IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\AFBFHDBKJE.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\HDGCAAFBFB.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\userHJEBGHIEBF.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\userKECGDBFCBK.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
modified
malicious
C:\ProgramData\AKFCFBAA
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\AKKECAFBFHJDGDHIEHJD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BKKFHIEG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BKKFHIEGDHJKECAAKKEBAFIJKF
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DAEGIIECGHCBFHJKEHDB
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\EBAAAFBGDBKK\AFHDBG
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\EBAAAFBGDBKK\GHDHDB
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\EGIDAAFIEHIE\BAAAAK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\EGIDAAFIEHIE\BAKKEG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EGIDAAFIEHIE\CFCBFH
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\EGIDAAFIEHIE\DHJEBG
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EGIDAAFIEHIE\DHJEBG-shm
data
dropped
C:\ProgramData\EGIDAAFIEHIE\EHJKFC
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\EGIDAAFIEHIE\EHJKFC-shm
data
dropped
C:\ProgramData\EGIDAAFIEHIE\FBFCAK
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\EGIDAAFIEHIE\FCBAEC
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\EGIDAAFIEHIE\JEHIJJ
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\EGIDAAFIEHIE\JJECGC
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\EGIDAAFIEHIE\KEBGHC
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\FHIDAKFIJJKJJJKEBKJE
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GHJJDGHCBGDHIECBGIDAEHCGDG
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JEGDGIIJJECFIDHJJKKFCAECFH
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AFBFHDBKJE.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\HDGCAAFBFB.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\userHJEBGHIEBF.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\userKECGDBFCBK.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\76561199780418869[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\ljhgfsd[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\vdshfd[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\76561199780418869[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\ljhgfsd[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\vdshfd[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
\Device\ConDrv
ASCII text, with CRLF, LF line terminators
dropped
There are 44 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\userKECGDBFCBK.exe
"C:\Users\userKECGDBFCBK.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\userHJEBGHIEBF.exe
"C:\Users\userHJEBGHIEBF.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\HDGCAAFBFB.exe
"C:\ProgramData\HDGCAAFBFB.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\AFBFHDBKJE.exe
"C:\ProgramData\AFBFHDBKJE.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\userKECGDBFCBK.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\userHJEBGHIEBF.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\EGIDAAFIEHIE" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://46.8.231.109/1309cdeb8f4c8736/mozglue.dllM?
unknown
malicious
stogeneratmns.shop
malicious
http://46.8.231.109/1309cdeb8f4c8736/sqlite3.dllG
unknown
malicious
https://reinforcenh.shop/api
172.67.208.139
malicious
https://5.75.211.162/vcruntime140.dll
5.75.211.162
malicious
http://46.8.231.109/1309cdeb8f4c8736/softokn3.dll
46.8.231.109
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
fragnantbui.shop
malicious
offensivedzvju.shop
malicious
https://stogeneratmns.shop/apiU
unknown
malicious
https://steamcommunity.com/profiles/76561199780418869
104.102.49.254
malicious
http://46.8.231.109/
46.8.231.109
malicious
http://46.8.231.109/1309cdeb8f4c8736/nss3.dll
46.8.231.109
malicious
https://5.75.211.162/softokn3.dll
5.75.211.162
malicious
https://stogeneratmns.shop/api
188.114.96.3
malicious
https://ghostreedmnu.shop/api
188.114.96.3
malicious
http://46.8.231.109/1309cdeb8f4c8736/sqlite3.dll
46.8.231.109
malicious
https://5.75.211.162/
5.75.211.162
malicious
http://46.8.231.109/c4754d4f680ead72.php
46.8.231.109
malicious
http://46.8.231.109/1309cdeb8f4c8736/msvcp140.dll
46.8.231.109
malicious
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=B0lGn8MokmdT&l=e
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://cowod.GCBKFIEBGCAA
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
http://cowod.hopto.org_DEBUG.zip/c
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exe
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/profiles/76561199780418869u55uhttps://t.me/ae5edMozilla/5.0
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://s.ytimg.com;
unknown
https://5.75.211.162/softokn3.dll#
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=WnGP
unknown
http://www.entrust.net/rpa03
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Ed1aWxkV
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17mluIFdhbGxldHxmbmpobWtoaG1rYm
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
http://46.8.231.109FCBKorm-data;
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://steamcommunity.com/.
