IOC Report
BQt9k1jNaL.exe

loading gifFilesProcessesURLsIPsRegistryMemdumps8642010010Label

Files

File Path
Type
Category
Malicious
Download
BQt9k1jNaL.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BQt9k1jNaL.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp491F.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\FZEKyUDOTDzn.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\FZEKyUDOTDzn.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\FZEKyUDOTDzn.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_225acwnv.x4h.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2n4hmebx.ynv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4pftpmal.4kn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c2c3o4ac.rou.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k4ptvveh.maf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oo4knusz.2ux.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r23eskj2.zqa.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tna24i0k.b14.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp69F6.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\BQt9k1jNaL.exe
"C:\Users\user\Desktop\BQt9k1jNaL.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\BQt9k1jNaL.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\FZEKyUDOTDzn.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FZEKyUDOTDzn" /XML "C:\Users\user\AppData\Local\Temp\tmp491F.tmp"
malicious
C:\Users\user\Desktop\BQt9k1jNaL.exe
"C:\Users\user\Desktop\BQt9k1jNaL.exe"
malicious
C:\Users\user\AppData\Roaming\FZEKyUDOTDzn.exe
C:\Users\user\AppData\Roaming\FZEKyUDOTDzn.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FZEKyUDOTDzn" /XML "C:\Users\user\AppData\Local\Temp\tmp69F6.tmp"
malicious
C:\Users\user\AppData\Roaming\FZEKyUDOTDzn.exe
"C:\Users\user\AppData\Roaming\FZEKyUDOTDzn.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://tempuri.org/Entity/Id3ResponseD
unknown
http://tempuri.org/Entity/Id23Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://tempuri.org/D
unknown
http://schemas.xmlsoap.org/ws/2004/06/addressingex
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
195.211.191.155
unknown
Ukraine
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
42B3000
trusted library allocation
page read and write
malicious
42F6000
trusted library allocation
page read and write
malicious
4D26000
trusted library allocation
page read and write
malicious
4341000
trusted library allocation
page read and write
malicious
2EC6000
trusted library allocation
page read and write
malicious
4CE3000
trusted library allocation
page read and write
malicious
2BD6000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
153E000
stack
page read and write
5A60000
heap
page execute and read and write
2ABE000
trusted library allocation
page read and write
7025000
heap
page read and write
56B1000
trusted library allocation
page read and write
6295000
heap
page read and write
2E3E000
trusted library allocation
page read and write
10CA000
trusted library allocation
page execute and read and write
1590000
heap
page read and write
2F44000
trusted library allocation
page read and write
DF7000
trusted library allocation
page execute and read and write
32B4000
trusted library allocation
page read and write
6A4E000
stack
page read and write
6060000
trusted library allocation
page read and write
6BDF000
trusted library allocation
page read and write
3E41000
trusted library allocation
page read and write
6070000
trusted library allocation
page execute and read and write
3DEE000
trusted library allocation
page read and write
62DE000
heap
page read and write
6730000
heap
page read and write
6125000
trusted library allocation
page read and write
B8E000
heap
page read and write
58F0000
trusted library allocation
page read and write
517E000
stack
page read and write
D60000
heap
page read and write
3000000
heap
page read and write
7390000
trusted library allocation
page read and write
4F60000
heap
page read and write
52A2000
trusted library allocation
page read and write
187A000
trusted library allocation
page execute and read and write
11E0000
heap
page read and write
57E0000
trusted library allocation
page read and write
7C09000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
512E000
stack
page read and write
3E17000
trusted library allocation
page read and write
63D5000
heap
page read and write
617C000
stack
page read and write
5E90000
trusted library allocation
page execute and read and write
5340000
trusted library allocation
page read and write
7020000
heap
page read and write
62B7000
heap
page read and write
6DEF000
heap
page read and write
54C6000
trusted library allocation
page read and write
3E0A000
trusted library allocation
page read and write
1A27000
heap
page read and write
2FF9000
trusted library allocation
page read and write
1277000
heap
page read and write
AB0E000
stack
page read and write
4EE0000
trusted library allocation
page read and write
E10000
heap
page read and write
DD2000
trusted library allocation
page read and write
6FD0000
trusted library allocation
page read and write
6DC2000
heap
page read and write
785E000
stack
