IOC Report
D009780.exe

loading gif

Files

File Path
Type
Category
Malicious
D009780.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\44872984602731657557515.tmp
SQLite 3.x database, last written using SQLite version 3036000, page size 2048, file counter 3, database pages 22, 1st free page 7, free pages 2, cookie 0x10, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-core-console-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-core-datetime-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-core-debug-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-core-errorhandling-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-core-file-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-core-file-l1-2-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-core-file-l2-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-core-handle-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-core-heap-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-core-interlocked-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-core-libraryloader-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-core-localization-l1-2-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-core-memory-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-core-namedpipe-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-core-processenvironment-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-core-processthreads-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-core-processthreads-l1-1-1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-core-profile-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-core-rtlsupport-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-core-string-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-core-synch-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-core-synch-l1-2-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-core-sysinfo-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-core-timezone-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-core-util-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-crt-conio-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-crt-convert-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-crt-environment-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-crt-filesystem-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-crt-heap-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-crt-locale-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-crt-math-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-crt-multibyte-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-crt-private-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-crt-process-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-crt-runtime-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-crt-stdio-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-crt-string-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-crt-time-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\api-ms-win-crt-utility-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\nssdbm3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\ucrtbase.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\54E0C079\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsh3A3C.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Ydervgg\Superassume\dodecaheddra\Anhydridizes.Imi121
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Ydervgg\Superassume\dodecaheddra\Staveren\Kolkhozy\Fatalists\Cassythaceae\Psammologist.Pan
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Ydervgg\Superassume\dodecaheddra\Staveren\Kolkhozy\Fatalists\Cassythaceae\libxml2-2.0.typelib
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Ydervgg\Superassume\dodecaheddra\Staveren\Kolkhozy\Fatalists\Cassythaceae\memstat.c
C source, ASCII text
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Ydervgg\Superassume\dodecaheddra\Staveren\Kolkhozy\Fatalists\Cassythaceae\selection-end-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
There are 46 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\D009780.exe
C:\Users\user\Desktop\D009780.exe
malicious
C:\Users\user\Desktop\D009780.exe
C:\Users\user\Desktop\D009780.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "D009780.exe
malicious
C:\Windows\SysWOW64\timeout.exe
C:\Windows\system32\timeout.exe 3
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://bllsl1.shop/bs1/index.php
188.114.97.3
malicious
http://bllsl1.shop/
unknown
https://www.babizna.pl/wp-includes/NWAMzBz204.dwpX
unknown
https://www.babizna.pl/wp-includes/NWAMzBz204.dwph
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
http://bllsl1.shop/bs1/index.phpU
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.babizna.pl/
unknown
https://www.babizna.pl/wp-includes/NWAMzBz204.dwp
95.216.34.216
http://ocsp.thawte.com0
unknown
http://www.mozilla.com0
unknown
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bllsl1.shop
188.114.97.3
malicious
babizna.pl
95.216.34.216
www.babizna.pl
unknown

IPs

IP
Domain
Country
Malicious
188.114.97.3
bllsl1.shop
European Union
malicious
95.216.34.216
babizna.pl
Germany

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Fivefoldness\Endosseringerne\Fouragen
Arigue
HKEY_CURRENT_USER\SOFTWARE\Fruticeta\Lavandin\Kingliest\Ernringsenhed
Legating

