IOC Report
jSFUzuYPG9.exe

loading gif

Files

File Path
Type
Category
Malicious
jSFUzuYPG9.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_jSFUzuYPG9.exe_89e0a2a224744ed9d773cdd526d4b8ba975a_428023ae_40004372-aeb3-4959-98da-6976da283c96\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7C9C.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Dec 23 07:41:08 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7DD6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7E25.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\jSFUzuYPG9.exe
"C:\Users\user\Desktop\jSFUzuYPG9.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7428 -s 2140

URLs

Name
IP
Malicious
https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://player.vimeo.com
unknown
https://community.fastly.
unknown
https://duckduckgo.com/ac/?q=
unknown
https://lev-tolstoi.com/x
unknown
https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&amp
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&ci=1696500454657.12791&key=1696500454400500000.1&cta
unknown
https://sustainskelet.lat/
unknown
https://sustainskelet.lat/d
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_f6f292994d7c60be109e4c185cbc03032d36d17160d4e639
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
aspecteirs.lat
https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=hyEE
unknown
https://sustainskelet.lat/api
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://login.s7
unknown
https://lev-tolstoi.com/;#
unknown
https://lev-tolstoi.com/cE
unknown
sweepyribs.lat
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
unknown
sustainskelet.lat
https://aui-cdn.atlassian.com/
unknown
rapeflowwj.lat
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis
unknown
https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
unknown
https://s.ytimg.com;
unknown
https://lev-tolstoi.com/h
unknown
https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&
unknown
https://community.fastly.steamstatic.com/
unknown
https://steam.tv/
unknown
https://energyaffai.lat:443/api=
unknown
https://steamcommunity.com/profiles/76561199724331900
23.55.153.106
https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net
unknown
https://bitbucket.org:443/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe
unknown
https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en
unknown
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l==
unknown
https://lev-tolstoi.com/
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://steamcommunity.com:443/profiles/76561199724331900
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
energyaffai.lat
https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a
unknown
https://sketchfab.com
unknown
https://www.ecosia.org/newtab/
unknown
https://lv.queniujq.cn
unknown
https://grannyejh.lat:443/api$
unknown
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.youtube.com/
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng
unknown
https://lev-tolstoi.com/api
104.21.66.86
https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net
unknown
https://cdn.cookielaw.org/
unknown
https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://sweepyribs.lat:443/api
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
grannyejh.lat
https://store.steampowered.com/;Per
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://bbuseruploads.s3.amazonaws.com/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3cc1-
unknown
https://sustainskelet.lat:443/apis
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&
unknown
necklacebudi.lat
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4CbW4pDk4pbW4CbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=St3gSJx2HFUZ&l=e
unknown
https://community.fastly.steamstatic.com/public/shared/javascript
unknown
https://bitbucket.org/f
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steambroadcast.akamaized.nP
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://recaptcha.net/recaptcha/;
unknown
https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.net
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s3-w.us-east-1.amazonaws.com
52.216.152.124
bitbucket.org
185.166.143.49
steamcommunity.com
23.55.153.106
lev-tolstoi.com
104.21.66.86
bbuseruploads.s3.amazonaws.com
unknown
sweepyribs.lat
unknown
necklacebudi.lat
unknown
sustainskelet.lat
unknown
crosshuaht.lat
unknown
rapeflowwj.lat
unknown
grannyejh.lat
unknown
aspecteirs.lat
unknown
discokeyus.lat
unknown
energyaffai.lat
unknown
There are 4 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.21.66.86
lev-tolstoi.com
United States
23.55.153.106
steamcommunity.com
United States
185.166.143.49
bitbucket.org
Germany
52.216.152.124
s3-w.us-east-1.amazonaws.com
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
