IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\447331\Buyer.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\ProgramData\DBFHDHJKKJDH\AFIEGI
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DBFHDHJKKJDH\AFIEGI-shm
data
dropped
C:\ProgramData\DBFHDHJKKJDH\BKFCAF
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\DBFHDHJKKJDH\BKJKJE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DBFHDHJKKJDH\CBKJKJ
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\DBFHDHJKKJDH\DHJEBG
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DBFHDHJKKJDH\DHJEBG-shm
data
dropped
C:\ProgramData\DBFHDHJKKJDH\FBAKEH
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DBFHDHJKKJDH\GCGHCB
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\DBFHDHJKKJDH\HDGCAA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DBFHDHJKKJDH\KEHDBA
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\76561199747278259[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\447331\p
data
dropped
C:\Users\user\AppData\Local\Temp\Assure
data
dropped
C:\Users\user\AppData\Local\Temp\Australian
data
dropped
C:\Users\user\AppData\Local\Temp\Backed
DIY-Thermocam raw data (Lepton 3.x), scale 21280--27861, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 0.589205
dropped
C:\Users\user\AppData\Local\Temp\Barely
data
dropped
C:\Users\user\AppData\Local\Temp\Bathroom
data
dropped
C:\Users\user\AppData\Local\Temp\Bench
data
dropped
C:\Users\user\AppData\Local\Temp\Cake
data
dropped
C:\Users\user\AppData\Local\Temp\Club
data
dropped
C:\Users\user\AppData\Local\Temp\Compile
data
dropped
C:\Users\user\AppData\Local\Temp\Consoles
data
dropped
C:\Users\user\AppData\Local\Temp\Czech
data
dropped
C:\Users\user\AppData\Local\Temp\Deborah
data
dropped
C:\Users\user\AppData\Local\Temp\Desire
data
dropped
C:\Users\user\AppData\Local\Temp\Elsewhere
data
dropped
C:\Users\user\AppData\Local\Temp\Ensemble
data
dropped
C:\Users\user\AppData\Local\Temp\Expenses
data
dropped
C:\Users\user\AppData\Local\Temp\Film
data
dropped
C:\Users\user\AppData\Local\Temp\Geographic
data
dropped
C:\Users\user\AppData\Local\Temp\Harley
data
dropped
C:\Users\user\AppData\Local\Temp\Means
data
dropped
C:\Users\user\AppData\Local\Temp\Moment
data
dropped
C:\Users\user\AppData\Local\Temp\Olive
data
dropped
C:\Users\user\AppData\Local\Temp\Provide
data
dropped
C:\Users\user\AppData\Local\Temp\Psychiatry
data
dropped
C:\Users\user\AppData\Local\Temp\Pulling
data
dropped
C:\Users\user\AppData\Local\Temp\Ranch
data
dropped
C:\Users\user\AppData\Local\Temp\Ringtones
DOS executable (COM, 0x8C-variant)
dropped
C:\Users\user\AppData\Local\Temp\Ruth
ASCII text, with very long lines (1017), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Ruth.cmd (copy)
ASCII text, with very long lines (1017), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Scout
data
dropped
C:\Users\user\AppData\Local\Temp\Stylus
data
dropped
C:\Users\user\AppData\Local\Temp\Turtle
data
dropped
C:\Users\user\AppData\Local\Temp\Usd
data
dropped
C:\Users\user\AppData\Local\Temp\Within
GTA2 binary mission script (SCR), Residential area (ste)
dropped
There are 45 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k move Ruth Ruth.cmd & Ruth.cmd & exit
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa.exe opssvc.exe"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "avastui.exe avgui.exe ekrn.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 447331
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "typesfaxincreasecompound" Ensemble
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b Compile + Olive + Within + Psychiatry 447331\p
malicious
C:\Users\user\AppData\Local\Temp\447331\Buyer.pif
Buyer.pif p
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\DBFHDHJKKJDH" & exit
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\choice.exe
choice /d y /t 5
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://steamcommunity.com/profiles/76561199747278259
23.192.247.89
malicious
https://5.75.212.60/sqls.dll
5.75.212.60
https://duckduckgo.com/chrome_newtab
unknown
http://arpdabl.zapto.org/z
unknown
https://duckduckgo.com/ac/?q=
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://5.75.212.60GDGDGHJKontent-Disposition:
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://www.autoitscript.com/autoit3/
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=B7Vsdo1okyaC&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=Iy1ies1ROjUT&l=english
unknown
https://steamcommunity.com/profiles/76561199747278259/badges
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=_D2Bg4UEaFxK&l=en
unknown
https://store.steampowered.com/privac
unknown
