IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\KJKJJJECFI.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\KKJEBAAECB.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\66d0cd8fb6f7b_lgjfd[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\66d0cd9a65b5d_vqwergf[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\sql[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\JDGHIIJKEBGI\JJDHID
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\JJECFIECBGDG\AFBAFB
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\JJECFIECBGDG\AKFIDH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JJECFIECBGDG\BGIJJK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JJECFIECBGDG\EBKJDB
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JJECFIECBGDG\EBKJDB-shm
data
dropped
C:\ProgramData\JJECFIECBGDG\FHJDAA
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JJECFIECBGDG\FIIIIJ
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JJECFIECBGDG\GHJKJD
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\JJECFIECBGDG\IDBAKK
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JJECFIECBGDG\IDBAKK-shm
data
dropped
C:\ProgramData\JJECFIECBGDG\IIJKJD
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JJECFIECBGDG\JEGHJD
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RegAsm.exe_5c39e2f0624fb3ace2547e2d794ca76a89c913_e446d4ea_8ef2c652-2fc0-456d-9a6d-6ec7b8425150\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6EFE.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Aug 29 20:52:40 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7067.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7087.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\KJKJJJECFI.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\KKJEBAAECB.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\KKJEBAAECB.exe
"C:\ProgramData\KKJEBAAECB.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\KJKJJJECFI.exe
"C:\ProgramData\KJKJJJECFI.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\JJECFIECBGDG" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 1760
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://t.me/iyigunl
unknown
malicious
http://147.45.68.138/nss3.dll
147.45.68.138
malicious
condedqpwqm.shop
malicious
http://stadiatechnologies.com/
95.164.119.162
malicious
http://147.45.68.138/
147.45.68.138
malicious
https://steamcommunity.com/profiles/76561199761128941
malicious
http://147.45.68.138/sql.dll
147.45.68.138
malicious
http://147.45.68.138/softokn3.dll
147.45.68.138
malicious
stagedchheiqwo.shop
malicious
https://locatedblsoqp.shop/api
188.114.97.3
malicious
stamppreewntnq.shop
malicious
evoliutwoqm.shop
malicious
https://awwardwiqi.shop/api
188.114.97.3
malicious
http://147.45.68.138/msvcp140.dll
147.45.68.138
malicious
awwardwiqi.shop
malicious
http://147.45.68.138:80hellohttps://steamcommunity.com/profiles/76561199761128941b
unknown
malicious
https://t.me/iyigunlsql.dllsqlr.dllIn
unknown
malicious
http://147.45.68.138/vcruntime140.dll
147.45.68.138
malicious
http://147.45.68.138/mozglue.dll
147.45.68.138
malicious
locatedblsoqp.shop
malicious
caffegclasiqwp.shop
malicious
millyscroqwp.shop
malicious
http://147.45.68.138/nss3.dllhb
unknown
malicious
https://traineiwnqo.shop/api
188.114.96.3
malicious
http://147.45.68.138/nss3.dll9b
unknown
malicious
http://147.45.68.138/sql.dllLbz
unknown
malicious
http://147.45.68.138/sql.dllurer
unknown
malicious
http://147.45.68.138/freebl3.dll
147.45.68.138
malicious
traineiwnqo.shop
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
Http://147.45.68.138:80e
unknown
https://duckduckgo.com/ac/?q=
unknown
http://ocsp.entrust.net03
unknown
http://ocsp.entrust.net02
unknown
http://147.45.68.138/p
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://147.45.68.138:808/2024
unknown
http://147.45.68.138/u~
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exe
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://147.45.68.138:80CA
unknown
http://147.45.68.138:80
unknown
http://147.45.68.138:80form-data;
unknown
http://147.45.68.138:80ocal
unknown
http://crl.entrust.net/ts1ca.crl0
unknown
http://stadiatechnologies.comntent-Disposition:
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://147.45.44.104/prog/66d0cd9a65b5d_vqwergf.exe
147.45.44.104
http://www.sqlite.org/copyright.html.
unknown
http://147.45.68.138/mozglue.dll%
unknown
http://147.45.44.104/prog/66d0cd8fb6f7b_lgjfd.exe1kkkk1035441http://147.45.44.104/prog/66d0cd9a65b5d
unknown
http://147.45.68.138/msvcp140.dll?