ProgramId
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
FileId
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
LowerCaseLongPath
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
LongPathHash
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
Name
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
OriginalFileName
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
Publisher
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
Version
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
BinFileVersion
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
BinaryType
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
ProductName
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
ProductVersion
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
LinkDate
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
BinProductVersion
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
AppxPackageFullName
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
AppxPackageRelativeId
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
Size
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
Language
\REGISTRY\A\{607816d5-c50c-835c-f4ba-986edc1882e6}\Root\InventoryApplicationFile\jsfuzuypg9.exe|858bc064b1ce5a6b
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
51E0000
direct allocation
page read and write
malicious
163E000
heap
page read and write
5DFD000
trusted library allocation
page read and write
5360000
direct allocation
page execute and read and write
488E000
stack
page read and write
1612000
heap
page read and write
6285000
trusted library allocation
page read and write
C51000
unkown
page execute and write copy
5DFA000
trusted library allocation
page read and write
63CD000
trusted library allocation
page read and write
5E8B000
trusted library allocation
page read and write
5DEA000
trusted library allocation
page read and write
638D000
trusted library allocation
page read and write
5DF8000
trusted library allocation
page read and write
16A7000
heap
page read and write
5E5E000
trusted library allocation
page read and write
1640000
heap
page read and write
5E1A000
trusted library allocation
page read and write
309B000
stack
page read and write
63EB000
trusted library allocation
page read and write
5E0A000
trusted library allocation
page read and write
15CA000
heap
page read and write
5E0A000
trusted library allocation
page read and write
4D51000
heap
page read and write
5DFD000
trusted library allocation
page read and write
6339000
trusted library allocation
page read and write
637F000
trusted library allocation
page read and write
424E000
stack
page read and write
16A2000
heap
page read and write
5E5C000
trusted library allocation
page read and write
6285000
trusted library allocation
page read and write
5E51000
trusted library allocation
page read and write
5E8B000
trusted library allocation
page read and write
63BC000
trusted library allocation
page read and write
474E000
stack
page read and write
649E000
trusted library allocation
page read and write
63EC000
trusted library allocation
page read and write
16A2000
heap
page read and write
1460000
direct allocation
page read and write
E30000
unkown
page execute and write copy
5DF7000
trusted library allocation
page read and write
E69000
unkown
page execute and read and write
563A000
trusted library allocation
page read and write
17BE000
stack
page read and write
5F45000
trusted library allocation
page read and write
5DFA000
trusted library allocation
page read and write
5E48000
trusted library allocation
page read and write
5CD3000
heap
page read and write
394F000
stack
page read and write
E05000
unkown
page execute and read and write
E9F000
unkown
page execute and write copy
5E83000
trusted library allocation
page read and write
5E20000
trusted library allocation
page read and write
64CD000
stack
page read and write
E95000
unkown
page execute and write copy
5E54000
trusted library allocation
page read and write
EC1000
unkown
page execute and write copy
5E0C000
trusted library allocation
page read and write
631B000
trusted library allocation
page read and write
55DE000
stack
page read and write
EB3000
unkown
page execute and write copy
6288000
trusted library allocation
page read and write
5E30000
trusted library allocation
page read and write
63D3000
trusted library allocation
page read and write
5DF6000
trusted library allocation
page read and write
6282000
trusted library allocation
page read and write
5E31000
trusted library allocation
page read and write
536D000
stack
page read and write
5E36000
trusted library allocation
page read and write
521B000
stack
page read and write
5E3B000
trusted library allocation
page read and write
3ACE000
stack
page read and write
5E3B000
