IOC Report
1lKbb2hF7fYToopfpmEvlyRN.exe

loading gif

Files

File Path
Type
Category
Malicious
1lKbb2hF7fYToopfpmEvlyRN.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\DBAAFIDGDA.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\DGDBKFBAKF.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MSBuild.exe_85f5fef5b322d3e0e9fdef94d1761a36736fc146_01a8d73d_6eb29486-85a4-4d90-a655-4b6584a88ff2\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\1lKbb2hF7fYToopfpmEvlyRN.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\jen1hg[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\gfn1go[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
modified
malicious
C:\ProgramData\DBAAFIDGDAAA\BFHDAE
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DBAAFIDGDAAA\BFHDAE-shm
data
dropped
C:\ProgramData\DBAAFIDGDAAA\CBAKJK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DBAAFIDGDAAA\CFHCGH
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\DBAAFIDGDAAA\FCAFIJ
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DBAAFIDGDAAA\FHCAEG
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\DBAAFIDGDAAA\GIJJKF
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DBAAFIDGDAAA\HJDBFB
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\DBAAFIDGDAAA\IDGHDG
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DBAAFIDGDAAA\IDGHDG-shm
data
dropped
C:\ProgramData\DBAAFIDGDAAA\KECBGC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DBAAFIDGDAAA\KKFBAA
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HCGCBFHCFCFB\EGIJKE
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\HCGCBFHCFCFB\JJDGCG
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5FAD.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Jul 26 16:56:59 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER61C2.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER61F1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DBAAFIDGDA.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DGDBKFBAKF.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\76561199747278259[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 24 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1lKbb2hF7fYToopfpmEvlyRN.exe
"C:\Users\user\Desktop\1lKbb2hF7fYToopfpmEvlyRN.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\ProgramData\DBAAFIDGDA.exe
"C:\ProgramData\DBAAFIDGDA.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\ProgramData\DGDBKFBAKF.exe
"C:\ProgramData\DGDBKFBAKF.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7280 -s 2980

URLs

Name
IP
Malicious
callosallsaospz.shop
malicious
liernessfornicsa.shop
malicious
shepherdlyopzc.shop
malicious
upknittsoappz.shop
malicious
https://steamcommunity.com/profiles/76561199747278259
23.199.218.33
malicious
unseaffarignsk.shop
malicious
https://t.me/
unknown
malicious
https://5.75.212.60/sqls.dll
5.75.212.60
http://schemas.mic
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
http://arpdabl.zapto.org/r
unknown
http://arpdabl.zapto.org/s
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://65.108.151.1087a81d3649xe
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/stateorprovince
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://arpdabl.zapto.JDBF
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authentication
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
http://arpdabl.zapto.org/Z
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://65.108.151.108Local
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exe
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=B7Vsdo1okyaC&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=Iy1ies1ROjUT&l=english
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysidrhttp://schemas.xmlsoap.org/ws/2005
unknown
https://steamcommunity.com/profiles/76561199747278259/badges
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
http://arpdabl.zapto.org/l
unknown
https://5.75.212.60/1
unknown
https://liernessfornicsa.shop/ff
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/anonymous
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=_D2Bg4UEaFxK&l=en
unknown
https://store.steampowered.com/privac
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddressthttp://schemas.xmlsoap.org/ws/200
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://arpdabl.zapto.org/f
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=3eYWCMu_
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=54OKIvHlOQzF&l=e
unknown
https://t.me/s41l0#69
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://mozilla.org0/
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#STR-Transform
unknown
https://t.me/armad2a
unknown
http://147.45.44.104/steals/gfn1go.exe1
unknown
https://5.75.212.60/5
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdp
unknown
https://steamcommunity.com/profiles/76561199747278259gi_z2Mozilla/5.0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://5.75.212.60/mozglue.dll#
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#STR-Transform:Unsu
unknown
http://arpdabl.zapto.org/kV
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://65.108.151.108/0?Q
