IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\seed[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\87551\Milfs.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\DocumentsFCFBGIDAEH.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\CFHCBKKFIJJJECAAFCGI
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DQOFHVHTMG.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\FENIVHOIKN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\FENIVHOIKN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\FHDHCAAK
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\FHIJJJKKJJDAKEBFIJDHDAKEHD
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\HJJJJKEHCAKFBFHJKEHCFIIDAE
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HTAGVDFUIE.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\IPKGELNTQY.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\JDAEHJJE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JDBGDHIIDAEBFHJJDBFI
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\JKEBFBFIEHIDAAAAFHCFCGIECB
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KFHJJDHJEGHJKECBGCFH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\LTKMYBSEYZ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\NWTVCDUMOB.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\ONBQCLYSPU.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\ONBQCLYSPU.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\PIVFAGEAAV.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\PIVFAGEAAV.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\UMMBDNEQBN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\UMMBDNEQBN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\VLZDGUKUTZ.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\XZXHAVGRAG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DocumentsFCFBGIDAEH.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\87551\p
data
dropped
C:\Users\user\AppData\Local\Temp\Comparisons
data
dropped
C:\Users\user\AppData\Local\Temp\Could
data
dropped
C:\Users\user\AppData\Local\Temp\Evolution
data
dropped
C:\Users\user\AppData\Local\Temp\Flesh
data
dropped
C:\Users\user\AppData\Local\Temp\Frog
data
dropped
C:\Users\user\AppData\Local\Temp\Horizontal
data
dropped
C:\Users\user\AppData\Local\Temp\Professor
data
dropped
C:\Users\user\AppData\Local\Temp\Prospect
data
dropped
C:\Users\user\AppData\Local\Temp\Taken
ASCII text, with very long lines (1217), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Taken.bat (copy)
ASCII text, with very long lines (1217), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Wrote
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 45 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c move Taken Taken.bat & Taken.bat
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa opssvc"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 87551
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "developmentplaintiffdisturbedconstruction" Flesh
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Horizontal + ..\Comparisons + ..\Evolution + ..\Frog + ..\Could + ..\Professor + ..\Prospect p
malicious
C:\Users\user\AppData\Local\Temp\87551\Milfs.pif
Milfs.pif p
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\DocumentsFCFBGIDAEH.exe"
malicious
C:\Users\user\DocumentsFCFBGIDAEH.exe
"C:\Users\user\DocumentsFCFBGIDAEH.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\user\DocumentsFCFBGIDAEH.exe
malicious
C:\Windows\SysWOW64\PING.EXE
ping 2.2.2.2 -n 1 -w 3000
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\choice.exe
choice /d y /t 5
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://62.204.41.159/db293a2c1b1c70c4/freebl3.dll
62.204.41.159
malicious
http://62.204.41.159/edd20096ecef326d.php
62.204.41.159
malicious
http://62.204.41.159/db293a2c1b1c70c4/softokn3.dll
62.204.41.159
malicious
http://62.204.41.159/db293a2c1b1c70c4/vcruntime140.dll
62.204.41.159
malicious
http://62.204.41.159/
62.204.41.159
malicious
http://62.204.41.159/db293a2c1b1c70c4/msvcp140.dll
62.204.41.159
malicious
http://62.204.41.159/db293a2c1b1c70c4/mozglue.dll
62.204.41.159
malicious
http://62.204.41.159/db293a2c1b1c70c4/nss3.dll
62.204.41.159
malicious
http://62.204.41.159/db293a2c1b1c70c4/sqlite3.dll
62.204.41.159
malicious
http://www.autoitscript.com/autoit3/J
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://duckduckgo.com/ac/?q=
unknown
https://mozilla.org0/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.autoitscript.com/autoit3/
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://176.113.115.187/seed.exe
