IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\msvcp110.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\CAAAAFBKFI.exe
ASCII text, with no line terminators
modified
C:\ProgramData\IDHIIJJJKEGI\BGIIEG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IDHIIJJJKEGI\CBGCBK
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IDHIIJJJKEGI\CBKJEG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IDHIIJJJKEGI\CFBFHI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\IDHIIJJJKEGI\DBFIEH
ASCII text, with very long lines (1765), with CRLF line terminators
dropped
C:\ProgramData\IDHIIJJJKEGI\DHJDAK
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IDHIIJJJKEGI\EHIJDH
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IDHIIJJJKEGI\EHIJDH-shm
data
dropped
C:\ProgramData\IDHIIJJJKEGI\HDGCFH
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\IDHIIJJJKEGI\HDGCFH-shm
data
dropped
C:\ProgramData\IDHIIJJJKEGI\JDBFII
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\IDHIIJJJKEGI\JJKFBA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IDHIIJJJKEGI\KKKEBK
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\a43486128347[1].exe
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\76561199780418869[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 17 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://49.12.197.9/
49.12.197.9
malicious
https://49.12.197.9/freebl3.dll
49.12.197.9
malicious
https://49.12.197.9/sqlp.dll
49.12.197.9
malicious
https://49.12.197.9/softokn3.dll
49.12.197.9
malicious
https://49.12.197.9/vcruntime140.dll
49.12.197.9
malicious
https://49.12.197.9/nss3.dll
49.12.197.9
malicious
https://49.12.197.9/mozglue.dll
49.12.197.9
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://player.vimeo.com
unknown
https://duckduckgo.com/ac/?q=
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://49.12.197.9/c
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://49.12.197.9/g
unknown
https://49.12.197.9/I
unknown
https://49.12.197.9/mozglue.dllL
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://steamcommunity.com/profiles/76561199780418869Y
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://steamcommunity.com/profiles/76561199780418869/badges
unknown
https://49.12.197.9/W
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://49.12.197.9/HIIJJJKEGI
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
http://cowod.hopto.org_DEBUG.zip/c
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://49.12.197.9
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=HeLxjRDbQrcV&l=e
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/profiles/76561199780418869u55uhttps://t.me/ae5edMozilla/5.0
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696495411400900000.1&ci=1696495411208.12791&cta
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GNzbMA16ssY5
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=2ZRoxzol
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://49.12.197.9/softokn3.dllB
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a
unknown
https://s.ytimg.com;
unknown
https://49.12.197.9/0
unknown
https://49.12.197.9/12.197.9/
unknown
https://steam.tv/
unknown
https://49.12.197.9/5
unknown
https://t.me/ae5ed
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://mozilla.org0/
unknown
https://steamcommunity.com/s
unknown
https://49.12.197.9CBAAEC
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=fWwP
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
unknown
https://sketchfab.com
unknown
https://www.ecosia.org/newtab/
unknown
https://lv.queniujq.cn
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.youtube.com/
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696495411400900000.2&ci=1696495411208.
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://www.google.com/recaptcha/
unknown
https://49.12.197.9/mozglue.dll(
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqd4plX4pbW1CbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://steamcommunity.com/profiles/76561199780418869x
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://49.12.197.9/vcruntime140.dllq
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
http://ocsp.sectigo.com0
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_e149f5d53c9263616797a13067f7a114fa287709b159d0a5
unknown
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://steamcommunity.com/profiles/76561199780418869/inventory/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious

IPs

IP
Domain
Country
Malicious
49.12.197.9
unknown
Germany
malicious
104.102.49.254
steamcommunity.com
United States
malicious
147.45.44.104
unknown
Russian Federation

Memdumps

Base Address
Regiontype
Protect
Malicious
2A30000
remote allocation
page readonly
malicious
2D4A000
heap
page read and write
malicious
6D5E2000
unkown
page read and write