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://5.75.212.60/F
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://5.75.212.60/a
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://liernessfornicsa.shop/dp
unknown
https://5.75.212.60/indows.storage.dlll
unknown
http://arpdabl.zapto.org
unknown
https://65.108.151.108/_F
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://5.75.212.60/p
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authorizationdecision~http://schemas.xmlsoap.o
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://arpdabl.JKEBFHJDBF
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://steamcommunity.com//
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
http://schemas.mi
unknown
https://65.108.151.108/&
unknown
https://t.me/s41l06#goMozilla/5.0
unknown
https://web.telegram.org
unknown
https://t.me/armad2ahellosqls.dllsqlite3.dllIn
unknown
https://65.108.151.108/sqls.dll=Sq
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://5.75.212.60/softokn3.dll
5.75.212.60
http://147.45.44.104/steals/gfn1go.exedary=----HIDAKFIJJKJJJKEBKJEHult-release
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
23.199.218.33
malicious
t.me
149.154.167.99
malicious
liernessfornicsa.shop
172.67.213.85
malicious
bg.microsoft.map.fastly.net
199.232.210.172
arpdabl.zapto.org
77.91.101.71
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
23.199.218.33
steamcommunity.com
United States
malicious
172.67.213.85
liernessfornicsa.shop
United States
malicious
149.154.167.99
t.me
United Kingdom
malicious
5.75.212.60
unknown
Germany
147.45.44.104
unknown
Russian Federation
65.108.151.108
unknown
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{316c2c92-83a6-0561-f8a7-7671a9a836ba}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProgramId
\REGISTRY\A\{316c2c92-83a6-0561-f8a7-7671a9a836ba}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
FileId
\REGISTRY\A\{316c2c92-83a6-0561-f8a7-7671a9a836ba}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LowerCaseLongPath
\REGISTRY\A\{316c2c92-83a6-0561-f8a7-7671a9a836ba}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LongPathHash
\REGISTRY\A\{316c2c92-83a6-0561-f8a7-7671a9a836ba}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Name
\REGISTRY\A\{316c2c92-83a6-0561-f8a7-7671a9a836ba}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
OriginalFileName
\REGISTRY\A\{316c2c92-83a6-0561-f8a7-7671a9a836ba}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Publisher
\REGISTRY\A\{316c2c92-83a6-0561-f8a7-7671a9a836ba}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Version
\REGISTRY\A\{316c2c92-83a6-0561-f8a7-7671a9a836ba}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinFileVersion
\REGISTRY\A\{316c2c92-83a6-0561-f8a7-7671a9a836ba}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinaryType
\REGISTRY\A\{316c2c92-83a6-0561-f8a7-7671a9a836ba}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProductName
\REGISTRY\A\{316c2c92-83a6-0561-f8a7-7671a9a836ba}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProductVersion
\REGISTRY\A\{316c2c92-83a6-0561-f8a7-7671a9a836ba}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LinkDate
\REGISTRY\A\{316c2c92-83a6-0561-f8a7-7671a9a836ba}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinProductVersion
\REGISTRY\A\{316c2c92-83a6-0561-f8a7-7671a9a836ba}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
AppxPackageFullName
\REGISTRY\A\{316c2c92-83a6-0561-f8a7-7671a9a836ba}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
AppxPackageRelativeId
\REGISTRY\A\{316c2c92-83a6-0561-f8a7-7671a9a836ba}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Size
\REGISTRY\A\{316c2c92-83a6-0561-f8a7-7671a9a836ba}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Language
\REGISTRY\A\{316c2c92-83a6-0561-f8a7-7671a9a836ba}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
IsOsComponent
\REGISTRY\A\{316c2c92-83a6-0561-f8a7-7671a9a836ba}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
52C1000
trusted library allocation
page read and write
malicious
418F000
trusted library allocation
page read and write
malicious
4161000
trusted library allocation
page read and write
malicious
41B9000
trusted library allocation
page read and write
malicious
34A1000
trusted library allocation
page read and write
malicious
4380000
trusted library allocation
page read and write
malicious
4B1E000
trusted library allocation
page read and write
malicious
EB4000
heap
page read and write
malicious
4353000
trusted library allocation
page read and write
malicious
326D000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
4866000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
49A3000
trusted library allocation
page read and write
malicious
38E6000
trusted library allocation
page read and write
5CF5000
trusted library section
page read and write
450000
remote allocation
page execute and read and write
328A000
trusted library allocation
page read and write
3444000
trusted library allocation
page read and write
1513000
trusted library allocation
page execute and read and write
321D000
trusted library allocation
page read and write
15E0000
heap
page read and write
1816000
