IOC Report
jjjUC5ggb2nQMb1B6SvBkwmT.exe

loading gif

Files

File Path
Type
Category
Malicious
jjjUC5ggb2nQMb1B6SvBkwmT.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\main\7z.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\main\7z.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\main\extracted\in.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 13:16:52 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\in.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Tmp30F7.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp3107.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\main\KillDuplicate.cmd
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\main\extracted\AntiAV.data
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\main\extracted\file_1.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\main\extracted\file_2.zip
Zip archive data, at least v1.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\main\extracted\file_3.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\main\extracted\file_4.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\main\file.bin
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\main\file.zip (copy)
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\main\main.bat
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exe
"C:\Users\user\Desktop\jjjUC5ggb2nQMb1B6SvBkwmT.exe"
malicious
C:\Users\user\AppData\Local\Temp\main\in.exe
"in.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\main\main.bat" /S"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\mode.com
mode 65,10
C:\Users\user\AppData\Local\Temp\main\7z.exe
7z.exe e file.zip -p324051139125346723019431074 -oextracted
C:\Users\user\AppData\Local\Temp\main\7z.exe
7z.exe e extracted/file_4.zip -oextracted
C:\Users\user\AppData\Local\Temp\main\7z.exe
7z.exe e extracted/file_3.zip -oextracted
C:\Users\user\AppData\Local\Temp\main\7z.exe
7z.exe e extracted/file_2.zip -oextracted
C:\Users\user\AppData\Local\Temp\main\7z.exe
7z.exe e extracted/file_1.zip -oextracted
C:\Windows\System32\attrib.exe
attrib +H "in.exe"
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
23.94.183.150:5058
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://ocsp.sectigo.com0
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
23.94.183.150
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
422000
unkown
page readonly
malicious
2A30000
trusted library allocation
page read and write
malicious
69C0000
trusted library allocation
page read and write
4DD0000
direct allocation
page read and write
3DC1000
trusted library allocation
page read and write
22024F30000
heap
page read and write
420000
unkown
page readonly
93E4000
heap
page read and write
25C0000
heap
page read and write
6986000
trusted library allocation
page read and write
98EE000
stack
page read and write
450000
heap
page read and write
6D2B000
stack
page read and write
38C7000
trusted library allocation
page read and write
3D52000
trusted library allocation
page read and write
947E000
heap
page read and write
27B0000
heap
page read and write
215B7BD0000
heap
page read and write
686E000
stack
page read and write
4DA0000
trusted library allocation
page read and write
6992000
trusted library allocation
page read and write
128D5490000
heap
page read and write
38FF000
trusted library allocation
page read and write
2EBE000
trusted library allocation
page read and write
C4D000
heap
page read and write
3950000
trusted library allocation
page read and write
3D40000
trusted library allocation
page read and write
C13000
heap
page read and write
2F8C000
trusted library allocation
page read and write
2B1F000
trusted library allocation
page read and write
49F000
unkown
page readonly
2B2A000
trusted library allocation
page read and write
E6C000
heap
page read and write
2D73000
trusted library allocation
page read and write
3DE2000
trusted library allocation
page read and write
3D6C000
trusted library allocation
page read and write
4BF000
unkown
page readonly
2ED4000
trusted library allocation
page read and write
128D5560000
heap
page read and write
60BF000
stack
page read and write
6AA0000
trusted library allocation
page execute and read and write
3B7B000
trusted library allocation
page read and write
22023560000
heap
page read and write
3DD1000
trusted library allocation
page read and write
E03000
trusted library allocation
page read and write
215B6410000
heap
page read and write
451000
unkown
page execute read
93EC000
heap
page read and write
3BE2000
trusted library allocation
page read and write
BF3000
trusted library allocation
page execute and read and write
65F5000
trusted library allocation
page read and write
69D0000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