http://arpdabl.zapto.GIDB
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=3eYWCMu_
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=54OKIvHlOQzF&l=e
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://steamcommunity.com/m
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://mozilla.org0/
unknown
https://t.me/armad2a
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://5.75.212.60/softokn3.dlli
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://steamcommunity.com/profiles/76561199747278259gi_z2Mozilla/5.0
unknown
http://www.autoitscript.com/autoit3/X
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://5.75.212.60/H
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
http://arpdabl.zapto.org
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://t.me/armad2ahellosqls.dllsqlite3.dllIn
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://5.75.212.60/softokn3.dll
5.75.212.60
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://steamcommunity.com/profiles/76561199747278259/inventory/
unknown
https://5.75.212.60/mozglue.dll
5.75.212.60
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
http://arpdabl.zapto
unknown
https://steamcommunity.com/discussions/
unknown
http://arpdabl.zapto.org/
77.91.101.71
https://store.steampowered.com/stats/
unknown
https://5.75.212.60/
5.75.212.60
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://5.75.212.60/freebl3.dll
5.75.212.60
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://5.75.212.60/nss3.dll
5.75.212.60
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=eZOyL2UG5OX8&a
unknown
https://steamcommunity.com/workshop/
unknown
https://store.steampowered.com/legal/
unknown
http://64532127VdtSrezylanAPTHSymMatchStringInternetSetOptionAHttpQueryInfoAdbghelp.dllSetThreadCont
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://5.75.212.60/msvcp140.dll
5.75.212.60
http://www.sqlite.org/copyright.html.
unknown
https://5.75.212.60/nss3.dll=
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://arpdabl.DAKFIDGIDB
unknown
http://arpdabl.zapto.orgB
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.TP5s6TzX6LLh
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
23.192.247.89
malicious
arpdabl.zapto.org
77.91.101.71
BOAbiVqkIfMQExjauBCLW.BOAbiVqkIfMQExjauBCLW
unknown

IPs

IP
Domain
Country
Malicious
23.192.247.89
steamcommunity.com
United States
malicious
77.91.101.71
arpdabl.zapto.org
Russian Federation
5.75.212.60
unknown
Germany

Memdumps

Base Address
Regiontype
Protect
Malicious
1347000
heap
page read and write
malicious
3C4B000
trusted library allocation
page read and write
malicious
3A7A000
trusted library allocation
page read and write
malicious
13D9000
heap
page read and write
malicious
40FC000
trusted library allocation
page read and write
malicious
39F1000
trusted library allocation
page read and write
malicious
40F1000
direct allocation
page execute and read and write
malicious
12E02000
trusted library allocation
page read and write
3CF1000
trusted library allocation
page read and write
6CA000
heap
page read and write
3CF1000
trusted library allocation
page read and write
3C57000
trusted library allocation
page read and write
DEA000
heap
page read and write
970000
heap
page read and write
3741000
heap
page read and write
3EA3000
trusted library allocation
page read and write
6BE000
heap
page read and write
3741000
heap
page read and write
2950000
heap
page read and write
F10000
direct allocation
page execute and read and write
3741000
heap
page read and write
3BC4000
trusted library allocation
page read and write
4F4000
unkown
page readonly
295F000
heap
page read and write
44AF000
stack
page read and write
3741000
heap
page read and write
C9BF000
trusted library allocation
page read and write
4124000
direct allocation
page execute and read and write
CAAE000
stack
page read and write
3E71000
trusted library allocation
page read and write
3741000
heap
page read and write
12D60000
trusted library allocation
page read and write
A2F000
stack
page read and write
C6A8000
direct allocation
page execute read
1413000
heap
page read and write
92E000
stack
page read and write
1003000
unkown
page readonly
9A0000
heap
page read and write
6BE000
stack
page read and write
CAF1000
trusted library allocation
page read and write
6C64E000
unkown
page read and write
39F0000
trusted library allocation
page read and write
3741000
heap
page read and write
1126000
heap
page read and write
C5B0000
trusted library allocation
page read and write
3741000
heap
page read and write
B3FF000
stack
page read and write
6BE000
heap
page read and write
55E000
stack
page read and write
3CF1000
