IOC Report
BBV.exe

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps642010010Label

Files

File Path
Type
Category
Malicious
Download
BBV.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BBV.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpADA0.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\LJbLJCfEB.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\LJbLJCfEB.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xda580121, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\LJbLJCfEB.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0rnbc51c.jxy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bzzefhp2.cxe.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dzedqoqh.5yt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hcatoemc.b0y.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpBF34.tmp
XML 1.0 document, ASCII text
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\BBV.exe
"C:\Users\user\Desktop\BBV.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LJbLJCfEB.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LJbLJCfEB" /XML "C:\Users\user\AppData\Local\Temp\tmpADA0.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\LJbLJCfEB.exe
C:\Users\user\AppData\Roaming\LJbLJCfEB.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LJbLJCfEB" /XML "C:\Users\user\AppData\Local\Temp\tmpBF34.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://www.office.com/X
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.office.com/T
unknown
https://api.telegram.org
unknown
https://api.telegram.org/bot
unknown
https://www.ecosia.org/newtab/v20Y&
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:226546%0D%0ADate%20and%20Time:%2028/03/2025%20/%2012:02:20%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20226546%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:226546%0D%0ADate%20and%20Time:%2028/03/2025%20/%2011:42:36%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20226546%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://crl.ver)
unknown
https://ac.ecosia.org?q=
unknown
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://reallyfreegeoip.org/xml/45.92.229.138$
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://varders.kozow.com:8081
unknown
http://aborters.duckdns.org:8081
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:226546%0D%0ADate%20a
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
https://chrome.google.com/webstore?hl=enlBAr
unknown
https://www.office.com/lBAr
unknown
http://checkip.dyndns.org/
193.122.6.168
https://g.live.com/odclientsettings/Prod-C:
unknown
http://anotherarmy.dns.army:8081
unknown
https://duckduckgo.com/chrome_newtabv20
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://checkip.dyndns.org/q
unknown
https://g.live.com/odclientsettings/ProdV2-C:
unknown
https://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org/xml/45.92.229.138
104.21.48.1
https://chrome.google.com/webstore?hl=enT
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://chrome.google.com/webstore?hl=enX
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://gemini.google.com/app?q=
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 30 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
104.21.48.1
api.telegram.org
149.154.167.220
checkip.dyndns.com
193.122.6.168
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
104.21.48.1
reallyfreegeoip.org
United States
149.154.167.220
api.telegram.org
United Kingdom
193.122.6.168
checkip.dyndns.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
412A000
trusted library allocation
page read and write
malicious
2EF1000
trusted library allocation
page read and write
malicious
42F000
remote allocation
page execute and read and write
malicious
4479000
trusted library allocation
page read and write
malicious
3371000
trusted library allocation
page read and write
malicious
6B37000
trusted library allocation
page read and write
69CE000
stack
page read and write
5620000
heap
page read and write
B2CE000
stack
page read and write
2DD217E000
unkown
page readonly
2DD3F7E000
unkown
page readonly
769E000
stack
page read and write
1ABD0AFB000
heap
page read and write
6B0A000
trusted library allocation
page read and write
3458000
trusted library allocation
page read and write
28C1000
trusted library allocation
page read and write
2DD2B7E000
unkown
page readonly
43DA000
trusted library allocation
page read and write
A2F000
heap
page read and write
1E0000
heap
page read and write
1280000
trusted library allocation
page read and write
4205000
trusted library allocation
page read and write
32B0000
heap
page read and write
2D40000
trusted library allocation
page read and write
5948000
heap
page read and write
3F5C000
trusted library allocation
page read and write
6BA0000
heap
page read and write
7A5E000
stack
page read and write
BA8F000
stack
page read and write
4255000
trusted library allocation
page read and write
546E000
stack
page read and write
26C8000
trusted library allocation
page read and write
1ABD0AC2000
heap
page read and write
1ABCC590000
trusted library section
page readonly
4440000
trusted library allocation
page read and write
454F000
trusted library allocation
page read and write
2D86000
trusted library allocation
page read and write
1ABCBC00000