trusted library allocation
page read and write
5DEA000
trusted library allocation
page read and write
6081000
trusted library allocation
page read and write
5340000
direct allocation
page execute and read and write
5E17000
trusted library allocation
page read and write
5E19000
trusted library allocation
page read and write
6281000
trusted library allocation
page read and write
ED1000
unkown
page execute and read and write
636D000
trusted library allocation
page read and write
5E6A000
trusted library allocation
page read and write
5DE9000
trusted library allocation
page read and write
5DF6000
trusted library allocation
page read and write
64F4000
trusted library allocation
page read and write
CAE000
unkown
page execute and write copy
E65000
unkown
page execute and read and write
5E5C000
trusted library allocation
page read and write
5E42000
trusted library allocation
page read and write
5EE8000
trusted library allocation
page read and write
4C0F000
stack
page read and write
380E000
stack
page read and write
45CF000
stack
page read and write
434F000
stack
page read and write
5E03000
trusted library allocation
page read and write
164A000
heap
page read and write
398E000
stack
page read and write
140E000
stack
page read and write
5E2C000
trusted library allocation
page read and write
64D9000
trusted library allocation
page readonly
ED3000
unkown
page execute and read and write
4D51000
heap
page read and write
3D0F000
stack
page read and write
5E43000
trusted library allocation
page read and write
4ACF000
stack
page read and write
5DF7000
trusted library allocation
page read and write
1628000
heap
page read and write
5DE4000
trusted library allocation
page read and write
3E8E000
stack
page read and write
5DF6000
trusted library allocation
page read and write
5E17000
trusted library allocation
page read and write
6285000
trusted library allocation
page read and write
5EA4000
trusted library allocation
page read and write
EA2000
unkown
page execute and read and write
1460000
direct allocation
page read and write
5EA0000
trusted library allocation
page read and write
6283000
trusted library allocation
page read and write
16AD000
heap
page read and write
3A8F000
stack
page read and write
5E19000
trusted library allocation
page read and write
5E54000
trusted library allocation
page read and write
5DE9000
trusted library allocation
page read and write
6395000
trusted library allocation
page read and write
5E14000
trusted library allocation
page read and write
5DF2000
trusted library allocation
page read and write
5E96000
trusted library allocation
page read and write
16AD000
heap
page read and write
5E4D000
trusted library allocation
page read and write
3F8F000
stack
page read and write
5E1C000
trusted library allocation
page read and write
144E000
stack
page read and write
5EF4000
trusted library allocation
page read and write
5E4B000
trusted library allocation
page read and write
5E05000
trusted library allocation
page read and write
64DC000
trusted library allocation
page read and write
169B000
heap
page read and write
311E000
stack
page read and write
1450000
heap
page read and write
5E1F000
trusted library allocation
page read and write
6357000
trusted library allocation
page read and write
64D0000
trusted library allocation
page readonly
5E44000
trusted library allocation
page read and write
E1B000
unkown
page execute and read and write
5DF6000
trusted library allocation
page read and write
4D51000
heap
page read and write
6284000
trusted library allocation
page read and write
554A000
trusted library allocation
page read and write
5E12000
trusted library allocation
page read and write
16AD000
heap
page read and write
5E06000
trusted library allocation
page read and write
63AF000
trusted library allocation
page read and write
5840000
remote allocation
page read and write
F17000
unkown
page execute and write copy
63A4000
trusted library allocation
page read and write
5E2C000
trusted library allocation
page read and write
6087000
trusted library allocation
page read and write
484F000
stack
page read and write
5DF7000
trusted library allocation
page read and write
1475000
heap
page read and write
5DEB000
trusted library allocation
page read and write
5E2C000
trusted library allocation
page read and write
1470000
heap
page read and write
4D51000
heap
page read and write
5360000
direct allocation
page execute and read and write
5E2E000
trusted library allocation
page read and write
5DE2000
trusted library allocation
page read and write
5E1F000
trusted library allocation
page read and write
5DF6000
trusted library allocation
page read and write
5E4D000
trusted library allocation
page read and write
5E24000
trusted library allocation
page read and write
5380000
direct allocation