trusted library allocation
page read and write
DE0000
heap
page read and write
6D0000
heap
page read and write
68E000
heap
page read and write
1D0000
heap
page read and write
3741000
heap
page read and write
A77C000
stack
page read and write
6C3D1000
unkown
page execute read
3741000
heap
page read and write
3741000
heap
page read and write
1060000
heap
page read and write
2956000
heap
page read and write
44EE000
stack
page read and write
9B000
stack
page read and write
BCC000
stack
page read and write
2959000
heap
page read and write
3A37000
trusted library allocation
page read and write
3DD4000
trusted library allocation
page read and write
BBE000
stack
page read and write
A50000
heap
page read and write
C6A0000
trusted library allocation
page read and write
34EC000
stack
page read and write
329C000
stack
page read and write
6C655000
unkown
page readonly
5B0000
heap
page read and write
3741000
heap
page read and write
6C462000
unkown
page readonly
295A000
heap
page read and write
3741000
heap
page read and write
3741000
heap
page read and write
1398000
heap
page read and write
295D000
heap
page read and write
660000
heap
page read and write
CC31000
trusted library allocation
page read and write
3EE3000
trusted library allocation
page read and write
6C3D0000
unkown
page readonly
400F000
trusted library allocation
page read and write
35B0000
heap
page read and write
B43E000
stack
page read and write
550000
heap
page read and write
AB7C000
stack
page read and write
6C45E000
unkown
page read and write
FDD000
unkown
page readonly
B68000
heap
page read and write
C8E2000
direct allocation
page read and write
3741000
heap
page read and write
C8ED000
direct allocation
page readonly
6D0000
heap
page read and write
3A37000
trusted library allocation
page read and write
1083000
heap
page read and write
8BE000
stack
page read and write
6CA000
heap
page read and write
6F0000
heap
page read and write
344F000
stack
page read and write
12F2B000
stack
page read and write
6C64F000
unkown
page write copy
59E000
stack
page read and write
6CA000
heap
page read and write
1414000
heap
page read and write
12DFC000
trusted library allocation
page read and write
3BA4000
trusted library allocation
page read and write
3741000
heap
page read and write
34EE000
stack
page read and write
B60000
heap
page read and write
3741000
heap
page read and write
3C4B000
trusted library allocation
page read and write
400000
unkown
page readonly
BCE000
stack
page read and write
12D5000
heap
page read and write
2959000
heap
page read and write
3741000
heap
page read and write
12DF4000
trusted library allocation
page read and write
295F000
heap
page read and write
3760000
heap
page read and write
500000
heap
page read and write
1101000
heap
page read and write
295F000
heap
page read and write
3741000
heap
page read and write
DB0000
heap
page read and write
3C9D000
trusted library allocation
page read and write
3741000
heap
page read and write
3741000
heap
page read and write
295F000
heap
page read and write
6CA000
heap
page read and write
294F000
stack
page read and write
295E000
heap
page read and write
6CA000
heap
page read and write
3741000
heap
page read and write
2957000
heap
page read and write
B1E000
stack
page read and write
DE5000
heap
page read and write
3741000
heap
page read and write
FDD000
unkown
page readonly
C130000
remote allocation
page read and write
A9E000
stack
page read and write
C6A1000
direct allocation
page execute read
6D0000
heap
page read and write
68A000
heap
page read and write
3741000
heap
page read and write
3CF1000
trusted library allocation
page read and write
3741000
heap
page read and write
12D60000
trusted library allocation
page read and write
10E3000
heap
page read and write
3D95A000
trusted library allocation
page read and write
2230000
heap
page read and write
3741000
heap
page read and write
3741000
heap
page read and write
3741000
heap
page read and write
2400000
heap
page read and write
9EE000
stack
page read and write
3741000
heap
page read and write
3741000
heap
page read and write
67C000
stack
page read and write
138C000
heap
page read and write
138F000
heap
page read and write
3741000
heap
page read and write
3741000
heap
page read and write
3741000
heap
page read and write
2B617000
trusted library allocation
page read and write
3741000
heap
page read and write
2957000
heap
page read and write
6BE000
heap
page read and write
33EC000
stack
page read and write
4E0000
heap
page read and write
4217000
direct allocation
page execute and read and write
F41000
unkown
page execute read
C585000
trusted library allocation
page read and write
3E89000
trusted library allocation