malicious
5546B000
heap
page read and write
2DEF000
heap
page read and write
2DB3000
heap
page read and write
21D7D000
direct allocation
page execute read
2DE2000
heap
page read and write
2DE9000
heap
page read and write
5545F000
heap
page read and write
2E25000
heap
page read and write
2DD8000
heap
page read and write
2DB6000
heap
page read and write
6B4000
heap
page read and write
11F0000
heap
page read and write
DDB000
stack
page read and write
5098D000
stack
page read and write
3009000
heap
page read and write
308B000
heap
page read and write
9D61000
heap
page read and write
2DBE000
heap
page read and write
2228B000
heap
page read and write
21DB2000
direct allocation
page read and write
2E1F000
heap
page read and write
2D94000
heap
page read and write
1B93D000
heap
page read and write
2DE2000
heap
page read and write
2DF3000
heap
page read and write
2DE2000
heap
page read and write
4E95C000
stack
page read and write
9D61000
heap
page read and write
4EA5F000
stack
page read and write
53D0000
trusted library allocation
page read and write
6D644000
unkown
page readonly
2E27000
heap
page read and write
13C0000
heap
page read and write
2E1F000
heap
page read and write
2E3C000
heap
page read and write
2FF7000
heap
page read and write
2770000
trusted library allocation
page read and write
508E000
stack
page read and write
2DD9000
heap
page read and write
2DB2000
heap
page read and write
22283000
heap
page read and write
680000
heap
page readonly
2DC9000
heap
page read and write
2DEE000
heap
page read and write
2B82000
remote allocation
page execute and read and write
9D61000
heap
page read and write
30AA000
heap
page read and write
9D61000
heap
page read and write
2E23000
heap
page read and write
2DC9000
heap
page read and write
2DBE000
heap
page read and write
3087000
heap
page read and write
2D94000
heap
page read and write
2DE9000
heap
page read and write
9D80000
heap
page read and write
2C3A000
remote allocation
page execute and read and write
55464000
heap
page read and write
2E29000
heap
page read and write
16B6E000
stack
page read and write
2DEC000
heap
page read and write
2E05000
heap
page read and write
2DD9000
heap
page read and write
9D61000
heap
page read and write
2DEC000
heap
page read and write
3048000
heap
page read and write
55450000
heap
page read and write
9D61000
heap
page read and write
2DD7000
heap
page read and write
4E7F2000
stack
page read and write
2DED000
heap
page read and write
21DBF000
direct allocation
page readonly
9E9E000
stack
page read and write
1040000
heap
page read and write
221F0000
trusted library allocation
page read and write
9ED0000
heap
page read and write
55472000
heap
page read and write
6B4000
heap
page read and write
30BA000
heap
page read and write
2E45000
heap
page read and write
9D61000
heap
page read and write
2DDB000
heap
page read and write
6B4000
heap
page read and write
2DE9000
heap
page read and write
2E15000
heap
page read and write
22291000
heap
page read and write
6D5DB000
unkown
page readonly
2E20000
heap
page read and write
5D41000
trusted library allocation
page read and write
2DE2000
heap
page read and write
2E16000
heap
page read and write
2D45000
heap
page read and write
9D61000
heap
page read and write
2E27000
heap
page read and write
3007000
heap
page read and write
46B5000
trusted library allocation
page read and write
2E26000
heap
page read and write
BE2000
unkown
page execute and read and write
6B4000
heap
page read and write
2E33000
heap
page read and write
2DCD000
heap
page read and write
9D61000
heap
page read and write
2DD9000
heap
page read and write
2F38000
heap
page read and write
2DEA000
heap
page read and write
2FC4000
heap
page read and write
2E1F000
heap
page read and write
9D61000
heap
page read and write
2DED000
heap
page read and write
2D97000
heap
page read and write
9D61000
heap
page read and write
6CCDE000
unkown
page read and write
55472000
heap
page read and write
9D61000
heap
page read and write
57382000
trusted library allocation
page read and write
2E2E000
heap
page read and write
53F0000
heap
page execute and read and write
2DD8000
heap
page read and write
2DD7000
heap
page read and write
6D5B0000
unkown
page readonly
577D0000
trusted library allocation
page read and write
50C000
stack
page read and write
2DED000
heap
page read and write
9D61000
heap
page read and write
9D61000
heap
page read and write
2DEF000
heap
page read and write
2DEC000
heap
page read and write
2DC9000
heap
page read and write
6B4000
heap
page read and write
553CF000
stack
page read and write
9D61000
heap
page read and write
1BA03000
heap
page read and write
2E1F000
heap
page read and write
1B90D000
stack
page read and write
2DE2000
heap
page read and write
2EB1000
trusted library allocation
page read and write
9D61000
heap
page read and write
4E8FC000
stack
page read and write
2DE2000
