IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\229536\Webster.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\ProgramData\GDHDAEBGCAAF\AAFIDG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GDHDAEBGCAAF\AEGHJK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GDHDAEBGCAAF\DAAAFB
ASCII text, with very long lines (1717), with CRLF line terminators
modified
C:\ProgramData\GDHDAEBGCAAF\DBFIEH
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GDHDAEBGCAAF\ECBAEB
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\GDHDAEBGCAAF\ECGDHD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\GDHDAEBGCAAF\FHCGHJ
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\GDHDAEBGCAAF\GDHDAE
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GDHDAEBGCAAF\HDAFII
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GDHDAEBGCAAF\JJKFBA
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GDHDAEBGCAAF\JJKFBA-shm
data
dropped
C:\ProgramData\GDHDAEBGCAAF\KFIJJE
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GDHDAEBGCAAF\KFIJJE-shm
data
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\76561199747278259[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\229536\U
data
dropped
C:\Users\user\AppData\Local\Temp\Agriculture
data
dropped
C:\Users\user\AppData\Local\Temp\Argued
data
dropped
C:\Users\user\AppData\Local\Temp\Being
data
dropped
C:\Users\user\AppData\Local\Temp\Below
data
dropped
C:\Users\user\AppData\Local\Temp\Black
data
dropped
C:\Users\user\AppData\Local\Temp\Cu
data
dropped
C:\Users\user\AppData\Local\Temp\Dealt
data
dropped
C:\Users\user\AppData\Local\Temp\Desktops
data
dropped
C:\Users\user\AppData\Local\Temp\Directors
data
dropped
C:\Users\user\AppData\Local\Temp\Diy
data
dropped
C:\Users\user\AppData\Local\Temp\Elliott
data
dropped
C:\Users\user\AppData\Local\Temp\Exclusively
data
dropped
C:\Users\user\AppData\Local\Temp\Exhibit
data
dropped
C:\Users\user\AppData\Local\Temp\Fail
ASCII text, with very long lines (1538), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Fail.cmd
ASCII text, with very long lines (1538), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Further
data
dropped
C:\Users\user\AppData\Local\Temp\Hours
data
dropped
C:\Users\user\AppData\Local\Temp\Katrina
data
dropped
C:\Users\user\AppData\Local\Temp\Late
data
dropped
C:\Users\user\AppData\Local\Temp\Practitioner
data
dropped
C:\Users\user\AppData\Local\Temp\Pregnant
data
dropped
C:\Users\user\AppData\Local\Temp\Queries
data
dropped
C:\Users\user\AppData\Local\Temp\Rand
data
dropped
C:\Users\user\AppData\Local\Temp\Rescue
data
dropped
C:\Users\user\AppData\Local\Temp\Ro
data
dropped
C:\Users\user\AppData\Local\Temp\Suit
data
dropped
C:\Users\user\AppData\Local\Temp\Swim
SysEx File - Soundcraft
dropped
There are 40 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k copy Fail Fail.cmd & Fail.cmd & exit
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa.exe opssvc.exe"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 229536
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "ReprintVerificationMercyRepository" Elliott
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b Exhibit + Rand + Hours 229536\U
malicious
C:\Users\user\AppData\Local\Temp\229536\Webster.pif
229536\Webster.pif 229536\U
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\timeout.exe
timeout 5
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://5.75.212.60/sqls.dll
5.75.212.60
malicious
https://5.75.212.60/msvcp140.dllG
unknown
malicious
https://5.75.212.60/er
unknown
malicious
https://steamcommunity.com/profiles/76561199747278259
23.197.127.21
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://www.autoitscript.com/autoit3/
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=B7Vsdo1okyaC&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=Iy1ies1ROjUT&l=english
unknown
https://steamcommunity.com/profiles/76561199747278259/badges
unknown
https://5.75.212.60/-
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=_D2Bg4UEaFxK&l=en
unknown
https://store.steampowered.com/privac
unknown
https://5.75.212.60/)
