IOC Report
vkXe5gkY34.exe

loading gif

Files

File Path
Type
Category
Malicious
vkXe5gkY34.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp3BF9.tmp
ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\efthfxj.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\efthfxj.sfx.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\efthfxj.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\eystsdf.cmd
DOS batch file, ASCII text, with very long lines (18697), with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\vkXe5gkY34.exe
"C:\Users\user\Desktop\vkXe5gkY34.exe"
malicious
C:\Users\user\AppData\Roaming\efthfxj.sfx.exe
efthfxj.sfx.exe -pgtrfdewscbsdyethnymkdesppodtyuhngfszafugyRhvqxsdfHbgnmeG -dC:\Users\user\AppData\Roaming
malicious
C:\Users\user\AppData\Roaming\efthfxj.exe
"C:\Users\user\AppData\Roaming\efthfxj.exe"
malicious
C:\Users\user\AppData\Roaming\efthfxj.exe
C:\Users\user\AppData\Roaming\efthfxj.exe
malicious
C:\Users\user\AppData\Roaming\efthfxj.exe
C:\Users\user\AppData\Roaming\efthfxj.exe
malicious
C:\Users\user\AppData\Roaming\efthfxj.exe
C:\Users\user\AppData\Roaming\efthfxj.exe
malicious
C:\Users\user\AppData\Roaming\efthfxj.exe
C:\Users\user\AppData\Roaming\efthfxj.exe
malicious
C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe
"C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe"
malicious
C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe
C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe
malicious
C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe
C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe
malicious
C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe
C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe
malicious
C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe
C:\Users\user\AppData\Roaming\XenoManager\efthfxj.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /Create /TN "HDdisplay" /XML "C:\Users\user\AppData\Local\Temp\tmp3BF9.tmp" /F
malicious
C:\Users\user\AppData\Roaming\efthfxj.exe
C:\Users\user\AppData\Roaming\efthfxj.exe
malicious
C:\Users\user\AppData\Roaming\efthfxj.exe
C:\Users\user\AppData\Roaming\efthfxj.exe
malicious
C:\Users\user\AppData\Roaming\efthfxj.exe
C:\Users\user\AppData\Roaming\efthfxj.exe
malicious
C:\Users\user\AppData\Roaming\efthfxj.exe
C:\Users\user\AppData\Roaming\efthfxj.exe
malicious
C:\Users\user\AppData\Roaming\efthfxj.exe
C:\Users\user\AppData\Roaming\efthfxj.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\eystsdf.cmd" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 80
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
45.66.231.63
malicious
http://go.microsoft.c
unknown

IPs

IP
Domain
Country
Malicious
45.66.231.63
unknown
Germany
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2A61000
trusted library allocation
page read and write
malicious
2C5B000
trusted library allocation
page read and write
malicious
2E75000
trusted library allocation
page read and write
malicious
2E84000
trusted library allocation
page read and write
malicious
2CA3000
trusted library allocation
page read and write
malicious
2EA5000
trusted library allocation
page read and write
malicious
2E93000
trusted library allocation
page read and write
malicious
28F1000
trusted library allocation
page read and write
malicious
2C94000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2B22000
trusted library allocation
page read and write
malicious
2C85000
trusted library allocation
page read and write
malicious
2CB6000
trusted library allocation
page read and write
malicious
783000
stack
page read and write
DC5000
heap
page read and write
565F000
stack
page read and write
B90000
heap
page read and write
CBE000
stack
page read and write
C70000
heap
page read and write
CB0000
trusted library allocation
page read and write
10BE000
heap
page read and write
1259000
heap
page read and write
117D000
trusted library allocation
page execute and read and write
A50000
trusted library allocation
page read and write
13A4000
heap
page read and write
E77000
heap
page read and write
1164000
trusted library allocation
page read and write
6AB000
stack
page read and write
DF2000
heap
page read and write
518C000
stack
page read and write
15AC000
stack
page read and write
2FB5000
heap
page read and write
2CB2000
trusted library allocation
page read and write
DB1000
heap
page read and write
4FE0000
heap
page read and write
509E000
stack
page read and write
D5D000
heap
page read and write
52CE000
stack
page read and write
161F000
stack
page read and write
19E0000
heap
page read and write
14F0000
heap
page read and write
F40000
heap
page read and write
5180000
heap
page execute and read and write
6D0000
heap
page read and write
658E000
stack
page read and write
15C0000
heap
page execute and read and write
1260000
heap
page read and write
1110000
heap
page read and write
5E0000
heap
page read and write
D87000
trusted library allocation
page execute and read and write
2CEE000
unkown
page read and write
615E000
stack
page read and write
D80000
heap
page read and write
13D7000
heap
page read and write
FF0000
trusted library allocation
page read and write
CC0000
unkown
page readonly
C70000
heap
page read and write
566E000
stack
page read and write
F6E000
stack
page read and write
4D7F000
stack
page read and write
2AFC000
stack
page read and write
A54000
trusted library allocation
page read and write
53C000
stack
page read and write
2CC1000
heap
page read and write
698F000
stack
page read and write
2AD0000
heap
page execute and read and write
2DBC000
stack
page read and write
674E000
stack
page read and write
2C60000
heap
page read and write
DA0000
trusted library allocation
page read and write
75CE000
