stack
page read and write
73DF000
stack
page read and write
4211000
trusted library allocation
page read and write
CB5000
heap
page read and write
A430000
heap
page read and write
62A7000
heap
page read and write
6930000
heap
page read and write
6917000
heap
page read and write
1430000
trusted library allocation
page read and write
315D000
trusted library allocation
page read and write
1710000
heap
page execute and read and write
5ACD000
trusted library allocation
page read and write
1140000
heap
page read and write
2800000
trusted library allocation
page read and write
6810000
trusted library allocation
page execute and read and write
5934000
heap
page read and write
17B4000
trusted library allocation
page read and write
88F0000
trusted library section
page read and write
4DF0000
trusted library allocation
page read and write
412000
remote allocation
page execute and read and write
4DC0000
heap
page read and write
4239000
trusted library allocation
page read and write
A0AE000
stack
page read and write
5550000
trusted library allocation
page read and write
326A000
trusted library allocation
page read and write
15C6000
heap
page read and write
7F0000
heap
page read and write
5B00000
trusted library allocation
page read and write
169B000
trusted library allocation
page execute and read and write
C0D000
heap
page read and write
E50000
heap
page read and write
2BFE000
stack
page read and write
2AA0000
trusted library allocation
page read and write
BD1C000
stack
page read and write
1126000
trusted library allocation
page read and write
317E000
stack
page read and write
1430000
heap
page read and write
68E1000
heap
page read and write
5AC0000
trusted library allocation
page read and write
5D50000
trusted library allocation
page read and write
FE0000
heap
page read and write
BD5E000
stack
page read and write
587B000
stack
page read and write
E1E000
stack
page read and write
105A000
stack
page read and write
66C0000
trusted library allocation
page read and write
1580000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
2C90000
heap
page read and write
143B000
trusted library allocation
page execute and read and write
110E000
trusted library allocation
page read and write
140D000
trusted library allocation
page execute and read and write
6FD0000
heap
page read and write
6D6E000
stack
page read and write
B20000
heap
page read and write
5365000
trusted library allocation
page read and write
A32D000
stack
page read and write
1437000
trusted library allocation
page execute and read and write
F1C000
stack
page read and write
6272000
heap
page read and write
AB5D000
stack
page read and write
5EA000
stack
page read and write
18A0000
heap
page read and write
6BB0000
trusted library allocation
page read and write
B72E000
stack
page read and write
16F0000
heap
page read and write
A6AD000
stack
page read and write
77CE000
stack
page read and write
604F000
stack
page read and write
44D2000
trusted library allocation
page read and write
E4D000
trusted library allocation
page execute and read and write
5DAD000
stack
page read and write
8392000
trusted library allocation
page read and write
29F6000
trusted library allocation
page read and write
6BBF000
stack
page read and write
1697000
trusted library allocation
page execute and read and write
F3A000
stack
page read and write
43A000
remote allocation
page execute and read and write
4E20000
trusted library allocation
page execute and read and write
3868000
trusted library allocation
page read and write
62AB000
heap
page read and write
38B7000
trusted library allocation
page read and write
112D000
trusted library allocation
page read and write
B9AE000
stack
page read and write
16D0000
trusted library allocation
page execute and read and write
B20000
heap
page read and write
51E0000
trusted library allocation
page read and write
14EC000
stack
page read and write
1404000
trusted library allocation
page read and write
671D000
stack
page read and write
5980000
trusted library allocation
page execute and read and write
5250000
heap
page read and write
328D000
trusted library allocation
page read and write
3A3E000
trusted library allocation
page read and write
1403000
trusted library allocation
page execute and read and write
4E60000
heap
page read and write
17B6000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
17B0000
trusted library allocation
page read and write
BF3000
heap
page read and write
42B000
remote allocation
page execute and read and write
280B000
trusted library allocation
page read and write
110B000
trusted library allocation
page read and write
6AC0000
trusted library allocation
page read and write
B4F0000
heap
page read and write
E56000
trusted library allocation
page execute and read and write
1157000
stack
page read and write
5D7F000
stack
page read and write
2EFE000
unkown
page read and write
5AB0000
trusted library allocation
page read and write
5880000
trusted library section
page readonly
6DFE000
stack
page read and write
559E000
trusted library allocation
page read and write
14F0000
trusted library allocation
page execute and read and write
402000
remote allocation
page execute and read and write
1503000
heap
page read and write
DCE000
stack
page read and write
554000
unkown
page readonly
2A60000
heap
page execute and read and write
B4ED000
stack
page read and write
4279000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
4D45000
trusted library allocation
page read and write
558B000
trusted library allocation
page read and write
42C000
remote allocation
page execute and read and write