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=3eYWCMu_
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=54OKIvHlOQzF&l=e
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://mozilla.org0/
unknown
https://t.me/armad2a
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://steamcommunity.com/profiles/76561199747278259gi_z2Mozilla/5.0
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://5.75.212.60/softokn3.dllNm
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://steamcommunity.com/fi
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://5.75.212.60/df
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://5.75.212.60/e
unknown
https://5.75.212.60/b
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://5.75.212.60/Data
unknown
https://t.me/armad2ahellosqls.dllsqlite3.dllIn
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://5.75.212.60/softokn3.dll
5.75.212.60
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://steamcommunity.com/profiles/76561199747278259/inventory/
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://5.75.212.60/mozglue.dll
5.75.212.60
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://5.75.212.60/
5.75.212.60
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://5.75.212.60/msvcp140.dllHA
unknown
https://5.75.212.60/freebl3.dll
5.75.212.60
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://5.75.212.60/nss3.dll
5.75.212.60
https://5.75.212.60/softokn3.dllI
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=eZOyL2UG5OX8&a
unknown
https://steamcommunity.com/workshop/
unknown
https://store.steampowered.com/legal/
unknown
http://64532127VdtSrezylanAPTHSymMatchStringInternetSetOptionAHttpQueryInfoAdbghelp.dllSetThreadCont
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://5.75.212.60/msvcp140.dll
5.75.212.60
http://www.sqlite.org/copyright.html.
unknown
https://5.75.212.60/ts8
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://5.75.212.60/saenh.dllv
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://store.steampowered.com/
unknown
https://5.75.212.60CBAFIJ
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://steamcommunity.com/profiles/76561199747278259:
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.TP5s6TzX6LLh
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
23.197.127.21
malicious
FGQNrbtYCvA.FGQNrbtYCvA
unknown
198.187.3.20.in-addr.arpa
unknown
86.23.85.13.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
23.197.127.21
steamcommunity.com
United States
malicious
5.75.212.60
unknown
Germany

Memdumps

Base Address
Regiontype
Protect
Malicious
47F3000
trusted library allocation
page read and write
malicious
1B1E000
trusted library allocation
page read and write
malicious
1938000
trusted library allocation
page read and write
malicious
18B1000
trusted library allocation
page read and write
malicious
47F1000
direct allocation
page execute and read and write
malicious
1B4B000
trusted library allocation
page read and write
malicious
1795000
heap
page read and write
malicious
1B4C000
trusted library allocation
page read and write
malicious
1854000
heap
page read and write
malicious
26CE000
heap
page read and write
7A7000
heap
page read and write
C73F000
trusted library allocation
page read and write
3CA1000
heap
page read and write
14A0000
heap
page read and write
476F000
stack
page read and write
26C7000
heap
page read and write
7A7000
heap
page read and write
3CA1000
heap
page read and write
9B0000
heap
page read and write
79B000
heap
page read and write
400000
unkown
page readonly
3CA1000
heap
page read and write
3CA1000
heap
page read and write
2FF7000
heap
page read and write
3CA1000
heap
page read and write
7A7000
heap
page read and write
26C0000
heap
page read and write
327E000
stack
page read and write
2E97000
heap
page read and write
7AC000
heap
page read and write
26BE000
stack
page read and write
26CA000
heap
page read and write
6CACF000
unkown
page write copy
FAF000
stack
page read and write
1760000
heap
page read and write
4917000
direct allocation
page execute and read and write
4D2E000
stack
page read and write
CC6A000
trusted library allocation
