IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\KFCFBFHIEB.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\l3[1].exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\627982\Pct.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\ProgramData\EBFBFBFIIJDAKECAKKJEHCFIJK
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\FCFHJKJJJECGDHJJDHDAAAFBKF
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\FCGIJKJJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\FIDGDAKF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GCFCFCGCGIEHIECAFCFIJJKKFH
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HCFBAFIDAECAKFHJDBAF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JJDGIIDHJEBGIDHJJDBKEHCAAA
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JJKFBFIJJECGCAAAFCBG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KJEBKJDAFHJDGDHJKKEG
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\627982\K
data
dropped
C:\Users\user\AppData\Local\Temp\Cake
data
dropped
C:\Users\user\AppData\Local\Temp\Dis
data
dropped
C:\Users\user\AppData\Local\Temp\Involve
data
dropped
C:\Users\user\AppData\Local\Temp\Network
data
dropped
C:\Users\user\AppData\Local\Temp\Official
data
dropped
C:\Users\user\AppData\Local\Temp\Omissions
data
dropped
C:\Users\user\AppData\Local\Temp\Relates
data
dropped
C:\Users\user\AppData\Local\Temp\Retro
data
dropped
C:\Users\user\AppData\Local\Temp\Tag
ASCII text, with very long lines (1396), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Tag.bat (copy)
ASCII text, with very long lines (1396), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Unlike
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c move Tag Tag.bat & Tag.bat
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa opssvc"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 627982
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "VoipBiographiesScholarPorno" Dis
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Omissions + ..\Involve + ..\Retro + ..\Official + ..\Network + ..\Unlike + ..\Relates K
malicious
C:\Users\user\AppData\Local\Temp\627982\Pct.pif
Pct.pif K
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\ProgramData\KFCFBFHIEB.exe"
malicious
C:\ProgramData\KFCFBFHIEB.exe
"C:\ProgramData\KFCFBFHIEB.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\choice.exe
choice /d y /t 5
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://45.145.4.234/bc17a177456805bc/msvcp140.dll
45.145.4.234
malicious
http://45.145.4.234/
45.145.4.234
malicious
http://45.145.4.234/bc17a177456805bc/freebl3.dll
45.145.4.234
malicious
http://45.145.4.234/ce4b71a59f4ee761.php
45.145.4.234
malicious
http://45.145.4.234/bc17a177456805bc/mozglue.dll
45.145.4.234
malicious
http://45.145.4.234/bc17a177456805bc/sqlite3.dll
45.145.4.234
malicious
http://45.145.4.234/bc17a177456805bc/softokn3.dll
45.145.4.234
malicious
http://45.145.4.234/bc17a177456805bc/vcruntime140.dll
45.145.4.234
malicious
http://45.145.4.234
unknown
malicious
http://45.145.4.234/bc17a177456805bc/nss3.dll
45.145.4.234
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://ocsp.usertrusD
unknown
http://45.145.4.234/bc17a177456805bc/softokn3.dlln
unknown
http://45.145.4.234/ce4b71a59f4ee761.phpest
unknown
http://ocsp.sectigo.com0
unknown
http://crt.usO
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.autoitscript.com/autoit3/
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
http://45.145.4.234art/form-data;
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://sst.my/folder/l3.exe
103.6.198.219
http://45.145.4.234/bc17a177456805bc/msvcp140.dllX
unknown
http://45.145.4.234/ce4b71a59f4ee761.phpRCHt
unknown
http://www.sqlite.org/copyright.html.
