IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\271973\Tenant.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\ProgramData\EBGDAAKJJDAA\CBFCBK
ASCII text, with very long lines (1743), with CRLF line terminators
modified
C:\ProgramData\EBGDAAKJJDAA\CBKJJJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\EBGDAAKJJDAA\CFCFHJ
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EBGDAAKJJDAA\CFCFHJ-shm
data
dropped
C:\ProgramData\EBGDAAKJJDAA\CGDHIE
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\EBGDAAKJJDAA\DHCBGD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\EBGDAAKJJDAA\HJJEHJ
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\EBGDAAKJJDAA\HJKECA
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\EBGDAAKJJDAA\HJKECA-shm
data
dropped
C:\ProgramData\EBGDAAKJJDAA\KEBKJD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EBGDAAKJJDAA\KKFCFB
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Tenant.pif_be3b5fd70a97d20232ec5eb2c2b41225cfbc6c_d7523e16_bb464c9d-213e-4933-a378-eaf22e7b9825\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC730.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Aug 29 18:50:03 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCB19.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCB49.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\76561199761128941[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\271973\C
data
dropped
C:\Users\user\AppData\Local\Temp\Cashiers
ASCII text, with very long lines (860), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Cashiers.bat (copy)
ASCII text, with very long lines (860), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Enhance
data
dropped
C:\Users\user\AppData\Local\Temp\Everything
data
dropped
C:\Users\user\AppData\Local\Temp\Kept
data
dropped
C:\Users\user\AppData\Local\Temp\Neo
data
dropped
C:\Users\user\AppData\Local\Temp\Para
data
dropped
C:\Users\user\AppData\Local\Temp\Say
data
dropped
C:\Users\user\AppData\Local\Temp\Thousands
data
dropped
C:\Users\user\AppData\Local\Temp\Ventures
data
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k move Cashiers Cashiers.bat & Cashiers.bat & exit
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 271973
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Ventures + ..\Thousands + ..\Enhance + ..\Kept + ..\Everything + ..\Say C
malicious
C:\Users\user\AppData\Local\Temp\271973\Tenant.pif
Tenant.pif C
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa opssvc"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\findstr.exe
findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
C:\Windows\SysWOW64\findstr.exe
findstr /V "NorwegianLivedJerseyRelaxation" Para
C:\Windows\SysWOW64\choice.exe
choice /d y /t 5
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 3264
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://t.me/iyigunl
unknown
malicious
https://steamcommunity.com/profiles/76561199761128941
23.197.127.21
malicious
https://94.130.188.148/nss3.dll
94.130.188.148
malicious
https://94.130.188.148/vcruntime140.dllCz
unknown
malicious
https://94.130.188.148/sqlr.dll
94.130.188.148
malicious
https://94.130.188.148/
94.130.188.148
malicious
https://steamcommunity.com/profiles/765611997611289410
unknown
malicious
https://steamcommunity.com/profiles/76561199761128941/badges
unknown
malicious
https://94.130.188.148/vcruntime140.dll
94.130.188.148
malicious
https://94.130.188.148/freebl3.dll
94.130.188.148
malicious
https://steamcommunity.com/profiles/76561199761128941b
unknown
malicious
https://94.130.188.148/mozglue.dll
94.130.188.148
malicious
https://94.130.188.148/softokn3.dll
94.130.188.148
malicious
http://stadiatechnologies.com/
95.164.119.162
malicious
https://steamcommunity.com/profiles/76561199761128941/inventory/
unknown
malicious
https://94.130.188.148/nss3.dllKEBKJD-journal
unknown
malicious
https://t.me/iyigunlhellosqlr.dllsqlite3.dllIn
unknown
malicious
https://94.130.188.148/sqlr.dll1
unknown
malicious
https://94.130.188.148/msvcp140.dll
94.130.188.148
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=iyaDfxhc
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://www.autoitscript.com/autoit3/
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
http://stadiatechnologies.comntent-Disposition:
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=_D2Bg4UEaFxK&l=en
unknown
http://www.autoitscript.com/autoit3/J
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://mozilla.org0/
unknown
http://stadiatechnologies.com
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199761128941
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
http://94.130.188.14887631f194nt-Disposition:
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://94.130.188.148/softokn3.dlle
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
http://stadiatechnologies.com/J
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
http://stadiatechnologies.alntent-Disposition:
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
http://stadia.188.148HIE
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=5iTMW1V3HmVR&a
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://94.130.188.148
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=cii-
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://94.130.188.148/mozglue.dllq
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=od0wu57c9_w6&l=e
unknown
https://steamcommunity.com/workshop/
unknown
https://store.steampowered.com/legal/
unknown
http://stadiatechnologies.1f19464;
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
http://www.sqlite.org/copyright.html.