176.113.115.187
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://api.ipify.orggSOFTWARE
unknown
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
GBGTdvHmHHeUVCgjFpXnspnmRmHb.GBGTdvHmHHeUVCgjFpXnspnmRmHb
unknown

IPs

IP
Domain
Country
Malicious
2.2.2.2
unknown
France
malicious
62.204.41.159
unknown
United Kingdom
malicious
176.113.115.187
unknown
Russian Federation

Memdumps

Base Address
Regiontype
Protect
Malicious
114A000
trusted library allocation
page read and write
malicious
108D000
trusted library allocation
page read and write
malicious
10D8000
trusted library allocation
page read and write
malicious
10D8000
trusted library allocation
page read and write
malicious
FD7000
heap
page read and write
malicious
2CBD000
trusted library allocation
page read and write
malicious
1041000
trusted library allocation
page read and write
malicious
108D000
trusted library allocation
page read and write
malicious
1141000
trusted library allocation
page read and write
malicious
F8A000
heap
page read and write
malicious
10D7000
trusted library allocation
page read and write
malicious
1349000
trusted library allocation
page read and write
1343000
trusted library allocation
page read and write
2BE7000
trusted library allocation
page read and write
2D8A000
trusted library allocation
page read and write
2BEA000
trusted library allocation
page read and write
3740000
trusted library allocation
page read and write
2869000
heap
page read and write
8FA000
heap
page read and write
53E000
stack
page read and write
4F3F000
stack
page read and write
844000
heap
page read and write
2F30000
heap
page read and write
1345000
trusted library allocation
page read and write
1347000
trusted library allocation
page read and write
2D6B000
trusted library allocation
page read and write
3491000
heap
page read and write
1041000
trusted library allocation
page read and write
3491000
heap
page read and write
1341000
trusted library allocation
page read and write
1342000
trusted library allocation
page read and write
4A10000
heap
page execute and read and write
8F0000
heap
page read and write
134C000
trusted library allocation
page read and write
D00000
heap
page read and write
134A000
trusted library allocation
page read and write
A8F000
stack
page read and write
F8A000
heap
page read and write
3491000
heap
page read and write
2BE0000
trusted library allocation
page read and write
3491000
heap
page read and write
2F6F000
trusted library allocation
page read and write
63E000
heap
page read and write
2D66000
trusted library allocation
page read and write
630000
heap
page read and write
3491000
heap
page read and write
82F000
stack
page read and write
3491000
heap
page read and write
2D53000
trusted library allocation
page read and write
27AE000
stack
page read and write
32FF000
stack
page read and write
2BE0000
trusted library allocation
page read and write
8DC000
heap
page read and write
3080000
heap
page read and write
461000
unkown
page read and write
2BEF000
trusted library allocation
page read and write
310C000
heap
page read and write
1341000
trusted library allocation
page read and write
8F1000
heap
page read and write
4F4000
unkown
page readonly
2D6B000
trusted library allocation
page read and write
30FB000
heap
page read and write
2D8A000
trusted library allocation
page read and write
2BEE000
trusted library allocation
page read and write
5D0000
trusted library allocation
page read and write
8DC000
heap
page read and write
2D55000
trusted library allocation
page read and write
357E000
stack
page read and write
30EB000
heap
page read and write
285C000
heap
page read and write
2BE1000
trusted library allocation
page read and write
1340000
trusted library allocation
page read and write
2BEF000
trusted library allocation
page read and write
6D0000
heap
page read and write
3491000
heap
page read and write
2D6B000
trusted library allocation
page read and write
8DC000
heap
page read and write
3491000
heap
page read and write
3491000
heap
page read and write
3491000
heap
page read and write
3491000
heap
page read and write
2D64000
trusted library allocation
page read and write
271E000
stack
page read and write
30EF000
heap
page read and write
134A000
trusted library allocation
page read and write
26D0000
heap
page read and write
8E0000
heap
page read and write
2BEB000
trusted library allocation
page read and write
2905000
heap
page read and write
2908000
heap
page read and write
310A000
heap
page read and write
22D0000
heap
page read and write
