IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\BKECFIIEHCFH\AAAAAA
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BKECFIIEHCFH\AAAAAA-shm
data
dropped
C:\ProgramData\BKECFIIEHCFH\AAFBAK
ASCII text, with very long lines (1809), with CRLF line terminators
modified
C:\ProgramData\BKECFIIEHCFH\CBGCAF
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\BKECFIIEHCFH\CBGCAF-shm
data
dropped
C:\ProgramData\BKECFIIEHCFH\CBKJJE
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\BKECFIIEHCFH\DAECFI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BKECFIIEHCFH\EHDGCG
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\BKECFIIEHCFH\GCAKKE
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BKECFIIEHCFH\HIIIEG
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\BKECFIIEHCFH\KEBFHI
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MSBuild.exe_b4e850e31eb658e13b8188b64312891c20d49c48_a8ac0c99_603ae6f3-a36f-40bb-9d2a-359e4df06a57\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2467.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Jul 26 01:18:29 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER261E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER264E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\76561199747278259[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6512 -s 2812

URLs

Name
IP
Malicious
http://arpdabl.zapto.org/y
unknown
malicious
http://arpdabl.zapto.org/q
unknown
malicious
http://arpdabl.zapto.org/v
unknown
malicious
http://arpdabl.zapto.org/i
unknown
malicious
https://steamcommunity.com/profiles/76561199747278259
23.192.247.89
malicious
http://arpdabl.zapto.org
unknown
malicious
http://arpdabl.zapto.org/
unknown
malicious
https://5.75.212.60/sqls.dll
5.75.212.60
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exe
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=B7Vsdo1okyaC&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=Iy1ies1ROjUT&l=english
unknown
https://steamcommunity.com/profiles/76561199747278259/badges
unknown
https://5.75.212.60/-
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=_D2Bg4UEaFxK&l=en
unknown
https://store.steampowered.com/privac
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=3eYWCMu_
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=54OKIvHlOQzF&l=e
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://5.75.212.60/A
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://mozilla.org0/
unknown
https://t.me/armad2a
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://steamcommunity.com/profiles/76561199747278259gi_z2Mozilla/5.0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://steamcommunity.com/?/
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://5.75.212.60/softokn3.dllq
unknown
https://www.ecosia.org/newtab/
unknown
https://5.75.212.60/B
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
http://arpdabl.HJECAAAEBF
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://5.75.212
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://5.75.212.60/o
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://t.me/armad2ahellosqls.dllsqlite3.dllIn
unknown
https://5.75.212.60/nss3.dllQ
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://5.75.212.60/softokn3.dll
5.75.212.60
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://steamcommunity.com/profiles/76561199747278259/inventory/
unknown
https://5.75.212.60/mozglue.dll
5.75.212.60
https://5.75.212.60/freebl3.dllO
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
http://arpdabl.zapto
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://5.75.212.60/
5.75.212.60
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://5.75.212.60/freebl3.dll
5.75.212.60
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://5.75.212.60/nss3.dll
5.75.212.60
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=eZOyL2UG5OX8&a
unknown
http://arpdabl.zapto.AEBF
unknown
https://steamcommunity.com/workshop/
unknown
https://store.steampowered.com/legal/
unknown
http://64532127VdtSrezylanAPTHSymMatchStringInternetSetOptionAHttpQueryInfoAdbghelp.dllSetThreadCont
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://5.75.212.60/msvcp140.dll
5.75.212.60
http://www.sqlite.org/copyright.html.