stack
page read and write
54AE000
stack
page read and write
14F5000
heap
page read and write
12D0000
heap
page read and write
563E000
stack
page read and write
2F22000
heap
page read and write
1058000
heap
page read and write
27F0000
heap
page execute and read and write
4534000
trusted library allocation
page read and write
2CC2000
heap
page read and write
2C51000
trusted library allocation
page read and write
630000
unkown
page readonly
40E000
remote allocation
page execute and read and write
11C4000
trusted library allocation
page read and write
EC0000
heap
page read and write
D5C000
stack
page read and write
2FB0000
heap
page read and write
1000000
heap
page read and write
766000
stack
page read and write
2A80000
trusted library allocation
page read and write
32CE000
stack
page read and write
792000
stack
page read and write
1160000
trusted library allocation
page read and write
5170000
trusted library allocation
page read and write
110E000
stack
page read and write
26B0000
heap
page execute and read and write
268C000
stack
page read and write
7A8000
heap
page read and write
774000
stack
page read and write
A2E000
stack
page read and write
522E000
stack
page read and write
30DE000
stack
page read and write
A2A000
trusted library allocation
page execute and read and write
7B7000
heap
page read and write
3022000
heap
page read and write
1034000
trusted library allocation
page read and write
52CE000
stack
page read and write
631000
unkown
page execute read
504E000
stack
page read and write
2C61000
heap
page read and write
A26000
heap
page read and write
1044000
trusted library allocation
page read and write
9FD000
trusted library allocation
page execute and read and write
714E000
stack
page read and write
2A42000
heap
page read and write
16FD000
trusted library allocation
page execute and read and write
680000
heap
page read and write
C9F000
stack
page read and write
E5C000
stack
page read and write
53AC000
stack
page read and write
D64000
trusted library allocation
page read and write
C60000
heap
page read and write
1230000
heap
page read and write
2630000
trusted library allocation
page read and write
590000
heap
page read and write
599E000
stack
page read and write
709000
heap
page read and write
DC2000
heap
page read and write
5560000
heap
page execute and read and write
CC0000
trusted library allocation
page read and write
169E000
stack
page read and write
731000
heap
page read and write
30EE000
stack
page read and write
2DFD000
stack
page read and write
59CE000
stack
page read and write
9F0000
heap
page read and write
5010000
trusted library allocation
page read and write
B56000
heap
page read and write
D80000
heap
page read and write
C71000
trusted library allocation
page read and write
528D000
stack
page read and write
B30000
heap
page read and write
792000
unkown
page readonly
514F000
stack
page read and write
F44000
heap
page read and write
2C30000
trusted library allocation
page execute and read and write
DBB000
heap
page read and write
7AC000
heap
page read and write
4988000
trusted library allocation
page read and write
1550000
heap
page read and write
A80000
trusted library allocation
page read and write
1704000
trusted library allocation
page read and write
2A5E000
stack
page read and write
DCE0000
trusted library section
page read and write
1740000
trusted library allocation
page read and write
2DB4000
heap
page read and write
1323000
heap
page read and write
1773000
heap
page read and write
7B5000
heap
page read and write
534F000
stack
page read and write
98C000
stack
page read and write
1630000
trusted library allocation
page read and write
183E000
stack
page read and write
A00000
heap
page read and write
E74000
heap
page read and write
D55000
heap
page read and write
DFC000
heap
page read and write
19B0000
trusted library allocation
page read and write
7AC000
heap
page read and write
1174000
trusted library allocation
page read and write
A94D000
stack
page read and write
2C1E000
stack
page read and write
4F62000
heap
page read and write
53AE000
stack
page read and write
B2E000
heap
page read and write
A74E000
stack
page read and write
280C000
trusted library allocation
page read and write
111D000
heap
page read and write
4F62000
heap
page read and write
2BAF000
stack
page read and write
FDD000
trusted library allocation
page execute and read and write
2EA2000
trusted library allocation
page read and write
A06000
heap
page read and write
2CB0000
heap
page read and write
121B000
trusted library allocation
page execute and read and write
FFE000
stack
page read and write
1250000
heap
page read and write
2DF0000
heap
page read and write
1253000
heap
page read and write
CD4000
heap
page read and write
323E000
stack
page read and write
E0DE000
stack
page read and write
CB0000
heap
page read and write
C96000
heap
page read and write
4FFE000
stack
page read and write
1184000
trusted library allocation
page read and write
DBE000
heap
page read and write
103D000
trusted library allocation
page execute and read and write
2FC1000
heap
page read and write
2610000
heap
page read and write
4CC000
stack
page read and write
123C000
stack
page read and write
A43000
trusted library allocation
page execute and read and write
502E000
stack
page read and write
31F1000
trusted library allocation
page read and write
6ACE000
stack
page read and write
52CC000
stack
page read and write
4E0E000
stack
page read and write
272E000
stack
page read and write
66A000
unkown
page read and write
FD0000
heap
page read and write
16F4000
trusted library allocation
page read and write
C91000
unkown
page execute read
2FAE000
stack
page read and write
605E000
stack
page read and write
781000
stack