3491000
heap
page read and write
2D77000
trusted library allocation
page read and write
8CB000
heap
page read and write
3491000
heap
page read and write
2BE4000
trusted library allocation
page read and write
62E000
stack
page read and write
1347000
trusted library allocation
page read and write
10D0000
trusted library allocation
page read and write
2D8A000
trusted library allocation
page read and write
2D75000
trusted library allocation
page read and write
690000
heap
page read and write
2BE8000
trusted library allocation
page read and write
2BE6000
trusted library allocation
page read and write
8E0000
heap
page read and write
4FAE000
stack
page read and write
2BEB000
trusted library allocation
page read and write
23F0000
heap
page read and write
3491000
heap
page read and write
3491000
heap
page read and write
1342000
trusted library allocation
page read and write
31C0000
heap
page read and write
8DC000
heap
page read and write
8C8000
heap
page read and write
3491000
heap
page read and write
330000
unkown
page readonly
2BEA000
trusted library allocation
page read and write
2D6E000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
3491000
heap
page read and write
2D64000
trusted library allocation
page read and write
1340000
trusted library allocation
page read and write
134E000
trusted library allocation
page read and write
8F1000
heap
page read and write
3491000
heap
page read and write
3491000
heap
page read and write
3491000
heap
page read and write
372F000
stack
page read and write
C63000
heap
page read and write
1349000
trusted library allocation
page read and write
3491000
heap
page read and write
8DC000
heap
page read and write
3491000
heap
page read and write
33A7000
heap
page read and write
2BEB000
trusted library allocation
page read and write
6E3000
heap
page read and write
134A000
trusted library allocation
page read and write
2FED000
heap
page read and write
107C000
trusted library allocation
page read and write
2D60000
trusted library allocation
page read and write
367F000
stack
page read and write
8ED000
heap
page read and write
40B000
unkown
page write copy
8FF000
heap
page read and write
2D64000
trusted library allocation
page read and write
2908000
heap
page read and write
1341000
trusted library allocation
page read and write
2D61000
trusted library allocation
page read and write
3491000
heap
page read and write
2BE0000
trusted library allocation
page read and write
2BEA000
trusted library allocation
page read and write
1070000
trusted library allocation
page read and write
2BEC000
trusted library allocation
page read and write
4EAE000
stack
page read and write
2BEF000
trusted library allocation
page read and write
30DE000
heap
page read and write
1346000
trusted library allocation
page read and write
3491000
heap
page read and write
2D6E000
trusted library allocation
page read and write
2BEB000
trusted library allocation
page read and write
310A000
heap
page read and write
2D4D000
trusted library allocation
page read and write
10000
unkown
page readonly
1041000
trusted library allocation
page read and write
400000
unkown
page readonly
2300000
heap
page read and write
3491000
heap
page read and write
2D4D000
trusted library allocation
page read and write
286C000
heap
page read and write
AC0000
heap
page read and write
2D80000
trusted library allocation
page read and write
8C0000
trusted library allocation
page read and write
4EFE000
stack
page read and write
98000
stack
page read and write
2BE6000
trusted library allocation
page read and write
2D6B000
trusted library allocation
page read and write
4EBF000
stack
page read and write
8E0000
trusted library allocation
page read and write
2D8A000
trusted library allocation
page read and write
229E000
stack
page read and write
401000
unkown
page execute read
2F66000
heap
page read and write
30FB000
heap
page read and write
CE1000
heap
page read and write
2BE7000
trusted library allocation
page read and write
522C000
stack
page read and write
2D4A000
trusted library allocation
page read and write
2D77000
trusted library allocation
page read and write
33B1000
trusted library allocation
page read and write
8F1000
heap
page read and write
2D72000
trusted library allocation
page read and write
2BE7000
trusted library allocation
page read and write
31C8000
heap
page read and write
8E0000
heap
page read and write
1345000
trusted library allocation
page read and write
3491000
heap
page read and write
30EF000
heap
page read and write
2D7B000
trusted library allocation
page read and write
