IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\FBFHJJJDAF.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\FIEHIIIJDA.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\ljhgfsd[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\vdshfd[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\DHIECGCAEBFI\AFHDBG
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DHIECGCAEBFI\ECFHIJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DHIECGCAEBFI\KJDGDB
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\IIDHJDGCGDAA\AKEGII
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\IIDHJDGCGDAA\AKJDGI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IIDHJDGCGDAA\CBFIJE
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IIDHJDGCGDAA\DGCAAA
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\IIDHJDGCGDAA\EGIDHD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IIDHJDGCGDAA\GHIJJE
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\IIDHJDGCGDAA\GHJDBA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IIDHJDGCGDAA\HIDGCF
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IIDHJDGCGDAA\IJDHCB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\IIDHJDGCGDAA\JDGCFB
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IIDHJDGCGDAA\JDGCFB-shm
data
dropped
C:\ProgramData\IIDHJDGCGDAA\KKKJKE
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\IIDHJDGCGDAA\KKKJKE-shm
data
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\FBFHJJJDAF.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\FIEHIIIJDA.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\76561199780418869[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\76561199780418869[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
ISO-8859 text, with very long lines (65536), with no line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF, LF line terminators
dropped
There are 24 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\FBFHJJJDAF.exe
"C:\ProgramData\FBFHJJJDAF.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\FIEHIIIJDA.exe
"C:\ProgramData\FIEHIIIJDA.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\IIDHJDGCGDAA" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://5.75.211.162/mozglue.dll9ap
unknown
malicious
https://5.75.211.162/msvcp140.dll7az
unknown
malicious
reinforcenh.shop
malicious
stogeneratmns.shop
malicious
https://5.75.211.162/mozglue.dll
5.75.211.162
malicious
https://5.75.211.162/ECGCAEBFI
unknown
malicious
https://5.75.211.162/freebl3.dll
5.75.211.162
malicious
https://reinforcenh.shop/api
172.67.208.139
malicious
ghostreedmnu.shop
malicious
https://5.75.211.162/vcruntime140.dll
5.75.211.162
malicious
https://5.75.211.162/mozglue.dll_a
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://vozmeatillu.shop/api
188.114.96.3
malicious
fragnantbui.shop
malicious
https://offensivedzvju.shop/api
188.114.97.3
malicious
offensivedzvju.shop
malicious
drawzhotdog.shop
malicious
vozmeatillu.shop
malicious
https://drawzhotdog.shop/api
172.67.162.108
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://player.vimeo.com
unknown
https://duckduckgo.com/ac/?q=
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
http://cowod.hopto.org
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=B0lGn8MokmdT&l=e
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://vozmeatillu.shop/apiR
unknown
https://steamcommunity.com/profiles/76561199780418869/badges
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
http://cowod.hopto.org_DEBUG.zip/c
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
http://cowod.CGCBKECAAAEB
unknown
https://5.75.211.162/ff
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
http://cowod.hopto.
