IOC Report
main.bin

loading gif

Files

File Path
Type
Category
Malicious
main.bin
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\CryptoHelper.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
\Device\Null
ASCII text, with CRLF, CR line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c "schtasks /create /f /sc MINUTE /mo 1 /tn CryptoHelper /tr C:\ProgramData\CryptoHelper.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /sc MINUTE /mo 1 /tn CryptoHelper /tr C:\ProgramData\CryptoHelper.exe
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c "reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v CryptoHelper /t REG_SZ /d C:\ProgramData\CryptoHelper.exe /f"
malicious
C:\ProgramData\CryptoHelper.exe
C:\ProgramData\CryptoHelper.exe
malicious
C:\Users\user\Desktop\main.exe
"C:\Users\user\Desktop\main.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\reg.exe
reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v CryptoHelper /t REG_SZ /d C:\ProgramData\CryptoHelper.exe /f

URLs

Name
IP
Malicious
https://avatars.akamai.steamstatic.com/cc04b9291a0058ac98558dd047490a2b19a7bbd5_medium.jpg
unknown
https://steamcommunity.com/login/home/?goto=id%2FDotHashtag
unknown
https://steamcommunity.com/id/Hartkern_Eisenmannhoverunderline
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://steamcommunity.com/id/steam---id/games/?tab=perfect
unknown
https://steamcommunity.com/app/427520
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://steamcommunity.com/id/DotHashtag/stats/252490/achievements/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://install.avcdn.net/avg/iavs9x/avg_internet_security_setup.exeASWSig2A123D026AE3BEAC0AC7D4DC35
unknown
https://steamcommunity.com/login/home/?goto=id%2Fsteam---idEspa
unknown
https://steamcommunity.com/id/poorsmuk/stats/418240/achievements/
unknown
https://honzik.avcdn.net/setup/avast-vpn/release/avast_vpn_online_setup.exeASWSig2A06FCDABA5742BE662
unknown
https://avatars.akamai.steamstatic.com/cc65b2e51c12c364fdb62d61b2232e804b4c789a_medium.jpg
unknown
https://www.ccleaner.com/go/app_sp_reg_purchaselocal://Register
unknown
https://steamcommunity.com/profiles/76561198272926485
unknown
https://steamcommunity.com/profiles/76561198990581375
unknown
http://honzik.avcdn.net/setup/avast-tu/release/avast_cleanup_online_setup.exeASWSig2A4C1A1197A19B18F
unknown
https://avatars.akamai.steamstatic.com/6897a5d61235390796f37e4ed9c3b56e72799c62_medium.jpg
unknown
https://steamcommunity.com/saliengame/
unknown
http://files.avast.com/beta9x/avast_free_antivirus_setup_online.exeASWSig2A5549FF2866EA44F68D28FB2B1
unknown
https://steamcommunity.com/id/smoke_weeed/gamecards/620190
unknown
https://community.akamai.steamstatic.com/economy/emoticon/heartpendant
unknown
https://community.akamai.steamstatic.com/economy/emoticon/EasterChick
unknown
https://community.akamai.steamstatic.com/economy/emoticon/happy_yeti
unknown
https://install.avcdn.net/beta9x/avast_pro_antivirus_setup_online.exeASWSig2A579D90FED0C6441EE7B258F
unknown
https://shared.akamai.steamstatic.com/store_item_assets/steam/apps/1328670/header.jpg?t=1725576882
unknown
https://steamcommunity.com/id/smoke-br
unknown
https://steamcommunity.com/id/poorsmuk/wishlist/commentthread_Profile_76561198111104203_area
unknown
https://steamcommunity.com/profiles/76561199095277122https://steamcommunity.com/profiles/76561199095
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/images/items/730/ef7cb44d312df5038cba0f69a0
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&l=
unknown
https://steamcommunity.com/app/1295500
unknown
https://steamcommunity.com/profiles/76561198991259901
unknown
https://steamcommunity.com/app/427520https://steamcommunity.com/app/427520game_info_achievements_sum
unknown
https://steamcommunity.com/app/1295500https://steamcommunity.com/app/1295500game_info_achievements_s
unknown
https://lv.queniujq.cn
unknown
https://honzik.avcdn.net/setup/avast-bs/beta/avast_battery_saver_online_setup.exeASWSig2A3A3BE3789E6
unknown
https://steamcommunity.com/id/Pnushoverunderline
unknown
https://steamcommunity.com/id/steam---id/badges/1
unknown
https://shared.akamai.steamstatic.com/store_item_assets/steam/apps/281990/capsule_184x69.jpg?t=17273
unknown
https://steamcommunity.com/id/steam---id/badges/2
unknown
https://shared.akamai.steamstatic.com/store_item_assets/steam/apps/1295500/capsule_184x69.jpg?t=1728
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://steamcommunity.com/id/DotHashtag/stats/578080/achievements/
unknown
https://steamcommunity.com/id/smoke_weeed/inventory/https://steamcommunity.com/id/smoke_weeed/screen
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&l=en
unknown
https://steamcommunity.com/id/smoke_weeed/badges/1
unknown
https://avatars.akamai.steamstatic.com/830016a85265ae1d65eb19981a76949924cd25dd_medium.jpghttps://av
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://steamcommunity.com/profiles/76561198348656242
unknown
https://shared.akamai.steamstatic.com/store_item_assets/steam/apps/440/capsule_184x69.jpg?t=17219326
unknown
https://steamcommunity.com/id/lord_francio
unknown
https://honzik.avcdn.net/setup/avast-bs/release/avast_battery_saver_online_setup.exeASWSig2A072492C0
unknown
https://steamcommunity.com/id/smoke_weeed/gamecards/220?border=1https://steamcommunity.com/id/smoke_
unknown
http://keys.backup.norton.com
unknown
https://community.akamai.steamstatic.com/public/images/badges/65_steamawardnominations/level_01.png
unknown
https://shared.akamai.steamstatic.com/store_item_assets/steam/apps/427520/capsule_184x69.jpg?t=17281
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/profiles/76561198360578139/groups/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/images/apps/281990/e643bc42988f7b1635e93862
unknown
https://steamcommunity.com/login/home/?goto=id%2Fsmoke_weeedEspa
unknown
https://steamcommunity.com/id/steam---id/gamecards/718650Ressurection
unknown
http://www.avast.com0/
unknown
https://avatars.akamai.steamstatic.com/cd713e3e36fda9637f69444d73ae2b464ec8e81c_medium.jpg
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/images/apps/581320/8c981a099f412705990b262d
unknown
https://community.akamai.steamstatic.com/economy/image/RgGbIK_Xaakl8PcQ2KQKK0i_2YIC7wZf7gTzKvLti-4wt