heap
page read and write
1ABCB48F000
heap
page read and write
11EE000
stack
page read and write
1ABD0C90000
trusted library allocation
page read and write
30DF000
trusted library allocation
page read and write
3083000
trusted library allocation
page read and write
1ABD0B02000
heap
page read and write
590000
heap
page read and write
1ABCB502000
heap
page read and write
12B2000
trusted library allocation
page read and write
1ABD0A1F000
heap
page read and write
636E000
stack
page read and write
7650000
trusted library allocation
page execute and read and write
2F5A000
trusted library allocation
page read and write
5AE6000
trusted library allocation
page read and write
31FA000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page execute and read and write
1ABD09A0000
trusted library allocation
page read and write
326E000
stack
page read and write
E59000
stack
page read and write
5530000
trusted library allocation
page read and write
592D000
stack
page read and write
40E9000
trusted library allocation
page read and write
2DA6000
trusted library allocation
page read and write
128D000
trusted library allocation
page execute and read and write
2FA8000
trusted library allocation
page read and write
3560000
trusted library allocation
page read and write
31B2000
trusted library allocation
page read and write
3076000
trusted library allocation
page read and write
52E0000
heap
page read and write
4F80000
heap
page execute and read and write
5076000
trusted library allocation
page read and write
1ABD0A00000
heap
page read and write
2537000
trusted library allocation
page execute and read and write
419000
remote allocation
page execute and read and write
672F000
stack
page read and write
F7D000
trusted library allocation
page execute and read and write
52D0000
heap
page read and write
7A9D000
stack
page read and write
352A000
trusted library allocation
page read and write
30B4000
trusted library allocation
page read and write
3F5A000
trusted library allocation
page read and write
16D2000
trusted library allocation
page read and write
5ADF000
stack
page read and write
2526000
trusted library allocation
page execute and read and write
2D14000
trusted library allocation
page read and write
3522000
trusted library allocation
page read and write
68AE000
stack
page read and write
2500000
trusted library allocation
page read and write
3428000
trusted library allocation
page read and write
5840000
trusted library allocation
page execute and read and write
1ABCBD1A000
heap
page read and write
36C2000
trusted library allocation
page read and write
4D70000
heap
page read and write
1ABCC580000
trusted library section
page readonly
546E000
stack
page read and write
30F0000
heap
page read and write
6FE0000
heap
page read and write
FFE000
heap
page read and write
2F94000
trusted library allocation
page read and write
BE60000
trusted library allocation
page read and write
5050000
trusted library allocation
page read and write
2A00000
heap
page read and write
2BEC000
stack
page read and write
F74000
trusted library allocation
page read and write
2DF0000
heap
page read and write
38C9000
trusted library allocation
page read and write
1ABCB473000
heap
page read and write
6B40000
trusted library allocation
page read and write
12B5000
trusted library allocation
page execute and read and write
4071000
trusted library allocation
page read and write
36B9000
trusted library allocation
page read and write
408000
remote allocation
page execute and read and write
5E5E000
stack
page read and write
1ABCBB70000
trusted library section
page read and write
B06E000
stack
page read and write
FBA000
stack
page read and write
6A50000
trusted library allocation
page execute and read and write
1ABCB400000
heap
page read and write
2D50000
heap
page execute and read and write
2C00000
heap
page execute and read and write
4C80000
trusted library allocation
page read and write
FF0000
heap
page read and write
565E000
heap
page read and write
2DD2479000
stack
page read and write
5112000
trusted library allocation
page read and write
13CD000
trusted library allocation
page execute and read and write
46D5000
trusted library allocation
page read and write
1273000
trusted library allocation
page execute and read and write
BB9000
stack
page read and write
4D10000
trusted library allocation
page execute and read and write
127D000
trusted library allocation
page execute and read and write
F73000
trusted library allocation
page execute and read and write
4612000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
1ABD09C0000
trusted library allocation
page read and write
6DB0000
trusted library allocation
page execute and read and write
F96000
trusted library allocation
page execute and read and write
308A000
trusted library allocation
page read and write
59AE000
stack
page read and write
2DD207E000
stack
page read and write
289C000
stack
page read and write
6D34000
trusted library allocation
page read and write
12AA000
trusted library allocation
page execute and read and write
30A5000
trusted library allocation
page read and write
12D0000
trusted library allocation
page read and write
1ABD0A2C000
heap
page read and write
B3CE000
stack
page read and write
2522000
trusted library allocation
page read and write
13F2000
