IOC Report
yuij5p5p3W.exe

loading gif

Files

File Path
Type
Category
Malicious
yuij5p5p3W.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_yuij5p5p3W.exe_7993edd1949fe3b12f176beeaa63fdd4ada698f_e019711b_98493af3-49f5-4220-9844-f4aa7ce4fe6c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER152F.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Dec 24 07:36:00 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER16A7.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER16E6.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\yuij5p5p3W.exe
"C:\Users\user\Desktop\yuij5p5p3W.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7108 -s 2016

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe.0
unknown
https://bbuseruploads.s3.amazonaws.com/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3cc1-
unknown
https://observerfry.lat/m
unknown
https://duckduckgo.com/ac/?q=
unknown
slipperyloo.lat
curverpluch.lat
tentabatte.lat
manyrestro.lat
https://observerfry.lat/t
unknown
https://observerfry.lat/pi
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/
unknown
https://bitbucket.org/d
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/
unknown
https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.net
unknown
https://observerfry.lat/G
unknown
https://remote-app-switcher.prod-east.frontend.public.atl-paas.net
unknown
bashfulacid.lat
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://observerfry.lat/apisw
unknown
https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe
185.166.143.50
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.16/off/def.exeu
unknown
https://aui-cdn.atlassian.com/
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=16964251364
unknown
https://web-security-reports.services.atlassian.com/csp-report/bb-websiteX-Frame-OptionsSAMEORIGINX-
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://observerfry.lat:443/api
unknown
observerfry.lat
https://bitbucket.org/
unknown
wordyfindy.lat
https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://observerfry.lat/tem
unknown
https://observerfry.lat/api
104.21.36.201
https://bbc-object-storage--frontbucket.us-east-1.pr
unknown
https://web-security-reports.services.atlassian.com/csp-report/bb-website
unknown
shapestickyr.lat
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://observerfry.lat/apiObGoF
unknown
http://upx.sf.net
unknown
https://observerfry.lat/
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://dz8aopenkvv6s.cloudfront.net
unknown
talkynicer.lat
https://ac.ecosia.org/autocomplete?q=
unknown
http://crl.micro
unknown
https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net
unknown
https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exeN
unknown
https://cdn.cookielaw.org/
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/;
unknown
https://remote-app-switcher.stg-east.frontend.public.atl-paas.net
unknown
http://185.215.113.16/off/def.exe
unknown
https://observerfry.lat/x
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 54 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s3-w.us-east-1.amazonaws.com
54.231.128.9
bitbucket.org
185.166.143.50
observerfry.lat
104.21.36.201
bbuseruploads.s3.amazonaws.com
unknown

IPs

IP
Domain
Country
Malicious
54.231.128.9
s3-w.us-east-1.amazonaws.com
United States
104.21.36.201
observerfry.lat
United States
185.166.143.50
bitbucket.org
Germany

Registry

Path
Value
Malicious
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
ProgramId
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
FileId
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
LowerCaseLongPath
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
LongPathHash
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
Name
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
OriginalFileName
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
Publisher
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
Version
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
BinFileVersion
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
BinaryType
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
ProductName
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
ProductVersion
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
LinkDate
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
BinProductVersion
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
AppxPackageFullName
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
AppxPackageRelativeId
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
Size
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
Language
\REGISTRY\A\{4f458e97-21b3-a552-539f-d544a3ccce83}\Root\InventoryApplicationFile\yuij5p5p3w.exe|ed1e6850bf74c00f
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
00180012D8270AF5
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
821000
unkown
page execute and read and write
malicious
5545000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
53EC000
trusted library allocation
page read and write
53E7000
trusted library allocation
page read and write
71B000
heap
page read and write
785000
heap
page read and write
5405000
trusted library allocation
page read and write
800000
direct allocation
page read and write
A96000
unkown
page execute and read and write
