IOC Report
5RjjCWZAVv.exe

loading gif

Files

File Path
Type
Category
Malicious
5RjjCWZAVv.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_5RjjCWZAVv.exe_991026602a4884d639df14ccdc40c22d8cd4_a84d9d60_4b16293f-45ad-45f9-a99c-27623100dc1c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERECF0.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Dec 23 06:30:28 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF30B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF35A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\5RjjCWZAVv.exe
"C:\Users\user\Desktop\5RjjCWZAVv.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7288 -s 2024

URLs

Name
IP
Malicious
https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl
unknown
https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://player.vimeo.com
unknown
https://duckduckgo.com/ac/?q=
unknown
https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&amp
unknown
https://lev-tolstoi.com/piN
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://lev-tolstoi.com/s
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=englisW
unknown
https://lev-tolstoi.com/p
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
aspecteirs.lat
https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=hyEE
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
sweepyribs.lat
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
unknown
sustainskelet.lat
https://aui-cdn.atlassian.com/
unknown
rapeflowwj.lat
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis
unknown
https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
unknown
https://s.ytimg.com;
unknown
https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&
unknown
https://steambroadcast-test.akamaized
unknown
https://community.fastly.steamstatic.com/
unknown
https://steam.tv/
unknown
https://lev-tolstoi.com/a
unknown
https://bitbucket.org/
unknown
https://steamcommunity.com/profiles/76561199724331900
23.55.153.106
https://lev-tolstoi.com/?(BP
unknown
https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net
unknown
https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en
unknown
https://lev-tolstoi.com/
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://community.fastly.steamstatic.com
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://steambroadcastchat.aka
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
energyaffai.lat
https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a
unknown
https://sketchfab.com
unknown
https://www.ecosia.org/newtab/
unknown
http://127.0.
unknown
https://lv.queniujq.cn
unknown
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.gstatic.cn/re
unknown
https://www.youtube.com/
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng
unknown
https://lev-tolstoi.com/apieed
unknown
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&a
unknown
https://lev-tolstoi.com/api
104.21.66.86
https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net
unknown
https://support.microsof
unknown
https://cdn.cookielaw.org/
unknown
https://community.fastly.steamstatic.com/public/css/globalv2.
unknown
https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/shar_
unknown
https://bbc-frontbucket-canary.prod-east.frontend.pub
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
grannyejh.lat
https://store.steampowered.com/;Per
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://community.fas
unknown
https://bbc-frontbucket-static.stg-east.frontend.publi
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://lev-tolstoi.com/ms
unknown
https://bbuseruploads.s3.amazonaws.com/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3cc1-
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&
unknown
necklacebudi.lat
https://lev-tolstoi.com/es
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=St3gSJx2HFUZ&l=e
unknown
https://lev-tolstoi.com/apir
unknown
https://cdn.fastly.steamstatic.com/steamcommunitm
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://lev-tolstoi.com/apim
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s3-w.us-east-1.amazonaws.com
52.217.203.57
bitbucket.org
185.166.143.49
steamcommunity.com
23.55.153.106
lev-tolstoi.com
104.21.66.86
bbuseruploads.s3.amazonaws.com
unknown
sweepyribs.lat
unknown
necklacebudi.lat
unknown
sustainskelet.lat
unknown
crosshuaht.lat
unknown
rapeflowwj.lat
unknown
grannyejh.lat
unknown
aspecteirs.lat
unknown
discokeyus.lat
unknown
energyaffai.lat
unknown
There are 4 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.21.66.86
lev-tolstoi.com
United States
23.55.153.106
steamcommunity.com
United States
185.166.143.49
bitbucket.org
Germany
52.217.203.57
s3-w.us-east-1.amazonaws.com
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
ProgramId
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
FileId
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
LowerCaseLongPath
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