unknown
http://46.8.231.109/7
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17WdsYWhtbmRlZHwxfDB8MHxab2hvIF
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://5.75.211.162/freebl3.dllF
unknown
https://help.steampowered.com/en/
unknown
https://community.akamai.steamstatic.com/
unknown
https://ballotnwu.site/)S
unknown
https://5.75.211.162/mozglue.dllM
unknown
http://46.8.231.109/%
unknown
https://recaptcha.net/recaptcha/;
unknown
https://steamcommunity.com/profiles/76561199780418869/inventory/
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=nSnUuYf7g6U1&a
unknown
https://broadcast.st.dl.eccdnx.com
unknown
http://46.8.231.109/c4754d4f680ead72.php32
unknown
http://crl.entrust.net/ts1ca.crl0
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
http://46.8.231.109/1309cdeb8f4c8736/softokn3.dllm
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://dbsmena.com/
unknown
http://cowod.hopto.EBGCAA
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://dbsmena.com/b
unknown
https://dbsmena.com/vdshfd.exe=
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199780418869
unknown
https://ballotnwu.site:443/apiprofiles/76561199724331900
unknown
http://aia.entrust.net/ts1-chain256.cer01
unknown
https://store.steampowered.com/
unknown
https://5.75.211.162/freebl3.dlls
unknown
http://cowod.hoptoIEBGCAA
unknown
http://127.0.0.1:27060
unknown
http://46.8.231.109/1309cdeb8f4c8736/vcruntime140.dllh
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://api.steampowered.com/
unknown
https://store.steampowered.com/mobile
unknown
http://46.8.231.109/c4754d4f680ead72.php=2%
unknown
https://dbsmena.com/ljhgfsd.exeba
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
unknown
https://player.vimeo.com
unknown
http://46.8.231.109/c4754d4f680ead72.phpY
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
http://cowod.hopto.org
unknown
http://46.8.231.109/c4754d4f680ead72.phpp
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fragnantbui.shop
188.114.96.3
malicious
gutterydhowi.shop
104.21.4.136
malicious
steamcommunity.com
104.102.49.254
malicious
cowod.hopto.org
45.132.206.251
malicious
offensivedzvju.shop
188.114.97.3
malicious
stogeneratmns.shop
188.114.96.3
malicious
reinforcenh.shop
172.67.208.139
malicious
drawzhotdog.shop
172.67.162.108
malicious
ghostreedmnu.shop
188.114.96.3
malicious
vozmeatillu.shop
188.114.96.3
malicious
ballotnwu.site
104.21.2.13
malicious
dbsmena.com
172.105.54.160
There are 2 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
46.8.231.109
unknown
Russian Federation
malicious
104.21.4.136
gutterydhowi.shop
United States
malicious
188.114.97.3
offensivedzvju.shop
European Union
malicious
172.67.162.108
drawzhotdog.shop
United States
malicious
188.114.96.3
fragnantbui.shop
European Union
malicious
104.102.49.254
steamcommunity.com
United States
malicious
104.21.2.13
ballotnwu.site
United States
malicious
5.75.211.162
unknown
Germany
malicious
45.132.206.251
cowod.hopto.org
Russian Federation
malicious
172.67.208.139
reinforcenh.shop
United States
malicious
172.105.54.160
dbsmena.com
United States
There are 1 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF

Memdumps

Base Address
Regiontype
Protect
Malicious
117A000
heap
page read and write
malicious
10DF000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3685000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3925000
trusted library allocation
page read and write
malicious
3965000
trusted library allocation
page read and write
malicious
2748D000
heap
page read and write
CFE000
stack
page read and write
102D000
stack
page read and write
9F0000
heap
page read and write
1014000
heap
page read and write
1754F000
stack
page read and write
1C08F000
stack
page read and write
1319000
heap
page read and write
F80000
heap
page read and write
55D000
remote allocation
page execute and read and write
300F000
stack
page read and write
213A7000
heap
page read and write
4D4000
remote allocation
page execute and read and write
19D30000
heap
page read and write
E28000
heap
page read and write
DA9000
heap
page read and write
1FDB8000
direct allocation
page execute read