page read and write
7AC000
heap
page read and write
1A64000
trusted library allocation
page read and write
7A7000
heap
page read and write
2D9C000
heap
page read and write
26C5000
heap
page read and write
3CA1000
heap
page read and write
79B000
heap
page read and write
14B0000
heap
page read and write
13F0000
heap
page read and write
1B7F000
trusted library allocation
page read and write
408000
unkown
page readonly
7A7000
heap
page read and write
3CA1000
heap
page read and write
202E000
stack
page read and write
2E8D000
heap
page read and write
18F6000
trusted library allocation
page read and write
4DC0000
heap
page read and write
408000
unkown
page readonly
472E000
stack
page read and write
7B0000
heap
page read and write
2E7D000
heap
page read and write
7B0000
heap
page read and write
1937000
trusted library allocation
page read and write
79B000
heap
page read and write
79B000
heap
page read and write
3CA1000
heap
page read and write
3CA1000
heap
page read and write
7A7000
heap
page read and write
1370000
trusted library allocation
page read and write
1C78000
trusted library allocation
page read and write
41F000
unkown
page read and write
7AC000
heap
page read and write
2D6F000
stack
page read and write
3CA1000
heap
page read and write
3CA5000
heap
page read and write
11D1000
stack
page read and write
7AC000
heap
page read and write
47EC000
stack
page read and write
33BC000
stack
page read and write
C7FD000
trusted library allocation
page read and write
83C000
stack
page read and write
4C2E000
stack
page read and write
26C4000
heap
page read and write
1B7F000
trusted library allocation
page read and write
1220000
heap
page read and write
7AC000
heap
page read and write
17ED000
heap
page read and write
79B000
heap
page read and write
7AC000
heap
page read and write
CA4D000
direct allocation
page execute read
3CA1000
heap
page read and write
2B6B6000
trusted library allocation
page read and write
2F0E000
stack
page read and write
560000
heap
page read and write
13CA000
heap
page read and write
B36000
unkown
page readonly
2D92000
heap
page read and write
89E000
stack
page read and write
3CA1000
heap
page read and write
A80000
unkown
page readonly
2E50000
heap
page read and write
3CA1000
heap
page read and write
337F000
stack
page read and write
3CA1000
heap
page read and write
A4E000
stack
page read and write
495E000
direct allocation
page execute and read and write
2D9D000
heap
page read and write
79B000
heap
page read and write
3CA1000
heap
page read and write
C848000
direct allocation
page execute read
1310000
heap
page read and write
26CD000
heap
page read and write
A0E000
stack
page read and write
BE3F000
stack
page read and write
1E2A000
trusted library allocation
page read and write
49F7000
direct allocation
page execute and read and write
4C6F000
stack
page read and write
7A7000
heap
page read and write
9C6000
heap
page read and write
CA8F000
direct allocation
page readonly
BBA000
stack
page read and write
3CA1000
heap
page read and write
2E58000
heap
page read and write
2E3E000
stack
page read and write
3CA1000
heap
page read and write
C799000
trusted library allocation
page read and write
4828000
direct allocation
page execute and read and write
1CFD000
trusted library allocation
page read and write
11FC000
stack
page read and write
D2C000
stack
page read and write
6C8CD000
unkown
page readonly
3CA1000
heap
page read and write
B4E000
stack
page read and write
B10000
unkown
page readonly
3CA1000
heap
page read and write
1553000
heap
page read and write
1F7DA000
trusted library allocation
page read and write
2DBD000
heap
page read and write
19B1000
trusted library allocation
page read and write
7AC000
heap
page read and write
3CA1000
heap
page read and write
1C8B000
trusted library allocation
page read and write
6C8E2000
unkown
page readonly
7B0000
heap
page read and write
4824000
direct allocation
page execute and read and write
3CA1000
heap
page read and write
7A7000
heap
page read and write
1C8A000
trusted library allocation
page read and write
3CA1000
heap
page read and write
CE95000
trusted library allocation
page read and write