unknown
https://94.130.188.148DGI
unknown
https://94.130.188.148JKF
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://94.130.188.148/msvcp140.dllI
unknown
http://upx.sf.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
23.197.127.21
malicious
stadiatechnologies.com
95.164.119.162
malicious
gCmUfnfZJOKMjo.gCmUfnfZJOKMjo
unknown

IPs

IP
Domain
Country
Malicious
95.164.119.162
stadiatechnologies.com
Gibraltar
malicious
23.197.127.21
steamcommunity.com
United States
malicious
94.130.188.148
unknown
Germany
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4522000
trusted library allocation
page read and write
malicious
1790000
trusted library allocation
page read and write
malicious
151000
direct allocation
page execute and read and write
malicious
1511000
trusted library allocation
page read and write
malicious
13CA000
heap
page read and write
malicious
1764000
trusted library allocation
page read and write
malicious
15AE000
trusted library allocation
page read and write
malicious
1510000
trusted library allocation
page read and write
malicious
178F000
trusted library allocation
page read and write
malicious
13E4000
heap
page read and write
3A71000
heap
page read and write
3080000
heap
page read and write
3A71000
heap
page read and write
1E90000
heap
page read and write
57A000
heap
page read and write
12ACB000
stack
page read and write
2803000
heap
page read and write
3A71000
heap
page read and write
AD1D000
stack
page read and write
3015000
heap
page read and write
C512000
direct allocation
page read and write
C3C000
stack
page read and write
1118000
heap
page read and write
3A71000
heap
page read and write
2160000
heap
page read and write
6C85F000
unkown
page readonly
5220000
heap
page read and write
6A5000
heap
page read and write
147A000
heap
page read and write
BD50000
remote allocation
page read and write
27FF000
stack
page read and write
E0C000
stack
page read and write
3A71000
heap
page read and write
1511000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
51DF000
stack
page read and write
301B000
heap
page read and write
AA1000
unkown
page execute read
577000
heap
page read and write
50DF000
stack
page read and write
569000
heap
page read and write
3A71000
heap
page read and write
3A71000
heap
page read and write
33BA000
heap
page read and write
2FEE000
heap
page read and write
4FE000
unkown
page readonly
B69000
unkown
page readonly
3A71000
heap
page read and write
332F000
stack
page read and write
C1A0000
trusted library allocation
page read and write
53A000
heap
page read and write
3A71000
heap
page read and write
140E000
heap
page read and write
3A71000
heap
page read and write
33C6000
heap
page read and write
3A71000
heap
page read and write
A84000
heap
page read and write
11D9000
heap
page read and write
33BE000
heap
page read and write
8BE000
stack
page read and write
152E000
trusted library allocation
page read and write
4DAF000
stack
page read and write
C2D8000
direct allocation
page execute read
337F000
stack
page read and write
3A71000
heap
page read and write
3A71000
heap
page read and write
18E0000
trusted library allocation
page read and write
1110000
heap
page read and write
38B000
direct allocation
page execute and read and write
56B000
heap
page read and write
1765000
trusted library allocation
page read and write
301B000
heap
page read and write
3D5B6000
trusted library allocation
page read and write
2800000
heap
page read and write
C1AF000
trusted library allocation
page read and write
301B000
heap
page read and write
16F1000
trusted library allocation
page read and write
33BD000
heap
page read and write
4E30000
heap
page read and write
3A71000
heap
page read and write
1479000
heap
page read and write
4520000
unclassified section
page read and write
3A71000
heap
page read and write
C927000
trusted library allocation
page read and write
C18F000
stack
page read and write
3A71000
heap
page read and write
1D90000
heap
page read and write
150000
direct allocation
page read and write
400000
unkown
page readonly
3A71000
heap
page read and write
CC6000
heap
page read and write
33AF000
stack
page read and write
B64000
unkown
page write copy
66E000
stack
page read and write
3A72000
heap
page read and write
3A71000
heap
page read and write
C2D1000
direct allocation
page execute read
3A71000
heap
page read and write
A80000
heap
page read and write
4F4000
unkown
page readonly
577000
heap
page read and write
17BD000
trusted library allocation
page read and write
7B9000
stack
page read and write
1133000
heap
page read and write
10E0000
heap
page read and write
16D1000
trusted library allocation
page read and write
280B000
heap
page read and write
1611000
trusted library allocation
page read and write
515F000
stack
page read and write
C680000
trusted library allocation
page read and write
1C8C000
stack
page read and write
510000
heap
page read and write
12D9000
heap
page read and write
F5D000
stack
