IOC Report
FdjDPFGTZS.exe

loading gif

Files

File Path
Type
Category
Malicious
FdjDPFGTZS.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_FdjDPFGTZS.exe_e213acb83f70849bc0377c8625bb4036fca7326_85479d3d_b503d752-1ea1-40ee-9ed4-bd2e9d892518\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\userCAFIEBKKJJ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\a43486128347[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AAFIIJDAAAAKFHIDAAAKJJEGDH
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\ProgramData\CAFIEBKK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\CBKJKJDBFIIDHJKEHJEHIIIDAK
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\CGIEGHJE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EHJKFCGHIDHCBGDHJKEB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GHJEGCAEGIIIDHIEBKEB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IDGIJEGHDAECAKECAFCAKFCGDA
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\JKJDAEBFCBKECBGDBFCFBKKKFH
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KFIDBAFHCAKFBGCBFHIJ
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_userCAFIEBK_7a9d70a49a29368cba85c09fd949a8cf4b8be136_5acbf4f7_6f65736d-faac-4595-a68f-ced717de2741\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER47B7.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Oct 7 17:33:11 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4825.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4855.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7917.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Oct 7 17:33:25 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7966.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7987.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\FdjDPFGTZS.exe
"C:\Users\user\Desktop\FdjDPFGTZS.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Users\userCAFIEBKKJJ.exe
"C:\Users\userCAFIEBKKJJ.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 260
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\userCAFIEBKKJJ.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7432 -s 284

URLs

Name
IP
Malicious
frizzettei.sbs
malicious
http://46.8.231.109/c4754d4f680ead72.php
46.8.231.109
malicious
http://46.8.231.109/c4754d4f680ead72.phpry=----EHCGIJDHDGDBGDGCGCFHdefaultrelease
unknown
malicious
http://46.8.231.109/1309cdeb8f4c8736/msvcp140.dll
46.8.231.109
malicious
laddyirekyi.sbs
malicious
http://46.8.231.109/c4754d4f680ead72.phpr
unknown
malicious
http://46.8.231.109/1309cdeb8f4c8736/sqlite3.dllt
unknown
malicious
http://46.8.231.109/c4754d4f680ead72.phpg
unknown
malicious
isoplethui.sbs
malicious
http://46.8.231.109/1309cdeb8f4c8736/mozglue.dllb
unknown
malicious
http://46.8.231.109/c4754d4f680ead72.phpste&
unknown
malicious
http://46.8.231.109JZ
unknown
malicious
http://46.8.231.109/
46.8.231.109
malicious
http://46.8.231.109/1309cdeb8f4c8736/nss3.dll
46.8.231.109
malicious
http://46.8.231.109/1309cdeb8f4c8736/softokn3.dll
46.8.231.109
malicious
http://46.8.231.109FIEBKKJJdata;
unknown
malicious
http://46.8.231.109/c4754d4f680ead72.phpComN
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
http://46.8.231.109/1309cdeb8f4c8736/vcruntime140.dll
46.8.231.109
malicious
invinjurhey.sbs
malicious