heap
page read and write
13BE000
stack
page read and write
2E1F000
heap
page read and write
2E1F000
heap
page read and write
4811000
trusted library allocation
page read and write
2DED000
heap
page read and write
2E1D7000
heap
page read and write
2DE2000
heap
page read and write
1BE19000
heap
page read and write
BE0000
unkown
page readonly
9D61000
heap
page read and write
9D61000
heap
page read and write
2E2E000
heap
page read and write
2DDB000
heap
page read and write
9D61000
heap
page read and write
2DBE000
heap
page read and write
191EC000
stack
page read and write
2B63000
remote allocation
page execute and read and write
40028000
heap
page read and write
16C6F000
stack
page read and write
21B70000
direct allocation
page execute and read and write
53E0000
trusted library allocation
page read and write
6D5B1000
unkown
page execute read
55472000
heap
page read and write
2B5A000
remote allocation
page execute and read and write
2E25000
heap
page read and write
2DD9000
heap
page read and write
137F000
stack
page read and write
2A63000
remote allocation
page execute and read and write
1BC0D000
heap
page read and write
2E27000
heap
page read and write
2DE2000
heap
page read and write
6CC9F000
unkown
page readonly
114E000
heap
page read and write
9D61000
heap
page read and write
2FFE000
heap
page read and write
2E1F000
heap
page read and write
2DC9000
heap
page read and write
55465000
heap
page read and write
2DE2000
heap
page read and write
2E20000
heap
page read and write
2D4C000
heap
page read and write
9D61000
heap
page read and write
2E25000
heap
page read and write
5547F000
heap
page read and write
2D90000
heap
page execute and read and write
2DE2000
heap
page read and write
6B4000
heap
page read and write
2D45000
heap
page read and write
21D7F000
direct allocation
page readonly
6B4000
heap
page read and write
9D61000
heap
page read and write
9D61000
heap
page read and write
14CF000
stack
page read and write
2D52000
heap
page read and write
2DB4000
heap
page read and write
3EB1000
trusted library allocation
page read and write
2E1F000
heap
page read and write
4E53B000
stack
page read and write
2DEB000
heap
page read and write
2E06000
heap
page read and write
6CADD000
unkown
page readonly
2EC3000
trusted library allocation
page read and write
2E1F000
heap
page read and write
5545F000
heap
page read and write
1BA50000
trusted library allocation
page read and write
9D61000
heap
page read and write
9D61000
heap
page read and write
2E21000
heap
page read and write
2E06000
heap
page read and write
55471000
heap
page read and write
BE0000
unkown
page execute and read and write
9D61000
heap
page read and write
6D642000
unkown
page read and write
2E9F000
stack
page read and write
9D61000
heap
page read and write
1B9F4000
heap
page read and write
2D88000
heap
page read and write
7F7A0000
trusted library allocation
page execute read
21DBD000
direct allocation
page readonly
1BBF4000
heap
page read and write
3019000
heap
page read and write
4D04000
trusted library allocation
page read and write
2DD7000
heap
page read and write
1B912000
heap
page read and write
9D64000
heap
page read and write
2E1F000
heap
page read and write
1BBF0000
heap
page read and write
21DDE000
heap
page read and write
6B4000
heap
page read and write
2DD9000
heap
page read and write
2DEF000
heap
page read and write
2D97000
heap
page read and write
1065000
heap
page read and write
4F8D000
stack
page read and write
55483000
heap
page read and write
3A0B1000
heap
page read and write
2DBE000
heap
page read and write
2F72000
heap
page read and write
2CB0000
trusted library allocation
page read and write
21DBA000
direct allocation
page readonly
6CCDF000
unkown
page write copy
5547F000
heap
page read and write
2C70000
remote allocation
page readonly
2DEF000
heap
page read and write
9D61000
heap
page read and write
9D61000
heap
page read and write
2DBE000
heap
page read and write
21CD6000
direct allocation
page execute read
9D61000
heap
page read and write
2DE2000
heap
page read and write
2DE8000
heap
page read and write
2A6B000
remote allocation
page execute and read and write
50080000
heap
page read and write
2FF4000
heap
page read and write
2E2B000
heap
page read and write
2DE2000
heap
page read and write
2DBB000
heap
page read and write
2D10000
trusted library allocation
page read and write
3414C000
heap
page read and write
9D61000
heap
page read and write
1B91C000
heap
page read and write
2DC0000
heap
page read and write
6B4000
heap
page read and write
2DD9000
heap
page read and write
2A67000
remote allocation
page execute and read and write
2DCE000
heap
page read and write
1174000
heap
page read and write
2A3D000
remote allocation
page execute and read and write
2A00000
remote allocation
page execute and read and write
21B71000
direct allocation
page execute read
2E1F000
heap