unknown
http://www.autoitscript.com/autoit3/J
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
http://45.145.4.234t
unknown
https://sectigo.com/CPS0
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://45.145.4.234/g
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
http://45.145.4.234/ce4b71a59f4ee761.phpDrive
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://45.145.4.234/ce4b71a59f4ee761.phpry=----BGDHDAFIDGDBGCAAFIDHefault-release
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://45.145.4.234/ce4b71a59f4ee761.phpWS
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://www.ecosia.org/newtab/
unknown
http://45.145.4.234/bc17a177456805bc/nss3.dlld
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://sst.my/
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://ac.ecopnacl
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
https://support.mozilla.org
unknown
https://ac.ecop
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
There are 46 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
sst.my
103.6.198.219
malicious
18.31.95.13.in-addr.arpa
unknown
malicious
hFXSqazHOXBOkJfWqLCELfcAYW.hFXSqazHOXBOkJfWqLCELfcAYW
unknown
malicious

IPs

IP
Domain
Country
Malicious
103.6.198.219
sst.my
Malaysia
malicious
45.145.4.234
unknown
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1BE0000
trusted library allocation
page read and write
malicious
1C2C000
trusted library allocation
page read and write
malicious
1EB7000
trusted library allocation
page read and write
malicious
1B2D000
trusted library allocation
page read and write
malicious
1AE0000
trusted library allocation
page read and write
malicious
1B2D000
trusted library allocation
page read and write
malicious
1B70000
trusted library allocation
page read and write
malicious
1B79000
trusted library allocation
page read and write
malicious
1A6A000
heap
page read and write
malicious
1AE1000
trusted library allocation
page read and write
malicious
1E1000
direct allocation
page execute and read and write
malicious
1B70000
trusted library allocation
page read and write
malicious
1BE1000
trusted library allocation
page read and write
malicious
3F21000
heap
page read and write
353E000
stack
page read and write
3F21000
heap
page read and write
BC0000
unkown
page readonly
BF0000
heap
page read and write
1C65C000
stack
page read and write
227E000
stack
page read and write
400000
unkown
page readonly
400000
unkown
page readonly
5320000
heap
page read and write
2FBBA000
trusted library allocation
page read and write
1D78C000
trusted library allocation
page read and write
71E000
heap
page read and write
1D795000
trusted library allocation
page read and write
2FB000
direct allocation
page execute and read and write
35BD000
heap
page read and write
198D000
heap
page read and write
D29000
stack
page read and write
748000
heap
page read and write
D90000
heap
page read and write
73F000
heap
page read and write
35CE000
heap
page read and write
3F21000
heap
page read and write
1D763000
trusted library allocation
page read and write
2FBD7000
trusted library allocation
page read and write
3F21000
heap
page read and write
1D763000
trusted library allocation
page read and write
3422000
heap
page read and write
1D71D000
stack
page read and write
73F000
heap
page read and write
2820000
heap
page read and write
732000
heap
page read and write
2FBCE000
trusted library allocation
page read and write
6CCAE000
unkown
page read and write
3F21000
heap
page read and write
6E0000
heap
page read and write
190D000
heap
page read and write
1D796000
trusted library allocation
page read and write
3F21000
heap
page read and write
2FE0000
heap
page read and write
3F21000
heap
page read and write
1E8F000
trusted library allocation
page read and write
3F21000
heap
page read and write
42A000
direct allocation
page execute and read and write
1D77B000
trusted library allocation
page read and write
1E95000
trusted library allocation
page read and write
C89000
unkown
page readonly
1DE1000
trusted library allocation
page read and write
357F000
stack
page read and write
36E15000
trusted library allocation
page read and write
732000
heap
page read and write
3F21000
heap
page read and write
3690F000
stack
page read and write
19F8000
heap
page read and write
1CE4000
trusted library allocation
page read and write
1D77E000
trusted library allocation
page read and write
1A83000
heap
page read and write
72B000
heap
page read and write
BF0000
heap
page read and write
752000
heap
page read and write
9DF000
stack
page read and write
359E000
heap
page read and write
1D795000
trusted library allocation
page read and write
35CE000
heap
page read and write
341F000
stack
page read and write
732000
heap
page read and write
732000
heap
page read and write
DCE000
heap
page read and write
1F4E000
trusted library allocation
page read and write
72E000