page read and write
6369000
heap
page read and write
663A000
trusted library allocation
page read and write
7A10000
trusted library allocation
page read and write
635C000
heap
page read and write
4EB6000
trusted library allocation
page read and write
5869000
trusted library allocation
page execute and read and write
51EA000
trusted library allocation
page read and write
5D64000
heap
page read and write
56EE000
trusted library allocation
page read and write
3435000
trusted library allocation
page read and write
7AC0000
trusted library section
page read and write
13B2000
trusted library allocation
page read and write
11A8000
trusted library allocation
page read and write
330E000
trusted library allocation
page read and write
5CC0000
trusted library allocation
page read and write
7C8D000
stack
page read and write
1598000
heap
page read and write
54D0000
heap
page execute and read and write
3CC5000
trusted library allocation
page read and write
437000
remote allocation
page execute and read and write
6BA0000
trusted library allocation
page read and write
5274000
trusted library allocation
page read and write
2990000
trusted library allocation
page read and write
C03000
heap
page read and write
5670000
heap
page read and write
4EC2000
trusted library allocation
page read and write
58F5000
trusted library allocation
page read and write
1183000
trusted library allocation
page execute and read and write
51B0000
heap
page read and write
7150000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
10BE000
stack
page read and write
2E20000
heap
page execute and read and write
545E000
stack
page read and write
2F59000
trusted library allocation
page read and write
101F000
stack
page read and write
5780000
trusted library allocation
page read and write
52DE000
stack
page read and write
662F000
stack
page read and write
5330000
heap
page read and write
56CE000
trusted library allocation
page read and write
6312000
heap
page read and write
76FB000
stack
page read and write
7860000
trusted library allocation
page execute and read and write
29E0000
heap
page read and write
6E30000
heap
page read and write
6B7E000
trusted library allocation
page read and write
5475000
heap
page read and write
10D0000
trusted library allocation
page read and write
A92E000
stack
page read and write
2FCD000
trusted library allocation
page read and write
438C000
trusted library allocation
page read and write
6619000
trusted library allocation
page read and write
281E000
stack
page read and write
720F000
stack
page read and write
7F190000
trusted library allocation
page execute and read and write
2D78000
trusted library allocation
page read and write
5AAE000
stack
page read and write
62CC000
stack
page read and write
6D5E000
stack
page read and write
6350000
heap
page read and write
7D5E000
stack
page read and write
62E4000
heap
page read and write
310E000
trusted library allocation
page read and write
15C5000
heap
page read and write
11CD000
stack
page read and write
7800000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
5130000
heap
page read and write
400000
remote allocation
page execute and read and write
300D000
trusted library allocation
page read and write
3E51000
trusted library allocation
page read and write
605C000
stack
page read and write
7A10000
heap
page read and write
515F000
stack
page read and write
AF7000
stack
page read and write
63C6000
heap
page read and write
3315000
trusted library allocation
page read and write
29A0000
heap
page read and write
6BB9000
trusted library allocation
page read and write
13E0000
trusted library allocation
page read and write
6FA5000
heap
page read and write
29B0000
heap
page read and write
6628000
trusted library allocation
page read and write
56AB000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
5026000
trusted library allocation
page read and write
7220000
trusted library allocation
page execute and read and write
6F82000
heap
page read and write
166A000
heap
page read and write
662F000
trusted library allocation
page read and write
DC0000
trusted library allocation
page read and write
555F000
stack
page read and write
2F9F000
trusted library allocation
page read and write
3DE9000
trusted library allocation
page read and write
2E70000
heap
page read and write
6BF0000
trusted library allocation
page read and write
765E000
stack
page read and write
76A0000
trusted library allocation
page read and write
7170000
trusted library allocation
page execute and read and write
5FF0000
trusted library allocation
page read and write
4F80000
trusted library allocation
page execute and read and write
EBE000
heap
page read and write
2FCF000
unkown
page read and write
BB0000
heap
page read and write
2FBF000
trusted library allocation
page read and write
3287000
trusted library allocation
page read and write
DAE000
stack
page read and write
56F0000
trusted library allocation
page read and write
7EE30000
trusted library allocation
page execute and read and write
6361000
heap
page read and write
6390000
heap
page read and write
2CD0000
trusted library allocation
page read and write
6635000
trusted library allocation
page read and write