trusted library allocation
page read and write
136E000
stack
page read and write
687E000
heap
page read and write
6D50000
trusted library allocation
page execute and read and write
33E7000
trusted library allocation
page read and write
ACED000
stack
page read and write
3070000
trusted library allocation
page read and write
2DD367E000
stack
page read and write
3687000
trusted library allocation
page read and write
FFA000
heap
page read and write
1094000
heap
page read and write
2DD257E000
unkown
page readonly
2BF0000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
1ABD09C1000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
50F0000
heap
page read and write
9E0000
heap
page read and write
466F000
trusted library allocation
page read and write
FD0000
trusted library allocation
page execute and read and write
1ABD09B0000
trusted library allocation
page read and write
C2E000
stack
page read and write
31FF000
trusted library allocation
page read and write
1750000
trusted library allocation
page read and write
1ABD0920000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page execute and read and write
4C41000
trusted library allocation
page read and write
680F000
stack
page read and write
425000
remote allocation
page execute and read and write
1ABD0C80000
trusted library allocation
page read and write
123E000
stack
page read and write
64AE000
stack
page read and write
41D3000
trusted library allocation
page read and write
3414000
trusted library allocation
page read and write
319B000
trusted library allocation
page read and write
3F82000
trusted library allocation
page read and write
2DA4000
trusted library allocation
page read and write
417000
remote allocation
page execute and read and write
47F000
stack
page read and write
6FF4000
heap
page read and write
40A3000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
2F9C000
trusted library allocation
page read and write
4C60000
trusted library allocation
page read and write
1ABD09E0000
trusted library allocation
page read and write
323E000
trusted library allocation
page read and write
2DD2BFE000
stack
page read and write
8F7000
stack
page read and write
4523000
trusted library allocation
page read and write
16F0000
trusted library allocation
page read and write
686E000
stack
page read and write
660F000
heap
page read and write
1ABCC5B0000
trusted library section
page readonly
AE2E000
stack
page read and write
B43E000
stack
page read and write
34F9000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
1ABCB513000
heap
page read and write
12F7000
stack
page read and write
1033000
heap
page read and write
1ABD0D50000
remote allocation
page read and write
A32000
heap
page read and write
2C11000
trusted library allocation
page read and write
5AF6000
trusted library allocation
page read and write
2DD307E000
stack
page read and write
1ABD0AC0000
heap
page read and write
2DD2E7E000
unkown
page readonly
13C3000
trusted library allocation
page execute and read and write
2F63000
trusted library allocation
page read and write
6B06000
trusted library allocation
page read and write
4C00000
heap
page read and write
2DD2EFE000
stack
page read and write
18C0000
heap
page read and write
5963000
heap
page read and write
1ABD09E0000
trusted library allocation
page read and write
2FA0000
trusted library allocation
page read and write
B94E000
stack
page read and write
1ABCB4B1000
heap
page read and write
41EF000
trusted library allocation
page read and write
307B000
trusted library allocation
page read and write
2DD1F7E000
unkown
page readonly
3420000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page execute and read and write
1ABCBD13000
heap
page read and write
2D81000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
36BE000
trusted library allocation
page read and write
508E000
stack
page read and write
4D60000
trusted library allocation
page execute and read and write
5014000
heap
page read and write
347B000
trusted library allocation
page read and write
E60000
heap
page read and write
1ABD0AD5000
heap
page read and write
55F0000
heap
page read and write
71A0000
trusted library allocation
page read and write
33C1000
trusted library allocation
page read and write
1ABD09C0000
trusted library allocation
page read and write
30F3000
trusted library allocation
page read and write
347D000
trusted library allocation
page read and write
4447000
trusted library allocation
page read and write
4C66000
trusted library allocation
page read and write
5010000
heap
page read and write
2DD357E000
unkown
page readonly
4C85000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
640E000
stack
page read and write
35DC000
trusted library allocation
page read and write
13B0000
trusted library allocation
page read and write
3572000
trusted library allocation
page read and write
65AE000
stack
page read and write
2CFB000
heap
page read and write
568D000
stack
page read and write
6B90000
heap
page read and write
2D7E000
trusted library allocation
page read and write
CAF000
unkown
page read and write
3FC0000
trusted library allocation
page read and write
5B90000
heap
page read and write
2D20000
heap
page read and write
1ABD0990000
trusted library allocation
page read and write
130A000
heap
page read and write
FA7000
trusted library allocation