LongPathHash
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
Name
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
OriginalFileName
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
Publisher
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
Version
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
BinFileVersion
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
BinaryType
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
ProductName
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
ProductVersion
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
LinkDate
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
BinProductVersion
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
AppxPackageFullName
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
AppxPackageRelativeId
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
Size
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
Language
\REGISTRY\A\{7e7bd3b4-ad5d-ca7b-9aea-e27458029ced}\Root\InventoryApplicationFile\5rjjcwzavv.exe|e6eca72b829856af
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
331000
unkown
page execute and read and write
malicious
5FC0000
trusted library allocation
page read and write
5A7D000
trusted library allocation
page read and write
2E2E000
stack
page read and write
5FD1000
trusted library allocation
page read and write
5ABC000
trusted library allocation
page read and write
5A71000
trusted library allocation
page read and write
5A9B000
trusted library allocation
page read and write
45DE000
stack
page read and write
545E000
stack
page read and write
499E000
stack
page read and write
5AA2000
trusted library allocation
page read and write
5AA3000
trusted library allocation
page read and write
391F000
stack
page read and write
6014000
trusted library allocation
page read and write
5F11000
trusted library allocation
page read and write
5AA3000
trusted library allocation
page read and write
5AB3000
trusted library allocation
page read and write
5F17000
trusted library allocation
page read and write
1277000
heap
page read and write
5A93000
trusted library allocation
page read and write
12E9000
heap
page read and write
61CC000
trusted library allocation
page read and write
5A71000
trusted library allocation
page read and write
2F9F000
stack
page read and write
1262000
heap
page read and write
1295000
heap
page read and write
384000
unkown
page execute and read and write
128F000
heap
page read and write
5F17000
trusted library allocation
page read and write
5F1A000
trusted library allocation
page read and write
5090000
direct allocation
page execute and read and write
5B22000
trusted library allocation
page read and write
5A87000
trusted library allocation
page read and write
345E000
stack
page read and write
330000
unkown
page readonly
341F000
stack
page read and write
5FF1000
trusted library allocation
page read and write
4F1D000
stack
page read and write
5A68000
trusted library allocation
page read and write
50E6000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
5AD0000
trusted library allocation
page read and write
5AB3000
trusted library allocation
page read and write
4AA1000
heap
page read and write
635000
unkown
page execute and write copy
5AB3000
trusted library allocation
page read and write
5F11000
trusted library allocation
page read and write
5A65000
trusted library allocation
page read and write
3CDF000
stack
page read and write
4AA1000
heap
page read and write
5AB3000
trusted library allocation
page read and write
5FDA000
trusted library allocation
page read and write
5A7F000
trusted library allocation
page read and write
5AA2000
trusted library allocation
page read and write
5A7D000
trusted library allocation
page read and write
5AA3000
trusted library allocation
page read and write
5F18000
trusted library allocation
page read and write
5AA3000
trusted library allocation
page read and write
5B63000
trusted library allocation
page read and write
1200000
direct allocation
page read and write
5AD1000
trusted library allocation
page read and write
3BDE000
stack
page read and write
61D000
unkown
page execute and write copy
127A000
heap
page read and write
5ADF000
trusted library allocation
page read and write
5A95000
trusted library allocation
page read and write
600D000
trusted library allocation
page read and write
5AB3000
trusted library allocation
page read and write
1262000
heap
page read and write
5580000
remote allocation
page read and write
5BA4000
trusted library allocation
page read and write
2E6E000
stack
page read and write
5F12000
trusted library allocation
page read and write
5D53000
trusted library allocation
page read and write
12E4000
heap
page read and write
3A9E000
stack
page read and write
12FA000
heap
page read and write
4AA1000
heap
page read and write
575000
unkown
page execute and read and write
1296000
heap
page read and write
5A85000
trusted library allocation
page read and write