E1E000
heap
page read and write
63A000
remote allocation
page execute and read and write
8C0000
heap
page read and write
27430000
heap
page read and write
1218000
heap
page read and write
B37000
trusted library allocation
page execute and read and write
11D0000
heap
page read and write
8FE000
heap
page read and write
997000
heap
page read and write
2910000
heap
page execute and read and write
1C0A0000
heap
page read and write
4C8000
remote allocation
page execute and read and write
510E000
stack
page read and write
332F000
stack
page read and write
B16000
trusted library allocation
page read and write
144E000
stack
page read and write
2021E000
stack
page read and write
4EF000
remote allocation
page execute and read and write
25B0000
trusted library allocation
page read and write
3330000
heap
page read and write
51F000
remote allocation
page execute and read and write
31FD000
stack
page read and write
EC6000
trusted library allocation
page read and write
C10000
heap
page read and write
6F8ED000
unkown
page readonly
304E000
stack
page read and write
1290D000
stack
page read and write
1C194000
heap
page read and write
1C3A0000
heap
page read and write
61ED4000
direct allocation
page readonly
6F8E8000
unkown
page execute read
1FFEB000
direct allocation
page readonly
C80000
heap
page read and write
100DE000
stack
page read and write
DD5000
heap
page read and write
DCE000
stack
page read and write
1B18D000
stack
page read and write
3010000
trusted library allocation
page read and write
1B12F000
stack
page read and write
1FFE6000
direct allocation
page readonly
EAB000
heap
page read and write
2DAE000
stack
page read and write
E43000
heap
page read and write
EB4000
trusted library allocation
page read and write
4235000
trusted library allocation
page read and write
4E8000
remote allocation
page execute and read and write
492000
remote allocation
page execute and read and write
2594000
trusted library allocation
page read and write
2E300000
heap
page read and write
1350000
heap
page read and write
301B000
trusted library allocation
page execute and read and write
19E3D000
stack
page read and write
2910000
heap
page read and write
670000
remote allocation
page execute and read and write
2B8F000
stack
page read and write
61ECC000
direct allocation
page read and write
9CA0000
unclassified section
page read and write
C7E000
stack
page read and write
917000
heap
page read and write
97E000
heap
page read and write
300F000
stack
page read and write
1C116000
heap
page read and write
712F000
stack
page read and write
1C0BD000
heap
page read and write
2266F000
direct allocation
page readonly
BF1000
stack
page read and write
293F000
stack
page read and write
563000
remote allocation
page execute and read and write
19A3D000
heap
page read and write
CB4000
heap
page read and write
582000
remote allocation
page execute and read and write
180F000
stack
page read and write
1FFBD000
direct allocation
page execute read
31B0000
heap
page execute and read and write
CD0000
trusted library allocation
page read and write
1232000
heap
page read and write
1A89E000
stack
page read and write
1279E000
stack
page read and write
14E4C000
stack
page read and write
F10000
heap
page read and write
407FA000
heap
page read and write
CCE000
stack
page read and write
4E1000
remote allocation
page execute and read and write
130A000
heap
page read and write
924000
heap
page read and write
99C000
stack
page read and write
3394000
trusted library allocation
page read and write
1C10E000
heap
page read and write
3180000
trusted library allocation
page execute and read and write
65C000
remote allocation
page execute and read and write
53CE000
stack
page read and write
485000
remote allocation
page execute and read and write
314E000
stack
page read and write
DC0000
heap
page read and write
51B000
remote allocation
page execute and read and write
14D4E000
stack
page read and write
11DC000
heap
page read and write
2B3C000
stack
page read and write
C50000
heap
page read and write
1758B000
stack
page read and write
7BE000
stack
page read and write
BF9000
stack
page read and write
F66000
heap
page read and write