6C70000
trusted library allocation
page execute and read and write
59B0000
trusted library allocation
page read and write
5B2E000
stack
page read and write
2AC6000
trusted library allocation
page read and write
AC4E000
stack
page read and write
A680000
trusted library allocation
page read and write
6D1E000
stack
page read and write
7AF0000
trusted library allocation
page execute and read and write
632A000
heap
page read and write
6274000
heap
page read and write
527B000
trusted library allocation
page read and write
2EB4000
trusted library allocation
page read and write
2CE8000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
290D000
stack
page read and write
AB0C000
stack
page read and write
56D1000
trusted library allocation
page read and write
2F84000
trusted library allocation
page read and write
5190000
trusted library section
page readonly
5E30000
trusted library allocation
page read and write
10D2000
trusted library allocation
page read and write
6B4D000
stack
page read and write
7910000
heap
page read and write
2EB6000
trusted library allocation
page read and write
540A000
trusted library allocation
page read and write
5D40000
heap
page read and write
2F52000
trusted library allocation
page read and write
738F000
stack
page read and write
2CDB000
trusted library allocation
page read and write
3018000
trusted library allocation
page read and write
2F7C000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
7230000
trusted library allocation
page execute and read and write
4C9F000
trusted library allocation
page read and write
5430000
heap
page read and write
8B76000
heap
page read and write
2B41000
trusted library allocation
page read and write
4EF5000
trusted library allocation
page read and write
DE8000
heap
page read and write
769F000
stack
page read and write
5A30000
trusted library allocation
page execute and read and write
6BF5000
trusted library allocation
page read and write
C5B000
heap
page read and write
2D8D000
stack
page read and write
DD6000
trusted library allocation
page execute and read and write
13AF000
stack
page read and write
2EAE000
trusted library allocation
page read and write
14AB000
stack
page read and write
5790000
trusted library allocation
page read and write
DB3000
trusted library allocation
page execute and read and write
3BC5000
trusted library allocation
page read and write
62D4000
heap
page read and write
2D4E000
unkown
page read and write
2980000
trusted library allocation
page execute and read and write
5860000
trusted library allocation
page execute and read and write
62F9000
heap
page read and write
6BD5000
trusted library allocation
page read and write
3DDD000
trusted library allocation
page read and write
6020000
trusted library allocation
page read and write
EF7000
stack
page read and write
158D000
trusted library allocation
page execute and read and write
3E1A000
trusted library allocation
page read and write
58E0000
heap
page read and write
10F0000
trusted library allocation
page read and write
4EB1000
trusted library allocation
page read and write
2F8E000
unkown
page read and write
186E000
stack
page read and write
301F000
trusted library allocation
page read and write
AA0B000
stack
page read and write
8CAE000
stack
page read and write
BC1000
heap
page read and write
6740000
heap
page read and write
2FDE000
trusted library allocation
page read and write
7210000
trusted library allocation
page read and write
1450000
trusted library allocation
page read and write
5875000
trusted library allocation
page read and write
BA0000
heap
page read and write
6E74000
heap
page read and write
5860000
trusted library allocation
page read and write
6F40000
heap
page read and write
2FD6000
trusted library allocation
page read and write
54DC000
stack
page read and write
6100000
trusted library allocation
page read and write
4F75000
trusted library allocation
page read and write
32B0000
trusted library allocation
page read and write
6313000
heap
page read and write
657C000
stack
page read and write
3B61000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page read and write
3E79000
trusted library allocation
page read and write
30C8000
trusted library allocation
page read and write
4B4C000
stack
page read and write
6040000
trusted library allocation
page execute and read and write
5610000
trusted library allocation
page read and write
32B6000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
1026000
heap
page read and write
7FD20000
trusted library allocation
page execute and read and write
7280000
trusted library allocation
page read and write
13C2000
trusted library allocation
page read and write
6010000
trusted library allocation
page execute and read and write
5E80000
trusted library allocation
page execute and read and write
710E000
stack
page read and write
A90C000
stack
page read and write
6F99000
heap
page read and write
7A20000
trusted library allocation
page execute and read and write
1A10000
trusted library allocation
page read and write
58F2000
trusted library allocation
page read and write
6615000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
14C0000
heap
page read and write