heap
page read and write
13CE000
stack
page read and write
1D31D000
stack
page read and write
72E000
heap
page read and write
29D000
direct allocation
page execute and read and write
732000
heap
page read and write
24D0000
heap
page read and write
3F21000
heap
page read and write
752000
heap
page read and write
B5D000
unkown
page readonly
1D77B000
trusted library allocation
page read and write
283A000
heap
page read and write
3F21000
heap
page read and write
2EF000
direct allocation
page execute and read and write
72E000
heap
page read and write
71E000
heap
page read and write
3F21000
heap
page read and write
1D773000
trusted library allocation
page read and write
1D77E000
trusted library allocation
page read and write
2FB40000
remote allocation
page read and write
291000
direct allocation
page execute and read and write
72E000
heap
page read and write
1E9F000
trusted library allocation
page read and write
1D78C000
trusted library allocation
page read and write
1782000
heap
page read and write
3F21000
heap
page read and write
3F21000
heap
page read and write
B78000
unkown
page execute and read and write
1DEF000
trusted library allocation
page read and write
3550000
heap
page read and write
1D773000
trusted library allocation
page read and write
1D75E000
trusted library allocation
page read and write
1D78C000
trusted library allocation
page read and write
3F21000
heap
page read and write
3F21000
heap
page read and write
1A28000
heap
page read and write
72E000
heap
page read and write
748000
heap
page read and write
1D797000
trusted library allocation
page read and write
1DE8000
trusted library allocation
page read and write
405000
unkown
page execute read
1D79B000
trusted library allocation
page read and write
3F21000
heap
page read and write
510000
heap
page read and write
1C8F000
trusted library allocation
page read and write
1D78C000
trusted library allocation
page read and write
1D760000
trusted library allocation
page read and write
73F000
heap
page read and write
3F21000
heap
page read and write
3F21000
heap
page read and write
1D77F000
trusted library allocation
page read and write
28DF000
stack
page read and write
13D2000
stack
page read and write
283A000
heap
page read and write
343D000
heap
page read and write
1D79A000
trusted library allocation
page read and write
1D773000
trusted library allocation
page read and write
24DE000
heap
page read and write
283D000
heap
page read and write
13DC000
stack
page read and write
193000
stack
page read and write
35CA000
heap
page read and write
1DE8000
trusted library allocation
page read and write
1DE6000
trusted library allocation
page read and write
1D779000
trusted library allocation
page read and write
1D796000
trusted library allocation
page read and write
74D000
heap
page read and write
1ACF000
heap
page read and write
1D786000
trusted library allocation
page read and write
1590000
heap
page read and write
1DED000
trusted library allocation
page read and write
1D79B000
trusted library allocation
page read and write
343D000
heap
page read and write
334E000
stack
page read and write
72A000
heap
page read and write
72E000
heap
page read and write
3F21000
heap
page read and write
2CF000
direct allocation
page execute and read and write
1DE4000
trusted library allocation
page read and write
DCA000
heap
page read and write
3F21000
heap
page read and write
3F21000
heap
page read and write
36E8C000
stack
page read and write
1D78C000
trusted library allocation
page read and write
1DE1000
trusted library allocation
page read and write
1D86000
trusted library allocation
page read and write
2910000
heap
page read and write
1D78C000
trusted library allocation
page read and write
2F5C000
stack
page read and write
3F21000
heap
page read and write
1EB8000
trusted library allocation
page read and write
4F6000
unkown
page readonly
1D77E000
trusted library allocation
page read and write
1AE1000
trusted library allocation
page read and write
401000
unkown
page execute read
21B0000
heap
page read and write
523F000
stack
page read and write
1D775000
trusted library allocation
page read and write
33A0000
heap
page read and write
1F6A000
trusted library allocation
page read and write
73F000
heap
page read and write
1EBB000
trusted library allocation
page read and write
1AE1000
trusted library allocation
page read and write
3F21000
heap
page read and write
1D78C000
trusted library allocation
page read and write
5F0000
heap
page read and write
1D77E000
trusted library allocation
page read and write
3F21000
heap
page read and write
6B0000
heap
page read and write
3F21000
heap
page read and write
3F21000
heap
page read and write
6EA000
heap
page read and write
3410000
heap
page read and write
1D77F000
trusted library allocation
page read and write
1D79A000
trusted library allocation
page read and write
74D000
heap
page read and write