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
http://147.45.68.138/(
unknown
https://mozilla.org0/
unknown
http://147.45.68.138/KEBGI
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://traineiwnqo.shop/apibu
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://147.45.68.138:80790dee73nt-Disposition:
unknown
http://stadiatechnologies.com
unknown
http://www.entrust.net/rpa03
unknown
http://147.45.44.104/prog/66d0cd8fb6f7b_lgjfd.exe
147.45.44.104
http://aia.entrust.net/ts1-chain256.cer01
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://upx.sf.net
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://147.45.44.104/prog/66d0cd8fb6f7b_lgjfd.exeorm-data;
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ost.exe
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://147.45.44.104/prog/66d0cd9a65b5d_vqwergf.exem-data;
unknown
http://147.45.68.138:80AE
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://147.45.68.138/b=
unknown
http://147.45.68.138:80e
unknown
https://support.mozilla.org
unknown
http://147.45.68.138:80AFsrss.exe
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://64532127VdtSrezylanAPHTGetSystemInfoGetSystemTimeSleepkernel32.dllSymMatchStringInternetSetOp
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://traineiwnqo.shop/
unknown
http://147.45.68.138/G=6f
unknown
https://www.entrust.net/rpa0
unknown
There are 82 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
locatedblsoqp.shop
188.114.97.3
malicious
awwardwiqi.shop
188.114.97.3
malicious
stadiatechnologies.com
95.164.119.162
malicious
traineiwnqo.shop
188.114.96.3
malicious

IPs

IP
Domain
Country
Malicious
95.164.119.162
stadiatechnologies.com
Gibraltar
malicious
188.114.97.3
locatedblsoqp.shop
European Union
malicious
188.114.96.3
traineiwnqo.shop
European Union
malicious
147.45.68.138
unknown
Russian Federation
malicious
147.45.44.104
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF
\REGISTRY\A\{a09e4a88-1a5c-1ab5-d244-5117600fd4f1}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
ProgramId
\REGISTRY\A\{a09e4a88-1a5c-1ab5-d244-5117600fd4f1}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
FileId
\REGISTRY\A\{a09e4a88-1a5c-1ab5-d244-5117600fd4f1}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
LowerCaseLongPath
\REGISTRY\A\{a09e4a88-1a5c-1ab5-d244-5117600fd4f1}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
LongPathHash
\REGISTRY\A\{a09e4a88-1a5c-1ab5-d244-5117600fd4f1}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
Name
\REGISTRY\A\{a09e4a88-1a5c-1ab5-d244-5117600fd4f1}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
OriginalFileName
\REGISTRY\A\{a09e4a88-1a5c-1ab5-d244-5117600fd4f1}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
Publisher
\REGISTRY\A\{a09e4a88-1a5c-1ab5-d244-5117600fd4f1}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
Version
\REGISTRY\A\{a09e4a88-1a5c-1ab5-d244-5117600fd4f1}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
BinFileVersion
\REGISTRY\A\{a09e4a88-1a5c-1ab5-d244-5117600fd4f1}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
BinaryType
\REGISTRY\A\{a09e4a88-1a5c-1ab5-d244-5117600fd4f1}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
ProductName
\REGISTRY\A\{a09e4a88-1a5c-1ab5-d244-5117600fd4f1}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
ProductVersion
\REGISTRY\A\{a09e4a88-1a5c-1ab5-d244-5117600fd4f1}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
LinkDate
\REGISTRY\A\{a09e4a88-1a5c-1ab5-d244-5117600fd4f1}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
BinProductVersion
\REGISTRY\A\{a09e4a88-1a5c-1ab5-d244-5117600fd4f1}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
AppxPackageFullName
\REGISTRY\A\{a09e4a88-1a5c-1ab5-d244-5117600fd4f1}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
AppxPackageRelativeId
\REGISTRY\A\{a09e4a88-1a5c-1ab5-d244-5117600fd4f1}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
Size
\REGISTRY\A\{a09e4a88-1a5c-1ab5-d244-5117600fd4f1}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
Language
\REGISTRY\A\{a09e4a88-1a5c-1ab5-d244-5117600fd4f1}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
IsOsComponent
\REGISTRY\A\{a09e4a88-1a5c-1ab5-d244-5117600fd4f1}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3C15000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
7600000
heap
page read and write
900000
unkown
page readonly
1140000
heap
page read and write
1D9B3000
direct allocation
page execute read
233E000
stack
page read and write
840000
trusted library allocation
page execute and read and write
F7D000
heap
page read and write
89E000
stack
page read and write
171E0000
heap
page read and write
17264000
heap
page read and write
17504000
heap
page read and write
178FC000
heap
page read and write
848000
heap
page read and write
1D46D000
direct allocation
page execute read
4EF000
remote allocation
page execute and read and write
5BB000
