IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\DBGIJEHIID.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\EGDGCGCFHI.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\KECBKKEBKE.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\userGIEGHJEGHJ.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\userIJEGDBGDBF.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\66fa2ae906657_snd[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\66fa2afc5abea_vasd[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\66fa2b049020f_ldnf[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\sql[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\66fa2afc5abea_vasd[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\66fa2b049020f_ldnf[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\CFHIIEHJKKEC\IDHDGD
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\CGCFCFBKFCFCBGDGIEGHJDAFHJ
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DAKEBAKFHCFHIEBFBAFB
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\ProgramData\EBFBKFBGIIIDGDGCFCGIIDAKFC
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\FIJKEHJJDAAK\AEBGHD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\FIJKEHJJDAAK\BGDAAE
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\ProgramData\FIJKEHJJDAAK\CAKKEG
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FIJKEHJJDAAK\CBAKEB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FIJKEHJJDAAK\EBGCBA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\FIJKEHJJDAAK\FIIIIJ
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\FIJKEHJJDAAK\GDGDHJ
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\FIJKEHJJDAAK\GDGDHJ-shm
data
dropped
C:\ProgramData\FIJKEHJJDAAK\HIIEGH
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FIJKEHJJDAAK\IEHDBG
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\FIJKEHJJDAAK\IEHDBG-shm
data
dropped
C:\ProgramData\FIJKEHJJDAAK\JJKJDA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\FIJKEHJJDAAK\KECBKK
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\GIEGHJEGHJKFIEBFHJKKKFHCFH
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\GIEHJDHC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HDHJEBFBFHJECAKFCAAK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JKKECBGIIIEB\AAAAKJ
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\JKKFIIEB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\KEGIDHJKKJDGCBGCGIJK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KFHJJJKKFHIDAAKFBFBFCGDGDB
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DBGIJEHIID.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\EGDGCGCFHI.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\KECBKKEBKE.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\userGIEGHJEGHJ.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\userIJEGDBGDBF.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
Non-ISO extended-ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
There are 53 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\KECBKKEBKE.exe
"C:\ProgramData\KECBKKEBKE.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\EGDGCGCFHI.exe
"C:\ProgramData\EGDGCGCFHI.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\DBGIJEHIID.exe
"C:\ProgramData\DBGIJEHIID.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\userGIEGHJEGHJ.exe
"C:\Users\userGIEGHJEGHJ.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\userIJEGDBGDBF.exe
"C:\Users\userIJEGDBGDBF.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\FIJKEHJJDAAK" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\userGIEGHJEGHJ.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\userIJEGDBGDBF.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 18 hidden processes, click here to show them.

URLs

Name
IP
Malicious
commandejorsk.site
malicious
http://files.veritas.org.ng/ldms/66fa2b049020f_ldnf.exei
unknown
malicious
http://urusvisa.com/mozglue.dll
5.42.101.62
malicious
http://46.8.231.109/c4754d4f680ead72.php
46.8.231.109
malicious
http://46.8.231.109/1309cdeb8f4c8736/msvcp140.dll
46.8.231.109
malicious
http://urusvisa.com/softokn3.dll
5.42.101.62
malicious
http://46.8.231.109/c4754d4f680ead72.phpq
unknown
malicious
http://files.veritas.org.ng/ldms/66fa2ae906657_snd.exeD
unknown
malicious
http://46.8.231.109/c4754d4f680ead72.php=
unknown
malicious
http://files.veritas.org.ng/ldms/66fa2afc5abea_vasd.exeX
unknown
malicious
agentyanlark.site
malicious
http://files.veritas.org.ng/ldms/66fa2afc5abea_vasd.exeta;
unknown
malicious
http://files.veritas.org.ng/ldms/66fa2ae906657_snd.exeG
unknown
malicious
http://files.veritas.org.ng/ldms/66fa2ae906657_snd.exe
147.45.44.104
malicious