page execute and read and write
5AEA000
trusted library allocation
page read and write
5AFD000
trusted library allocation
page read and write
5054000
trusted library allocation
page read and write
411000
remote allocation
page execute and read and write
3FF5000
trusted library allocation
page read and write
40CF000
trusted library allocation
page read and write
33E3000
trusted library allocation
page read and write
1ABCBD02000
heap
page read and write
5AF8000
trusted library allocation
page read and write
BC0B000
stack
page read and write
3078000
trusted library allocation
page read and write
279B000
stack
page read and write
12A6000
trusted library allocation
page execute and read and write
1ABD0AF4000
heap
page read and write
10A8000
heap
page read and write
3160000
heap
page execute and read and write
6D30000
trusted library allocation
page read and write
59B0000
heap
page execute and read and write
3676000
trusted library allocation
page read and write
315A000
trusted library allocation
page read and write
1314000
heap
page read and write
12B7000
trusted library allocation
page execute and read and write
1ABCC570000
trusted library section
page readonly
406000
remote allocation
page execute and read and write
61EF000
stack
page read and write
44F1000
trusted library allocation
page read and write
660E000
stack
page read and write
1ABCB4A2000
heap
page read and write
33DB000
trusted library allocation
page read and write
250D000
trusted library allocation
page execute and read and write
1ABD0C33000
trusted library allocation
page read and write
AAAE000
stack
page read and write
3528000
trusted library allocation
page read and write
646E000
stack
page read and write
30A9000
trusted library allocation
page read and write
1ABD0AFD000
heap
page read and write
531E000
stack
page read and write
2F4D000
trusted library allocation
page read and write
E0E000
stack
page read and write
6ACE000
stack
page read and write
2B0E000
stack
page read and write
6CB0000
trusted library allocation
page execute and read and write
1ABCB47D000
heap
page read and write
1ABD0A0F000
heap
page read and write
1274000
trusted library allocation
page read and write
980000
heap
page read and write
43E000
stack
page read and write
71C0000
trusted library allocation
page execute and read and write
4FDC000
stack
page read and write
5B00000
trusted library section
page readonly
52C5000
heap
page read and write
6A40000
trusted library allocation
page read and write
140000
heap
page read and write
2DD377E000
unkown
page readonly
3130000
trusted library allocation
page read and write
41A5000
trusted library allocation
page read and write
6BB4000
heap
page read and write
10CE000
stack
page read and write
480000
heap
page read and write
1ABCB529000
heap
page read and write
6C90000
trusted library allocation
page read and write
1ABCB443000
heap
page read and write
1437000
heap
page read and write
31A5000
trusted library allocation
page read and write
5770000
trusted library allocation
page read and write
676E000
stack
page read and write
3140000
heap
page read and write
34F1000
trusted library allocation
page read and write
35F6000
trusted library allocation
page read and write
442000
remote allocation
page execute and read and write
1270000
trusted library allocation
page read and write
5340000
heap
page execute and read and write
2D60000
trusted library allocation
page read and write
521E000
stack
page read and write
2520000
trusted library allocation
page read and write
2DD337E000
stack
page read and write
AF6E000
stack
page read and write
29F0000
trusted library allocation
page read and write
6A80000
trusted library allocation
page execute and read and write
2DD267B000
stack
page read and write
3156000
trusted library allocation
page read and write
1ABD0A54000
heap
page read and write
307E000
trusted library allocation
page read and write
1290000
heap
page read and write
13FA000
trusted library allocation
page execute and read and write
35FF000
trusted library allocation
page read and write
5082000
trusted library allocation
page read and write
13F6000
trusted library allocation
page execute and read and write
31F5000
trusted library allocation
page read and write
317F000
trusted library allocation
page read and write
5E70000
heap
page read and write
595000
heap
page read and write
2DD2AFE000
stack
page read and write
400000
remote allocation
page execute and read and write
3154000
trusted library allocation
page read and write
28B0000
heap
page execute and read and write
B53F000
stack
page read and write
2DD29FE000
stack
page read and write
2D7A000
trusted library allocation
page read and write
6630000
heap
page read and write
1ABCB4FF000
heap
page read and write
B98E000
stack
page read and write
52C0000
heap
page read and write
1ABCBB60000
trusted library allocation
page read and write
3F19000
trusted library allocation
page read and write
173E000
stack
page read and write
51E0000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
1ABCC480000
trusted library allocation
page read and write
6CC0000
trusted library allocation
page execute and read and write
1ABCB3D0000
heap
page read and write
2DD287B000
stack
page read and write
F9A000
trusted library allocation
page execute and read and write
564B000
heap