trusted library allocation
page execute and read and write
5CD0000
trusted library section
page read and write
6050000
trusted library allocation
page execute and read and write
60FE000
stack
page read and write
1FD8D000
heap
page read and write
66DB000
direct allocation
page readonly
283D000
stack
page read and write
9A0000
unkown
page readonly
3485000
trusted library allocation
page read and write
117E000
heap
page read and write
33D1000
trusted library allocation
page read and write
349B000
trusted library allocation
page read and write
5A7E000
heap
page read and write
FD0000
unkown
page readonly
3493000
trusted library allocation
page read and write
CF3000
stack
page read and write
4AE000
remote allocation
page execute and read and write
1973C000
heap
page read and write
3955000
trusted library allocation
page read and write
1173000
heap
page read and write
1C63000
heap
page read and write
3321000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
4637F000
stack
page read and write
201A9000
heap
page read and write
5F3E000
unkown
page read and write
56D0000
trusted library allocation
page read and write
344C000
trusted library allocation
page read and write
39DD000
trusted library allocation
page read and write
19D1E000
heap
page read and write
5F1F000
stack
page read and write
95B0000
heap
page read and write
666E000
stack
page read and write
DEE000
stack
page read and write
3023000
trusted library allocation
page read and write
1B5CF000
stack
page read and write
567E000
stack
page read and write
5750000
heap
page read and write
3231000
trusted library allocation
page read and write
3495000
trusted library allocation
page read and write
39C8000
trusted library allocation
page read and write
5FBE000
stack
page read and write
6C79F000
unkown
page readonly
C5E000
stack
page read and write
1280000
heap
page read and write
4CFE0000
heap
page read and write
693D000
stack
page read and write
1972B000
heap
page read and write
3461000
trusted library allocation
page read and write
33CB000
trusted library allocation
page read and write
2F85000
trusted library allocation
page read and write
154B000
trusted library allocation
page execute and read and write
1167000
heap
page read and write
324A000
trusted library allocation
page read and write
391E000
trusted library allocation
page read and write
322B000
trusted library allocation
page read and write
D59000
heap
page read and write
6C5F2000
unkown
page readonly
381E000
stack
page read and write
136E000
heap
page read and write
6676000
direct allocation
page execute read
F27000
heap
page read and write
39D7000
trusted library allocation
page read and write
624E000
stack
page read and write
1510000
trusted library allocation
page read and write
118B000
heap
page read and write
3933000
trusted library allocation
page read and write
169F000
stack
page read and write
4321000
trusted library allocation
page read and write
64A8000
direct allocation
page execute read
3968000
trusted library allocation
page read and write
1842000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
3214000
trusted library allocation
page read and write
3996000
trusted library allocation
page read and write
1440000
heap
page read and write
3248000
trusted library allocation
page read and write
1E26000
trusted library allocation
page read and write
D2B000
heap
page read and write
5A30000
heap
page read and write
4C34B000
stack
page read and write
3141000
trusted library allocation
page read and write
322F000
trusted library allocation
page read and write
1BBD000
trusted library allocation
page execute and read and write
38DA000
trusted library allocation
page read and write
38EA000
trusted library allocation
page read and write
1BB3000
trusted library allocation
page read and write
31E4000
trusted library allocation
page read and write
31F9000
trusted library allocation
page read and write
C80000
heap
page read and write
371E000
stack
page read and write
3957000
trusted library allocation
page read and write
361E000
stack
page read and write
625C000
heap
page read and write
5F7E000
stack
page read and write
3261000
trusted library allocation
page read and write
9ED000
stack
page read and write
27E0000
heap
page read and write
19DC5000
heap
page read and write
19BC0000
heap
page read and write
399C000
trusted library allocation
page read and write
1020000
unkown
page readonly
1388000
heap
page read and write
5D4E000
stack
page read and write
6674000
direct allocation
page execute read
1837000
trusted library allocation
page execute and read and write
151D000
trusted library allocation
page execute and read and write
39CA000
trusted library allocation
page read and write
566000
remote allocation
page execute and read and write
C60000
heap
page read and write
EC7000
heap
page read and write
1260000
heap
page read and write
2FCA000
trusted library allocation
page read and write
149E000
stack
page read and write
626E000
stack
page read and write
199EE000
stack
page read and write
3979000
trusted library allocation
page read and write
14CE000
heap
page read and write
ECE000
heap
page read and write
6100000
trusted library section
page read and write