page read and write
6C89F000
unkown
page write copy
56B000
heap
page read and write
1811000
trusted library allocation
page read and write
2B265000
trusted library allocation
page read and write
3A71000
heap
page read and write
B56000
unkown
page readonly
252FB000
trusted library allocation
page read and write
56B000
heap
page read and write
BD50000
remote allocation
page read and write
C51A000
direct allocation
page readonly
2F76000
heap
page read and write
C4E8000
direct allocation
page readonly
280F000
heap
page read and write
33CE000
heap
page read and write
147A000
heap
page read and write
2804000
heap
page read and write
461000
unkown
page read and write
1611000
trusted library allocation
page read and write
589000
heap
page read and write
2E8F000
stack
page read and write
15D2000
trusted library allocation
page read and write
451E000
stack
page read and write
3A71000
heap
page read and write
4E50000
heap
page read and write
128D000
heap
page read and write
3A71000
heap
page read and write
2BC000
direct allocation
page execute and read and write
1D90000
trusted library allocation
page read and write
33C4000
heap
page read and write
15CD000
trusted library allocation
page read and write
32EE000
stack
page read and write
3A71000
heap
page read and write
2F60000
heap
page read and write
6C89E000
unkown
page read and write
6C8A5000
unkown
page readonly
3013000
heap
page read and write
2F0F000
stack
page read and write
400000
unkown
page readonly
12A42000
trusted library allocation
page read and write
3A71000
heap
page read and write
3A71000
heap
page read and write
355000
direct allocation
page execute and read and write
141D000
heap
page read and write
3A71000
heap
page read and write
3388000
heap
page read and write
B56000
unkown
page readonly
3018000
heap
page read and write
141E000
heap
page read and write
3A71000
heap
page read and write
337E000
stack
page read and write
BD50000
remote allocation
page read and write
33CF000
heap
page read and write
233E000
stack
page read and write
C51F000
direct allocation
page readonly
C288000
trusted library allocation
page read and write
408000
unkown
page readonly
3A71000
heap
page read and write
3A71000
heap
page read and write
2F9E000
stack
page read and write
3A71000
heap
page read and write
3A71000
heap
page read and write
A84000
heap
page read and write
4E2F000
stack
page read and write
3A71000
heap
page read and write
3A71000
heap
page read and write
3A71000
heap
page read and write
BD8E000
stack
page read and write
2FFC000
heap
page read and write
1488000
heap
page read and write
A20000
heap
page read and write
C719000
trusted library allocation
page read and write
1611000
trusted library allocation
page read and write
28C3000
heap
page read and write
408000
unkown
page readonly
3A90000
heap
page read and write
1462000
heap
page read and write
4D2F000
stack
page read and write
2DCC000
stack
page read and write
2F58000
heap
page read and write
3A71000
heap
page read and write
87F000
stack
page read and write
6C6B2000
unkown
page readonly
1E95000
heap
page read and write
9B000
stack
page read and write
1711000
trusted library allocation
page read and write
1511000
trusted library allocation
page read and write
C7C000
stack
page read and write
3A71000
heap
page read and write
3A71000
heap
page read and write
3A71000
heap
page read and write
3A71000
heap
page read and write
22FE000
stack
page read and write
18DA000
trusted library allocation
page read and write
1E9A000
heap
page read and write
B60000
unkown
page read and write
1811000
trusted library allocation
page read and write
C4DD000
direct allocation
page execute read
3A71000
heap
page read and write
577000
heap
page read and write
122F000
heap
page read and write
3A71000
heap
page read and write
12B8A000
trusted library allocation
page read and write
3A71000
heap
page read and write
1CCE000
stack
page read and write
15D7000
trusted library allocation
page read and write
6C6C0000
unkown
page readonly
19B7000
trusted library allocation
page read and write
C680000
trusted library allocation
page read and write
33BA000
heap
page read and write
1430000
heap
page read and write
280F000
heap
page read and write
C298000
trusted library allocation
page read and write
F3E000
stack
page read and write
17E000
direct allocation
page execute and read and write
3380000
heap
page read and write
1650000
trusted library allocation
page read and write
300C000
heap
page read and write
3A71000
heap
page read and write
33CE000
heap
page read and write
12A3B000
trusted library allocation
page read and write
11C4000
heap
page read and write
186000
direct allocation
page execute and read and write
3A71000
heap
page read and write
3A71000
heap
page read and write
2E8C000
stack
page read and write
3A71000
heap
page read and write
278000
direct allocation
page execute and read and write
1471000
heap
page read and write
3A71000
heap
page read and write