2F91000
trusted library allocation
page read and write
49F000
unkown
page readonly
3C72000
trusted library allocation
page read and write
9890000
trusted library allocation
page execute and read and write
4E30000
heap
page read and write
BF0000
trusted library allocation
page read and write
61FF000
stack
page read and write
3B22000
trusted library allocation
page read and write
8A65000
trusted library allocation
page read and write
27D0000
direct allocation
page read and write
3C42000
trusted library allocation
page read and write
2B22000
trusted library allocation
page read and write
2DE1000
trusted library allocation
page read and write
400000
unkown
page readonly
2F96000
trusted library allocation
page read and write
697B000
trusted library allocation
page read and write
128D54D0000
direct allocation
page read and write
215B7D40000
direct allocation
page read and write
3BC6000
trusted library allocation
page read and write
20F75FE000
stack
page read and write
391B000
trusted library allocation
page read and write
94C0000
heap
page read and write
2CD5000
trusted library allocation
page read and write
5FBE000
stack
page read and write
3955000
trusted library allocation
page read and write
3DF0000
trusted library allocation
page read and write
1E748E50000
heap
page read and write
9552000
heap
page read and write
3CE7000
trusted library allocation
page read and write
68D0000
direct allocation
page read and write
2AAA000
trusted library allocation
page read and write
2FFE000
trusted library allocation
page read and write
435000
unkown
page readonly
BEE000
stack
page read and write
3925000
trusted library allocation
page read and write
8A90000
trusted library allocation
page execute and read and write
3D49000
trusted library allocation
page read and write
3C0B000
trusted library allocation
page read and write
2D63000
trusted library allocation
page read and write
69E0000
trusted library allocation
page execute and read and write
6AB0000
trusted library allocation
page read and write
4BF000
unkown
page readonly
3CDA000
trusted library allocation
page read and write
6AD0000
trusted library allocation
page read and write
93B0000
heap
page read and write
2790000
trusted library allocation
page read and write
4E12000
trusted library allocation
page read and write
BD33D2D000
stack
page read and write
2DFB000
trusted library allocation
page read and write
6A10000
direct allocation
page read and write
3D44000
trusted library allocation
page read and write
69B0000
trusted library allocation
page read and write
3945000
trusted library allocation
page read and write
8F7000
stack
page read and write
20F713D000
stack
page read and write
4E20000
heap
page read and write
64CC000
direct allocation
page read and write
450000
unkown
page readonly
30B7000
trusted library allocation
page read and write
3CCE000
trusted library allocation
page read and write
558000
heap
page read and write
3B8C000
trusted library allocation
page read and write
41A000
unkown
page readonly
3DEB000
trusted library allocation
page read and write
4BC000
unkown
page write copy
30C8000
trusted library allocation
page read and write
3C6D000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
56A0000
trusted library allocation
page read and write
3C94000
trusted library allocation
page read and write
9492000
heap
page read and write
80C21FF000
stack
page read and write
226A2330000
heap
page read and write
3080000
trusted library allocation
page read and write
A90000
direct allocation
page read and write
439000
unkown
page readonly
3036000
trusted library allocation
page read and write
3939000
trusted library allocation
page read and write
4ED0000
heap
page read and write
128D5555000
heap
page read and write
6A6C000
trusted library allocation
page read and write
3CA7000
trusted library allocation
page read and write
27A0000
trusted library allocation
page execute and read and write
9C4E000
stack
page read and write
CC7000
heap
page read and write
950F000
heap
page read and write
3DB5000
trusted library allocation
page read and write
6AE0000
trusted library allocation
page execute and read and write
450000
unkown
page readonly
3DA4000
trusted library allocation
page read and write
89B0000
trusted library allocation
page read and write
2B8A000
trusted library allocation
page read and write
3D85000
trusted library allocation
page read and write
3D99000
trusted library allocation
page read and write
2E73000
trusted library allocation
page read and write
5CFE000
stack
page read and write
400000
unkown
page readonly
6D86000
trusted library allocation
page read and write
2FD0000
direct allocation
page read and write
940E000
heap
page read and write
549E000
stack
page read and write
226A2470000
