IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\CBFBKFIDHI.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\KJEHJKJEBG.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\ljhgfsd[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vdshfd[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\BAECFHJEBAAF\BKECBA
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\BAECFHJEBAAF\EBAFBG
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\BAECFHJEBAAF\EHCAEG
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\BAECFHJEBAAF\GDGHID
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BAECFHJEBAAF\GDGHID-shm
data
dropped
C:\ProgramData\BAECFHJEBAAF\GHJJDG
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BAECFHJEBAAF\HDGDGH
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\BAECFHJEBAAF\HDGDGH-shm
data
dropped
C:\ProgramData\BAECFHJEBAAF\HIDAAK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BAECFHJEBAAF\IEHJJE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BAECFHJEBAAF\KFIJEG
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\DBGHJEBKJEGH\GDBFHD
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\DBGHJEBKJEGH\GHDBKJ
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\CBFBKFIDHI.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\KJEHJKJEBG.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\76561199780418869[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\76561199780418869[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
ISO-8859 text, with very long lines (65536), with no line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF, LF line terminators
dropped
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\CBFBKFIDHI.exe
"C:\ProgramData\CBFBKFIDHI.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\KJEHJKJEBG.exe
"C:\ProgramData\KJEHJKJEBG.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\BAECFHJEBAAF" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://offensivedzvju.shop/apir
unknown
malicious
https://vozmeatillu.shop/$
unknown
malicious
stogeneratmns.shop
malicious
https://5.75.211.162/sqlp.dllI
unknown
malicious
https://5.75.211.162/sqlp.dllJ
unknown
malicious
https://5.75.211.162/vcruntime140.dll
5.75.211.162
malicious
https://steamcommunity.com/profiles/76561199724331900
23.197.127.21
malicious
https://stogeneratmns.shop/
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
fragnantbui.shop
malicious
offensivedzvju.shop
malicious
https://steamcommunity.com/profiles/76561199780418869
104.102.49.254
malicious
https://5.75.211.162/softokn3.dll
5.75.211.162
malicious
https://stogeneratmns.shop/api
188.114.97.3
malicious
https://ghostreedmnu.shop/api
188.114.97.3
malicious
https://5.75.211.162/
5.75.211.162
malicious
reinforcenh.shop
malicious
https://5.75.211.162/mozglue.dll
5.75.211.162
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=B0lGn8MokmdT&l=e
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
http://cowod.hopto.org_DEBUG.zip/c
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://steamcommunity.com/profiles/76561199780418869&
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exe
unknown
https://reinforcenh.shop/api
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/profiles/76561199780418869u55uhttps://t.me/ae5edMozilla/5.0
unknown
https://5.75.211.162KKEGI
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://s.ytimg.com;
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://fragnantbui.shop/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=WnGP
unknown
http://www.entrust.net/rpa03
unknown
http://cowod.AKJKJEVWXYZ1234567890isposition:
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.ecosia.org/newtab/
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://www.google.com/recaptcha/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
http://cowod.AKJKJEBGCAK
unknown
https://5.75.211.162/msvcp140.dll0G
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://5.75.211.162/mozglue.dllD
unknown
https://5.75.211.162/freebl3.dllrDH
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://5.75.211.162a
unknown
https://help.steampowered.com/en/
unknown
https://community.akamai.steamstatic.com/
unknown
https://offensivedzvju.shop/~
unknown
https://recaptcha.net/recaptcha/;
unknown
https://steamcommunity.com/profiles/76561199780418869/inventory/
unknown
Http://cowod.hopto.org/form-data;
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=nSnUuYf7g6U1&a
unknown
http://cowod.hoptoIEBGCAK
unknown
https://reinforcenh.shop//
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://offensivedzvju.shop/pi
unknown
http://crl.entrust.net/ts1ca.crl0