page read and write
DD0000
heap
page read and write
1020000
trusted library allocation
page read and write
53CE000
stack
page read and write
2DFB000
heap
page read and write
26C0000
trusted library allocation
page read and write
786000
unkown
page execute and read and write
11F0000
trusted library allocation
page read and write
86FE000
stack
page read and write
1170000
heap
page read and write
510E000
stack
page read and write
D3D000
heap
page read and write
D5F000
heap
page read and write
EE0000
heap
page read and write
2F84000
heap
page read and write
26B0000
trusted library allocation
page execute and read and write
D78000
stack
page read and write
7250000
trusted library allocation
page execute and read and write
3A61000
trusted library allocation
page read and write
5B0000
heap
page read and write
577E000
stack
page read and write
19C0000
trusted library allocation
page read and write
4DBE000
stack
page read and write
EBE000
stack
page read and write
2F90000
heap
page read and write
2B10000
trusted library allocation
page read and write
B83000
heap
page read and write
526E000
stack
page read and write
11E0000
heap
page read and write
2F5F000
stack
page read and write
4CE0000
trusted library allocation
page read and write
CE6000
trusted library allocation
page execute and read and write
66A000
unkown
page write copy
DD7000
heap
page read and write
FC0000
heap
page read and write
B11000
heap
page read and write
B95000
heap
page read and write
58CE000
stack
page read and write
BF4000
trusted library allocation
page read and write
A70D000
stack
page read and write
E8E000
heap
page read and write
9E0000
trusted library allocation
page read and write
31EE000
stack
page read and write
63EE000
stack
page read and write
EC2000
heap
page read and write
1650000
heap
page execute and read and write
173E000
stack
page read and write
BE4000
trusted library allocation
page read and write
CB4000
trusted library allocation
page read and write
D50000
heap
page read and write
3FC1000
trusted library allocation
page read and write
DC5000
heap
page read and write
2F9C000
stack
page read and write
2FA1000
trusted library allocation
page read and write
327D000
stack
page read and write
D7A000
trusted library allocation
page execute and read and write
8FC000
stack
page read and write
10A0000
trusted library allocation
page execute and read and write
CFB000
trusted library allocation
page execute and read and write
3090000
heap
page read and write
2D54000
heap
page read and write
710000
heap
page read and write
D41000
heap
page read and write
532E000
stack
page read and write
86BE000
stack
page read and write
E97000
heap
page read and write
301D000
trusted library allocation
page execute and read and write
27A1000
trusted library allocation
page read and write
C90000
heap
page read and write
1339000
stack
page read and write
A27000
trusted library allocation
page execute and read and write
2BBE000
stack
page read and write
776000
stack
page read and write
ABBE000
stack
page read and write
1DC000
stack
page read and write
4F62000
heap
page read and write
A22000
trusted library allocation
page read and write
3957000
trusted library allocation
page read and write
12A0000
heap
page read and write
DC8000
heap
page read and write
4E2E000
stack
page read and write
DAE000
stack
page read and write
2760000
heap
page execute and read and write
536E000
stack
page read and write
582E000
stack
page read and write
69CE000
stack
page read and write
4FAE000
stack
page read and write
4D10000
heap
page read and write
1620000
trusted library allocation
page read and write
FAE000
stack
page read and write
2FB5000
heap
page read and write
261E000
stack
page read and write
9F6000
heap
page read and write
2AAA000
trusted library allocation
page execute and read and write
CCE000
unkown
page read and write
12AF000
stack
page read and write
705D000
stack
page read and write
AA0000
trusted library allocation
page read and write
FD3000
trusted library allocation
page execute and read and write
DBA000
heap
page read and write
19AE000
stack
page read and write
71A000
heap
page read and write
10B0000
heap
page read and write
5A0000
heap
page read and write
1217000
trusted library allocation
page execute and read and write
2A3E000
stack
page read and write
2A40000
trusted library allocation
page read and write
125E000
stack
page read and write
2A90000
trusted library allocation
page read and write
12B4000
trusted library allocation
page read and write
51EE000
stack
page read and write
CE0000
trusted library allocation
page read and write
5020000
heap
page read and write
2AB7000
trusted library allocation
page execute and read and write
DB0000
heap
page read and write
533E000
stack
page read and write
4D5000
stack
page read and write
717000
heap
page read and write
DF9E000
stack
page read and write
54AE000
stack
page read and write
D1A000
heap
page read and write
2AAE000
stack
page read and write
27B4000
trusted library allocation
page read and write
75A000
stack
page read and write
1550000
trusted library allocation
page read and write
37F1000
trusted library allocation
page read and write
2810000
heap
page read and write
F40000
heap
page read and write
D40000
trusted library allocation
page read and write
10FF000
stack
page read and write
70D000
heap
page read and write
4E5E000
stack
page read and write
2B30000
heap
page read and write
70D000
heap
page read and write
BB0000
heap
page read and write
D56000
heap
page read and write
C10000
heap
page read and write
1173000
trusted library allocation
page execute and read and write
776000
heap
page read and write
AD7000
heap
page read and write
4E20000
heap
page execute and read and write