direct allocation
page read and write
3C1A000
trusted library allocation
page read and write
6970000
trusted library allocation
page read and write
2B35000
trusted library allocation
page read and write
4E80000
trusted library section
page read and write
A90000
direct allocation
page read and write
55C6000
heap
page read and write
A90000
direct allocation
page read and write
1000FC000
stack
page read and write
4E00000
trusted library allocation
page execute and read and write
3D0D000
trusted library allocation
page read and write
2E80000
trusted library allocation
page read and write
2B94000
trusted library allocation
page read and write
22023640000
heap
page read and write
215B7E40000
direct allocation
page read and write
E15F7FE000
stack
page read and write
3C61000
trusted library allocation
page read and write
6A70000
trusted library allocation
page execute and read and write
3B4D000
trusted library allocation
page read and write
128D3BC0000
heap
page read and write
3B5D000
trusted library allocation
page read and write
6D83000
trusted library allocation
page read and write
94B1000
heap
page read and write
2E06000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
C32000
heap
page read and write
529D000
heap
page read and write
3BBF000
trusted library allocation
page read and write
226A0A40000
heap
page read and write
545E000
stack
page read and write
4D54000
trusted library allocation
page read and write
52B9000
heap
page read and write
5240000
heap
page read and write
401000
unkown
page execute read
4D7E000
trusted library allocation
page read and write
3B41000
trusted library allocation
page read and write
3C35000
trusted library allocation
page read and write
3C68000
trusted library allocation
page read and write
55D0000
heap
page read and write
128D3AE0000
heap
page read and write
89A0000
trusted library allocation
page execute and read and write
22025030000
direct allocation
page read and write
9970000
trusted library allocation
page read and write
E12000
trusted library allocation
page read and write
49F000
unkown
page readonly
4D6B000
trusted library allocation
page read and write
AB0000
heap
page read and write
93D5000
heap
page read and write
3D92000
trusted library allocation
page read and write
1E748E10000
heap
page read and write
A90000
direct allocation
page read and write
2CE0000
trusted library allocation
page read and write
94D2000
heap
page read and write
531E000
heap
page read and write
956A000
heap
page read and write
5ACC000
direct allocation
page read and write
3BD8000
trusted library allocation
page read and write
2410000
heap
page read and write
3BF7000
trusted library allocation
page read and write
AE0000
heap
page read and write
96C0000
heap
page read and write
2DCE000
trusted library allocation
page read and write
3910000
trusted library allocation
page read and write
559E000
stack
page read and write
450000
unkown
page readonly
992E000
stack
page read and write
451000
unkown
page execute read
4D64000
trusted library allocation
page read and write
8A78000
trusted library allocation
page read and write
3C9E000
trusted library allocation
page read and write
4BF000
unkown
page readonly
900000
heap
page read and write
2FD0000
direct allocation
page read and write
65FA000
trusted library allocation
page read and write
2C34000
trusted library allocation
page read and write
4D60000
trusted library allocation
page read and write
1E748E55000
heap
page read and write
2DEA000
trusted library allocation
page read and write
3B84000
trusted library allocation
page read and write
9D4E000
stack
page read and write
996E000
stack
page read and write
3B87000
trusted library allocation
page read and write
988E000
stack
page read and write
8A00000
trusted library allocation
page execute and read and write
9470000
heap
page read and write
2EAC000
trusted library allocation
page read and write
2F66000
trusted library allocation
page read and write
3D13000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
56B0000
trusted library allocation
page execute and read and write
25AE000
stack
page read and write
450000
unkown
page readonly
2B2D000
trusted library allocation
page read and write
220250B0000
direct allocation
page read and write
450000
unkown
page readonly
22023740000
heap
page read and write
226A2450000
direct allocation
page read and write
AD0000
trusted library allocation
page read and write
2C24000
trusted library allocation
page read and write
890F000
stack
page read and write
3DB1000
trusted library allocation
page read and write
2E2B000
trusted library allocation
page read and write
DFE000
stack
page read and write
2B83000
trusted library allocation
page read and write
3D33000
trusted library allocation
page read and write