page read and write
2950000
heap
page read and write
3741000
heap
page read and write
3741000
heap
page read and write
3741000
heap
page read and write
6BE000
heap
page read and write
1385000
heap
page read and write
1304000
heap
page read and write
408000
unkown
page readonly
295F000
heap
page read and write
C6A0000
direct allocation
page execute and read and write
3741000
heap
page read and write
CADA000
trusted library allocation
page read and write
AFFE000
stack
page read and write
3741000
heap
page read and write
6BE000
heap
page read and write
3B09000
trusted library allocation
page read and write
C580000
trusted library allocation
page read and write
432B000
direct allocation
page execute and read and write
4220000
direct allocation
page execute and read and write
3741000
heap
page read and write
3741000
heap
page read and write
3CA3000
trusted library allocation
page read and write
3741000
heap
page read and write
BFF000
stack
page read and write
122D000
heap
page read and write
1392000
heap
page read and write
3741000
heap
page read and write
3DC6000
trusted library allocation
page read and write
BCDB000
stack
page read and write
9BF000
stack
page read and write
3741000
heap
page read and write
461000
unkown
page read and write
3CF0000
trusted library allocation
page read and write
1386F000
trusted library allocation
page read and write
39F7000
trusted library allocation
page read and write
492F000
stack
page read and write
3AA7000
trusted library allocation
page read and write
3741000
heap
page read and write
C0DC000
stack
page read and write
3741000
heap
page read and write
2897000
heap
page read and write
138A000
heap
page read and write
39F1000
trusted library allocation
page read and write
C806000
direct allocation
page execute read
6CA000
heap
page read and write
3DC4000
trusted library allocation
page read and write
6CA000
heap
page read and write
1391000
heap
page read and write
C66F000
trusted library allocation
page read and write
185E000
stack
page read and write
CC4F000
trusted library allocation
page read and write
C8B8000
direct allocation
page readonly
F40000
unkown
page readonly
408000
unkown
page readonly
3741000
heap
page read and write
580000
heap
page read and write
3741000
heap
page read and write
3B16000
trusted library allocation
page read and write
6BE000
heap
page read and write
CCF8000
trusted library allocation
page read and write
256A1000
trusted library allocation
page read and write
432D000
direct allocation
page execute and read and write
3741000
heap
page read and write
35B8000
heap
page read and write
3B9A000
trusted library allocation
page read and write
1385D000
stack
page read and write
3741000
heap
page read and write
3741000
heap
page read and write
6FF000
heap
page read and write
3741000
heap
page read and write
3741000
heap
page read and write
6CA000
heap
page read and write
29CE000
stack
page read and write
12EDC000
stack
page read and write
3741000
heap
page read and write
3DB7000
trusted library allocation
page read and write
3741000
heap
page read and write
5B4000
heap
page read and write
3AF0000
trusted library allocation
page read and write
3ABA000
trusted library allocation
page read and write
C8EA000
direct allocation
page readonly
3741000
heap
page read and write
3741000
heap
page read and write
3741000
heap
page read and write
3741000
heap
page read and write
2300000
heap
page read and write
12DFC000
trusted library allocation
page read and write
401000
unkown
page execute read
C130000
remote allocation
page read and write
6C470000
unkown
page readonly
2951000
heap
page read and write
3741000
heap
page read and write
6CA000
heap
page read and write
197D0000
trusted library allocation
page read and write
3741000
heap
page read and write
3580000
heap
page read and write
6BE000
heap
page read and write
4EA000
stack
page read and write
3EA4000
trusted library allocation
page read and write
1372000
heap
page read and write
3741000
heap
page read and write
F8E000
stack
page read and write
3AF1000
trusted library allocation
page read and write
8C7000
heap
page read and write
B5F000
stack
page read and write
1C5F000
stack
page read and write
6D0000
heap
page read and write
100D000
unkown
page read and write
2953000
heap
page read and write
12C000
stack
page read and write
1323000
heap
page read and write
C59F000
trusted library allocation
page read and write
3741000
heap
page read and write
3DAE000
trusted library allocation
page read and write
3741000
heap
page read and write
810000
heap
page read and write
ADF000
stack
page read and write
3741000
heap
page read and write
B83F000
stack