unknown
https://steamcommunity.com/id/smoke_weeed/gamecards/508550
unknown
https://community.akamai.steamstatic.com/economy/emoticon/lovegrenade
unknown
https://steamcommunity.com/profiles/76561199401715130
unknown
https://steamcommunity.com/id/smoke_weeed/awards/This
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://steamcommunity.com/id/smoke-brhoverunderline
unknown
https://steamcommunity.com/profiles/76561198360578139/badges
unknown
https://steamcommunity.com/profiles/76561198963983313
unknown
https://steamcommunity.com/id/steam---id
104.102.49.254
https://support.steampowered.com/kb_article.php?ref=6899-IOSK-9514&l=englishLevel
unknown
https://shared.akamai.steamstatic.com/store_item_assets/steam/apps/979120/capsule_184x69.jpg?t=17250
unknown
https://steamcommunity.com/id/smoke_weeed/badges/https://steamcommunity.com/id/smoke_weeed/badges/13
unknown
https://steamcommunity.com/workshop/
unknown
https://steamcommunity.com/id/smoke_weeed/badgesfriendPlayerLevel
unknown
https://steamcommunity.com/id/smoke_weeed/gamecards/2243810
unknown
https://www.youtube.com/watch?v=dQw4w9WgXcQ
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://steamcommunity.com/login/home/?goto=id%2FDotHashtagEspa
unknown
https://www.ccleaner.com/go/app_sp_reg_purchaselocal://RegisterspspbesptespproMozilla/4.0
unknown
https://shared.akamai.steamstatic.com/store_item_assets/steam/apps/812140/capsule_184x69.jpg?t=17271
unknown
https://steamcommunity.com/id/poorsmuk/games/
unknown
http://honzik.avcdn.net/setup/avg-bs/release/avg_battery_saver_online_setup.exeASWSig2A7E478FFFFFA84
unknown
https://steamcommunity.com/id/steam---id/inventory/#753_6
unknown
https://store.steampowered.com/https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/economy/emoticon/steamthumbsup
unknown
https://steamcommunity.com/id/smoke_weeed/gamecards/3027110
unknown
https://steamcommunity.com/id/smoke_weeed/gamecards/25800DISTRAINT
unknown
http://honzik.avcdn.net/setup/avast-tu/beta/avast_cleanup_online_setup.exeASWSig2A1E3DD1C1B204ED89FD
unknown
https://avatars.akamai.steamstatic.com/e9d3108b127c19328a65cdc9465be8f48353f5f4_medium.jpg
unknown
https://bits.avcdn.net/productfamily_ANTIVIRUS/insttype_ONE_FREE/platform_WIN/installertype_ONLINE/b
unknown
https://steamcommunity.com/id/poorsmuk/stats/533300/achievements/
unknown
https://steamcommunity.com/id/smoke_weeed/gamecards/463040
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
CryptoHelper

Memdumps

Base Address
Regiontype
Protect
Malicious
27AB9000
trusted library allocation
page read and write
7CF4000
direct allocation
page read and write
1538000
unkown
page readonly
65EF000
stack
page read and write
71C7000
unclassified section
page execute read
27ABD000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
7184000
direct allocation
page read and write
27AB9000
trusted library allocation
page read and write
7062000
direct allocation
page read and write
BE0000
heap
page read and write
71B4000
direct allocation
page read and write
27AA0000
trusted library allocation
page read and write
7DC0000
direct allocation
page read and write
12B7000
unkown
page execute read
7C9A000
direct allocation
page read and write
6CE8000
unclassified section
page write copy
27ABD000
trusted library allocation
page read and write
5C11000
heap
page read and write
6CE6000
unclassified section
page write copy
27AA0000
trusted library allocation
page read and write
590D000
stack
page read and write
27ABD000
trusted library allocation
page read and write
63F1000
heap
page read and write
1970000
unkown
page read and write
63F1000
heap
page read and write
63F1000
heap
page read and write
63F1000
heap
page read and write
709C000
direct allocation
page read and write
27AA2000
trusted library allocation
page read and write
63F1000
heap
page read and write
744C000
unclassified section
page readonly
70C4000
direct allocation
page read and write
71CB000
unclassified section
page execute read
27ABD000
trusted library allocation
page read and write
291E000
stack
page read and write
7016000
direct allocation
page read and write
27AA0000
trusted library allocation
page read and write
7C7E000
direct allocation
page read and write
1522000
unkown
page readonly
163D000
unkown
page readonly
7F5000
heap
page read and write
27ABD000
trusted library allocation
page read and write
43FE000
stack
page read and write
7D30000
direct allocation
page read and write
7100000
direct allocation
page read and write
27AA0000
trusted library allocation
page read and write
156A000
unkown
page readonly
27AA0000
trusted library allocation
page read and write
63F1000
heap
page read and write
7DF0000
direct allocation
page read and write
123E000
unkown
page execute read
70F0000
direct allocation
page read and write
1673000
unkown
page readonly
70B2000
direct allocation
page read and write
7FB8000
direct allocation
page read and write
2A2E000
stack
page read and write
15BE000
unkown
page readonly
27ABE000
trusted library allocation
page read and write
5910000
heap
page read and write
760D000
unclassified section
page read and write
E1B000
unkown
page execute read
27AB9000
trusted library allocation
page read and write
5F0D000
stack
page read and write
7CC6000
direct allocation
page read and write
400E000
stack
page read and write
275FF000
stack
page read and write
27AB9000
trusted library allocation
page read and write
27AB9000
trusted library allocation
page read and write
27ABD000
trusted library allocation
page read and write
7C04000
direct allocation
page read and write
27AB9000
trusted library allocation
page read and write
27AB9000
trusted library allocation
page read and write
63F1000
heap
page read and write
76E000
stack
page read and write
2777D000
stack
page read and write
1573000
unkown
page readonly
5C1F000
heap
page read and write
1645000
unkown
page readonly
4150000
heap
page read and write
7086000
direct allocation
page read and write
707E000
direct allocation
page read and write
27AA0000
trusted library allocation
page read and write
27ABD000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
274FE000
stack
page read and write
7EFE000
direct allocation
page read and write
7C18000
direct allocation
page read and write
60BC000
stack
page read and write