2EAF000
stack
page read and write
A86000
unkown
page execute and read and write
781000
heap
page read and write
5415000
trusted library allocation
page read and write
5A6C000
trusted library allocation
page read and write
5405000
trusted library allocation
page read and write
53EA000
trusted library allocation
page read and write
590B000
trusted library allocation
page read and write
53EE000
trusted library allocation
page read and write
5A4B000
trusted library allocation
page read and write
790000
heap
page read and write
5AA1000
trusted library allocation
page execute read
790000
heap
page read and write
57F5000
trusted library allocation
page read and write
53EC000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
A64000
unkown
page execute and read and write
53D6000
trusted library allocation
page read and write
53DE000
trusted library allocation
page read and write
D2E000
stack
page read and write
57FF000
trusted library allocation
page read and write
545A000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
5357000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
540C000
trusted library allocation
page read and write
5458000
trusted library allocation
page read and write
800000
direct allocation
page read and write
58A4000
trusted library allocation
page read and write
7A4000
heap
page read and write
775000
heap
page read and write
57F7000
trusted library allocation
page read and write
53E3000
trusted library allocation
page read and write
59AC000
trusted library allocation
page read and write
49B0000
direct allocation
page execute and read and write
49D0000
direct allocation
page execute and read and write
5415000
trusted library allocation
page read and write
53E5000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
6D7000
heap
page read and write
A15000
unkown
page execute and read and write
53D0000
trusted library allocation
page read and write
58AF000
trusted library allocation
page read and write
53E1000
trusted library allocation
page read and write
5407000
trusted library allocation
page read and write
5489000
trusted library allocation
page read and write
57F2000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
43F1000
heap
page read and write
6E9000
heap
page read and write
9E0000
unkown
page execute and read and write
53F5000
trusted library allocation
page read and write
53F8000
trusted library allocation
page read and write
A43000
unkown
page execute and read and write
5378000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
87F000
unkown
page execute and write copy
53D7000
trusted library allocation
page read and write
53EE000
trusted library allocation
page read and write
76A000
heap
page read and write
43F1000
heap
page read and write
53DC000
trusted library allocation
page read and write
B02000
unkown
page execute and write copy
5405000
trusted library allocation
page read and write
58E8000
trusted library allocation
page read and write
53D4000
trusted library allocation
page read and write
7A4000
heap
page read and write
9FF000
unkown
page execute and write copy
5975000
trusted library allocation
page read and write
5419000
trusted library allocation
page read and write
5469000
trusted library allocation
page read and write
326F000
stack
page read and write
800000
direct allocation
page read and write
5140000
heap
page read and write
4A00000
direct allocation
page execute and read and write
2790000
direct allocation
page read and write
57F9000
trusted library allocation
page read and write
5405000
trusted library allocation
page read and write
542D000
trusted library allocation
page read and write
4DDE000
stack
page read and write
58D9000
trusted library allocation
page read and write
A76000
unkown
page execute and write copy
770000
heap
page read and write
5365000
trusted library allocation
page read and write
57F7000
trusted library allocation
page read and write
764000
heap
page read and write
5923000
trusted library allocation
page read and write
B0A000
unkown
page execute and write copy
53AB000
trusted library allocation
page read and write
58E4000
trusted library allocation
page read and write
A97000
unkown
page execute and write copy
568C000
stack
page read and write
B0A000
unkown
page execute and write copy
57F4000
trusted library allocation
page read and write
875000
unkown
page execute and read and write
53ED000
trusted library allocation
page read and write
5382000
trusted library allocation
page read and write
53EC000
trusted library allocation
page read and write
778000
heap
page read and write
43F1000
heap
page read and write
2FEF000
stack
page read and write
44F0000
trusted library allocation
page read and write
5A7E000
trusted library allocation
page read and write
538D000
trusted library allocation
page read and write
764000
heap
page read and write
53E3000
trusted library allocation
page read and write
6AE000
heap
page read and write
53F5000
trusted library allocation
page read and write
49F0000
direct allocation
page execute and read and write
57F8000
trusted library allocation
page read and write
606C000
trusted library allocation
page read and write
3EEF000
stack
page read and write
2C6E000
stack
page read and write
7A4000
heap
page read and write
780000
heap
page read and write
53E1000