E7B000
stack
page read and write
5F1C000
trusted library allocation
page read and write
607C000
trusted library allocation
page read and write
5A7F000
trusted library allocation
page read and write
1296000
heap
page read and write
5A83000
trusted library allocation
page read and write
605B000
trusted library allocation
page read and write
5A7D000
trusted library allocation
page read and write
5BC000
unkown
page execute and read and write
606B000
trusted library allocation
page read and write
612000
unkown
page execute and write copy
5B16000
trusted library allocation
page read and write
539C000
trusted library allocation
page read and write
1200000
direct allocation
page read and write
125B000
heap
page read and write
5ACB000
trusted library allocation
page read and write
5ABC000
trusted library allocation
page read and write
5D14000
trusted library allocation
page read and write
55B000
unkown
page execute and read and write
4AA1000
heap
page read and write
5AB3000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
5AB2000
trusted library allocation
page read and write
5A94000
trusted library allocation
page read and write
128F000
heap
page read and write
4AA1000
heap
page read and write
5090000
direct allocation
page execute and read and write
601D000
trusted library allocation
page read and write
5A66000
trusted library allocation
page read and write
4BA0000
trusted library allocation
page read and write
5A65000
trusted library allocation
page read and write
445F000
stack
page read and write
53BA000
trusted library allocation
page read and write
1296000
heap
page read and write
5ABD000
trusted library allocation
page read and write
5AA3000
trusted library allocation
page read and write
111E000
stack
page read and write
5A79000
trusted library allocation
page read and write
1295000
heap
page read and write
597000
unkown
page execute and write copy
5A97000
trusted library allocation
page read and write
459F000
stack
page read and write
421E000
stack
page read and write
6188000
trusted library allocation
page read and write
54A000
unkown
page execute and write copy
4AA1000
heap
page read and write
62C0000
trusted library allocation
page readonly
1200000
direct allocation
page read and write
5A9000
unkown
page execute and read and write
5A93000
trusted library allocation
page read and write
63B0000
heap
page read and write
59B000
unkown
page execute and write copy
5A71000
trusted library allocation
page read and write
10B0000
heap
page read and write
5F18000
trusted library allocation
page read and write
5AB6000
trusted library allocation
page read and write
605A000
trusted library allocation
page read and write
5A68000
trusted library allocation
page read and write
589E000
stack
page read and write
4F5C000
stack
page read and write
5ADE000
trusted library allocation
page read and write
5A79000
trusted library allocation
page read and write
6032000
trusted library allocation
page read and write
55CD000
stack
page read and write
5F12000
trusted library allocation
page read and write
605F000
trusted library allocation
page read and write
1155000
heap
page read and write
61C1000
trusted library allocation
page execute read
604F000
trusted library allocation
page read and write
5AC3000
trusted library allocation
page read and write
541F000
stack
page read and write
5A92000
trusted library allocation
page read and write
5580000
remote allocation
page read and write
5A6D000
trusted library allocation
page read and write
5A6E000
trusted library allocation
page read and write
12F1000
heap
page read and write
5B14000
trusted library allocation
page read and write
5AA8000
trusted library allocation
page read and write
634000
unkown
page execute and write copy
5A7D000
trusted library allocation
page read and write
50B0000
direct allocation
page execute and read and write
4AA1000
heap
page read and write
5ABE000
trusted library allocation
page read and write
5F11000
trusted library allocation
page read and write
5AB3000
trusted library allocation
page read and write
600D000
stack
page read and write
5F16000
trusted library allocation
page read and write
5A7D000
trusted library allocation
page read and write
130E000
heap
page read and write
5A7F000
trusted library allocation
page read and write
513000
unkown
page execute and read and write
1305000
heap
page read and write
121A000
heap
page read and write
5F1A000
trusted library allocation
page read and write
5AA8000
trusted library allocation
page read and write
5A68000
trusted library allocation
page read and write
5A92000
trusted library allocation
page read and write
5090000
direct allocation
page execute and read and write
657B000
trusted library allocation
page read and write
5F14000
trusted library allocation
page read and write
5AB3000
trusted library allocation
page read and write
5A9A000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
1150000
heap
page read and write
539A000