page execute and read and write
1643000
heap
page read and write
581F000
stack
page read and write
4D4F000
stack
page read and write
EB6000
unkown
page execute and read and write
5DF0000
trusted library allocation
page read and write
162B000
heap
page read and write
6380000
trusted library allocation
page read and write
4D51000
heap
page read and write
4D51000
heap
page read and write
F39000
unkown
page execute and write copy
5E40000
trusted library allocation
page read and write
E28000
unkown
page execute and read and write
628E000
trusted library allocation
page read and write
6367000
trusted library allocation
page read and write
589E000
stack
page read and write
68F9000
trusted library allocation
page read and write
6288000
trusted library allocation
page read and write
5DEE000
trusted library allocation
page read and write
5E16000
trusted library allocation
page read and write
5E0D000
trusted library allocation
page read and write
6289000
trusted library allocation
page read and write
5E2F000
trusted library allocation
page read and write
3FCE000
stack
page read and write
5E7C000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
5E06000
trusted library allocation
page read and write
6372000
trusted library allocation
page read and write
5E44000
trusted library allocation
page read and write
5E15000
trusted library allocation
page read and write
5DE3000
trusted library allocation
page read and write
358F000
stack
page read and write
5E13000
trusted library allocation
page read and write
628F000
trusted library allocation
page read and write
5360000
direct allocation
page execute and read and write
E85000
unkown
page execute and write copy
5DF6000
trusted library allocation
page read and write
640E000
trusted library allocation
page read and write
1606000
heap
page read and write
4D51000
heap
page read and write
5840000
remote allocation
page read and write
5E0A000
trusted library allocation
page read and write
EAC000
unkown
page execute and write copy
5E17000
trusted library allocation
page read and write
5E96000
trusted library allocation
page read and write
4D51000
heap
page read and write
5E06000
trusted library allocation
page read and write
16A9000
heap
page read and write
5637000
trusted library allocation
page read and write
5DF6000
trusted library allocation
page read and write
5DE6000
trusted library allocation
page read and write
E41000
unkown
page execute and write copy
5DE2000
trusted library allocation
page read and write
3BCF000
stack
page read and write
5E1C000
trusted library allocation
page read and write
5E13000
trusted library allocation
page read and write
4D51000
heap
page read and write
5DEE000
trusted library allocation
page read and write
324F000
stack
page read and write
1645000
heap
page read and write
E42000
unkown
page execute and read and write
5E0A000
trusted library allocation
page read and write
5E53000
trusted library allocation
page read and write
5E47000
trusted library allocation
page read and write
CB0000
unkown
page execute and write copy
5E8C000
trusted library allocation
page read and write
6338000
trusted library allocation
page read and write
5DE0000
trusted library allocation
page read and write
5DF6000
trusted library allocation
page read and write
5E17000
trusted library allocation
page read and write
5FCD000
trusted library allocation
page read and write
1460000
direct allocation
page read and write
5E06000
trusted library allocation
page read and write
1460000
direct allocation
page read and write
CA4000
unkown
page execute and read and write
1643000
heap
page read and write
E66000
unkown
page execute and write copy
6286000
trusted library allocation
page read and write
5DED000
trusted library allocation
page read and write
5ADE000
stack
page read and write
5F20000
trusted library allocation
page read and write
F2A000
unkown
page execute and write copy
5E17000
trusted library allocation
page read and write
5E1F000
trusted library allocation
page read and write
5E3F000
trusted library allocation
page read and write
5E1A000
trusted library allocation
page read and write
5DFB000
trusted library allocation
page read and write
5E0D000
trusted library allocation
page read and write
348E000
stack
page read and write
5643000
trusted library allocation
page read and write
16A9000
heap
page read and write
F21000
unkown
page execute and read and write
5F79000
trusted library allocation
page read and write
4D51000
heap
page read and write
EFA000
unkown
page execute and read and write
565B000
trusted library allocation
page read and write
6281000
trusted library allocation
page read and write
5B3E000
stack
page read and write
5DF6000
trusted library allocation
page read and write
5DEA000
trusted library allocation
page read and write