Memdumps

Base Address
Regiontype
Protect
Malicious
1660000
remote allocation
page execute and read and write
malicious
5DF000
heap
page read and write
malicious
1D4D0000
direct allocation
page read and write
malicious
1D9E0000
direct allocation
page read and write
malicious
2B60000
direct allocation
page execute and read and write
malicious
5F5000
heap
page read and write
1CAD1000
heap
page read and write
1A81000
heap
page read and write
1DDCC000
direct allocation
page read and write
1D02D000
stack
page read and write
5F5000
heap
page read and write
1DDC8000
direct allocation
page read and write
1E750000
direct allocation
page read and write
282F000
stack
page read and write
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
5F5000
heap
page read and write
5F5000
heap
page read and write
1D504000
direct allocation
page read and write
2260000
heap
page read and write
1DDC4000
direct allocation
page read and write
1DDC4000
direct allocation
page read and write
1DC8C000
direct allocation
page read and write
1CAD2000
heap
page read and write
1DE6C000
direct allocation
page read and write
1C0000
remote allocation
page read and write
1DDC0000
direct allocation
page read and write
1E704000
direct allocation
page read and write
1D4E0000
direct allocation
page read and write
2A70000
trusted library allocation
page read and write
1CAE0000
heap
page read and write
1CAD1000
heap
page read and write
1DDC4000
direct allocation
page read and write
19A000
stack
page read and write
30000
heap
page read and write
1DA28000
direct allocation
page read and write
5F5000
heap
page read and write
3417000
heap
page read and write
1D4F0000
direct allocation
page read and write
1A8C000
heap
page read and write
1E768000
direct allocation
page read and write
1CAD1000
heap
page read and write
1DDD4000
direct allocation
page read and write
1CAD1000
heap
page read and write
1DDD0000
direct allocation
page read and write
1DDC4000
direct allocation
page read and write
1CAD1000
heap
page read and write
5F5000
heap
page read and write
1DDC8000
direct allocation
page read and write
1CAD1000
heap
page read and write
1DDC8000
direct allocation
page read and write
5F5000
heap
page read and write
5F5000
heap
page read and write
1D560000
direct allocation
page read and write
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
7DE000
stack
page read and write
1E754000
direct allocation
page read and write
1DDC4000
direct allocation
page read and write
5F5000
heap
page read and write
1CAD1000
heap
page read and write
2AB0000
trusted library allocation
page read and write
5F5000
heap
page read and write
5A7000
heap
page read and write
5F5000
heap
page read and write
5F5000
heap
page read and write
3550000
trusted library allocation
page read and write
1D520000
direct allocation
page read and write
1CFAF000
stack
page read and write
1DDD0000
direct allocation
page read and write
1660000
remote allocation
page execute and read and write
1DDC8000
direct allocation
page read and write
1D570000
direct allocation
page read and write
1CAD1000
heap
page read and write
1E78C000
direct allocation
page read and write
5F5000
heap
page read and write
5F5000
heap
page read and write
1CAD1000
heap
page read and write
1E710000
direct allocation
page read and write
401000
unkown
page execute read
1DDC8000
direct allocation
page read and write
1E798000
direct allocation
page read and write
43C000
unkown
page read and write
1D4D8000
direct allocation
page read and write
1CAD1000
heap
page read and write
1D4F0000
direct allocation
page read and write
1DDC4000
direct allocation
page read and write
1D510000
direct allocation
page read and write
2270000
heap
page read and write
5F5000
heap
page read and write
1DDCC000
direct allocation
page read and write
20000
unclassified section
page readonly
1CAD1000
heap
page read and write
231E000
stack
page read and write
1DDD8000
direct allocation
page read and write
5F5000
heap
page read and write
23A0000
heap
page read and write
1D06E000
stack
page read and write
1CAD1000
heap
page read and write
5F5000
heap
page read and write
5F5000
heap
page read and write
1CAD1000
heap
page read and write
401000
unkown
page execute read
1CAD1000
heap
page read and write
1DDC0000
direct allocation
page read and write
1CAD1000
heap
page read and write
5F5000
heap
page read and write
5F5000
heap
page read and write
1DDCC000
direct allocation
page read and write
1D0AD000
stack
page read and write
1CAD1000
heap
page read and write
1DDC8000
direct allocation
page read and write
1DA3C000
direct allocation
page read and write
1BF0000
trusted library allocation
page read and write
1DDC0000
direct allocation
page read and write
329E000
stack
page read and write
1CAD1000
heap
page read and write
1DA28000
direct allocation
page read and write
1DAB8000
direct allocation
page read and write
1D570000
direct allocation
page read and write
1D8E0000
direct allocation
page read and write
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
1A00000
heap
page read and write
5F5000
heap
page read and write
1E380000
direct allocation
page read and write
1CAD1000
heap
page read and write
1DDD4000
direct allocation
page read and write
1E7A8000
direct allocation
page read and write
1DDD0000
direct allocation
page read and write
1CAD1000
heap
page read and write
1A90000
heap
page read and write
1CAD1000
heap
page read and write
23E5000
heap
page read and write
1D34F000
stack
page read and write
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
186E000
stack
page read and write
1D510000
direct allocation
page read and write
1DDCC000
direct allocation
page read and write
1DDC4000