trusted library allocation
page read and write
60DD000
trusted library allocation
page read and write
12E9000
heap
page read and write
5B60000
trusted library allocation
page read and write
12CE000
heap
page read and write
5A84000
trusted library allocation
page read and write
614E000
trusted library allocation
page read and write
6167000
trusted library allocation
page read and write
5FC0000
trusted library allocation
page read and write
119E000
stack
page read and write
5A6E000
trusted library allocation
page read and write
5F1A000
trusted library allocation
page read and write
40DE000
stack
page read and write
5B21000
trusted library allocation
page read and write
319F000
stack
page read and write
5ADF000
trusted library allocation
page read and write
4AA1000
heap
page read and write
5AB3000
trusted library allocation
page read and write
50C0000
direct allocation
page execute and read and write
3E5E000
stack
page read and write
4EF000
unkown
page execute and read and write
5A9A000
trusted library allocation
page read and write
369F000
stack
page read and write
6022000
trusted library allocation
page read and write
1301000
heap
page read and write
5A79000
trusted library allocation
page read and write
12E5000
heap
page read and write
5950000
heap
page read and write
5B21000
trusted library allocation
page read and write
2E80000
direct allocation
page read and write
5AA3000
trusted library allocation
page read and write
1295000
heap
page read and write
5FEE000
trusted library allocation
page read and write
1292000
heap
page read and write
5F12000
trusted library allocation
page read and write
4A9F000
stack
page read and write
5F1C000
trusted library allocation
page read and write
5A75000
trusted library allocation
page read and write
5A7D000
trusted library allocation
page read and write
6048000
trusted library allocation
page read and write
5A7F000
trusted library allocation
page read and write
5B73000
trusted library allocation
page read and write
1277000
heap
page read and write
5BC4000
trusted library allocation
page read and write
5AD5000
trusted library allocation
page read and write
5AB3000
trusted library allocation
page read and write
5A7F000
trusted library allocation
page read and write
5ACB000
trusted library allocation
page read and write
5A7F000
trusted library allocation
page read and write
5A92000
trusted library allocation
page read and write
5B2000
unkown
page execute and write copy
5B04000
trusted library allocation
page read and write
6052000
trusted library allocation
page read and write
5AA2000
trusted library allocation
page read and write
5AA3000
trusted library allocation
page read and write
5AA3000
trusted library allocation
page read and write
5A72000
trusted library allocation
page read and write
615000
unkown
page execute and write copy
5A75000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
471E000
stack
page read and write
5ACF000
trusted library allocation
page read and write
1255000
heap
page read and write
5AA3000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
5080000
direct allocation
page execute and read and write
3B9F000
stack
page read and write
5B14000
trusted library allocation
page read and write
5A71000
trusted library allocation
page read and write
2E9D000
heap
page read and write
5A96000
trusted library allocation
page read and write
4AA1000
heap
page read and write
5A85000
trusted library allocation
page read and write
5A92000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
5AA3000
trusted library allocation
page read and write
581000
unkown
page execute and read and write
5F10000
trusted library allocation
page read and write
5A79000
trusted library allocation
page read and write
5A7E000
trusted library allocation
page read and write
1277000
heap
page read and write
5A79000
trusted library allocation
page read and write
5070000
direct allocation
page execute and read and write
5A85000
trusted library allocation
page read and write
5F1C000
trusted library allocation
page read and write
2DEB000
stack
page read and write
529B000
trusted library allocation
page read and write
59D000
unkown
page execute and read and write
1200000
direct allocation
page read and write
5AD2000
trusted library allocation
page read and write
5A93000
trusted library allocation
page read and write
1305000
heap
page read and write
5F1E000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
5ABD000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5A78000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
330000
unkown
page read and write
1140000
heap
page read and write
5AA2000
trusted library allocation
page read and write
355F000
stack
page read and write
606F000
trusted library allocation
page read and write
3D1E000
stack
page read and write
5AE8000
trusted library allocation
page read and write
5FE4000
trusted library allocation
page read and write
1301000
heap
page read and write
5FDE000
