IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\GDBFCGIIIJ.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\IIJKJDAFHJ.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\KJEGDBKFIJ.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\userAFIDGDBGCA.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\userBAAAAKJKJE.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\66fbfcc301a31_swws[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\66fbfcc9963ca_ldfsna[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\66fbfccd837ac_vadggdsa[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\66fbfcc9963ca_ldfsna[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\66fbfccd837ac_vadggdsa[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AEGIJKEHCAKF\JECAEH
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\AEGIJKEHCAKF\JKEHII
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\AFBFHDBKJEGHJJJKFIIJEBGIJK
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\DBGIJEHIIDGC\AFCAAE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DBGIJEHIIDGC\AKFHDB
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\DBGIJEHIIDGC\BAFIEG
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DBGIJEHIIDGC\BAFIEG-shm
data
dropped
C:\ProgramData\DBGIJEHIIDGC\BGIJJK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DBGIJEHIIDGC\CFIECB
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DBGIJEHIIDGC\FHIDAF
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DBGIJEHIIDGC\FHIDAF-shm
data
dropped
C:\ProgramData\DBGIJEHIIDGC\HDBGHD
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\DBGIJEHIIDGC\IIJKJD
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\DBGIJEHIIDGC\JDGCGD
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DBGIJEHIIDGC\JKJDHD
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DGCAAFBFBKFIDGDHJDBK
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\EBGCFBGC
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\EGIDAAFI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GCGCFCBAKKFBFIECAEBA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GIEHJDHCBAEHJJJKKFIDGHJECA
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JDAFHCGIJECFHIDGDBKE
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JDGIIDHJEBGI\AAKEGD
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\JDGIIDHJEBGI\CFHDHI
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\KJKJKFCBKKJDGDHIDBGIECBGHJ
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\GDBFCGIIIJ.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\IIJKJDAFHJ.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\KJEGDBKFIJ.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\userAFIDGDBGCA.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\userBAAAAKJKJE.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\76561199780418869[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\76561199780418869[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\76561199780418869[2].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
There are 49 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\GDBFCGIIIJ.exe
"C:\ProgramData\GDBFCGIIIJ.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\KJEGDBKFIJ.exe
"C:\ProgramData\KJEGDBKFIJ.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\IIJKJDAFHJ.exe
"C:\ProgramData\IIJKJDAFHJ.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\userBAAAAKJKJE.exe
"C:\Users\userBAAAAKJKJE.exe"
malicious
C:\Users\userAFIDGDBGCA.exe
"C:\Users\userAFIDGDBGCA.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\DBGIJEHIIDGC" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\userBAAAAKJKJE.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\userAFIDGDBGCA.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 15 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://49.12.197.9/
49.12.197.9
malicious
https://abnomalrkmu.site/api
172.67.152.190
malicious
https://soldiefieop.site/api
188.114.97.3
malicious
https://gravvitywio.store/apiy
unknown
malicious
https://49.12.197.9/sqlp.dll
49.12.197.9
malicious
https://49.12.197.9/softokn3.dll
49.12.197.9
malicious
http://46.8.231.109/1309cdeb8f4c8736/softokn3.dll
46.8.231.109
malicious
https://steamcommunity.com/profiles/76561199724331900q
unknown
malicious
http://46.8.231.109/1309cdeb8f4c8736/sqlite3.dllO
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
questionsmw.stor
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
https://49.12.197.9/vcruntime140.dll
49.12.197.9
malicious
https://49.12.197.9/nss3.dll
49.12.197.9
malicious
http://46.8.231.109/c4754d4f680ead72.phpry=----KJKJKFCBKKJDGDHIDBGIultrelease
unknown
malicious
http://46.8.231.109/)
unknown
malicious
https://steamcommunity.com/profiles/76561199780418869
104.102.49.254
malicious
http://46.8.231.109/
46.8.231.109
malicious
http://46.8.231.109/1309cdeb8f4c8736/nss3.dll
46.8.231.109
malicious
https://gravvitywio.store/api
104.21.16.12
malicious
snarlypagowo.site
malicious
chorusarorp.site
malicious
https://49.12.197.9/msvcp140.dll
49.12.197.9
malicious
http://46.8.231.109/1309cdeb8f4c8736/msvcp140.dll3
unknown
malicious
http://46.8.231.109/1309cdeb8f4c8736/sqlite3.dll
46.8.231.109
malicious
http://46.8.231.109/1309cdeb8f4c8736
unknown
malicious
http://46.8.231.109/1309cdeb8f4c8736/sqlite3.dlly
unknown
malicious
https://questionsmw.store/api
104.21.77.132
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://steamcommunity.com/profiles/76561199780418869L
unknown
http://147.45.44.104/ldms/66fbfcc9963ca_ldfsna.exerm-data;
unknown
https://duckduckgo.com/ac/?q=
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
http://cowod.hopto.orgJJE
unknown
https://chorusarorp.site/apiK)l
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=pvBDaFhF2LLJ&l=e
unknown
http://cowod.hopto.org_DEBUG.zip/c
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exe
unknown
https://49.12.197.9/0n
unknown
http://cowod.hoptoKEBKJJE
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/profiles/76561199780418869u55uhttps://t.me/ae5edMozilla/5.0
unknown
https://49.12.197.9/mozglue.dllg
unknown
https://49.12.197.9/freebl3.dllK
unknown
https://absorptioniw.site/api.