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
23.192.247.89
malicious
arpdabl.zapto.org
77.91.101.71
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
23.192.247.89
steamcommunity.com
United States
malicious
5.75.212.60
unknown
Germany

Registry

Path
Value
Malicious
\REGISTRY\A\{94c37f2a-3115-8535-2df3-f06d3ebc6ec7}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProgramId
\REGISTRY\A\{94c37f2a-3115-8535-2df3-f06d3ebc6ec7}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
FileId
\REGISTRY\A\{94c37f2a-3115-8535-2df3-f06d3ebc6ec7}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LowerCaseLongPath
\REGISTRY\A\{94c37f2a-3115-8535-2df3-f06d3ebc6ec7}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LongPathHash
\REGISTRY\A\{94c37f2a-3115-8535-2df3-f06d3ebc6ec7}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Name
\REGISTRY\A\{94c37f2a-3115-8535-2df3-f06d3ebc6ec7}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
OriginalFileName
\REGISTRY\A\{94c37f2a-3115-8535-2df3-f06d3ebc6ec7}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Publisher
\REGISTRY\A\{94c37f2a-3115-8535-2df3-f06d3ebc6ec7}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Version
\REGISTRY\A\{94c37f2a-3115-8535-2df3-f06d3ebc6ec7}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinFileVersion
\REGISTRY\A\{94c37f2a-3115-8535-2df3-f06d3ebc6ec7}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinaryType
\REGISTRY\A\{94c37f2a-3115-8535-2df3-f06d3ebc6ec7}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProductName
\REGISTRY\A\{94c37f2a-3115-8535-2df3-f06d3ebc6ec7}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProductVersion
\REGISTRY\A\{94c37f2a-3115-8535-2df3-f06d3ebc6ec7}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LinkDate
\REGISTRY\A\{94c37f2a-3115-8535-2df3-f06d3ebc6ec7}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinProductVersion
\REGISTRY\A\{94c37f2a-3115-8535-2df3-f06d3ebc6ec7}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
AppxPackageFullName
\REGISTRY\A\{94c37f2a-3115-8535-2df3-f06d3ebc6ec7}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
AppxPackageRelativeId
\REGISTRY\A\{94c37f2a-3115-8535-2df3-f06d3ebc6ec7}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Size
\REGISTRY\A\{94c37f2a-3115-8535-2df3-f06d3ebc6ec7}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Language
\REGISTRY\A\{94c37f2a-3115-8535-2df3-f06d3ebc6ec7}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
IsOsComponent
\REGISTRY\A\{94c37f2a-3115-8535-2df3-f06d3ebc6ec7}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3A10000
trusted library allocation
page read and write
malicious
2AD9000
trusted library allocation
page read and write
malicious
45A6000
trusted library allocation
page read and write
malicious
446A000
trusted library allocation
page read and write
malicious
39E3000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
16F1000
heap
page read and write
malicious
6C5F2000
unkown
page readonly
5460000
trusted library allocation
page execute and read and write
E23000
trusted library allocation
page execute and read and write
6C561000
unkown
page execute read
3A6C000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
18A8000
heap
page read and write
E4A000
trusted library allocation
page execute and read and write
AEE000
heap
page read and write
19EAB000
heap
page read and write
F6B000
trusted library allocation
page execute and read and write
F67000
trusted library allocation
page execute and read and write
1A486000
heap
page read and write
201E0000
direct allocation
page execute and read and write
E37000
trusted library allocation
page read and write
38643000
heap
page read and write
1371000
stack
page read and write
16E5000
heap
page read and write
2A9F000
trusted library allocation
page read and write
2A7B000
trusted library allocation
page read and write
1A281000
heap
page read and write
4E40000
trusted library allocation
page read and write
19E90000
heap
page read and write
FC0000
heap
page read and write
18B5000
heap
page read and write
19F0C000
heap
page read and write
29EF000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
6C79F000
unkown
page readonly
2A48000
trusted library allocation
page read and write
3F1A000
trusted library allocation
page read and write
29AE000
stack
page read and write
267F9000
heap
page read and write
5ABE000
stack
page read and write
2A46000
trusted library allocation
page read and write
14FE000
stack
page read and write
1536D000
stack
page read and write
20000
unkown
page readonly
1518D000
stack
page read and write
29C3000
trusted library allocation
page read and write
578F000
stack
page read and write
1500000
heap
page read and write
1520000
heap
page read and write
BB9000
heap
page read and write
2A3E000
trusted library allocation
page read and write
2ACB000
trusted library allocation
page read and write
9E0E000
stack
page read and write
27C0000
heap
page read and write
B24000