5A5000
remote allocation
page execute and read and write
2921000
trusted library allocation
page execute and read and write
2593000
trusted library allocation
page execute and read and write
50F000
remote allocation
page execute and read and write
6F8A6000
unkown
page execute read
6C2F0000
unkown
page readonly
E28000
heap
page read and write
AFC000
stack
page read and write
1C6C1000
heap
page read and write
492000
unkown
page readonly
6F879000
unkown
page execute read
1AC3E000
stack
page read and write
1FF7D000
direct allocation
page execute read
CF2000
stack
page read and write
12DA000
heap
page read and write
3220000
trusted library allocation
page read and write
2830000
trusted library allocation
page read and write
2148B000
heap
page read and write
2930000
trusted library allocation
page read and write
6C251000
unkown
page execute read
213A2000
heap
page read and write
1AD7D000
stack
page read and write
5CB000
remote allocation
page execute and read and write
DCD000
heap
page read and write
1060000
heap
page read and write
6C48F000
unkown
page readonly
2268D000
heap
page read and write
3BC000
stack
page read and write
10CE000
heap
page read and write
B75000
heap
page read and write
106D000
heap
page read and write
13B5000
heap
page read and write
1FFBF000
direct allocation
page readonly
374D000
heap
page read and write
123B000
heap
page read and write
127B000
heap
page read and write
2683000
trusted library allocation
page read and write
1B02E000
stack
page read and write
115A000
heap
page read and write
B1E000
stack
page read and write
488000
remote allocation
page execute and read and write
45A000
remote allocation
page execute and read and write
3202000
trusted library allocation
page read and write
121E000
heap
page read and write
1010000
heap
page read and write
D20000
heap
page read and write
1253000
heap
page read and write
730000
heap
page read and write
3030000
trusted library allocation
page read and write
25C7000
trusted library allocation
page execute and read and write
323D000
stack
page read and write
516000
remote allocation
page execute and read and write
E15000
heap
page read and write
BFC000
stack
page read and write
6F8F5000
unkown
page readonly
96E000
stack
page read and write
1FFD6000
direct allocation
page readonly
259E000
stack
page read and write
11BE000
heap
page read and write
48F000
remote allocation
page execute and read and write
2D26000
trusted library allocation
page read and write
1C1A0000
heap
page read and write
19CDE000
stack
page read and write
199FE000
heap
page read and write
AEE000
stack
page read and write
B03000
trusted library allocation
page execute and read and write
4231000
trusted library allocation
page read and write
EBB000
heap
page read and write
139E000
stack
page read and write
2963000
trusted library allocation
page read and write
14EAE000
stack
page read and write
10B2000
heap
page read and write
CFC000
stack
page read and write
290D000
stack
page read and write
2DEE000
stack
page read and write
1244000
heap
page read and write
490000
unkown
page readonly
19E48000
heap
page read and write
14E4F000
stack
page read and write
2B0E000
stack
page read and write
463000
remote allocation
page execute and read and write
E25000
heap
page read and write
11AD000
heap
page read and write
1304000
heap
page read and write
2DF0000
trusted library allocation
page execute and read and write
6C250000
unkown
page readonly
1FE23000
direct allocation
page execute read
EC0000
trusted library allocation
page read and write
1C11E000
heap
page read and write
C60000
heap
page read and write
9EC000
stack
page read and write
1021D000
stack
page read and write
E16000
heap
page read and write
2D24000
trusted library allocation
page read and write
1340000
heap
page read and write
2E4F3000
heap
page read and write
F50000
heap
page read and write
AD0000
heap
page read and write
1045000
heap
page read and write
354E000
stack
page read and write
1277000
heap
page read and write
27493000
heap
page read and write
5A1000
remote allocation
page execute and read and write
1024E000
stack
page read and write
460000
remote allocation