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/profiles/765611997804188699
unknown
http://147.45.44.104/ldms/66fbfcc9963ca_ldfsna.exeX
unknown
http://cowod.GCFCAKEBKJJE
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://49.12.197.9/sqlp.dll(3
unknown
http://www.entrust.net/rpa03
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Ed1aWxkV
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17mluIFdhbGxldHxmbmpobWtoaG1rYm
unknown
https://www.ecosia.org/newtab/
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://49.12.197.9IDHDHI
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://www.ybe.c/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://steamcommunity.com/profiles/76561199780418869z
unknown
http://go.microsoft.c
unknown
https://skeab.c
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17WdsYWhtbmRlZHwxfDB8MHxab2hvIF
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://help.steampowered.com/en/
unknown
https://49.12.197.9/B_F
unknown
https://49.12.197.9HJEBGI
unknown
https://49.12.197.9/vcruntime140.dllS
unknown
https://steamcommunity.com/profiles/76561199780418869/inventory/
unknown
https://49.12.197.9/4k
unknown
https://community.akamai.steamstatic.co
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17host.exe
unknown
http://crl.entrust.net/ts1ca.crl0
unknown
https://steamcommunity.com/workshop/
unknown
https://49.12.197.9/msvcp140.dllI
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://chorusarorp.site/api
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199780418869
unknown
http://aia.entrust.net/ts1-chain256.cer01
unknown
https://store.steampowered.com/
unknown
https://snarlypagowo.site/
unknown
https://49.12.197.9/softokn3.dllu
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://147.45.44.104/prog/66fbfcc301a31_swws.exe
147.45.44.104
https://store.steampowered.com/mobile
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
treatynreit.site
172.67.184.196
malicious
snarlypagowo.site
104.21.18.193
malicious
steamcommunity.com
104.102.49.254
malicious
questionsmw.store
104.21.77.132
malicious
mysterisop.site
104.21.21.3
malicious
absorptioniw.site
104.21.17.174
malicious
abnomalrkmu.site
172.67.152.190
malicious
cowod.hopto.org
45.132.206.251
malicious
gravvitywio.store
104.21.16.12
malicious
soldiefieop.site
188.114.97.3
malicious
chorusarorp.site
unknown
malicious
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
46.8.231.109
unknown
Russian Federation
malicious
49.12.197.9
unknown
Germany
malicious
104.21.17.174
absorptioniw.site
United States
malicious
104.21.21.3
mysterisop.site
United States
malicious
45.132.206.251
cowod.hopto.org
Russian Federation
malicious
104.21.77.132
questionsmw.store
United States
malicious
104.21.18.193
snarlypagowo.site
United States
malicious
188.114.97.3
soldiefieop.site
European Union
malicious
104.102.49.254
steamcommunity.com
United States
malicious
172.67.152.190
abnomalrkmu.site
United States
malicious
104.21.16.12
gravvitywio.store
United States
malicious
172.67.184.196
treatynreit.site
United States
malicious
23.67.133.187
unknown
United States
147.45.44.104
unknown
Russian Federation
There are 4 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF

Memdumps

Base Address
Regiontype
Protect
Malicious
37E5000
trusted library allocation
page read and write
malicious
144A000
heap
page read and write
malicious
3F55000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
43A000
remote allocation
page execute and read and write
malicious
346E000
trusted library allocation
page read and write
malicious
4DEE000
stack
page read and write
1214000
heap
page read and write
216E5000
heap
page read and write
B50000
heap
page read and write
100D000
heap
page read and write
FB0000
trusted library allocation
page read and write
12F8000
stack
page read and write
B70000
heap
page read and write
14E0000
heap
page read and write
1750000
trusted library allocation
page read and write
1FD06000
direct allocation
page execute read
FA0000
heap
page read and write
4C74C000
stack
page read and write
A14000
heap
page read and write
506000
remote allocation
page execute and read and write
4E1000
remote allocation
page execute and read and write
533F000
stack
page read and write
115F000
heap
page read and write
54DE000
stack
page read and write
9DD0000
heap
page read and write
BBC000
stack
page read and write
CF3000
trusted library allocation
page execute and read and write
51E000
remote allocation
page execute and read and write
1FD04000
direct allocation
page execute read
140E000
stack
page read and write
563000
remote allocation
page execute and read and write
48DE000
stack
page read and write
19B82000
heap
page read and write
11E0000
trusted library allocation
page read and write
20072000
direct allocation
page read and write
AF2000
stack
page read and write
55E000
remote allocation
page execute and read and write
1810000
trusted library allocation
page execute and read and write
9D40000
unclassified section
page read and write
4E5F000
stack
page read and write
582000
remote allocation
page execute and read and write
54AE000
stack
page read and write
3231000
trusted library allocation
page execute and read and write
FAE000
stack
page read and write
D2B000
trusted library allocation
page execute and read and write