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://dbsmena.com/
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199780418869
unknown
http://cowod.hopto.EBGCAK
unknown
https://5.75.211.162IJKJE
unknown
http://aia.entrust.net/ts1-chain256.cer01
unknown
https://store.steampowered.com/
unknown
http://127.0.0.1:27060
unknown
https://5.75.211.162/HJEBKJEGH
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://ghostreedmnu.shop/apiY
unknown
https://reinforcenh.shop/l
unknown
https://5.75.211.1620.5938.132
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://api.steampowered.com/
unknown
https://store.steampowered.com/mobile
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
unknown
https://dbsmena.com/vdshfd.exen
unknown
https://player.vimeo.com
unknown
https://fragnantbui.shop/apiU
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
http://cowod.hopto.org
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fragnantbui.shop
188.114.97.3
malicious
gutterydhowi.shop
104.21.4.136
malicious
steamcommunity.com
104.102.49.254
malicious
cowod.hopto.org
45.132.206.251
malicious
offensivedzvju.shop
188.114.96.3
malicious
stogeneratmns.shop
188.114.97.3
malicious
reinforcenh.shop
104.21.77.130
malicious
drawzhotdog.shop
104.21.58.182
malicious
ghostreedmnu.shop
188.114.97.3
malicious
vozmeatillu.shop
188.114.96.3
malicious
ballotnwu.site
104.21.2.13
malicious
dbsmena.com
172.105.54.160
There are 2 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.21.77.130
reinforcenh.shop
United States
malicious
104.21.4.136
gutterydhowi.shop
United States
malicious
188.114.97.3
fragnantbui.shop
European Union
malicious
188.114.96.3
offensivedzvju.shop
European Union
malicious
104.102.49.254
steamcommunity.com
United States
malicious
104.21.2.13
ballotnwu.site
United States
malicious
104.21.58.182
drawzhotdog.shop
United States
malicious
5.75.211.162
unknown
Germany
malicious
45.132.206.251
cowod.hopto.org
Russian Federation
malicious
23.197.127.21
unknown
United States
172.105.54.160
dbsmena.com
United States
There are 1 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
12CE000
heap
page read and write
malicious
5A1000
remote allocation
page execute and read and write
malicious
40B5000
trusted library allocation
page read and write
malicious
3725000
trusted library allocation
page read and write
malicious
19C80000
heap
page read and write
8DC000
heap
page read and write
12CA000
trusted library allocation
page execute and read and write
37BE000
stack
page read and write
11DE000
stack
page read and write
780000
unkown
page readonly
15F1000
heap
page read and write
19E42000
heap
page read and write
4EF000
remote allocation
page execute and read and write
11D0000
trusted library allocation
page read and write
1625000
heap
page read and write
F5C000
stack
page read and write
142F000
heap
page read and write
4FFD000
stack
page read and write
152BF000
stack
page read and write
139E000
heap
page read and write
19EDA000
stack
page read and write
400000
remote allocation
page execute and read and write
1334000
heap
page read and write
10E0000
trusted library allocation
page read and write
203DB000
direct allocation
page readonly
2B20000
heap
page read and write
20058000
direct allocation
page execute read
1514C000
stack
page read and write
DC3000
heap
page read and write
1648000
heap
page read and write
19CAE000
heap
page read and write
63A000
remote allocation
page execute and read and write
10DE000
stack
page read and write
6F8000
stack
page read and write
20050000
direct allocation
page execute and read and write
A77000
trusted library allocation
page execute and read and write
19EAD000
heap
page read and write
6C24F000
unkown
page readonly
460000
remote allocation
page execute and read and write
46B000
remote allocation
page execute and read and write
30AE000
stack
page read and write
20384000
direct allocation
page execute read
1054F000
stack
page read and write
1240000
heap
page read and write
203BF000
direct allocation
page readonly
201FA000
direct allocation
page execute read
CA2000
unkown
page readonly
1432000
heap
page read and write
12D6000
heap
page read and write
3B6B000
trusted library allocation
page read and write
5BC000
stack
page read and write
1358000
heap
page read and write
506000
remote allocation
page execute and read and write
FC0000
heap
page read and write
14A9000
heap
page read and write
A050000
unclassified section
page read and write
2520000
heap
page read and write
165E000
heap
page read and write
144E000
heap
page read and write
24E0000
trusted library allocation
page read and write
19F9B000
stack