1638000
heap
page read and write
177D000
heap
page read and write
CA58000
direct allocation
page readonly
14D4000
heap
page read and write
2D92000
heap
page read and write
7A7000
heap
page read and write
2E7D000
heap
page read and write
3CA1000
heap
page read and write
7AC000
heap
page read and write
4CEF000
stack
page read and write
7B0000
heap
page read and write
7B0000
heap
page read and write
3CA1000
heap
page read and write
7B0000
heap
page read and write
2DAB000
heap
page read and write
79B000
heap
page read and write
26C0000
heap
page read and write
510000
heap
page read and write
3CA1000
heap
page read and write
7AC000
heap
page read and write
7A7000
heap
page read and write
6C851000
unkown
page execute read
3CA1000
heap
page read and write
134EE000
stack
page read and write
1A4E000
trusted library allocation
page read and write
A81000
unkown
page execute read
173B000
heap
page read and write
3290000
heap
page read and write
3CA1000
heap
page read and write
3CA1000
heap
page read and write
31623000
trusted library allocation
page read and write
3CA1000
heap
page read and write
4A2B000
direct allocation
page execute and read and write
79B000
heap
page read and write
26C9000
heap
page read and write
AA0000
heap
page read and write
7A7000
heap
page read and write
1AD5000
trusted library allocation
page read and write
2FF0000
heap
page read and write
3CA1000
heap
page read and write
26CB000
heap
page read and write
4F4000
unkown
page readonly
4D10000
heap
page read and write
7B0000
heap
page read and write
3CA1000
heap
page read and write
1BB1000
trusted library allocation
page read and write
3CA1000
heap
page read and write
197E000
trusted library allocation
page read and write
17CA000
heap
page read and write
7B0000
heap
page read and write
17E5000
heap
page read and write
26C6000
heap
page read and write
BA3F000
stack
page read and write
3298000
heap
page read and write
AB8000
heap
page read and write
1716000
heap
page read and write
6CAD0000
unkown
page read and write
4D90000
heap
page read and write
2574B000
trusted library allocation
page read and write
2DBD000
heap
page read and write
3CA1000
heap
page read and write
A9E000
stack
page read and write
19B1000
trusted library allocation
page read and write
7AC000
heap
page read and write
3CA1000
heap
page read and write
3CA1000
heap
page read and write
7AC000
heap
page read and write
87C000
stack
page read and write
7AC000
heap
page read and write
AD6000
heap
page read and write
4820000
direct allocation
page execute and read and write
19B1000
trusted library allocation
page read and write
7AC000
heap
page read and write
7AC000
heap
page read and write
13F4000
heap
page read and write
7B0000
heap
page read and write
CC89000
trusted library allocation
page read and write
79B000
heap
page read and write
7AC000
heap
page read and write
13C0000
heap
page read and write
7B0000
heap
page read and write
1ABC000
trusted library allocation
page read and write
7B0000
heap
page read and write
186E000
heap
page read and write
7B0000
heap
page read and write
C72F000
trusted library allocation
page read and write
2DAB000
heap
page read and write
3CA1000
heap
page read and write
3DA09000
trusted library allocation
page read and write
7B0000
heap
page read and write
7A7000
heap
page read and write
3CA1000
heap
page read and write
6C8DE000
unkown
page read and write
17EC000
heap
page read and write
3CA1000
heap
page read and write
3CA1000
heap
page read and write
11CD000
stack
page read and write
BCE000
stack
page read and write
1AB3000
trusted library allocation
page read and write
11BE000
stack
page read and write
3CA1000
heap
page read and write
1300000
heap
page read and write
1534000
heap
page read and write
12E8F000
trusted library allocation
page read and write
C790000
trusted library allocation
page read and write
17DA000
heap
page read and write
1314000
heap
page read and write
7B0000
heap
page read and write
26CA000
heap
page read and write
1BD0000
trusted library allocation
page read and write
47F0000
direct allocation
page read and write
26C6000
heap
page read and write