exilepolsiy.sbs
malicious
http://46.8.231.109/1309cdeb8f4c8736/freebl3.dll
46.8.231.109
malicious
http://46.8.231.109/c4754d4f680ead72.php%
unknown
malicious
http://46.8.231.109
unknown
malicious
http://46.8.231.109/c4754d4f680ead72.php#
unknown
malicious
http://46.8.231.109/1309cdeb8f4c8736/mozglue.dll
46.8.231.109
malicious
bemuzzeki.sbs
malicious
http://46.8.231.109/1309cdeb8f4c8736/sqlite3.dll
46.8.231.109
malicious
http://46.8.231.109/c4754d4f680ead72.phpESSj?
unknown
malicious
exemplarou.sbs
malicious
wickedneatr.sbs
malicious
http://46.8.231.109/c4754d4f680ead72.phpramV?
unknown
malicious
http://46.8.231.109/1309cdeb8f4c8736/mozglue.dll:
unknown
malicious
http://46.8.231.109/1309cdeb8f4c8736/vcruntime140.dllE
unknown
malicious
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://player.vimeo.com
unknown
https://duckduckgo.com/ac/?q=
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://community.akamai.steamstatic.com/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://recaptcha.net/recaptcha/;
unknown
https://www.youtube.com
unknown
http://nsdm.cumpar-auto-orice-tip.ro/ldms/a43486128347.exe
147.45.44.104
https://www.google.com
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=ZNV_
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://isoplethui.sbs/api?PcI
unknown
https://s.ytimg.com;
unknown
https://login.steampowered.com/
unknown
https://steam.tv/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
http://www.sqlite.org/copyright.html.
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://exemplarou.sbs/api
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
https://recaptcha.net
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://wickedneatr.sbs/api
unknown
http://nsdm.cumpar-auto-orice-tip.ro/ldms/a43486128347.exeI
unknown
http://upx.sf.net
unknown
https://store.steampowered.com/
unknown
https://sketchfab.com
unknown
https://www.ecosia.org/newtab/
unknown
https://lv.queniujq.cn
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://nsdm.cumpar-auto-orice-tip.ro/ldms/a43486128347.exeY
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=10oP_O2R
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://help.steampowered.com/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
https://api.steampowered.com/
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://store.steampowered
unknown
https://support.mozilla.org
unknown
https://steamcommunity.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
There are 80 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
frizzettei.sbs
unknown
malicious
laddyirekyi.sbs
unknown
malicious
wickedneatr.sbs
unknown
malicious
bemuzzeki.sbs
unknown
malicious
invinjurhey.sbs
unknown
malicious
isoplethui.sbs
unknown
malicious
exilepolsiy.sbs
unknown
malicious
exemplarou.sbs
unknown
malicious
bg.microsoft.map.fastly.net
199.232.214.172
steamcommunity.com
104.102.49.254
nsdm.cumpar-auto-orice-tip.ro
147.45.44.104
s-part-0017.t-0009.t-msedge.net
13.107.246.45
time.windows.com
unknown
There are 3 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
46.8.231.109
unknown
Russian Federation
malicious
104.102.49.254
steamcommunity.com
United States
147.45.44.104
nsdm.cumpar-auto-orice-tip.ro
Russian Federation