3B83000
trusted library allocation
page read and write
33C8000
trusted library allocation
page read and write
90B0000
heap
page read and write
7160000
trusted library allocation
page read and write
5180000
trusted library allocation
page execute and read and write
13BA000
trusted library allocation
page execute and read and write
5351000
trusted library allocation
page read and write
58A0000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
5D30000
heap
page read and write
6603000
trusted library allocation
page read and write
565E000
stack
page read and write
432000
remote allocation
page execute and read and write
6290000
heap
page read and write
6DD3000
heap
page read and write
5360000
heap
page execute and read and write
3331000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
5850000
trusted library allocation
page execute and read and write
51E8000
trusted library allocation
page read and write
52B3000
heap
page read and write
119D000
trusted library allocation
page execute and read and write
6612000
trusted library allocation
page read and write
3109000
trusted library allocation
page read and write
51E5000
trusted library allocation
page read and write
E1A000
heap
page read and write
1583000
trusted library allocation
page read and write
2F56000
trusted library allocation
page read and write
3230000
heap
page read and write
557F000
stack
page read and write
2ECE000
stack
page read and write
6FE0000
trusted library allocation
page read and write
7BA0000
trusted library allocation
page execute and read and write
2FD0000
heap
page read and write
7ADC000
stack
page read and write
332C000
trusted library allocation
page read and write
A30D000
stack
page read and write
5650000
trusted library allocation
page read and write
2CD8000
trusted library allocation
page read and write
6354000
heap
page read and write
13C7000
trusted library allocation
page execute and read and write
501E000
trusted library allocation
page read and write
3E35000
trusted library allocation
page read and write
1880000
trusted library allocation
page read and write
6600000
trusted library allocation
page read and write
72CE000
stack
page read and write
1887000
trusted library allocation
page execute and read and write
F3E000
stack
page read and write
30E3000
trusted library allocation
page read and write
1573000
trusted library allocation
page execute and read and write
33EB000
trusted library allocation
page read and write
751E000
stack
page read and write
3E10000
trusted library allocation
page read and write
5291000
trusted library allocation
page read and write
4B7B000
stack
page read and write
30D6000
trusted library allocation
page read and write
5A50000
heap
page read and write
7C5D000
stack
page read and write
62F7000
heap
page read and write
30F7000
trusted library allocation
page read and write
6FC0000
trusted library section
page read and write
6262000
heap
page read and write
32DE000
trusted library allocation
page read and write
5880000
trusted library allocation
page read and write
295B000
stack
page read and write
33DE000
stack
page read and write
3320000
trusted library allocation
page read and write
633E000
heap
page read and write
62E2000
heap
page read and write
7870000
heap
page read and write
7460000
heap
page read and write
F40000
heap
page read and write
D20000
heap
page read and write
3E26000
trusted library allocation
page read and write
3327000
trusted library allocation
page read and write
6DB0000
heap
page read and write
2B30000
heap
page execute and read and write
32C0000
heap
page execute and read and write
2FEC000
trusted library allocation
page read and write
1170000
trusted library allocation
page read and write
3E4E000
trusted library allocation
page read and write
14CE000
heap
page read and write
7C4E000
stack
page read and write
5852000
trusted library allocation
page read and write
8DEE000
stack
page read and write
A34D000
stack
page read and write
2F7D000
trusted library allocation
page read and write
3E2E000
trusted library allocation
page read and write
31D8000
trusted library allocation
page read and write
3034000
trusted library allocation
page read and write
384E000
trusted library allocation
page read and write
1695000
heap
page read and write
7F4C0000
trusted library allocation
page execute and read and write
32AC000
stack
page read and write
6B78000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
1170000
heap
page read and write
5320000
heap
page read and write
BB4000
heap
page read and write
DD0000
trusted library allocation
page read and write
627A000
heap
page read and write
1440000
trusted library allocation
page read and write
6E13000
heap
page read and write
5270000
trusted library allocation
page read and write
2E50000
heap
page read and write
6303000
heap
page read and write
2CA4000
trusted library allocation
page read and write
1180000
heap
page read and write
DE0000
heap
page read and write
5E00000
trusted library allocation
page read and write
6FD5000
trusted library allocation
page read and write
79A0000
heap
page read and write
5050000
heap
page read and write
2FE0000