page read and write
4FF0000
trusted library allocation
page read and write
51F0000
heap
page read and write
51CD000
stack
page read and write
1ABCBC02000
heap
page read and write
5750000
trusted library section
page readonly
1024000
heap
page read and write
1ABD0D50000
remote allocation
page read and write
1ABCB413000
heap
page read and write
F92000
trusted library allocation
page read and write
1CF000
unkown
page read and write
1260000
trusted library allocation
page read and write
4224000
trusted library allocation
page read and write
1ABD0CE0000
trusted library allocation
page read and write
1ABCBD1A000
heap
page read and write
4D30000
trusted library allocation
page read and write
572E000
stack
page read and write
45FD000
trusted library allocation
page read and write
3237000
trusted library allocation
page read and write
1ABCC240000
trusted library allocation
page read and write
2969000
trusted library allocation
page read and write
AF2E000
stack
page read and write
4CC0000
trusted library allocation
page read and write
2D1C000
stack
page read and write
FA2000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
16CE000
stack
page read and write
1435000
heap
page read and write
2D6E000
trusted library allocation
page read and write
14E0000
trusted library allocation
page execute and read and write
5F0000
heap
page read and write
2DD2C7E000
unkown
page readonly
2DD317E000
unkown
page readonly
3234000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
9D0000
heap
page read and write
1ABD0A61000
heap
page read and write
2C5A000
trusted library allocation
page read and write
5270000
trusted library allocation
page execute and read and write
2504000
trusted library allocation
page read and write
269E000
stack
page read and write
35E3000
trusted library allocation
page read and write
6E40000
heap
page read and write
2BF5000
trusted library allocation
page read and write
4EF8000
trusted library allocation
page read and write
55DD000
stack
page read and write
4D00000
heap
page read and write
5100000
trusted library allocation
page execute and read and write
6810000
heap
page read and write
720000
heap
page read and write
46A3000
trusted library allocation
page read and write
9F0000
heap
page read and write
5B0E000
trusted library section
page readonly
3530000
trusted library allocation
page read and write
5830000
trusted library allocation
page read and write
5D3E000
stack
page read and write
2532000
trusted library allocation
page read and write
6C8E000
stack
page read and write
3205000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
5926000
heap
page read and write
4650000
trusted library allocation
page read and write
12E0000
heap
page read and write
6CA0000
trusted library allocation
page read and write
5690000
heap
page execute and read and write
6A70000
trusted library allocation
page execute and read and write
A25000
heap
page read and write
1135000
heap
page read and write
1070000
heap
page read and write
1ABCBF01000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
32AE000
stack
page read and write
E65000
heap
page read and write
26B0000
heap
page read and write
3FF2000
trusted library allocation
page read and write
2D8D000
trusted library allocation
page read and write
17B0000
trusted library allocation
page read and write
4C24000
trusted library allocation
page read and write
B70E000
stack
page read and write
4C46000
trusted library allocation
page read and write
3526000
trusted library allocation
page read and write
9FE000
heap
page read and write
4399000
trusted library allocation
page read and write
33EB000
trusted library allocation
page read and write
1400000
heap
page read and write
6B20000
trusted library allocation
page execute and read and write
594B000
heap
page read and write
317A000
trusted library allocation
page read and write
1ABD0AEE000
heap
page read and write
3C19000
trusted library allocation
page read and write
1ABCBC15000
heap
page read and write
4CF0000
heap
page read and write
6B80000
trusted library allocation
page execute and read and write
59C0000
heap
page read and write
542D000
stack
page read and write
14BD000
heap
page read and write
6871000
heap
page read and write
426B000
trusted library allocation
page read and write
2DD33FE000
stack
page read and write
ABAF000
stack
page read and write
F80000
trusted library allocation
page read and write
4D20000
trusted library allocation
page read and write
1ABD0C80000
trusted library allocation
page read and write
3504000
trusted library allocation
page read and write
2DD3EFE000
stack
page read and write
3F97000
trusted library allocation
page read and write
368C000
trusted library allocation
page read and write
7A1E000
stack
page read and write
12A0000
trusted library allocation
page read and write
2510000
trusted library allocation
page read and write
650F000
stack
page read and write
35FA000
trusted library allocation
page read and write
1316000
heap
page read and write
580000
heap
page read and write
3FC7000
trusted library allocation
page read and write
361F000
trusted library allocation
page read and write
29EE000
stack
page read and write
417D000
trusted library allocation
page read and write
30F1000
trusted library allocation
page read and write
3685000
trusted library allocation