Registry

Path
Value
Malicious
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\fdjdpfgtzs.exe|729303d4ee4e1304
ProgramId
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\fdjdpfgtzs.exe|729303d4ee4e1304
FileId
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\fdjdpfgtzs.exe|729303d4ee4e1304
LowerCaseLongPath
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\fdjdpfgtzs.exe|729303d4ee4e1304
LongPathHash
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\fdjdpfgtzs.exe|729303d4ee4e1304
Name
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\fdjdpfgtzs.exe|729303d4ee4e1304
OriginalFileName
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\fdjdpfgtzs.exe|729303d4ee4e1304
Publisher
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\fdjdpfgtzs.exe|729303d4ee4e1304
Version
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\fdjdpfgtzs.exe|729303d4ee4e1304
BinFileVersion
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\fdjdpfgtzs.exe|729303d4ee4e1304
BinaryType
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\fdjdpfgtzs.exe|729303d4ee4e1304
ProductName
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\fdjdpfgtzs.exe|729303d4ee4e1304
ProductVersion
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\fdjdpfgtzs.exe|729303d4ee4e1304
LinkDate
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\fdjdpfgtzs.exe|729303d4ee4e1304
BinProductVersion
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\fdjdpfgtzs.exe|729303d4ee4e1304
AppxPackageFullName
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\fdjdpfgtzs.exe|729303d4ee4e1304
AppxPackageRelativeId
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\fdjdpfgtzs.exe|729303d4ee4e1304
Size
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\fdjdpfgtzs.exe|729303d4ee4e1304
Language
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\fdjdpfgtzs.exe|729303d4ee4e1304
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\usercafiebk|8c78c12e1bcf933
ProgramId
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\usercafiebk|8c78c12e1bcf933
FileId
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\usercafiebk|8c78c12e1bcf933
LowerCaseLongPath
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\usercafiebk|8c78c12e1bcf933
LongPathHash
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\usercafiebk|8c78c12e1bcf933
Name
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\usercafiebk|8c78c12e1bcf933
OriginalFileName
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\usercafiebk|8c78c12e1bcf933
Publisher
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\usercafiebk|8c78c12e1bcf933
Version
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\usercafiebk|8c78c12e1bcf933
BinFileVersion
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\usercafiebk|8c78c12e1bcf933
BinaryType
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\usercafiebk|8c78c12e1bcf933
ProductName
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\usercafiebk|8c78c12e1bcf933
ProductVersion
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\usercafiebk|8c78c12e1bcf933
LinkDate
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\usercafiebk|8c78c12e1bcf933
BinProductVersion
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\usercafiebk|8c78c12e1bcf933
AppxPackageFullName
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\usercafiebk|8c78c12e1bcf933
AppxPackageRelativeId
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\usercafiebk|8c78c12e1bcf933
Size
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\usercafiebk|8c78c12e1bcf933
Language
\REGISTRY\A\{cfcab036-f7ab-446f-b7f5-b8c6add0a2ac}\Root\InventoryApplicationFile\usercafiebk|8c78c12e1bcf933
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
00184010F9C9FC2C
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 33 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
A8D000
unkown
page read and write
malicious
E4D000
unkown
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
1257000
heap
page read and write
malicious
35DE000
stack
page read and write
65C000
remote allocation
page execute and read and write
6C4E0000
unkown
page readonly
5C5000
remote allocation
page execute and read and write
1B00D000
stack
page read and write
1B27F000
stack
page read and write
4EF000
remote allocation
page execute and read and write
1623000
heap
page read and write
AE8000
unkown
page readonly
1442000
heap
page read and write
1AD8E000
stack
page read and write
13EC000
heap
page read and write
D60000
heap
page read and write
61E01000
direct allocation
page execute read
11D5000
heap
page read and write
10FD000
stack
page read and write
275A2000
heap
page read and write
EFD000
stack
page read and write
D6C000
stack
page read and write
45E000
remote allocation
page execute and read and write
61E00000
direct allocation
page execute and read and write
13F8000
heap
page read and write
45A000
remote allocation
page execute and read and write
1B3CE000
stack
page read and write
A61000
unkown
page execute read
1B3D0000
heap
page read and write
10F8000
stack
page read and write
1AD30000
heap
page read and write
11D0000
heap
page read and write
61ECC000