890000
heap
page read and write
285C000
heap
page read and write
3491000
heap
page read and write
8E0000
heap
page read and write
2BEE000
trusted library allocation
page read and write
3491000
heap
page read and write
1342000
trusted library allocation
page read and write
2828000
heap
page read and write
3491000
heap
page read and write
3491000
heap
page read and write
2BEF000
trusted library allocation
page read and write
4FBF000
stack
page read and write
18C000
stack
page read and write
903000
heap
page read and write
29BB000
heap
page read and write
FE9000
heap
page read and write
2D6B000
trusted library allocation
page read and write
3491000
heap
page read and write
2D77000
trusted library allocation
page read and write
2BED000
trusted library allocation
page read and write
1347000
trusted library allocation
page read and write
285C000
heap
page read and write
3050000
heap
page read and write
14C000
stack
page read and write
3104000
heap
page read and write
2D77000
trusted library allocation
page read and write
88E000
stack
page read and write
1348000
trusted library allocation
page read and write
AC000
stack
page read and write
2D8A000
trusted library allocation
page read and write
F8A000
heap
page read and write
F8A000
heap
page read and write
3491000
heap
page read and write
6E8000
heap
page read and write
A2E000
stack
page read and write
23E000
stack
page read and write
2BEA000
trusted library allocation
page read and write
3491000
heap
page read and write
3491000
heap
page read and write
2839000
heap
page read and write
3491000
heap
page read and write
26BF000
stack
page read and write
86E000
stack
page read and write
2D8A000
trusted library allocation
page read and write
2D8A000
trusted library allocation
page read and write
4F7E000
stack
page read and write
4F4000
unkown
page readonly
1342000
trusted library allocation
page read and write
4FC0000
heap
page read and write
3491000
heap
page read and write
2BE000
stack
page read and write
1342000
trusted library allocation
page read and write
2D6A000
trusted library allocation
page read and write
2D53000
trusted library allocation
page read and write
2BE6000
trusted library allocation
page read and write
240E000
stack
page read and write
8AD000
stack
page read and write
2D7B000
trusted library allocation
page read and write
3491000
heap
page read and write
3491000
heap
page read and write
8F1000
heap
page read and write
907000
heap
page read and write
3F9000
unkown
page readonly
400000
unkown
page readonly
3C0000
unkown
page readonly
3491000
heap
page read and write
1F0000
heap
page read and write
1340000
trusted library allocation
page read and write
5D3000
trusted library allocation
page execute and read and write
8ED000
heap
page read and write
1348000
trusted library allocation
page read and write
8FA000
heap
page read and write
333E000
stack
page read and write
2D8A000
trusted library allocation
page read and write
12000
unkown
page readonly
2BE8000
trusted library allocation
page read and write
2BEC000
trusted library allocation
page read and write
134E000
trusted library allocation
page read and write
134C000
trusted library allocation
page read and write
2BE5000
trusted library allocation
page read and write
6CC000
heap
page read and write
1341000
trusted library allocation
page read and write
2D61000
trusted library allocation
page read and write
2EA0000
heap
page read and write
8CB000
heap
page read and write
30FB000
heap
page read and write
2BEC000
trusted library allocation
page read and write
285C000
heap
page read and write
3491000
heap
page read and write
1343000
trusted library allocation
page read and write
1342000
trusted library allocation
page read and write
2BEA000
trusted library allocation
page read and write
8ED000
heap
page read and write
1344000
trusted library allocation
page read and write
2BE9000
trusted library allocation
page read and write
2BE2000
trusted library allocation
page read and write
2BEA000
trusted library allocation
page read and write
4AC0000
heap
page read and write
8FA000
heap
page read and write
8D7000
heap
page read and write
4560000
heap
page read and write
2BE5000
trusted library allocation
page read and write
23B1000
trusted library allocation
page read and write
63A000
heap
page read and write
2904000
heap
page read and write
2D66000
trusted library allocation
page read and write
1341000
trusted library allocation
page read and write
2BE2000
trusted library allocation
page read and write
2BFC000
stack
page read and write
8FF000