direct allocation
page read and write
1DE68000
direct allocation
page read and write
1E774000
direct allocation
page read and write
5F5000
heap
page read and write
1CAD1000
heap
page read and write
1DDCC000
direct allocation
page read and write
1D39C000
stack
page read and write
1D4E0000
direct allocation
page read and write
5F5000
heap
page read and write
1CAD1000
heap
page read and write
5F5000
heap
page read and write
79E000
stack
page read and write
1AD2000
heap
page read and write
1DDD0000
direct allocation
page read and write
3409000
trusted library allocation
page read and write
5F5000
heap
page read and write
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
1DDC4000
direct allocation
page read and write
5F5000
heap
page read and write
323C000
stack
page read and write
5F5000
heap
page read and write
1DDC4000
direct allocation
page read and write
1CAD1000
heap
page read and write
5D9000
heap
page read and write
1C0000
remote allocation
page read and write
1DA90000
direct allocation
page read and write
437000
unkown
page read and write
1CAD1000
heap
page read and write
5F5000
heap
page read and write
1DA28000
direct allocation
page read and write
1CAD1000
heap
page read and write
5F5000
heap
page read and write
1CAD1000
heap
page read and write
1E7D0000
direct allocation
page read and write
1E734000
direct allocation
page read and write
5F5000
heap
page read and write
1C0000
remote allocation
page read and write
401000
unkown
page execute read
1DC50000
direct allocation
page read and write
1C0000
remote allocation
page read and write
5F5000
heap
page read and write
1DDCC000
direct allocation
page read and write
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
10000000
unkown
page readonly
4F00000
heap
page read and write
1DDC4000
direct allocation
page read and write
1DDC8000
direct allocation
page read and write
1D510000
direct allocation
page read and write
1CAD1000
heap
page read and write
40A000
unkown
page write copy
5F5000
heap
page read and write
1CAD1000
heap
page read and write
1EADC000
stack
page read and write
1EBE1000
trusted library allocation
page read and write
5F5000
heap
page read and write
235E000
stack
page read and write
1EBDD000
stack
page read and write
1DDD0000
direct allocation
page read and write
1CAD1000
heap
page read and write
1D580000
direct allocation
page read and write
35CE000
stack
page read and write
9AA000
unkown
page write copy
408000
unkown
page readonly
20000
unclassified section
page readonly
95E000
stack
page read and write
5F5000
heap
page read and write
1D590000
direct allocation
page read and write
408000
unkown
page readonly
1A8D000
heap
page read and write
1D6E0000
direct allocation
page read and write
1CAD1000
heap
page read and write
1DDC8000
direct allocation
page read and write
1D4D4000
direct allocation
page read and write
1D30E000
stack
page read and write
1A4A000
heap
page read and write
1E770000
direct allocation
page read and write
1DDC4000
direct allocation
page read and write
1D5B0000
direct allocation
page read and write
1CAD1000
heap
page read and write
1D4D4000
direct allocation
page read and write
476000
unkown
page readonly
1E2B4000
direct allocation
page read and write
1CAD1000
heap
page read and write
1D4F0000
direct allocation
page read and write
1CAD1000
heap
page read and write
19CE000
stack
page read and write
1E784000
direct allocation
page read and write
1DDD8000
direct allocation
page read and write
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
5F5000
heap
page read and write
1E700000
direct allocation
page read and write
1CAD1000
heap
page read and write
1E900000
direct allocation
page read and write
1CAD1000
heap
page read and write
1D5B0000
direct allocation
page read and write
5F5000
heap
page read and write
59E000
stack
page read and write
1DDC8000
direct allocation
page read and write
1A81000
heap
page read and write
1CAD1000
heap
page read and write
1A08000
heap
page read and write
1C10000
heap
page read and write
1A75000
heap
page read and write
5F5000
heap
page read and write
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
408000
unkown
page readonly
1D2D0000
remote allocation
page read and write
1E708000
direct allocation
page read and write
1E74C000
direct allocation
page read and write
1DDD0000
direct allocation
page read and write
1D4D4000
direct allocation
page read and write
60000
direct allocation
page read and write
1DDC4000
direct allocation
page read and write
5F4000
heap
page read and write
5F5000
heap
page read and write
1D580000
direct allocation
page read and write
1CAD1000
heap
page read and write
1D540000
direct allocation
page read and write
1CAD1000
heap
page read and write
5F5000
heap
page read and write
1C16000
heap
page read and write
1D49B000
stack
page read and write
1E79C000
direct allocation
page read and write
5F5000
heap
page read and write
5F5000
heap
page read and write
1AD6000
heap
page read and write
1D500000
direct allocation
page read and write
1D550000
direct allocation
page read and write
1D570000
direct allocation
page read and write
1D520000
direct allocation
page read and write
5F1000
heap
page read and write
1CAD1000
heap
page read and write
5F5000
heap
page read and write
1DDC4000
direct allocation
page read and write
1E800000
direct allocation
page read and write
5F5000
heap
page read and write
1D7000
heap
page read and write
1D4D4000
direct allocation
page read and write
1E744000
direct allocation
page read and write
A5F000
stack
page read and write
1E7C0000
direct allocation
page read and write
5F5000
heap
page read and write
1A81000
heap
page read and write
10005000
unkown