heap
page read and write
1680000
heap
page read and write
2AAB000
trusted library allocation
page read and write
156D000
stack
page read and write
62B6000
heap
page read and write
ACE000
stack
page read and write
2AB2000
trusted library allocation
page read and write
5020000
heap
page read and write
530000
remote allocation
page execute and read and write
2A1E000
trusted library allocation
page read and write
2AF5000
trusted library allocation
page read and write
B16000
heap
page read and write
2AA3000
trusted library allocation
page read and write
2A1C000
trusted library allocation
page read and write
521E000
stack
page read and write
2A4C000
trusted library allocation
page read and write
6C601000
unkown
page execute read
1A240000
trusted library allocation
page read and write
6290000
heap
page read and write
17B8000
heap
page read and write
590E000
stack
page read and write
6FB000
stack
page read and write
1530F000
stack
page read and write
1520E000
stack
page read and write
54D5000
trusted library section
page read and write
5220000
trusted library section
page read and write
5246000
trusted library section
page read and write
F5E000
stack
page read and write
27B0000
trusted library allocation
page read and write
2A8C000
trusted library allocation
page read and write
6C7E0000
unkown
page read and write
12C4D000
stack
page read and write
F90000
heap
page read and write
29C9000
trusted library allocation
page read and write
5400000
trusted library section
page read and write
2A92000
trusted library allocation
page read and write
1A27A000
heap
page read and write
5040000
heap
page read and write
29C1000
trusted library allocation
page read and write
2A79000
trusted library allocation
page read and write
2A29000
trusted library allocation
page read and write
4EB5000
trusted library allocation
page read and write
62B0000
heap
page read and write
E24000
trusted library allocation
page read and write
2A40000
trusted library allocation
page read and write
5790000
heap
page read and write
288C000
trusted library allocation
page read and write
106CD000
stack
page read and write
29CB000
trusted library allocation
page read and write
1369000
stack
page read and write
27AE000
stack
page read and write
430000
remote allocation
page execute and read and write
2A27000
trusted library allocation
page read and write
287A000
trusted library allocation
page read and write
49EE000
stack
page read and write
1870000
heap
page read and write
1A260000
heap
page read and write
607000
remote allocation
page execute and read and write
E2D000
trusted library allocation
page execute and read and write
1A3DF000
heap
page read and write
20422000
direct allocation
page read and write
52A5000
trusted library section
page read and write
2042A000
direct allocation
page readonly
2A77000
trusted library allocation
page read and write
E33000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page execute and read and write
136B000
stack
page read and write
2A2B000
trusted library allocation
page read and write
1A0EC000
stack
page read and write
203ED000
direct allocation
page execute read
137D000
stack
page read and write
13E0000
heap
page read and write
19ECD000
heap
page read and write
6C5DD000
unkown
page readonly
19F81000
heap
page read and write
28A0000
heap
page execute and read and write
434000
remote allocation
page execute and read and write
27B3000
trusted library allocation
page read and write
2A8A000
trusted library allocation
page read and write
2A24000
trusted library allocation
page read and write
58CD000
stack
page read and write
29C5000
trusted library allocation
page read and write
19E7F000
stack
page read and write
2AC2000
trusted library allocation
page read and write
6C7E5000
unkown
page readonly
1688000
heap
page read and write
4E30000
trusted library allocation
page read and write
4EC0000
heap
page execute and read and write
201E1000
direct allocation
page execute read
A80000
heap
page read and write
5BBE000
stack
page read and write
2A20000
trusted library allocation
page read and write
2A6F000
trusted library allocation
page read and write
29C7000
trusted library allocation
page read and write
2A5E000
trusted library allocation
page read and write
2ABE000
trusted library allocation
page read and write
440B000
trusted library allocation
page read and write
2A18000
trusted library allocation
page read and write
19F15000
heap
page read and write
6C560000
unkown
page readonly
1A488000
heap
page read and write
B8F000
heap
page read and write
E3D000
trusted library allocation
page execute and read and write
2A42000
trusted library allocation
page read and write
19F1D000
heap
page read and write
4EE0000
trusted library allocation
page read and write
12C0E000
stack
page read and write
54B0000
trusted library section
page read and write
27D8000
trusted library allocation
page read and write
5CBF000
stack
page read and write
3F76000
trusted library allocation
