IOC Report
5tqXx7iu9m.exe

loading gif

Files

File Path
Type
Category
Malicious
5tqXx7iu9m.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\sqPKQawpTnLujfRgyPwI.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\sqPKQawpTnLujfRgyPwI.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\sqPKQawpTnLujfRgyPwI.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Windows Defender\sqPKQawpTnLujfRgyPwI.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Adobe\Acrobat DC\Resource\TypeSupport\csrss.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Adobe\Acrobat DC\Resource\TypeSupport\csrss.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Microsoft\RuntimeBroker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Microsoft\RuntimeBroker.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Microsoft\fontdrvhost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Microsoft\fontdrvhost.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Mozilla Firefox\fonts\sqPKQawpTnLujfRgyPwI.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows Photo Viewer\sqPKQawpTnLujfRgyPwI.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\System.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\System.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Recovery\backgroundTaskHost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\backgroundTaskHost.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Recovery\sqPKQawpTnLujfRgyPwI.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\sqPKQawpTnLujfRgyPwI.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Default\AppData\Roaming\Microsoft\dllhost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Default\AppData\Roaming\Microsoft\dllhost.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\5tqXx7iu9m.exe.log
CSV text
dropped
malicious
C:\Users\user\sqPKQawpTnLujfRgyPwI.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Performance\WinSAT\sqPKQawpTnLujfRgyPwI.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\TAPI\sqPKQawpTnLujfRgyPwI.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Tasks\sqPKQawpTnLujfRgyPwI.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\95aaaff3431df3
ASCII text, with very long lines (933), with no line terminators
dropped
C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\95aaaff3431df3
ASCII text, with very long lines (363), with no line terminators
dropped
C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\sqPKQawpTnLujfRgyPwI.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Defender\95aaaff3431df3
ASCII text, with very long lines (501), with no line terminators
dropped
C:\Program Files (x86)\Windows Defender\sqPKQawpTnLujfRgyPwI.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Adobe\Acrobat DC\Resource\TypeSupport\886983d96e3d3e
ASCII text, with very long lines (564), with no line terminators
dropped
C:\Program Files\Microsoft\5b884080fd4f94
ASCII text, with very long lines (790), with no line terminators
dropped
C:\Program Files\Microsoft\9e8d7a4ca61bd9
ASCII text, with very long lines (654), with no line terminators
dropped
C:\Program Files\Mozilla Firefox\fonts\95aaaff3431df3
ASCII text, with no line terminators
dropped
C:\Program Files\Mozilla Firefox\fonts\sqPKQawpTnLujfRgyPwI.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Photo Viewer\95aaaff3431df3
ASCII text, with no line terminators
dropped
C:\Program Files\Windows Photo Viewer\sqPKQawpTnLujfRgyPwI.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Recovery\27d1bcfc3c54e0
ASCII text, with very long lines (617), with no line terminators
dropped
C:\Recovery\95aaaff3431df3
ASCII text, with no line terminators
dropped
C:\Recovery\eddb19405b7ce1
ASCII text, with very long lines (703), with no line terminators
dropped
C:\Recovery\sqPKQawpTnLujfRgyPwI.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\AppData\Roaming\Microsoft\5940a34987c991
ASCII text, with very long lines (344), with no line terminators
dropped
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\95aaaff3431df3
ASCII text, with very long lines (848), with no line terminators
dropped
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\sqPKQawpTnLujfRgyPwI.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\95aaaff3431df3
ASCII text, with very long lines (964), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\backgroundTaskHost.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\dllhost.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\fontdrvhost.exe.log
CSV text
dropped
C:\Users\user\sqPKQawpTnLujfRgyPwI.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Windows\Performance\WinSAT\95aaaff3431df3
ASCII text, with very long lines (910), with no line terminators
dropped
C:\Windows\Performance\WinSAT\sqPKQawpTnLujfRgyPwI.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Windows\TAPI\95aaaff3431df3
ASCII text, with very long lines (921), with no line terminators
dropped
C:\Windows\TAPI\sqPKQawpTnLujfRgyPwI.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Windows\Tasks\95aaaff3431df3
ASCII text, with very long lines (943), with no line terminators
dropped