trusted library allocation
page read and write
FD0000
heap
page read and write
5AA3000
trusted library allocation
page read and write
61D000
unkown
page execute and write copy
5AB3000
trusted library allocation
page read and write
531D000
stack
page read and write
5A92000
trusted library allocation
page read and write
5AB3000
trusted library allocation
page read and write
5A62000
trusted library allocation
page read and write
5A74000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
5A97000
trusted library allocation
page read and write
590B000
stack
page read and write
5A82000
trusted library allocation
page read and write
5A79000
trusted library allocation
page read and write
5090000
direct allocation
page execute and read and write
5A93000
trusted library allocation
page read and write
331E000
stack
page read and write
5AB3000
trusted library allocation
page read and write
4AA1000
heap
page read and write
5A94000
trusted library allocation
page read and write
5FC6000
trusted library allocation
page read and write
4AA1000
heap
page read and write
5AC3000
trusted library allocation
page read and write
604C000
trusted library allocation
page read and write
4F20000
direct allocation
page read and write
37DF000
stack
page read and write
5AB3000
trusted library allocation
page read and write
527000
unkown
page execute and write copy
5A79000
trusted library allocation
page read and write
509D000
stack
page read and write
5A71000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
5F1A000
trusted library allocation
page read and write
5FAC000
trusted library allocation
page read and write
127A000
heap
page read and write
5A62000
trusted library allocation
page read and write
5A93000
trusted library allocation
page read and write
12E9000
heap
page read and write
5AD6000
trusted library allocation
page read and write
390000
unkown
page execute and write copy
5A6B000
trusted library allocation
page read and write
5A7F000
trusted library allocation
page read and write
5FDB000
trusted library allocation
page read and write
6013000
trusted library allocation
page read and write
5A71000
trusted library allocation
page read and write
1295000
heap
page read and write
5A97000
trusted library allocation
page read and write
381E000
stack
page read and write
5AB3000
trusted library allocation
page read and write
331000
unkown
page execute and write copy
5AB3000
trusted library allocation
page read and write
5ADF000
trusted library allocation
page read and write
5A92000
trusted library allocation
page read and write
449E000
stack
page read and write
5A71000
trusted library allocation
page read and write
1200000
direct allocation
page read and write
57A000
unkown
page execute and read and write
130D000
heap
page read and write
626000
unkown
page execute and write copy
5A98000
trusted library allocation
page read and write
11E0000
heap
page read and write
12E9000
heap
page read and write
5F1F000
trusted library allocation
page read and write
5A71000
trusted library allocation
page read and write
5AB3000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
5A6C000
trusted library allocation
page read and write
5A66000
trusted library allocation
page read and write
4AA1000
heap
page read and write
5AB3000
trusted library allocation
page read and write
5A95000
trusted library allocation
page read and write
5AC6000
trusted library allocation
page read and write
570000
unkown
page execute and write copy
5A7D000
trusted library allocation
page read and write
576000
unkown
page execute and write copy
3F5F000
stack
page read and write
5AB3000
trusted library allocation
page read and write
583F000
stack
page read and write
5A7A000
trusted library allocation
page read and write
384000
unkown
page execute and write copy
5AB3000
trusted library allocation
page read and write
5FB5000
trusted library allocation
page read and write
5A94000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
127A000
heap
page read and write
5A6A000
trusted library allocation
page read and write
60AB000
trusted library allocation
page read and write
5F19000
trusted library allocation
page read and write
5F15000
trusted library allocation
page read and write
5F11000
trusted library allocation
page read and write
5A65000
trusted library allocation
page read and write
12E1000
heap
page read and write
6125000
trusted library allocation
page read and write
5FBD000
trusted library allocation
page read and write
4AA1000
heap
page read and write
5AA2000
trusted library allocation
page read and write
2E90000
heap
page read and write
52DD000
stack
page read and write
5A90000
trusted library allocation
page read and write
5A71000
trusted library allocation
page read and write
5A96000
trusted library allocation
page read and write
32DF000
stack
page read and write
5AB5000
trusted library allocation
page read and write
12E4000
heap
page read and write
5A92000
trusted library allocation