8A7000
heap
page read and write
EEE000
heap
page read and write
1B1CE000
stack
page read and write
4E8000
remote allocation
page execute and read and write
22665000
direct allocation
page execute read
1ABAE000
stack
page read and write
1767000
trusted library allocation
page execute and read and write
19BC8000
heap
page read and write
50F000
remote allocation
page execute and read and write
11D2000
heap
page read and write
22712000
direct allocation
page read and write
FB4000
trusted library allocation
page read and write
2BE0000
heap
page execute and read and write
61EB7000
direct allocation
page readonly
1460000
trusted library allocation
page read and write
1530000
trusted library allocation
page read and write
F9E000
stack
page read and write
216BB000
heap
page read and write
F49000
heap
page read and write
1FDCD000
stack
page read and write
C7C000
stack
page read and write
2F53000
trusted library allocation
page read and write
610000
heap
page read and write
51BE000
stack
page read and write
277FB000
heap
page read and write
335E000
stack
page read and write
4B4E000
stack
page read and write
563000
remote allocation
page execute and read and write
485000
remote allocation
page execute and read and write
DB0000
heap
page read and write
56BE000
stack
page read and write
2F4F000
stack
page read and write
1015000
heap
page read and write
22E0000
trusted library allocation
page read and write
14C9E000
stack
page read and write
50E000
remote allocation
page execute and read and write
79E000
stack
page read and write
DC5000
heap
page read and write
14D0000
heap
page read and write
22636000
direct allocation
page execute read
101F000
heap
page read and write
4D4F000
stack
page read and write
1FE30000
direct allocation
page execute and read and write
890000
unkown
page readonly
146D000
trusted library allocation
page execute and read and write
1760000
trusted library allocation
page read and write
892000
unkown
page readonly
2E20000
trusted library allocation
page read and write
9B50000
unclassified section
page read and write
2E40000
heap
page read and write
1011000
heap
page read and write
B10000
heap
page read and write
684000
trusted library allocation
page read and write
E20000
heap
page read and write
4F6000
remote allocation
page execute and read and write
720000
trusted library allocation
page read and write
3F51000
trusted library allocation
page read and write
6F0000
heap
page read and write
F30000
heap
page read and write
48F000
remote allocation
page execute and read and write
2270B000
direct allocation
page readonly
1420000
heap
page read and write
15D3000
heap
page read and write
11EB000
trusted library allocation
page execute and read and write
23FE000
stack
page read and write
226E3000
direct allocation
page readonly
70DE000
stack
page read and write
19A8F000
stack
page read and write
7A4000
heap
page read and write
1C1DD000
heap
page read and write
DF0000
heap
page read and write
55D000
remote allocation
page execute and read and write
FE8000
heap
page read and write
437000
remote allocation
page execute and read and write
F20000
heap
page read and write
1FD56000
direct allocation
page readonly
CFB000
stack
page read and write
19B1E000
heap
page read and write
77FD000
stack
page read and write
1B738000
heap
page read and write
5A18000
stack
page read and write
1440000
heap
page read and write
4DD9000
stack
page read and write
1533000
trusted library allocation
page execute and read and write
E8D000
stack
page read and write
1520000
trusted library allocation
page read and write
1C19D000
heap
page read and write
2433000
trusted library allocation
page read and write
506000
remote allocation
page execute and read and write
5A1000
remote allocation
page execute and read and write
CDF000
stack
page read and write
502C000
stack
page read and write
32000
unkown
page readonly
717E000
stack
page read and write
22543000
direct allocation
page execute read
23FE000
stack
page read and write
6C380000
unkown
page read and write
3220000
heap
page read and write
1C426000
heap
page read and write
14C0000
heap
page read and write
55DE000
stack
page read and write
2CF1000
trusted library allocation
page execute and read and write
1FD76000
direct allocation
page read and write
321E000
stack
page read and write
2007A000
direct allocation
page readonly
2269D000
direct allocation
page execute read
4ADE000
stack
page read and write
1820000
trusted library allocation
page read and write
61E00000
direct allocation
page execute and read and write
1B44F000
stack
page read and write
E57000
heap
page read and write
4FE000
remote allocation
page execute and read and write
770000
heap
page read and write
19CFA000
stack
page read and write
FFA000
heap
page read and write
670000
trusted library allocation
page read and write
19C0E000
stack
page read and write
11E0000
heap
page read and write
1480000
trusted library allocation
page read and write
5179000
stack
page read and write
FC4000
trusted library allocation
page read and write
14C3F000
stack
page read and write
277BB000
heap
page read and write
CF0000
trusted library allocation
page read and write
A4F000
heap
page read and write
2E8D000
stack
page read and write
193F000
stack
page read and write
22706000
direct allocation
page readonly
1550000
heap