4D51000
heap
page read and write
6399000
trusted library allocation
page read and write
5DF8000
trusted library allocation
page read and write
51E0000
direct allocation
page read and write
4D51000
heap
page read and write
637C000
trusted library allocation
page read and write
4D51000
heap
page read and write
5DF6000
trusted library allocation
page read and write
3120000
heap
page read and write
6468000
trusted library allocation
page read and write
5E96000
trusted library allocation
page read and write
5E36000
trusted library allocation
page read and write
642C000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
5E06000
trusted library allocation
page read and write
628F000
trusted library allocation
page read and write
559D000
stack
page read and write
5DE9000
trusted library allocation
page read and write
5E7C000
trusted library allocation
page read and write
F20000
unkown
page execute and write copy
5E31000
trusted library allocation
page read and write
4B0E000
stack
page read and write
5E2D000
trusted library allocation
page read and write
645E000
trusted library allocation
page read and write
49CE000
stack
page read and write
E91000
unkown
page execute and write copy
6375000
trusted library allocation
page read and write
5DE3000
trusted library allocation
page read and write
5DF6000
trusted library allocation
page read and write
F3A000
unkown
page execute and write copy
5E30000
trusted library allocation
page read and write
F7B000
stack
page read and write
5E17000
trusted library allocation
page read and write
5DF9000
trusted library allocation
page read and write
4D50000
heap
page read and write
5EEE000
trusted library allocation
page read and write
35CE000
stack
page read and write
5E06000
trusted library allocation
page read and write
4D51000
heap
page read and write
5E4A000
trusted library allocation
page read and write
5E47000
trusted library allocation
page read and write
63BE000
trusted library allocation
page read and write
6284000
trusted library allocation
page read and write
1460000
direct allocation
page read and write
5E23000
trusted library allocation
page read and write
5E8B000
trusted library allocation
page read and write
160C000
heap
page read and write
ED6000
unkown
page execute and read and write
1460000
direct allocation
page read and write
5E06000
trusted library allocation
page read and write
6344000
trusted library allocation
page read and write
F39000
unkown
page execute and read and write
ED2000
unkown
page execute and write copy
5E0C000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
5222000
direct allocation
page read and write
5E36000
trusted library allocation
page read and write
E3F000
unkown
page execute and read and write
5DE7000
trusted library allocation
page read and write
6285000
trusted library allocation
page read and write
16AD000
heap
page read and write
F20000
unkown
page execute and write copy
6468000
trusted library allocation
page read and write
5E7C000
trusted library allocation
page read and write
5E22000
trusted library allocation
page read and write
5EE6000
trusted library allocation
page read and write
5E81000
trusted library allocation
page read and write
5E7C000
trusted library allocation
page read and write
6280000
trusted library allocation
page read and write
5DEE000
trusted library allocation
page read and write
5E12000
trusted library allocation
page read and write
6283000
trusted library allocation
page read and write
5E17000
trusted library allocation
page read and write
5DEA000
trusted library allocation
page read and write
6285000
trusted library allocation
page read and write
4D51000
heap
page read and write
5E5E000
trusted library allocation
page read and write
5E3E000
trusted library allocation
page read and write
5DEA000
trusted library allocation
page read and write
5CD0000
heap
page read and write
5E59000
trusted library allocation
page read and write
5E1C000
trusted library allocation
page read and write
16A4000
heap
page read and write
4D51000
heap
page read and write
628B000
trusted library allocation
page read and write
599E000
stack
page read and write
16A9000
heap
page read and write
E94000
unkown
page execute and read and write
3C0E000
stack
page read and write
5E23000
trusted library allocation
page read and write
5E17000
trusted library allocation
page read and write
1460000
direct allocation
page read and write
640E000
trusted library allocation
page read and write
5EA1000
trusted library allocation
page read and write
5E1F000
trusted library allocation
page read and write
5E79000
trusted library allocation
page read and write
5E4B000
trusted library allocation
page read and write
1460000
direct allocation
page read and write
384E000
stack
page read and write
5390000
direct allocation