33D7000
trusted library allocation
page read and write
14C0000
heap
page read and write
96B0000
unclassified section
page read and write
3212000
trusted library allocation
page read and write
5680000
trusted library allocation
page execute and read and write
31AE000
trusted library allocation
page read and write
61FB000
heap
page read and write
1B1F000
stack
page read and write
3446000
trusted library allocation
page read and write
14C8000
heap
page read and write
1529000
trusted library allocation
page read and write
57F0000
trusted library allocation
page execute and read and write
37F67000
heap
page read and write
64EA000
direct allocation
page execute read
1846000
trusted library allocation
page read and write
1B8E000
stack
page read and write
38E4000
trusted library allocation
page read and write
1C04000
heap
page read and write
31CB000
trusted library allocation
page read and write
397D000
trusted library allocation
page read and write
59A0000
trusted library section
page read and write
196FF000
stack
page read and write
D10000
heap
page read and write
5B60000
trusted library allocation
page execute and read and write
C70000
heap
page read and write
E00000
heap
page read and write
3130000
trusted library allocation
page execute and read and write
1831000
trusted library allocation
page read and write
31FB000
trusted library allocation
page read and write
44B000
remote allocation
page execute and read and write
144C000
heap
page read and write
319E000
stack
page read and write
3409000
trusted library allocation
page read and write
3263000
trusted library allocation
page read and write
D14000
heap
page read and write
E40000
heap
page read and write
181A000
trusted library allocation
page execute and read and write
CFD000
stack
page read and write
33E4000
trusted library allocation
page read and write
39AF000
trusted library allocation
page read and write
5DB0000
heap
page read and write
1450000
heap
page read and write
394E000
trusted library allocation
page read and write
6C7E5000
unkown
page readonly
3267000
trusted library allocation
page read and write
39AB000
trusted library allocation
page read and write
1FD2D000
direct allocation
page execute read
1BA3000
trusted library allocation
page execute and read and write
1599000
heap
page read and write
1974D000
heap
page read and write
61F0000
heap
page read and write
EE0000
heap
page read and write
391C000
trusted library allocation
page read and write
349F000
trusted library allocation
page read and write
1C80000
heap
page read and write
66D6000
direct allocation
page readonly
D54000
heap
page read and write
31B0000
trusted library allocation
page read and write
616E000
stack
page read and write
3140000
trusted library allocation
page read and write
39C6000
trusted library allocation
page read and write
5168000
trusted library allocation
page read and write
31C7000
trusted library allocation
page read and write
5F6F000
stack
page read and write
3924000
trusted library allocation
page read and write
3977000
trusted library allocation
page read and write
329F000
stack
page read and write
3850000
trusted library allocation
page read and write
19795000
heap
page read and write
101E000
stack
page read and write
1FD62000
direct allocation
page read and write
33FF000
trusted library allocation
page read and write
3748000
trusted library allocation
page read and write
C8B000
heap
page read and write
1FD6A000
direct allocation
page readonly
3161000
trusted library allocation
page read and write
399A000
trusted library allocation
page read and write
1514000
trusted library allocation
page read and write
30BE000
stack
page read and write
31A8000
trusted library allocation
page read and write
3233000
trusted library allocation
page read and write
60EF000
unkown
page read and write
1030000
heap
page read and write
14F6000
heap
page read and write
31A4000
trusted library allocation
page read and write
3938000
trusted library allocation
page read and write
3216000
trusted library allocation
page read and write
1FB21000
direct allocation
page execute read
3246000
trusted library allocation
page read and write
33D5000
trusted library allocation
page read and write
67DF000
stack
page read and write
5CCE000
stack
page read and write
2C086000
heap
page read and write
31BE000
stack
page read and write
10A7000
heap
page read and write
3403000
trusted library allocation
page read and write
3730000
heap
page read and write
31C0000
heap
page read and write
5F5D000
stack
page read and write
31DC000
trusted library allocation
page read and write
394C000
trusted library allocation
page read and write
1860000
trusted library allocation
page read and write
A10000
unkown
page readonly
178E000
stack
page read and write
31CD000
trusted library allocation
page read and write
3880000
trusted library allocation
page read and write
1150000
heap
page read and write
3448000
trusted library allocation
page read and write
349D000
trusted library allocation
page read and write
667A000
direct allocation
page execute read
6490000
heap
page read and write
1E30000
heap
page read and write
5A50000
heap
page read and write
392A000
trusted library allocation