3F21000
heap
page read and write
6CC20000
unkown
page readonly
3422000
heap
page read and write
732000
heap
page read and write
73F000
heap
page read and write
3F21000
heap
page read and write
1AE1000
trusted library allocation
page read and write
2F5C000
stack
page read and write
1B0F000
trusted library allocation
page read and write
26F000
direct allocation
page execute and read and write
73F000
heap
page read and write
2842000
heap
page read and write
1AE1000
trusted library allocation
page read and write
1D77A000
trusted library allocation
page read and write
43C000
direct allocation
page execute and read and write
3557000
heap
page read and write
265000
direct allocation
page execute and read and write
71E000
heap
page read and write
28FC000
heap
page read and write
1644000
heap
page read and write
1D870000
trusted library allocation
page read and write
35CE000
heap
page read and write
24AD000
stack
page read and write
72A000
heap
page read and write
1D781000
trusted library allocation
page read and write
22AE000
stack
page read and write
531F000
stack
page read and write
1F0B000
trusted library allocation
page read and write
1650000
trusted library allocation
page read and write
33F8000
heap
page read and write
286E000
stack
page read and write
732000
heap
page read and write
1B70000
trusted library allocation
page read and write
61E00000
direct allocation
page execute and read and write
272E000
stack
page read and write
1D77E000
trusted library allocation
page read and write
2831000
heap
page read and write
404000
unkown
page execute and read and write
28EE000
heap
page read and write
3F21000
heap
page read and write
3F21000
heap
page read and write
61ECC000
direct allocation
page read and write
1EBD000
trusted library allocation
page read and write
3F21000
heap
page read and write
72E000
heap
page read and write
4F4000
unkown
page readonly
1D79B000
trusted library allocation
page read and write
1AE1000
trusted library allocation
page read and write
1D75D000
trusted library allocation
page read and write
3F21000
heap
page read and write
1D78C000
trusted library allocation
page read and write
73F000
heap
page read and write
DA0000
direct allocation
page execute and read and write
72A000
heap
page read and write
3A5000
direct allocation
page execute and read and write
287E000
heap
page read and write
F8F000
stack
page read and write
2FC6000
heap
page read and write
C50000
unkown
page readonly
13FC000
stack
page read and write
1D776000
trusted library allocation
page read and write
272000
direct allocation
page execute and read and write
2FB40000
remote allocation
page read and write
3F21000
heap
page read and write
1AE1000
trusted library allocation
page read and write
1D77E000
trusted library allocation
page read and write
35CE000
heap
page read and write
3F21000
heap
page read and write
2FB2F000
stack
page read and write
1D775000
trusted library allocation
page read and write
6CCC0000
unkown
page readonly
72E000
heap
page read and write
1B2D000
trusted library allocation
page read and write
342C000
heap
page read and write
24D7000
heap
page read and write
1D77E000
trusted library allocation
page read and write
1F5F000
trusted library allocation
page read and write
1E8F000
trusted library allocation
page read and write
1F6F000
trusted library allocation
page read and write
196D000
heap
page read and write
283A000
heap
page read and write
1DE3000
trusted library allocation
page read and write
506000
unkown
page readonly
1B4A000
trusted library allocation
page read and write
1D795000
trusted library allocation
page read and write
401000
unkown
page execute read
237E5000
trusted library allocation
page read and write
3F21000
heap
page read and write
19CE000
heap
page read and write
1AE1000
trusted library allocation
page read and write
48F000
unkown
page read and write
1D783000
trusted library allocation
page read and write
3F21000
heap
page read and write
193000
stack
page read and write
3F21000
heap
page read and write
C89000
unkown
page readonly
3F21000
heap
page read and write
72A000
heap
page read and write
1AE1000
trusted library allocation
page read and write
72A000
heap
page read and write
341D000
heap
page read and write
1D78C000
trusted library allocation
page read and write
3F21000
heap
page read and write
6CE9E000
unkown
page read and write
B79000
unkown
page write copy
1AE1000
trusted library allocation
page read and write
3F21000
heap
page read and write
1D78C000
trusted library allocation
page read and write
6CC9D000
unkown
page readonly
1CA9E000
stack
page read and write
17A6000
heap
page read and write
1D763000
trusted library allocation
page read and write
3F21000
heap
page read and write
16CC000
stack
page read and write
3728C000
stack
page read and write
732000
heap
page read and write
3F21000
heap
page read and write
1AE1000
trusted library allocation