C:\Windows\Tasks\sqPKQawpTnLujfRgyPwI.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 46 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\5tqXx7iu9m.exe
"C:\Users\user\Desktop\5tqXx7iu9m.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sqPKQawpTnLujfRgyPwIs" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\msbuild\Microsoft\Windows Workflow Foundation\sqPKQawpTnLujfRgyPwI.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sqPKQawpTnLujfRgyPwI" /sc ONLOGON /tr "'C:\Program Files (x86)\msbuild\Microsoft\Windows Workflow Foundation\sqPKQawpTnLujfRgyPwI.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sqPKQawpTnLujfRgyPwIs" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\msbuild\Microsoft\Windows Workflow Foundation\sqPKQawpTnLujfRgyPwI.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Application Data\Microsoft\dllhost.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Default\Application Data\Microsoft\dllhost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Users\Default\Application Data\Microsoft\dllhost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Program Files\Microsoft\fontdrvhost.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\Microsoft\fontdrvhost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Program Files\Microsoft\fontdrvhost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sqPKQawpTnLujfRgyPwIs" /sc MINUTE /mo 5 /tr "'C:\Recovery\sqPKQawpTnLujfRgyPwI.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sqPKQawpTnLujfRgyPwI" /sc ONLOGON /tr "'C:\Recovery\sqPKQawpTnLujfRgyPwI.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sqPKQawpTnLujfRgyPwIs" /sc MINUTE /mo 6 /tr "'C:\Recovery\sqPKQawpTnLujfRgyPwI.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sqPKQawpTnLujfRgyPwIs" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Photo Viewer\sqPKQawpTnLujfRgyPwI.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sqPKQawpTnLujfRgyPwI" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\sqPKQawpTnLujfRgyPwI.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sqPKQawpTnLujfRgyPwIs" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Photo Viewer\sqPKQawpTnLujfRgyPwI.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Recovery\System.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\System.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Recovery\System.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sqPKQawpTnLujfRgyPwIs" /sc MINUTE /mo 13 /tr "'C:\Windows\TAPI\sqPKQawpTnLujfRgyPwI.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sqPKQawpTnLujfRgyPwI" /sc ONLOGON /tr "'C:\Windows\TAPI\sqPKQawpTnLujfRgyPwI.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sqPKQawpTnLujfRgyPwIs" /sc MINUTE /mo 8 /tr "'C:\Windows\TAPI\sqPKQawpTnLujfRgyPwI.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sqPKQawpTnLujfRgyPwIs" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\windows defender\sqPKQawpTnLujfRgyPwI.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sqPKQawpTnLujfRgyPwI" /sc ONLOGON /tr "'C:\Program Files (x86)\windows defender\sqPKQawpTnLujfRgyPwI.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sqPKQawpTnLujfRgyPwIs" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\windows defender\sqPKQawpTnLujfRgyPwI.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 7 /tr "'C:\Recovery\backgroundTaskHost.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Recovery\backgroundTaskHost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 5 /tr "'C:\Recovery\backgroundTaskHost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sqPKQawpTnLujfRgyPwIs" /sc MINUTE /mo 8 /tr "'C:\Windows\Performance\WinSAT\sqPKQawpTnLujfRgyPwI.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sqPKQawpTnLujfRgyPwI" /sc ONLOGON /tr "'C:\Windows\Performance\WinSAT\sqPKQawpTnLujfRgyPwI.exe'" /rl HIGHEST /f
malicious
C:\Recovery\backgroundTaskHost.exe
C:\Recovery\backgroundTaskHost.exe
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sqPKQawpTnLujfRgyPwIs" /sc MINUTE /mo 6 /tr "'C:\Windows\Performance\WinSAT\sqPKQawpTnLujfRgyPwI.exe'" /rl HIGHEST /f
malicious
C:\Recovery\backgroundTaskHost.exe
C:\Recovery\backgroundTaskHost.exe
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sqPKQawpTnLujfRgyPwIs" /sc MINUTE /mo 13 /tr "'C:\Users\user\sqPKQawpTnLujfRgyPwI.exe'" /f
malicious
C:\Users\Default\AppData\Roaming\Microsoft\dllhost.exe
"C:\Users\Default\Application Data\Microsoft\dllhost.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sqPKQawpTnLujfRgyPwI" /sc ONLOGON /tr "'C:\Users\user\sqPKQawpTnLujfRgyPwI.exe'" /rl HIGHEST /f
malicious
C:\Users\Default\AppData\Roaming\Microsoft\dllhost.exe
"C:\Users\Default\Application Data\Microsoft\dllhost.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sqPKQawpTnLujfRgyPwIs" /sc MINUTE /mo 8 /tr "'C:\Users\user\sqPKQawpTnLujfRgyPwI.exe'" /rl HIGHEST /f
malicious
C:\Program Files\Microsoft\fontdrvhost.exe
"C:\Program Files\Microsoft\fontdrvhost.exe"
malicious
C:\Program Files\Microsoft\fontdrvhost.exe
"C:\Program Files\Microsoft\fontdrvhost.exe"
malicious
There are 30 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\c69b63fac4e8a0b12160f0984b8e15328c0f4fff