page read and write
2AFD000
stack
page read and write
D20000
heap
page read and write
27DF000
stack
page read and write
19710000
heap
page read and write
1820000
heap
page read and write
EEB000
stack
page read and write
1FD6F000
direct allocation
page readonly
D31000
heap
page read and write
5921000
trusted library allocation
page read and write
486000
remote allocation
page execute and read and write
1B5DA000
heap
page read and write
4C44C000
stack
page read and write
D5C000
heap
page read and write
5A82000
heap
page read and write
1BB9000
trusted library allocation
page read and write
638000
remote allocation
page execute and read and write
14BEC000
stack
page read and write
341E000
trusted library allocation
page read and write
5E50000
trusted library allocation
page execute and read and write
C70000
heap
page read and write
58C5000
trusted library allocation
page read and write
1FD6D000
direct allocation
page readonly
3916000
trusted library allocation
page read and write
1712C000
stack
page read and write
434000
remote allocation
page execute and read and write
32E9000
trusted library allocation
page read and write
38E8000
trusted library allocation
page read and write
D11000
heap
page read and write
17CE000
stack
page read and write
1860000
heap
page read and write
1C4B000
heap
page read and write
66AF000
direct allocation
page readonly
1368000
heap
page read and write
19801000
heap
page read and write
32E2000
trusted library allocation
page read and write
313E000
stack
page read and write
41E3000
trusted library allocation
page read and write
3720000
trusted library allocation
page read and write
EC0000
heap
page read and write
6140000
trusted library allocation
page execute and read and write
62A000
remote allocation
page execute and read and write
3820000
heap
page execute and read and write
31F7000
trusted library allocation
page read and write
1835000
trusted library allocation
page read and write
152D000
trusted library allocation
page execute and read and write
3907000
trusted library allocation
page read and write
33EE000
trusted library allocation
page read and write
697E000
stack
page read and write
1E11000
trusted library allocation
page read and write
CA8000
heap
page read and write
1803000
trusted library allocation
page read and write
33D3000
trusted library allocation
page read and write
17E0000
trusted library allocation
page read and write
3030000
trusted library allocation
page read and write
1BCA000
trusted library allocation
page execute and read and write
FD2000
unkown
page readonly
325F000
trusted library allocation
page read and write
1DD7000
trusted library allocation
page execute and read and write
1BF7000
heap
page read and write
63D000
remote allocation
page execute and read and write
438000
remote allocation
page execute and read and write
66C6000
direct allocation
page readonly
39A7000
trusted library allocation
page read and write
FF6E000
stack
page read and write
56E000
remote allocation
page execute and read and write
1BDE000
heap
page read and write
569A000
trusted library allocation
page read and write
180D000
trusted library allocation
page execute and read and write
342D000
trusted library allocation
page read and write
1CC6000
heap
page read and write
342F000
trusted library allocation
page read and write
3992000
trusted library allocation
page read and write
3405000
trusted library allocation
page read and write
3994000
trusted library allocation
page read and write
397F000
trusted library allocation
page read and write
6C7DE000
unkown
page read and write
66B3000
direct allocation
page readonly
5810000
trusted library allocation
page read and write
31DA000
trusted library allocation
page read and write
3998000
trusted library allocation
page read and write
1BA4000
trusted library allocation
page read and write
6220000
heap
page read and write
5FEE000
stack
page read and write
13A4000
heap
page read and write
1250000
heap
page read and write
43AE000
trusted library allocation
page read and write
ED0000
heap
page read and write
1850000
trusted library allocation
page read and write
33CF000
trusted library allocation
page read and write
3944000
trusted library allocation
page read and write
5BEC000
trusted library section
page read and write
1850000
heap
page read and write
1573000
heap
page read and write
1E1F000
trusted library allocation
page read and write
8FC000
stack
page read and write
1FD38000
direct allocation
page readonly
3990000
trusted library allocation
page read and write
6A7E000
stack
page read and write
1DDB000
trusted library allocation
page execute and read and write
1FB28000
direct allocation
page execute read
396A000
trusted library allocation
page read and write
13C3000
heap
page read and write
33FB000
trusted library allocation
page read and write
9A2000
unkown
page readonly
183F000
trusted library allocation
page read and write
58BE000
stack
page read and write
39CE000
trusted library allocation
page read and write
38FD000
trusted library allocation
page read and write
1563000
heap
page read and write
2F8D000
trusted library allocation
page read and write
1395000
heap
page read and write