page read and write
9FF0000
heap
page read and write
A6A000
trusted library allocation
page execute and read and write
A30000
trusted library allocation
page read and write
1515B000
stack
page read and write
FB0000
trusted library allocation
page read and write
1353000
heap
page read and write
A50000
trusted library allocation
page read and write
15AA000
heap
page read and write
12C0000
trusted library allocation
page read and write
20386000
direct allocation
page execute read
582000
remote allocation
page execute and read and write
4D4000
remote allocation
page execute and read and write
132B000
heap
page read and write
1160000
heap
page read and write
A7B000
trusted library allocation
page execute and read and write
680000
heap
page read and write
2CEE000
stack
page read and write
4CA3C000
stack
page read and write
203C3000
direct allocation
page readonly
2025D000
direct allocation
page execute read
1A23D000
stack
page read and write
528000
remote allocation
page execute and read and write
9F0000
heap
page read and write
20223000
direct allocation
page execute read
12FC000
stack
page read and write
203D6000
direct allocation
page readonly
110E000
stack
page read and write
12BCD000
stack
page read and write
125A000
heap
page read and write
150B000
heap
page read and write
2025F000
direct allocation
page readonly
11C6000
heap
page read and write
38F0000
heap
page read and write
12D7000
trusted library allocation
page execute and read and write
55A000
remote allocation
page execute and read and write
4C8000
remote allocation
page execute and read and write
2610000
heap
page execute and read and write
19DDB000
stack
page read and write
52D000
remote allocation
page execute and read and write
2029A000
direct allocation
page readonly
2B31000
trusted library allocation
page execute and read and write
F7F000
stack
page read and write
1210000
heap
page read and write
3214000
trusted library allocation
page read and write
36BE000
stack
page read and write
4C93B000
stack
page read and write
463000
remote allocation
page execute and read and write
3790000
heap
page read and write
2723000
trusted library allocation
page read and write
206CF000
heap
page read and write
4F6000
remote allocation
page execute and read and write
AA0000
heap
page read and write
1054E000
stack
page read and write
13D0000
heap
page read and write
6C08D000
unkown
page readonly
757E000
stack
page read and write
11CD000
heap
page read and write
75DE000
stack
page read and write
6C010000
unkown
page readonly
140E000
heap
page read and write
12B0000
trusted library allocation
page read and write
516000
remote allocation
page execute and read and write
1A2FB000
heap
page read and write
1308000
heap
page read and write
2038A000
direct allocation
page execute read
203EB000
direct allocation
page readonly
130E000
heap
page read and write
1510F000
stack
page read and write
19E5D000
heap
page read and write
203F2000
direct allocation
page read and write
1180000
heap
page execute and read and write
1100000
heap
page read and write
19CFE000
heap
page read and write
357E000
stack
page read and write
2ABF000
stack
page read and write
1300000
heap
page read and write
467000
remote allocation
page execute and read and write
114E000
stack
page read and write
6C290000
unkown
page read and write
1275000
heap
page read and write
563000
remote allocation
page execute and read and write
153E000
stack
page read and write
4689F000
stack
page read and write
1341000
heap
page read and write
38F6000
heap
page read and write
1540000
trusted library allocation
page execute and read and write
582000
remote allocation
page execute and read and write
6C28F000
unkown
page write copy
2F0000
unkown
page readonly
15D7000
heap
page read and write
FB6000
trusted library allocation
page read and write
19CED000
heap
page read and write
D1E000
stack
page read and write
F4E000
stack
page read and write
122E000
stack
page read and write
2B27000
heap
page read and write
46B000
remote allocation
page execute and read and write
1531E000
stack
page read and write
12C0E000
stack
page read and write
201B6000
direct allocation
page execute read
463000
remote allocation
page execute and read and write
15BE000
stack
page read and write
104F0000
heap
page read and write
1A2F9000
heap
page read and write
F50000
stack
page read and write
63A000
remote allocation
page execute and read and write
19E71000
heap
page read and write
19FD0000
heap
page read and write
10E7000
trusted library allocation
page execute and read and write
12A8C000
stack
page read and write
1772E000
stack
page read and write
A44000
trusted library allocation