7C7A000
direct allocation
page read and write
16A2000
unkown
page readonly
27ABE000
trusted library allocation
page read and write
7B20000
direct allocation
page read and write
63F1000
heap
page read and write
3C0000
heap
page read and write
770000
heap
page read and write
6D4B000
unclassified section
page readonly
703A000
direct allocation
page read and write
1573000
unkown
page readonly
7D84000
direct allocation
page read and write
7D4A000
direct allocation
page read and write
7006000
direct allocation
page read and write
27AB9000
trusted library allocation
page read and write
7ED8000
direct allocation
page read and write
98E000
heap
page read and write
5C12000
heap
page read and write
7F86000
direct allocation
page read and write
27ABE000
trusted library allocation
page read and write
700C000
direct allocation
page read and write
7FD000
heap
page read and write
27AB9000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
63F1000
heap
page read and write
7008000
direct allocation
page read and write
70DA000
direct allocation
page read and write
1503000
unkown
page readonly
7FD0000
direct allocation
page read and write
2920000
heap
page read and write
42B4000
heap
page read and write
704A000
direct allocation
page read and write
63F1000
heap
page read and write
27AA0000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
7440000
unclassified section
page readonly
27ABD000
trusted library allocation
page read and write
7C34000
direct allocation
page read and write
63F1000
heap
page read and write
27AA0000
trusted library allocation
page read and write
27AB9000
trusted library allocation
page read and write
71AD000
unclassified section
page execute read
44E0000
heap
page read and write
79DC000
stack
page read and write
71B6000
direct allocation
page read and write
7E4E000
direct allocation
page read and write
7F00000
direct allocation
page read and write
1669000
unkown
page readonly
27AB9000
trusted library allocation
page read and write
9DE000
stack
page read and write
27AB9000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
27AB9000
trusted library allocation
page read and write
15B8000
unkown
page readonly
27AA0000
trusted library allocation
page read and write
9EB000
unkown
page execute read
7004000
direct allocation
page read and write
E11000
unkown
page execute read
7B65000
direct allocation
page read and write
27ABD000
trusted library allocation
page read and write
7FD000
heap
page read and write
70CE000
direct allocation
page read and write
27AB9000
trusted library allocation
page read and write
2800000
heap
page read and write
70C6000
direct allocation
page read and write
27ABD000
trusted library allocation
page read and write
7E52000
direct allocation
page read and write
27ABD000
trusted library allocation
page read and write
7E24000
direct allocation
page read and write
799E000
stack
page read and write
27AA2000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
27ABD000
trusted library allocation
page read and write
27AB9000
trusted library allocation
page read and write
7DB8000
direct allocation
page read and write
259D000
stack
page read and write
7020000
direct allocation
page read and write
63F1000
heap
page read and write
63F1000
heap
page read and write
6A64000
unclassified section
page readonly
27ABD000
trusted library allocation
page read and write
42B0000
heap
page read and write
7F1C000
direct allocation
page read and write
27AB8000
trusted library allocation
page read and write
7096000
direct allocation
page read and write
27AA0000
trusted library allocation
page read and write
27ABD000
trusted library allocation
page read and write
5830000
direct allocation
page read and write
5C11000
heap
page read and write
2817E000
stack
page read and write
27AB9000
trusted library allocation
page read and write
7D2C000
direct allocation
page read and write
27AA0000
trusted library allocation
page read and write
27AB9000
trusted library allocation
page read and write
27AB9000
trusted library allocation
page read and write
7C38000
direct allocation
page read and write
708C000
direct allocation
page read and write
610000
heap
page read and write
7C64000
direct allocation
page read and write
7CA4000
direct allocation
page read and write
27AA2000
trusted library allocation
page read and write
27ABD000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
7C0A000
direct allocation
page read and write
27AB9000
trusted library allocation
page read and write
7032000
direct allocation
page read and write
7C00000
direct allocation
page read and write
7CF2000
direct allocation
page read and write
7045000
direct allocation
page read and write
7EF6000
direct allocation
page read and write
63F1000
heap
page read and write
404B000
stack
page read and write
708A000
direct allocation
page read and write
60C0000
heap
page read and write
7EA000
heap
page read and write
7D86000
direct allocation
page read and write
70D0000
direct allocation
page read and write
63F1000
heap
page read and write
7E12000
direct allocation
page read and write
708E000
direct allocation
page read and write
4760000
trusted library allocation
page read and write
27AB9000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
7076000
direct allocation
page read and write
5920000
direct allocation
page execute and read and write
7DF2000
direct allocation
page read and write
27ABD000
trusted library allocation
page read and write
FC9000
unkown
page execute read
27AB9000
trusted library allocation
page read and write
701C000
direct allocation
page read and write
27ABD000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
7FD000
heap
page read and write
27AA0000
trusted library allocation
page read and write
7080000
direct allocation
page read and write
7DCC000
direct allocation
page read and write
27ABD000
trusted library allocation
page read and write
5C11000
heap
page read and write
281BE000
stack
page read and write
7112000
direct allocation
page read and write
7E46000
direct allocation
page read and write
63F1000
heap
page read and write
27AB9000
trusted library allocation
page read and write
7DC4000
direct allocation
page read and write
7D72000
direct allocation
page read and write
7DB0000
direct allocation
page read and write
427E000
stack