page read and write
216C7000
heap
page read and write
512E000
stack
page read and write
101E000
heap
page read and write
1B5AD000
stack
page read and write
2E30000
heap
page execute and read and write
1FD5B000
direct allocation
page readonly
610000
heap
page read and write
536E000
stack
page read and write
6C37E000
unkown
page read and write
1A0D1000
heap
page read and write
920000
heap
page read and write
1490000
trusted library allocation
page read and write
176B000
trusted library allocation
page execute and read and write
AFC000
stack
page read and write
11E7000
trusted library allocation
page execute and read and write
1FD0A000
direct allocation
page execute read
4F4E000
stack
page read and write
5C0000
heap
page read and write
1070000
heap
page read and write
3626000
heap
page read and write
64A000
remote allocation
page execute and read and write
588000
remote allocation
page execute and read and write
10140000
heap
page read and write
61E01000
direct allocation
page execute read
345E000
stack
page read and write
8ED000
heap
page read and write
31E0000
heap
page execute and read and write
1C3BC000
stack
page read and write
CFD000
trusted library allocation
page execute and read and write
1B34E000
stack
page read and write
53CE000
stack
page read and write
63A000
remote allocation
page execute and read and write
F00000
heap
page read and write
1505F000
stack
page read and write
2C3B4000
heap
page read and write
12B7000
heap
page read and write
2370000
heap
page execute and read and write
96C000
stack
page read and write
888000
heap
page read and write
14AA000
heap
page read and write
B00000
heap
page read and write
C82000
unkown
page readonly
D6C000
stack
page read and write
197AF000
stack
page read and write
8B4000
heap
page read and write
197C0000
heap
page read and write
217AF000
heap
page read and write
1534000
trusted library allocation
page read and write
1028000
heap
page read and write
1FD66000
direct allocation
page readonly
67D000
trusted library allocation
page execute and read and write
FE0000
heap
page read and write
673000
trusted library allocation
page execute and read and write
49C0000
heap
page execute and read and write
76D0000
heap
page read and write
1098000
heap
page read and write
6C33F000
unkown
page readonly
F41000
heap
page read and write
1766E000
stack
page read and write
1015000
heap
page read and write
180C000
stack
page read and write
102DB000
stack
page read and write
174AD000
stack
page read and write
1281D000
stack
page read and write
277C4000
heap
page read and write
105F000
heap
page read and write
D90000
heap
page read and write
1A028000
heap
page read and write
153D000
trusted library allocation
page execute and read and write
124E000
stack
page read and write
175EE000
stack
page read and write
81E000
stack
page read and write
1360000
heap
page read and write
61ED3000
direct allocation
page read and write
6C18E000
unkown
page read and write
4A9E000
stack
page read and write
1019E000
stack
page read and write
2C4E000
stack
page read and write
216F2000
heap
page read and write
507D000
stack
page read and write
9DE2000
heap
page read and write
D00000
trusted library allocation
page read and write
660000
trusted library allocation
page read and write
2286E000
stack
page read and write
4F6000
remote allocation
page execute and read and write
528000
remote allocation
page execute and read and write
1584000
heap
page read and write
2A70000
trusted library allocation
page read and write
503E000
stack
page read and write
105B000
heap
page read and write
14B0000
trusted library allocation
page read and write
17CE000
stack
page read and write
33AD000
stack
page read and write
D3A000
heap
page read and write
1FB7A000
direct allocation
page execute read
4C9E000
stack
page read and write
68F000
stack
page read and write
797000
heap
page read and write
121A000
heap
page read and write
111A000
heap
page read and write
600000
heap
page read and write
1FECD000
stack
page read and write
DEE000
heap
page read and write
10CE000
stack
page read and write
197EE000
heap
page read and write
3CF5000
trusted library allocation
page read and write
331F000
stack
page read and write
2CEE000
stack
page read and write
19B0D000
heap
page read and write
5A5E000
stack
page read and write
516000
remote allocation
page execute and read and write
467000
remote allocation
page execute and read and write
19EB0000
heap
page read and write
CCE000
stack
page read and write
3200000
trusted library allocation
page read and write
3620000
heap
page read and write
49C000
stack
page read and write
19AA0000
heap
page read and write
EA0000
heap
page read and write
2AE0000
heap
page read and write
1450000
trusted library allocation
page read and write
19A8F000
heap
page read and write
1350000
heap
page read and write
FC5000
heap
page read and write
5890000
heap
page execute and read and write
10C7000
heap
page read and write
37E1000
trusted library allocation
page read and write
4C4E000
stack
page read and write
E0E000
stack
page read and write
4C5E000
stack
page read and write
4CDE000
stack
page read and write
197F1000
heap
page read and write
7EA000
heap
page read and write
6C100000
unkown
page readonly
6C192000
unkown
page readonly
CD2000
unkown
page readonly
690000
heap
page read and write