page execute and read and write
4CE000
remote allocation
page execute and read and write
933000
heap
page read and write
27410000
heap
page read and write
13B0000
heap
page read and write
274D9000
heap
page read and write
141C000
heap
page read and write
4EF000
remote allocation
page execute and read and write
61E00000
direct allocation
page execute and read and write
2262D000
direct allocation
page execute read
4A1D000
stack
page read and write
61EB4000
direct allocation
page read and write
F96000
heap
page read and write
46B000
remote allocation
page execute and read and write
5A2000
unkown
page readonly
978000
heap
page read and write
C7E000
stack
page read and write
2B40000
heap
page read and write
12CE000
heap
page read and write
1120000
heap
page read and write
55A000
remote allocation
page execute and read and write
213D1000
heap
page read and write
10F8000
stack
page read and write
106A000
heap
page read and write
AF0000
trusted library allocation
page read and write
E7E000
stack
page read and write
2730000
heap
page read and write
272F000
stack
page read and write
463000
remote allocation
page execute and read and write
1FF84000
direct allocation
page execute read
4EE4C000
stack
page read and write
11AF000
heap
page read and write
3220000
heap
page read and write
4BD000
remote allocation
page execute and read and write
1306000
heap
page read and write
B60000
heap
page read and write
19B4E000
stack
page read and write
CB5000
heap
page read and write
1424000
heap
page read and write
2765F000
stack
page read and write
EEB000
trusted library allocation
page execute and read and write
6C2DE000
unkown
page read and write
99C000
heap
page read and write
1041000
heap
page read and write
3681000
trusted library allocation
page read and write
51E000
remote allocation
page execute and read and write
5A1000
remote allocation
page execute and read and write
F9D000
stack
page read and write
273F0000
heap
page read and write
300A000
trusted library allocation
page execute and read and write
22420000
direct allocation
page execute and read and write
6F87B000
unkown
page execute read
DF0000
heap
page read and write
3740000
heap
page read and write
1570000
heap
page read and write
1B28D000
stack
page read and write
506000
remote allocation
page execute and read and write
3290000
heap
page read and write
F1A000
heap
page read and write
1C6BF000
heap
page read and write
1058000
heap
page read and write
2F00000
heap
page read and write
4F6000
remote allocation
page execute and read and write
28A32000
heap
page read and write
1FF8A000
direct allocation
page execute read
FEE000
heap
page read and write
CF9000
stack
page read and write
2FBE000
stack
page read and write
F00000
heap
page read and write
154F000
stack
page read and write
EC4000
trusted library allocation
page read and write
2D3A000
trusted library allocation
page execute and read and write
E3F000
heap
page read and write
1275D000
stack
page read and write
21383000
heap
page read and write
9BC0000
heap
page read and write
4011000
trusted library allocation
page read and write
DC3000
heap
page read and write
1FFC3000
direct allocation
page readonly
22638000
direct allocation
page readonly
988000
stack
page read and write
1550000
trusted library allocation
page read and write
77E000
stack
page read and write
14E9E000
stack
page read and write
19C9E000
stack
page read and write
D85000
heap
page read and write
1210000
heap
page read and write
DBF000
stack
page read and write
C70000
trusted library allocation
page execute and read and write
27473000
heap
page read and write
C00000
heap
page read and write
3921000
trusted library allocation
page read and write
1FF75000
direct allocation
page execute read
BED000
stack
page read and write
F90000
heap
page read and write
2D4B000
trusted library allocation
page execute and read and write
140F000
stack
page read and write
16BF000
stack
page read and write
E54000
heap
page read and write
3A886000
heap
page read and write
B2A000
trusted library allocation
page execute and read and write
DD0000
heap
page read and write
9BA0000
heap
page read and write
B3B000