page read and write
3535000
trusted library allocation
page read and write
423000
remote allocation
page execute and read and write
2D72000
trusted library allocation
page read and write
307E000
trusted library allocation
page read and write
2D66000
trusted library allocation
page read and write
3EF1000
trusted library allocation
page read and write
1ABCB4A0000
heap
page read and write
FE0000
trusted library allocation
page read and write
5671000
heap
page read and write
9B0000
heap
page read and write
1ABD0AF2000
heap
page read and write
2DD237E000
unkown
page readonly
13E0000
trusted library allocation
page read and write
4117000
trusted library allocation
page read and write
1ABD0CF0000
trusted library allocation
page read and write
670E000
stack
page read and write
5760000
heap
page read and write
5730000
trusted library section
page read and write
1ABD0C00000
trusted library allocation
page read and write
38C1000
trusted library allocation
page read and write
407000
remote allocation
page execute and read and write
713E000
stack
page read and write
6DC0000
heap
page read and write
661C000
heap
page read and write
442C000
trusted library allocation
page read and write
2F67000
trusted library allocation
page read and write
1380000
trusted library allocation
page read and write
B1BB000
stack
page read and write
1ABD0A95000
heap
page read and write
28A0000
trusted library allocation
page read and write
26A0000
trusted library allocation
page execute and read and write
590A000
heap
page read and write
5A0000
heap
page read and write
34F5000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
342C000
trusted library allocation
page read and write
9FA000
heap
page read and write
4FE0000
trusted library allocation
page read and write
4C70000
trusted library allocation
page read and write
5550000
heap
page read and write
5EE000
stack
page read and write
60EE000
stack
page read and write
5780000
trusted library allocation
page read and write
505B000
trusted library allocation
page read and write
9EA000
heap
page read and write
3424000
trusted library allocation
page read and write
2CAD000
trusted library allocation
page read and write
4193000
trusted library allocation
page read and write
1ABCB42B000
heap
page read and write
290A000
trusted library allocation
page read and write
2F58000
trusted library allocation
page read and write
4D50000
trusted library allocation
page read and write
51A000
stack
page read and write
18E000
unkown
page read and write
3176000
trusted library allocation
page read and write
1ABD0A40000
heap
page read and write
B5D0000
heap
page read and write
AAA000
heap
page read and write
16D7000
trusted library allocation
page execute and read and write
6639000
heap
page read and write
C20000
heap
page read and write
412000
remote allocation
page execute and read and write
6A30000
trusted library allocation
page execute and read and write
13C0000
trusted library allocation
page read and write
5E60000
heap
page read and write
2F90000
trusted library allocation
page read and write
1ABD0D50000
remote allocation
page read and write
5543000
heap
page read and write
10D0000
heap
page read and write
685E000
heap
page read and write
109F000
heap
page read and write
4371000
trusted library allocation
page read and write
6ECE000
stack
page read and write
48B000
heap
page read and write
1760000
heap
page read and write
34F7000
trusted library allocation
page read and write
ACF0000
heap
page read and write
16D5000
trusted library allocation
page execute and read and write
315C000
trusted library allocation
page read and write
1ABD1000000
heap
page read and write
B80E000
stack
page read and write
F57000
stack
page read and write
A9AE000
stack
page read and write
6B50000
trusted library allocation
page read and write
2D07000
trusted library allocation
page read and write
2513000
trusted library allocation
page read and write
6A2F000
stack
page read and write
2F41000
trusted library allocation
page read and write
5540000
heap
page read and write
1ABD09F4000
trusted library allocation
page read and write
DA000
stack
page read and write
13CC000
heap
page read and write
1ABCC560000
trusted library section
page readonly
441000
remote allocation
page execute and read and write
1ABD09F0000
trusted library allocation
page read and write
3157000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
4507000
trusted library allocation
page read and write
4C4D000
trusted library allocation
page read and write
717E000
stack
page read and write
36AF000
trusted library allocation
page read and write
4101000
trusted library allocation
page read and write
1D0000
heap
page read and write
322F000
trusted library allocation
page read and write
3207000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
1ABCC901000
trusted library allocation
page read and write
2DD387B000
stack
page read and write
4C90000
trusted library allocation
page read and write
75C0000
trusted library section
page read and write
2F6B000
trusted library allocation
page read and write
3418000
trusted library allocation
page read and write
65B0000
heap
page read and write
5D40000
trusted library allocation
page read and write
17B4000
trusted library allocation
page read and write