http://files.veritas.org.ng/ldms/66fa2b049020f_ldnf.exez
unknown
malicious
http://urusvisa.com/sql.dll
5.42.101.62
malicious
http://46.8.231.109/1309cdeb8f4c8736/softokn3.dll
46.8.231.109
malicious
http://files.veritas.org.ng/ldms/66fa2b049020f_ldnf.exe
147.45.44.104
malicious
underlinemdsj.site
malicious
http://urusvisa.com/freebl3.dll
5.42.101.62
malicious
possiwreeste.site
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://possiwreeste.site/api
172.67.205.129
malicious
http://46.8.231.109/1309cdeb8f4c8736/freebl3.dll
46.8.231.109
malicious
http://urusvisa.com/vcruntime140.dll
5.42.101.62
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
bellykmrebk.site
malicious
http://46.8.231.109
unknown
malicious
http://46.8.231.109/c4754d4f680ead72.phpLxSt
unknown
malicious
https://chaptermusu.store/
unknown
malicious
https://chaptermusu.store:443/api
unknown
malicious
https://t.me/jamsemlg
149.154.167.99
malicious
http://46.8.231.109/1309cdeb8f4c8736/mozglue.dll
46.8.231.109
malicious
http://46.8.231.109/c4754d4f680ead72.php1f9a9c4a2f8b514.cdf-ms
unknown
malicious
https://t.me/
unknown
malicious
http://urusvisa.com/
5.42.101.62
malicious
https://underlinemdsj.site/api
104.21.1.169
malicious
https://steamcommunity.com/profiles/76561199780418869
malicious
http://46.8.231.109/
46.8.231.109
malicious
http://46.8.231.109/1309cdeb8f4c8736/nss3.dll
46.8.231.109
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://cowod.hopto.EBKECB
unknown
http://urusvisa.com/U
unknown
https://duckduckgo.com/ac/?q=
unknown
http://urusvisa.com/6z
unknown
http://cowod.hopto.org
unknown
http://urusvisa.com/mozglue.dllT
unknown
https://bellykmrebk.site/apij
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://urusvisa.com/i
unknown
http://cowod.hopto.org_DEBUG.zip/c
unknown
http://urusvisa.com:80acPdLggz.exe
unknown
http://cowod.hopto.
unknown
http://urusvisa.com/6
unknown
http://urusvisa.com:80AKEsrss.exe
unknown
http://cowod.hopto
unknown
http://cowod.hopto.org/N
unknown
http://cowod.hopto.org/G
unknown
https://writekdmsnu.site/apim1L
unknown
https://t.me/ae5ed
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=WnGP
unknown
http://cowod.hoptoKEBKECB
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://steamcommunity.com/i
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://agentyanlark.site/api
unknown
https://underlinemdsj.site/icatl
unknown
http://46.8.231.109/1309cdeb8f4c8736/nss3.dllM
unknown
http://urusvisa.com/u
unknown
http://cowod.GHCAAKEBKECB
unknown
http://urusvisa.com/z
unknown
Http://urusvisa.com:80/sql.dllFgqacPdLggz.exe
unknown
http://urusvisa.com:80AKE
unknown
https://t.me/jamsemlgu
unknown
http://urusvisa.com:80xe
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
http://46.8.231.109/1309cdeb8f4c8736/msvcp140.dllU
unknown
https://steamcommunity.com/profiles/76561199780418869u55uMozilla/5.0
unknown
https://web.telegram.org
unknown
https://writekdmsnu.site/api
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
http://urusvisa.com/nss3.dllF
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=nSnUuYf7g6U1&a
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://bellykmrebk.site/api
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://urusvisa.com/sql.dllLMEM8(
unknown
https://t.me/N
unknown
http://cowod.hopto.orgECB
unknown
https://t.me/i
unknown
http://urusvisa.com/9z
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
possiwreeste.site
172.67.205.129
malicious
steamcommunity.com
104.102.49.254
malicious
urusvisa.com
5.42.101.62
malicious
cowod.hopto.org
45.132.206.251
malicious
t.me
149.154.167.99
malicious
underlinemdsj.site
104.21.1.169
malicious
chaptermusu.store
188.114.97.3
malicious
commandejorsk.site
unknown
malicious
famikyjdiag.site
unknown
malicious
writekdmsnu.site
unknown
malicious
agentyanlark.site
unknown
malicious
delaylacedmn.site
unknown
malicious
bellykmrebk.site
unknown
malicious
files.veritas.org.ng
147.45.44.104
There are 4 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
46.8.231.109
unknown
Russian Federation
malicious
188.114.97.3
chaptermusu.store
European Union
malicious
104.102.49.254
steamcommunity.com
United States
malicious
172.67.205.129
possiwreeste.site
United States
malicious
5.42.101.62
urusvisa.com
Russian Federation
malicious
104.21.1.169
underlinemdsj.site
United States
malicious
149.154.167.99
t.me
United Kingdom
malicious
45.132.206.251
cowod.hopto.org
Russian Federation
malicious
147.45.44.104
files.veritas.org.ng
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF

Memdumps

Base Address
Regiontype
Protect
Malicious
440E000
trusted library allocation
page read and write
malicious
43A000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