3021000
heap
page read and write
1950000
trusted library allocation
page execute and read and write
9DE000
stack
page read and write
B95000
heap
page read and write
493E000
stack
page read and write
2ABF000
stack
page read and write
54AD000
stack
page read and write
5187000
trusted library allocation
page read and write
523E000
stack
page read and write
1150000
trusted library allocation
page read and write
5350000
heap
page read and write
AA70000
trusted library allocation
page execute and read and write
A30000
trusted library allocation
page read and write
AEE000
stack
page read and write
D5D000
heap
page read and write
4D0000
stack
page read and write
CB8000
heap
page read and write
2EFE000
stack
page read and write
D81000
heap
page read and write
AA3000
heap
page read and write
3013000
trusted library allocation
page execute and read and write
1380000
heap
page read and write
71A000
heap
page read and write
3052000
heap
page read and write
37A1000
trusted library allocation
page read and write
12C4000
trusted library allocation
page read and write
51FE000
stack
page read and write
4F31000
heap
page read and write
660000
unkown
page readonly
CCA000
unkown
page write copy
E1E000
heap
page read and write
DC2000
heap
page read and write
C7B000
stack
page read and write
4FBE000
stack
page read and write
11FB000
trusted library allocation
page execute and read and write
5140000
heap
page execute and read and write
27B6000
trusted library allocation
page read and write
A60E000
stack
page read and write
B70000
heap
page read and write
540E000
stack
page read and write
30C0000
heap
page read and write
A44000
heap
page read and write
3801000
trusted library allocation
page read and write
A84E000
stack
page read and write
5D6000
heap
page read and write
C80000
heap
page read and write
11DF000
stack
page read and write
1170000
heap
page read and write
6CE000
stack
page read and write
C8A000
trusted library allocation
page read and write
172B000
trusted library allocation
page execute and read and write
2F52000
heap
page read and write
2A83000
trusted library allocation
page execute and read and write
4E4E000
stack
page read and write
16CF000
stack
page read and write
4DAD000
stack
page read and write
A70000
heap
page read and write
2FC0000
heap
page read and write
9F0000
trusted library allocation
page read and write
4E7000
stack
page read and write
5FD0000
trusted library allocation
page read and write
15D0000
heap
page read and write
53A0000
trusted library allocation
page execute and read and write
FB0000
trusted library allocation
page execute and read and write
AF8000
heap
page read and write
C90000
unkown
page readonly
151F000
stack
page read and write
1065000
heap
page read and write
26C0000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
D53000
trusted library allocation
page execute and read and write
11F7000
trusted library allocation
page execute and read and write
4ED0000
heap
page read and write
1350000
trusted library allocation
page read and write
13B7000
heap
page read and write
C18000
heap
page read and write
D7B000
heap
page read and write
11D0000
trusted library allocation
page read and write
B92000
heap
page read and write
1530000
trusted library allocation
page read and write
2D23000
heap
page read and write
D2C000
heap
page read and write
ADB000
heap
page read and write
2C3A000
stack
page read and write
7A1000
heap
page read and write
E40000
heap
page read and write
5A9F000
stack
page read and write
D1F000
heap
page read and write
512E000
stack
page read and write
1038000
heap
page read and write
2EC0000
heap
page read and write
104F000
stack
page read and write
D60000
heap
page read and write
1310000
trusted library allocation
page execute and read and write
16F0000
heap
page read and write
C48000
heap
page read and write
D6D000
heap
page read and write
156E000
stack
page read and write
2D2E000
unkown
page read and write
CF0000
heap
page read and write
3040000
trusted library allocation
page read and write
4E9000
stack
page read and write
A10000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
953D000
stack
page read and write
524E000
stack
page read and write
11CE000
stack
page read and write
1220000
trusted library allocation
page execute and read and write
151E000
stack
page read and write
588E000
stack
page read and write
12B3000
trusted library allocation
page execute and read and write
EE6000
heap
page read and write
2CC1000
heap
page read and write
B5E000
stack
page read and write
1266000
heap
page read and write
30E0000
heap
page execute and read and write
1059000
heap
page read and write
10D0000
heap
page read and write
3070000
trusted library allocation
page execute and read and write
980000
heap
page read and write
4970000
trusted library allocation
page execute and read and write
A90000
heap
page read and write
26D7000
trusted library allocation
page read and write
12E7000
trusted library allocation
page execute and read and write
2F21000
heap
page read and write
784000
unkown
page readonly
7B5000
heap
page read and write
12C0000
trusted library allocation
page read and write
D40000
heap
page read and write
7A4000
heap
page read and write
10BB000
heap
page read and write
AA8000
heap
page read and write
E60000
heap
page read and write
639E000
stack
page read and write
4CE8000
trusted library allocation
page read and write
BB6000
heap
page read and write
DB3000
heap
page read and write
1210000
trusted library allocation
page read and write
31EF000
stack
page read and write
2F53000
heap
page read and write
269C000
stack
page read and write
B890000
trusted library allocation
page read and write
304B000
trusted library allocation