7B0000
heap
page read and write
26CB000
heap
page read and write
7AC000
heap
page read and write
2D8F000
heap
page read and write
A80000
unkown
page readonly
CAA5000
trusted library allocation
page read and write
26CE000
heap
page read and write
7B0000
heap
page read and write
1BB1000
trusted library allocation
page read and write
9AC000
stack
page read and write
3CA1000
heap
page read and write
4A1A000
direct allocation
page execute and read and write
17AE000
heap
page read and write
7AC000
heap
page read and write
19B0000
trusted library allocation
page read and write
523E000
stack
page read and write
3CA1000
heap
page read and write
1BB1000
trusted library allocation
page read and write
6CACE000
unkown
page read and write
3CA1000
heap
page read and write
6CA8F000
unkown
page readonly
79B000
heap
page read and write
C725000
trusted library allocation
page read and write
3CA1000
heap
page read and write
186E000
heap
page read and write
6C8F1000
unkown
page execute read
2EEF000
stack
page read and write
2E72000
heap
page read and write
73F000
stack
page read and write
55E000
stack
page read and write
26C4000
heap
page read and write
3CA1000
heap
page read and write
26C3000
heap
page read and write
1314000
heap
page read and write
3CA1000
heap
page read and write
7AC000
heap
page read and write
79B000
heap
page read and write
CDEE000
trusted library allocation
page read and write
C9A6000
direct allocation
page execute read
3CA1000
heap
page read and write
1848000
heap
page read and write
3FAE000
stack
page read and write
3CA1000
heap
page read and write
9B000
stack
page read and write
159A000
heap
page read and write
12E9C000
trusted library allocation
page read and write
1B1F000
trusted library allocation
page read and write
15B5000
heap
page read and write
7A7000
heap
page read and write
7A7000
heap
page read and write
9C0000
heap
page read and write
2270000
heap
page read and write
1BB1000
trusted library allocation
page read and write
3CA1000
heap
page read and write
7CB000
heap
page read and write
2250000
heap
page read and write
2E8D000
heap
page read and write
CEC000
stack
page read and write
CA8D000
direct allocation
page readonly
CA82000
direct allocation
page read and write
BE7E000
stack
page read and write
3F50000
trusted library allocation
page read and write
3CA1000
heap
page read and write
CC60000
trusted library allocation
page read and write
7A7000
heap
page read and write
1AD9000
trusted library allocation
page read and write
493F000
direct allocation
page execute and read and write
3CA1000
heap
page read and write
C720000
trusted library allocation
page read and write
3CA1000
heap
page read and write
7AC000
heap
page read and write
18B0000
trusted library allocation
page read and write
79B000
heap
page read and write
182D000
heap
page read and write
401000
unkown
page execute read
7B0000
heap
page read and write
3CA1000
heap
page read and write
B44000
unkown
page write copy
500000
heap
page read and write
6C850000
unkown
page readonly
17E6000
heap
page read and write
3CA1000
heap
page read and write
2D70000
heap
page read and write
34BC000
stack
page read and write
CC90000
trusted library allocation
page read and write
7A7000
heap
page read and write
CBF0000
trusted library allocation
page read and write
79B000
heap
page read and write
3CA1000
heap
page read and write
79B000
heap
page read and write
7AC000
heap
page read and write
2E9F000
heap
page read and write
76E000
heap
page read and write
3CA1000
heap
page read and write
6C8F0000
unkown
page readonly
7C6000
heap
page read and write
A50000
heap
page read and write
CE97000
trusted library allocation
page read and write
7B0000
heap
page read and write
182C000
heap
page read and write
7A7000
heap
page read and write
7B0000
heap
page read and write
F6E000
stack
page read and write
3CA1000
heap
page read and write
3CA1000
heap
page read and write
1866000
heap
page read and write
2DAE000
heap
page read and write
DDE000
stack
page read and write
3CA1000
heap
page read and write
7A7000
heap
page read and write
3CA1000
heap
page read and write
3CA1000
heap