heap
page read and write
2BE9000
trusted library allocation
page read and write
2D6B000
trusted library allocation
page read and write
8EC000
heap
page read and write
672000
heap
page read and write
1078000
trusted library allocation
page read and write
3491000
heap
page read and write
8D7000
heap
page read and write
2909000
heap
page read and write
8F1000
heap
page read and write
8D7000
heap
page read and write
2D63000
trusted library allocation
page read and write
1347000
trusted library allocation
page read and write
3491000
heap
page read and write
2D65000
trusted library allocation
page read and write
665000
heap
page read and write
512B000
stack
page read and write
134A000
trusted library allocation
page read and write
2D6B000
trusted library allocation
page read and write
3491000
heap
page read and write
898000
heap
page read and write
8CB000
heap
page read and write
2BE6000
trusted library allocation
page read and write
2BEE000
trusted library allocation
page read and write
3491000
heap
page read and write
2720000
heap
page read and write
2D6E000
trusted library allocation
page read and write
8E0000
heap
page read and write
3491000
heap
page read and write
8DC000
heap
page read and write
310C000
heap
page read and write
C74000
heap
page read and write
285F000
heap
page read and write
3491000
heap
page read and write
3491000
heap
page read and write
2D7B000
trusted library allocation
page read and write
1342000
trusted library allocation
page read and write
3491000
heap
page read and write
2BE7000
trusted library allocation
page read and write
2BE4000
trusted library allocation
page read and write
134C000
trusted library allocation
page read and write
2820000
heap
page read and write
8ED000
heap
page read and write
3740000
trusted library allocation
page read and write
8D7000
heap
page read and write
2D60000
trusted library allocation
page read and write
2D68000
trusted library allocation
page read and write
8F1000
heap
page read and write
23A0000
heap
page execute and read and write
3491000
heap
page read and write
4F0000
heap
page read and write
2BE0000
trusted library allocation
page read and write
30EF000
heap
page read and write
2BE8000
trusted library allocation
page read and write
108D000
trusted library allocation
page read and write
290D000
heap
page read and write
4C30000
trusted library allocation
page read and write
4540000
heap
page read and write
2BE7000
trusted library allocation
page read and write
59D000
stack
page read and write
3106000
heap
page read and write
2D53000
trusted library allocation
page read and write
2D6B000
trusted library allocation
page read and write
3491000
heap
page read and write
3491000
heap
page read and write
2D6B000
trusted library allocation
page read and write
286C000
heap
page read and write
2F60000
heap
page read and write
3491000
heap
page read and write
3491000
heap
page read and write
550000
heap
page read and write
1070000
trusted library allocation
page read and write
3491000
heap
page read and write
2D86000
trusted library allocation
page read and write
5E0000
heap
page read and write
3491000
heap
page read and write
8DC000
heap
page read and write
2D8A000
trusted library allocation
page read and write
307E000
stack
page read and write
3491000
heap
page read and write
1342000
trusted library allocation
page read and write
454D000
stack
page read and write
1348000
trusted library allocation
page read and write
2BE3000
trusted library allocation
page read and write
30FB000
heap
page read and write
1041000
trusted library allocation
page read and write
8CB000
heap
page read and write
8E0000
heap
page read and write
8DC000
heap
page read and write
3491000
heap
page read and write
1343000
trusted library allocation
page read and write
41F000
unkown
page read and write
66E000
stack
page read and write
2BE5000
trusted library allocation
page read and write
30C8000
heap
page read and write
2D68000
trusted library allocation
page read and write
134D000
trusted library allocation
page read and write
3491000
heap
page read and write
2BE0000
trusted library allocation
page read and write
2864000
heap
page read and write
3491000
heap
page read and write
30C0000
heap
page read and write
8FA000
heap
page read and write
2BE3000
trusted library allocation
page read and write
2F79000
trusted library allocation
page read and write
3491000
heap
page read and write
3491000
heap
page read and write
3107000
heap
page read and write
AAD000
stack
page read and write
2D77000
trusted library allocation
page read and write