ffe2312fa0077c9633bb70107b1a4bac63d3d372

Memdumps

Base Address
Regiontype
Protect
Malicious
2BB1000
trusted library allocation
page read and write
malicious
26D1000
trusted library allocation
page read and write
malicious
26F1000
trusted library allocation
page read and write
malicious
31E1000
trusted library allocation
page read and write
malicious
37D8000
trusted library allocation
page read and write
malicious
2719000
trusted library allocation
page read and write
malicious
2541000
trusted library allocation
page read and write
malicious
2737000
trusted library allocation
page read and write
malicious
2B01000
trusted library allocation
page read and write
malicious
2D51000
trusted library allocation
page read and write
malicious
2592000
trusted library allocation
page read and write
malicious
2B48000
trusted library allocation
page read and write
malicious
2BF7000
trusted library allocation
page read and write
malicious
7FFD9B776000
trusted library allocation
page read and write
33CB000
trusted library allocation
page read and write
1B08D000
stack
page read and write
1B13E000
stack
page read and write
7FFD9B8A5000
trusted library allocation
page read and write
7FFD9B876000
trusted library allocation
page read and write
1C4CD000
heap
page read and write
1060000
trusted library allocation
page read and write
550000
heap
page read and write
7FFD9B6D6000
trusted library allocation
page read and write
7FFD9B893000
trusted library allocation
page read and write
7FFD9B86C000
trusted library allocation
page read and write
BF2000
unkown
page readonly
27B7000
trusted library allocation
page read and write
132D000
heap
page read and write
7FFD9B7F1000
trusted library allocation
page execute and read and write
253F000
stack
page read and write
7FFD9B7E8000
trusted library allocation
page execute and read and write
E8D000
heap
page read and write
E60000
heap
page read and write
1200000
trusted library allocation
page read and write
7FFD9B6DB000
trusted library allocation
page execute and read and write
1C092000
heap
page read and write
BB0000
trusted library allocation
page read and write
7FFD9B6B0000
trusted library allocation
page read and write
7FFD9B860000
trusted library allocation
page read and write
128F000
stack
page read and write
7FFD9B860000
trusted library allocation
page read and write
7FFD9B76C000
trusted library allocation
page execute and read and write
5F0000
trusted library allocation
page read and write
E53000
heap
page read and write
120F000
stack
page read and write
1C054000
heap
page read and write
67F000
heap
page read and write
7FFD9B6CD000
trusted library allocation
page execute and read and write
3249000
trusted library allocation
page read and write
132F000
heap
page read and write
12D53000
trusted library allocation
page read and write
1159000
heap
page read and write
1100000
heap
page read and write
E20000
heap
page read and write
7FFD9B873000
trusted library allocation
page read and write
7FFD9B86E000
trusted library allocation
page read and write
2C77000
trusted library allocation
page read and write
1BEE0000
heap
page read and write
3445000
trusted library allocation
page read and write
D50000
heap
page read and write
10AB000
heap
page read and write
7FFD9B6DD000
trusted library allocation
page execute and read and write
1BBB3000
stack
page read and write
3794000
trusted library allocation
page read and write
660000
heap
page read and write
7FFD9B8A2000
trusted library allocation
page read and write
1B090000
heap
page execute and read and write
1C03A000
heap
page read and write
9CB000
heap
page read and write
7FFD9B70C000
trusted library allocation
page execute and read and write
E7C000
heap
page read and write
1B423000
stack
page read and write
1C21F000
heap
page read and write
D60000
trusted library allocation
page read and write
7FFD9B6D7000
trusted library allocation
page read and write
7FFD9B86B000
trusted library allocation
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
12C0000
heap
page read and write
7FFD9B7E0000
trusted library allocation
page execute and read and write
9C0000
heap
page read and write
7FFD9B873000
trusted library allocation
page read and write
3752000
trusted library allocation
page read and write
2A2E000
stack
page read and write
7FFD9B776000
trusted library allocation
page read and write
2C7A000
trusted library allocation
page read and write
6C9000
heap
page read and write
A58000
heap
page read and write
7FFD9B7EA000
trusted library allocation
page execute and read and write
1BFF9000
heap
page read and write
C70000
heap
page read and write
7FFD9B71C000
trusted library allocation
page execute and read and write
D90000
heap
page read and write
A76000
heap
page read and write
7FFD9B6ED000
trusted library allocation
page execute and read and write
9E5000
heap
page read and write
CF6000
stack
page read and write
E4B000
heap
page read and write
99F000
stack
page read and write
7FFD9B87B000
trusted library allocation
page read and write
3538000
trusted library allocation
page read and write
7FFD9B8A5000
trusted library allocation
page read and write
DC0000
heap
page read and write
7FFD9B790000
trusted library allocation