page read and write
F90000
trusted library allocation
page read and write
1250000
heap
page read and write
765000
heap
page read and write
584000
remote allocation
page execute and read and write
FB4000
trusted library allocation
page read and write
2E2E000
stack
page read and write
4E8000
remote allocation
page execute and read and write
6C011000
unkown
page execute read
6C0B1000
unkown
page execute read
132B000
heap
page read and write
24D0000
trusted library allocation
page execute and read and write
1A252000
heap
page read and write
F5C000
stack
page read and write
A0F0000
unclassified section
page read and write
6C28E000
unkown
page read and write
19F5E000
stack
page read and write
19E4C000
heap
page read and write
1A243000
heap
page read and write
3721000
trusted library allocation
page read and write
203BD000
direct allocation
page execute read
10F8000
stack
page read and write
CA0000
unkown
page readonly
11E0000
heap
page read and write
306F000
stack
page read and write
20292000
direct allocation
page read and write
782000
unkown
page readonly
1270000
heap
page read and write
9EE000
stack
page read and write
121A000
heap
page read and write
753E000
stack
page read and write
D5E000
stack
page read and write
1068E000
stack
page read and write
113C000
stack
page read and write
1500E000
stack
page read and write
CFE000
unkown
page readonly
12B4000
trusted library allocation
page read and write
B78000
stack
page read and write
FC0000
heap
page read and write
1064F000
stack
page read and write
121D000
stack
page read and write
132A000
heap
page read and write
1368000
heap
page read and write
55E000
remote allocation
page execute and read and write
103C000
stack
page read and write
12A3000
heap
page read and write
19C9D000
heap
page read and write
CAF000
stack
page read and write
248E000
stack
page read and write
FA4000
trusted library allocation
page read and write
50E000
remote allocation
page execute and read and write
750000
heap
page read and write
27CE000
stack
page read and write
19C82000
heap
page read and write
30A0000
heap
page execute and read and write
1301000
heap
page read and write
10A0000
heap
page read and write
2C5A7000
heap
page read and write
26633000
heap
page read and write
15FE000
stack
page read and write
4FE000
remote allocation
page execute and read and write
1A234000
heap
page read and write
1100000
trusted library allocation
page read and write
12A4000
trusted library allocation
page read and write
FD0000
heap
page read and write
15F7000
heap
page read and write
14B1000
heap
page read and write
38CD000
stack
page read and write
45D000
remote allocation
page execute and read and write
14E7000
heap
page read and write
2041B000
heap
page read and write
10EB000
trusted library allocation
page execute and read and write
11A0000
heap
page read and write
15D1000
heap
page read and write
DAC000
heap
page read and write
2B33000
trusted library allocation
page read and write
1A130000
heap
page read and write
1654000
heap
page read and write
14F3000
heap
page read and write
2055E000
stack
page read and write
A000000
heap
page read and write
9ABE000
stack
page read and write
1261000
heap
page read and write
E5C000
stack
page read and write
367F000
stack
page read and write
127E000
heap
page read and write
14C1000
heap
page read and write
203E6000
direct allocation
page readonly
19F40000
heap
page read and write
FA3000
trusted library allocation
page execute and read and write
6C09E000
unkown
page read and write
164D000
heap
page read and write
1A10E000
stack
page read and write
DC9000
heap
page read and write
2B20000
heap
page read and write
1139000
stack
page read and write
8E4000
heap
page read and write
660000
heap
page read and write
A7C000
stack
page read and write
4DA000
remote allocation
page execute and read and write
1170000
heap
page read and write
2A7E000
stack
page read and write
563000
remote allocation
page execute and read and write
2A8F000
stack
page read and write
40B1000
trusted library allocation
page read and write
FCA000
trusted library allocation
page execute and read and write
3E3F6000
heap
page read and write
30B1000
trusted library allocation
page execute and read and write
437000
remote allocation
page execute and read and write
20051000
direct allocation
page execute read
114E000
stack
page read and write
20375000
direct allocation
page execute read
13EE000
heap
page read and write
670000
heap
page read and write
19D80000
heap
page read and write
A54000
trusted library allocation
page read and write
6C295000
unkown
page readonly
5A1000
remote allocation
page execute and read and write