page read and write
3F21000
heap
page read and write
71E000
heap
page read and write
3F21000
heap
page read and write
3F37000
heap
page read and write
1D77E000
trusted library allocation
page read and write
B78000
unkown
page execute and read and write
3F21000
heap
page read and write
3F21000
heap
page read and write
3F21000
heap
page read and write
61EB4000
direct allocation
page read and write
52DE000
stack
page read and write
72A000
heap
page read and write
1BE1000
trusted library allocation
page read and write
3F21000
heap
page read and write
1C6E000
trusted library allocation
page read and write
1D763000
trusted library allocation
page read and write
BE0000
heap
page read and write
73F000
heap
page read and write
527E000
stack
page read and write
33D6000
heap
page read and write
401000
unkown
page execute read
4F4000
unkown
page readonly
1D77E000
trusted library allocation
page read and write
B5D000
unkown
page readonly
22B0000
heap
page read and write
2F72D000
stack
page read and write
1E9F000
trusted library allocation
page read and write
1E91000
trusted library allocation
page read and write
C50000
unkown
page readonly
25BC000
stack
page read and write
61ECD000
direct allocation
page readonly
73F000
heap
page read and write
CCA000
heap
page read and write
1AE1000
trusted library allocation
page read and write
A42000
unkown
page readonly
408000
unkown
page readonly
3F21000
heap
page read and write
5310000
heap
page read and write
1D77E000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
343D000
heap
page read and write
73F000
heap
page read and write
3F21000
heap
page read and write
19A000
stack
page read and write
1BE1000
trusted library allocation
page read and write
3F21000
heap
page read and write
3F21000
heap
page read and write
747000
heap
page read and write
1B3F000
trusted library allocation
page read and write
1D75A000
trusted library allocation
page read and write
3F21000
heap
page read and write
3F21000
heap
page read and write
3F21000
heap
page read and write
3F21000
heap
page read and write
748000
heap
page read and write
1D782000
trusted library allocation
page read and write
1D795000
trusted library allocation
page read and write
8DF000
stack
page read and write
1DE2000
trusted library allocation
page read and write
1DE7000
trusted library allocation
page read and write
1CED000
trusted library allocation
page read and write
2FE000
direct allocation
page execute and read and write
1E83000
trusted library allocation
page read and write
282F000
stack
page read and write
1A02000
heap
page read and write
3F21000
heap
page read and write
3F21000
heap
page read and write
339E000
stack
page read and write
1EA8000
trusted library allocation
page read and write
732000
heap
page read and write
1D78C000
trusted library allocation
page read and write
1650000
trusted library allocation
page read and write
1D79B000
trusted library allocation
page read and write
3F21000
heap
page read and write
1B2C000
trusted library allocation
page read and write
343D000
heap
page read and write
1DE4000
trusted library allocation
page read and write
1D795000
trusted library allocation
page read and write
35A0000
heap
page read and write
1D77E000
trusted library allocation
page read and write
1E94000
trusted library allocation
page read and write
1E8D000
trusted library allocation
page read and write
1E85000
trusted library allocation
page read and write
98000
stack
page read and write
748000
heap
page read and write
2C2000
direct allocation
page execute and read and write
1D79A000
trusted library allocation
page read and write
6CE5F000
unkown
page readonly
1D770000
trusted library allocation
page read and write
331E000
stack
page read and write
3F21000
heap
page read and write
1CEDE000
stack
page read and write
1D77E000
trusted library allocation
page read and write
1D77E000
trusted library allocation
page read and write
3F21000
heap
page read and write
1DEC000
trusted library allocation
page read and write
1D775000
trusted library allocation
page read and write
21FE000
stack
page read and write
3F21000
heap
page read and write
1D87B000
trusted library allocation
page read and write
6AE000
stack
page read and write
1594000
heap
page read and write
9C000
stack
page read and write
1650000
trusted library allocation
page read and write
1BE1000
trusted library allocation
page read and write
403000
unkown
page readonly
1817000
heap
page read and write
C80000
unkown
page read and write
1B5B000
trusted library allocation
page read and write
1704000
heap
page read and write
1D77A000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
3F21000
heap
page read and write
1E0000
heap
page read and write
77D000
heap
page read and write
52BF000
stack
page read and write
2CAE000
stack
page read and write
1F0B000
trusted library allocation
page read and write
2910000
heap