page execute and read and write
1304000
heap
page read and write
12B0D000
trusted library allocation
page read and write
10F8000
heap
page read and write
14B5000
heap
page read and write
7FFD9B7E8000
trusted library allocation
page execute and read and write
1BBAE000
stack
page read and write
A4D000
heap
page read and write
1B120000
heap
page read and write
1B44E000
stack
page read and write
1C5B6000
heap
page read and write
E2C000
heap
page read and write
85C000
heap
page read and write
A0A000
heap
page read and write
3233000
trusted library allocation
page read and write
7FFD9B6C0000
trusted library allocation
page read and write
7FFD9B6B4000
trusted library allocation
page read and write
7FFD9B6CD000
trusted library allocation
page execute and read and write
7FFD9B6C3000
trusted library allocation
page execute and read and write
2C83000
trusted library allocation
page read and write
7FFD9B796000
trusted library allocation
page execute and read and write
7FFD9B6D2000
trusted library allocation
page read and write
1BFDE000
heap
page read and write
1B24E000
stack
page read and write
7FFD9B6D4000
trusted library allocation
page read and write
2D4F000
stack
page read and write
2240000
trusted library allocation
page read and write
8C1000
heap
page read and write
1C029000
heap
page read and write
882000
heap
page read and write
7FFD9B8C0000
trusted library allocation
page execute and read and write
7FFD9B801000
trusted library allocation
page execute and read and write
7FFD9B6CC000
trusted library allocation
page read and write
7FFD9B7F8000
trusted library allocation
page execute and read and write
68C000
heap
page read and write
1BEDE000
stack
page read and write
7FFD9B6EC000
trusted library allocation
page read and write
1C1F3000
heap
page read and write
DEB000
heap
page read and write
B4F000
stack
page read and write
7FFD9B883000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page read and write
1C3DB000
heap
page read and write
126D3000
trusted library allocation
page read and write
1C5C1000
heap
page read and write
1BEA4000
stack
page read and write
1C281000
heap
page read and write
1B2ED000
stack
page read and write
1C48C000
heap
page read and write
7FFD9B883000
trusted library allocation
page read and write
2C7D000
trusted library allocation
page read and write
1301000
heap
page read and write
7FFD9B87C000
trusted library allocation
page read and write
7FFD9B87E000
trusted library allocation
page read and write
C6F000
stack
page read and write
12541000
trusted library allocation
page read and write
12D58000
trusted library allocation
page read and write
1BFB0000
heap
page read and write
1B76D000
stack
page read and write
27B4000
trusted library allocation
page read and write
3344000
trusted library allocation
page read and write
7FFD9B6E4000
trusted library allocation
page read and write
7FFD9B6C2000
trusted library allocation
page read and write
126FD000
trusted library allocation
page read and write
7FFD9B776000
trusted library allocation
page read and write
7FFD9B7F1000
trusted library allocation
page execute and read and write
2BC3000
trusted library allocation
page read and write
7FFD9B7EF000
trusted library allocation
page execute and read and write
7FFD9B870000
trusted library allocation
page read and write
DE8000
heap
page read and write
7FFD9B6F4000
trusted library allocation
page read and write
FF0000
heap
page read and write
1C51F000
heap
page read and write
10CD000
heap
page read and write
1B210000
trusted library allocation
page read and write
D30000
trusted library allocation
page read and write
7FFD9B6E4000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page read and write
274A000
trusted library allocation
page read and write
2270000
trusted library allocation
page read and write
FD0000
heap
page read and write
1BABB000
stack
page read and write
980000
heap
page read and write
272C000
trusted library allocation
page read and write
1B64E000
stack
page read and write
2330000
heap
page execute and read and write
1C3E6000
heap
page read and write
7FFD9B776000
trusted library allocation
page read and write
1A570000
trusted library allocation
page read and write
131E1000
trusted library allocation
page read and write
1C5D0000
heap
page read and write
33FC000
trusted library allocation
page read and write
18B0000
heap
page read and write
1C273000
heap
page read and write
2606000
trusted library allocation
page read and write
7FFD9B6C3000
trusted library allocation
page execute and read and write
1C8EE000
stack
page read and write
1B204000
stack
page read and write
7FFD9B8A2000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page execute and read and write
7FFD9B871000
trusted library allocation
page read and write
890000
heap
page read and write
7FFD9B780000
trusted library allocation
page execute and read and write
1B84E000
stack
page read and write
D40000
heap
page read and write
1B9DF000
stack
page read and write
1C537000
heap
page read and write
1B32E000
stack
page read and write
1C32D000
heap
page read and write
12E0000
heap
page read and write
940000
trusted library allocation
page read and write
7FFD9B8A5000