page execute and read and write
B1A000
heap
page read and write
522F000
stack
page read and write
2C60000
heap
page read and write
C13000
heap
page read and write
5350000
heap
page read and write
D8B000
trusted library allocation
page execute and read and write
1300000
trusted library allocation
page read and write
EBE000
stack
page read and write
5430000
heap
page execute and read and write
883E000
stack
page read and write
2D54000
heap
page read and write
4D7000
stack
page read and write
194F000
stack
page read and write
15B0000
trusted library allocation
page read and write
87FE000
stack
page read and write
D27000
heap
page read and write
142F000
stack
page read and write
2730000
trusted library allocation
page read and write
541E000
stack
page read and write
5D0000
heap
page read and write
3C11000
trusted library allocation
page read and write
750000
unkown
page readonly
9F9000
stack
page read and write
D6D000
heap
page read and write
E40000
heap
page read and write
DE9E000
stack
page read and write
8F9000
stack
page read and write
4C8E000
stack
page read and write
D40000
heap
page read and write
2AA6000
trusted library allocation
page execute and read and write
1090000
heap
page read and write
5A0E000
stack
page read and write
1145000
heap
page read and write
67D000
stack
page read and write
FD4000
trusted library allocation
page read and write
A37000
trusted library allocation
page execute and read and write
1517000
trusted library allocation
page execute and read and write
27EE000
stack
page read and write
4D2C000
stack
page read and write
5550000
heap
page execute and read and write
5730000
heap
page execute and read and write
8DE000
stack
page read and write
5180000
trusted library allocation
page read and write
D61000
heap
page read and write
660000
unkown
page readonly
50EE000
stack
page read and write
BF0000
trusted library allocation
page read and write
710D000
stack
page read and write
A70000
trusted library allocation
page read and write
FC0000
heap
page execute and read and write
DB0000
heap
page read and write
688E000
stack
page read and write
536E000
stack
page read and write
400000
remote allocation
page execute and read and write
75E000
heap
page read and write
2A20000
heap
page read and write
753000
heap
page read and write
71A000
heap
page read and write
1779000
heap
page read and write
2C90000
heap
page read and write
75E000
heap
page read and write
D48000
heap
page read and write
AA0000
heap
page read and write
6B10000
trusted library allocation
page read and write
13AA000
heap
page read and write
D20000
heap
page read and write
E40000
trusted library allocation
page execute and read and write
2F83000
heap
page read and write
3080000
trusted library allocation
page read and write
3052000
heap
page read and write
4510000
trusted library allocation
page read and write
1210000
trusted library allocation
page read and write
B29000
heap
page read and write
2FB5000
heap
page read and write
767000
heap
page read and write
734000
heap
page read and write
770000
stack
page read and write
CBE000
stack
page read and write
1400000
heap
page read and write
1210000
heap
page read and write
2CF3000
heap
page read and write
515F000
stack
page read and write
FBF000
stack
page read and write
8F9000
stack
page read and write
70F000
heap
page read and write
1354000
trusted library allocation
page read and write
D70000
trusted library allocation
page read and write
AA4E000
stack
page read and write
752000
unkown
page execute and read and write
E50000
trusted library allocation
page read and write
55AE000
stack
page read and write
274F000
stack
page read and write
E1B000
trusted library allocation
page execute and read and write
C91000
unkown
page execute read
2A20000
trusted library allocation
page read and write
16E0000
trusted library allocation
page read and write
4A8E000
stack
page read and write
DDB000
heap
page read and write
1150000
trusted library allocation
page execute and read and write
1220000
trusted library allocation
page execute and read and write
2D54000
heap
page read and write
496E000
stack
page read and write
E0F000
stack
page read and write
D5D000
heap
page read and write
BD0000
trusted library allocation
page read and write
DC5000
heap
page read and write
2C11000
trusted library allocation
page read and write
1758000
heap
page read and write
79A000
stack
page read and write
B38000
stack
page read and write
A60000
trusted library allocation
page execute and read and write
1060000
trusted library allocation
page read and write
7B5000
heap
page read and write
56FC000
stack
page read and write
77DE000
stack
page read and write
5950000
heap
page execute and read and write
AF0000
heap
page read and write
E17000
trusted library allocation
page execute and read and write
8F9000
stack
page read and write
D1A000
heap
page read and write
42F0000
trusted library allocation
page read and write
F80000
heap
page read and write
CF9000
stack
page read and write
D2E000
stack
page read and write
152F000
stack
page read and write
4CDE000
stack
page read and write
2DDF000
stack
page read and write
1700000
trusted library allocation
page read and write
A3B000
stack
page read and write
4ECE000
stack
page read and write
4FA000
stack
page read and write
743E000
stack
page read and write
8980000
trusted library allocation
page read and write
11CD000
trusted library allocation
page execute and read and write
498E000
stack
page read and write
753000
heap
page read and write
12C0000
trusted library allocation
page read and write
55EC000
stack
page read and write
3DD1000
trusted library allocation
page read and write
FE4000
trusted library allocation
page read and write
2D7E000
stack