71B0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
2F98000
trusted library allocation
page read and write
B3FF000
stack
page read and write
B5CD000
stack
page read and write
2550000
trusted library allocation
page read and write
B84E000
stack
page read and write
5120000
trusted library allocation
page read and write
2CDE000
stack
page read and write
6D0E000
stack
page read and write
4D3A000
trusted library allocation
page read and write
564E000
heap
page read and write
3076000
trusted library allocation
page read and write
1ABD0B04000
heap
page read and write
12E8000
heap
page read and write
2FD8000
trusted library allocation
page read and write
4FF8000
trusted library allocation
page read and write
2503000
trusted library allocation
page execute and read and write
440000
remote allocation
page execute and read and write
29B5000
trusted library allocation
page read and write
3632000
trusted library allocation
page read and write
3570000
trusted library allocation
page read and write
2B18000
trusted library allocation
page read and write
34FF000
trusted library allocation
page read and write
59DF000
stack
page read and write
2FAC000
trusted library allocation
page read and write
341C000
trusted library allocation
page read and write
12B0000
trusted library allocation
page read and write
3C11000
trusted library allocation
page read and write
4597000
trusted library allocation
page read and write
320C000
trusted library allocation
page read and write
30A1000
trusted library allocation
page read and write
590C000
heap
page read and write
12BB000
trusted library allocation
page execute and read and write
CF7000
stack
page read and write
1ABCB47B000
heap
page read and write
5A00000
heap
page read and write
58DF000
stack
page read and write
4653000
trusted library allocation
page read and write
5090000
trusted library allocation
page read and write
3F71000
trusted library allocation
page read and write
2FA4000
trusted library allocation
page read and write
2DD189B000
stack
page read and write
6B00000
trusted library allocation
page read and write
BEE000
stack
page read and write
3143000
heap
page read and write
C6E000
unkown
page read and write
2DD2A7E000
unkown
page readonly
F8D000
trusted library allocation
page execute and read and write
4C64000
trusted library allocation
page read and write
1ABD09B0000
trusted library allocation
page read and write
4D0C000
stack
page read and write
3091000
trusted library allocation
page read and write
2DD31FE000
stack
page read and write
506E000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
532B000
stack
page read and write
17E8000
trusted library allocation
page read and write
4581000
trusted library allocation
page read and write
1ABD0AC4000
heap
page read and write
1ABCB45B000
heap
page read and write
51F3000
heap
page read and write
367A000
trusted library allocation
page read and write
2CF0000
heap
page read and write
6D80000
trusted library allocation
page read and write
5CFF000
stack
page read and write
16D0000
trusted library allocation
page read and write
779E000
stack
page read and write
622E000
stack
page read and write
12A2000
trusted library allocation
page read and write
B7D000
stack
page read and write
6CC0000
trusted library allocation
page execute and read and write
B4CF000
stack
page read and write
66EE000
stack
page read and write
F70000
trusted library allocation
page read and write
43DC000
trusted library allocation
page read and write
3242000
trusted library allocation
page read and write
33CD000
trusted library allocation
page read and write
3074000
trusted library allocation
page read and write
9D000
stack
page read and write
139A000
heap
page read and write
2DD2F7E000
unkown
page readonly
1130000
heap
page read and write
BD0C000
stack
page read and write
4417000
trusted library allocation
page read and write
43F1000
trusted library allocation
page read and write
507D000
trusted library allocation
page read and write
4625000
trusted library allocation
page read and write
13C4000
trusted library allocation
page read and write
6A90000
trusted library allocation
page execute and read and write
4472000
trusted library allocation
page read and write
561D000
heap
page read and write
2DD2DFE000
stack
page read and write
36B7000
trusted library allocation
page read and write
17D0000
heap
page read and write
1ABCB4B5000
heap
page read and write
694D000
stack
page read and write
1ABCB479000
heap
page read and write
6B8E000
stack
page read and write
1390000
heap
page read and write
57ED000
stack
page read and write
4439000
trusted library allocation
page read and write
4D22000
trusted library allocation
page read and write
1ABCBD00000
heap
page read and write
2DD1E77000
stack
page read and write
6637000
heap
page read and write
498000
heap
page read and write
253B000
trusted library allocation
page execute and read and write
4D73000
heap
page read and write
2DD297E000
unkown
page readonly
1ABD0A4D000
heap
page read and write
41D0000
trusted library allocation
page read and write
692E000
stack
page read and write
424000
remote allocation
page execute and read and write
418000
remote allocation
page execute and read and write
2DD347E000
unkown
page readonly
70FE000
stack
page read and write
1429000
heap
page read and write
1ABCB495000