trusted library allocation
page read and write
27AE000
trusted library allocation
page read and write
1C486000
heap
page read and write
E26000
heap
page read and write
1B8D0000
heap
page execute and read and write
DE0000
trusted library allocation
page read and write
1B8B4000
stack
page read and write
540000
heap
page read and write
DED000
heap
page read and write
2C80000
trusted library allocation
page read and write
1B72E000
stack
page read and write
EC6000
heap
page read and write
7FFD9B6D3000
trusted library allocation
page execute and read and write
22D0000
heap
page execute and read and write
668000
heap
page read and write
69C000
heap
page read and write
15BE000
stack
page read and write
A40000
heap
page read and write
C75000
heap
page read and write
1B57E000
stack
page read and write
14B0000
heap
page read and write
2C14000
trusted library allocation
page read and write
BD0000
heap
page read and write
1C4EB000
heap
page read and write
7FFD9B6ED000
trusted library allocation
page execute and read and write
12548000
trusted library allocation
page read and write
1C286000
heap
page read and write
18B5000
heap
page read and write
1C3BA000
heap
page read and write
12A5000
heap
page read and write
1040000
heap
page read and write
7FFD9B7EA000
trusted library allocation
page execute and read and write
1B22E000
stack
page read and write
31D0000
heap
page execute and read and write
7FFD9B876000
trusted library allocation
page read and write
1BCD3000
stack
page read and write
7FFD9B6FB000
trusted library allocation
page execute and read and write
359A000
trusted library allocation
page read and write
7FFD9B86E000
trusted library allocation
page read and write
1C001000
heap
page read and write
7FFD9B880000
trusted library allocation
page read and write
1105000
heap
page read and write
E7A000
heap
page read and write
1C5D6000
heap
page read and write
1375000
heap
page read and write
8F6000
stack
page read and write
1AD80000
trusted library allocation
page read and write
8BE000
heap
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
7FFD9B850000
trusted library allocation
page read and write
1B8BB000
stack
page read and write
7FFD9B7F0000
trusted library allocation
page execute and read and write
7FFD9B6CD000
trusted library allocation
page execute and read and write
7FFD9B86E000
trusted library allocation
page read and write
975000
heap
page read and write
7FFD9B880000
trusted library allocation
page read and write
7FFD9B6E7000
trusted library allocation
page read and write
1C3F0000
heap
page read and write
1C1F5000
heap
page read and write
B50000
heap
page read and write
1B140000
heap
page read and write
315E000
stack
page read and write
CF6000
stack
page read and write
12EB000
heap
page read and write
1BBBE000
stack
page read and write
890000
heap
page read and write
1BADE000
stack
page read and write
1C5BF000
heap
page read and write
138E000
stack
page read and write
7FFD9B6DC000
trusted library allocation
page read and write
E38000
heap
page read and write
1C54E000
heap
page read and write
1260000
heap
page read and write
223F000
stack
page read and write
1C562000
heap
page read and write
7FFD9B7E0000
trusted library allocation
page execute and read and write
339D000
trusted library allocation
page read and write
12A0000
heap
page read and write
DB0000
heap
page read and write
2797000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page read and write
7FFD9B8B5000
trusted library allocation
page read and write
108F000
stack
page read and write
950000
heap
page read and write
2600000
trusted library allocation
page read and write
1C35B000
heap
page read and write
1C575000
heap
page read and write
892000
heap
page read and write
1AACD000
stack
page read and write
7FFD9B8A0000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page read and write
850000
heap
page read and write
1090000
heap
page read and write
1BDAE000
stack
page read and write
E63000
heap
page read and write
7FFD9B87A000
trusted library allocation
page read and write
1C4C6000
heap
page read and write
7FFD9B6D3000
trusted library allocation
page execute and read and write
1B9BE000
stack
page read and write
7FFD9B7FF000
trusted library allocation
page execute and read and write
BF0000
unkown
page readonly
2B4F000
stack
page read and write
7FFD9B6DD000
trusted library allocation
page execute and read and write
1C07B000
heap
page read and write
7FFD9B6DC000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page read and write
10D0000
trusted library allocation
page read and write
12B03000
trusted library allocation
page read and write
1C386000
heap
page read and write
10CA000
heap
page read and write
24B0000
trusted library allocation
page read and write
7FFD9B8B2000
trusted library allocation
page read and write
7FFD9B897000
trusted library allocation
page read and write
7FFD9B7FA000
trusted library allocation
page execute and read and write
1B74F000
stack
page read and write
1AB30000
trusted library allocation
page read and write
7FFD9B7A6000
trusted library allocation
page execute and read and write
2C86000
trusted library allocation
page read and write
1C294000
heap