page read and write
CF7000
trusted library allocation
page execute and read and write
2C80000
heap
page read and write
2C20000
heap
page execute and read and write
119F000
stack
page read and write
F59000
stack
page read and write
2F8E000
stack
page read and write
3060000
trusted library allocation
page read and write
EC0000
heap
page read and write
576F000
stack
page read and write
787000
stack
page read and write
547E000
stack
page read and write
48FE000
stack
page read and write
3FA1000
trusted library allocation
page read and write
A87000
trusted library allocation
page execute and read and write
11C3000
trusted library allocation
page execute and read and write
1320000
heap
page read and write
7A8000
stack
page read and write
CC0000
unkown
page readonly
19E0000
trusted library allocation
page read and write
63A0000
trusted library allocation
page execute and read and write
7A1000
heap
page read and write
512E000
stack
page read and write
CEA000
trusted library allocation
page execute and read and write
1560000
heap
page read and write
29BE000
stack
page read and write
784000
unkown
page execute and read and write
2A10000
heap
page read and write
D30000
heap
page read and write
2A50000
heap
page read and write
2B1E000
stack
page read and write
FF0000
heap
page read and write
1266000
heap
page read and write
2CF2000
heap
page read and write
D5D000
trusted library allocation
page execute and read and write
1960000
heap
page execute and read and write
2B56000
heap
page read and write
2DC0000
heap
page execute and read and write
1328000
heap
page read and write
1140000
heap
page read and write
CCA000
unkown
page read and write
520E000
stack
page read and write
CEF000
stack
page read and write
B50000
heap
page read and write
6E8000
heap
page read and write
D21000
heap
page read and write
32D1000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
FEE000
stack
page read and write
2FC1000
trusted library allocation
page read and write
98DD000
stack
page read and write
CD0000
heap
page read and write
578E000
stack
page read and write
684F000
stack
page read and write
3C51000
trusted library allocation
page read and write
100E000
stack
page read and write
4495000
trusted library allocation
page read and write
1163000
trusted library allocation
page execute and read and write
E2D000
stack
page read and write
2B41000
trusted library allocation
page read and write
E89000
heap
page read and write
A8B000
trusted library allocation
page execute and read and write
534F000
stack
page read and write
109C000
stack
page read and write
551E000
stack
page read and write
1720000
trusted library allocation
page read and write
A6E000
stack
page read and write
AABD000
stack
page read and write
71F000
heap
page read and write
D5E000
heap
page read and write
2DD1000
trusted library allocation
page read and write
751000
heap
page read and write
BBE000
stack
page read and write
560000
heap
page read and write
D2C000
heap
page read and write
DB0000
heap
page read and write
752000
heap
page read and write
1199000
stack
page read and write
524E000
stack
page read and write
5B0E000
stack
page read and write
E21E000
stack
page read and write
592F000
stack
page read and write
280A000
trusted library allocation
page read and write
531E000
stack
page read and write
4AF0000
trusted library allocation
page execute and read and write
D72000
heap
page read and write
ACA000
heap
page read and write
D2C000
heap
page read and write
2FB5000
heap
page read and write
7A8000
heap
page read and write
66E000
unkown
page read and write
685000
heap
page read and write
85BE000
stack
page read and write
2A8D000
trusted library allocation
page execute and read and write
D7B000
heap
page read and write
709000
heap
page read and write
1176000
heap
page read and write
D10000
trusted library allocation
page read and write
DC0000
heap
page read and write
E20000
heap
page read and write
DE0000
heap
page read and write
4AAE000
stack
page read and write
16B0000
heap
page read and write
DBB000
heap
page read and write
2D54000
heap
page read and write
1240000
trusted library allocation
page execute and read and write
3052000
heap
page read and write
3BB1000
trusted library allocation
page read and write
1565000
heap
page read and write
630000
unkown
page readonly
D20000
heap
page read and write
2AD0000
trusted library allocation
page read and write
706000
heap
page read and write
1033000
trusted library allocation
page execute and read and write
29FD000
stack
page read and write
D60000
heap
page read and write
51CE000
stack
page read and write
1250000
trusted library allocation
page read and write
2DB7000
heap
page read and write
E37000
heap
page read and write
54EE000
stack
page read and write
B6E000
stack
page read and write
FC0000
trusted library allocation
page read and write
1030000
heap
page read and write
DC5000
heap
page read and write
E89000
heap
page read and write
27E0000
heap
page execute and read and write
1090000
heap
page execute and read and write
2A60000
heap
page read and write
2CA0000
heap
page read and write
5360000
trusted library allocation
page read and write
750000
unkown
page execute and read and write
E11E000
stack
page read and write
71A000
heap
page read and write
1560000
heap
page read and write
CEC000
unkown
page readonly
DEE000
stack
page read and write
295E000
stack
page read and write
AD0000
heap
page read and write
4980000
trusted library allocation
page read and write
264E000
stack
page read and write
108E000
stack
page read and write
CF9000
heap
page read and write
4F00000
heap
page read and write
51BD000
stack
page read and write
B1E000
stack
page read and write
9F3000
trusted library allocation