2FAD000
trusted library allocation
page read and write
3046000
trusted library allocation
page read and write
1001FE000
stack
page read and write
6F65000
trusted library allocation
page read and write
451000
unkown
page execute read
9539000
heap
page read and write
6DA0000
heap
page read and write
E0D000
trusted library allocation
page execute and read and write
96AD000
stack
page read and write
2B8F000
trusted library allocation
page read and write
6981000
trusted library allocation
page read and write
28C1000
trusted library allocation
page read and write
6D30000
trusted library allocation
page execute and read and write
450000
unkown
page readonly
3C56000
trusted library allocation
page read and write
3BFE000
trusted library allocation
page read and write
93F5000
heap
page read and write
215B7BF0000
direct allocation
page read and write
94F4000
heap
page read and write
942D000
heap
page read and write
4BC000
unkown
page write copy
60FE000
stack
page read and write
3BDD000
trusted library allocation
page read and write
3B6E000
trusted library allocation
page read and write
2C70000
trusted library allocation
page read and write
7E4ADFE000
stack
page read and write
2FA2000
trusted library allocation
page read and write
6F6B000
trusted library allocation
page read and write
28BE000
stack
page read and write
E10000
trusted library allocation
page read and write
E15F6FC000
stack
page read and write
226A2440000
heap
page read and write
2B28AA40000
heap
page read and write
128D54B0000
direct allocation
page read and write
E2B000
trusted library allocation
page execute and read and write
3031000
trusted library allocation
page read and write
94E7000
heap
page read and write
2CD0000
trusted library allocation
page read and write
1E74A940000
direct allocation
page read and write
451000
unkown
page execute read
69A1000
trusted library allocation
page read and write
8990000
trusted library allocation
page execute and read and write
96B0000
heap
page read and write
3000000
trusted library allocation
page read and write
27CF000
stack
page read and write
4D90000
trusted library allocation
page read and write
301F000
trusted library allocation
page read and write
215B6240000
heap
page read and write
2F85000
trusted library allocation
page read and write
2D3B000
trusted library allocation
page read and write
2EC9000
trusted library allocation
page read and write
220250A5000
heap
page read and write
4BC000
unkown
page write copy
89E0000
trusted library allocation
page read and write
6CEC000
stack
page read and write
E40000
trusted library allocation
page read and write
49F000
unkown
page readonly
1E748E80000
direct allocation
page read and write
4DB0000
trusted library allocation
page read and write
20F74FE000
stack
page read and write
4D5F000
trusted library allocation
page read and write
27D0000
direct allocation
page read and write
451000
unkown
page execute read
27B8000
heap
page read and write
4D3E000
trusted library allocation
page read and write
980E000
stack
page read and write
A20000
heap
page read and write
3D58000
trusted library allocation
page read and write
9446000
heap
page read and write
3942000
trusted library allocation
page read and write
2BA0000
trusted library allocation
page read and write
1004FE000
stack
page read and write
93FE000
heap
page read and write
2740000
trusted library allocation
page read and write
94CC000
heap
page read and write
3965000
trusted library allocation
page read and write
93CD000
heap
page read and write
4BC000
unkown
page read and write
3DD8000
trusted library allocation
page read and write
2C8A000
trusted library allocation
page read and write
3CFB000
trusted library allocation
page read and write
984F000
stack
page read and write
1E748ED0000
heap
page read and write
4EA0000
heap
page execute and read and write
220250A0000
heap
page read and write
3B99000
trusted library allocation
page read and write
128D3CC0000
heap
page read and write
6A10000
trusted library allocation
page read and write
451000
unkown
page execute read
226A0960000
heap
page read and write
215B7C10000
direct allocation
page read and write
69F0000
trusted library allocation
page read and write
2B28AC10000
heap
page read and write
2F3A000
trusted library allocation
page read and write
2B64000
trusted library allocation
page read and write
6AAA000
direct allocation
page read and write
38F4000
trusted library allocation
page read and write
4BF000
unkown
page readonly
450000
unkown
page readonly
394A000
trusted library allocation
page read and write
41A000
unkown
page readonly
2B28AA20000
heap
page read and write
510000
heap
page read and write
3CA4000
trusted library allocation
page read and write
5CBE000
stack
page read and write