trusted library allocation
page read and write
4CE6000
trusted library allocation
page read and write
48AB000
stack
page read and write
650000
heap
page read and write
2EEE000
stack
page read and write
4EE0000
remote allocation
page read and write
536A000
trusted library allocation
page read and write
57F3000
trusted library allocation
page read and write
5356000
trusted library allocation
page read and write
53F5000
trusted library allocation
page read and write
53E7000
trusted library allocation
page read and write
53EE000
trusted library allocation
page read and write
2EB000
stack
page read and write
53EE000
trusted library allocation
page read and write
49E0000
direct allocation
page execute and read and write
402F000
stack
page read and write
53C6000
trusted library allocation
page read and write
270F000
stack
page read and write
765000
heap
page read and write
49ED000
stack
page read and write
53E3000
trusted library allocation
page read and write
53D7000
trusted library allocation
page read and write
AF2000
unkown
page execute and read and write
5395000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
58A9000
trusted library allocation
page read and write
58EE000
trusted library allocation
page read and write
780000
heap
page read and write
6F2000
heap
page read and write
5415000
trusted library allocation
page read and write
7A4000
heap
page read and write
77E000
heap
page read and write
545D000
trusted library allocation
page read and write
7A0000
heap
page read and write
53F4000
trusted library allocation
page read and write
274C000
stack
page read and write
5425000
trusted library allocation
page read and write
7A4000
heap
page read and write
53F2000
trusted library allocation
page read and write
57F8000
trusted library allocation
page read and write
49AF000
stack
page read and write
53E1000
trusted library allocation
page read and write
43F1000
heap
page read and write
53EC000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
53DD000
trusted library allocation
page read and write
541C000
trusted library allocation
page read and write
880000
unkown
page execute and read and write
758000
heap
page read and write
5415000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
59F7000
trusted library allocation
page read and write
58ED000
stack
page read and write
53F5000
trusted library allocation
page read and write
58C9000
trusted library allocation
page read and write
588C000
trusted library allocation
page read and write
536C000
trusted library allocation
page read and write
A75000
unkown
page execute and read and write
5661000
trusted library allocation
page read and write
53F2000
trusted library allocation
page read and write
5702000
trusted library allocation
page read and write
53F4000
trusted library allocation
page read and write
53EB000
trusted library allocation
page read and write
540B000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
312F000
stack
page read and write
5405000
trusted library allocation
page read and write
5A38000
trusted library allocation
page read and write
5AAC000
trusted library allocation
page read and write
53EB000
trusted library allocation
page read and write
B04000
unkown
page execute and write copy
5415000
trusted library allocation
page read and write
53D7000
trusted library allocation
page read and write
778000
heap
page read and write
57F6000
trusted library allocation
page read and write
77E000
heap
page read and write
3CAE000
stack
page read and write
800000
direct allocation
page read and write
58C8000
trusted library allocation
page read and write
53EC000
trusted library allocation
page read and write
2D6F000
stack
page read and write
5421000
trusted library allocation
page read and write
43F1000
heap
page read and write
53C0000
trusted library allocation
page read and write
5374000
trusted library allocation
page read and write
43F1000
heap
page read and write
800000
direct allocation
page read and write
43F1000
heap
page read and write
5415000
trusted library allocation
page read and write
53F4000
trusted library allocation
page read and write
5435000
trusted library allocation
page read and write
2C2F000
stack
page read and write
7A4000
heap
page read and write
53E3000
trusted library allocation
page read and write
541D000
trusted library allocation
page read and write
7A4000
heap
page read and write
5901000
trusted library allocation
page read and write
43F0000
heap
page read and write
53F5000
trusted library allocation
page read and write
53F3000
trusted library allocation
page read and write
53F4000
trusted library allocation
page read and write
43F1000
heap
page read and write
5594000
trusted library allocation
page read and write
53E8000
trusted library allocation
page read and write
53F6000
trusted library allocation
page read and write
29AF000
stack
page read and write
53F8000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
7A4000
heap
page read and write
537A000
trusted library allocation
page read and write
538B000
trusted library allocation
page read and write
5458000
trusted library allocation
page read and write
53DE000
trusted library allocation
page read and write
57F1000
trusted library allocation
page read and write
550B000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
5378000