39C5000
trusted library allocation
page read and write
malicious
3CE5000
trusted library allocation
page read and write
malicious
FDA000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
15DC000
heap
page read and write
19FAB000
stack
page read and write
910000
heap
page execute and read and write
39C1000
trusted library allocation
page read and write
152CE000
stack
page read and write
9E40000
heap
page read and write
65D000
remote allocation
page execute and read and write
1C192000
heap
page read and write
920000
heap
page read and write
1525F000
stack
page read and write
5EE000
stack
page read and write
228A6000
direct allocation
page readonly
5E9000
remote allocation
page execute and read and write
1C5BC000
stack
page read and write
15BE000
heap
page read and write
6C7E1000
unkown
page execute read
114E000
stack
page read and write
FE5000
heap
page read and write
2286D000
stack
page read and write
1AB5E000
stack
page read and write
630000
unkown
page readonly
2CDC000
stack
page read and write
D0E000
stack
page read and write
29C3000
trusted library allocation
page read and write
14F1000
heap
page read and write
22835000
direct allocation
page execute read
1230000
heap
page read and write
1694000
trusted library allocation
page read and write
4A2F000
stack
page read and write
161E000
stack
page read and write
159D000
stack
page read and write
1120000
heap
page read and write
19E6C000
heap
page read and write
30ED000
stack
page read and write
329E000
stack
page read and write
B7B000
trusted library allocation
page execute and read and write
13E0000
heap
page read and write
18C0000
trusted library allocation
page read and write
2038A000
direct allocation
page readonly
17EE000
stack
page read and write
15B0000
heap
page read and write
BE4000
trusted library allocation
page read and write
1040000
heap
page read and write
1727000
heap
page read and write
6C771000
unkown
page execute read
FAF000
stack
page read and write
1446000
heap
page read and write
1000000
heap
page read and write
755000
heap
page read and write
52C000
remote allocation
page execute and read and write
19E0E000
stack
page read and write
12B9E000
stack
page read and write
2CE1000
trusted library allocation
page execute and read and write
BF6000
trusted library allocation
page read and write
FAC000
stack
page read and write
2284A000
direct allocation
page execute read
1C18E000
heap
page read and write
1C260000
heap
page read and write
65C000
remote allocation
page execute and read and write
2D40000
heap
page read and write
1B19C000
stack
page read and write
144E000
heap
page read and write
14F5E000
stack
page read and write
207B7000
heap
page read and write
377D000
stack
page read and write
1150000
trusted library allocation
page read and write
EF8000
stack
page read and write
492000
remote allocation
page execute and read and write
BE0000
trusted library allocation
page execute and read and write
6C9BE000
unkown
page read and write
14CE000
stack
page read and write
12C2E000
stack
page read and write
113E000
stack
page read and write
1C392000
heap
page read and write
113C000
stack
page read and write
1C162000
heap
page read and write
DA0000
heap
page read and write
19E7E000
heap
page read and write
2C69B000
heap
page read and write
BB0000
heap
page read and write
1C16C000
heap
page read and write
43D5000
trusted library allocation
page read and write
6C74B000
unkown
page execute read
192E000
stack
page read and write
11FF000
heap
page read and write
45A000
remote allocation
page execute and read and write
2DAE000
stack
page read and write
212A0000
heap
page read and write
3CE1000
trusted library allocation
page read and write
1066F000
stack
page read and write
A110000
unclassified section
page read and write
142A000
heap
page read and write
19EBE000
heap
page read and write
1338000
stack
page read and write
13E3000
heap
page read and write
59C000
remote allocation
page execute and read and write
2700000
trusted library allocation
page read and write
94D000
heap
page read and write
54E000
remote allocation
page execute and read and write
3565000
trusted library allocation
page read and write
3FE000
stack
page read and write
1290000
heap
page read and write
6C9BF000
unkown
page write copy
4C5000
remote allocation
page execute and read and write
1640000
heap
page read and write
6C511000
unkown
page execute read
59C000
remote allocation
page execute and read and write
4CBFB000
stack
page read and write
4301000
trusted library allocation
page read and write
4E4000
remote allocation
page execute and read and write
9BDE000
stack
page read and write
51C000
stack
page read and write
1200000
heap
page read and write
4E2000
remote allocation