page read and write
7C1C000
direct allocation
page read and write
27AB9000
trusted library allocation
page read and write
7DBE000
direct allocation
page read and write
58B0000
direct allocation
page read and write
7105000
unclassified section
page execute read
27AA0000
trusted library allocation
page read and write
1451000
unkown
page execute read
1650000
unkown
page readonly
27ABD000
trusted library allocation
page read and write
7FD4000
direct allocation
page read and write
701A000
direct allocation
page read and write
7E0000
heap
page read and write
162C000
unkown
page readonly
12C0000
unkown
page execute read
7CD6000
direct allocation
page read and write
27AB9000
trusted library allocation
page read and write
27AB9000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
63F1000
heap
page read and write
27AA0000
trusted library allocation
page read and write
27AA2000
trusted library allocation
page read and write
182E000
unkown
page write copy
63F1000
heap
page read and write
C6E000
stack
page read and write
9E5000
unkown
page execute read
7E2B000
direct allocation
page read and write
2853E000
stack
page read and write
27CFD000
stack
page read and write
287BE000
stack
page read and write
7F8E000
direct allocation
page read and write
7DD2000
direct allocation
page read and write
27AB9000
trusted library allocation
page read and write
63F1000
heap
page read and write
27ABD000
trusted library allocation
page read and write
702C000
direct allocation
page read and write
27ABD000
trusted library allocation
page read and write
7B33000
direct allocation
page read and write
F40000
unkown
page execute read
63F1000
heap
page read and write
700A000
direct allocation
page read and write
27AA0000
trusted library allocation
page read and write
63F1000
heap
page read and write
27AA0000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
7DDA000
direct allocation
page read and write
7E94000
direct allocation
page read and write
71EF000
unclassified section
page execute read
1078000
unkown
page execute read
1659000
unkown
page readonly
DC0000
heap
page read and write
77E000
stack
page read and write
704C000
direct allocation
page read and write
27ABD000
trusted library allocation
page read and write
7603000
unclassified section
page read and write
71B8000
unclassified section
page execute read
27ABD000
trusted library allocation
page read and write
43BE000
stack
page read and write
7CE000
stack
page read and write
27AA0000
trusted library allocation
page read and write
63F1000
heap
page read and write
7106000
direct allocation
page read and write
27ABD000
trusted library allocation
page read and write
B55000
unkown
page execute read
2867F000
stack
page read and write
2807E000
stack
page read and write
27AB9000
trusted library allocation
page read and write
27ABD000
trusted library allocation
page read and write
27ABD000
trusted library allocation
page read and write
2773E000
stack
page read and write
7CD4000
direct allocation
page read and write
27AA0000
trusted library allocation
page read and write
156C000
unkown
page readonly
744000
heap
page read and write
27AA0000
trusted library allocation
page read and write
63F1000
heap
page read and write
27AA0000
trusted library allocation
page read and write
761D000
unclassified section
page read and write
1609000
unkown
page readonly
63F1000
heap
page read and write
446E000
heap
page read and write
27ABD000
trusted library allocation
page read and write
27AB9000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
7058000
direct allocation
page read and write
27ADE000
stack
page read and write
7C88000
direct allocation
page read and write
27AB9000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
7DB2000
direct allocation
page read and write
6D4A000
unclassified section
page write copy
7CE2000
direct allocation
page read and write
192A000
unkown
page read and write
27AB9000
trusted library allocation
page read and write
1636000
unkown
page readonly
27ABD000
trusted library allocation
page read and write
58C0000
direct allocation
page read and write
47E0000
heap
page readonly
27AA0000
trusted library allocation
page read and write
2AF7000
heap
page read and write
27AB9000
trusted library allocation
page read and write
5C16000
heap
page read and write
63F1000
heap
page read and write
2AF0000
heap
page read and write
287FE000
stack
page read and write
27AB9000
trusted library allocation
page read and write
63F1000
heap
page read and write
744000
heap
page read and write
9EE000
unkown
page execute read
63F1000
heap
page read and write
27AA0000
trusted library allocation
page read and write
7452000
unclassified section
page readonly
2763E000
stack
page read and write
27AB9000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
63F1000
heap
page read and write
27AB9000
trusted library allocation
page read and write
42B4000
heap
page read and write
27ABD000
trusted library allocation
page read and write
1895000
unkown
page write copy
63F1000
heap
page read and write
27ABD000
trusted library allocation
page read and write
7ED6000
direct allocation
page read and write
1581000
unkown
page readonly
27AB9000
trusted library allocation
page read and write
7660000
direct allocation
page read and write
6D13000
unclassified section
page read and write
27ABD000
trusted library allocation
page read and write
7F02000
direct allocation
page read and write
7010000
direct allocation
page read and write
7FE7000
direct allocation
page read and write
27AA0000
trusted library allocation
page read and write
152A000
unkown
page readonly
27ABD000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
7D08000
direct allocation
page read and write
7F31000
direct allocation
page read and write
27ABD000
trusted library allocation
page read and write
27ABD000
trusted library allocation
page read and write
7C20000
direct allocation
page read and write
98E000
heap
page read and write
7B31000
direct allocation
page read and write
63F1000
heap
page read and write
63F1000
heap
page read and write
27AA0000
trusted library allocation
page read and write
804C000
direct allocation
page read and write
27AB9000
trusted library allocation
page read and write
7D8E000
direct allocation
page read and write
7F26000
direct allocation