trusted library allocation
page read and write
5968000
trusted library allocation
page read and write
543A000
trusted library allocation
page read and write
43F1000
heap
page read and write
39EF000
stack
page read and write
57CA000
trusted library allocation
page read and write
57F6000
trusted library allocation
page read and write
800000
direct allocation
page read and write
53F4000
trusted library allocation
page read and write
53D2000
trusted library allocation
page read and write
5351000
trusted library allocation
page read and write
57F5000
trusted library allocation
page read and write
53A9000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
53CD000
trusted library allocation
page read and write
5922000
trusted library allocation
page read and write
5371000
trusted library allocation
page read and write
57F3000
trusted library allocation
page read and write
5407000
trusted library allocation
page read and write
53EC000
trusted library allocation
page read and write
32AE000
stack
page read and write
599A000
trusted library allocation
page read and write
5489000
trusted library allocation
page read and write
5407000
trusted library allocation
page read and write
53D4000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
865000
unkown
page execute and read and write
5363000
trusted library allocation
page read and write
800000
direct allocation
page read and write
53F5000
trusted library allocation
page read and write
5394000
trusted library allocation
page read and write
4F4E000
stack
page read and write
535D000
trusted library allocation
page read and write
406E000
stack
page read and write
6AA000
heap
page read and write
5405000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
7A4000
heap
page read and write
53E7000
trusted library allocation
page read and write
790000
heap
page read and write
595D000
trusted library allocation
page read and write
5458000
trusted library allocation
page read and write
57F6000
trusted library allocation
page read and write
5489000
trusted library allocation
page read and write
58A9000
trusted library allocation
page read and write
53C5000
trusted library allocation
page read and write
53F5000
trusted library allocation
page read and write
5388000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
537E000
trusted library allocation
page read and write
53EE000
trusted library allocation
page read and write
53F5000
trusted library allocation
page read and write
3EA000
stack
page read and write
A9F000
unkown
page execute and read and write
53D7000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
2AEF000
stack
page read and write
5732000
trusted library allocation
page read and write
534F000
stack
page read and write
43F1000
heap
page read and write
53CD000
trusted library allocation
page read and write
57F8000
trusted library allocation
page read and write
53F5000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
42EE000
stack
page read and write
58DD000
trusted library allocation
page read and write
57F9000
trusted library allocation
page read and write
5399000
trusted library allocation
page read and write
58C3000
trusted library allocation
page read and write
A32000
unkown
page execute and write copy
5350000
trusted library allocation
page read and write
53DB000
trusted library allocation
page read and write
573A000
trusted library allocation
page read and write
33EE000
stack
page read and write
53F4000
trusted library allocation
page read and write
5469000
trusted library allocation
page read and write
53F7000
trusted library allocation
page read and write
A57000
unkown
page execute and write copy
57F1000
trusted library allocation
page read and write
ADA000
unkown
page execute and read and write
4EDF000
stack
page read and write
53EE000
trusted library allocation
page read and write
5458000
trusted library allocation
page read and write
53DD000
trusted library allocation
page read and write
76A000
heap
page read and write
565E000
trusted library allocation
page read and write
53E7000
trusted library allocation
page read and write
7A4000
heap
page read and write
E2F000
stack
page read and write
5415000
trusted library allocation
page read and write
6A0000
heap
page read and write
53F0000
trusted library allocation
page read and write
4870000
direct allocation
page read and write
4D9E000
stack
page read and write
769000
heap
page read and write
53EC000
trusted library allocation
page read and write
A84000
unkown
page execute and write copy
5415000
trusted library allocation
page read and write
4BD9000
trusted library allocation
page read and write
5AA9000
trusted library allocation
page readonly
53CA000
trusted library allocation
page read and write
535E000
trusted library allocation
page read and write
57F4000
trusted library allocation
page read and write
53EC000
trusted library allocation
page read and write
7A4000
heap
page read and write
5376000
trusted library allocation
page read and write
5143000
heap
page read and write
53EB000
trusted library allocation
page read and write
43F1000
heap
page read and write
53CD000
trusted library allocation
page read and write
3DAF000
stack
page read and write
53F5000
trusted library allocation
page read and write
58A6000
trusted library allocation
page read and write