page read and write
131F1000
trusted library allocation
page read and write
7FFD9B876000
trusted library allocation
page read and write
1BFD2000
heap
page read and write
2C0B000
trusted library allocation
page read and write
1C259000
heap
page read and write
1B6BE000
stack
page read and write
12D5D000
trusted library allocation
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
5F6000
stack
page read and write
7FFD9B890000
trusted library allocation
page read and write
1C3C7000
heap
page read and write
7FFD9B6C3000
trusted library allocation
page execute and read and write
1AF0E000
stack
page read and write
1CCEB000
stack
page read and write
12CC000
heap
page read and write
875000
heap
page read and write
7FFD9B6E7000
trusted library allocation
page read and write
1A720000
trusted library allocation
page read and write
1B530000
heap
page execute and read and write
1390000
trusted library allocation
page read and write
7FFD9B6EB000
trusted library allocation
page execute and read and write
ED7000
heap
page read and write
118F000
stack
page read and write
1BFA3000
stack
page read and write
7FFD9B6C3000
trusted library allocation
page read and write
970000
heap
page read and write
570000
heap
page read and write
7FFD9B7E0000
trusted library allocation
page execute and read and write
A0F000
heap
page read and write
12BB8000
trusted library allocation
page read and write
1C4EE000
heap
page read and write
D70000
heap
page read and write
1C030000
heap
page read and write
7FFD9B7B6000
trusted library allocation
page execute and read and write
860000
trusted library allocation
page read and write
1C0AA000
heap
page read and write
7FFD9B6DD000
trusted library allocation
page execute and read and write
DDB000
heap
page read and write
BC0000
heap
page read and write
27A6000
trusted library allocation
page read and write
1BCAE000
stack
page read and write
126F8000
trusted library allocation
page read and write
1480000
heap
page read and write
7FFD9B766000
trusted library allocation
page read and write
E28000
heap
page read and write
126F3000
trusted library allocation
page read and write
1C50B000
heap
page read and write
7FFD9B871000
trusted library allocation
page read and write
2BA0000
heap
page execute and read and write
1CAED000
stack
page read and write
7FFD9B7EF000
trusted library allocation
page execute and read and write
7FFD9B6F4000
trusted library allocation
page read and write
6C7000
heap
page read and write
A20000
heap
page read and write
1B52E000
stack
page read and write
7FFD9B883000
trusted library allocation
page read and write
7FFD9B886000
trusted library allocation
page read and write
DC8000
heap
page read and write
2793000
trusted library allocation
page read and write
7FFD9B6C4000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
27BA000
trusted library allocation
page read and write
124E000
stack
page read and write
7FFD9B786000
trusted library allocation
page read and write
7FFD9B6FD000
trusted library allocation
page execute and read and write
7FFD9B770000
trusted library allocation
page execute and read and write
EF6000
stack
page read and write
10B5000
heap
page read and write
2609000
trusted library allocation
page read and write
12C6000
heap
page read and write
7FFD9B893000
trusted library allocation
page read and write
1C545000
heap
page read and write
1C33F000
heap
page read and write
7FFD9B6D3000
trusted library allocation
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
10E0000
heap
page execute and read and write
903000
heap
page read and write
25A0000
heap
page execute and read and write
1C3FB000
heap
page read and write
7FFD9B86C000
trusted library allocation
page read and write
37BF000
trusted library allocation
page read and write
9E2000
heap
page read and write
7FFD9B77C000
trusted library allocation
page execute and read and write
1B6BE000
stack
page read and write
830000
heap
page read and write
D10000
trusted library allocation
page read and write
7FFD9B871000
trusted library allocation
page read and write
9E0000
heap
page read and write
7FFD9B86C000
trusted library allocation
page read and write
2603000
trusted library allocation
page read and write
1045000
heap
page read and write
7FFD9B6FB000
trusted library allocation
page execute and read and write
131E8000
trusted library allocation
page read and write
10D2000
heap
page read and write
7FFD9B6E0000
trusted library allocation
page read and write
7FFD9B7A6000
trusted library allocation
page execute and read and write
7FFD9B6D3000
trusted library allocation
page read and write
7FFD9B85C000
trusted library allocation
page read and write
36A7000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page read and write
7FFD9B7E8000
trusted library allocation
page execute and read and write
68E000
heap
page read and write
7FFD9B7F4000
trusted library allocation
page execute and read and write
37AB000
trusted library allocation
page read and write
1C312000
heap
page read and write
7FFD9B71C000
trusted library allocation
page execute and read and write
D7F000
stack
page read and write
1C394000
heap
page read and write
7FFD9B870000
trusted library allocation
page read and write