trusted library allocation
page read and write
11A0000
heap
page read and write
DED000
trusted library allocation
page execute and read and write
32E6000
trusted library allocation
page read and write
7289000
trusted library allocation
page read and write
5170000
trusted library allocation
page read and write
61CE000
stack
page read and write
62E0000
heap
page read and write
447F000
trusted library allocation
page read and write
2D98000
heap
page read and write
DF0000
heap
page read and write
DA0000
trusted library allocation
page read and write
C1D000
heap
page read and write
116E000
stack
page read and write
BD5000
heap
page read and write
A670000
trusted library allocation
page execute and read and write
4148000
trusted library allocation
page read and write
6DE7000
heap
page read and write
4FFE000
stack
page read and write
5021000
trusted library allocation
page read and write
13B6000
trusted library allocation
page execute and read and write
6BB2000
trusted library allocation
page read and write
18A0000
trusted library allocation
page read and write
33DE000
trusted library allocation
page read and write
DCD000
trusted library allocation
page execute and read and write
33D0000
trusted library allocation
page read and write
1170000
heap
page read and write
18B0000
trusted library allocation
page execute and read and write
127A000
heap
page read and write
4F20000
trusted library allocation
page read and write
6346000
heap
page read and write
62AF000
heap
page read and write
33BF000
trusted library allocation
page read and write
43E9000
trusted library allocation
page read and write
3040000
trusted library allocation
page read and write
561B000
trusted library allocation
page read and write
7A40000
heap
page read and write
2F47000
trusted library allocation
page read and write
33E1000
trusted library allocation
page read and write
7D8D000
stack
page read and write
5EA0000
trusted library allocation
page read and write
157D000
trusted library allocation
page execute and read and write
6606000
trusted library allocation
page read and write
3024000
trusted library allocation
page read and write
714D000
stack
page read and write
663F000
trusted library allocation
page read and write
AA0E000
stack
page read and write
3DCB000
trusted library allocation
page read and write
6BDA000
trusted library allocation
page read and write
502D000
trusted library allocation
page read and write
5CE3000
trusted library allocation
page read and write
10D5000
trusted library allocation
page execute and read and write
6E1B000
heap
page read and write
6CBE000
stack
page read and write
5340000
trusted library allocation
page read and write
2D6E000
stack
page read and write
90C6000
heap
page read and write
BA7000
heap
page read and write
2BBD000
stack
page read and write
1460000
heap
page read and write
291E000
stack
page read and write
62EE000
heap
page read and write
2B25000
trusted library allocation
page read and write
62C9000
heap
page read and write
F79000
heap
page read and write
51C0000
trusted library allocation
page read and write
5004000
trusted library allocation
page read and write
34E9000
trusted library allocation
page read and write
333C000
trusted library allocation
page read and write
7810000
heap
page read and write
51C2000
trusted library allocation
page read and write
7A8D000
stack
page read and write
2F4A000
trusted library allocation
page read and write
6EB4000
heap
page read and write
10C6000
trusted library allocation
page execute and read and write
D30000
heap
page read and write
6BB5000
trusted library allocation
page read and write
3376000
trusted library allocation
page read and write
3029000
trusted library allocation
page read and write
789000
stack
page read and write
3B4F000
trusted library allocation
page read and write
39B9000
trusted library allocation
page read and write
7C4E000
stack
page read and write
2FC5000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
740E000
stack
page read and write
10C0000
trusted library allocation
page read and write
DD3000
trusted library allocation
page execute and read and write
1150000
heap
page read and write
49B8000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
6FB0000
trusted library allocation
page execute and read and write
6394000
heap
page read and write
30CA000
trusted library allocation
page read and write
1190000
trusted library allocation
page read and write
312E000
stack
page read and write
565B000
trusted library allocation
page read and write
52C5000
trusted library allocation
page read and write
159E000
heap
page read and write
407B000
trusted library allocation
page read and write
29B1000
trusted library allocation
page read and write
1250000
trusted library allocation
page read and write
2F4F000
stack
page read and write
672E000
stack
page read and write
5B40000
heap
page read and write
E26000
heap
page read and write
DB0000
trusted library allocation
page read and write
632F000
heap
page read and write
A5CF000
stack
page read and write
5470000
heap
page read and write
30F0000
trusted library allocation
page read and write
716E000
trusted library allocation
page read and write