53E9000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
58FD000
trusted library allocation
page read and write
A78000
unkown
page execute and read and write
57F6000
trusted library allocation
page read and write
537D000
trusted library allocation
page read and write
5358000
trusted library allocation
page read and write
3DEE000
stack
page read and write
4A10000
direct allocation
page execute and read and write
53DB000
trusted library allocation
page read and write
49E0000
direct allocation
page execute and read and write
5469000
trusted library allocation
page read and write
53EC000
trusted library allocation
page read and write
5925000
trusted library allocation
page read and write
53CD000
trusted library allocation
page read and write
5404000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
43F1000
heap
page read and write
504F000
stack
page read and write
5916000
trusted library allocation
page read and write
509D000
stack
page read and write
53D2000
trusted library allocation
page read and write
5407000
trusted library allocation
page read and write
B03000
unkown
page execute and read and write
767000
heap
page read and write
7A4000
heap
page read and write
53F3000
trusted library allocation
page read and write
790000
heap
page read and write
57F0000
trusted library allocation
page read and write
48B4000
direct allocation
page read and write
A8F000
unkown
page execute and write copy
5405000
trusted library allocation
page read and write
800000
direct allocation
page read and write
352E000
stack
page read and write
CEF000
stack
page read and write
53D2000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
43F1000
heap
page read and write
49E0000
direct allocation
page execute and read and write
43F1000
heap
page read and write
53EE000
trusted library allocation
page read and write
770000
heap
page read and write
53DB000
trusted library allocation
page read and write
53EC000
trusted library allocation
page read and write
5405000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
53DD000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
43F1000
heap
page read and write
57F3000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
7A4000
heap
page read and write
5436000
trusted library allocation
page read and write
4EE0000
remote allocation
page read and write
53F5000
trusted library allocation
page read and write
57F1000
trusted library allocation
page read and write
5489000
trusted library allocation
page read and write
5405000
trusted library allocation
page read and write
53D7000
trusted library allocation
page read and write
B02000
unkown
page execute and write copy
5BA0000
trusted library allocation
page readonly
53CD000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
5373000
trusted library allocation
page read and write
53DF000
trusted library allocation
page read and write
5405000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page readonly
9F6000
unkown
page execute and write copy
53DC000
trusted library allocation
page read and write
A6B000
unkown
page execute and write copy
53EC000
trusted library allocation
page read and write
5130000
trusted library allocation
page read and write
5451000
trusted library allocation
page read and write
A58000
unkown
page execute and read and write
53A9000
trusted library allocation
page read and write
3B2F000
stack
page read and write
3F2E000
stack
page read and write
5458000
trusted library allocation
page read and write
800000
direct allocation
page read and write
53D5000
trusted library allocation
page read and write
53EC000
trusted library allocation
page read and write
535C000
trusted library allocation
page read and write
366E000
stack
page read and write
41AE000
stack
page read and write
5415000
trusted library allocation
page read and write
53EB000
trusted library allocation
page read and write
4CDD000
trusted library allocation
page read and write
535B000
trusted library allocation
page read and write
58F6000
trusted library allocation
page read and write
800000
direct allocation
page read and write
53F4000
trusted library allocation
page read and write
49E0000
direct allocation
page execute and read and write
38EE000
stack
page read and write
53D3000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
5385000
trusted library allocation
page read and write
5363000
trusted library allocation
page read and write
A5E000
unkown
page execute and write copy
5450000
trusted library allocation
page read and write
53D2000
trusted library allocation
page read and write
57F1000
trusted library allocation
page read and write
70C000
heap
page read and write
5394000
trusted library allocation
page read and write
790000
heap
page read and write
53D0000
trusted library allocation
page read and write
53E5000
trusted library allocation
page read and write
53E1000
trusted library allocation
page read and write
43EF000
stack
page read and write
7A4000
heap
page read and write
9F7000
unkown
page execute and read and write
53C0000
trusted library allocation
page read and write
5407000
trusted library allocation
page read and write
524E000
stack
page read and write
821000
unkown
page execute and write copy
5385000
trusted library allocation
page read and write
536C000
trusted library allocation
page read and write
53EE000