BA3000
heap
page read and write
5580000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
67BE000
stack
page read and write
3861000
trusted library allocation
page read and write
E3D000
trusted library allocation
page execute and read and write
28CA000
trusted library allocation
page read and write
313E000
trusted library allocation
page read and write
313B000
trusted library allocation
page read and write
435000
remote allocation
page execute and read and write
6BC0000
trusted library section
page read and write
C70000
trusted library allocation
page read and write
65D0000
trusted library allocation
page read and write
B3AE000
stack
page read and write
424E000
trusted library allocation
page read and write
C82000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
A30000
heap
page read and write
4CD2000
trusted library allocation
page read and write
329E000
trusted library allocation
page read and write
6850000
trusted library allocation
page execute and read and write
1663000
trusted library allocation
page execute and read and write
5B7C000
stack
page read and write
3071000
trusted library allocation
page read and write
2BBE000
stack
page read and write
6F40000
trusted library allocation
page read and write
5EC0000
trusted library allocation
page read and write
E62000
trusted library allocation
page read and write
4A0000
unkown
page readonly
B86E000
stack
page read and write
693E000
heap
page read and write
C95000
trusted library allocation
page execute and read and write
B70000
heap
page read and write
1146000
heap
page read and write
B16E000
stack
page read and write
50D0000
trusted library allocation
page execute and read and write
A06F000
stack
page read and write
3200000
heap
page execute and read and write
281E000
trusted library allocation
page read and write
6BAE000
stack
page read and write
5935000
heap
page read and write
1673000
trusted library allocation
page read and write
3905000
trusted library allocation
page read and write
1664000
trusted library allocation
page read and write
760000
heap
page read and write
1460000
heap
page read and write
A8DB000
stack
page read and write
5D60000
trusted library allocation
page execute and read and write
314E000
trusted library allocation
page read and write
B78000
heap
page read and write
72D0000
heap
page read and write
A42D000
stack
page read and write
6CBE000
stack
page read and write
4DC3000
heap
page read and write
5B10000
trusted library allocation
page read and write
520C000
stack
page read and write
2D3E000
trusted library allocation
page read and write
70A000
stack
page read and write
A66E000
stack
page read and write
2A5C000
stack
page read and write
1422000
trusted library allocation
page read and write
55A6000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
6FBD000
stack
page read and write
8217000
heap
page read and write
71AE000
stack
page read and write
143A000
heap
page read and write
1680000
trusted library allocation
page read and write
4E50000
trusted library section
page readonly
4FF0000
heap
page read and write
F50000
heap
page read and write
7395000
heap
page read and write
30DA000
trusted library allocation
page read and write
B50000
trusted library allocation
page read and write
3098000
trusted library allocation
page read and write
1435000
trusted library allocation
page execute and read and write
143E000
heap
page read and write
1629000
heap
page read and write
1692000
trusted library allocation
page read and write
2D3A000
trusted library allocation
page read and write
2CA0000
heap
page execute and read and write
542E000
stack
page read and write
B6D000
trusted library allocation
page execute and read and write
589D000
stack
page read and write
1112000
trusted library allocation
page read and write
434000
remote allocation
page execute and read and write
48C0000
trusted library allocation
page execute and read and write
940000
heap
page read and write
3D0000
heap
page read and write
7B0000
heap
page read and write
9C6E000
stack
page read and write
E67000
trusted library allocation
page execute and read and write
4D80000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page execute and read and write
C13000
heap
page read and write
17A0000
trusted library allocation
page read and write
63E000
unkown
page read and write
C1E000
heap
page read and write
E80000
trusted library allocation
page read and write
2D2D000
trusted library allocation
page read and write
29F4000
trusted library allocation
page read and write
B2E000
heap
page read and write
123E000
stack
page read and write
BBDF000
stack
page read and write
16E0000
heap
page read and write
1464000
heap
page read and write
29F0000
trusted library allocation
page read and write
5E90000
trusted library allocation
page read and write
188F000
stack
page read and write
C92000
trusted library allocation
page read and write
64CE000
stack
page read and write
E6B000
trusted library allocation
page execute and read and write
17C7000
heap
page read and write
751E000
stack
page read and write
6FC0000
trusted library allocation
page read and write
E20000
heap
page read and write
5990000
trusted library allocation
page read and write
E5A000
trusted library allocation
page execute and read and write
F20000
trusted library allocation
page execute and read and write
BCB000
heap
page read and write
3260000
trusted library allocation
page read and write
175E000
stack
page read and write
A8E000
stack
page read and write
1690000
trusted library allocation
page read and write
15BA000
heap