7B3E000
stack
page read and write
F69000
heap
page read and write
6C6D000
stack
page read and write
5F1E000
stack
page read and write
647D000
stack
page read and write
5440000
trusted library allocation
page read and write
4C7C000
stack
page read and write
A1CE000
stack
page read and write
DC0000
trusted library allocation
page read and write
5DD0000
trusted library allocation
page execute and read and write
3E89000
trusted library allocation
page read and write
A6CE000
stack
page read and write
51D0000
trusted library allocation
page execute and read and write
18C0000
heap
page read and write
5660000
trusted library allocation
page read and write
AC8E000
stack
page read and write
2A05000
trusted library allocation
page read and write
142E000
stack
page read and write
5900000
trusted library allocation
page execute and read and write
DDD000
trusted library allocation
page execute and read and write
5DC0000
trusted library allocation
page read and write
7532000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
3DD2000
trusted library allocation
page read and write
13C5000
trusted library allocation
page execute and read and write
2FCD000
trusted library allocation
page read and write
6380000
heap
page read and write
642000
unkown
page readonly
5053000
heap
page read and write
306E000
trusted library allocation
page read and write
3E7E000
trusted library allocation
page read and write
14F7000
stack
page read and write
7F1E000
stack
page read and write
5D30000
heap
page read and write
549E000
stack
page read and write
5CE0000
trusted library allocation
page read and write
531E000
stack
page read and write
7450000
trusted library allocation
page read and write
DDA000
trusted library allocation
page execute and read and write
5296000
trusted library allocation
page read and write
110A000
stack
page read and write
5841000
trusted library allocation
page read and write
56EB000
trusted library allocation
page read and write
7A42000
heap
page read and write
62D0000
heap
page read and write
6F0000
unkown
page readonly
D65000
heap
page read and write
14C7000
heap
page read and write
7F0000
heap
page read and write
32F3000
trusted library allocation
page read and write
7410000
trusted library allocation
page execute and read and write
4EAE000
trusted library allocation
page read and write
B8A000
heap
page read and write
2FC1000
trusted library allocation
page read and write
32D5000
trusted library allocation
page read and write
8B60000
heap
page read and write
3347000
trusted library allocation
page read and write
2B1E000
stack
page read and write
5342000
trusted library allocation
page read and write
577F000
stack
page read and write
630D000
heap
page read and write
1876000
trusted library allocation
page execute and read and write
14B6000
trusted library allocation
page read and write
3432000
trusted library allocation
page read and write
624B000
heap
page read and write
4ED0000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
50EE000
stack
page read and write
6330000
heap
page read and write
565E000
trusted library allocation
page read and write
6C00000
trusted library allocation
page read and write
5D2E000
stack
page read and write
3E74000
trusted library allocation
page read and write
529D000
trusted library allocation
page read and write
10C2000
trusted library allocation
page read and write
A82E000
stack
page read and write
6050000
trusted library allocation
page read and write
A4CE000
stack
page read and write
6CC0000
trusted library allocation
page read and write
6CD4000
trusted library allocation
page read and write
5626000
trusted library allocation
page read and write
446000
remote allocation
page execute and read and write
4F72000
trusted library allocation
page read and write
BD0000
heap
page read and write
7C00000
trusted library allocation
page read and write
1180000
trusted library allocation
page read and write
5D35000
heap
page read and write
6070000
trusted library allocation
page execute and read and write
5E20000
trusted library allocation
page read and write
6BCA000
trusted library allocation
page read and write
1100000
trusted library allocation
page execute and read and write
1690000
heap
page read and write
311F000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
1184000
trusted library allocation
page read and write
2FFA000
heap
page read and write
3426000
trusted library allocation
page read and write
7F5000
heap
page read and write
2BFA000
stack
page read and write
640000
unkown
page readonly
5EC0000
trusted library allocation
page execute and read and write
56DA000
trusted library allocation
page read and write
79A0000
heap
page read and write
2FCB000
trusted library allocation
page read and write
30B7000
trusted library allocation
page read and write
2F5D000
trusted library allocation
page read and write
60CC000
stack
page read and write
643C000
stack
page read and write
309F000
trusted library allocation
page read and write
27C0000
trusted library allocation
page read and write
1190000
heap
page read and write
7A40000
trusted library allocation
page read and write
6FD0000
heap
page read and write