page execute and read and write
1C36C000
heap
page read and write
BBC000
stack
page read and write
12BB000
heap
page read and write
14D5000
heap
page read and write
3E4EB000
heap
page read and write
1A20000
heap
page read and write
48F000
remote allocation
page execute and read and write
273C8000
heap
page read and write
51B000
remote allocation
page execute and read and write
27310000
heap
page read and write
1AAFF000
stack
page read and write
7B9E000
stack
page read and write
22646000
direct allocation
page readonly
1C160000
heap
page read and write
4305000
trusted library allocation
page read and write
1400000
heap
page read and write
15DF000
stack
page read and write
20382000
direct allocation
page read and write
83E000
stack
page read and write
2287D000
direct allocation
page execute read
19FE000
stack
page read and write
4E4000
remote allocation
page execute and read and write
FD0000
heap
page read and write
1180000
trusted library allocation
page read and write
1550000
trusted library allocation
page read and write
2741000
trusted library allocation
page execute and read and write
1020000
trusted library allocation
page read and write
18E0000
trusted library allocation
page read and write
11DE000
stack
page read and write
2264B000
direct allocation
page readonly
1320000
heap
page read and write
61ECD000
direct allocation
page readonly
16EE000
heap
page read and write
1C34F000
stack
page read and write
10DD000
heap
page read and write
6C795000
unkown
page readonly
22418000
direct allocation
page execute read
196E000
stack
page read and write
1A0AA000
stack
page read and write
BC0000
heap
page read and write
1704000
heap
page read and write
5CB000
remote allocation
page execute and read and write
C1D000
heap
page read and write
C25000
heap
page read and write
900000
trusted library allocation
page read and write
4C5000
remote allocation
page execute and read and write
1760E000
stack
page read and write
1C362000
heap
page read and write
103C000
stack
page read and write
3150000
heap
page read and write
2FAD000
stack
page read and write
D7B000
trusted library allocation
page execute and read and write
65D000
remote allocation
page execute and read and write
16A4000
trusted library allocation
page read and write
203A3000
heap
page read and write
1B09E000
stack
page read and write
1190000
heap
page read and write
37F0000
heap
page read and write
212C7000
heap
page read and write
1240000
heap
page read and write
1810000
heap
page read and write
1C1CE000
heap
page read and write
11EE000
heap
page read and write
371E000
stack
page read and write
226BA000
direct allocation
page execute read
12B5D000
stack
page read and write
750000
heap
page read and write
876000
trusted library allocation
page read and write
A12000
unkown
page readonly
6C790000
unkown
page read and write
1830000
heap
page read and write
22896000
direct allocation
page readonly
20140000
direct allocation
page execute and read and write
1C702000
heap
page read and write
D43000
trusted library allocation
page execute and read and write
1338000
stack
page read and write
4CF3D000
stack
page read and write
BFE000
heap
page read and write
73CF000
stack
page read and write
19EC9000
heap
page read and write
22623000
direct allocation
page readonly
15F4000
heap
page read and write
16CE000
heap
page read and write
6C740000
unkown
page readonly
DBC000
stack
page read and write
6C984000
unkown
page readonly
53FE000
stack
page read and write
A10000
unkown
page readonly
15E4000
heap
page read and write
1570000
trusted library allocation
page read and write
157B000
trusted library allocation
page execute and read and write
2CE3000
trusted library allocation
page read and write
2FED000
stack
page read and write
6C7AE000
unkown
page execute read
178FE000
stack
page read and write
1544000
trusted library allocation
page read and write
89B000
trusted library allocation
page execute and read and write
1B04F000
stack
page read and write
1070000
heap
page read and write
22656000
direct allocation
page read and write
129BE000
stack
page read and write
151DE000
stack
page read and write
45E000
remote allocation
page execute and read and write
1420000
heap
page read and write
1360000
heap
page read and write
6C7E0000
unkown
page readonly
870000
trusted library allocation
page read and write
127C000
stack
page read and write
22679000
heap
page read and write
2034D000
direct allocation
page execute read
1AF4E000
stack
page read and write
61ECC000
direct allocation
page read and write
64A000
remote allocation
page execute and read and write
27CE000
stack
page read and write
29BE000
stack
page read and write
1388000
heap
page read and write
1488000
heap