page read and write
63F1000
heap
page read and write
7DE6000
direct allocation
page read and write
63F1000
heap
page read and write
5C11000
heap
page read and write
70A0000
direct allocation
page read and write
27AA0000
trusted library allocation
page read and write
27AB9000
trusted library allocation
page read and write
7CBC000
direct allocation
page read and write
4080000
heap
page read and write
5C11000
heap
page read and write
29EE000
stack
page read and write
27AB9000
trusted library allocation
page read and write
7F5000
heap
page read and write
47DC000
stack
page read and write
27ABD000
trusted library allocation
page read and write
27AB9000
trusted library allocation
page read and write
27ABD000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
27ABD000
trusted library allocation
page read and write
63F1000
heap
page read and write
27AB9000
trusted library allocation
page read and write
7FC6000
direct allocation
page read and write
2AA0000
heap
page read and write
70AA000
direct allocation
page read and write
16F4000
unkown
page readonly
740000
heap
page read and write
2A70000
heap
page read and write
27ABD000
trusted library allocation
page read and write
7C32000
direct allocation
page read and write
7C3A000
direct allocation
page read and write
27AA0000
trusted library allocation
page read and write
27ABD000
trusted library allocation
page read and write
7B60000
direct allocation
page read and write
6CE4000
unclassified section
page write copy
7EC000
heap
page read and write
27ABD000
trusted library allocation
page read and write
63F1000
heap
page read and write
709A000
direct allocation
page read and write
479E000
stack
page read and write
27AB9000
trusted library allocation
page read and write
6020000
direct allocation
page read and write
1578000
unkown
page readonly
27AB9000
trusted library allocation
page read and write
27ABD000
trusted library allocation
page read and write
15E8000
unkown
page readonly
7E74000
direct allocation
page read and write
1503000
unkown
page readonly
7FD000
heap
page read and write
7018000
direct allocation
page read and write
6D2D000
unclassified section
page read and write
27AA0000
trusted library allocation
page read and write
A2B000
unkown
page execute read
7C5C000
direct allocation
page read and write
27ABD000
trusted library allocation
page read and write
6FD000
stack
page read and write
27AB9000
trusted library allocation
page read and write
27AB9000
trusted library allocation
page read and write
9DF000
unkown
page read and write
27AA0000
trusted library allocation
page read and write
27ABD000
trusted library allocation
page read and write
63F1000
heap
page read and write
7C0E000
direct allocation
page read and write
6AD0000
heap
page read and write
7E62000
direct allocation
page read and write
98E000
heap
page read and write
7002000
direct allocation
page read and write
27AA0000
trusted library allocation
page read and write
27ABE000
trusted library allocation
page read and write
27AA2000
trusted library allocation
page read and write
63F1000
heap
page read and write
73E000
unkown
page read and write
27AA0000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
78E000
stack
page read and write
607D000
stack
page read and write
27ABD000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
7299000
unclassified section
page execute read
63F1000
heap
page read and write
27ABD000
trusted library allocation
page read and write
63F1000
heap
page read and write
7FAA000
direct allocation
page read and write
7FBC000
direct allocation
page read and write
7DD0000
direct allocation
page read and write
63F1000
heap
page read and write
39D000
stack
page read and write
71F5000
unclassified section
page execute read
7DE4000
direct allocation
page read and write
5C11000
heap
page read and write
7C82000
direct allocation
page read and write
5C10000
heap
page read and write
63F1000
heap
page read and write
2787E000
stack
page read and write
1648000
unkown
page readonly
7E0000
heap
page read and write
42B4000
heap
page read and write
7DEA000
direct allocation
page read and write
27ABD000
trusted library allocation
page read and write
27ABD000
trusted library allocation
page read and write
5C11000
heap
page read and write
153C000
unkown
page readonly
1563000
unkown
page readonly
7098000
direct allocation
page read and write
27AA0000
trusted library allocation
page read and write
71DC000
unclassified section
page execute read
63F1000
heap
page read and write
27AB9000
trusted library allocation
page read and write
189E000
unkown
page write copy
63F1000
heap
page read and write
A40000
direct allocation
page read and write
70B6000
direct allocation
page read and write
9F0000
unkown
page execute read
7C2B000
direct allocation
page read and write
7CAA000
direct allocation
page read and write
7EE000
heap
page read and write
5C11000
heap
page read and write
27ABD000
trusted library allocation
page read and write
7CDE000
direct allocation
page read and write
27ABD000
trusted library allocation
page read and write
27AB9000
trusted library allocation
page read and write
707C000
direct allocation
page read and write
7CEF000
direct allocation
page read and write
5C11000
heap
page read and write
7014000
direct allocation
page read and write
7EC4000
direct allocation
page read and write
27AA0000
trusted library allocation
page read and write
63F1000
heap
page read and write
7CA2000
direct allocation
page read and write
27AA0000
trusted library allocation
page read and write
27AB9000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
6D28000
unclassified section
page read and write
63F1000
heap
page read and write
27ABD000
trusted library allocation
page read and write
1353000
unkown
page execute read
27AB9000
trusted library allocation
page read and write
6ACE000
stack
page read and write
800B000
direct allocation
page read and write
27AA2000
trusted library allocation
page read and write
63F1000
heap
page read and write
1897000
unkown
page read and write
27ABD000
trusted library allocation
page read and write
7B67000
direct allocation
page read and write
27AA0000
trusted library allocation
page read and write
1115000
unkown
page execute read
27AB9000
trusted library allocation
page read and write
A1E000