page read and write
5AE6000
trusted library allocation
page read and write
5ACB000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
485E000
stack
page read and write
5AA3000
trusted library allocation
page read and write
4AA1000
heap
page read and write
53B000
unkown
page execute and read and write
60CD000
trusted library allocation
page read and write
5B1000
unkown
page execute and read and write
5AC3000
trusted library allocation
page read and write
12CE000
heap
page read and write
5AB3000
trusted library allocation
page read and write
5A7D000
trusted library allocation
page read and write
5A92000
trusted library allocation
page read and write
601A000
trusted library allocation
page read and write
5A7F000
trusted library allocation
page read and write
1248000
heap
page read and write
4AB0000
heap
page read and write
5ACB000
trusted library allocation
page read and write
60DE000
trusted library allocation
page read and write
5FB9000
trusted library allocation
page read and write
5A6B000
trusted library allocation
page read and write
127A000
heap
page read and write
481F000
stack
page read and write
5F10000
trusted library allocation
page read and write
5AB3000
trusted library allocation
page read and write
1210000
heap
page read and write
634000
unkown
page execute and read and write
5F1A000
trusted library allocation
page read and write
5A9E000
trusted library allocation
page read and write
5090000
direct allocation
page execute and read and write
5B1A000
trusted library allocation
page read and write
5A75000
trusted library allocation
page read and write
5AA3000
trusted library allocation
page read and write
12E9000
heap
page read and write
5580000
remote allocation
page read and write
1301000
heap
page read and write
5B6D000
trusted library allocation
page read and write
5AA2000
trusted library allocation
page read and write
5CDC000
trusted library allocation
page read and write
5AA2000
trusted library allocation
page read and write
5F1A000
trusted library allocation
page read and write
2E80000
direct allocation
page read and write
4AA0000
heap
page read and write
5A85000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
5A71000
trusted library allocation
page read and write
50D0000
direct allocation
page execute and read and write
5A7D000
trusted library allocation
page read and write
5AB3000
trusted library allocation
page read and write
5AE8000
trusted library allocation
page read and write
5B07000
trusted library allocation
page read and write
1305000
heap
page read and write
626000
unkown
page execute and write copy
5ACB000
trusted library allocation
page read and write
5AA3000
trusted library allocation
page read and write
5A7D000
trusted library allocation
page read and write
5A80000
trusted library allocation
page read and write
4AA1000
heap
page read and write
1262000
heap
page read and write
125D000
heap
page read and write
5AB3000
trusted library allocation
page read and write
140F000
stack
page read and write
6032000
trusted library allocation
page read and write
1259000
heap
page read and write
5AB3000
trusted library allocation
page read and write
409F000
stack
page read and write
5A7F000
trusted library allocation
page read and write
395E000
stack
page read and write
5A7D000
trusted library allocation
page read and write
36DE000
stack
page read and write
5AB3000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
5AA8000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
6043000
trusted library allocation
page read and write
4AA1000
heap
page read and write
5B0000
unkown
page execute and write copy
125B000
heap
page read and write
507000
unkown
page execute and read and write
5AA3000
trusted library allocation
page read and write
57B000
unkown
page execute and write copy
5A92000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
5B67000
trusted library allocation
page read and write
5F19000
trusted library allocation
page read and write
5A5000
unkown
page execute and write copy
600E000
trusted library allocation
page read and write
4AA1000
heap
page read and write
5AB3000
trusted library allocation
page read and write
5ADF000
trusted library allocation
page read and write
309F000
stack
page read and write
2DAF000
stack
page read and write
513000
unkown
page execute and write copy
61F000
unkown
page execute and write copy
5A93000
trusted library allocation
page read and write
125B000
heap
page read and write
6108000
trusted library allocation
page read and write
5AA3000
trusted library allocation
page read and write
5FF1000
trusted library allocation
page read and write
5A62000
trusted library allocation
page read and write
505F000
stack
page read and write
5A7C000
trusted library allocation
page read and write
1297000
heap
page read and write
618D000
trusted library allocation
page read and write
5AA7000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
5FB7000
trusted library allocation
page read and write