1222000
heap
page read and write
10B5000
heap
page read and write
1780000
trusted library allocation
page read and write
2523000
trusted library allocation
page read and write
131E000
stack
page read and write
4DA000
remote allocation
page execute and read and write
14F6E000
stack
page read and write
1004F000
stack
page read and write
4F3E000
stack
page read and write
19D3F000
heap
page read and write
1FD43000
direct allocation
page readonly
464000
remote allocation
page execute and read and write
E17000
heap
page read and write
4B1000
remote allocation
page execute and read and write
3270000
heap
page read and write
19ACE000
heap
page read and write
19AA2000
heap
page read and write
FC0000
trusted library allocation
page read and write
2DDE000
stack
page read and write
55A000
remote allocation
page execute and read and write
1830000
heap
page read and write
B0C000
stack
page read and write
12A0000
heap
page read and write
2A50000
heap
page read and write
D60000
trusted library allocation
page read and write
19AAC000
heap
page read and write
14F0D000
stack
page read and write
EFC000
stack
page read and write
1474000
trusted library allocation
page read and write
582000
remote allocation
page execute and read and write
103F000
heap
page read and write
12F3000
stack
page read and write
1044D000
stack
page read and write
1040000
heap
page read and write
45A000
remote allocation
page execute and read and write
19BFB000
stack
page read and write
12FB000
stack
page read and write
E40000
heap
page read and write
FDC000
stack
page read and write
2003D000
direct allocation
page execute read
48AE000
stack
page read and write
4CDE000
stack
page read and write
380E000
heap
page read and write
204D6000
heap
page read and write
1C2BB000
stack
page read and write
463000
remote allocation
page execute and read and write
4D30000
heap
page execute and read and write
E45000
heap
page read and write
4D8E000
stack
page read and write
216CB000
heap
page read and write
216A0000
heap
page read and write
155E000
heap
page read and write
1B2CD000
stack
page read and write
198C0000
heap
page read and write
584000
remote allocation
page execute and read and write
BFC000
stack
page read and write
EFC000
stack
page read and write
19ECA000
heap
page read and write
D04000
trusted library allocation
page read and write
2007F000
direct allocation
page readonly
3806000
heap
page read and write
61ED4000
direct allocation
page readonly
466AF000
stack
page read and write
117C000
heap
page read and write
104F000
heap
page read and write
400000
remote allocation
page execute and read and write
690000
heap
page read and write
735E000
stack
page read and write
2DDE000
stack
page read and write
8C4000
heap
page read and write
1754E000
stack
page read and write
5CAE000
stack
page read and write
56FE000
stack
page read and write
3280000
heap
page read and write
59E000
stack
page read and write
30000
unkown
page readonly
32328000
heap
page read and write
4231000
trusted library allocation
page read and write
14ACE000
stack
page read and write
216D1000
heap
page read and write
12A5000
heap
page read and write
149B000
trusted library allocation
page execute and read and write
E00000
heap
page read and write
61EB4000
direct allocation
page read and write
45D000
remote allocation
page execute and read and write
4F0E000
stack
page read and write
D79000
stack
page read and write
2000E000
stack
page read and write
1FCC5000
direct allocation
page execute read
19A70000
heap
page read and write
1260000
heap
page read and write
129CE000
stack
page read and write
6C37E000
unkown
page read and write
2420000
heap
page execute and read and write
2007D000
direct allocation
page readonly
45E000
remote allocation
page execute and read and write
14BE000
stack
page read and write
1040F000
stack
page read and write
1344000
heap
page read and write
128A000
heap
page read and write
1991C000
stack
page read and write
3521000
trusted library allocation
page read and write
11DE000
stack
page read and write
1200000
trusted library allocation
page read and write
1EE000
stack
page read and write
19E8E000
stack
page read and write
26447000
heap
page read and write
463000
remote allocation
page execute and read and write
55E000
remote allocation
page execute and read and write
DE0000
heap
page read and write
1FF96000
direct allocation
page execute read
FEE000
heap
page read and write
27E3000
trusted library allocation
page read and write
14B3E000
stack
page read and write
A66000
heap
page read and write
14F1F000
stack
page read and write
563000
remote allocation
page execute and read and write
5A9E000
stack
page read and write
346B000
trusted library allocation
page read and write
150AE000
stack
page read and write
277AF000
heap
page read and write
1290000
trusted library allocation
page execute and read and write
DFC000
stack
page read and write
1023000
heap
page read and write
1068000
heap
page read and write
FB3000
trusted library allocation
page execute and read and write
57FE000
stack
page read and write
1080000
heap
page read and write
19A1D000
stack
page read and write
1C160000
heap
page read and write
27D0000
heap
page read and write
1AEF0000
heap
page read and write
2BCE000
stack
page read and write
567E000
stack
page read and write
5ADE000
stack