3491000
heap
page read and write
285C000
heap
page read and write
2BE8000
trusted library allocation
page read and write
30EC000
heap
page read and write
2D60000
trusted library allocation
page read and write
19A000
stack
page read and write
8E0000
heap
page read and write
8F1000
heap
page read and write
8ED000
heap
page read and write
FBA000
heap
page read and write
3491000
heap
page read and write
2DDD000
stack
page read and write
2909000
heap
page read and write
1343000
trusted library allocation
page read and write
134C000
trusted library allocation
page read and write
7DF000
stack
page read and write
134B000
trusted library allocation
page read and write
2BE9000
trusted library allocation
page read and write
8ED000
heap
page read and write
3491000
heap
page read and write
410000
heap
page read and write
276F000
stack
page read and write
1343000
trusted library allocation
page read and write
1141000
trusted library allocation
page read and write
1347000
trusted library allocation
page read and write
2D66000
trusted library allocation
page read and write
114A000
trusted library allocation
page read and write
3491000
heap
page read and write
3491000
heap
page read and write
283E000
heap
page read and write
2BE4000
trusted library allocation
page read and write
30DE000
heap
page read and write
658000
heap
page read and write
2BE2000
trusted library allocation
page read and write
3491000
heap
page read and write
236E000
stack
page read and write
8ED000
heap
page read and write
2BEB000
trusted library allocation
page read and write
36BC000
stack
page read and write
284D000
heap
page read and write
408000
unkown
page readonly
134F000
trusted library allocation
page read and write
4FD000
unkown
page readonly
286C000
heap
page read and write
3491000
heap
page read and write
3491000
heap
page read and write
607000
trusted library allocation
page execute and read and write
28FF000
stack
page read and write
1041000
trusted library allocation
page read and write
26D8000
heap
page read and write
8D7000
heap
page read and write
2D86000
trusted library allocation
page read and write
4FF0000
heap
page read and write
2913000
heap
page read and write
23EF000
stack
page read and write
286C000
heap
page read and write
286C000
heap
page read and write
8CB000
heap
page read and write
8CB000
heap
page read and write
3491000
heap
page read and write
3491000
heap
page read and write
2D53000
trusted library allocation
page read and write
2BE6000
trusted library allocation
page read and write
2D68000
trusted library allocation
page read and write
1348000
trusted library allocation
page read and write
290C000
heap
page read and write
2D65000
trusted library allocation
page read and write
3590000
trusted library allocation
page read and write
2BE3000
trusted library allocation
page read and write
2D6A000
trusted library allocation
page read and write
230B000
heap
page read and write
2D8A000
trusted library allocation
page read and write
3491000
heap
page read and write
401000
unkown
page execute read
5DD000
trusted library allocation
page execute and read and write
8F1000
heap
page read and write
27EF000
stack
page read and write
2BEF000
trusted library allocation
page read and write
134A000
trusted library allocation
page read and write
30EF000
heap
page read and write
283E000
heap
page read and write
8DC000
heap
page read and write
8DC000
heap
page read and write
2BE1000
trusted library allocation
page read and write
2BE1000
trusted library allocation
page read and write
2D87000
trusted library allocation
page read and write
134B000
trusted library allocation
page read and write
1345000
trusted library allocation
page read and write
1346000
trusted library allocation
page read and write
8D7000
heap
page read and write
3491000
heap
page read and write
49CE000
stack
page read and write
50EE000
stack
page read and write
8F1000
heap
page read and write
60B000
trusted library allocation
page execute and read and write
1345000
trusted library allocation
page read and write
2BED000
trusted library allocation
page read and write
2D4E000
trusted library allocation
page read and write
2D7B000
trusted library allocation
page read and write
474000
heap
page read and write
134F000
trusted library allocation
page read and write
1041000
trusted library allocation
page read and write
2BE9000
trusted library allocation
page read and write
134F000
trusted library allocation
page read and write
3491000
heap
page read and write
2BE7000
trusted library allocation
page read and write