35FA000
trusted library allocation
page read and write
1B09E000
stack
page read and write
E90000
heap
page read and write
7FFD9B7D0000
trusted library allocation
page execute and read and write
1C2CC000
heap
page read and write
25C0000
heap
page read and write
EF8000
heap
page read and write
7FFD9B6B3000
trusted library allocation
page execute and read and write
12BB1000
trusted library allocation
page read and write
10CF000
heap
page read and write
E8B000
heap
page read and write
12543000
trusted library allocation
page read and write
7FFD9B85A000
trusted library allocation
page read and write
7FFD9B6B2000
trusted library allocation
page read and write
1C011000
heap
page read and write
7FFD9B870000
trusted library allocation
page read and write
1B7BF000
stack
page read and write
69E000
heap
page read and write
1A700000
trusted library allocation
page read and write
10FC000
heap
page read and write
1C45C000
heap
page read and write
2BC0000
trusted library allocation
page read and write
1C4E4000
heap
page read and write
A45000
heap
page read and write
2430000
heap
page read and write
1250000
heap
page execute and read and write
7FFD9B890000
trusted library allocation
page read and write
2BA0000
heap
page read and write
1B9B4000
stack
page read and write
E2A000
heap
page read and write
7FFD9B6DD000
trusted library allocation
page execute and read and write
7FFD9B7A6000
trusted library allocation
page execute and read and write
1B7BF000
stack
page read and write
7FFD9B6D3000
trusted library allocation
page read and write
7FFD9B6D4000
trusted library allocation
page read and write
7FFD9B6CD000
trusted library allocation
page execute and read and write
DFC000
heap
page read and write
BE5000
heap
page read and write
7FFD9B786000
trusted library allocation
page read and write
126D1000
trusted library allocation
page read and write
3F0000
heap
page read and write
CC2000
unkown
page readonly
7FFD9B87C000
trusted library allocation
page read and write
1B40E000
stack
page read and write
1020000
heap
page read and write
1B50E000
stack
page read and write
22E0000
heap
page read and write
9D3000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9B760000
trusted library allocation
page read and write
1B5B0000
heap
page read and write
BF0000
unkown
page readonly
1B303000
stack
page read and write
DE0000
heap
page read and write
1C005000
heap
page read and write
126DD000
trusted library allocation
page read and write
1C42E000
heap
page read and write
A0C000
heap
page read and write
1B6D0000
heap
page read and write
7FFD9B8D0000
trusted library allocation
page read and write
9A6000
heap
page read and write
12D51000
trusted library allocation
page read and write
1AC7C000
stack
page read and write
DF0000
heap
page read and write
7FFD9B6D7000
trusted library allocation
page read and write
16BE000
stack
page read and write
259C000
trusted library allocation
page read and write
1C047000
heap
page read and write
7FFD9B6D7000
trusted library allocation
page read and write
1AC5D000
stack
page read and write
126F1000
trusted library allocation
page read and write
7FFD9B7E0000
trusted library allocation
page execute and read and write
7FFD9B6DC000
trusted library allocation
page read and write
DFE000
heap
page read and write
BE0000
heap
page read and write
12BBD000
trusted library allocation
page read and write
2B5C000
trusted library allocation
page read and write
27B1000
trusted library allocation
page read and write
590000
heap
page read and write
1BAB3000
stack
page read and write
7FFD9B6D3000
trusted library allocation
page read and write
7FFD9B8B8000
trusted library allocation
page read and write
2615000
trusted library allocation
page read and write
1C050000
heap
page read and write
7FFD9B86C000
trusted library allocation
page read and write
10A0000
trusted library allocation
page read and write
1C2B7000
heap
page read and write
E9E000
heap
page read and write
12BB3000
trusted library allocation
page read and write
1C096000
heap
page read and write
8BC000
heap
page read and write
1254D000
trusted library allocation
page read and write
1B7DE000
stack
page read and write
970000
heap
page execute and read and write
1CBEE000
stack
page read and write
7FFD9B6E3000
trusted library allocation
page read and write
E34000
heap
page read and write
1BDDE000
stack
page read and write
13C0000
heap
page read and write
7FFD9B6DD000
trusted library allocation
page execute and read and write
1142000
heap
page read and write
87A000
heap
page read and write
2E1E000
trusted library allocation
page read and write
7FFD9B89B000
trusted library allocation
page read and write
101F000
stack
page read and write
26EE000
stack
page read and write
7FFD9B7A6000
trusted library allocation
page execute and read and write
1BBD4000
stack
page read and write
5D0000
heap
page read and write
12B08000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
1B543000
stack
page read and write
7FFD9B8B0000
trusted library allocation
page read and write
27C0000
trusted library allocation
page read and write
7FFD9B78C000
trusted library allocation
page execute and read and write
895000
heap
page read and write