page read and write
10FB000
stack
page read and write
1463000
trusted library allocation
page execute and read and write
45D000
remote allocation
page execute and read and write
1592000
heap
page read and write
516000
remote allocation
page execute and read and write
2A90000
trusted library allocation
page read and write
33FD000
heap
page read and write
124A000
heap
page read and write
E20000
heap
page read and write
4A5E000
stack
page read and write
4E1E000
stack
page read and write
F4F000
stack
page read and write
5BDE000
stack
page read and write
D81000
heap
page read and write
4CA8D000
stack
page read and write
96F000
stack
page read and write
2D4F000
stack
page read and write
574E000
stack
page read and write
674000
trusted library allocation
page read and write
46B000
remote allocation
page execute and read and write
79C000
heap
page read and write
226DD000
direct allocation
page execute read
2380000
trusted library allocation
page read and write
27730000
heap
page read and write
147E000
stack
page read and write
1FD3F000
direct allocation
page readonly
14E1E000
stack
page read and write
118E000
heap
page read and write
22716000
direct allocation
page read and write
8AC000
heap
page read and write
9E0000
heap
page read and write
2D8F000
stack
page read and write
D70000
heap
page execute and read and write
2E1E000
stack
page read and write
1A00A000
heap
page read and write
3A2000
unkown
page readonly
E9B000
heap
page read and write
ECE000
stack
page read and write
3431000
trusted library allocation
page read and write
1DC000
stack
page read and write
DC0000
heap
page read and write
860000
trusted library allocation
page execute and read and write
468000
remote allocation
page execute and read and write
190000
heap
page read and write
2BA0000
heap
page read and write
251E000
stack
page read and write
1AAAE000
stack
page read and write
1B4AE000
stack
page read and write
5A5000
remote allocation
page execute and read and write
E81000
heap
page read and write
778000
heap
page read and write
1059000
heap
page read and write
1298D000
stack
page read and write
33F6000
heap
page read and write
1280000
heap
page read and write
4A0E000
stack
page read and write
6C385000
unkown
page readonly
1FC96000
direct allocation
page execute read
680000
trusted library allocation
page read and write
12FD000
heap
page read and write
A0C000
heap
page read and write
52D000
remote allocation
page execute and read and write
522F000
stack
page read and write
298F000
stack
page read and write
526E000
stack
page read and write
E71000
heap
page read and write
19B16000
heap
page read and write
5A1000
remote allocation
page execute and read and write
60E000
stack
page read and write
12B1000
heap
page read and write
46C000
remote allocation
page execute and read and write
492000
remote allocation
page execute and read and write
AF9000
stack
page read and write
6C101000
unkown
page execute read
E8D000
heap
page read and write
1266000
heap
page read and write
4ECE000
stack
page read and write
3435000
trusted library allocation
page read and write
1A0CF000
heap
page read and write
1285D000
stack
page read and write
65C000
remote allocation
page execute and read and write
141F000
stack
page read and write
1424000
heap
page read and write
9ED0000
unclassified section
page read and write
226A4000
direct allocation
page execute read
6C0000
heap
page read and write
7BB000
trusted library allocation
page execute and read and write
74F000
stack
page read and write
1464000
trusted library allocation
page read and write
1C18D000
heap
page read and write
20048000
direct allocation
page readonly
540000
heap
page read and write
1982D000
heap
page read and write
2410000
heap
page read and write
4C4E000
stack
page read and write
452E000
stack
page read and write
5B6E000
stack
page read and write
591E000
stack
page read and write
D9F000
heap
page read and write
51FE000
stack
page read and write
1030E000
stack
page read and write
98E000
stack
page read and write
226A6000
direct allocation
page execute read
38294000
heap
page read and write
362D000
heap
page read and write
1B08D000
stack
page read and write
4DA000
remote allocation
page execute and read and write
1008000
heap
page read and write
940000
heap
page read and write
F60000
heap
page read and write
12CF000
heap
page read and write
3CF1000
trusted library allocation
page read and write
2431000
trusted library allocation
page execute and read and write
88E000
heap
page read and write
2AD0000
heap
page execute and read and write
50E000
remote allocation
page execute and read and write
7F2000
heap
page read and write
7B7000
trusted library allocation
page execute and read and write
F4E000
stack
page read and write
E1E000
stack
page read and write
5CEE000
stack
page read and write
19BAE000
stack
page read and write
FBD000
trusted library allocation
page execute and read and write
1089000
heap
page read and write
550000
heap
page read and write
226FB000
direct allocation
page readonly
157C000
heap
page read and write
F5A000
heap
page read and write
FF0000
heap
page read and write
26FE000
stack
page read and write
D27000
trusted library allocation
page execute and read and write
880000
heap
page read and write
E76000
heap
page read and write
53AE000
stack
page read and write
76B000