1110000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page read and write
80EE000
stack
page read and write
1270000
heap
page read and write
1254000
trusted library allocation
page read and write
5A2B000
stack
page read and write
6240000
heap
page read and write
5655000
trusted library allocation
page read and write
27D0000
heap
page execute and read and write
13CB000
trusted library allocation
page execute and read and write
35C1000
trusted library allocation
page read and write
730D000
stack
page read and write
426F000
trusted library allocation
page read and write
56B6000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
1A0E000
stack
page read and write
5A40000
trusted library section
page readonly
2E31000
trusted library allocation
page read and write
6DFF000
heap
page read and write
100D000
heap
page read and write
EBB000
heap
page read and write
9B9000
stack
page read and write
560E000
stack
page read and write
5B30000
heap
page read and write
56E0000
trusted library allocation
page read and write
4F2C000
stack
page read and write
3F53000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
3E6D000
trusted library allocation
page read and write
4FC3000
heap
page read and write
7A0D000
heap
page read and write
3E5B000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
3E3F000
trusted library allocation
page read and write
3E20000
trusted library allocation
page read and write
7BB0000
trusted library allocation
page execute and read and write
662A000
trusted library allocation
page read and write
63A7000
heap
page read and write
500B000
trusted library allocation
page read and write
5E3D000
stack
page read and write
3300000
trusted library allocation
page read and write
5870000
trusted library allocation
page read and write
19CE000
stack
page read and write
6D5D000
stack
page read and write
1260000
trusted library allocation
page read and write
2B20000
trusted library allocation
page read and write
3E28000
trusted library allocation
page read and write
5824000
trusted library allocation
page read and write
B00000
heap
page read and write
52D0000
trusted library allocation
page read and write
4F90000
trusted library allocation
page read and write
5FE0000
trusted library allocation
page read and write
564A000
trusted library allocation
page read and write
6298000
heap
page read and write
15D0000
heap
page read and write
1430000
trusted library allocation
page execute and read and write
5E10000
trusted library allocation
page read and write
127E000
heap
page read and write
AB4E000
stack
page read and write
2B91000
trusted library allocation
page read and write
3E93000
trusted library allocation
page read and write
1870000
trusted library allocation
page read and write
3DF9000
trusted library allocation
page read and write
12AF000
stack
page read and write
10DB000
trusted library allocation
page execute and read and write
6335000
heap
page read and write
2FC7000
trusted library allocation
page read and write
4EBD000
trusted library allocation
page read and write
DF8000
heap
page read and write
1A20000
heap
page read and write
7D90000
heap
page read and write
65BE000
stack
page read and write
5846000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
563E000
trusted library allocation
page read and write
114E000
stack
page read and write
7EDD000
stack
page read and write
1574000
trusted library allocation
page read and write
3006000
trusted library allocation
page read and write
636E000
heap
page read and write
6BC8000
trusted library allocation
page read and write
5A42000
trusted library section
page readonly
100B000
heap
page read and write
54A0000
trusted library allocation
page read and write
29C0000
heap
page read and write
10D7000
trusted library allocation
page execute and read and write
312B000
trusted library allocation
page read and write
BF5000
heap
page read and write
6F8B000
heap
page read and write
62E7000
heap
page read and write
7010000
heap
page read and write
3411000
trusted library allocation
page read and write
C1B000
heap
page read and write
102E000
heap
page read and write
632D000
heap
page read and write
F48000
heap
page read and write
569E000
stack
page read and write
6B70000
trusted library allocation
page read and write
DBD000
trusted library allocation
page execute and read and write
6BCF000
trusted library allocation
page read and write
6610000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page read and write
5F3E000
stack
page read and write
79C2000
heap
page read and write
53AD000
stack
page read and write
1872000
trusted library allocation
page read and write
3102000
trusted library allocation
page read and write
761E000
stack
page read and write
B10000
heap
page read and write
340A000
trusted library allocation
page read and write
59C3000
heap
page read and write
1120000
heap
page read and write
5C2F000
stack
page read and write
5D20000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
6B7A000
trusted library allocation
page read and write
73CF000
stack
page read and write
5F7E000
stack
page read and write
1580000
trusted library allocation
page read and write
5350000
trusted library allocation