page read and write
987000
heap
page read and write
1C460000
heap
page read and write
202A6000
direct allocation
page execute read
968000
heap
page read and write
150DC000
stack
page read and write
106AB000
stack
page read and write
4C0000
remote allocation
page execute and read and write
2561000
trusted library allocation
page execute and read and write
10F2000
stack
page read and write
22A0D000
stack
page read and write
133E000
stack
page read and write
14A2000
heap
page read and write
3745000
trusted library allocation
page read and write
280E000
stack
page read and write
128C000
heap
page read and write
2810000
trusted library allocation
page read and write
7EE000
stack
page read and write
400000
remote allocation
page execute and read and write
137C000
stack
page read and write
19D8E000
stack
page read and write
1270000
heap
page read and write
1543000
trusted library allocation
page execute and read and write
D44000
trusted library allocation
page read and write
10D7000
heap
page read and write
1C5F2000
heap
page read and write
2289B000
direct allocation
page readonly
1766E000
stack
page read and write
955000
heap
page read and write
1AC5F000
stack
page read and write
16ED000
heap
page read and write
1640000
heap
page read and write
1370000
heap
page read and write
52A000
remote allocation
page execute and read and write
6C74F000
unkown
page readonly
35AE000
stack
page read and write
228B2000
direct allocation
page read and write
10FC000
stack
page read and write
1C6F0000
heap
page read and write
212C5000
heap
page read and write
1C2BB000
stack
page read and write
BF0000
heap
page read and write
100E000
stack
page read and write
BF4000
trusted library allocation
page read and write
E10000
heap
page read and write
10F0000
heap
page read and write
1A13E000
stack
page read and write
6C741000
unkown
page execute read
14C0000
heap
page read and write
6C7B1000
unkown
page execute read
C40000
heap
page read and write
1711000
heap
page read and write
1C38E000
heap
page read and write
4DBE000
stack
page read and write
D30000
trusted library allocation
page read and write
8E0000
heap
page read and write
1139000
stack
page read and write
127E000
stack
page read and write
252E000
stack
page read and write
1AEDD000
stack
page read and write
B30000
trusted library allocation
page read and write
33D3000
trusted library allocation
page read and write
1045000
heap
page read and write
48F000
remote allocation
page execute and read and write
6C97F000
unkown
page readonly
32F0000
heap
page execute and read and write
61E00000
direct allocation
page execute and read and write
1AC9D000
stack
page read and write
2E6F000
stack
page read and write
33C000
stack
page read and write
273AE000
heap
page read and write
6C7CE000
unkown
page read and write
17F0000
trusted library allocation
page read and write
1420000
heap
page read and write
1780E000
stack
page read and write
850000
trusted library allocation
page read and write
12F7000
heap
page read and write
101E000
heap
page read and write
213A4000
heap
page read and write
1440000
heap
page read and write
17AF000
stack
page read and write
148C000
heap
page read and write
1C360000
heap
page read and write
488000
remote allocation
page execute and read and write
6C5A2000
unkown
page readonly
3B0000
heap
page read and write
A0DF000
stack
page read and write
2563000
trusted library allocation
page read and write
32CE000
stack
page read and write
B50000
trusted library allocation
page read and write
148A000
heap
page read and write
212A2000
heap
page read and write
1634000
heap
page read and write
1390000
heap
page read and write
11ED000
heap
page read and write
AF8000
stack
page read and write
D2E000
stack
page read and write
2C9C000
stack
page read and write
7A0000
heap
page read and write
103E000
heap
page read and write
6C749000
unkown
page execute read
1297D000
stack
page read and write
59C000
remote allocation
page execute and read and write
6C776000
unkown
page execute read
1590000
trusted library allocation
page read and write
1A341000
heap
page read and write
120B000
heap
page read and write
27371000
heap
page read and write
48F000
remote allocation
page execute and read and write
15A0000
trusted library allocation
page execute and read and write
1420000
heap
page read and write
16E7000
heap
page read and write
30DE000
stack
page read and write
6C5B1000
unkown
page execute read
A0E0000
unclassified section
page read and write
5C5000
remote allocation
page execute and read and write
122C000
heap
page read and write
9F40000
unclassified section
page read and write
1150000
heap
page read and write
1446000
heap
page read and write
15D4000
heap
page read and write