page read and write
2DD9000
heap
page read and write
2D1E000
heap
page read and write
2D4C000
heap
page read and write
300E000
heap
page read and write
9D61000
heap
page read and write
2DD9000
heap
page read and write
6B4000
heap
page read and write
1B97D000
heap
page read and write
2DC9000
heap
page read and write
ABBE000
stack
page read and write
2D38000
heap
page read and write
1148000
heap
page read and write
16CAD000
stack
page read and write
7A10000
trusted library section
page read and write
2F44000
heap
page read and write
9D61000
heap
page read and write
AB5D000
stack
page read and write
2DB5000
heap
page read and write
6CCE5000
unkown
page readonly
2DED000
heap
page read and write
2E1F000
heap
page read and write
5546C000
heap
page read and write
2DC9000
heap
page read and write
2E40000
heap
page read and write
28269000
heap
page read and write
19230000
remote allocation
page read and write
6B0000
heap
page read and write
ACBE000
stack
page read and write
1926E000
stack
page read and write
2DE2000
heap
page read and write
9D61000
heap
page read and write
2790000
heap
page read and write
2DCF000
heap
page read and write
2DB1000
heap
page read and write
2DC0000
heap
page read and write
BE2000
unkown
page readonly
2D4C000
heap
page read and write
2ECA000
heap
page read and write
602000
stack
page read and write
2DED000
heap
page read and write
1BE1B000
heap
page read and write
2DE2000
heap
page read and write
27EE000
stack
page read and write
2DC5000
heap
page read and write
1B7AF000
stack
page read and write
14E0000
heap
page read and write
5545B000
heap
page read and write
2DEB000
heap
page read and write
55483000
heap
page read and write
9D61000
heap
page read and write
2E27000
heap
page read and write
9DB4000
heap
page read and write
50030000
heap
page read and write
9D61000
heap
page read and write
7A0E000
stack
page read and write
2E0B000
heap
page read and write
1050000
heap
page read and write
2DEB000
heap
page read and write
4ECB0000
trusted library allocation
page read and write
6B4000
heap
page read and write
2D94000
heap
page read and write
55487000
heap
page read and write
9D61000
heap
page read and write
2DDB000
heap
page read and write
2E1F000
heap
page read and write
2DB2000
heap
page read and write
5547D000
heap
page read and write
19230000
remote allocation
page read and write
2DED000
heap
page read and write
2BA1000
remote allocation
page execute and read and write
9D61000
heap
page read and write
2E1F000
heap
page read and write
1140000
heap
page read and write
2DAF000
heap
page read and write
9D61000
heap
page read and write
553E000
stack
page read and write
1B92C000
heap
page read and write
2DF9000
heap
page read and write
2DB4000
heap
page read and write
116D000
heap
page read and write
55469000
heap
page read and write
2DE8000
heap
page read and write
9D61000
heap
page read and write
6B4000
heap
page read and write
2DB1000
heap
page read and write
2D4C000
heap
page read and write
2D97000
heap
page read and write
60C000
stack
page read and write
5548F000
heap
page read and write
6B4000
heap
page read and write
55464000
heap
page read and write
CDC000
stack
page read and write
2DBE000
heap
page read and write
2DB6000
heap
page read and write
9D61000
heap
page read and write
2DD9000
heap
page read and write
2DED000
heap
page read and write
2DEC000
heap
page read and write
2DBE000
heap
page read and write
9D61000
heap
page read and write
3016000
heap
page read and write
9D60000
heap
page read and write
2DBB000
heap
page read and write
1BA0B000
heap
page read and write
2DEB000
heap
page read and write
6B4000
heap
page read and write
2DD9000
heap
page read and write
11AC000
heap
page read and write
2DCF000
heap
page read and write
1060000
heap
page read and write
9ED6000
heap
page read and write
6CCE0000
unkown
page read and write
2DE2000
heap
page read and write
2DEB000
heap
page read and write
2DE9000
heap
page read and write
21B78000
direct allocation
page execute read
2DD8000
heap
page read and write
2B5D000
remote allocation
page execute and read and write
6CAEE000
unkown
page read and write
6CA60000
unkown
page readonly
3005000
heap
page read and write
6CAF2000
unkown
page readonly
6B4000
heap
page read and write
5547D000
heap
page read and write
2CD0000
heap
page read and write
2D4A000
heap
page read and write
1B98D000
heap
page read and write
9D61000
heap
page read and write
790E000
stack
page read and write
6B4000
heap
page read and write
19230000
remote allocation
page read and write
145ED000
stack
page read and write
2D70000
heap
page read and write
11EC000
heap
page read and write
1167000
heap
page read and write
2DF8000
heap
page read and write
4996000
trusted library allocation
page read and write
2225A000
heap
page read and write
2F50000
heap
page read and write
2CE0000
trusted library allocation
page read and write