page read and write
152A000
heap
page read and write
C12000
heap
page read and write
9F6F000
stack
page read and write
6F5B000
trusted library allocation
page read and write
AF8000
stack
page read and write
4078000
trusted library allocation
page read and write
C8A000
trusted library allocation
page execute and read and write
2971000
trusted library allocation
page read and write
7AE000
stack
page read and write
A1EE000
stack
page read and write
5245000
heap
page read and write
5240000
heap
page read and write
18E0000
heap
page read and write
3CD9000
trusted library allocation
page read and write
BFD000
heap
page read and write
2AA8000
trusted library allocation
page read and write
5EA0000
trusted library allocation
page execute and read and write
2840000
trusted library allocation
page read and write
2C80000
trusted library allocation
page read and write
3270000
heap
page read and write
4351000
trusted library allocation
page read and write
13F0000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
B8D000
stack
page read and write
6EFE000
stack
page read and write
31BE000
stack
page read and write
5ECE000
trusted library allocation
page read and write
67F000
unkown
page read and write
27FC000
stack
page read and write
4A2000
unkown
page readonly
4163000
trusted library allocation
page read and write
6BD0000
trusted library allocation
page execute and read and write
B76D000
stack
page read and write
7300000
trusted library allocation
page execute and read and write
E30000
trusted library allocation
page read and write
5E8D000
stack
page read and write
11B0000
heap
page read and write
1686000
trusted library allocation
page execute and read and write
154E000
stack
page read and write
648E000
stack
page read and write
B61000
heap
page read and write
3CB1000
trusted library allocation
page read and write
5565000
trusted library allocation
page read and write
15C4000
heap
page read and write
1890000
trusted library allocation
page read and write
5260000
heap
page read and write
36A000
stack
page read and write
51DD000
stack
page read and write
14AE000
stack
page read and write
2C3E000
stack
page read and write
3130000
trusted library allocation
page read and write
754E000
stack
page read and write
5E4E000
stack
page read and write
5560000
trusted library allocation
page read and write
58DE000
stack
page read and write
66A2000
trusted library allocation
page read and write
1650000
trusted library allocation
page read and write
614E000
stack
page read and write
4D50000
trusted library allocation
page read and write
E40000
heap
page read and write
C7D000
trusted library allocation
page execute and read and write
A1AE000
stack
page read and write
62A9000
heap
page read and write
1450000
trusted library allocation
page read and write
1465000
heap
page read and write
6660000
heap
page read and write
1472000
heap
page read and write
D1E000
stack
page read and write
4071000
trusted library allocation
page read and write
11FE000
stack
page read and write
43C000
remote allocation
page execute and read and write
4456000
trusted library allocation
page read and write
5C7E000
stack
page read and write
721E000
stack
page read and write
5220000
trusted library allocation
page execute and read and write
B54000
heap
page read and write
168A000
trusted library allocation
page execute and read and write
638E000
stack
page read and write
65CE000
stack
page read and write
6E3E000
stack
page read and write
E43000
trusted library allocation
page read and write
2C7E000
stack
page read and write
111E000
trusted library allocation
page read and write
A9DC000
stack
page read and write
6963000
heap
page read and write
EDE000
stack
page read and write
1894000
trusted library allocation
page read and write
31AC000
stack
page read and write
6650000
trusted library allocation
page read and write
532C000
stack
page read and write
1410000
trusted library allocation
page read and write
1245000
heap
page read and write
1507000
heap
page read and write
7330000
heap
page read and write
1470000
heap
page read and write
2D1A000
trusted library allocation
page read and write
141E000
stack
page read and write
5210000
trusted library allocation
page read and write
1426000
trusted library allocation
page execute and read and write
AC5E000
stack
page read and write
C9B000
trusted library allocation
page execute and read and write
683E000
stack
page read and write
5200000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
6BA000
heap
page read and write
B99000
heap
page read and write
90F000
stack
page read and write
5287000
heap
page read and write
B64000
trusted library allocation
page read and write
68C0000
heap
page read and write
2D0A000
trusted library allocation
page read and write
FDE000
stack
page read and write
530E000
stack
page read and write
5230000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
14D5000
heap
page read and write
167D000
trusted library allocation
page execute and read and write
2A00000
trusted library allocation
page read and write
5800000
heap
page execute and read and write
66C6000
trusted library allocation
page read and write
5D56000
trusted library allocation
page read and write
F90000
heap
page read and write
51F0000
trusted library allocation
page read and write
3E0000
heap
page read and write
AA1D000
stack
page read and write
4372000
trusted library allocation
page read and write
5930000
heap
page read and write
2861000
trusted library allocation
page read and write
3266000
trusted library allocation
page read and write
2F38000
heap