page read and write
18B1000
trusted library allocation
page read and write
B49000
unkown
page readonly
26CB000
heap
page read and write
19F0000
trusted library allocation
page read and write
3CA1000
heap
page read and write
1FF0000
trusted library allocation
page read and write
99F000
stack
page read and write
79B000
heap
page read and write
3CA1000
heap
page read and write
2E6F000
heap
page read and write
E1F000
stack
page read and write
26C1000
heap
page read and write
3853000
heap
page read and write
2F20000
heap
page read and write
2EAE000
stack
page read and write
7AC000
heap
page read and write
2DAF000
heap
page read and write
3CA1000
heap
page read and write
B8F000
stack
page read and write
19A000
stack
page read and write
3CA1000
heap
page read and write
182E000
heap
page read and write
3CA1000
heap
page read and write
AD0000
heap
page read and write
8D0000
heap
page read and write
760000
heap
page read and write
26C9000
heap
page read and write
4D6F000
stack
page read and write
7B0000
heap
page read and write
D90000
heap
page read and write
1D48000
trusted library allocation
page read and write
26CD000
heap
page read and write
2D90000
heap
page read and write
186E000
heap
page read and write
12E8E000
trusted library allocation
page read and write
3CA1000
heap
page read and write
79B000
heap
page read and write
ACF000
stack
page read and write
461000
unkown
page read and write
2E8D000
heap
page read and write
3CA1000
heap
page read and write
7A7000
heap
page read and write
1C1F000
trusted library allocation
page read and write
400000
unkown
page readonly
79B000
heap
page read and write
19B1000
trusted library allocation
page read and write
4F4000
unkown
page readonly
7B0000
heap
page read and write
3CA1000
heap
page read and write
13C5000
heap
page read and write
4CAE000
stack
page read and write
186E000
heap
page read and write
19B1000
trusted library allocation
page read and write
C2D0000
remote allocation
page read and write
17E9000
heap
page read and write
3CC1000
heap
page read and write
14B8000
heap
page read and write
7B0000
heap
page read and write
1320000
direct allocation
page execute and read and write
3CA1000
heap
page read and write
3CA1000
heap
page read and write
79B000
heap
page read and write
3CA1000
heap
page read and write
C30E000
stack
page read and write
2DAB000
heap
page read and write
4A2D000
direct allocation
page execute and read and write
C27E000
stack
page read and write
AB0000
heap
page read and write
CA8A000
direct allocation
page readonly
565000
heap
page read and write
3CA1000
heap
page read and write
B40000
unkown
page read and write
1986D000
trusted library allocation
page read and write
43EC000
stack
page read and write
C840000
trusted library allocation
page read and write
138F2000
trusted library allocation
page read and write
3F50000
heap
page read and write
3CA1000
heap
page read and write
2DAB000
heap
page read and write
17CA000
heap
page read and write
14E5000
heap
page read and write
43AC000
stack
page read and write
798000
heap
page read and write
19B1000
trusted library allocation
page read and write
1A73000
trusted library allocation
page read and write
3CA1000
heap
page read and write
3CA1000
heap
page read and write
11DD000
stack
page read and write
1FEE000
stack
page read and write
7A7000
heap
page read and write
2F50000
heap
page read and write
3CA1000
heap
page read and write
136E000
stack
page read and write
A8E000
stack
page read and write
26CA000
heap
page read and write
3CA1000
heap
page read and write
79B000
heap
page read and write
3CA1000
heap
page read and write
197E000
trusted library allocation
page read and write
17AE000
heap
page read and write
3CA1000
heap
page read and write
19B1000
trusted library allocation
page read and write
3CA1000
heap
page read and write
3CA1000
heap
page read and write
12E96000
trusted library allocation
page read and write
40B000
unkown
page write copy
79B000
heap
page read and write
7A7000
heap
page read and write
3CA1000
heap
page read and write
7A7000
heap
page read and write
7AC000
heap
page read and write
C2D0000
remote allocation