page read and write
71E000
heap
page read and write
34BE000
stack
page read and write
343A000
heap
page read and write
72A000
heap
page read and write
1847000
heap
page read and write
1D782000
trusted library allocation
page read and write
1D79B000
trusted library allocation
page read and write
1AE1000
trusted library allocation
page read and write
1DE3000
trusted library allocation
page read and write
1D77A000
trusted library allocation
page read and write
3413000
heap
page read and write
2FD0000
heap
page read and write
3F21000
heap
page read and write
3477000
heap
page read and write
33CF000
stack
page read and write
1D77E000
trusted library allocation
page read and write
3F21000
heap
page read and write
1A60000
heap
page read and write
3AFA000
heap
page read and write
1D77E000
trusted library allocation
page read and write
3F21000
heap
page read and write
1D79B000
trusted library allocation
page read and write
72A000
heap
page read and write
3F21000
heap
page read and write
73F000
heap
page read and write
1DEB000
trusted library allocation
page read and write
3430000
heap
page read and write
BC1000
unkown
page execute read
71B000
heap
page read and write
1DE2000
trusted library allocation
page read and write
1EAB000
trusted library allocation
page read and write
4F6000
unkown
page readonly
168E000
stack
page read and write
6CC21000
unkown
page execute read
1D78C000
trusted library allocation
page read and write
9C000
stack
page read and write
61E01000
direct allocation
page execute read
3F21000
heap
page read and write
3F40000
heap
page read and write
35BD000
heap
page read and write
72E000
heap
page read and write
283A000
heap
page read and write
C76000
unkown
page readonly
2837000
heap
page read and write
1D796000
trusted library allocation
page read and write
CC0000
heap
page read and write
CCE000
heap
page read and write
1EA5000
trusted library allocation
page read and write
3F21000
heap
page read and write
2FB40000
remote allocation
page read and write
1D78C000
trusted library allocation
page read and write
3F21000
heap
page read and write
71E000
heap
page read and write
1F28000
trusted library allocation
page read and write
401000
unkown
page execute and write copy
1D76B000
trusted library allocation
page read and write
1A83000
heap
page read and write
1A83000
heap
page read and write
6CEA0000
unkown
page read and write
343D000
heap
page read and write
3F21000
heap
page read and write
1CA5C000
stack
page read and write
40B000
unkown
page write copy
2FBB0000
trusted library allocation
page read and write
400000
unkown
page readonly
3F21000
heap
page read and write
1E8C000
trusted library allocation
page read and write
342C000
heap
page read and write
1AE1000
trusted library allocation
page read and write
1F7F000
trusted library allocation
page read and write
1F4E000
trusted library allocation
page read and write
401000
unkown
page execute read
1D77D000
trusted library allocation
page read and write
3F21000
heap
page read and write
3580000
heap
page read and write
1C2C000
trusted library allocation
page read and write
1D77C000
trusted library allocation
page read and write
1B70000
trusted library allocation
page read and write
35AE000
heap
page read and write
23A000
direct allocation
page execute and read and write
1E89000
trusted library allocation
page read and write
6CE9F000
unkown
page write copy
1BD1000
trusted library allocation
page read and write
3439000
heap
page read and write
A42000
unkown
page readonly
1DE0000
trusted library allocation
page read and write
1D773000
trusted library allocation
page read and write
1D770000
trusted library allocation
page read and write
1DE6000
trusted library allocation
page read and write
35AD000
heap
page read and write
72E000
heap
page read and write
5B4000
unkown
page execute and read and write
2F9C000
stack
page read and write
1D79B000
trusted library allocation
page read and write
1E8F000
trusted library allocation
page read and write
3200000
heap
page read and write
3F21000
heap
page read and write
1BE1000
trusted library allocation
page read and write
71E000
heap
page read and write
3F21000
heap
page read and write
3F21000
heap
page read and write
1CE9F000
stack
page read and write
1EA6000
trusted library allocation
page read and write
16E8000
heap
page read and write
1D77A000
trusted library allocation
page read and write
1A3B000
heap
page read and write
1DEB000
trusted library allocation
page read and write
BC0000
unkown
page readonly
1E70000
trusted library allocation
page read and write
2CC0000
heap
page read and write
2831000
heap
page read and write
73F000
heap
page read and write
1D75A000
trusted library allocation
page read and write
1560000
heap
page read and write
1715000
heap
page read and write
150E000
stack
page read and write
385000
direct allocation
page execute and read and write
3422000