5F12000
trusted library allocation
page read and write
56CD000
stack
page read and write
5F17000
trusted library allocation
page read and write
5FD6000
trusted library allocation
page read and write
3E1F000
stack
page read and write
5B0F000
trusted library allocation
page read and write
5AA3000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
5ABE000
trusted library allocation
page read and write
1200000
direct allocation
page read and write
5A92000
trusted library allocation
page read and write
373000
unkown
page execute and read and write
1200000
direct allocation
page read and write
5AB3000
trusted library allocation
page read and write
4AA1000
heap
page read and write
1277000
heap
page read and write
5A8A000
trusted library allocation
page read and write
12E9000
heap
page read and write
5A96000
trusted library allocation
page read and write
573E000
stack
page read and write
5A7C000
trusted library allocation
page read and write
12D2000
heap
page read and write
53AD000
trusted library allocation
page read and write
59A000
unkown
page execute and read and write
150F000
stack
page read and write
1200000
direct allocation
page read and write
5AA3000
trusted library allocation
page read and write
6002000
trusted library allocation
page read and write
5A84000
trusted library allocation
page read and write
5AB3000
trusted library allocation
page read and write
5A5F000
stack
page read and write
12E3000
heap
page read and write
130D000
heap
page read and write
5AB3000
trusted library allocation
page read and write
5A71000
trusted library allocation
page read and write
602E000
trusted library allocation
page read and write
128F000
heap
page read and write
6036000
trusted library allocation
page read and write
1200000
direct allocation
page read and write
600C000
trusted library allocation
page read and write
5F14000
trusted library allocation
page read and write
5D1D000
trusted library allocation
page read and write
5A92000
trusted library allocation
page read and write
5A75000
trusted library allocation
page read and write
5AD0000
trusted library allocation
page read and write
5F12000
trusted library allocation
page read and write
5B14000
trusted library allocation
page read and write
1262000
heap
page read and write
5953000
heap
page read and write
5F11000
trusted library allocation
page read and write
4AA1000
heap
page read and write
495F000
stack
page read and write
5AAD000
trusted library allocation
page read and write
4AA1000
heap
page read and write
5F1C000
trusted library allocation
page read and write
1262000
heap
page read and write
5D10000
trusted library allocation
page read and write
5A79000
trusted library allocation
page read and write
1296000
heap
page read and write
F7B000
stack
page read and write
11DE000
stack
page read and write
1200000
direct allocation
page read and write
1200000
direct allocation
page read and write
1200000
direct allocation
page read and write
5AB3000
trusted library allocation
page read and write
5AB3000
trusted library allocation
page read and write
1305000
heap
page read and write
5C4C000
trusted library allocation
page read and write
5A7D000
trusted library allocation
page read and write
555F000
stack
page read and write
5AA3000
trusted library allocation
page read and write
5A96000
trusted library allocation
page read and write
5F13000
trusted library allocation
page read and write
5A95000
trusted library allocation
page read and write
5AA3000
trusted library allocation
page read and write
5A66000
trusted library allocation
page read and write
5A61000
trusted library allocation
page read and write
604A000
trusted library allocation
page read and write
5AB3000
trusted library allocation
page read and write
5AA3000
trusted library allocation
page read and write
5ADF000
trusted library allocation
page read and write
1301000
heap
page read and write
6024000
trusted library allocation
page read and write
5F6000
unkown
page execute and read and write
5A79000
trusted library allocation
page read and write
5F19000
trusted library allocation
page read and write
4AA1000
heap
page read and write
5A85000
trusted library allocation
page read and write
5F11000
trusted library allocation
page read and write
3F9E000
stack
page read and write
4AA1000
heap
page read and write
5A6C000
trusted library allocation
page read and write
5B14000
trusted library allocation
page read and write
5ADF000
trusted library allocation
page read and write
46DF000
stack
page read and write
6018000
trusted library allocation
page read and write
431F000
stack
page read and write
5FF7000
trusted library allocation
page read and write
61E000
unkown
page execute and read and write
5A92000
trusted library allocation
page read and write
5BFF000
trusted library allocation
page read and write
5A8F000
trusted library allocation
page read and write
61C9000
trusted library allocation
page readonly
5AB3000
trusted library allocation