page execute and read and write
162B000
heap
page read and write
4D51000
heap
page read and write
5E36000
trusted library allocation
page read and write
564D000
trusted library allocation
page read and write
64D3000
trusted library allocation
page read and write
E97000
unkown
page execute and read and write
6346000
trusted library allocation
page read and write
5E35000
trusted library allocation
page read and write
5E3B000
trusted library allocation
page read and write
163B000
heap
page read and write
16A9000
heap
page read and write
5DF6000
trusted library allocation
page read and write
5E01000
trusted library allocation
page read and write
628B000
trusted library allocation
page read and write
628A000
trusted library allocation
page read and write
5DE2000
trusted library allocation
page read and write
EB2000
unkown
page execute and read and write
5E2C000
trusted library allocation
page read and write
1460000
direct allocation
page read and write
5DE4000
trusted library allocation
page read and write
5FC5000
trusted library allocation
page read and write
5E00000
trusted library allocation
page read and write
5E13000
trusted library allocation
page read and write
6342000
trusted library allocation
page read and write
15CE000
heap
page read and write
5E3C000
trusted library allocation
page read and write
5DFF000
trusted library allocation
page read and write
5E05000
trusted library allocation
page read and write
5E73000
trusted library allocation
page read and write
51E0000
direct allocation
page read and write
63CC000
trusted library allocation
page read and write
67D0000
heap
page read and write
16A2000
heap
page read and write
5E0D000
trusted library allocation
page read and write
4D51000
heap
page read and write
5E3B000
trusted library allocation
page read and write
6343000
trusted library allocation
page read and write
1609000
heap
page read and write
EC3000
unkown
page execute and read and write
5E83000
trusted library allocation
page read and write
1604000
heap
page read and write
44CE000
stack
page read and write
5F1C000
stack
page read and write
30DE000
stack
page read and write
5DFC000
trusted library allocation
page read and write
E27000
unkown
page execute and write copy
5DE9000
trusted library allocation
page read and write
5E00000
trusted library allocation
page read and write
6289000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
C93000
unkown
page execute and read and write
E89000
unkown
page execute and read and write
5E61000
trusted library allocation
page read and write
64D1000
trusted library allocation
page execute read
5E83000
trusted library allocation
page read and write
6283000
trusted library allocation
page read and write
36CF000
stack
page read and write
40CF000
stack
page read and write
6366000
trusted library allocation
page read and write
5DE3000
trusted library allocation
page read and write
4D51000
heap
page read and write
3D4E000
stack
page read and write
5E28000
trusted library allocation
page read and write
65D0000
trusted library allocation
page readonly
F14000
unkown
page execute and write copy
314D000
heap
page read and write
6284000
trusted library allocation
page read and write
5E2E000
trusted library allocation
page read and write
5E06000
trusted library allocation
page read and write
FB0000
heap
page read and write
5E31000
trusted library allocation
page read and write
5EA3000
trusted library allocation
page read and write
C50000
unkown
page read and write
438E000
stack
page read and write
EA5000
unkown
page execute and read and write
5E06000
trusted library allocation
page read and write
5E2C000
trusted library allocation
page read and write
16A6000
heap
page read and write
628F000
trusted library allocation
page read and write
16A9000
heap
page read and write
636F000
trusted library allocation
page read and write
6281000
trusted library allocation
page read and write
5E06000
trusted library allocation
page read and write
E08000
unkown
page execute and write copy
5330000
direct allocation
page execute and read and write
5F25000
trusted library allocation
page read and write
5E3A000
trusted library allocation
page read and write
5E08000
trusted library allocation
page read and write
5E0A000
trusted library allocation
page read and write
169B000
heap
page read and write
6286000
trusted library allocation
page read and write
4C4E000
stack
page read and write
5F95000
trusted library allocation
page read and write
5DF8000
trusted library allocation
page read and write
6280000
trusted library allocation
page read and write
169C000
heap
page read and write
5840000
remote allocation
page read and write
1460000
direct allocation
page read and write
ED0000
unkown
page execute and write copy
5DEA000
trusted library allocation