stack
page read and write
27ABC000
trusted library allocation
page read and write
7188000
direct allocation
page read and write
7C52000
direct allocation
page read and write
27ABD000
trusted library allocation
page read and write
63F1000
heap
page read and write
7104000
direct allocation
page read and write
27ABD000
trusted library allocation
page read and write
70CC000
direct allocation
page read and write
7DAE000
direct allocation
page read and write
42B4000
heap
page read and write
7DFC000
direct allocation
page read and write
60F0000
heap
page read and write
72E000
unkown
page read and write
27AB9000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
A33000
unkown
page execute read
5C11000
heap
page read and write
27AA0000
trusted library allocation
page read and write
7CC8000
direct allocation
page read and write
63F1000
heap
page read and write
7DF4000
direct allocation
page read and write
7E66000
direct allocation
page read and write
7DF6000
direct allocation
page read and write
27AB9000
trusted library allocation
page read and write
7F9E000
direct allocation
page read and write
63F1000
heap
page read and write
27ABD000
trusted library allocation
page read and write
27ABD000
trusted library allocation
page read and write
29D000
stack
page read and write
70AC000
direct allocation
page read and write
27AB9000
trusted library allocation
page read and write
7C45000
direct allocation
page read and write
27ABD000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
6D1C000
unclassified section
page write copy
7B0000
heap
page read and write
27AB9000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
701E000
direct allocation
page read and write
27AA0000
trusted library allocation
page read and write
4460000
heap
page read and write
2A6E000
stack
page read and write
286BE000
stack
page read and write
27AB9000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
63F1000
heap
page read and write
27ABD000
trusted library allocation
page read and write
7D04000
direct allocation
page read and write
27ABD000
trusted library allocation
page read and write
3ECE000
stack
page read and write
27AA0000
trusted library allocation
page read and write
27ABD000
trusted library allocation
page read and write
15EE000
unkown
page readonly
6CE7000
unclassified section
page read and write
3FD0000
trusted library allocation
page read and write
7F04000
direct allocation
page read and write
63F8000
heap
page read and write
27AB9000
trusted library allocation
page read and write
61F0000
direct allocation
page read and write
27AB9000
trusted library allocation
page read and write
6D45000
unclassified section
page read and write
27ABD000
trusted library allocation
page read and write
7B1C000
stack
page read and write
7C9C000
direct allocation
page read and write
1633000
unkown
page readonly
27ABD000
trusted library allocation
page read and write
1610000
unkown
page readonly
27AB9000
trusted library allocation
page read and write
27AB9000
trusted library allocation
page read and write
1351000
unkown
page execute read
27AB9000
trusted library allocation
page read and write
4481000
heap
page read and write
71D0000
unclassified section
page execute read
27ABD000
trusted library allocation
page read and write
63F1000
heap
page read and write
7354000
unclassified section
page readonly
7E7C000
direct allocation
page read and write
27AA2000
trusted library allocation
page read and write
63F1000
heap
page read and write
6CE5000
unclassified section
page read and write
63F1000
heap
page read and write
71B0000
direct allocation
page read and write
443E000
stack
page read and write
986000
heap
page read and write
7054000
direct allocation
page read and write
27AA2000
trusted library allocation
page read and write
71BB000
unclassified section
page execute read
27AA0000
trusted library allocation
page read and write
4856000
heap
page read and write
4230000
heap
page read and write
27ABD000
trusted library allocation
page read and write
650000
heap
page read and write
9E0000
unkown
page readonly
7FCC000
direct allocation
page read and write
27AB9000
trusted library allocation
page read and write
27AB9000
trusted library allocation
page read and write
27ABD000
trusted library allocation
page read and write
27AB9000
trusted library allocation
page read and write
7082000
direct allocation
page read and write
7200000
direct allocation
page read and write
7C50000
direct allocation
page read and write
7D24000
direct allocation
page read and write
7F8A000
direct allocation
page read and write
70F4000
direct allocation
page read and write
7630000
unclassified section
page read and write
27ABD000
trusted library allocation
page read and write
1661000
unkown
page readonly
154F000
unkown
page readonly
7DAA000
direct allocation
page read and write
27AA0000
trusted library allocation
page read and write
5C11000
heap
page read and write
27AA4000
trusted library allocation
page read and write
70FE000
direct allocation
page read and write
7FB2000
direct allocation
page read and write
27ABD000
trusted library allocation
page read and write
63F1000
heap
page read and write
27ABB000
trusted library allocation
page read and write
35D000
stack
page read and write
63F0000
heap
page read and write
63F1000
heap
page read and write
27AA0000
trusted library allocation
page read and write
7EEC000
direct allocation
page read and write
5C11000
heap
page read and write
27AA2000
trusted library allocation
page read and write
7FD000
heap
page read and write
7F22000
direct allocation
page read and write
1236000
unkown
page execute read
63F1000
heap
page read and write
7C56000
direct allocation
page read and write
27ABD000
trusted library allocation
page read and write
7F10000
direct allocation
page read and write
63F1000
heap
page read and write
98E000
heap
page read and write
27AA0000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
47F8000
direct allocation
page read and write
27ABD000
trusted library allocation
page read and write
63F1000
heap
page read and write
15DD000
unkown
page readonly
27AB9000
trusted library allocation
page read and write
7CF6000
direct allocation
page read and write
27AB9000
trusted library allocation
page read and write
7DB4000
direct allocation