863000
trusted library allocation
page execute and read and write
394D000
heap
page read and write
273C2000
heap
page read and write
147A000
heap
page read and write
225D5000
direct allocation
page execute read
1056E000
stack
page read and write
150CE000
stack
page read and write
2261F000
direct allocation
page readonly
C1F000
stack
page read and write
19EC5000
heap
page read and write
20358000
direct allocation
page readonly
22576000
direct allocation
page execute read
273B1000
heap
page read and write
48DE000
stack
page read and write
6C78E000
unkown
page read and write
168E000
heap
page read and write
1516C000
stack
page read and write
12FD000
heap
page read and write
161E000
stack
page read and write
61EB7000
direct allocation
page readonly
1666000
heap
page read and write
132B000
heap
page read and write
227D6000
direct allocation
page execute read
212CE000
heap
page read and write
2D60000
heap
page read and write
BD0000
trusted library allocation
page read and write
273BF000
heap
page read and write
22678000
direct allocation
page execute read
670000
remote allocation
page execute and read and write
212B5000
heap
page read and write
1693000
trusted library allocation
page execute and read and write
1043F000
stack
page read and write
2263B000
direct allocation
page readonly
1140000
trusted library allocation
page execute and read and write
4B40000
heap
page read and write
1C42E000
stack
page read and write
16F5000
heap
page read and write
1505F000
stack
page read and write
BF8000
heap
page read and write
124C000
heap
page read and write
4E4000
remote allocation
page execute and read and write
A76000
unkown
page readonly
123E000
stack
page read and write
8C0000
trusted library allocation
page execute and read and write
EF8000
stack
page read and write
13C5000
heap
page read and write
481000
remote allocation
page execute and read and write
10BE000
stack
page read and write
1459000
heap
page read and write
1530000
trusted library allocation
page read and write
311E000
stack
page read and write
1A1C0000
heap
page read and write
B80000
heap
page read and write
381F000
stack
page read and write
1206000
heap
page read and write
3303000
trusted library allocation
page read and write
1970000
heap
page execute and read and write
1A1E3000
heap
page read and write
13CA000
heap
page read and write
273A9000
heap
page read and write
1495000
heap
page read and write
B43000
trusted library allocation
page execute and read and write
6C7C5000
unkown
page readonly
4B1000
remote allocation
page execute and read and write
228B6000
direct allocation
page read and write
7F0000
heap
page read and write
26FE000
stack
page read and write
1061D000
stack
page read and write
4E6000
remote allocation
page execute and read and write
93E000
stack
page read and write
15B8000
heap
page read and write
32DD000
stack
page read and write
3940000
heap
page read and write
32D0000
trusted library allocation
page execute and read and write
2D50000
heap
page read and write
1B33C000
heap
page read and write
6C78F000
unkown
page write copy
503000
remote allocation
page execute and read and write
1692000
heap
page read and write
2261D000
direct allocation
page execute read
1650000
heap
page read and write
22483000
direct allocation
page execute read
20141000
direct allocation
page execute read
14B1000
heap
page read and write
B0C000
stack
page read and write
11B0000
heap
page read and write
1AB00000
heap
page read and write
61E01000
direct allocation
page execute read
102B000
trusted library allocation
page execute and read and write
3800000
heap
page read and write
52E000
remote allocation
page execute and read and write
874000
trusted library allocation
page read and write
BF0000
heap
page execute and read and write
340B0000
heap
page read and write
948000
heap
page read and write
98C000
heap
page read and write
54CE000
stack
page read and write
156E000
stack
page read and write
61ED3000
direct allocation
page read and write
141F000
stack
page read and write
16E2000
heap
page read and write
F20000
heap
page read and write
212BC000
heap
page read and write
228AB000
direct allocation
page readonly
31DF000
stack
page read and write
D56000
trusted library allocation
page read and write
16A6000
trusted library allocation
page read and write
50F000
remote allocation
page execute and read and write
790000
heap
page read and write
19ECD000
heap
page read and write
105DF000
stack
page read and write
4BD000
remote allocation
page execute and read and write
1235000
heap
page read and write
1200000
heap
page read and write
12F0000
heap
page read and write
11BA000
heap
page read and write
226E3000
direct allocation
page execute read
8D0000
heap