trusted library allocation
page execute and read and write
6C1A1000
unkown
page execute read
1FD6B000
direct allocation
page readonly
1470000
trusted library allocation
page read and write
DF0000
heap
page read and write
1333000
heap
page read and write
1FF0E000
stack
page read and write
197DD000
heap
page read and write
63B000
remote allocation
page execute and read and write
12AE000
heap
page read and write
8F1000
heap
page read and write
FA0000
trusted library allocation
page read and write
504E000
stack
page read and write
5480000
trusted library allocation
page read and write
11EE000
heap
page read and write
12ED000
heap
page read and write
2ACF000
stack
page read and write
52D000
remote allocation
page execute and read and write
9DCF000
stack
page read and write
733000
trusted library allocation
page execute and read and write
734000
trusted library allocation
page read and write
2B90000
heap
page read and write
615000
heap
page read and write
226F6000
direct allocation
page readonly
42A0000
heap
page read and write
2E4F0000
heap
page read and write
730000
trusted library allocation
page read and write
C8D000
stack
page read and write
B10000
heap
page read and write
4B40000
heap
page execute and read and write
27E1000
trusted library allocation
page execute and read and write
584E000
stack
page read and write
4E8000
remote allocation
page execute and read and write
767000
trusted library allocation
page execute and read and write
A58000
heap
page read and write
1273000
heap
page read and write
19ABD000
heap
page read and write
578E000
stack
page read and write
33F0000
heap
page read and write
277AD000
heap
page read and write
1C17C000
heap
page read and write
1497000
trusted library allocation
page execute and read and write
51B000
remote allocation
page execute and read and write
1110000
heap
page read and write
588E000
stack
page read and write
12C0000
heap
page read and write
2251A000
direct allocation
page execute read
2CDE000
stack
page read and write
2D8D000
stack
page read and write
740000
trusted library allocation
page read and write
70E000
stack
page read and write
E25000
heap
page read and write
BDF000
stack
page read and write
1B18D000
stack
page read and write
85C000
stack
page read and write
11D0000
heap
page read and write
E2A000
heap
page read and write
33ED000
stack
page read and write
2296E000
stack
page read and write
8E0000
heap
page read and write
60D000
stack
page read and write
148F000
heap
page read and write
F3C000
stack
page read and write
97C000
stack
page read and write
461E000
stack
page read and write
C10000
heap
page read and write
A7F000
stack
page read and write
6C1A0000
unkown
page readonly
1A0000
heap
page read and write
12C000
stack
page read and write
5600000
heap
page execute and read and write
107D000
stack
page read and write
FC0000
heap
page read and write
5D2E000
stack
page read and write
4FB000
stack
page read and write
1FCFD000
direct allocation
page execute read
341E000
stack
page read and write
11E8000
heap
page read and write
39C000
stack
page read and write
A69000
heap
page read and write
EF2000
stack
page read and write
9EE000
heap
page read and write
35C000
stack
page read and write
1FD72000
direct allocation
page read and write
CF4000
trusted library allocation
page read and write
171DD000
stack
page read and write
1558000
heap
page read and write
226AA000
direct allocation
page execute read
2C0E000
stack
page read and write
588E000
stack
page read and write
79C000
stack
page read and write
4235000
trusted library allocation
page read and write
22F0000
heap
page read and write
3800000
heap
page read and write
31DF000
stack
page read and write
1C410000
heap
page read and write
1C170000
heap
page read and write
E30000
heap
page read and write
9E0000
heap
page read and write
59DE000
stack
page read and write
E10000
trusted library allocation
page read and write
6C18E000
unkown
page read and write
C80000
unkown
page readonly
142C000
heap
page read and write
2521000
trusted library allocation
page execute and read and write
4FE000
remote allocation
page execute and read and write
4E1000
remote allocation
page execute and read and write
4E9E000
stack
page read and write
582000
remote allocation
page execute and read and write
2B0D000
stack
page read and write
961E000
stack
page read and write
59B000
stack
page read and write
132A000
heap
page read and write
6C37F000
unkown
page write copy
2A8E000
stack
page read and write
14C0000
trusted library allocation
page execute and read and write
E50000
heap
page read and write
10D0000
heap
page read and write
553E000
stack
page read and write
1206000
heap
page read and write
61ECC000
direct allocation
page read and write
744000
trusted library allocation
page read and write
51F000
remote allocation
page execute and read and write
5CB000
remote allocation
page execute and read and write
4FB000
stack
page read and write
360E000
stack
page read and write
1365000
heap
page read and write
2F51000
trusted library allocation
page execute and read and write
1091000
heap
page read and write
528000
remote allocation
page execute and read and write
800000
heap
page read and write
A6F000
stack
page read and write
120B000
heap
page read and write
1C14F000
stack
page read and write
ACE000
stack
page read and write