370D000
trusted library allocation
page read and write
1C37B000
heap
page read and write
11D0000
trusted library allocation
page read and write
7FFD9B6ED000
trusted library allocation
page execute and read and write
9DF000
heap
page read and write
126D8000
trusted library allocation
page read and write
3659000
trusted library allocation
page read and write
34EB000
trusted library allocation
page read and write
7FFD9B6C3000
trusted library allocation
page execute and read and write
7FFD9B72C000
trusted library allocation
page execute and read and write
600000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page read and write
2510000
heap
page execute and read and write
2AF0000
heap
page execute and read and write
7FFD9B883000
trusted library allocation
page read and write
330B000
trusted library allocation
page read and write
7FFD9B7F4000
trusted library allocation
page execute and read and write
2DA6000
trusted library allocation
page read and write
1ABE0000
trusted library allocation
page read and write
1C237000
heap
page read and write
7FFD9B6DD000
trusted library allocation
page execute and read and write
7FFD9B6E4000
trusted library allocation
page read and write
7FFD9B7EA000
trusted library allocation
page execute and read and write
279A000
trusted library allocation
page read and write
2DAC000
trusted library allocation
page read and write
7FFD9B6EC000
trusted library allocation
page read and write
7FFD9B8A2000
trusted library allocation
page read and write
1C266000
heap
page read and write
7FFD9B6C4000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
7FFD9B6DC000
trusted library allocation
page read and write
1C4F6000
heap
page read and write
1C00C000
heap
page read and write
37BD000
trusted library allocation
page read and write
27BD000
trusted library allocation
page read and write
1C429000
heap
page read and write
1B34E000
stack
page read and write
27C3000
trusted library allocation
page read and write
7FFD9B7F1000
trusted library allocation
page execute and read and write
8FA000
heap
page read and write
7FFD9B6DD000
trusted library allocation
page execute and read and write
1C498000
heap
page read and write
7FFD9B71C000
trusted library allocation
page execute and read and write
17BE000
stack
page read and write
640000
heap
page read and write
10F6000
stack
page read and write
2790000
trusted library allocation
page read and write
7FFD9B72C000
trusted library allocation
page execute and read and write
7FFD9B6D4000
trusted library allocation
page read and write
7FFD9B6D7000
trusted library allocation
page read and write
2C71000
trusted library allocation
page read and write
7FFD9B78C000
trusted library allocation
page execute and read and write
7FFD9B853000
trusted library allocation
page read and write
1C2A7000
heap
page read and write
DE5000
heap
page read and write
25E0000
heap
page read and write
1250000
heap
page execute and read and write
1B4CE000
stack
page read and write
9AC000
heap
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
1040000
heap
page read and write
620000
heap
page read and write
D10000
heap
page read and write
9A0000
heap
page read and write
7FFD9B7F0000
trusted library allocation
page execute and read and write
1C46D000
heap
page read and write
1080000
trusted library allocation
page read and write
7FFD9B6FD000
trusted library allocation
page execute and read and write
34AC000
trusted library allocation
page read and write
1099000
heap
page read and write
7FFD9B6BD000
trusted library allocation
page execute and read and write
7FFD9B71C000
trusted library allocation
page execute and read and write
1337000
heap
page read and write
7FFD9B7EF000
trusted library allocation
page execute and read and write
26CE000
stack
page read and write
1B62E000
stack
page read and write
BD0000
trusted library allocation
page read and write
131ED000
trusted library allocation
page read and write
5D5000
heap
page read and write
EC9000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B6CD000
trusted library allocation
page execute and read and write
9A0000
heap
page read and write
7FFD9B6E3000
trusted library allocation
page read and write
1C5BA000
heap
page read and write
B70000
heap
page read and write
1B00F000
stack
page read and write
1B5B0000
heap
page read and write
7FFD9B890000
trusted library allocation
page read and write
1B10E000
stack
page read and write
1C57C000
heap
page read and write
248F000
stack
page read and write
7FFD9B7B6000
trusted library allocation
page execute and read and write
3B6000
stack
page read and write
7FFD9B6C7000
trusted library allocation
page read and write
7FF4B8AD0000
trusted library allocation
page execute and read and write
1C1F0000
heap
page read and write
910000
trusted library allocation
page read and write
13C5000
heap
page read and write
12B01000
trusted library allocation
page read and write
856000
heap
page read and write
2C40000
heap
page read and write
7FFD9B6E4000
trusted library allocation
page read and write
870000
heap
page read and write
7FFD9B7F4000
trusted library allocation
page execute and read and write
There are 652 hidden memdumps, click here to show them.