trusted library allocation
page read and write
34EF000
stack
page read and write
53C0000
trusted library allocation
page read and write
49E0000
direct allocation
page execute and read and write
7A4000
heap
page read and write
776000
heap
page read and write
820000
unkown
page readonly
5396000
trusted library allocation
page read and write
5361000
trusted library allocation
page read and write
49E0000
direct allocation
page execute and read and write
A19000
unkown
page execute and read and write
53EA000
trusted library allocation
page read and write
7A4000
heap
page read and write
800000
direct allocation
page read and write
53E3000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
5469000
trusted library allocation
page read and write
376F000
stack
page read and write
4CD3000
trusted library allocation
page read and write
53F4000
trusted library allocation
page read and write
302E000
stack
page read and write
5654000
trusted library allocation
page read and write
547F000
trusted library allocation
page read and write
A18000
unkown
page execute and write copy
2B2E000
stack
page read and write
37AE000
stack
page read and write
5405000
trusted library allocation
page read and write
5A26000
trusted library allocation
page read and write
58D4000
trusted library allocation
page read and write
362F000
stack
page read and write
9E2000
unkown
page execute and write copy
53F5000
trusted library allocation
page read and write
5471000
trusted library allocation
page read and write
768000
heap
page read and write
53D4000
trusted library allocation
page read and write
7A4000
heap
page read and write
567A000
trusted library allocation
page read and write
316E000
stack
page read and write
53E8000
trusted library allocation
page read and write
27A0000
heap
page read and write
57F8000
trusted library allocation
page read and write
42AF000
stack
page read and write
A06000
unkown
page execute and write copy
720000
heap
page read and write
5898000
trusted library allocation
page read and write
57F2000
trusted library allocation
page read and write
27AD000
heap
page read and write
540C000
trusted library allocation
page read and write
594D000
trusted library allocation
page read and write
5351000
trusted library allocation
page read and write
53D7000
trusted library allocation
page read and write
9FF000
unkown
page execute and read and write
53F4000
trusted library allocation
page read and write
278E000
stack
page read and write
4C5D000
stack
page read and write
53F4000
trusted library allocation
page read and write
5558000
trusted library allocation
page read and write
5481000
trusted library allocation
page read and write
29EE000
stack
page read and write
B19000
unkown
page execute and write copy
5657000
trusted library allocation
page read and write
5437000
trusted library allocation
page read and write
781000
heap
page read and write
5B5A000
trusted library allocation
page read and write
5363000
trusted library allocation
page read and write
5395000
trusted library allocation
page read and write
57F4000
trusted library allocation
page read and write
49C0000
direct allocation
page execute and read and write
538B000
trusted library allocation
page read and write
2DAE000
stack
page read and write
4C9E000
stack
page read and write
5415000
trusted library allocation
page read and write
43F1000
heap
page read and write
640000
heap
page read and write
53D3000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
53E3000
trusted library allocation
page read and write
537E000
trusted library allocation
page read and write
9F2000
unkown
page execute and read and write
53C6000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
53DE000
trusted library allocation
page read and write
5405000
trusted library allocation
page read and write
4EE0000
remote allocation
page read and write
53EC000
trusted library allocation
page read and write
B18000
unkown
page execute and write copy
5398000
trusted library allocation
page read and write
785000
heap
page read and write
3B6E000
stack
page read and write
5357000
trusted library allocation
page read and write
28AF000
stack
page read and write
547A000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
7F0000
heap
page read and write
537B000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
592B000
trusted library allocation
page read and write
5396000
trusted library allocation
page read and write
5916000
trusted library allocation
page read and write
800000
direct allocation
page read and write
5DE0000
heap
page read and write
775000
heap
page read and write
538A000
trusted library allocation
page read and write
3A2E000
stack
page read and write
800000
direct allocation
page read and write
50FE000
stack
page read and write
5470000
trusted library allocation
page read and write
535B000
trusted library allocation
page read and write
5378000
trusted library allocation
page read and write
53CA000
trusted library allocation
page read and write
57F7000
trusted library allocation
page read and write
790000
heap
page read and write
784000
heap
page read and write
5415000
trusted library allocation
page read and write
5425000
trusted library allocation
page read and write
5355000
trusted library allocation
page read and write
57F8000
trusted library allocation