page read and write
A2EE000
stack
page read and write
2973000
trusted library allocation
page read and write
329A000
trusted library allocation
page read and write
764E000
stack
page read and write
741E000
stack
page read and write
162E000
stack
page read and write
ED0000
heap
page read and write
B62E000
stack
page read and write
6F50000
trusted library allocation
page read and write
E52000
trusted library allocation
page read and write
28AB000
trusted library allocation
page read and write
6F3E000
stack
page read and write
1682000
trusted library allocation
page read and write
5910000
heap
page read and write
ACE000
stack
page read and write
4E40000
trusted library allocation
page read and write
1550000
heap
page read and write
71EE000
heap
page read and write
CB0000
heap
page read and write
BC1C000
stack
page read and write
5630000
heap
page read and write
8206000
heap
page read and write
50AE000
stack
page read and write
B5F000
heap
page read and write
A440000
heap
page read and write
1068000
trusted library allocation
page read and write
1500000
heap
page read and write
2850000
heap
page execute and read and write
327A000
trusted library allocation
page read and write
5B1F000
trusted library allocation
page read and write
81A5000
heap
page read and write
F57000
heap
page read and write
5810000
trusted library allocation
page execute and read and write
6B8E000
stack
page read and write
32D000
stack
page read and write
8F7000
stack
page read and write
141D000
trusted library allocation
page execute and read and write
629F000
heap
page read and write
B63000
trusted library allocation
page execute and read and write
E90000
trusted library allocation
page read and write
3156000
trusted library allocation
page read and write
7EE000
stack
page read and write
1670000
trusted library allocation
page read and write
29EE000
stack
page read and write
C97000
trusted library allocation
page execute and read and write
69AD000
stack
page read and write
BBB000
heap
page read and write
E90000
trusted library allocation
page execute and read and write
E40000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page execute and read and write
49FC000
stack
page read and write
14D9000
heap
page read and write
B29000
heap
page read and write
2F30000
heap
page read and write
42D5000
trusted library allocation
page read and write
AB1E000
stack
page read and write
66AC000
trusted library allocation
page read and write
5830000
trusted library allocation
page read and write
68AE000
stack
page read and write
67FE000
stack
page read and write
E34000
trusted library allocation
page read and write
50D0000
heap
page read and write
18B0000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
1457000
heap
page read and write
2C94000
heap
page read and write
945000
heap
page read and write
65EB000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
3B62000
trusted library allocation
page read and write
306F000
stack
page read and write
A40000
heap
page read and write
26BE000
stack
page read and write
5640000
trusted library allocation
page read and write
1616000
heap
page read and write
3953000
trusted library allocation
page read and write
9C9B000
trusted library allocation
page read and write
4E00000
trusted library allocation
page execute and read and write
1598000
heap
page read and write
6A30000
trusted library allocation
page execute and read and write
14D1000
heap
page read and write
55AD000
trusted library allocation
page read and write
282D000
trusted library allocation
page read and write
3D18000
trusted library allocation
page read and write
BE5E000
stack
page read and write
1660000
trusted library allocation
page read and write
4DA0000
heap
page execute and read and write
5950000
trusted library allocation
page read and write
5590000
heap
page read and write
71E0000
heap
page read and write
2821000
trusted library allocation
page read and write
1432000
trusted library allocation
page read and write
664D000
stack
page read and write
5360000
trusted library allocation
page read and write
42A000
remote allocation
page execute and read and write
4D40000
trusted library allocation
page read and write
68C3000
heap
page read and write
5AC5000
trusted library allocation
page read and write
6985000
heap
page read and write
5970000
trusted library allocation
page read and write
C1D000
heap
page read and write
2D00000
trusted library allocation
page read and write
71B0000
heap
page read and write
BADE000
stack
page read and write
1570000
trusted library allocation
page read and write
1507000
heap
page read and write
11A0000
heap
page read and write
BCF000
heap
page read and write
E33000
trusted library allocation
page execute and read and write
8CE000
stack
page read and write
1400000
trusted library allocation
page read and write
6A8E000
stack
page read and write
6CFE000
stack
page read and write
BC9000
stack
page read and write
B8AE000
stack
page read and write
ED7000
heap
page read and write
2D06000
trusted library allocation
page read and write
6ABF000
stack
page read and write
5AAD000
stack
page read and write
3151000
trusted library allocation
page read and write
A7AE000
stack
page read and write
489E000
stack
page read and write
2D50000
trusted library allocation
page read and write
18E6000
heap
page read and write
950000
heap
page read and write
6800000
trusted library allocation
page read and write
BF9000
heap
page read and write
C86000
trusted library allocation
page execute and read and write
There are 589 hidden memdumps, click here to show them.