trusted library allocation
page execute and read and write
3208000
trusted library allocation
page read and write
1500E000
stack
page read and write
46B000
remote allocation
page execute and read and write
34917000
heap
page read and write
E4C000
heap
page read and write
D99000
heap
page read and write
2FE4000
trusted library allocation
page read and write
120E000
stack
page read and write
25CB000
trusted library allocation
page execute and read and write
CA7000
heap
page read and write
6C4CC000
unkown
page readonly
1B41B000
heap
page read and write
2FEC000
stack
page read and write
4ED4C000
stack
page read and write
4B1000
remote allocation
page execute and read and write
2C0000
unkown
page readonly
27E4000
trusted library allocation
page read and write
2001D000
heap
page read and write
3013000
trusted library allocation
page read and write
2A8E000
stack
page read and write
2D40000
trusted library allocation
page read and write
D3E000
stack
page read and write
3011000
trusted library allocation
page execute and read and write
91C000
heap
page read and write
F38000
stack
page read and write
6F8DE000
unkown
page execute read
1C0A2000
heap
page read and write
4DA000
remote allocation
page execute and read and write
2E10000
heap
page execute and read and write
199ED000
heap
page read and write
170E000
stack
page read and write
6F8FD000
unkown
page readonly
2F0E000
stack
page read and write
2FF4000
trusted library allocation
page read and write
22428000
direct allocation
page execute read
2E9A6000
heap
page read and write
317F000
stack
page read and write
5F2000
unkown
page readonly
DB0000
heap
page read and write
1FF45000
direct allocation
page execute read
EBD000
heap
page read and write
CF0000
heap
page read and write
563000
remote allocation
page execute and read and write
6F8FB000
unkown
page readonly
1C0CE000
heap
page read and write
C88000
heap
page read and write
22421000
direct allocation
page execute read
5F0000
heap
page read and write
9BB9000
heap
page read and write
6C2E2000
unkown
page readonly
32A0000
heap
page read and write
199DC000
heap
page read and write
CB0000
heap
page read and write
1417000
heap
page read and write
584000
remote allocation
page execute and read and write
19C2D000
stack
page read and write
55E000
remote allocation
page execute and read and write
307E000
stack
page read and write
294D000
stack
page read and write
720000
heap
page read and write
61ECD000
direct allocation
page readonly
25C0000
trusted library allocation
page read and write
CAC000
heap
page read and write
6F871000
unkown
page execute read
12C6000
heap
page read and write
9B2000
heap
page read and write
2D47000
trusted library allocation
page execute and read and write
DB6000
heap
page read and write
25BA000
trusted library allocation
page execute and read and write
4E2000
remote allocation
page execute and read and write
EA0000
trusted library allocation
page read and write
F33000
stack
page read and write
EA4000
heap
page read and write
CF4000
heap
page read and write
22662000
direct allocation
page read and write
467000
remote allocation
page execute and read and write
DFA000
heap
page read and write
8F8000
heap
page read and write
19B2B000
stack
page read and write
B70000
heap
page read and write
1C2FB000
stack
page read and write
E70000
heap
page read and write
1AFBD000
stack
page read and write
E1E000
heap
page read and write
1FF16000
direct allocation
page execute read
8F8000
stack
page read and write
2262F000
direct allocation
page readonly
2681000
trusted library allocation
page execute and read and write
2290B000
stack
page read and write
EF0000
heap
page read and write
213B0000
heap
page read and write
D0C000
stack
page read and write
31FE000
stack
page read and write
13FE000
heap
page read and write
2266D000
direct allocation
page readonly
52D000
remote allocation
page execute and read and write
199BF000
stack
page read and write
1564000
trusted library allocation
page read and write
3233000
trusted library allocation
page read and write
13F0000
heap
page read and write
CC2000
heap
page read and write
128CD000
stack
page read and write
358F000