2C14000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
4D81000
trusted library allocation
page read and write
3D2D000
trusted library allocation
page read and write
226A2445000
heap
page read and write
6F32000
trusted library allocation
page read and write
128D3BCB000
heap
page read and write
43D0000
direct allocation
page read and write
4D8D000
trusted library allocation
page read and write
39A6000
trusted library allocation
page read and write
8A69000
trusted library allocation
page read and write
49F000
unkown
page readonly
49F000
unkown
page readonly
9E0000
heap
page read and write
22025050000
direct allocation
page read and write
E25000
trusted library allocation
page execute and read and write
3B67000
trusted library allocation
page read and write
2202364B000
heap
page read and write
65F0000
trusted library allocation
page read and write
2FE8000
trusted library allocation
page read and write
699E000
trusted library allocation
page read and write
2F43000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
2B28AA10000
heap
page read and write
3DDE000
trusted library allocation
page read and write
38ED000
trusted library allocation
page read and write
2B28AD20000
heap
page read and write
6F80000
trusted library allocation
page read and write
64DE000
stack
page read and write
3DCB000
trusted library allocation
page read and write
3BB2000
trusted library allocation
page read and write
2D68000
trusted library allocation
page read and write
535E000
stack
page read and write
26D0000
direct allocation
page read and write
3DE7000
trusted library allocation
page read and write
8A10000
trusted library allocation
page read and write
2E8D000
trusted library allocation
page read and write
3B15000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
AB5000
heap
page read and write
6F40000
trusted library allocation
page read and write
4BF000
unkown
page readonly
6A40000
trusted library allocation
page read and write
1E0000
heap
page read and write
2411000
heap
page read and write
401000
unkown
page execute read
3C0E000
trusted library allocation
page read and write
2D04000
trusted library allocation
page read and write
3AC0000
trusted library allocation
page read and write
390B000
trusted library allocation
page read and write
2F59000
trusted library allocation
page read and write
3C22000
trusted library allocation
page read and write
3C04000
trusted library allocation
page read and write
94D9000
heap
page read and write
226A2430000
direct allocation
page read and write
26CE000
stack
page read and write
2EB3000
trusted library allocation
page read and write
303B000
trusted library allocation
page read and write
49F000
unkown
page readonly
4DA5000
trusted library allocation
page read and write
2EB9000
trusted library allocation
page read and write
3E48000
trusted library allocation
page read and write
41E000
unkown
page write copy
215B7C40000
heap
page read and write
A6E000
stack
page read and write
5281000
heap
page read and write
50F0000
heap
page read and write
2E9A000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
4BC000
unkown
page read and write
E16000
trusted library allocation
page execute and read and write
8A60000
trusted library allocation
page read and write
682D000
stack
page read and write
3D4D000
trusted library allocation
page read and write
4BC000
unkown
page write copy
2F4B000
trusted library allocation
page read and write
423000
unkown
page readonly
3DF5000
trusted library allocation
page read and write
80C22FF000
stack
page read and write
696E000
stack
page read and write
3C14000
trusted library allocation
page read and write
4ED3000
heap
page read and write
93FA000
heap
page read and write
3D4F000
trusted library allocation
page read and write
BFD000
trusted library allocation
page execute and read and write
2B33000
trusted library allocation
page read and write
9B000
stack
page read and write
2F73000
trusted library allocation
page read and write
5260000
heap
page read and write
392C000
trusted library allocation
page read and write
6D7E000
stack
page read and write
1E748E00000
heap
page read and write
41E000
unkown
page read and write
656E000
direct allocation
page read and write
256E000
stack
page read and write
BD33CAC000
stack
page read and write
A90000
heap
page read and write
49F000
unkown
page readonly
645E000
stack
page read and write
E15F8FE000
stack
page read and write
2DD8000
trusted library allocation
page read and write
3BED000
trusted library allocation
page read and write
2CDA000
trusted library allocation
page read and write
BF4000
trusted library allocation
page read and write
2B30000
trusted library allocation
page read and write
65DE000
stack
page read and write
3C29000
trusted library allocation