remote allocation
page execute and read and write
2F62C000
heap
page read and write
725000
heap
page read and write
131D000
heap
page read and write
5AD000
remote allocation
page execute and read and write
1D261000
direct allocation
page execute read
82F000
stack
page read and write
1DB53000
direct allocation
page readonly
1D7E0000
heap
page read and write
8E3000
heap
page read and write
DFA000
heap
page read and write
1410000
heap
page read and write
10E3000
trusted library allocation
page execute and read and write
172D1000
heap
page read and write
49A0B000
stack
page read and write
124E000
stack
page read and write
84E000
heap
page read and write
2581000
trusted library allocation
page read and write
1D268000
direct allocation
page execute read
149CF000
stack
page read and write
23743000
heap
page read and write
B7C000
stack
page read and write
6C340000
unkown
page read and write
1001000
heap
page read and write
2582000
trusted library allocation
page execute and read and write
45F000
remote allocation
page execute and read and write
7F0000
trusted library allocation
page read and write
1DDDD000
stack
page read and write
6C0C0000
unkown
page readonly
5C7000
remote allocation
page execute and read and write
FDCB000
stack
page read and write
C80000
heap
page read and write
7DE000
stack
page read and write
480000
remote allocation
page execute and read and write
EF3000
heap
page read and write
6C33E000
unkown
page read and write
178AB000
heap
page read and write
594000
remote allocation
page execute and read and write
1A0000
unkown
page readonly
45A000
remote allocation
page execute and read and write
5B3000
remote allocation
page execute and read and write
45A000
remote allocation
page execute and read and write
2DE7000
heap
page read and write
17266000
heap
page read and write
BF0000
heap
page read and write
6C13D000
unkown
page readonly
DB0000
heap
page read and write
49D000
remote allocation
page execute and read and write
1037000
heap
page read and write
1787C000
stack
page read and write
AED000
stack
page read and write
33EE000
stack
page read and write
C60000
heap
page read and write
67E000
stack
page read and write
8D0000
unkown
page readonly
2550000
trusted library allocation
page read and write
29FC000
stack
page read and write
2C70000
heap
page read and write
344E000
stack
page read and write
3C12000
trusted library allocation
page read and write
10E2000
heap
page read and write
105A000
heap
page read and write
3582000
trusted library allocation
page read and write
1720B000
heap
page read and write
FD0000
heap
page read and write
1D4C2000
heap
page read and write
1DB0D000
direct allocation
page execute read
5CB000
remote allocation
page execute and read and write
690000
heap
page read and write
1DAA6000
direct allocation
page execute read
621000
remote allocation
page execute and read and write
6D0000
heap
page read and write
6C152000
unkown
page readonly
71E000
stack
page read and write
C50000
trusted library allocation
page execute and read and write
E3F000
heap
page read and write
1DB86000
direct allocation
page read and write
E2000
unkown
page readonly
178BC000
heap
page read and write
F10000
heap
page read and write
4DAD000
stack
page read and write
117E000
stack
page read and write
8D4000
heap
page read and write
17880000
heap
page read and write
EB0000
heap
page read and write
1789A000
heap
page read and write
3AAE000
heap
page read and write
13E0000
trusted library allocation
page execute and read and write
12AA000
heap
page read and write
5C3000
remote allocation
page execute and read and write
252E000
stack
page read and write
DF0000
heap
page read and write
875000
heap
page read and write
432000
remote allocation
page execute and read and write
1234D000
stack
page read and write
12A0000
heap
page read and write
7A0000
heap
page read and write
C40000
heap
page read and write
1A2000
unkown
page readonly
1725C000
heap
page read and write
49D6D000
stack
page read and write
436000
remote allocation
page execute and read and write
C10000
heap
page read and write
2C12000
trusted library allocation
page execute and read and write
5C1000
remote allocation
page execute and read and write
2A6E000
stack
page read and write
6C0000
trusted library allocation
page read and write
2DD0000
heap
page read and write
D00000
heap
page read and write
7F4000
trusted library allocation
page read and write
639000
remote allocation
page execute and read and write
1AC000
stack
page read and write
5BF000
remote allocation
page execute and read and write
700E000
stack
page read and write
63B000
remote allocation
page execute and read and write
883000
heap
page read and write
1DB7B000
direct allocation
page readonly
AC4000
trusted library allocation
page read and write
237E000
stack
page read and write
6C345000
unkown
page readonly
10F0000
trusted library allocation
page read and write
12A4C000
stack