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/profiles/76561199780418869u55uhttps://t.me/ae5edMozilla/5.0
unknown
https://5.75.211.162
unknown
http://cowod.hopto
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://ghostreedmnu.shop/apiES
unknown
https://s.ytimg.com;
unknown
https://5.75.211.162FBGHC
unknown
https://store.steampowered.com/privac
unknown
https://steam.tv/
unknown
https://steamcommunity.com/profiles/76561199780418869Zr
unknown
https://5.75.211.162/freebl3.dllia
unknown
https://steamcommunity.com/l
unknown
https://t.me/ae5ed
unknown
http://cowod.hopto.CAAAEB
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://5.75.211.162.exe
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://mozilla.org0/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=WnGP
unknown
http://www.entrust.net/rpa03
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://5.75.211.162IJKFB
unknown
https://store.steampowered.com/points/shop/
unknown
https://5.75.211.162/-
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://sketchfab.com
unknown
https://www.ecosia.org/newtab/
unknown
https://5.75.211.162/msvcp140.dllAa
unknown
https://lv.queniujq.cn
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.youtube.com/
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://steamcommunity.com/X
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://5.75.211.162/softokn3.dllga
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://5.75.211.162/L
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://5.75.211.162/sqlp.dllW1
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
http://cowod.hopto.orgAEB
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://www.entrust.net/rpa0
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://5.75.211.162/vcruntime140.dllmc
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fragnantbui.shop
188.114.96.3
malicious
gutterydhowi.shop
172.67.132.32
malicious
steamcommunity.com
104.102.49.254
malicious
cowod.hopto.org
45.132.206.251
malicious
offensivedzvju.shop
188.114.97.3
malicious
stogeneratmns.shop
188.114.97.3
malicious
reinforcenh.shop
172.67.208.139
malicious
drawzhotdog.shop
172.67.162.108
malicious
ghostreedmnu.shop
188.114.96.3
malicious
vozmeatillu.shop
188.114.96.3
malicious
ballotnwu.site
104.21.2.13
malicious
dbsmena.com
172.105.54.160
There are 2 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
188.114.97.3
offensivedzvju.shop
European Union
malicious
172.67.162.108
drawzhotdog.shop
United States
malicious
172.67.132.32
gutterydhowi.shop
United States
malicious
188.114.96.3
fragnantbui.shop
European Union
malicious
104.102.49.254
steamcommunity.com
United States
malicious
104.21.2.13
ballotnwu.site
United States
malicious
5.75.211.162
unknown
Germany
malicious
45.132.206.251
cowod.hopto.org
Russian Federation
malicious
172.67.208.139
reinforcenh.shop
United States
malicious
172.105.54.160
dbsmena.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF

Memdumps

Base Address
Regiontype
Protect
Malicious
3465000
trusted library allocation
page read and write
malicious
DF1000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3455000
trusted library allocation
page read and write
malicious
1BE54000
heap
page read and write
6EC000
stack
page read and write
323E000
stack
page read and write
2270E000
stack
page read and write
1BEC2000
heap
page read and write
B31000
heap
page read and write
FE0000
heap
page read and write
6C0FD000
unkown
page readonly
2005B000
direct allocation
page readonly
2451000
trusted library allocation
page execute and read and write
78E000
stack
page read and write
20033000
direct allocation
page readonly
F5E000
stack
page read and write
982F000
stack
page read and write
1451000
heap
page read and write
22338000
direct allocation
page readonly
4F6000
remote allocation
page execute and read and write
1445000
heap
page read and write
1FE28000
direct allocation
page execute read
CD0000
heap
page read and write
B3C000
stack
page read and write
400000
remote allocation
page execute and read and write
B00000
heap
page read and write
1C307000
heap
page read and write
4DB0000
heap
page read and write
4ABD000
stack
page read and write
69E000
stack
page read and write
2294B000
stack
page read and write
DCE000
stack
page read and write
89F000
stack
page read and write
19AD2000
heap
page read and write
D1E000
stack
page read and write
448E000
stack
page read and write
5A1000
remote allocation
page execute and read and write
E9C000
stack
page read and write
9D60000
heap
page read and write
1289E000
stack
page read and write
CD6000
heap
page read and write
14C4000
heap
page read and write
9A10000
heap
page read and write
6C300000
unkown
page read and write
1009D000
stack
page read and write
4FE000
remote allocation
page execute and read and write
31AF000
stack
page read and write
670000
remote allocation