page read and write
635D000
stack
page read and write
226A0A60000
heap
page read and write
1E748EDB000
heap
page read and write
2411000
heap
page read and write
451000
unkown
page execute read
3CF4000
trusted library allocation
page read and write
1E748E60000
heap
page read and write
39D0000
direct allocation
page read and write
440000
heap
page read and write
7F8B0000
trusted library allocation
page execute and read and write
6A50000
trusted library allocation
page read and write
423000
unkown
page readonly
BD3407E000
stack
page read and write
49BC000
stack
page read and write
3D18000
trusted library allocation
page read and write
2D97000
trusted library allocation
page read and write
A000000
heap
page read and write
8BB0000
trusted library allocation
page read and write
9521000
heap
page read and write
38E0000
trusted library allocation
page read and write
A00000
heap
page read and write
3C4F000
trusted library allocation
page read and write
8A85000
trusted library allocation
page read and write
39D0000
direct allocation
page read and write
2B4B000
trusted library allocation
page read and write
3C8E000
trusted library allocation
page read and write
67AC000
stack
page read and write
3C17000
trusted library allocation
page read and write
2D4C000
trusted library allocation
page read and write
7E4ACFE000
stack
page read and write
50E0000
heap
page read and write
302A000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
522C000
heap
page read and write
2B28AA4B000
heap
page read and write
215B7C35000
heap
page read and write
1E748E40000
direct allocation
page read and write
2B57000
trusted library allocation
page read and write
215B7C30000
heap
page read and write
2EA1000
trusted library allocation
page read and write
215B6220000
heap
page read and write
3994000
trusted library allocation
page read and write
3B09000
trusted library allocation
page read and write
6F35000
trusted library allocation
page read and write
3C1C000
trusted library allocation
page read and write
3CAC000
trusted library allocation
page read and write
450000
unkown
page readonly
2B49000
trusted library allocation
page read and write
E22000
trusted library allocation
page read and write
3932000
trusted library allocation
page read and write
2F4D000
trusted library allocation
page read and write
4DF0000
heap
page read and write
4BF000
unkown
page readonly
4BF000
unkown
page readonly
6AC0000
trusted library allocation
page execute and read and write
3B7E000
trusted library allocation
page read and write
3018000
trusted library allocation
page read and write
3B74000
trusted library allocation
page read and write
59A000
stack
page read and write
4E10000
trusted library allocation
page read and write
4D40000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
2B71000
trusted library allocation
page read and write
4BF000
unkown
page readonly
3AA7000
trusted library allocation
page read and write
3D5C000
trusted library allocation
page read and write
3C7D000
trusted library allocation
page read and write
E50000
trusted library allocation
page execute and read and write
450000
unkown
page readonly
49F000
unkown
page readonly
264E000
stack
page read and write
6F1E000
stack
page read and write
38D3000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
8A7F000
trusted library allocation
page read and write
89F0000
trusted library allocation
page read and write
2415000
heap
page read and write
2C3F000
trusted library allocation
page read and write
E27000
trusted library allocation
page execute and read and write
4D86000
trusted library allocation
page read and write
65F8000
trusted library allocation
page read and write
2750000
trusted library allocation
page read and write
3D23000
trusted library allocation
page read and write
2FDF000
trusted library allocation
page read and write
4E24000
heap
page read and write
49F000
unkown
page readonly
8A8A000
trusted library allocation
page read and write
BD33DAF000
stack
page read and write
50CC000
direct allocation
page read and write
C00000
heap
page read and write
94A0000
heap
page read and write
4BC000
unkown
page read and write
199000
stack
page read and write
6BEC000
stack
page read and write
69AA000
trusted library allocation
page read and write
944C000
heap
page read and write
4BC000
unkown
page read and write
51E000
heap
page read and write
6F6E000
trusted library allocation
page read and write
2F7A000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
2B3E000
trusted library allocation
page read and write
6EAE000
stack
page read and write
2D6D000
trusted library allocation
page read and write
451000
unkown
page execute read
9556000
heap
page read and write
2658000
trusted library allocation
page read and write
51A000