stack
page read and write
1ABE0000
heap
page read and write
FDC000
stack
page read and write
19ACC000
stack
page read and write
61ED0000
direct allocation
page read and write
2755E000
stack
page read and write
900000
heap
page read and write
1433000
heap
page read and write
47BE000
stack
page read and write
13D0000
heap
page read and write
64A000
remote allocation
page execute and read and write
1C618000
heap
page read and write
4FE000
remote allocation
page execute and read and write
2D30000
trusted library allocation
page read and write
729E000
stack
page read and write
22586000
direct allocation
page execute read
1AE7D000
stack
page read and write
B5D000
stack
page read and write
1FDFA000
direct allocation
page execute read
1060000
heap
page read and write
1C36E000
stack
page read and write
1FFDB000
direct allocation
page readonly
EA7000
heap
page read and write
B10000
trusted library allocation
page read and write
E1C000
heap
page read and write
4A5E000
stack
page read and write
DB3000
heap
page read and write
276AE000
stack
page read and write
4F00000
heap
page read and write
1020000
heap
page read and write
2266A000
direct allocation
page readonly
1B310000
heap
page read and write
115D000
stack
page read and write
DD5000
heap
page read and write
E30000
heap
page read and write
2961000
trusted library allocation
page execute and read and write
7E0000
heap
page read and write
2900000
trusted library allocation
page execute and read and write
25E0000
trusted library allocation
page read and write
10FD000
stack
page read and write
D10000
heap
page read and write
3746000
heap
page read and write
1063000
heap
page read and write
EB3000
trusted library allocation
page execute and read and write
12D2000
heap
page read and write
9E10000
unclassified section
page read and write
2E4B0000
heap
page read and write
910000
heap
page read and write
8F0000
heap
page read and write
FF0000
heap
page read and write
1B300000
heap
page read and write
6C4D0000
unkown
page read and write
97DF000
stack
page read and write
1C0AC000
heap
page read and write
61E01000
direct allocation
page execute read
14F9F000
stack
page read and write
3348000
heap
page read and write
88C000
stack
page read and write
CB5000
heap
page read and write
13F8000
heap
page read and write
EDE000
stack
page read and write
2FB0000
heap
page read and write
920000
heap
page read and write
61EB7000
direct allocation
page readonly
C80000
heap
page read and write
2FF6000
trusted library allocation
page read and write
101C000
heap
page read and write
2139A000
heap
page read and write
E34000
heap
page read and write
25A6000
trusted library allocation
page read and write
E3C000
stack
page read and write
6C4CE000
unkown
page read and write
2950000
heap
page execute and read and write
EDA000
trusted library allocation
page execute and read and write
14CDC000
stack
page read and write
1053000
heap
page read and write
30BF000
stack
page read and write
966F000
stack
page read and write
262E000
stack
page read and write
2A3D000
stack
page read and write
C7F000
stack
page read and write
25A4000
trusted library allocation
page read and write
C90000
heap
page read and write
173EE000
stack
page read and write
95B000
heap
page read and write
1038E000
stack
page read and write
8EC000
stack
page read and write
6C2F1000
unkown
page execute read
B14000
trusted library allocation
page read and write
D8E000
stack
page read and write
25A0000
trusted library allocation
page read and write
1AD3F000
stack
page read and write
2580000
trusted library allocation
page read and write
1C4B3000
heap
page read and write
1FF86000
direct allocation
page execute read
6C4CF000
unkown
page write copy
213C4000
heap
page read and write
DC6000
heap
page read and write
5C5000
remote allocation
page execute and read and write
FFE000
stack
page read and write
FEF000
stack
page read and write
50E000
remote allocation
page execute and read and write
63A000
remote allocation
page execute and read and write
5A0000
unkown
page readonly
2E4BB000
heap
page read and write
27453000
heap
page read and write
467000
remote allocation
page execute and read and write