direct allocation
page read and write
F10000
heap
page read and write
E21000
unkown
page execute read
E0E000
stack
page read and write
61ED4000
direct allocation
page readonly
214B3000
heap
page read and write
27561000
heap
page read and write
13CD000
stack
page read and write
9FD000
stack
page read and write
61EB4000
direct allocation
page read and write
E9A000
unkown
page execute and read and write
DE0000
heap
page read and write
124E000
stack
page read and write
16CF000
stack
page read and write
214BC000
heap
page read and write
11DE000
heap
page read and write
6C71F000
unkown
page readonly
275D8000
heap
page read and write
61ECD000
direct allocation
page readonly
485000
remote allocation
page execute and read and write
E9C000
unkown
page readonly
6C75E000
unkown
page read and write
51E000
remote allocation
page execute and read and write
11F0000
heap
page read and write
1000000
heap
page read and write
51B000
remote allocation
page execute and read and write
1205000
heap
page read and write
13FD000
heap
page read and write
1B54E000
heap
page read and write
AE8000
unkown
page readonly
1B2CE000
stack
page read and write
10F3000
stack
page read and write
356D000
stack
page read and write
C50000
heap
page read and write
5CB000
remote allocation
page execute and read and write
116F000
stack
page read and write
6C581000
unkown
page execute read
A61000
unkown
page execute read
144E000
stack
page read and write
114F000
stack
page read and write
1AE8F000
stack
page read and write
6C760000
unkown
page read and write
492000
remote allocation
page execute and read and write
A60000
unkown
page readonly
1415000
heap
page read and write
1412000
heap
page read and write
2FBD000
stack
page read and write
1370000
heap
page read and write
11E6000
heap
page read and write
134E000
stack
page read and write
E9C000
unkown
page readonly
34360000
heap
page read and write
E43000
unkown
page readonly
A60000
unkown
page readonly
214B0000
heap
page read and write
118E000
stack
page read and write
8FD000
stack
page read and write
488000
remote allocation
page execute and read and write
1B17E000
stack
page read and write
27582000
heap
page read and write
34470000
heap
page read and write
AE5000
unkown
page execute and read and write
11D0000
heap
page read and write
1472000
heap
page read and write
50F000
remote allocation
page execute and read and write
214C5000
heap
page read and write
D80000
heap
page read and write
12B7000
heap
page read and write
6C55D000
unkown
page readonly
61ED0000
direct allocation
page read and write
15CF000
stack
page read and write
214D7000
heap
page read and write
4E2000
remote allocation
page execute and read and write
6C56E000
unkown
page read and write
5A5000
remote allocation
page execute and read and write
275DB000
heap
page read and write
36DF000
stack
page read and write
6C765000
unkown
page readonly
117C000
stack
page read and write
1427000
heap
page read and write
E20000
unkown
page readonly
E20000
unkown
page readonly
214DA000
heap
page read and write
61EB7000
direct allocation
page readonly
106F000
stack
page read and write
DCE000
stack
page read and write
215B0000
heap
page read and write
DD0000
heap
page read and write
107C000
stack
page read and write
1297000
heap
page read and write
6C572000
unkown
page readonly
48F000
remote allocation
page execute and read and write
4BD000
remote allocation
page execute and read and write
13F4000
heap
page read and write
A83000
unkown
page readonly
162C000
heap
page read and write
13CF000
stack
page read and write
1620000
heap
page read and write
130E000
stack
page read and write
6C580000
unkown
page readonly
2D5FE000
stack
page read and write
4B1000
remote allocation
page execute and read and write
27540000
heap
page read and write
27520000
heap
page read and write
2D6FF000
stack
page read and write
E9B000
unkown
page read and write
1250000
heap
page read and write
1AECD000
stack
page read and write
275BB000
heap
page read and write
34472000
heap
page read and write
1B10D000
stack
page read and write
30BE000
stack
page read and write
FF0000
heap
page read and write
6C4E1000
unkown
page execute read
104E000
stack
page read and write
275C2000
heap
page read and write
161D000
stack
page read and write
AE6000
unkown
page read and write
BBD000
stack
page read and write
A83000
unkown
page readonly
C5E000
heap
page read and write
E4D000
unkown
page write copy
1445000
heap
page read and write
11DA000
heap
page read and write
1AFCC000
stack
page read and write
1436000
heap
page read and write
A8D000
unkown
page write copy
6C75F000
unkown
page write copy
C5A000
heap
page read and write
2EAD000
stack
page read and write
64A000
remote allocation
page execute and read and write
61ED3000
direct allocation
page read and write
346E000
stack
page read and write
1350000
heap
page read and write
13D0000
heap
page read and write
D50000
heap
page read and write
13D8000
heap
page read and write
E21000
unkown
page execute read
1200000
heap
page read and write
1A9CE000
stack
page read and write
E43000
unkown
page readonly
2EB0000
heap
page read and write
215C0000
heap
page read and write
There are 167 hidden memdumps, click here to show them.