heap
page read and write
295C000
trusted library allocation
page read and write
94DD000
heap
page read and write
272C000
stack
page read and write
3BD1000
trusted library allocation
page read and write
2B28AD25000
heap
page read and write
A28000
heap
page read and write
2D4E000
trusted library allocation
page read and write
2D57000
trusted library allocation
page read and write
527A000
heap
page read and write
6A20000
trusted library allocation
page execute and read and write
3D3A000
trusted library allocation
page read and write
1E74A840000
heap
page read and write
5120000
heap
page read and write
5226000
heap
page read and write
2A4F000
stack
page read and write
2BAB000
trusted library allocation
page read and write
2E6B000
trusted library allocation
page read and write
30C0000
trusted library allocation
page read and write
AAE000
stack
page read and write
2F03000
trusted library allocation
page read and write
6D94000
trusted library allocation
page read and write
94D7000
heap
page read and write
7E4A9FC000
stack
page read and write
AE8000
heap
page read and write
422000
unkown
page readonly
6F20000
trusted library allocation
page read and write
3DFA000
trusted library allocation
page read and write
8A8F000
trusted library allocation
page read and write
3B92000
trusted library allocation
page read and write
E60000
heap
page read and write
451000
unkown
page execute read
9433000
heap
page read and write
3CB2000
trusted library allocation
page read and write
300B000
trusted library allocation
page read and write
3051000
trusted library allocation
page read and write
4E9000
unkown
page readonly
4BC000
unkown
page read and write
3C87000
trusted library allocation
page read and write
3AC8000
trusted library allocation
page read and write
6460000
trusted library allocation
page execute and read and write
26D0000
direct allocation
page read and write
2B78000
trusted library allocation
page read and write
94F8000
heap
page read and write
C3F000
heap
page read and write
3B2F000
trusted library allocation
page read and write
393C000
trusted library allocation
page read and write
6F51000
trusted library allocation
page read and write
55B2000
heap
page read and write
1E5000
heap
page read and write
3E1F000
trusted library allocation
page read and write
3CAA000
trusted library allocation
page read and write
3D78000
trusted library allocation
page read and write
3906000
trusted library allocation
page read and write
128D5550000
heap
page read and write
2B1C000
trusted library allocation
page read and write
67EC000
stack
page read and write
2E61000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
226A2310000
heap
page read and write
4BF000
unkown
page readonly
4BF000
unkown
page readonly
2DF7000
trusted library allocation
page read and write
38C1000
trusted library allocation
page read and write
3B8A000
trusted library allocation
page read and write
4F0000
heap
page read and write
3B48000
trusted library allocation
page read and write
451000
unkown
page execute read
6A30000
trusted library allocation
page read and write
80C20FD000
stack
page read and write
E66000
heap
page read and write
4F8000
unkown
page readonly
5100000
trusted library allocation
page execute and read and write
3DAB000
trusted library allocation
page read and write
941E000
heap
page read and write
3CB7000
trusted library allocation
page read and write
3B52000
trusted library allocation
page read and write
4D20000
trusted library allocation
page read and write
3DED000
trusted library allocation
page read and write
4E70000
trusted library allocation
page execute and read and write
4E47000
trusted library allocation
page read and write
3948000
trusted library allocation
page read and write
2550000
direct allocation
page read and write
3D06000
trusted library allocation
page read and write
2C29000
trusted library allocation
page read and write
450000
unkown
page readonly
3BA5000
trusted library allocation
page read and write
4BC000
unkown
page write copy
3C9B000
trusted library allocation
page read and write
226A0A4A000
heap
page read and write
65E0000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
66AA000
stack
page read and write
22024F10000
heap
page read and write
226A0B40000
heap
page read and write
2416000
heap
page read and write
215B624B000
heap
page read and write
294E000
stack
page read and write
6200000
trusted library allocation
page read and write
4D30000
trusted library allocation
page read and write
2730000
heap
page execute and read and write
2BF1000
trusted library allocation
page read and write
3B36000
trusted library allocation
page read and write
4D50000
trusted library allocation
page read and write
There are 672 hidden memdumps, click here to show them.