page read and write
E7F000
unkown
page execute and write copy
632B000
trusted library allocation
page read and write
63BD000
trusted library allocation
page read and write
5E13000
trusted library allocation
page read and write
628E000
trusted library allocation
page read and write
16AD000
heap
page read and write
5E0A000
trusted library allocation
page read and write
6285000
trusted library allocation
page read and write
5E28000
trusted library allocation
page read and write
5E0A000
trusted library allocation
page read and write
5E1C000
trusted library allocation
page read and write
5C3F000
stack
page read and write
157F000
stack
page read and write
5E2B000
trusted library allocation
page read and write
4D51000
heap
page read and write
5F0D000
trusted library allocation
page read and write
1628000
heap
page read and write
5E30000
trusted library allocation
page read and write
6389000
trusted library allocation
page read and write
460E000
stack
page read and write
628C000
trusted library allocation
page read and write
169F000
heap
page read and write
63AC000
trusted library allocation
page read and write
5E8B000
trusted library allocation
page read and write
5DFD000
trusted library allocation
page read and write
1612000
heap
page read and write
305F000
stack
page read and write
16AA000
heap
page read and write
5E2F000
trusted library allocation
page read and write
63A6000
trusted library allocation
page read and write
5360000
direct allocation
page execute and read and write
5E19000
trusted library allocation
page read and write
370E000
stack
page read and write
6363000
trusted library allocation
page read and write
498F000
stack
page read and write
5360000
direct allocation
page execute and read and write
1640000
heap
page read and write
5370000
direct allocation
page execute and read and write
1647000
heap
page read and write
1460000
direct allocation
page read and write
CAF000
unkown
page execute and read and write
628D000
trusted library allocation
page read and write
E3C000
unkown
page execute and write copy
632E000
trusted library allocation
page read and write
5E0C000
trusted library allocation
page read and write
164C000
heap
page read and write
165C000
heap
page read and write
F22000
unkown
page execute and write copy
5E35000
trusted library allocation
page read and write
628A000
trusted library allocation
page read and write
5EEE000
trusted library allocation
page read and write
15C0000
heap
page read and write
164C000
heap
page read and write
5E06000
trusted library allocation
page read and write
6285000
trusted library allocation
page read and write
16A6000
heap
page read and write
5E06000
trusted library allocation
page read and write
5DF8000
trusted library allocation
page read and write
6287000
trusted library allocation
page read and write
5E37000
trusted library allocation
page read and write
53A1000
trusted library allocation
page read and write
420F000
stack
page read and write
5E3A000
trusted library allocation
page read and write
5E43000
trusted library allocation
page read and write
5E0C000
trusted library allocation
page read and write
5350000
direct allocation
page execute and read and write
5E24000
trusted library allocation
page read and write
3140000
heap
page read and write
5E8B000
trusted library allocation
page read and write
5E4B000
trusted library allocation
page read and write
51DD000
stack
page read and write
470F000
stack
page read and write
5E74000
trusted library allocation
page read and write
628B000
trusted library allocation
page read and write
5E17000
trusted library allocation
page read and write
5DFF000
trusted library allocation
page read and write
15BE000
stack
page read and write
6322000
trusted library allocation
page read and write
5E5E000
trusted library allocation
page read and write
168C000
heap
page read and write
12FB000
stack
page read and write
5E54000
trusted library allocation
page read and write
5DFD000
trusted library allocation
page read and write
5E0A000
trusted library allocation
page read and write
CA4000
unkown
page execute and write copy
5C9E000
stack
page read and write
16AE000
heap
page read and write
571E000
stack
page read and write
5E53000
trusted library allocation
page read and write
6284000
trusted library allocation
page read and write
4D51000
heap
page read and write
6280000
trusted library allocation
page read and write
5DF2000
trusted library allocation
page read and write
410E000
stack
page read and write
5DF2000
trusted library allocation
page read and write
5E59000
trusted library allocation
page read and write
5E15000
trusted library allocation
page read and write
5E06000
trusted library allocation
page read and write
605D000
trusted library allocation
page read and write
531F000
stack