page read and write
27AA0000
trusted library allocation
page read and write
27AB9000
trusted library allocation
page read and write
27AB9000
trusted library allocation
page read and write
70A4000
direct allocation
page read and write
DD6000
unkown
page execute read
63F1000
heap
page read and write
27AA0000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
27BDF000
stack
page read and write
27ABD000
trusted library allocation
page read and write
1827000
unkown
page read and write
27ABD000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
63F1000
heap
page read and write
44E0000
heap
page read and write
A50000
unkown
page readonly
63F1000
heap
page read and write
7368000
unclassified section
page readonly
27ABD000
trusted library allocation
page read and write
4850000
heap
page read and write
760C000
unclassified section
page write copy
71B2000
direct allocation
page read and write
4060000
heap
page readonly
1584000
unkown
page readonly
71E7000
unclassified section
page execute read
7E72000
direct allocation
page read and write
63F1000
heap
page read and write
27AA0000
trusted library allocation
page read and write
63F1000
heap
page read and write
63F1000
heap
page read and write
27AA0000
trusted library allocation
page read and write
7D1E000
direct allocation
page read and write
63F1000
heap
page read and write
27900000
heap
page read and write
27ABD000
trusted library allocation
page read and write
70F6000
direct allocation
page read and write
5F10000
direct allocation
page read and write
71C2000
unclassified section
page execute read
27AA0000
trusted library allocation
page read and write
63F1000
heap
page read and write
27AB9000
trusted library allocation
page read and write
161D000
unkown
page readonly
7602000
unclassified section
page write copy
7C1E000
direct allocation
page read and write
75D7000
unclassified section
page read and write
70BA000
direct allocation
page read and write
97E000
heap
page read and write
7090000
direct allocation
page read and write
7C80000
direct allocation
page read and write
63F1000
heap
page read and write
1144000
unkown
page execute read
63F1000
heap
page read and write
27ABD000
trusted library allocation
page read and write
27ABD000
trusted library allocation
page read and write
A51000
unkown
page execute read
73E9000
unclassified section
page readonly
27AB9000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
3E0000
heap
page read and write
27ABD000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
7E20000
direct allocation
page read and write
169E000
unkown
page readonly
63F1000
heap
page read and write
2843C000
stack
page read and write
27ABD000
trusted library allocation
page read and write
27ABC000
trusted library allocation
page read and write
199A000
unkown
page read and write
7012000
direct allocation
page read and write
3DEC000
stack
page read and write
705A000
direct allocation
page read and write
27AB9000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
27ABD000
trusted library allocation
page read and write
744000
heap
page read and write
27AB9000
trusted library allocation
page read and write
63F1000
heap
page read and write
29AE000
stack
page read and write
27AB9000
trusted library allocation
page read and write
63F1000
heap
page read and write
27AA0000
trusted library allocation
page read and write
3D0000
heap
page read and write
63F1000
heap
page read and write
63F1000
heap
page read and write
27AB9000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
27AB9000
trusted library allocation
page read and write
63F1000
heap
page read and write
27AA0000
trusted library allocation
page read and write
7243000
unclassified section
page execute read
7C58000
direct allocation
page read and write
27ABD000
trusted library allocation
page read and write
7618000
unclassified section
page read and write
27AB9000
trusted library allocation
page read and write
ADE000
stack
page read and write
63F1000
heap
page read and write
7EF0000
direct allocation
page read and write
163A000
unkown
page readonly
278C0000
direct allocation
page read and write
63F1000
heap
page read and write
970000
heap
page read and write
723D000
unclassified section
page execute read
7CD0000
direct allocation
page read and write
5C11000
heap
page read and write
27AA2000
trusted library allocation
page read and write
81D000
heap
page read and write
6D1D000
unclassified section
page read and write
7C74000
direct allocation
page read and write
47F0000
direct allocation
page read and write
75D2000
unclassified section
page read and write
7F0E000
direct allocation
page read and write
7CEA000
direct allocation
page read and write
167B000
unkown
page readonly
70E6000
direct allocation
page read and write
3FCF000
stack
page read and write
163F000
unkown
page readonly
27AB4000
trusted library allocation
page read and write
6D70000
direct allocation
page read and write
7056000
direct allocation
page read and write
27AB9000
trusted library allocation
page read and write
282BE000
stack
page read and write
27AA0000
trusted library allocation
page read and write
7BA0000
direct allocation
page read and write
27ABD000
trusted library allocation
page read and write
2857E000
stack
page read and write
66ED000
stack
page read and write
70B8000
direct allocation
page read and write
12BD000
unkown
page execute read
27ABD000
trusted library allocation
page read and write
67A1000
unclassified section
page execute read
7F80000
direct allocation
page read and write
5C11000
heap
page read and write
27ABD000
trusted library allocation
page read and write
7B29000
direct allocation
page read and write
1536000
unkown
page readonly
B6E000
unkown
page read and write
7F3000
heap
page read and write
27AB9000
trusted library allocation
page read and write
60E0000
heap
page read and write
27AA0000
trusted library allocation
page read and write
19A1000
unkown
page readonly
7ADE000
stack
page read and write
27AA0000
trusted library allocation
page read and write
7190000
direct allocation
page read and write
63F1000
heap
page read and write
27AB9000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
159B000
unkown
page readonly
7F84000
direct allocation
page read and write
986000
heap
page read and write
71B3000
unclassified section