page read and write
52D000
stack
page read and write
41F000
unkown
page read and write
219E000
stack
page read and write
6CA000
heap
page read and write
CAD0000
trusted library allocation
page read and write
295E000
heap
page read and write
87F000
stack
page read and write
3450000
heap
page read and write
4960000
heap
page read and write
3741000
heap
page read and write
5BD000
heap
page read and write
295A000
heap
page read and write
580000
heap
page read and write
EE0000
trusted library allocation
page read and write
ABBD000
stack
page read and write
1068000
heap
page read and write
3C33000
trusted library allocation
page read and write
4120000
direct allocation
page execute and read and write
6CA000
heap
page read and write
588000
heap
page read and write
5A0000
heap
page read and write
3741000
heap
page read and write
6FE000
stack
page read and write
3741000
heap
page read and write
B9B000
heap
page read and write
1355000
heap
page read and write
4230000
heap
page read and write
3F3F000
trusted library allocation
page read and write
FE0000
heap
page read and write
295F000
heap
page read and write
141D000
heap
page read and write
6BE000
heap
page read and write
585000
heap
page read and write
4E6000
heap
page read and write
DD4000
heap
page read and write
C56F000
stack
page read and write
3741000
heap
page read and write
12E2000
heap
page read and write
C8AD000
direct allocation
page execute read
3741000
heap
page read and write
3741000
heap
page read and write
3A7B000
trusted library allocation
page read and write
6CA000
heap
page read and write
EE0000
trusted library allocation
page read and write
CAEA000
trusted library allocation
page read and write
340E000
stack
page read and write
4340000
trusted library allocation
page read and write
2955000
heap
page read and write
4F4000
unkown
page readonly
3AF1000
trusted library allocation
page read and write
446E000
stack
page read and write
33AF000
stack
page read and write
3741000
heap
page read and write
6C471000
unkown
page execute read
3741000
heap
page read and write
6BE000
heap
page read and write
141D000
heap
page read and write
3CF1000
trusted library allocation
page read and write
2952000
heap
page read and write
284E000
stack
page read and write
16C000
stack
page read and write
1345E000
stack
page read and write
C8EF000
direct allocation
page readonly
1383000
heap
page read and write
3741000
heap
page read and write
EE0000
trusted library allocation
page read and write
3741000
heap
page read and write
325C000
stack
page read and write
3A37000
trusted library allocation
page read and write
2956000
heap
page read and write
11F6000
heap
page read and write
C65D000
trusted library allocation
page read and write
3741000
heap
page read and write
4340000
unclassified section
page read and write
425E000
direct allocation
page execute and read and write
6BE000
heap
page read and write
12E04000
trusted library allocation
page read and write
3741000
heap
page read and write
AFBE000
stack
page read and write
3CA3000
trusted library allocation
page read and write
C16E000
stack
page read and write
3B8C000
trusted library allocation
page read and write
6BE000
heap
page read and write
6CA000
heap
page read and write
1011000
unkown
page write copy
39F1000
trusted library allocation
page read and write
11E8000
heap
page read and write
21EE000
stack
page read and write
3741000
heap
page read and write
1E0000
heap
page read and write
2952000
heap
page read and write
C660000
trusted library allocation
page read and write
3741000
heap
page read and write
1015000
unkown
page readonly
3741000
heap
page read and write
BD0000
stack
page read and write
423F000
direct allocation
page execute and read and write
5AC000
stack
page read and write
1393000
heap
page read and write
6CA000
heap
page read and write
295A000
heap
page read and write
42F7000
direct allocation
page execute and read and write
63C000
stack
page read and write
2950000
heap
page read and write
710000
heap
page read and write
BEF000
stack
page read and write
3EC3000
trusted library allocation
page read and write
12A56000
trusted library allocation
page read and write
1381000
heap
page read and write
3741000
heap
page read and write
6CA000
heap
page read and write
6C44D000
unkown
page readonly
F41000
unkown
page execute read
3741000
heap
page read and write
352F000
stack
page read and write
1406000
heap
page read and write
DF8000
heap
page read and write
3741000
heap
page read and write
75E000
stack
page read and write
6E0000
heap
page read and write
3C4A000
trusted library allocation
page read and write
6E8000
heap
page read and write
3741000
heap
page read and write