page execute and read and write
7A14000
trusted library allocation
page read and write
5040000
trusted library allocation
page read and write
D8E000
stack
page read and write
32D0000
heap
page read and write
5700000
trusted library allocation
page read and write
79D4000
heap
page read and write
3416000
trusted library allocation
page read and write
AD8E000
stack
page read and write
4FC0000
heap
page read and write
DB4000
trusted library allocation
page read and write
CF7000
stack
page read and write
51A0000
heap
page read and write
57A0000
trusted library allocation
page execute and read and write
15D3000
heap
page read and write
8CEE000
stack
page read and write
7440000
trusted library allocation
page read and write
3E03000
trusted library allocation
page read and write
321D000
trusted library allocation
page read and write
6BF2000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
1882000
trusted library allocation
page read and write
7DB2000
heap
page read and write
2D0E000
unkown
page read and write
7B9F000
stack
page read and write
6374000
heap
page read and write
601F000
stack
page read and write
1240000
trusted library allocation
page read and write
2960000
heap
page read and write
6FC4000
trusted library allocation
page read and write
625E000
heap
page read and write
2D90000
heap
page read and write
126E000
trusted library allocation
page read and write
B5D000
stack
page read and write
6333000
heap
page read and write
13C0000
trusted library allocation
page read and write
740D000
stack
page read and write
13B0000
trusted library allocation
page read and write
33F8000
trusted library allocation
page read and write
6E20000
heap
page read and write
7DB0000
heap
page read and write
2FF0000
heap
page read and write
5DBE000
stack
page read and write
5632000
trusted library allocation
page read and write
62D0000
trusted library allocation
page read and write
6E3E000
heap
page read and write
7830000
heap
page read and write
DD4000
trusted library allocation
page read and write
B3A000
stack
page read and write
2C3C000
trusted library allocation
page read and write
3113000
trusted library allocation
page read and write
5AEE000
stack
page read and write
6BE4000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
DD0000
trusted library allocation
page read and write
118D000
trusted library allocation
page execute and read and write
188B000
trusted library allocation
page execute and read and write
5400000
trusted library allocation
page read and write
DFB000
trusted library allocation
page execute and read and write
14B4000
trusted library allocation
page read and write
79B0000
heap
page read and write
4E94000
trusted library allocation
page read and write
7C04000
trusted library allocation
page read and write
7B50000
heap
page read and write
294A000
stack
page read and write
6000000
trusted library allocation
page execute and read and write
5405000
trusted library allocation
page read and write
43E1000
trusted library allocation
page read and write
BBF000
heap
page read and write
52B0000
heap
page read and write
62BC000
heap
page read and write
4F70000
trusted library allocation
page read and write
5032000
trusted library allocation
page read and write
51B0000
heap
page execute and read and write
6E2D000
heap
page read and write
56E5000
trusted library allocation
page read and write
7A05000
heap
page read and write
33FF000
trusted library allocation
page read and write
52C0000
trusted library allocation
page read and write
3DE4000
trusted library allocation
page read and write
528E000
trusted library allocation
page read and write
DC3000
trusted library allocation
page read and write
59C0000
heap
page read and write
60E0000
trusted library allocation
page execute and read and write
14B0000
trusted library allocation
page read and write
56C2000
trusted library allocation
page read and write
316F000
stack
page read and write
A7CF000
stack
page read and write
1560000
trusted library allocation
page read and write
3B41000
trusted library allocation
page read and write
2F4F000
trusted library allocation
page read and write
B80000
heap
page read and write
341B000
trusted library allocation
page read and write
A80C000
stack
page read and write
F1E000
stack
page read and write
56A0000
trusted library allocation
page read and write
3E31000
trusted library allocation
page read and write
7BF0000
trusted library allocation
page read and write
DF2000
trusted library allocation
page read and write
62A9000
heap
page read and write
EB8000
heap
page read and write
39B1000
trusted library allocation
page read and write
62BF000
heap
page read and write
77FD000
stack
page read and write
50AC000
stack
page read and write
3E62000
trusted library allocation
page read and write
3E23000
trusted library allocation
page read and write
2F0E000
stack
page read and write
6120000
trusted library allocation
page read and write
6080000
trusted library allocation
page execute and read and write
5641000
trusted library allocation
page read and write
2F5B000
trusted library allocation
page read and write
There are 852 hidden memdumps, click here to show them.