page execute read
27ABD000
trusted library allocation
page read and write
7D70000
direct allocation
page read and write
1629000
unkown
page readonly
7C00000
direct allocation
page read and write
27AA0000
trusted library allocation
page read and write
7FD000
heap
page read and write
977000
heap
page read and write
7E34000
direct allocation
page read and write
63F1000
heap
page read and write
7E3E000
direct allocation
page read and write
1517000
unkown
page readonly
7060000
direct allocation
page read and write
63F1000
heap
page read and write
2EC000
stack
page read and write
27AA0000
trusted library allocation
page read and write
63F1000
heap
page read and write
7DC2000
direct allocation
page read and write
7D26000
direct allocation
page read and write
A17000
unkown
page execute read
7F9C000
direct allocation
page read and write
27AB9000
trusted library allocation
page read and write
7FE5000
direct allocation
page read and write
7FBA000
direct allocation
page read and write
6D40000
unclassified section
page read and write
7DC6000
direct allocation
page read and write
27AA0000
trusted library allocation
page read and write
70B0000
direct allocation
page read and write
63F1000
heap
page read and write
63F1000
heap
page read and write
255D000
stack
page read and write
7C62000
direct allocation
page read and write
1657000
unkown
page readonly
27AA0000
trusted library allocation
page read and write
27AB9000
trusted library allocation
page read and write
63F1000
heap
page read and write
8549000
direct allocation
page read and write
27ABD000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
27AB9000
trusted library allocation
page read and write
70F8000
direct allocation
page read and write
63F1000
heap
page read and write
27AA0000
trusted library allocation
page read and write
199B000
unkown
page readonly
5C11000
heap
page read and write
7F14000
direct allocation
page read and write
7072000
direct allocation
page read and write
27AB9000
trusted library allocation
page read and write
7180000
direct allocation
page read and write
730000
heap
page read and write
13AA000
unkown
page execute read
7C78000
direct allocation
page read and write
63F1000
heap
page read and write
27880000
direct allocation
page read and write
27ABD000
trusted library allocation
page read and write
27AB9000
trusted library allocation
page read and write
27ABD000
trusted library allocation
page read and write
465E000
stack
page read and write
A24000
unkown
page execute read
27AA0000
trusted library allocation
page read and write
27ABD000
trusted library allocation
page read and write
7182000
direct allocation
page read and write
7D06000
direct allocation
page read and write
27AA0000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
5C11000
heap
page read and write
6CE2000
unclassified section
page read and write
27AA0000
trusted library allocation
page read and write
7F99000
direct allocation
page read and write
63F1000
heap
page read and write
151F000
unkown
page readonly
1232000
unkown
page execute read
1615000
unkown
page readonly
5C11000
heap
page read and write
6FEE000
stack
page read and write
27AB9000
trusted library allocation
page read and write
27AA0000
trusted library allocation
page read and write
475E000
stack
page read and write
1900000
unkown
page read and write
27AB9000
trusted library allocation
page read and write
63F1000
heap
page read and write
7C06000
direct allocation
page read and write
27AB9000
trusted library allocation
page read and write
9E1000
unkown
page execute read
63F1000
heap
page read and write
166D000
unkown
page readonly
7091000
unclassified section
page execute read
1357000
unkown
page execute read
7F88000
direct allocation
page read and write
7C4C000
direct allocation
page read and write
A21000
unkown
page execute read
27ABD000
trusted library allocation
page read and write
98E000
heap
page read and write
1625000
unkown
page readonly
5838000
direct allocation
page read and write
63F1000
heap
page read and write
27ABD000
trusted library allocation
page read and write
63F1000
heap
page read and write
27AA0000
trusted library allocation
page read and write
111B000
unkown
page execute read
3EC000
stack
page read and write
27AA0000
trusted library allocation
page read and write
7078000
direct allocation
page read and write
DDB000
unkown
page execute read
27AB9000
trusted library allocation
page read and write
7E6A000
direct allocation
page read and write
288FF000
stack
page read and write
13B4000
unkown
page execute read
27ABD000
trusted library allocation
page read and write
71AF000
unclassified section
page execute read
27AB9000
trusted library allocation
page read and write
7EA2000
direct allocation
page read and write
7000000
direct allocation
page read and write
5E0F000
stack
page read and write
40FC000
stack
page read and write
1825000
unkown
page write copy
7239000
unclassified section
page execute read
27AA0000
trusted library allocation
page read and write
27AB9000
trusted library allocation
page read and write
7F33000
direct allocation
page read and write
744000
heap
page read and write
811B000
direct allocation
page read and write
5870000
heap
page read and write
7094000
direct allocation
page read and write
296E000
stack
page read and write
71B6000
unclassified section
page execute read
711D000
direct allocation
page read and write
446A000
heap
page read and write
165D000
unkown
page readonly
7FD6000
direct allocation
page read and write
985000
heap
page read and write
44D9000
heap
page read and write
7050000
direct allocation
page read and write
27AA0000
trusted library allocation
page read and write
27AB9000
trusted library allocation
page read and write
63F1000
heap
page read and write
27AB9000
trusted library allocation
page read and write
44E2000
heap
page read and write
7186000
direct allocation
page read and write
709E000
direct allocation
page read and write
7C3F000
direct allocation
page read and write
27AA2000
trusted library allocation
page read and write
1654000
unkown
page readonly
7F8C000
direct allocation
page read and write
27ABD000
trusted library allocation
page read and write
122D000
unkown
page execute read
63F1000
heap
page read and write
There are 963 hidden memdumps, click here to show them.