D60000
heap
page read and write
E9B000
heap
page read and write
4015000
trusted library allocation
page read and write
4C2000
remote allocation
page execute and read and write
E3E000
heap
page read and write
2FD0000
trusted library allocation
page read and write
528000
remote allocation
page execute and read and write
B04000
trusted library allocation
page read and write
CC6000
heap
page read and write
1034F000
stack
page read and write
2670000
heap
page execute and read and write
281E000
stack
page read and write
32EE000
stack
page read and write
9BB0000
heap
page read and write
12F8000
stack
page read and write
6F8E1000
unkown
page execute read
C8E000
heap
page read and write
2FE3000
trusted library allocation
page execute and read and write
D80000
heap
page read and write
6F870000
unkown
page readonly
30FE000
stack
page read and write
19AD0000
heap
page read and write
6C2CD000
unkown
page readonly
19A01000
heap
page read and write
1AEBE000
stack
page read and write
1458000
heap
page read and write
E0E000
heap
page read and write
2A4D000
stack
page read and write
EEE000
stack
page read and write
E60000
heap
page read and write
7E5000
heap
page read and write
2D20000
trusted library allocation
page read and write
C80000
heap
page read and write
2820000
trusted library allocation
page execute and read and write
1271000
heap
page read and write
2E11F000
stack
page read and write
D70000
heap
page read and write
45D000
remote allocation
page execute and read and write
1747E000
stack
page read and write
1C5FA000
heap
page read and write
31E000
unkown
page readonly
3190000
trusted library allocation
page read and write
283F000
stack
page read and write
3961000
trusted library allocation
page read and write
F30000
heap
page read and write
1563000
trusted library allocation
page execute and read and write
F1E000
stack
page read and write
2FF0000
trusted library allocation
page read and write
F82000
heap
page read and write
6C4D0000
unkown
page read and write
6C4CE000
unkown
page read and write
F5E000
stack
page read and write
D6A000
heap
page read and write
6F8FE000
unkown
page read and write
6F8E5000
unkown
page execute read
CB0000
heap
page read and write
199D2000
heap
page read and write
2E00000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
1C4BA000
heap
page read and write
5F5000
heap
page read and write
3200000
trusted library allocation
page read and write
2D60000
trusted library allocation
page read and write
58C000
stack
page read and write
970000
heap
page read and write
2C2000
unkown
page readonly
DD0000
heap
page read and write
2923000
trusted library allocation
page read and write
3340000
heap
page read and write
126A000
heap
page read and write
4F08D000
stack
page read and write
D90000
heap
page read and write
46BE000
stack
page read and write
3017000
trusted library allocation
page execute and read and write
22AD0000
heap
page read and write
21380000
heap
page read and write
1170000
heap
page read and write
101DF000
stack
page read and write
100E000
heap
page read and write
16C0000
heap
page read and write
89C000
stack
page read and write
213BC000
heap
page read and write
48C9E000
stack
page read and write
C6F000
stack
page read and write
CB0000
heap
page read and write
C3F000
stack
page read and write
1C182000
heap
page read and write
6C4D5000
unkown
page readonly
213C0000
heap
page read and write
6F8A1000
unkown
page execute read
93E000
heap
page read and write
9D10000
heap
page read and write
F8F000
heap
page read and write
1C1FB000
stack
page read and write
3231000
trusted library allocation
page execute and read and write
582000
remote allocation
page execute and read and write
1040000
heap
page read and write
EE7000
trusted library allocation
page execute and read and write
1FFF6000
direct allocation
page read and write
9AC000
stack
page read and write
1050000
heap
page read and write
6F8000
stack
page read and write
FA0000
heap
page read and write
28FE000
stack
page read and write
1FFF2000
direct allocation
page read and write
C90000
heap
page read and write
There are 641 hidden memdumps, click here to show them.