page execute and read and write
6CC000
heap
page read and write
174ED000
stack
page read and write
1988E000
stack
page read and write
EE9000
heap
page read and write
28D0000
heap
page execute and read and write
530000
heap
page read and write
1BE4E000
heap
page read and write
6C080000
unkown
page readonly
E7A000
heap
page read and write
BA0000
heap
page read and write
6B0000
heap
page read and write
4C2000
remote allocation
page execute and read and write
19ABF000
stack
page read and write
19D2C000
stack
page read and write
584000
remote allocation
page execute and read and write
460000
remote allocation
page execute and read and write
D7A000
heap
page read and write
10EB000
trusted library allocation
page execute and read and write
1200000
heap
page read and write
22120000
direct allocation
page execute and read and write
1071000
heap
page read and write
467000
remote allocation
page execute and read and write
F9C000
stack
page read and write
6E0000
trusted library allocation
page read and write
4F8000
stack
page read and write
19AFE000
heap
page read and write
4C8000
remote allocation
page execute and read and write
ABE000
stack
page read and write
A35000
heap
page read and write
1113000
heap
page read and write
19E9E000
stack
page read and write
14E1C000
stack
page read and write
1C325000
heap
page read and write
960000
heap
page read and write
2FBE000
stack
page read and write
4E1000
remote allocation
page execute and read and write
6C081000
unkown
page execute read
F09000
heap
page read and write
90E000
stack
page read and write
2453000
trusted library allocation
page read and write
CDD000
heap
page read and write
610000
heap
page read and write
1C3CC000
heap
page read and write
6C2BF000
unkown
page readonly
7A0000
heap
page read and write
1FF86000
direct allocation
page execute read
4CE000
remote allocation
page execute and read and write
277E000
stack
page read and write
2DAC000
stack
page read and write
455E000
stack
page read and write
1FFF4000
direct allocation
page execute read
706000
trusted library allocation
page read and write
102A000
heap
page read and write
12F5000
heap
page read and write
1C040000
heap
page read and write
980000
heap
page read and write
14C000
stack
page read and write
1135000
heap
page read and write
9BE000
stack
page read and write
BAC000
stack
page read and write
463000
remote allocation
page execute and read and write
950000
trusted library allocation
page execute and read and write
FC0000
heap
page read and write
71A000
trusted library allocation
page execute and read and write
1457000
heap
page read and write
B39000
heap
page read and write
3606000
heap
page read and write
A60000
heap
page read and write
63A000
remote allocation
page execute and read and write
B9F000
stack
page read and write
9D88000
heap
page read and write
327F000
stack
page read and write
2FFD000
stack
page read and write
990000
heap
page read and write
2EBD000
stack
page read and write
10D0000
trusted library allocation
page read and write
104A000
heap
page read and write
20056000
direct allocation
page readonly
6C112000
unkown
page readonly
20046000
direct allocation
page readonly
55E000
remote allocation
page execute and read and write
1B0000
heap
page read and write
1129000
heap
page read and write
F62000
heap
page read and write
1FFED000
direct allocation
page execute read
144E000
heap
page read and write
467000
remote allocation
page execute and read and write
3A7DE000
heap
page read and write
1FFF6000
direct allocation
page execute read
2232D000
direct allocation
page execute read
384E000
stack
page read and write
14BDE000
stack
page read and write
B47000
heap
page read and write
46B000
remote allocation
page execute and read and write
C80000
heap
page read and write
7F5000
heap
page read and write
F3F000
stack
page read and write
3387000
heap
page read and write
E30000
heap
page read and write
2232F000
direct allocation
page readonly
38E5000
trusted library allocation
page read and write
20062000
direct allocation
page read and write
516000
remote allocation
page execute and read and write
1C084000
heap
page read and write
1CC000
stack
page read and write
673000
trusted library allocation
page execute and read and write
1016000
heap
page read and write
727000
trusted library allocation
page execute and read and write
28A0000
heap
page read and write
2300000
trusted library allocation
page read and write
E24000
trusted library allocation
page read and write
F5F000
heap
page read and write
60E000
stack
page read and write
96BE000
stack
page read and write
64E000
stack
page read and write
1380000
heap
page read and write
4ECCC000
stack
page read and write
22286000
direct allocation
page execute read
7E8000
heap
page read and write
36FE000
stack
page read and write
700000
trusted library allocation
page read and write
463000
remote allocation
page execute and read and write