4CCE000
stack
page read and write
1348000
trusted library allocation
page read and write
2BEB000
trusted library allocation
page read and write
2BE7000
trusted library allocation
page read and write
3491000
heap
page read and write
321F000
stack
page read and write
310A000
heap
page read and write
2BEE000
trusted library allocation
page read and write
3491000
heap
page read and write
33A0000
heap
page read and write
3F4000
unkown
page write copy
24B0000
heap
page read and write
8E0000
heap
page read and write
2BE1000
trusted library allocation
page read and write
920000
heap
page read and write
3491000
heap
page read and write
3491000
heap
page read and write
3491000
heap
page read and write
2BE1000
trusted library allocation
page read and write
2D6E000
trusted library allocation
page read and write
134F000
trusted library allocation
page read and write
2BEB000
trusted library allocation
page read and write
40B000
unkown
page read and write
2BED000
trusted library allocation
page read and write
8ED000
heap
page read and write
2E60000
trusted library allocation
page read and write
3491000
heap
page read and write
8F1000
heap
page read and write
3E6000
unkown
page readonly
310A000
heap
page read and write
3491000
heap
page read and write
3491000
heap
page read and write
474000
heap
page read and write
2BE2000
trusted library allocation
page read and write
8F1000
heap
page read and write
8FA000
heap
page read and write
8D7000
heap
page read and write
2840000
heap
page read and write
2D63000
trusted library allocation
page read and write
3491000
heap
page read and write
2D60000
trusted library allocation
page read and write
2D61000
trusted library allocation
page read and write
3491000
heap
page read and write
1141000
trusted library allocation
page read and write
2305000
heap
page read and write
2D8A000
trusted library allocation
page read and write
4AAE000
stack
page read and write
2D6E000
trusted library allocation
page read and write
2D86000
trusted library allocation
page read and write
8CB000
heap
page read and write
FD6000
heap
page read and write
134A000
trusted library allocation
page read and write
1348000
trusted library allocation
page read and write
3491000
heap
page read and write
2F2E000
stack
page read and write
2BEC000
trusted library allocation
page read and write
3491000
heap
page read and write
2BE4000
trusted library allocation
page read and write
6D5000
heap
page read and write
134B000
trusted library allocation
page read and write
1347000
trusted library allocation
page read and write
2F75000
trusted library allocation
page read and write
8ED000
heap
page read and write
903000
heap
page read and write
1346000
trusted library allocation
page read and write
2BE5000
trusted library allocation
page read and write
2D7B000
trusted library allocation
page read and write
1349000
trusted library allocation
page read and write
3491000
heap
page read and write
134E000
trusted library allocation
page read and write
3040000
heap
page read and write
134E000
trusted library allocation
page read and write
8F1000
heap
page read and write
2BE6000
trusted library allocation
page read and write
1041000
trusted library allocation
page read and write
8CB000
heap
page read and write
8F7000
heap
page read and write
3350000
heap
page read and write
2BE4000
trusted library allocation
page read and write
1345000
trusted library allocation
page read and write
8DC000
heap
page read and write
2D77000
trusted library allocation
page read and write
8EC000
heap
page read and write
1347000
trusted library allocation
page read and write
2843000
heap
page read and write
319E000
stack
page read and write
5F7000
trusted library allocation
page execute and read and write
290A000
heap
page read and write
3491000
heap
page read and write
1A7000
stack
page read and write
8D7000
heap
page read and write
2E3C000
stack
page read and write
500000
heap
page read and write
30BF000
stack
page read and write
30D9000
heap
page read and write
8FF000
heap
page read and write
134E000
trusted library allocation
page read and write
3491000
heap
page read and write
2D7B000
trusted library allocation
page read and write
2D65000
trusted library allocation
page read and write
134D000
trusted library allocation
page read and write
3491000
heap
page read and write
134A000
trusted library allocation
page read and write
89E000
heap
page read and write
2D86000
trusted library allocation
page read and write
2BEE000
trusted library allocation
page read and write
2901000
heap
page read and write