page execute and read and write
1786000
heap
page read and write
1260000
heap
page execute and read and write
2FF1000
heap
page read and write
332C000
stack
page read and write
451D000
trusted library allocation
page read and write
4B3C000
stack
page read and write
4C8C000
stack
page read and write
106B000
trusted library allocation
page execute and read and write
5320000
heap
page execute and read and write
567E000
stack
page read and write
1080000
trusted library allocation
page read and write
5340000
trusted library allocation
page read and write
2BC1000
trusted library allocation
page read and write
2EF0000
heap
page read and write
2BD0000
heap
page read and write
274F000
stack
page read and write
14DE000
stack
page read and write
1067000
trusted library allocation
page execute and read and write
CE6000
heap
page read and write
4ED1000
heap
page read and write
CE7000
heap
page read and write
CB3000
trusted library allocation
page execute and read and write
D50000
trusted library allocation
page read and write
1033000
heap
page read and write
7A1000
heap
page read and write
CD9000
heap
page read and write
DC7000
heap
page read and write
FE0000
trusted library allocation
page read and write
500F000
stack
page read and write
715E000
stack
page read and write
1030000
heap
page read and write
4F01000
heap
page read and write
530E000
stack
page read and write
4F6D000
stack
page read and write
38F1000
trusted library allocation
page read and write
26D0000
heap
page read and write
4E17000
heap
page read and write
BE3000
trusted library allocation
page execute and read and write
4F4F000
stack
page read and write
10E5000
heap
page read and write
1140000
trusted library section
page read and write
1270000
heap
page read and write
BED000
trusted library allocation
page execute and read and write
2B5D000
heap
page read and write
2EC1000
heap
page read and write
76C000
heap
page read and write
4E00000
heap
page execute and read and write
4F32000
heap
page read and write
A44000
trusted library allocation
page read and write
4E12000
heap
page read and write
DBB000
heap
page read and write
4D8D000
stack
page read and write
71E000
heap
page read and write
7B5000
heap
page read and write
ECF000
heap
page read and write
30AF000
stack
page read and write
322B000
stack
page read and write
105E000
stack
page read and write
910000
heap
page read and write
3B41000
trusted library allocation
page read and write
A40000
heap
page read and write
DB1000
heap
page read and write
54EE000
stack
page read and write
2B52000
heap
page read and write
4519000
heap
page read and write
1360000
heap
page read and write
4BA000
stack
page read and write
10B0000
heap
page read and write
4F62000
heap
page read and write
9A0000
heap
page read and write
3014000
trusted library allocation
page read and write
116D000
trusted library allocation
page execute and read and write
51CE000
stack
page read and write
76C000
heap
page read and write
25DE000
stack
page read and write
9F0000
heap
page read and write
265E000
stack
page read and write
1540000
trusted library allocation
page execute and read and write
CEC000
unkown
page readonly
751000
heap
page read and write
42D1000
trusted library allocation
page read and write
26A0000
heap
page execute and read and write
753000
heap
page read and write
2E9E000
stack
page read and write
E1D000
stack
page read and write
D76000
trusted library allocation
page execute and read and write
CAE000
stack
page read and write
11FB000
trusted library allocation
page execute and read and write
2ABB000
trusted library allocation
page execute and read and write
D60000
heap
page read and write
893E000
stack
page read and write
2AAC000
stack
page read and write
CB3000
heap
page read and write
2F21000
heap
page read and write
E66000
heap
page read and write
1010000
heap
page read and write
4C6000
stack
page read and write
CEA000
unkown
page read and write
4AEE000
stack
page read and write
151B000
trusted library allocation
page execute and read and write
10F2000
heap
page read and write
A32000
trusted library allocation
page read and write
12C0000
heap
page read and write
2690000
heap
page read and write
DDD000
heap
page read and write
2B00000
trusted library allocation
page read and write
3052000
heap
page read and write
1510000
trusted library allocation
page read and write
724E000
stack
page read and write
1010000
trusted library allocation
page read and write
10DB000
heap
page read and write
1180000
trusted library allocation
page read and write
A20000
heap
page read and write
2A4E000
heap
page read and write
120E000
stack
page read and write
76C000
stack
page read and write
553F000
stack
page read and write
A0E000
stack
page read and write
15F0000
heap
page read and write
E60000
heap
page read and write
11FF000
stack
page read and write
DB5000
heap
page read and write
1727000
trusted library allocation
page execute and read and write
B90000
heap
page read and write
1280000
trusted library allocation
page read and write
B60000
heap
page read and write
1237000
heap
page read and write
751000
heap
page read and write
963F000
stack
page read and write
505E000
stack
page read and write
B13000
heap
page read and write
492E000
stack
page read and write
5CC000
stack
page read and write
2C60000
trusted library allocation
page read and write
1270000
heap
page execute and read and write
1053000
heap
page read and write
3047000
trusted library allocation
page execute and read and write
C90000
unkown
page readonly
DBA000
heap
page read and write
2B4F000
trusted library allocation
page read and write
D00000
heap
page read and write
280E000
trusted library allocation
page read and write
2801000
trusted library allocation