FD0000
heap
page read and write
4CE000
remote allocation
page execute and read and write
A56000
trusted library allocation
page read and write
481D000
stack
page read and write
380E000
stack
page read and write
2029D000
direct allocation
page readonly
2EF0000
heap
page read and write
2065E000
stack
page read and write
D9C000
stack
page read and write
6C0B0000
unkown
page readonly
37A1000
heap
page read and write
A43000
trusted library allocation
page execute and read and write
8B8000
heap
page read and write
11C0000
heap
page read and write
4E1000
remote allocation
page execute and read and write
14BD000
heap
page read and write
DA7000
heap
page read and write
1769C000
stack
page read and write
12BF000
heap
page read and write
20316000
direct allocation
page execute read
24CD000
stack
page read and write
88E000
stack
page read and write
2037D000
direct allocation
page execute read
51F000
remote allocation
page execute and read and write
1620000
heap
page read and write
2FFF000
stack
page read and write
1438000
heap
page read and write
19E6E000
heap
page read and write
1180000
heap
page read and write
3EC000
stack
page read and write
5FD000
stack
page read and write
178EE000
stack
page read and write
15CE000
heap
page read and write
134C000
heap
page read and write
A20000
heap
page read and write
1326000
heap
page read and write
2F6E000
stack
page read and write
BAE000
stack
page read and write
11E0000
heap
page read and write
4CC7D000
stack
page read and write
38FD000
heap
page read and write
3251D000
heap
page read and write
2059B000
stack
page read and write
19C6F000
stack
page read and write
BE0000
heap
page read and write
1A0F4000
heap
page read and write
12D0000
trusted library allocation
page read and write
1510000
heap
page read and write
14FF000
stack
page read and write
4CCE000
stack
page read and write
19D62000
heap
page read and write
467000
remote allocation
page execute and read and write
19CF6000
heap
page read and write
1570000
heap
page read and write
2A3F000
stack
page read and write
2F2000
unkown
page readonly
1132000
stack
page read and write
2F2D000
stack
page read and write
1A0ED000
heap
page read and write
2AF0000
heap
page read and write
271E000
stack
page read and write
F4C000
stack
page read and write
D8E000
heap
page read and write
8B0000
heap
page read and write
1785E000
stack
page read and write
201B8000
direct allocation
page execute read
2DEF000
stack
page read and write
4C2000
remote allocation
page execute and read and write
6C0A2000
unkown
page readonly
1190000
heap
page read and write
390E000
stack
page read and write
55D000
remote allocation
page execute and read and write
1150000
trusted library allocation
page execute and read and write
15EE000
heap
page read and write
2029F000
direct allocation
page readonly
3B31000
trusted library allocation
page read and write
8F3000
heap
page read and write
19E2F000
stack
page read and write
840000
heap
page read and write
20268000
direct allocation
page readonly
19C8C000
heap
page read and write
CC5000
heap
page read and write
20345000
direct allocation
page execute read
DB4000
heap
page read and write
12A3000
trusted library allocation
page execute and read and write
14FCD000
stack
page read and write
1A09C000
stack
page read and write
D88000
heap
page read and write
3B35000
trusted library allocation
page read and write
15C5000
heap
page read and write
151BE000
stack
page read and write
30B3000
trusted library allocation
page read and write
1180000
heap
page read and write
15A0000
heap
page read and write
1342000
heap
page read and write
760000
heap
page read and write
13D5000
heap
page read and write
8BE000
heap
page read and write
1550000
trusted library allocation
page read and write
2ECE000
stack
page read and write
CC0000
heap
page read and write
2721000
trusted library allocation
page execute and read and write
202BD000
heap
page read and write
1342000
heap
page read and write
670000
remote allocation
page execute and read and write
1290000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
11CD000
stack
page read and write
9B1E000
stack
page read and write
31AD000
stack
page read and write
203F6000
direct allocation
page read and write
1580000
heap
page read and write
1570000
heap
page read and write
38485000
heap
page read and write
51AE000
stack
page read and write
12DB000
trusted library allocation
page execute and read and write
D80000
heap
page read and write
14EB000
heap
page read and write
CD0000
heap
page read and write
12B6000
trusted library allocation
page read and write
There are 402 hidden memdumps, click here to show them.