2282D000
stack
page read and write
1FE31000
direct allocation
page execute read
1FE38000
direct allocation
page execute read
73D000
trusted library allocation
page execute and read and write
599E000
stack
page read and write
D50000
trusted library allocation
page execute and read and write
1FCF5000
direct allocation
page execute read
64E000
stack
page read and write
9E0000
heap
page read and write
4E3E000
stack
page read and write
6C380000
unkown
page read and write
11EC000
heap
page read and write
1AF4E000
stack
page read and write
216DD000
heap
page read and write
670000
remote allocation
page execute and read and write
76C0000
heap
page read and write
10A5000
heap
page read and write
4E2000
remote allocation
page execute and read and write
1B620000
heap
page read and write
1340000
heap
page read and write
109D000
heap
page read and write
780000
heap
page read and write
CFC000
stack
page read and write
46B000
remote allocation
page execute and read and write
148A000
trusted library allocation
page execute and read and write
4F9E000
stack
page read and write
174F000
stack
page read and write
1268000
heap
page read and write
77E000
heap
page read and write
5E2E000
stack
page read and write
400000
remote allocation
page execute and read and write
F40000
heap
page read and write
1031000
heap
page read and write
787000
heap
page read and write
19EC3000
heap
page read and write
FB0000
heap
page read and write
1726E000
stack
page read and write
31CF000
stack
page read and write
2CF3000
trusted library allocation
page read and write
640000
heap
page read and write
D7C000
stack
page read and write
149E000
heap
page read and write
9D0000
heap
page read and write
12D3000
heap
page read and write
3233000
trusted library allocation
page read and write
488000
remote allocation
page execute and read and write
5ADE000
stack
page read and write
1B630000
heap
page read and write
2003F000
direct allocation
page readonly
27710000
heap
page read and write
523E000
stack
page read and write
10A1000
heap
page read and write
29CE000
stack
page read and write
4EF000
remote allocation
page execute and read and write
19BA0000
heap
page read and write
D6D000
stack
page read and write
12DA000
heap
page read and write
A07000
heap
page read and write
7B2000
heap
page read and write
9D3E000
stack
page read and write
2360000
trusted library allocation
page execute and read and write
D1E000
stack
page read and write
128C000
stack
page read and write
61ECD000
direct allocation
page readonly
197CC000
heap
page read and write
1FBA3000
direct allocation
page execute read
900000
heap
page read and write
175A000
trusted library allocation
page execute and read and write
22695000
direct allocation
page execute read
14F0000
heap
page read and write
8F6000
heap
page read and write
331E000
stack
page read and write
216C5000
heap
page read and write
9CD000
stack
page read and write
2B8D000
stack
page read and write
1FB38000
direct allocation
page execute read
61ED0000
direct allocation
page read and write
870000
trusted library allocation
page read and write
DBE000
stack
page read and write
5C69000
stack
page read and write
564E000
stack
page read and write
1544000
trusted library allocation
page read and write
9E8000
heap
page read and write
4EF000
remote allocation
page execute and read and write
3525000
trusted library allocation
page read and write
3E206000
heap
page read and write
1258C000
stack
page read and write
4B0E000
stack
page read and write
63A000
remote allocation
page execute and read and write
1C55E000
stack
page read and write
5A1000
remote allocation
page execute and read and write
A22000
heap
page read and write
CE0000
trusted library allocation
page read and write
216A2000
heap
page read and write
1B04F000
stack
page read and write
23A0000
trusted library allocation
page read and write
197C2000
heap
page read and write
1577000
heap
page read and write
1C563000
heap
page read and write
10B0000
heap
page read and write
F50000
heap
page read and write
4EF000
remote allocation
page execute and read and write
51F000
remote allocation
page execute and read and write
2779D000
heap
page read and write
4C84C000
stack
page read and write
3A0000
unkown
page readonly
32CE000
stack
page read and write
F45000
heap
page read and write
695000
heap
page read and write
574F000
stack
page read and write
15B3000
heap
page read and write
1029F000
stack
page read and write
5C5000
remote allocation
page execute and read and write
1328000
heap
page read and write
FEE000
stack
page read and write
4E88000
stack
page read and write
1540000
trusted library allocation
page read and write
6C17D000
unkown
page readonly
4BD000
remote allocation
page execute and read and write
E6A000
heap
page read and write
1210000
heap
page read and write
945000
heap
page read and write
226DF000
direct allocation
page readonly
D30000
heap
page read and write
9F0000
heap
page read and write
2040C000
stack
page read and write
14F5E000
stack
page read and write
14D9C000
stack
page read and write
1FD3D000
direct allocation
page execute read
49AF000
stack
page read and write
5639000
stack
page read and write
224D8000
direct allocation
page execute read
467000
remote allocation
page execute and read and write
There are 840 hidden memdumps, click here to show them.