9A00000
heap
page read and write
52D000
remote allocation
page execute and read and write
55D000
remote allocation
page execute and read and write
135E000
stack
page read and write
51F000
remote allocation
page execute and read and write
2236F000
direct allocation
page readonly
125DD000
stack
page read and write
52000
unkown
page readonly
1C1C7000
heap
page read and write
FF00000
heap
page read and write
A30000
heap
page read and write
1D0000
heap
page read and write
E14000
trusted library allocation
page read and write
50E000
remote allocation
page execute and read and write
7E8000
stack
page read and write
1C3CE000
heap
page read and write
A90000
heap
page read and write
9B00000
unclassified section
page read and write
1021000
heap
page read and write
FE8000
heap
page read and write
D70000
heap
page read and write
D2000
unkown
page readonly
4DA000
remote allocation
page execute and read and write
19EB1000
heap
page read and write
3451000
trusted library allocation
page read and write
243E000
stack
page read and write
1C03A000
stack
page read and write
2002D000
direct allocation
page execute read
40746000
heap
page read and write
6C10E000
unkown
page read and write
28E1000
trusted library allocation
page execute and read and write
AAC000
stack
page read and write
F29000
heap
page read and write
12E000
unkown
page readonly
13CD000
stack
page read and write
4E8000
remote allocation
page execute and read and write
172CB000
stack
page read and write
14F5F000
stack
page read and write
2052E000
stack
page read and write
2461000
trusted library allocation
page execute and read and write
2004B000
direct allocation
page readonly
30FD000
stack
page read and write
19B01000
heap
page read and write
5A1000
remote allocation
page execute and read and write
FF5E000
stack
page read and write
DDE000
heap
page read and write
B0E000
heap
page read and write
22362000
direct allocation
page read and write
360D000
heap
page read and write
6AE000
heap
page read and write
4EDCC000
stack
page read and write
F49000
heap
page read and write
EA5000
heap
page read and write
6F4000
trusted library allocation
page read and write
E10000
heap
page read and write
6A8000
heap
page read and write
1FFE5000
direct allocation
page execute read
D5D000
stack
page read and write
45D000
remote allocation
page execute and read and write
289E000
stack
page read and write
9D65000
heap
page read and write
22121000
direct allocation
page execute read
7B0000
heap
page read and write
19D30000
heap
page read and write
49BE000
stack
page read and write
1728D000
stack
page read and write
582000
remote allocation
page execute and read and write
14D3000
heap
page read and write
146E000
heap
page read and write
359E000
stack
page read and write
10E0000
trusted library allocation
page read and write
1980C000
stack
page read and write
7C0000
heap
page read and write
1005F000
stack
page read and write
2790000
heap
page read and write
28985000
heap
page read and write
140E000
stack
page read and write
35FE000
stack
page read and write
19D7E000
heap
page read and write
2236D000
direct allocation
page readonly
E00000
trusted library allocation
page read and write
EF0000
heap
page read and write
790000
trusted library allocation
page execute and read and write
14D4D000
stack
page read and write
69A000
trusted library allocation
page execute and read and write
FD8000
heap
page read and write
1BE5D000
heap
page read and write
2E8F6000
heap
page read and write
31F0000
heap
page read and write
1BDE2000
heap
page read and write
1FFB5000
direct allocation
page execute read
A3C000
stack
page read and write
1FE6A000
direct allocation
page execute read
19AED000
heap
page read and write
A70000
heap
page read and write
14CDF000
stack
page read and write
1FFFA000
direct allocation
page execute read
3461000
trusted library allocation
page read and write
142A000
heap
page read and write
4F8000
stack
page read and write
2463000
trusted library allocation
page read and write
3050000
heap
page read and write
94D000
stack
page read and write
1BDCF000
stack
page read and write
22A14000
heap
page read and write
8A7000
trusted library allocation
page execute and read and write
1FE93000
direct allocation
page execute read
2340000
heap
page read and write
72EE000
stack
page read and write
20087000
heap
page read and write
22128000
direct allocation
page execute read
1145000
heap
page read and write
437000
remote allocation
page execute and read and write
48BEF000
stack
page read and write
7ED000
heap
page read and write
25B4000
trusted library allocation
page read and write
1020000
heap
page read and write
AFE000
stack
page read and write
1420000
heap
page read and write
5F2000
unkown
page readonly
6B5000
heap
page read and write
E13000
trusted library allocation
page execute and read and write
2450000
heap
page execute and read and write
10DA000