heap
page read and write
3431000
heap
page read and write
C80000
heap
page read and write
1D750000
trusted library allocation
page read and write
34FF000
stack
page read and write
1D782000
trusted library allocation
page read and write
5350000
heap
page read and write
1DE4000
trusted library allocation
page read and write
1888000
heap
page read and write
1B3F000
trusted library allocation
page read and write
1EAD000
trusted library allocation
page read and write
268000
direct allocation
page execute and read and write
3F21000
heap
page read and write
51BF000
stack
page read and write
3F21000
heap
page read and write
403000
unkown
page readonly
342C000
heap
page read and write
506000
unkown
page readonly
1C25E000
stack
page read and write
6CCB2000
unkown
page readonly
35CE000
heap
page read and write
B79000
unkown
page write copy
C84000
unkown
page write copy
1DE2000
trusted library allocation
page read and write
66E000
stack
page read and write
748000
heap
page read and write
72A000
heap
page read and write
620000
heap
page read and write
61ED4000
direct allocation
page readonly
6CEA5000
unkown
page readonly
732000
heap
page read and write
1AE1000
trusted library allocation
page read and write
2FBBE000
stack
page read and write
3F21000
heap
page read and write
1D76B000
trusted library allocation
page read and write
1D759000
trusted library allocation
page read and write
1EAF000
trusted library allocation
page read and write
1640000
heap
page read and write
34CF000
stack
page read and write
3F21000
heap
page read and write
22E0000
heap
page read and write
13BE000
stack
page read and write
338E000
stack
page read and write
35A3000
heap
page read and write
257C000
stack
page read and write
340F000
heap
page read and write
1C4E000
trusted library allocation
page read and write
3F21000
heap
page read and write
1DEB000
trusted library allocation
page read and write
1D77B000
trusted library allocation
page read and write
1F3F000
trusted library allocation
page read and write
1D79B000
trusted library allocation
page read and write
1D76B000
trusted library allocation
page read and write
405000
unkown
page execute read
3F21000
heap
page read and write
3F21000
heap
page read and write
BC1000
unkown
page execute read
B78000
unkown
page execute and write copy
350C000
stack
page read and write
748000
heap
page read and write
1AE1000
trusted library allocation
page read and write
1AE1000
trusted library allocation
page read and write
1BE1000
trusted library allocation
page read and write
1D78C000
trusted library allocation
page read and write
1DE6000
trusted library allocation
page read and write
1DE1000
trusted library allocation
page read and write
B79000
unkown
page write copy
1D77B000
trusted library allocation
page read and write
40B000
unkown
page read and write
DC0000
trusted library allocation
page read and write
1DE6000
trusted library allocation
page read and write
1BE1000
trusted library allocation
page read and write
2870000
heap
page read and write
3F21000
heap
page read and write
2FBD4000
trusted library allocation
page read and write
C76000
unkown
page readonly
3F21000
heap
page read and write
13D7000
stack
page read and write
3F21000
heap
page read and write
3F21000
heap
page read and write
1E0000
direct allocation
page read and write
1D77E000
trusted library allocation
page read and write
1D76B000
trusted library allocation
page read and write
748000
heap
page read and write
1D75D000
trusted library allocation
page read and write
3F21000
heap
page read and write
1EA2000
trusted library allocation
page read and write
51FE000
stack
page read and write
3F21000
heap
page read and write
5B4000
unkown
page execute and read and write
1D773000
trusted library allocation
page read and write
6EE000
heap
page read and write
1B40000
trusted library allocation
page read and write
35CB000
heap
page read and write
1AE1000
trusted library allocation
page read and write
33CE000
stack
page read and write
359E000
heap
page read and write
1594000
heap
page read and write
72E000
heap
page read and write
401000
unkown
page execute and write copy
3F21000
heap
page read and write
33D0000
heap
page read and write
2F1C000
stack
page read and write
1AE1000
trusted library allocation
page read and write
408000
unkown
page readonly
3F21000
heap
page read and write
3F21000
heap
page read and write
1D771000
trusted library allocation
page read and write
1E77000
trusted library allocation
page read and write
1EAF000
trusted library allocation
page read and write
74D000
heap
page read and write
3F21000
heap
page read and write
1DEF000
trusted library allocation
page read and write
192D000
heap
page read and write
194D000
heap
page read and write
C3E000
stack
page read and write
3F21000
heap
page read and write
1E9D000
trusted library allocation
page read and write
1AE1000
trusted library allocation