page read and write
2FF0000
heap
page read and write
1A20000
heap
page read and write
3020000
trusted library allocation
page read and write
2C0E000
stack
page read and write
537D000
stack
page read and write
11B0000
trusted library allocation
page read and write
28EE000
stack
page read and write
447E000
trusted library allocation
page read and write
515E000
stack
page read and write
14E0000
heap
page read and write
134F000
stack
page read and write
4F2E000
stack
page read and write
2DB0000
trusted library allocation
page read and write
CE0000
heap
page read and write
166F000
stack
page read and write
D54000
trusted library allocation
page read and write
4F0E000
stack
page read and write
4E0E000
stack
page read and write
752000
unkown
page readonly
7AC000
heap
page read and write
512F000
stack
page read and write
4DFE000
stack
page read and write
4FD000
stack
page read and write
1520000
heap
page read and write
27F1000
trusted library allocation
page read and write
FF0000
heap
page read and write
A00000
heap
page read and write
DB3000
heap
page read and write
767000
heap
page read and write
1230000
heap
page read and write
9F4000
trusted library allocation
page read and write
2A84000
trusted library allocation
page read and write
1750000
heap
page read and write
A10000
heap
page read and write
B2E000
stack
page read and write
4CCE000
stack
page read and write
751000
heap
page read and write
2804000
trusted library allocation
page read and write
AD7000
heap
page read and write
631000
unkown
page execute read
2D50000
heap
page read and write
D72000
heap
page read and write
546E000
stack
page read and write
2AA0000
trusted library allocation
page read and write
6E0000
heap
page read and write
626000
stack
page read and write
27DE000
stack
page read and write
1230000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
16F3000
trusted library allocation
page execute and read and write
4F2000
stack
page read and write
2620000
trusted library allocation
page execute and read and write
2640000
heap
page read and write
105B000
heap
page read and write
98C000
stack
page read and write
4FBE000
stack
page read and write
4D0E000
stack
page read and write
1050000
heap
page read and write
41F1000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
E53000
heap
page read and write
5000000
trusted library allocation
page read and write
2C70000
heap
page read and write
FF0000
heap
page read and write
6010000
trusted library allocation
page execute and read and write
700E000
stack
page read and write
CA0000
trusted library allocation
page read and write
11D4000
trusted library allocation
page read and write
12EB000
trusted library allocation
page execute and read and write
767000
heap
page read and write
E30000
heap
page read and write
56EC000
stack
page read and write
F2E000
stack
page read and write
2B00000
heap
page execute and read and write
2A94000
trusted library allocation
page read and write
E8C000
stack
page read and write
EEF000
stack
page read and write
2AB0000
trusted library allocation
page read and write
A3B000
trusted library allocation
page execute and read and write
2D24000
heap
page read and write
2F40000
trusted library allocation
page read and write
26EE000
stack
page read and write
2C40000
heap
page read and write
4EB0000
heap
page execute and read and write
4C40000
trusted library allocation
page read and write
5710000
heap
page read and write
1387000
heap
page read and write
68A000
unkown
page read and write
44E0000
trusted library allocation
page read and write
451A000
heap
page read and write
113F000
stack
page read and write
3024000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
5AC000
stack
page read and write
CF9000
stack
page read and write
1359000
heap
page read and write
26E0000
heap
page read and write
4A60000
trusted library section
page read and write
1160000
trusted library allocation
page read and write
DE5000
heap
page read and write
4E3000
stack
page read and write
1346000
heap
page read and write
DFDE000
stack
page read and write
2BDA000
trusted library allocation
page read and write
1170000
heap
page read and write
16B0000
heap
page read and write
54DE000
stack
page read and write
E5B000
heap
page read and write
2D9E000
stack
page read and write
9F0000
heap
page read and write
4C3E000
stack
page read and write
7AC000
heap
page read and write
C34000
heap
page read and write
2A40000
heap
page read and write
2BB1000
trusted library allocation
page read and write
E68000
heap
page read and write
930000
heap
page read and write
12A0000
trusted library allocation
page read and write
8440000
trusted library allocation
page read and write
16AE000
stack
page read and write
1490000
heap
page read and write
4CD0000
trusted library allocation
page execute and read and write
53EE000
stack
page read and write
DB1000
heap
page read and write
CBD000
trusted library allocation
page execute and read and write
CC4000
trusted library allocation
page read and write
1F6000
stack
page read and write
428E000
trusted library allocation
page read and write
2F7F000
heap
page read and write
1040000
trusted library allocation
page read and write
109E000
stack
page read and write
12BD000
trusted library allocation
page execute and read and write
2790000
heap
page read and write
10F9000
stack
page read and write
68C000
unkown
page readonly
E84000
heap
page read and write
DDB000
heap
page read and write
DB1000
heap
page read and write
68C000
unkown
page readonly
F89000
stack
page read and write
2D30000
heap
page read and write
19F0000
heap
page read and write
E59000
heap
page read and write
D3E000
stack
page read and write
There are 1063 hidden memdumps, click here to show them.