heap
page read and write
3FAC000
trusted library allocation
page read and write
2DD397E000
unkown
page readonly
14EF000
heap
page read and write
FC0000
trusted library allocation
page read and write
5D50000
trusted library allocation
page execute and read and write
1ABCB3F0000
heap
page read and write
1ABD0B0A000
heap
page read and write
4087000
trusted library allocation
page read and write
1ABCB6D0000
heap
page read and write
29B9000
trusted library allocation
page read and write
5A10000
heap
page read and write
35EC000
trusted library allocation
page read and write
13ED000
trusted library allocation
page execute and read and write
2530000
trusted library allocation
page read and write
14F0000
heap
page read and write
B2FD000
stack
page read and write
1370000
heap
page read and write
5668000
heap
page read and write
3070000
trusted library allocation
page read and write
1ABCB4A7000
heap
page read and write
30AF000
trusted library allocation
page read and write
4402000
trusted library allocation
page read and write
3096000
trusted library allocation
page read and write
3625000
trusted library allocation
page read and write
4437000
trusted library allocation
page read and write
18BC000
stack
page read and write
4C20000
trusted library allocation
page read and write
FAB000
trusted library allocation
page execute and read and write
3410000
trusted library allocation
page read and write
4C3E000
trusted library allocation
page read and write
919000
stack
page read and write
13F0000
trusted library allocation
page read and write
5020000
heap
page read and write
FB0000
heap
page read and write
BE4E000
stack
page read and write
6A60000
trusted library allocation
page read and write
31AC000
trusted library allocation
page read and write
13D0000
heap
page read and write
36B5000
trusted library allocation
page read and write
252A000
trusted library allocation
page execute and read and write
68EF000
stack
page read and write
402000
remote allocation
page execute and read and write
17AE000
stack
page read and write
632E000
stack
page read and write
2DD277E000
unkown
page readonly
884000
unkown
page readonly
6D70000
trusted library allocation
page read and write
D2E000
stack
page read and write
BD4D000
stack
page read and write
35D8000
trusted library allocation
page read and write
3239000
trusted library allocation
page read and write
7D0000
unkown
page readonly
30A7000
trusted library allocation
page read and write
1740000
trusted library allocation
page execute and read and write
1ABD0D00000
trusted library allocation
page read and write
ABED000
stack
page read and write
362C000
trusted library allocation
page read and write
2DD327E000
unkown
page readonly
1030000
heap
page read and write
4C2B000
trusted library allocation
page read and write
10C8000
heap
page read and write
308E000
trusted library allocation
page read and write
413000
remote allocation
page execute and read and write
5071000
trusted library allocation
page read and write
582D000
stack
page read and write
2DD227C000
stack
page read and write
E4E000
stack
page read and write
29C4000
trusted library allocation
page read and write
437000
remote allocation
page execute and read and write
583D000
trusted library allocation
page read and write
1ABCC920000
trusted library allocation
page read and write
1ABCC5A0000
trusted library section
page readonly
698F000
stack
page read and write
5AE4000
trusted library allocation
page read and write
5E98000
heap
page read and write
1ABD0930000
trusted library allocation
page read and write
1320000
heap
page read and write
71E2000
trusted library allocation
page read and write
3FB7000
trusted library allocation
page read and write
4684000
trusted library allocation
page read and write
6C00000
heap
page read and write
5900000
heap
page read and write
F83000
trusted library allocation
page read and write
990000
heap
page read and write
4C52000
trusted library allocation
page read and write
31B0000
heap
page read and write
319F000
trusted library allocation
page read and write
259E000
stack
page read and write
6D67000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
316C000
trusted library allocation
page read and write
2FFB000
trusted library allocation
page read and write
1ABCB491000
heap
page read and write
7D2000
unkown
page readonly
2D6B000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
F6E000
stack
page read and write
512A000
trusted library allocation
page read and write
251D000
trusted library allocation
page execute and read and write
33D8000
trusted library allocation
page read and write
596E000
stack
page read and write
16DB000
trusted library allocation
page execute and read and write
46EB000
trusted library allocation
page read and write
4475000
trusted library allocation
page read and write
2DE0000
heap
page read and write
79DE000
stack
page read and write
5790000
trusted library allocation
page execute and read and write
B2BC000
stack
page read and write
309D000
trusted library allocation
page read and write
17C0000
trusted library allocation
page read and write
2EEE000
stack
page read and write
367F000
trusted library allocation
page read and write
F90000
trusted library allocation
page read and write
There are 837 hidden memdumps, click here to show them.