3964000
trusted library allocation
page read and write
3238000
trusted library allocation
page read and write
39C2000
trusted library allocation
page read and write
183B000
trusted library allocation
page execute and read and write
3470000
heap
page read and write
5A56000
heap
page read and write
2F80000
trusted library allocation
page read and write
2E7E000
stack
page read and write
489000
remote allocation
page execute and read and write
5FAE000
stack
page read and write
BB0000
heap
page read and write
FE6000
stack
page read and write
13F9000
heap
page read and write
3191000
trusted library allocation
page read and write
683D000
stack
page read and write
39B5000
trusted library allocation
page read and write
5D0A000
trusted library allocation
page read and write
643C000
stack
page read and write
3144000
trusted library allocation
page read and write
320A000
trusted library allocation
page read and write
3931000
trusted library allocation
page read and write
3418000
trusted library allocation
page read and write
B3A000
stack
page read and write
5FEE000
unkown
page read and write
341C000
trusted library allocation
page read and write
5D60000
trusted library allocation
page read and write
171BE000
stack
page read and write
31FFB000
heap
page read and write
3407000
trusted library allocation
page read and write
148C000
unkown
page readonly
31E7000
trusted library allocation
page read and write
39AD000
trusted library allocation
page read and write
5980000
heap
page read and write
1536000
trusted library allocation
page execute and read and write
2F7F000
stack
page read and write
31D6000
trusted library allocation
page read and write
19720000
heap
page read and write
9AC000
stack
page read and write
15C0000
heap
page read and write
B75000
heap
page read and write
D23000
heap
page read and write
66E2000
direct allocation
page read and write
1E15000
trusted library allocation
page read and write
13DB000
heap
page read and write
19D5000
heap
page read and write
39B7000
trusted library allocation
page read and write
19BB9000
heap
page read and write
605E000
stack
page read and write
10EF000
heap
page read and write
1807000
trusted library allocation
page read and write
33C9000
trusted library allocation
page read and write
39D3000
trusted library allocation
page read and write
52FE000
stack
page read and write
33F7000
trusted library allocation
page read and write
4CD000
remote allocation
page execute and read and write
3269000
trusted library allocation
page read and write
33EC000
trusted library allocation
page read and write
287D000
stack
page read and write
5BC0000
heap
page execute and read and write
10CB000
stack
page read and write
1978C000
heap
page read and write
347A000
trusted library allocation
page read and write
19D00000
heap
page read and write
58A0000
trusted library allocation
page execute and read and write
33F2000
trusted library allocation
page read and write
54F000
remote allocation
page execute and read and write
31E0000
trusted library allocation
page read and write
32FE000
stack
page read and write
49D0000
trusted library allocation
page read and write
609E000
stack
page read and write
63B000
remote allocation
page execute and read and write
198E000
stack
page read and write
1E22000
trusted library allocation
page read and write
3948000
trusted library allocation
page read and write
1038000
heap
page read and write
31B2000
trusted library allocation
page read and write
1360000
heap
page read and write
3499000
trusted library allocation
page read and write
14B8F000
stack
page read and write
345F000
trusted library allocation
page read and write
39B3000
trusted library allocation
page read and write
E40000
heap
page read and write
346C000
trusted library allocation
page read and write
1908E000
stack
page read and write
3431000
trusted library allocation
page read and write
326B000
trusted library allocation
page read and write
302C000
trusted library allocation
page read and write
E48000
unkown
page readonly
5D06000
trusted library allocation
page read and write
FF2F000
stack
page read and write
6C7E0000
unkown
page read and write
1986C000
stack
page read and write
1100000
heap
page read and write
E05000
unkown
page readonly
D9E000
stack
page read and write
1A1E000
stack
page read and write
EA3000
heap
page read and write
1285000
heap
page read and write
38C1000
trusted library allocation
page read and write
656E000
stack
page read and write
5FFE000
stack
page read and write
CB9000
heap
page read and write
62E0000
trusted library section
page read and write
1E00000
trusted library allocation
page execute and read and write
430000
remote allocation
page execute and read and write
33F0000
trusted library allocation
page read and write
1077000
heap
page read and write
1890000
heap
page read and write
17F3000
trusted library allocation
page execute and read and write
3150000
heap
page read and write
14DD000
stack
page read and write
66AD000
direct allocation
page execute read
39B1000
trusted library allocation
page read and write
6060000
trusted library allocation
page read and write
33E8000
trusted library allocation
page read and write
61E0000