page read and write
1DB66000
direct allocation
page readonly
E0000
unkown
page readonly
1DB05000
direct allocation
page execute read
CFB000
stack
page read and write
1D98A000
direct allocation
page execute read
100A000
heap
page read and write
F92000
stack
page read and write
32ED000
stack
page read and write
467D000
stack
page read and write
8CC000
heap
page read and write
72C000
stack
page read and write
903000
heap
page read and write
5B9000
remote allocation
page execute and read and write
47E000
remote allocation
page execute and read and write
1DB14000
direct allocation
page execute read
AFC000
stack
page read and write
2DCF000
stack
page read and write
6C2FF000
unkown
page readonly
102E000
heap
page read and write
1DB76000
direct allocation
page readonly
DCE000
stack
page read and write
400000
remote allocation
page execute and read and write
1250000
heap
page read and write
1777C000
stack
page read and write
7E4000
trusted library allocation
page read and write
850000
heap
page read and write
178DE000
heap
page read and write
5C5000
remote allocation
page execute and read and write
250E000
stack
page read and write
628000
remote allocation
page execute and read and write
49FAD000
stack
page read and write
3AA0000
heap
page read and write
5F0000
heap
page read and write
1DB6B000
direct allocation
page readonly
AC0000
trusted library allocation
page read and write
3A7E000
stack
page read and write
536000
remote allocation
page execute and read and write
954E000
stack
page read and write
720000
heap
page read and write
2ACF000
stack
page read and write
4FB000
stack
page read and write
1D4AA000
direct allocation
page readonly
10D0000
trusted library allocation
page read and write
2DE0000
heap
page read and write
1513F000
stack
page read and write
2BCF000
stack
page read and write
2570000
heap
page execute and read and write
5F0000
heap
page read and write
9550000
unclassified section
page read and write
172F6000
heap
page read and write
1D3C6000
direct allocation
page execute read
179B0000
heap
page read and write
1DB16000
direct allocation
page execute read
29BC000
stack
page read and write
12EF000
heap
page read and write
2B00000
heap
page read and write
D9E000
stack
page read and write
A7E000
stack
page read and write
2C60000
heap
page read and write
AB3000
trusted library allocation
page execute and read and write
F76000
heap
page read and write
319E000
stack
page read and write
1DBA3000
heap
page read and write
583000
remote allocation
page execute and read and write
510000
heap
page read and write
10E4000
trusted library allocation
page read and write
14FCD000
stack
page read and write
296BC000
heap
page read and write
436000
remote allocation
page execute and read and write
104D000
heap
page read and write
3585000
trusted library allocation
page read and write
1721C000
heap
page read and write
171FA000
heap
page read and write
C8E000
heap
page read and write
7E0000
heap
page read and write
1180000
heap
page read and write
14A2E000
stack
page read and write
1220000
heap
page read and write
400000
remote allocation
page execute and read and write
6C160000
unkown
page readonly
35593000
heap
page read and write
C90000
heap
page read and write
1D4AF000
direct allocation
page readonly
2570000
heap
page execute and read and write
E6A000
heap
page read and write
178DC000
heap
page read and write
179D9000
heap
page read and write
628000
remote allocation
page execute and read and write
1D260000
direct allocation
page execute and read and write
EDC000
heap
page read and write
868000
heap
page read and write
3B509000
heap
page read and write
1DAD5000
direct allocation
page execute read
1DB4F000
direct allocation
page readonly
2C11000
trusted library allocation
page read and write
DD0000
heap
page read and write
2AD0000
heap
page execute and read and write
111B000
trusted library allocation
page execute and read and write
2530000
heap
page read and write
BD5000
heap
page read and write
1710A000
stack
page read and write
1745B000
heap
page read and write
6C14E000
unkown
page read and write
5B5000
remote allocation
page execute and read and write
9C4F000
stack
page read and write
DD5000
heap
page read and write
63D000
stack
page read and write
BD0000
heap
page read and write
1210000
heap
page read and write
99C000
stack
page read and write
EFC000
stack
page read and write
536000
remote allocation
page execute and read and write
5AB000
remote allocation
page execute and read and write
E7D000
heap
page read and write
3AA7000
heap
page read and write
3582000
trusted library allocation
page read and write
1743D000
heap
page read and write
1200000
heap
page read and write
5C9000
remote allocation
page execute and read and write
8A8000
heap
page read and write
2530000
trusted library allocation
page read and write
5B7000
remote allocation
page execute and read and write
1D46F000
direct allocation
page readonly
1379000