2F50000
heap
page read and write
6C6AE000
unkown
page read and write
C285000
trusted library allocation
page read and write
3A71000
heap
page read and write
3A71000
heap
page read and write
56B000
heap
page read and write
3A71000
heap
page read and write
121C000
heap
page read and write
134A2000
trusted library allocation
page read and write
33BA000
heap
page read and write
1D0E000
stack
page read and write
3A71000
heap
page read and write
3A71000
heap
page read and write
2805000
heap
page read and write
401000
unkown
page execute read
3A71000
heap
page read and write
3070000
heap
page read and write
C720000
trusted library allocation
page read and write
3338000
heap
page read and write
519E000
stack
page read and write
F4C000
stack
page read and write
339F000
heap
page read and write
15F8000
trusted library allocation
page read and write
336E000
stack
page read and write
53E000
heap
page read and write
6C621000
unkown
page execute read
1511000
trusted library allocation
page read and write
13FF000
heap
page read and write
1D90000
trusted library allocation
page read and write
182000
direct allocation
page execute and read and write
12A5000
heap
page read and write
3A71000
heap
page read and write
13E4000
heap
page read and write
3A71000
heap
page read and write
3A71000
heap
page read and write
586000
heap
page read and write
1374000
heap
page read and write
163C000
trusted library allocation
page read and write
56B000
heap
page read and write
E10000
heap
page read and write
2FFB000
heap
page read and write
3A71000
heap
page read and write
2FD8000
heap
page read and write
C925000
trusted library allocation
page read and write
B30000
unkown
page readonly
280E000
heap
page read and write
300D000
heap
page read and write
33AD000
heap
page read and write
A40000
trusted library allocation
page read and write
1268D000
trusted library allocation
page read and write
577000
heap
page read and write
14B0000
heap
page read and write
56B000
heap
page read and write
41F000
unkown
page read and write
30A8000
heap
page read and write
577000
heap
page read and write
AA0000
unkown
page readonly
6C69D000
unkown
page readonly
9BF000
stack
page read and write
6C6C1000
unkown
page execute read
2FF2000
heap
page read and write
34BC000
stack
page read and write
3A70000
heap
page read and write
A30000
direct allocation
page execute and read and write
108D000
stack
page read and write
58E000
heap
page read and write
CF0000
heap
page read and write
B51F000
stack
page read and write
1811000
trusted library allocation
page read and write
1DD4000
heap
page read and write
1668000
trusted library allocation
page read and write
2FFF000
stack
page read and write
3A71000
heap
page read and write
3A71000
heap
page read and write
1810000
trusted library allocation
page read and write
303C000
stack
page read and write
3A71000
heap
page read and write
C219000
trusted library allocation
page read and write
577000
heap
page read and write
577000
heap
page read and write
13E4000
heap
page read and write
C436000
direct allocation
page execute read
3A71000
heap
page read and write
C213000
trusted library allocation
page read and write
3A71000
heap
page read and write
1F389000
trusted library allocation
page read and write
1610000
trusted library allocation
page read and write
15AD000
trusted library allocation
page read and write
594000
heap
page read and write
327E000
stack
page read and write
AA0000
unkown
page readonly
2FD0000
heap
page read and write
C51D000
direct allocation
page readonly
21EE000
stack
page read and write
21A0000
heap
page read and write
4F4000
unkown
page readonly
2807000
heap
page read and write
C1A5000
trusted library allocation
page read and write
C27D000
trusted library allocation
page read and write
6A0000
heap
page read and write
142E000
heap
page read and write
19A000
stack
page read and write
3A71000
heap
page read and write
27E000
direct allocation
page execute and read and write
4FE000
unkown
page readonly
3A80000
heap
page read and write
3A71000
heap
page read and write
B69000
unkown
page readonly
280E000
heap
page read and write
33BC000
stack
page read and write
12B80000
trusted library allocation
page read and write
1630000
trusted library allocation
page read and write
12A43000
trusted library allocation
page read and write
389000
direct allocation
page execute and read and write
3A71000
heap
page read and write
17BA000
trusted library allocation
page read and write
3A71000
heap
page read and write
B91C000
stack
page read and write
3A71000
heap
page read and write
3A71000
heap
page read and write
3A71000
heap
page read and write
1418000
heap
page read and write
3A71000
heap
page read and write
B30000
unkown
page readonly
1611000
trusted library allocation
page read and write
15AE000
trusted library allocation
page read and write
1381000
heap
page read and write
3A71000
heap
page read and write
40B000
unkown
page write copy
378000