page read and write
1DE2000
trusted library allocation
page read and write
33F0000
heap
page read and write
2890000
heap
page read and write
4B3000
unkown
page read and write
CD0000
heap
page read and write
3F20000
heap
page read and write
1DE9000
trusted library allocation
page read and write
400000
unkown
page readonly
400000
unkown
page readonly
3F21000
heap
page read and write
360C000
stack
page read and write
C80000
unkown
page write copy
1620000
heap
page read and write
1BE1000
trusted library allocation
page read and write
335F000
stack
page read and write
1B10000
trusted library allocation
page read and write
1D76E000
trusted library allocation
page read and write
2918000
heap
page read and write
71E000
heap
page read and write
1DEF000
trusted library allocation
page read and write
35BD000
heap
page read and write
28E0000
heap
page read and write
1DED000
trusted library allocation
page read and write
3F21000
heap
page read and write
12CE000
stack
page read and write
3470000
heap
page read and write
431F000
stack
page read and write
1D77A000
trusted library allocation
page read and write
2830000
heap
page read and write
72A000
heap
page read and write
1D795000
trusted library allocation
page read and write
71E000
heap
page read and write
400000
unkown
page readonly
1D77E000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
1E84000
trusted library allocation
page read and write
72A000
heap
page read and write
77D000
heap
page read and write
16E0000
heap
page read and write
3F21000
heap
page read and write
35C0000
heap
page read and write
1DEB000
trusted library allocation
page read and write
1E70000
trusted library allocation
page read and write
1D776000
trusted library allocation
page read and write
732000
heap
page read and write
DC0000
heap
page read and write
1D2DF000
stack
page read and write
1DE5000
trusted library allocation
page read and write
18E5000
heap
page read and write
35BD000
heap
page read and write
330E000
stack
page read and write
1D78C000
trusted library allocation
page read and write
1F48000
trusted library allocation
page read and write
2FC0000
heap
page read and write
1D770000
trusted library allocation
page read and write
1D79B000
trusted library allocation
page read and write
732000
heap
page read and write
343D000
heap
page read and write
1D77A000
trusted library allocation
page read and write
2230000
heap
page read and write
1D77E000
trusted library allocation
page read and write
35C1000
heap
page read and write
DE0000
heap
page read and write
B78000
unkown
page execute and write copy
1D75D000
trusted library allocation
page read and write
21B5000
heap
page read and write
1DED000
trusted library allocation
page read and write
1DE5000
trusted library allocation
page read and write
3422000
heap
page read and write
3F21000
heap
page read and write
1B3F000
trusted library allocation
page read and write
3F21000
heap
page read and write
22A0000
heap
page read and write
77D000
heap
page read and write
1D773000
trusted library allocation
page read and write
11CE000
stack
page read and write
B79000
unkown
page write copy
1E86000
trusted library allocation
page read and write
2FBC6000
trusted library allocation
page read and write
283E000
heap
page read and write
3F21000
heap
page read and write
342C000
heap
page read and write
1EA9000
trusted library allocation
page read and write
1D77A000
trusted library allocation
page read and write
22E4000
heap
page read and write
752000
heap
page read and write
625000
heap
page read and write
3599000
heap
page read and write
1EA3000
trusted library allocation
page read and write
745000
heap
page read and write
41F000
unkown
page read and write
461000
unkown
page read and write
1CF0000
trusted library allocation
page read and write
341E000
heap
page read and write
340F000
heap
page read and write
3F21000
heap
page read and write
1D765000
trusted library allocation
page read and write
404000
unkown
page execute and read and write
3F21000
heap
page read and write
3F21000
heap
page read and write
1AE1000
trusted library allocation
page read and write
2FBDF000
trusted library allocation
page read and write
52E0000
heap
page read and write
353E000
stack
page read and write
1D780000
trusted library allocation
page read and write
72E000
heap
page read and write
3AB000
direct allocation
page execute and read and write
1E9C000
trusted library allocation
page read and write
3F21000
heap
page read and write
71E000
heap
page read and write
1DEA000
trusted library allocation
page read and write
3F21000
heap
page read and write
6CCC1000
unkown
page execute read
1787000
heap
page read and write
1E88000
trusted library allocation
page read and write
1AE1000
trusted library allocation
page read and write
1AE1000
trusted library allocation
page read and write
There are 778 hidden memdumps, click here to show them.