9D61000
heap
page read and write
2DB3000
heap
page read and write
2DEA000
heap
page read and write
22250000
heap
page read and write
30B8000
heap
page read and write
2DBA000
heap
page read and write
2D4C000
heap
page read and write
2DED000
heap
page read and write
2DF9000
heap
page read and write
2DCF000
heap
page read and write
2DEA000
heap
page read and write
2DEC000
heap
page read and write
9D61000
heap
page read and write
2D52000
heap
page read and write
2E10000
heap
page read and write
6B4000
heap
page read and write
55472000
heap
page read and write
BBB0000
unclassified section
page read and write
2D60000
trusted library allocation
page execute and read and write
6B4000
heap
page read and write
2CC3000
trusted library allocation
page execute and read and write
543E000
stack
page read and write
9D61000
heap
page read and write
2D5E000
stack
page read and write
2EC7000
trusted library allocation
page read and write
2DB6000
heap
page read and write
55478000
heap
page read and write
2EBA000
trusted library allocation
page read and write
2DCA000
heap
page read and write
2DBB000
heap
page read and write
4EC9E000
stack
page read and write
1BA58000
heap
page read and write
21D88000
direct allocation
page readonly
4B1D000
trusted library allocation
page read and write
2CFB000
trusted library allocation
page execute and read and write
9D61000
heap
page read and write
2228C000
heap
page read and write
4EA4F000
heap
page read and write
3063000
heap
page read and write
2D88000
heap
page read and write
1BD72000
heap
page read and write
2CC4000
trusted library allocation
page read and write
2DE6000
heap
page read and write
6B4000
heap
page read and write
2DC5000
heap
page read and write
11E7000
heap
page read and write
2DCC000
heap
page read and write
2DC9000
heap
page read and write
2CEA000
trusted library allocation
page execute and read and write
9D92000
heap
page read and write
2DE2000
heap
page read and write
9D61000
heap
page read and write
2DD6000
heap
page read and write
5FD000
stack
page read and write
2DBA000
heap
page read and write
2DEF000
heap
page read and write
9D61000
heap
page read and write
5548F000
heap
page read and write
6B4000
heap
page read and write
120AF000
stack
page read and write
2F8C000
heap
page read and write
2DD6000
heap
page read and write
2DE4000
heap
page read and write
2DC5000
heap
page read and write
2DC9000
heap
page read and write
2E21000
heap
page read and write
2CD4000
trusted library allocation
page read and write
690000
heap
page read and write
9D61000
heap
page read and write
5545A000
heap
page read and write
2DB4000
heap
page read and write
AA5E000
stack
page read and write
9D61000
heap
page read and write
2DB6000
heap
page read and write
2FF0000
heap
page read and write
9D61000
heap
page read and write
5546C000
heap
page read and write
2DC9000
heap
page read and write
2DEF000
heap
page read and write
2CBC000
stack
page read and write
2DCF000
heap
page read and write
5EC2000
trusted library allocation
page read and write
2DD1000
heap
page read and write
2E27000
heap
page read and write
C44000
unkown
page readonly
6CB01000
unkown
page execute read
2CF7000
trusted library allocation
page execute and read and write
9D61000
heap
page read and write
2DBE000
heap
page read and write
2DAF000
heap
page read and write
1BD54000
heap
page read and write
1B985000
heap
page read and write
2DBE000
heap
page read and write
2F26000
heap
page read and write
127E000
stack
page read and write
1181000
heap
page read and write
2CD0000
trusted library allocation
page read and write
6B4000
heap
page read and write
670000
heap
page read and write
2DD9000
heap
page read and write
4EBFC000
stack
page read and write
2E1F000
heap
page read and write
2CF0000
trusted library allocation
page read and write
1BA10000
heap
page read and write
50090000
trusted library allocation
page read and write
2DC9000
heap
page read and write
2E16000
heap
page read and write
302E000
heap
page read and write
2DE2000
heap
page read and write
9D70000
heap
page read and write
2E26000
heap
page read and write
2DBE000
heap
page read and write
222FE000
heap
page read and write
6CA61000
unkown
page execute read
5548B000
heap
page read and write
55487000
heap
page read and write
2EA0000
heap
page read and write
22294000
heap
page read and write
2DD9000
heap
page read and write
2DDB000
heap
page read and write
1B9F1000
heap
page read and write
1B80B000
stack
page read and write
6CB00000
unkown
page readonly
16B2E000
stack
page read and write
5548B000
heap
page read and write
2DCF000
heap
page read and write
55469000
heap
page read and write
1BC14000
heap
page read and write
1BAF8000
heap
page read and write
2224A000
stack
page read and write
2DE2000
heap
page read and write
2CD8000
heap
page read and write
There are 534 hidden memdumps, click here to show them.