907000
heap
page read and write
1348000
trusted library allocation
page read and write
408000
unkown
page readonly
8E0000
heap
page read and write
3491000
heap
page read and write
27F000
stack
page read and write
2BE7000
trusted library allocation
page read and write
1347000
trusted library allocation
page read and write
3491000
heap
page read and write
134B000
trusted library allocation
page read and write
2BEC000
trusted library allocation
page read and write
2D72000
trusted library allocation
page read and write
8FA000
heap
page read and write
2D77000
trusted library allocation
page read and write
8CB000
heap
page read and write
F8A000
heap
page read and write
2F71000
trusted library allocation
page read and write
2D66000
trusted library allocation
page read and write
4E6F000
stack
page read and write
30E3000
heap
page read and write
1343000
trusted library allocation
page read and write
1340000
trusted library allocation
page read and write
2EEE000
stack
page read and write
3491000
heap
page read and write
331000
unkown
page execute read
134B000
trusted library allocation
page read and write
8D7000
heap
page read and write
2BE8000
trusted library allocation
page read and write
2F67000
trusted library allocation
page read and write
1346000
trusted library allocation
page read and write
2D4A000
trusted library allocation
page read and write
267E000
stack
page read and write
4E7E000
stack
page read and write
31094000
trusted library allocation
page read and write
2BE2000
trusted library allocation
page read and write
3491000
heap
page read and write
310C000
heap
page read and write
2860000
heap
page read and write
2D9C000
stack
page read and write
3491000
heap
page read and write
3491000
heap
page read and write
1348000
trusted library allocation
page read and write
3491000
heap
page read and write
3491000
heap
page read and write
4FEE000
stack
page read and write
840000
heap
page read and write
6A1000
heap
page read and write
5D4000
trusted library allocation
page read and write
134D000
trusted library allocation
page read and write
134C000
trusted library allocation
page read and write
22C0000
heap
page read and write
3491000
heap
page read and write
134B000
trusted library allocation
page read and write
2726000
heap
page read and write
2D6B000
trusted library allocation
page read and write
30E0000
heap
page read and write
1342000
trusted library allocation
page read and write
5E0000
trusted library allocation
page read and write
2D60000
trusted library allocation
page read and write
2BE9000
trusted library allocation
page read and write
2BE1000
trusted library allocation
page read and write
2BEA000
trusted library allocation
page read and write
37BC000
stack
page read and write
2BE5000
trusted library allocation
page read and write
2BE6000
trusted library allocation
page read and write
8E0000
heap
page read and write
620000
trusted library allocation
page read and write
3491000
heap
page read and write
2867000
heap
page read and write
3491000
heap
page read and write
2D66000
trusted library allocation
page read and write
2D77000
trusted library allocation
page read and write
3103000
heap
page read and write
1346000
trusted library allocation
page read and write
284C000
heap
page read and write
1347000
trusted library allocation
page read and write
1346000
trusted library allocation
page read and write
8D7000
heap
page read and write
8E0000
heap
page read and write
3F0000
unkown
page write copy
3491000
heap
page read and write
8CB000
heap
page read and write
310C000
heap
page read and write
29C9000
heap
page read and write
2865000
heap
page read and write
134C000
trusted library allocation
page read and write
8D7000
heap
page read and write
2D7B000
trusted library allocation
page read and write
3491000
heap
page read and write
8ED000
heap
page read and write
8B0000
trusted library allocation
page execute and read and write
4BCE000
stack
page read and write
2BE5000
trusted library allocation
page read and write
2D7B000
trusted library allocation
page read and write
1345000
trusted library allocation
page read and write
3491000
heap
page read and write
4FD000
unkown
page readonly
310A000
heap
page read and write
2D53000
trusted library allocation
page read and write
5FA000
trusted library allocation
page execute and read and write
8E0000
heap
page read and write
2D6E000
trusted library allocation
page read and write
3491000
heap
page read and write
81E000
stack
page read and write
There are 725 hidden memdumps, click here to show them.