page read and write
7A4000
heap
page read and write
53E3000
trusted library allocation
page read and write
53F4000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
800000
direct allocation
page read and write
9FD000
unkown
page execute and write copy
416F000
stack
page read and write
782000
heap
page read and write
57F8000
trusted library allocation
page read and write
56EA000
trusted library allocation
page read and write
4B5E000
stack
page read and write
58B5000
trusted library allocation
page read and write
592E000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
56B2000
trusted library allocation
page read and write
260E000
stack
page read and write
5405000
trusted library allocation
page read and write
59ED000
trusted library allocation
page read and write
770000
heap
page read and write
572A000
trusted library allocation
page read and write
775000
heap
page read and write
5458000
trusted library allocation
page read and write
59C8000
trusted library allocation
page read and write
59DE000
trusted library allocation
page read and write
43F1000
heap
page read and write
5415000
trusted library allocation
page read and write
71D000
heap
page read and write
782000
heap
page read and write
53F5000
trusted library allocation
page read and write
57F1000
trusted library allocation
page read and write
53CD000
trusted library allocation
page read and write
58C6000
trusted library allocation
page read and write
537B000
trusted library allocation
page read and write
AF8000
unkown
page execute and write copy
3C6F000
stack
page read and write
5425000
trusted library allocation
page read and write
5907000
trusted library allocation
page read and write
5A1E000
trusted library allocation
page read and write
591F000
trusted library allocation
page read and write
5894000
trusted library allocation
page read and write
593B000
trusted library allocation
page read and write
7EE000
stack
page read and write
5469000
trusted library allocation
page read and write
57F3000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
776000
heap
page read and write
43F1000
heap
page read and write
5469000
trusted library allocation
page read and write
53AB000
trusted library allocation
page read and write
820000
unkown
page read and write
5415000
trusted library allocation
page read and write
5489000
trusted library allocation
page read and write
53D7000
trusted library allocation
page read and write
776000
heap
page read and write
5A56000
trusted library allocation
page read and write
AF0000
unkown
page execute and write copy
78F000
heap
page read and write
5657000
trusted library allocation
page read and write
53EE000
trusted library allocation
page read and write
709000
heap
page read and write
38AF000
stack
page read and write
77D000
heap
page read and write
5471000
trusted library allocation
page read and write
5364000
trusted library allocation
page read and write
538A000
trusted library allocation
page read and write
53DD000
trusted library allocation
page read and write
53E5000
trusted library allocation
page read and write
4A29000
trusted library allocation
page read and write
5416000
trusted library allocation
page read and write
790000
heap
page read and write
4830000
heap
page read and write
5905000
trusted library allocation
page read and write
57F4000
trusted library allocation
page read and write
57F6000
trusted library allocation
page read and write
77E000
heap
page read and write
33AF000
stack
page read and write
5451000
trusted library allocation
page read and write
53D4000
trusted library allocation
page read and write
43F1000
heap
page read and write
A08000
unkown
page execute and read and write
4B1E000
stack
page read and write
540B000
trusted library allocation
page read and write
53F5000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
588D000
trusted library allocation
page read and write
58B1000
trusted library allocation
page read and write
4401000
heap
page read and write
53EE000
trusted library allocation
page read and write
881000
unkown
page execute and write copy
53F5000
trusted library allocation
page read and write
4CF3000
trusted library allocation
page read and write
2790000
direct allocation
page read and write
53EE000
trusted library allocation
page read and write
58F2000
trusted library allocation
page read and write
7A4000
heap
page read and write
57FC000
trusted library allocation
page read and write
565B000
trusted library allocation
page read and write
5692000
trusted library allocation
page read and write
57F1000
trusted library allocation
page read and write
57F8000
trusted library allocation
page read and write
5935000
trusted library allocation
page read and write
53D2000
trusted library allocation
page read and write
B18000
unkown
page execute and read and write
5405000
trusted library allocation
page read and write
7A4000
heap
page read and write
5415000
trusted library allocation
page read and write
27A7000
heap
page read and write
53F5000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
875000
unkown
page execute and write copy
5351000
trusted library allocation
page read and write
5376000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
A13000
unkown
page execute and write copy
There are 696 hidden memdumps, click here to show them.