page read and write
C800000
trusted library allocation
page read and write
11DF000
stack
page read and write
3CA1000
heap
page read and write
3CA1000
heap
page read and write
3CA1000
heap
page read and write
1AFC000
trusted library allocation
page read and write
3CA1000
heap
page read and write
6CAD5000
unkown
page readonly
7AC000
heap
page read and write
C841000
direct allocation
page execute read
3CA1000
heap
page read and write
1A10000
trusted library allocation
page read and write
79B000
heap
page read and write
3CA1000
heap
page read and write
157E000
heap
page read and write
26C1000
heap
page read and write
16C7000
heap
page read and write
1BB0000
trusted library allocation
page read and write
79B000
heap
page read and write
2EA1000
heap
page read and write
2DBA000
heap
page read and write
5240000
unclassified section
page read and write
9EC000
stack
page read and write
4E3E000
stack
page read and write
40B000
unkown
page read and write
3CA1000
heap
page read and write
B49000
unkown
page readonly
26C2000
heap
page read and write
B40000
unkown
page write copy
4920000
direct allocation
page execute and read and write
7B0000
heap
page read and write
7AC000
heap
page read and write
C2D0000
remote allocation
page read and write
C750000
trusted library allocation
page read and write
2DBD000
heap
page read and write
19B1000
trusted library allocation
page read and write
B10000
unkown
page readonly
3CA1000
heap
page read and write
183D000
heap
page read and write
79B000
heap
page read and write
3CA1000
heap
page read and write
1BF0000
trusted library allocation
page read and write
79B000
heap
page read and write
2E95000
heap
page read and write
401000
unkown
page execute read
3CA0000
heap
page read and write
209E000
stack
page read and write
1A74000
trusted library allocation
page read and write
3CA1000
heap
page read and write
3CA1000
heap
page read and write
3CA1000
heap
page read and write
7B0000
heap
page read and write
3CA1000
heap
page read and write
7A7000
heap
page read and write
301F000
heap
page read and write
2E9F000
heap
page read and write
3CB0000
heap
page read and write
3CA1000
heap
page read and write
21E0000
heap
page read and write
19D0000
trusted library allocation
page read and write
C80F000
trusted library allocation
page read and write
1C9A000
trusted library allocation
page read and write
26C1000
heap
page read and write
3CA1000
heap
page read and write
3CA1000
heap
page read and write
76A000
heap
page read and write
2D8F000
heap
page read and write
7A7000
heap
page read and write
7B0000
heap
page read and write
3CA1000
heap
page read and write
E20000
heap
page read and write
491A000
direct allocation
page execute and read and write
3CA1000
heap
page read and write
B36000
unkown
page readonly
CBDE000
stack
page read and write
1A5F000
trusted library allocation
page read and write
1938000
trusted library allocation
page read and write
CDD0000
trusted library allocation
page read and write
219E000
stack
page read and write
18F6000
trusted library allocation
page read and write
E50000
heap
page read and write
3F50000
trusted library allocation
page read and write
3CA1000
heap
page read and write
C840000
direct allocation
page execute and read and write
3CA1000
heap
page read and write
18B1000
trusted library allocation
page read and write
7AC000
heap
page read and write
26C2000
heap
page read and write
1A52000
trusted library allocation
page read and write
C70F000
stack
page read and write
CA4F000
direct allocation
page readonly
12E97000
trusted library allocation
page read and write
3DA0000
trusted library allocation
page read and write
1A41000
trusted library allocation
page read and write
3CA1000
heap
page read and write
17E6000
heap
page read and write
1B79000
trusted library allocation
page read and write
3CA1000
heap
page read and write
2140000
heap
page read and write
A81000
unkown
page execute read
300F000
stack
page read and write
7A7000
heap
page read and write
3CA1000
heap
page read and write
26CE000
heap
page read and write
2DAB000
heap
page read and write
There are 579 hidden memdumps, click here to show them.