page read and write
3E4F000
stack
page read and write
59DE000
stack
page read and write
15F8000
heap
page read and write
F2A000
unkown
page execute and write copy
4D60000
heap
page read and write
1612000
heap
page read and write
5360000
direct allocation
page execute and read and write
5E01000
trusted library allocation
page read and write
5E96000
trusted library allocation
page read and write
4D51000
heap
page read and write
5E3E000
trusted library allocation
page read and write
5E2D000
trusted library allocation
page read and write
5DE9000
trusted library allocation
page read and write
168C000
heap
page read and write
1460000
direct allocation
page read and write
448E000
stack
page read and write
6518000
trusted library allocation
page read and write
5E4B000
trusted library allocation
page read and write
5E06000
trusted library allocation
page read and write
64DF000
trusted library allocation
page read and write
5E6C000
trusted library allocation
page read and write
5E63000
trusted library allocation
page read and write
168C000
heap
page read and write
C50000
unkown
page readonly
5DF8000
trusted library allocation
page read and write
16A1000
heap
page read and write
64AD000
trusted library allocation
page read and write
63B4000
trusted library allocation
page read and write
EA3000
unkown
page execute and write copy
5E68000
trusted library allocation
page read and write
5E5E000
trusted library allocation
page read and write
5DFC000
trusted library allocation
page read and write
5FBD000
trusted library allocation
page read and write
344F000
stack
page read and write
4E50000
trusted library allocation
page read and write
1460000
direct allocation
page read and write
5E31000
trusted library allocation
page read and write
5E05000
trusted library allocation
page read and write
635D000
trusted library allocation
page read and write
ED4000
unkown
page execute and write copy
5E5E000
trusted library allocation
page read and write
5E06000
trusted library allocation
page read and write
5DDF000
stack
page read and write
5E17000
trusted library allocation
page read and write
5DE9000
trusted library allocation
page read and write
FA0000
heap
page read and write
E32000
unkown
page execute and read and write
1460000
direct allocation
page read and write
628F000
trusted library allocation
page read and write
5DE9000
trusted library allocation
page read and write
C51000
unkown
page execute and read and write
5E05000
trusted library allocation
page read and write
5DE7000
trusted library allocation
page read and write
56DF000
stack
page read and write
6288000
trusted library allocation
page read and write
5E33000
trusted library allocation
page read and write
334F000
stack
page read and write
4D51000
heap
page read and write
5E53000
trusted library allocation
page read and write
5DE9000
trusted library allocation
page read and write
1628000
heap
page read and write
5E1B000
trusted library allocation
page read and write
3147000
heap
page read and write
5DF6000
trusted library allocation
page read and write
1640000
heap
page read and write
64AE000
trusted library allocation
page read and write
549E000
stack
page read and write
5E83000
trusted library allocation
page read and write
5E05000
trusted library allocation
page read and write
5E96000
trusted library allocation
page read and write
6499000
trusted library allocation
page read and write
5DF6000
trusted library allocation
page read and write
E1E000
unkown
page execute and write copy
5E27000
trusted library allocation
page read and write
160D000
heap
page read and write
E1F000
unkown
page execute and read and write
5E1A000
trusted library allocation
page read and write
5EE7000
trusted library allocation
page read and write
5E83000
trusted library allocation
page read and write
638E000
trusted library allocation
page read and write
5DFF000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
5DF8000
trusted library allocation
page read and write
5E7E000
trusted library allocation
page read and write
5E4F000
trusted library allocation
page read and write
E56000
unkown
page execute and write copy
5E4F000
trusted library allocation
page read and write
5E07000
trusted library allocation
page read and write
5E4B000
trusted library allocation
page read and write
16A4000
heap
page read and write
644F000
trusted library allocation
page read and write
E84000
unkown
page execute and read and write
6328000
trusted library allocation
page read and write
162B000
heap
page read and write
5E84000
trusted library allocation
page read and write
63C9000
trusted library allocation
page read and write
5DFC000
trusted library allocation
page read and write
5E5C000
trusted library allocation
page read and write
There are 658 hidden memdumps, click here to show them.