heap
page read and write
1425000
heap
page read and write
14A8E000
stack
page read and write
324C000
trusted library allocation
page read and write
18F6000
stack
page read and write
124ED000
stack
page read and write
3424000
trusted library allocation
page read and write
28F0000
heap
page read and write
13DF000
heap
page read and write
6606000
direct allocation
page execute read
591E000
stack
page read and write
1880000
heap
page read and write
1DCF000
stack
page read and write
95AE000
stack
page read and write
1FC86000
direct allocation
page execute read
6C560000
unkown
page readonly
3480000
trusted library allocation
page read and write
3966000
trusted library allocation
page read and write
321A000
trusted library allocation
page read and write
3950000
trusted library allocation
page read and write
14A2D000
stack
page read and write
1FB20000
direct allocation
page execute and read and write
400000
remote allocation
page execute and read and write
5AAF000
stack
page read and write
1500000
trusted library allocation
page read and write
5E2E000
unkown
page read and write
39E1000
trusted library allocation
page read and write
15B0000
heap
page read and write
3920000
trusted library allocation
page read and write
392F000
trusted library allocation
page read and write
32FB000
trusted library allocation
page read and write
3265000
trusted library allocation
page read and write
16B4D000
stack
page read and write
29FC000
stack
page read and write
3DEDF000
heap
page read and write
101E000
unkown
page readonly
38B0000
heap
page execute and read and write
3830000
trusted library allocation
page read and write
5BAE000
stack
page read and write
17DE000
stack
page read and write
33CD000
trusted library allocation
page read and write
154B000
stack
page read and write
39BC000
trusted library allocation
page read and write
1547000
trusted library allocation
page execute and read and write
5A5E000
heap
page read and write
1540000
trusted library allocation
page read and write
1BD8000
heap
page read and write
66D0000
trusted library allocation
page execute and read and write
1DD0000
trusted library allocation
page read and write
56A0000
trusted library allocation
page read and write
530000
remote allocation
page execute and read and write
1093000
heap
page read and write
5FAE000
unkown
page read and write
6C561000
unkown
page execute read
E48000
heap
page read and write
3835000
trusted library allocation
page read and write
670A000
heap
page read and write
1590000
heap
page read and write
39DF000
trusted library allocation
page read and write
56F0000
trusted library allocation
page read and write
3150000
heap
page execute and read and write
3193000
trusted library allocation
page read and write
1BC0000
trusted library allocation
page read and write
6C601000
unkown
page execute read
13A1000
heap
page read and write
5D53000
trusted library section
page read and write
3467000
trusted library allocation
page read and write
31C1000
trusted library allocation
page read and write
39CC000
trusted library allocation
page read and write
19809000
heap
page read and write
6C600000
unkown
page readonly
B70000
heap
page read and write
344E000
trusted library allocation
page read and write
31D8000
trusted library allocation
page read and write
6C5DD000
unkown
page readonly
EF0000
heap
page read and write
A12000
unkown
page readonly
1DF0000
trusted library allocation
page read and write
3218000
trusted library allocation
page read and write
607000
remote allocation
page execute and read and write
1996C000
stack
page read and write
1523000
trusted library allocation
page read and write
C78000
heap
page read and write
145E000
heap
page read and write
324E000
trusted library allocation
page read and write
124AD000
stack
page read and write
39D1000
trusted library allocation
page read and write
1420000
heap
page read and write
3401000
trusted library allocation
page read and write
26112000
heap
page read and write
1830000
trusted library allocation
page read and write
19A20000
trusted library allocation
page read and write
398E000
trusted library allocation
page read and write
1B40000
heap
page read and write
31A6000
trusted library allocation
page read and write
397B000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
32DE000
stack
page read and write
1BC6000
trusted library allocation
page execute and read and write
621D000
heap
page read and write
33EA000
trusted library allocation
page read and write
43DC000
trusted library allocation
page read and write
BFE000
stack
page read and write
17F0000
trusted library allocation
page read and write
318D000
trusted library allocation
page read and write
6513000
direct allocation
page execute read
5E1E000
stack
page read and write
5D90000
trusted library allocation
page read and write
9790000
unclassified section
page read and write
5CE0000
heap
page read and write
54BE000
stack
page read and write
F3F000
stack
page read and write
56E0000
trusted library allocation
page read and write
1810000
trusted library allocation
page read and write
666D000
direct allocation
page execute read
347C000
trusted library allocation
page read and write
FE2E000