heap
page read and write
B5E000
stack
page read and write
172E3000
heap
page read and write
16F6D000
stack
page read and write
13F0000
trusted library allocation
page read and write
11DD000
stack
page read and write
10DE000
heap
page read and write
1700B000
stack
page read and write
129E000
stack
page read and write
C5D000
stack
page read and write
178BF000
heap
page read and write
47E000
remote allocation
page execute and read and write
8AE000
heap
page read and write
35A2000
trusted library allocation
page read and write
C3D000
stack
page read and write
58B000
stack
page read and write
5BD000
remote allocation
page execute and read and write
790000
heap
page read and write
2C0E000
stack
page read and write
6D0000
heap
page read and write
1363000
heap
page read and write
1DB1A000
direct allocation
page execute read
171BE000
stack
page read and write
46E0000
heap
page read and write
1DB4D000
direct allocation
page execute read
452000
remote allocation
page execute and read and write
45F000
remote allocation
page execute and read and write
1230D000
stack
page read and write
172FD000
heap
page read and write
E5C000
heap
page read and write
46DE000
stack
page read and write
121D000
stack
page read and write
103CE000
stack
page read and write
113D000
stack
page read and write
1D478000
direct allocation
page readonly
B10000
heap
page read and write
C8B000
heap
page read and write
1000000
heap
page read and write
1488C000
stack
page read and write
104CF000
stack
page read and write
8A0000
heap
page read and write
354F000
stack
page read and write
7E3000
trusted library allocation
page execute and read and write
AEB000
trusted library allocation
page execute and read and write
8D2000
unkown
page readonly
FFA000
heap
page read and write
2DCD000
stack
page read and write
10F4000
trusted library allocation
page read and write
F9C000
stack
page read and write
2AAE000
stack
page read and write
171F0000
heap
page read and write
AF2000
stack
page read and write
2380000
heap
page read and write
1D948000
direct allocation
page execute read
D5E000
stack
page read and write
9C50000
unclassified section
page read and write
2D8E000
stack
page read and write
6C161000
unkown
page execute read
472F000
stack
page read and write
C0E000
stack
page read and write
100A000
heap
page read and write
439AF000
stack
page read and write
17110000
heap
page read and write
599000
remote allocation
page execute and read and write
48C000
stack
page read and write
639000
remote allocation
page execute and read and write
AB4000
trusted library allocation
page read and write
E9C000
stack
page read and write
6C0C1000
unkown
page execute read
C87000
heap
page read and write
3A80000
heap
page read and write
17890000
heap
page read and write
17502000
heap
page read and write
1110000
trusted library allocation
page read and write
5AF000
remote allocation
page execute and read and write
FD8F000
stack
page read and write
2581000
trusted library allocation
page read and write
42E000
remote allocation
page execute and read and write
2CCD000
stack
page read and write
1D4AD000
direct allocation
page readonly
D10000
heap
page read and write
1050D000
stack
page read and write
EBE000
heap
page read and write
6D5000
heap
page read and write
1503E000
stack
page read and write
75FE000
stack
page read and write
A9F000
stack
page read and write
F82000
heap
page read and write
97E000
stack
page read and write
432000
remote allocation
page execute and read and write
49C6C000
stack
page read and write
428000
remote allocation
page execute and read and write
ED7000
heap
page read and write
621000
remote allocation
page execute and read and write
5B1000
remote allocation
page execute and read and write
840000
heap
page read and write
130C000
heap
page read and write
12A8D000
stack
page read and write
86D000
heap
page read and write
41E000
remote allocation
page execute and read and write
6C33F000
unkown
page write copy
10AF000
stack
page read and write
1726C000
heap
page read and write
1D4A2000
direct allocation
page read and write
EB8000
heap
page read and write
1130000
trusted library allocation
page read and write
49D000
remote allocation
page execute and read and write
AA0000
trusted library allocation
page read and write
1DCDE000
stack
page read and write
3585000
trusted library allocation
page read and write
EE4000
heap
page read and write
329F000
stack
page read and write
81B000
trusted library allocation
page execute and read and write
1DB82000
direct allocation
page read and write
2510000
heap
page read and write
42E000
remote allocation
page execute and read and write
148CE000
stack
page read and write
E4F000
heap
page read and write
2582000
trusted library allocation
page execute and read and write
176EF000
stack
page read and write
151AE000
stack
page read and write
1025000
heap
page read and write
There are 374 hidden memdumps, click here to show them.