141D000
heap
page read and write
56C000
stack
page read and write
1F737000
trusted library allocation
page read and write
3C1D000
trusted library allocation
page read and write
1094000
heap
page read and write
F40000
unkown
page readonly
3741000
heap
page read and write
3AF1000
trusted library allocation
page read and write
1355000
heap
page read and write
3741000
heap
page read and write
3CF1000
trusted library allocation
page read and write
3741000
heap
page read and write
421A000
direct allocation
page execute and read and write
2A0F000
stack
page read and write
2955000
heap
page read and write
295C000
heap
page read and write
A57000
heap
page read and write
3CF1000
trusted library allocation
page read and write
4540000
heap
page read and write
34A0000
heap
page read and write
3BA5000
trusted library allocation
page read and write
C5F0000
trusted library allocation
page read and write
295A000
heap
page read and write
288F000
stack
page read and write
5B4000
heap
page read and write
400000
unkown
page readonly
3741000
heap
page read and write
431A000
direct allocation
page execute and read and write
6BE000
heap
page read and write
B7E000
heap
page read and write
19A000
stack
page read and write
3D84C000
stack
page read and write
1015000
unkown
page readonly
3741000
heap
page read and write
6BE000
heap
page read and write
138E000
heap
page read and write
6C650000
unkown
page read and write
6BA000
heap
page read and write
59F000
heap
page read and write
3741000
heap
page read and write
2960000
heap
page read and write
3B98000
trusted library allocation
page read and write
FCF000
stack
page read and write
3741000
heap
page read and write
6C60F000
unkown
page readonly
3B8E000
trusted library allocation
page read and write
48EE000
stack
page read and write
40F0000
direct allocation
page read and write
1003000
unkown
page readonly
C8AF000
direct allocation
page readonly
96F000
stack
page read and write
1355000
heap
page read and write
3752000
heap
page read and write
13D6000
heap
page read and write
40B000
unkown
page read and write
3741000
heap
page read and write
3741000
heap
page read and write
2959000
heap
page read and write
3741000
heap
page read and write
2952000
heap
page read and write
295B000
heap
page read and write
3741000
heap
page read and write
116E000
heap
page read and write
3741000
heap
page read and write
3CF1000
trusted library allocation
page read and write
3158B000
trusted library allocation
page read and write
BDD000
stack
page read and write
680000
heap
page read and write
1392000
heap
page read and write
3741000
heap
page read and write
40B000
unkown
page write copy
6BE000
heap
page read and write
BC9F000
stack
page read and write
6BE000
heap
page read and write
5FE000
stack
page read and write
CCF6000
trusted library allocation
page read and write
C130000
remote allocation
page read and write
3AF1000
trusted library allocation
page read and write
295E000
heap
page read and write
3AC3000
trusted library allocation
page read and write
6CA000
heap
page read and write
B89E000
stack
page read and write
1355000
heap
page read and write
100D000
unkown
page write copy
3741000
heap
page read and write
2958000
heap
page read and write
32F0000
heap
page read and write
2890000
heap
page read and write
C90E000
trusted library allocation
page read and write
3AF1000
trusted library allocation
page read and write
3741000
heap
page read and write
32AE000
stack
page read and write
1388000
heap
page read and write
8C0000
heap
page read and write
DD0000
heap
page read and write
EE0000
heap
page read and write
6E0000
heap
page read and write
3741000
heap
page read and write
3740000
heap
page read and write
401000
unkown
page execute read
510000
heap
page read and write
3B84000
trusted library allocation
page read and write
F20000
trusted library allocation
page read and write
3741000
heap
page read and write
3741000
heap
page read and write
3741000
heap
page read and write
3741000
heap
page read and write
3BE4000
trusted library allocation
page read and write
13D4000
heap
page read and write
138C000
heap
page read and write
2959000
heap
page read and write
13DA000
heap
page read and write
452F000
stack
page read and write
3741000
heap
page read and write
56E000
stack
page read and write
3741000
heap
page read and write
3AF1000
trusted library allocation
page read and write
3AF1000
trusted library allocation
page read and write
3AF1000
trusted library allocation
page read and write
C58F000
trusted library allocation
page read and write
4128000
direct allocation
page execute and read and write
There are 530 hidden memdumps, click here to show them.