page read and write
5AEF000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
12D2000
heap
page read and write
5AD6000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
5AB3000
trusted library allocation
page read and write
51DE000
stack
page read and write
31DE000
stack
page read and write
5090000
direct allocation
page execute and read and write
5AA2000
trusted library allocation
page read and write
5A84000
trusted library allocation
page read and write
5C14000
trusted library allocation
page read and write
435E000
stack
page read and write
5A7D000
trusted library allocation
page read and write
3A5F000
stack
page read and write
5A61000
trusted library allocation
page read and write
5A77000
trusted library allocation
page read and write
5060000
direct allocation
page execute and read and write
5AA6000
trusted library allocation
page read and write
5AAE000
trusted library allocation
page read and write
5A9A000
trusted library allocation
page read and write
5FF6000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
50A0000
direct allocation
page execute and read and write
5A93000
trusted library allocation
page read and write
5A8F000
trusted library allocation
page read and write
5AAE000
trusted library allocation
page read and write
5AE9000
trusted library allocation
page read and write
5ACF000
trusted library allocation
page read and write
130E000
heap
page read and write
2E97000
heap
page read and write
5F1A000
trusted library allocation
page read and write
5AA2000
trusted library allocation
page read and write
5A79000
trusted library allocation
page read and write
5A7F000
trusted library allocation
page read and write
5A7F000
trusted library allocation
page read and write
5A61000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
5AB6000
trusted library allocation
page read and write
606E000
trusted library allocation
page read and write
5D52000
trusted library allocation
page read and write
1200000
direct allocation
page read and write
5AB3000
trusted library allocation
page read and write
5B02000
trusted library allocation
page read and write
5AB3000
trusted library allocation
page read and write
5AC1000
trusted library allocation
page read and write
5A7F000
trusted library allocation
page read and write
5A7D000
trusted library allocation
page read and write
5A75000
trusted library allocation
page read and write
5F13000
trusted library allocation
page read and write
5A7F000
trusted library allocation
page read and write
125D000
heap
page read and write
5AAB000
trusted library allocation
page read and write
359E000
stack
page read and write
4AA1000
heap
page read and write
5ABF000
trusted library allocation
page read and write
5C3C000
trusted library allocation
page read and write
5AE1000
trusted library allocation
page read and write
5AB3000
trusted library allocation
page read and write
5AA3000
trusted library allocation
page read and write
5ADF000
trusted library allocation
page read and write
5AB4000
trusted library allocation
page read and write
41DE000
stack
page read and write
5A7F000
trusted library allocation
page read and write
121E000
heap
page read and write
5A74000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
1301000
heap
page read and write
5B14000
trusted library allocation
page read and write
5A6A000
trusted library allocation
page read and write
1277000
heap
page read and write
5F1D000
trusted library allocation
page read and write
5A97000
trusted library allocation
page read and write
5AA3000
trusted library allocation
page read and write
5AB3000
trusted library allocation
page read and write
5AB5000
trusted library allocation
page read and write
5A93000
trusted library allocation
page read and write
1296000
heap
page read and write
5ACE000
trusted library allocation
page read and write
528000
unkown
page execute and read and write
5A63000
trusted library allocation
page read and write
5A8B000
trusted library allocation
page read and write
5A60000
trusted library allocation
page read and write
1200000
direct allocation
page read and write
1296000
heap
page read and write
61C0000
trusted library allocation
page readonly
5ABF000
trusted library allocation
page read and write
12FB000
heap
page read and write
5A7A000
trusted library allocation
page read and write
5A92000
trusted library allocation
page read and write
5AA2000
trusted library allocation
page read and write
127A000
heap
page read and write
4F62000
direct allocation
page read and write
5B06000
trusted library allocation
page read and write
1295000
heap
page read and write
4F1000
unkown
page execute and write copy
53A000
unkown
page execute and write copy
5AB3000
trusted library allocation
page read and write
5F19000
trusted library allocation
page read and write
5AA3000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
5A92000
trusted library allocation
page read and write
There are 703 hidden memdumps, click here to show them.