stack
page read and write
153A000
trusted library allocation
page execute and read and write
60DE000
stack
page read and write
E87000
heap
page read and write
66CB000
direct allocation
page readonly
CC5000
heap
page read and write
3420000
trusted library allocation
page read and write
5950000
trusted library section
page read and write
6C7DF000
unkown
page write copy
3303000
trusted library allocation
page read and write
5A1D000
trusted library section
page read and write
3935000
trusted library allocation
page read and write
179E000
stack
page read and write
347E000
trusted library allocation
page read and write
68DE000
stack
page read and write
5B70000
trusted library section
page read and write
149E000
stack
page read and write
C00000
heap
page read and write
5690000
trusted library allocation
page read and write
1C4F000
heap
page read and write
3922000
trusted library allocation
page read and write
9FC000
stack
page read and write
A3B000
stack
page read and write
5F6D000
unkown
page read and write
634F000
stack
page read and write
48C1000
trusted library allocation
page read and write
3463000
trusted library allocation
page read and write
344A000
trusted library allocation
page read and write
1FD2F000
direct allocation
page readonly
F8B000
heap
page read and write
5730000
heap
page execute and read and write
318F000
trusted library allocation
page read and write
3465000
trusted library allocation
page read and write
181E000
stack
page read and write
31C5000
trusted library allocation
page read and write
33E6000
trusted library allocation
page read and write
5696000
trusted library allocation
page read and write
31AC000
trusted library allocation
page read and write
1530000
trusted library allocation
page read and write
E70000
heap
page read and write
33FF000
stack
page read and write
1503000
heap
page read and write
1570000
heap
page read and write
D38000
heap
page read and write
34BE000
trusted library allocation
page read and write
9F2000
stack
page read and write
59BE000
stack
page read and write
5925000
trusted library allocation
page read and write
627000
remote allocation
page execute and read and write
3426000
trusted library allocation
page read and write
341A000
trusted library allocation
page read and write
1039000
heap
page read and write
38EC000
trusted library allocation
page read and write
11C5000
stack
page read and write
1460C000
stack
page read and write
2FEA000
trusted library allocation
page read and write
1820000
trusted library allocation
page execute and read and write
3300000
trusted library allocation
page read and write
3310000
heap
page execute and read and write
61CE000
stack
page read and write
32FF000
trusted library allocation
page read and write
66E6000
direct allocation
page read and write
120CE000
stack
page read and write
31C3000
trusted library allocation
page read and write
63A000
remote allocation
page execute and read and write
599E000
stack
page read and write
31AA000
trusted library allocation
page read and write
9F5000
stack
page read and write
6665000
direct allocation
page execute read
1BD0000
heap
page read and write
19DC7000
heap
page read and write
5D00000
trusted library allocation
page read and write
C85000
heap
page read and write
1492000
unkown
page readonly
3451000
trusted library allocation
page read and write
322D000
trusted library allocation
page read and write
1979D000
heap
page read and write
3946000
trusted library allocation
page read and write
343E000
trusted library allocation
page read and write
19D0000
heap
page read and write
620C000
heap
page read and write
19AA0000
heap
page read and write
613E000
stack
page read and write
6635000
direct allocation
page execute read
5800000
trusted library allocation
page read and write
E30000
unkown
page readonly
527000
remote allocation
page execute and read and write
3926000
trusted library allocation
page read and write
17F4000
trusted library allocation
page read and write
3251000
trusted library allocation
page read and write
1560000
trusted library allocation
page read and write
3942000
trusted library allocation
page read and write
17FD000
trusted library allocation
page execute and read and write
31E2000
trusted library allocation
page read and write
38A0000
trusted library allocation
page execute and read and write
396C000
trusted library allocation
page read and write
1C12000
heap
page read and write
6C5EE000
unkown
page read and write
348F000
trusted library allocation
page read and write
1BAD000
trusted library allocation
page execute and read and write
1BA0000
trusted library allocation
page read and write
52A000
remote allocation
page execute and read and write
3497000
trusted library allocation
page read and write
3210000
trusted library allocation
page read and write
48F000
remote allocation
page execute and read and write
5F2F000
unkown
page read and write
31F5000
trusted library allocation
page read and write
E2E000
stack
page read and write
633B000
stack
page read and write
3410000
trusted library allocation
page read and write
1B90000
trusted library allocation
page read and write
There are 699 hidden memdumps, click here to show them.