page read and write
22636000
direct allocation
page readonly
C34000
heap
page read and write
1323000
heap
page read and write
D50000
trusted library allocation
page read and write
14D6000
heap
page read and write
5A5000
remote allocation
page execute and read and write
26BE000
stack
page read and write
BA0000
heap
page read and write
4EBE000
stack
page read and write
6C7CD000
unkown
page readonly
6C59E000
unkown
page read and write
440B000
trusted library allocation
page read and write
212C1000
heap
page read and write
1570000
heap
page read and write
2245A000
direct allocation
page execute read
1160000
heap
page execute and read and write
65D000
remote allocation
page execute and read and write
7F5000
heap
page read and write
32E0000
trusted library allocation
page read and write
1614000
heap
page read and write
1460000
heap
page read and write
273D0000
heap
page read and write
4E6000
remote allocation
page execute and read and write
2860000
heap
page execute and read and write
273AC000
heap
page read and write
1680000
trusted library allocation
page read and write
1654000
heap
page read and write
1554000
trusted library allocation
page read and write
18F0000
heap
page read and write
503000
remote allocation
page execute and read and write
3741000
trusted library allocation
page read and write
16C0000
heap
page read and write
1C17D000
heap
page read and write
1C4BB000
stack
page read and write
4C9EB000
stack
page read and write
2038F000
direct allocation
page readonly
463D000
stack
page read and write
BF0000
trusted library allocation
page read and write
22805000
direct allocation
page execute read
EAF000
stack
page read and write
242E000
stack
page read and write
32DD000
stack
page read and write
12BE000
heap
page read and write
2038D000
direct allocation
page readonly
152DF000
stack
page read and write
12BEC000
stack
page read and write
1480000
heap
page read and write
20148000
direct allocation
page execute read
252000
unkown
page readonly
2D3F0000
heap
page read and write
51E000
remote allocation
page execute and read and write
1515E000
stack
page read and write
15F3000
heap
page read and write
13A0000
heap
page read and write
225E4000
direct allocation
page execute read
22883000
direct allocation
page readonly
1C3BC000
stack
page read and write
6C7CB000
unkown
page readonly
D54000
trusted library allocation
page read and write
10F5000
heap
page read and write
2CDF000
stack
page read and write
18BE000
stack
page read and write
2730000
heap
page read and write
12FC000
stack
page read and write
B3C000
stack
page read and write
6C5B0000
unkown
page readonly
1244000
heap
page read and write
1676000
heap
page read and write
92E000
heap
page read and write
19F31000
heap
page read and write
1170000
trusted library allocation
page execute and read and write
11E0000
heap
page read and write
B54000
trusted library allocation
page read and write
6C9C0000
unkown
page read and write
2283D000
direct allocation
page execute read
F40000
unkown
page readonly
122F000
heap
page read and write
3947000
heap
page read and write
437000
remote allocation
page execute and read and write
225E6000
direct allocation
page execute read
B1F000
stack
page read and write
6F8000
stack
page read and write
2EAD000
stack
page read and write
5200000
heap
page read and write
10D0000
heap
page read and write
1C37D000
heap
page read and write
19EC3000
heap
page read and write
131E000
stack
page read and write
2287F000
direct allocation
page readonly
14F5000
heap
page read and write
1A323000
heap
page read and write
27330000
heap
page read and write
3561000
trusted library allocation
page read and write
27350000
heap
page read and write
4698F000
stack
page read and write
6C7BD000
unkown
page readonly
9A2000
heap
page read and write
13F0000
heap
page read and write
164A000
heap
page read and write
580000
heap
page read and write
43D1000
trusted library allocation
page read and write
12B0000
heap
page read and write
4CCFC000
stack
page read and write
19E52000
heap
page read and write
6C58D000
unkown
page readonly
61ED4000
direct allocation
page readonly
B56000
trusted library allocation
page read and write
61EB4000
direct allocation
page read and write
4C5000
remote allocation
page execute and read and write
2DD1000
trusted library allocation
page read and write
33C0000
heap
page read and write
121F000
heap
page read and write
3A0000
heap
page read and write
EF2000
stack
page read and write
16EC000
heap
page read and write
3301000
trusted library allocation
page execute and read and write
4EF000
remote allocation
page execute and read and write
1A3E8000
heap
page read and write
26721000
heap
page read and write
96E000
heap
page read and write