page read and write
54F000
remote allocation
page execute and read and write
508D000
heap
page read and write
4E50000
trusted library allocation
page read and write
2C765000
heap
page read and write
A85000
heap
page read and write
A70000
heap
page read and write
1590000
heap
page read and write
60FF000
stack
page read and write
E10000
trusted library allocation
page read and write
2A4A000
trusted library allocation
page read and write
29B1000
trusted library allocation
page read and write
29CE000
trusted library allocation
page read and write
2A8E000
trusted library allocation
page read and write
AE8000
heap
page read and write
20346000
direct allocation
page execute read
46A5F000
stack
page read and write
4EE4000
trusted library allocation
page read and write
2042F000
direct allocation
page readonly
2A2F000
trusted library allocation
page read and write
1A3C1000
heap
page read and write
65C000
unkown
page readonly
506B000
heap
page read and write
19FEC000
stack
page read and write
2A62000
trusted library allocation
page read and write
2AAD000
trusted library allocation
page read and write
16C9000
heap
page read and write
1376000
stack
page read and write
1A129000
heap
page read and write
136D000
stack
page read and write
DAE000
stack
page read and write
59B0000
trusted library allocation
page execute and read and write
326D3000
heap
page read and write
5035000
heap
page read and write
52A000
remote allocation
page execute and read and write
2AA5000
trusted library allocation
page read and write
2A94000
trusted library allocation
page read and write
3A3E000
trusted library allocation
page read and write
2A2D000
trusted library allocation
page read and write
2042D000
direct allocation
page readonly
B09000
heap
page read and write
1793E000
stack
page read and write
5420000
trusted library allocation
page read and write
2AC6000
trusted library allocation
page read and write
A60000
heap
page read and write
6C7DE000
unkown
page read and write
2067E000
stack
page read and write
63B000
remote allocation
page execute and read and write
54A0000
trusted library allocation
page execute and read and write
62BE000
heap
page read and write
19EBC000
heap
page read and write
2A96000
trusted library allocation
page read and write
AE0000
heap
page read and write
203EF000
direct allocation
page readonly
2891000
trusted library allocation
page read and write
E46000
trusted library allocation
page execute and read and write
2A75000
trusted library allocation
page read and write
2A64000
trusted library allocation
page read and write
438000
remote allocation
page execute and read and write
9E10000
unclassified section
page read and write
2A82000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
2A1A000
trusted library allocation
page read and write
2895000
trusted library allocation
page read and write
178AC000
stack
page read and write
1058E000
stack
page read and write
2A60000
trusted library allocation
page read and write
2AC8000
trusted library allocation
page read and write
2AAF000
trusted library allocation
page read and write
598E000
stack
page read and write
56E000
remote allocation
page execute and read and write
54D7000
trusted library section
page read and write
3F18000
trusted library allocation
page read and write
19F93000
heap
page read and write
2AA9000
trusted library allocation
page read and write
127C000
stack
page read and write
2088F000
heap
page read and write
29DC000
trusted library allocation
page read and write
22000
unkown
page readonly
F80000
trusted library allocation
page read and write
19EA0000
heap
page read and write
527000
remote allocation
page execute and read and write
2A5B000
trusted library allocation
page read and write
3E5B5000
heap
page read and write
201E8000
direct allocation
page execute read
4AEE000
stack
page read and write
2A73000
trusted library allocation
page read and write
2AC4000
trusted library allocation
page read and write
7F5000
stack
page read and write
5533000
trusted library section
page read and write
5010000
heap
page read and write
203F8000
direct allocation
page readonly
1580000
heap
page read and write
2A71000
trusted library allocation
page read and write
FB0000
trusted library allocation
page execute and read and write
6C5EE000
unkown
page read and write
1068F000
stack
page read and write
B7F000
heap
page read and write
6C600000
unkown
page readonly
594E000
stack
page read and write
2A32000
trusted library allocation
page read and write
568E000
stack
page read and write
6C7DF000
unkown
page write copy
2A44000
trusted library allocation
page read and write
E50000
heap
page read and write
39B1000
trusted library allocation
page read and write
4EAE000
stack
page read and write
2872000
trusted library allocation
page read and write
DEE000
stack
page read and write
5DBE000
stack
page read and write
63D000
remote allocation
page execute and read and write
There are 267 hidden memdumps, click here to show them.