direct allocation
page execute and read and write
2FBE000
stack
page read and write
C2D0000
trusted library allocation
page read and write
40B000
unkown
page read and write
3A71000
heap
page read and write
CC0000
heap
page read and write
3A71000
heap
page read and write
3A71000
heap
page read and write
17BB000
trusted library allocation
page read and write
1E1C000
stack
page read and write
21F0000
heap
page read and write
401000
unkown
page execute read
17BF000
trusted library allocation
page read and write
1349C000
stack
page read and write
146A000
heap
page read and write
3019000
heap
page read and write
3A71000
heap
page read and write
3A71000
heap
page read and write
1731000
trusted library allocation
page read and write
33A2000
heap
page read and write
311DE000
trusted library allocation
page read and write
15BE000
trusted library allocation
page read and write
1394000
heap
page read and write
3A71000
heap
page read and write
3A71000
heap
page read and write
33E0000
heap
page read and write
3A71000
heap
page read and write
2ECE000
stack
page read and write
3A71000
heap
page read and write
B60000
unkown
page write copy
3A71000
heap
page read and write
530000
heap
page read and write
3009000
heap
page read and write
1E5E000
stack
page read and write
3A71000
heap
page read and write
3330000
heap
page read and write
A70000
heap
page read and write
3A71000
heap
page read and write
51F0000
heap
page read and write
C1BF000
trusted library allocation
page read and write
3009000
heap
page read and write
3A71000
heap
page read and write
1C4E000
stack
page read and write
F7C000
stack
page read and write
4D6E000
stack
page read and write
141A000
heap
page read and write
33CA000
heap
page read and write
3A71000
heap
page read and write
3A71000
heap
page read and write
3009000
heap
page read and write
3A71000
heap
page read and write
17BF000
trusted library allocation
page read and write
2F5E000
stack
page read and write
1309D000
stack
page read and write
C860000
trusted library allocation
page read and write
16B6000
trusted library allocation
page read and write
1144000
heap
page read and write
28D1000
heap
page read and write
13E4000
heap
page read and write
2F70000
heap
page read and write
3A71000
heap
page read and write
C4DF000
direct allocation
page readonly
511E000
stack
page read and write
1941E000
trusted library allocation
page read and write
29D000
direct allocation
page execute and read and write
3A71000
heap
page read and write
3A71000
heap
page read and write
13E4000
heap
page read and write
15FF000
trusted library allocation
page read and write
BD1F000
stack
page read and write
3A71000
heap
page read and write
1C50000
trusted library allocation
page read and write
6C620000
unkown
page readonly
12B0D000
stack
page read and write
1423000
heap
page read and write
C210000
trusted library allocation
page read and write
3A71000
heap
page read and write
3A71000
heap
page read and write
C1D0000
trusted library allocation
page read and write
11A5000
heap
page read and write
31D0000
heap
page read and write
1DD0000
heap
page read and write
12BB000
heap
page read and write
2F1E000
stack
page read and write
3A71000
heap
page read and write
12A3A000
trusted library allocation
page read and write
301B000
heap
page read and write
3A71000
heap
page read and write
33AC000
heap
page read and write
3A71000
heap
page read and write
3009000
heap
page read and write
23B0000
heap
page read and write
2ED0000
heap
page read and write
C2D0000
direct allocation
page execute and read and write
33BA000
heap
page read and write
3A71000
heap
page read and write
AA1000
unkown
page execute read
C5D5000
trusted library allocation
page read and write
C87E000
trusted library allocation
page read and write
577000
heap
page read and write
12A48000
trusted library allocation
page read and write
11EC000
heap
page read and write
3A71000
heap
page read and write
30A0000
heap
page read and write
275000
direct allocation
page execute and read and write
3A71000
heap
page read and write
3A71000
heap
page read and write
C534000
trusted library allocation
page read and write
1430000
heap
page read and write
1611000
trusted library allocation
page read and write
B11E000
stack
page read and write
364D000
heap
page read and write
3A71000
heap
page read and write
E0E000
stack
page read and write
3A71000
heap
page read and write
33C9000
heap
page read and write
3A71000
heap
page read and write
577000
heap
page read and write
6C8A0000
unkown
page read and write
411E000
stack
page read and write
56B000
heap
page read and write
4DEE000
stack
page read and write
1430000
heap
page read and write
16D2000
trusted library allocation
page read and write
56B000
heap
page read and write
520000
heap
page read and write
3A71000
heap
page read and write
163E000
trusted library allocation
page read and write
3A71000
heap
page read and write
There are 491 hidden memdumps, click here to show them.