trusted library allocation
page execute and read and write
70A000
heap
page read and write
F70000
heap
page read and write
B31000
stack
page read and write
1C1C0000
heap
page read and write
563000
remote allocation
page execute and read and write
50000
unkown
page readonly
2DEC000
stack
page read and write
35DE000
stack
page read and write
113D000
heap
page read and write
563000
remote allocation
page execute and read and write
1110000
trusted library allocation
page execute and read and write
316E000
stack
page read and write
1BED5000
heap
page read and write
5F0000
unkown
page readonly
12F0000
heap
page read and write
55A000
remote allocation
page execute and read and write
B2C000
stack
page read and write
6F3000
trusted library allocation
page execute and read and write
6C121000
unkown
page execute read
1035F000
stack
page read and write
E20000
trusted library allocation
page read and write
F69000
heap
page read and write
6F8F000
stack
page read and write
14DE000
heap
page read and write
6C120000
unkown
page readonly
19C2B000
stack
page read and write
2310000
heap
page execute and read and write
B08000
heap
page read and write
374E000
stack
page read and write
6C2FF000
unkown
page write copy
A40000
trusted library allocation
page read and write
391B000
trusted library allocation
page read and write
31B0000
heap
page read and write
14C1000
heap
page read and write
1C5000
heap
page read and write
8AB000
trusted library allocation
page execute and read and write
6D4000
heap
page read and write
3600000
heap
page read and write
E8B000
heap
page read and write
12E0000
heap
page read and write
E9F000
heap
page read and write
2780000
trusted library allocation
page read and write
704000
trusted library allocation
page read and write
65E000
stack
page read and write
E26000
trusted library allocation
page read and write
35BF000
stack
page read and write
506000
remote allocation
page execute and read and write
686000
trusted library allocation
page read and write
EC1000
heap
page read and write
14B5E000
stack
page read and write
14D5000
heap
page read and write
1BF3B000
stack
page read and write
F87000
heap
page read and write
14FAE000
stack
page read and write
6C2FE000
unkown
page read and write
6C305000
unkown
page readonly
128DE000
stack
page read and write
6E2000
heap
page read and write
1757E000
stack
page read and write
244E000
stack
page read and write
DC1000
heap
page read and write
2DBF000
stack
page read and write
1BE0E000
heap
page read and write
28E3000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
1C12C000
heap
page read and write
D60000
heap
page read and write
19ADC000
heap
page read and write
14E5E000
stack
page read and write
2320000
heap
page read and write
1C0000
heap
page read and write
2012C000
heap
page read and write
4D4000
remote allocation
page execute and read and write
9D70000
heap
page read and write
4F00D000
stack
page read and write
108F000
heap
page read and write
3380000
heap
page read and write
1261D000
stack
page read and write
1120000
heap
page read and write
7C8000
heap
page read and write
10E7000
trusted library allocation
page execute and read and write
19AD0000
heap
page read and write
19BD0000
heap
page read and write
1BDFC000
heap
page read and write
63A000
remote allocation
page execute and read and write
B2C000
heap
page read and write
674000
trusted library allocation
page read and write
528000
remote allocation
page execute and read and write
660000
trusted library allocation
page read and write
4EF000
remote allocation
page execute and read and write
101B000
heap
page read and write
ABD000
stack
page read and write
111A000
heap
page read and write
458E000
stack
page read and write
2032D000
stack
page read and write
2236A000
direct allocation
page readonly
1360000
heap
page read and write
7CE000
heap
page read and write
9E60000
unclassified section
page read and write
34867000
heap
page read and write
2002F000
direct allocation
page readonly
684000
trusted library allocation
page read and write
9D81000
heap
page read and write
680000
trusted library allocation
page read and write
46B000
remote allocation
page execute and read and write
14CB000
heap
page read and write
1BEE0000
heap
page read and write
D0000
unkown
page readonly
34BE000
stack
page read and write
72B000
trusted library allocation
page execute and read and write
2238A000
heap
page read and write
6A0000
heap
page read and write
582000
remote allocation
page execute and read and write
19B3D000
heap
page read and write
BA2000
stack
page read and write
20066000
direct allocation
page read and write
1BDEC000
heap
page read and write
804000
heap
page read and write
19E5D000
stack
page read and write
FBE000
stack
page read and write
38E1000
trusted library allocation
page read and write
B6C000
heap
page read and write
There are 408 hidden memdumps, click here to show them.