FE0000
heap
page read and write
4C0000
remote allocation
page execute and read and write
1213000
heap
page read and write
141E000
stack
page read and write
1AD9D000
stack
page read and write
F42000
unkown
page readonly
1380000
heap
page read and write
1480000
heap
page read and write
4B5E000
stack
page read and write
19C0E000
stack
page read and write
27391000
heap
page read and write
36AE000
stack
page read and write
2743000
trusted library allocation
page read and write
19F44000
heap
page read and write
1502000
heap
page read and write
762F000
stack
page read and write
155E000
stack
page read and write
1A9FE000
stack
page read and write
1C14F000
stack
page read and write
928000
heap
page read and write
1B230000
heap
page read and write
BDE000
stack
page read and write
1224000
heap
page read and write
632000
unkown
page readonly
1300000
heap
page read and write
3260A000
heap
page read and write
3157000
heap
page read and write
225A5000
direct allocation
page execute read
71C000
stack
page read and write
1430000
heap
page read and write
250000
unkown
page readonly
B70000
heap
page read and write
29C1000
trusted library allocation
page execute and read and write
B44000
trusted library allocation
page read and write
1218000
heap
page read and write
22652000
direct allocation
page read and write
112D000
stack
page read and write
2550000
heap
page read and write
EF2000
stack
page read and write
5A0000
heap
page read and write
990E000
stack
page read and write
14D0000
heap
page read and write
1C490000
heap
page read and write
11E8000
heap
page read and write
33D1000
trusted library allocation
page execute and read and write
114F000
stack
page read and write
2034F000
direct allocation
page readonly
503000
remote allocation
page execute and read and write
15DE000
stack
page read and write
16A0000
trusted library allocation
page read and write
6C9BC000
unkown
page readonly
19E5C000
heap
page read and write
123C000
stack
page read and write
28B0000
heap
page read and write
10F0000
heap
page read and write
37DE000
stack
page read and write
4C0000
remote allocation
page execute and read and write
225EA000
direct allocation
page execute read
1231000
heap
page read and write
2FDF000
stack
page read and write
1C3CE000
heap
page read and write
1B220000
heap
page read and write
E0F000
stack
page read and write
8F8000
stack
page read and write
19F50000
heap
page read and write
485000
remote allocation
page execute and read and write
1A1DC000
heap
page read and write
127A000
heap
page read and write
123C000
stack
page read and write
1ADDE000
stack
page read and write
1190000
heap
page read and write
864000
trusted library allocation
page read and write
473E000
stack
page read and write
15D7000
heap
page read and write
964000
heap
page read and write
22846000
direct allocation
page execute read
1784E000
stack
page read and write
146F000
heap
page read and write
322F000
stack
page read and write
1786D000
stack
page read and write
12EE000
stack
page read and write
1462000
heap
page read and write
2290D000
stack
page read and write
12DC000
heap
page read and write
16FB000
heap
page read and write
16F9000
heap
page read and write
1C4AD000
heap
page read and write
19E3F000
stack
page read and write
1170000
heap
page read and write
13DE000
stack
page read and write
590000
heap
page read and write
19E50000
heap
page read and write
38DF000
stack
page read and write
393E000
stack
page read and write
22844000
direct allocation
page execute read
16E8000
heap
page read and write
682000
unkown
page readonly
2DEF000
stack
page read and write
1A3EA000
heap
page read and write
16C8000
heap
page read and write
1280000
heap
page read and write
1556000
trusted library allocation
page read and write
EFC000
stack
page read and write
769E000
stack
page read and write
212B0000
heap
page read and write
367D000
stack
page read and write
61ED0000
direct allocation
page read and write
C00000
heap
page read and write
1532E000
stack
page read and write
225DD000
direct allocation
page execute read
6C7B5000
unkown
page execute read
994000
heap
page read and write
BE3000
trusted library allocation
page execute and read and write
6C510000
unkown
page readonly
1706000
heap
page read and write
38576000
heap
page read and write
19BAF000
stack
page read and write
106E000
stack
page read and write
960000
heap
page read and write
118E000
stack
page read and write
15C0000
heap
page read and write
18CB000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
6C7B8000
unkown
page execute read
312E000
stack
page read and write
1630000
heap
page read and write
14EFC000
stack
page read and write
There are 713 hidden memdumps, click here to show them.