page readonly
1D540000
direct allocation
page read and write
1D4E0000
direct allocation
page read and write
1D26F000
stack
page read and write
5F5000
heap
page read and write
1D5A0000
direct allocation
page read and write
1D550000
direct allocation
page read and write
5F5000
heap
page read and write
1CAD1000
heap
page read and write
5F5000
heap
page read and write
5F5000
heap
page read and write
1D4F0000
direct allocation
page read and write
1A7B000
heap
page read and write
1CAD1000
heap
page read and write
1D520000
direct allocation
page read and write
1DDCC000
direct allocation
page read and write
1D5B0000
direct allocation
page read and write
1CAD1000
heap
page read and write
60000
trusted library allocation
page read and write
1DDC0000
direct allocation
page read and write
400000
unkown
page readonly
1D580000
direct allocation
page read and write
1CAD1000
heap
page read and write
1D4EC000
direct allocation
page read and write
1E90E000
direct allocation
page read and write
1DB20000
direct allocation
page read and write
1DDC4000
direct allocation
page read and write
1DDC0000
direct allocation
page read and write
1BB0000
trusted library allocation
page read and write
1E70C000
direct allocation
page read and write
360F000
stack
page read and write
1CAD1000
heap
page read and write
1D5000
heap
page read and write
5F5000
heap
page read and write
1CAD1000
heap
page read and write
1A7B000
heap
page read and write
1E7D0000
direct allocation
page read and write
292F000
stack
page read and write
1DDC8000
direct allocation
page read and write
1D4E0000
direct allocation
page read and write
1CAD1000
heap
page read and write
5F5000
heap
page read and write
5F5000
heap
page read and write
1CAD1000
heap
page read and write
1D4DC000
direct allocation
page read and write
1DDA8000
direct allocation
page read and write
1DDD0000
direct allocation
page read and write
1CAD1000
heap
page read and write
1DDC0000
direct allocation
page read and write
1CAF0000
heap
page read and write
1DDC8000
direct allocation
page read and write
1CAD1000
heap
page read and write
1DC68000
direct allocation
page read and write
1DDD8000
direct allocation
page read and write
1D0000
unclassified section
page readonly
1E7C4000
direct allocation
page read and write
1DDC4000
direct allocation
page read and write
2A30000
trusted library allocation
page read and write
1D4D4000
direct allocation
page read and write
1CF6E000
stack
page read and write
1A8C000
heap
page read and write
5F5000
heap
page read and write
1A7B000
heap
page read and write
1D514000
direct allocation
page read and write
1DA38000
direct allocation
page read and write
1D12E000
stack
page read and write
5F5000
heap
page read and write
1E728000
direct allocation
page read and write
1D5A0000
direct allocation
page read and write
1E0000
unclassified section
page readonly
1D510000
direct allocation
page read and write
1A8C000
heap
page read and write
1DF30000
direct allocation
page read and write
1CAD1000
heap
page read and write
1D4E0000
direct allocation
page read and write
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
5F5000
heap
page read and write
1D530000
direct allocation
page read and write
5F5000
heap
page read and write
1A8C000
heap
page read and write
1D500000
direct allocation
page read and write
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
1E72C000
direct allocation
page read and write
1CAD1000
heap
page read and write
1E764000
direct allocation
page read and write
1CAD1000
heap
page read and write
1E7AC000
direct allocation
page read and write
400000
unkown
page readonly
1DDD0000
direct allocation
page read and write
1DDD0000
direct allocation
page read and write
1A74000
heap
page read and write
2E00000
trusted library allocation
page read and write
1CAD1000
heap
page read and write
1D4D4000
direct allocation
page read and write
1DDC8000
direct allocation
page read and write
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
1D7E0000
direct allocation
page read and write
5F5000
heap
page read and write
1DF30000
direct allocation
page read and write
1CFEE000
stack
page read and write
1D520000
direct allocation
page read and write
1D4F0000
direct allocation
page read and write
1D550000
direct allocation
page read and write
1DAE0000
direct allocation
page read and write
408000
unkown
page readonly
1E748000
direct allocation
page read and write
1A7B000
heap
page read and write
1DDC4000
direct allocation
page read and write
1D560000
direct allocation
page read and write
408000
unkown
page readonly
1CAD1000
heap
page read and write
1D4E0000
direct allocation
page read and write
1CAD1000
heap
page read and write
1AEF000
heap
page read and write
5F5000
heap
page read and write
1CAD1000
heap
page read and write
5F5000
heap
page read and write
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
5F5000
heap
page read and write
23A4000
heap
page read and write
1DDC4000
direct allocation
page read and write
1CAD1000
heap
page read and write
1DA30000
direct allocation
page read and write
5F5000
heap
page read and write
1D570000
direct allocation
page read and write
1CAD1000
heap
page read and write
30000
heap
page read and write
1D530000
direct allocation
page read and write
1D4E0000
direct allocation
page read and write
5F5000
heap
page read and write
2F60000
unclassified section
page readonly
1D540000
direct allocation
page read and write
10003000
unkown
page readonly
1D2D0000
remote allocation
page read and write
5F5000
heap
page read and write
5F5000
heap
page read and write
1CAD1000
heap
page read and write
400000
unkown
page readonly
1D4D4000
direct allocation
page read and write
1E7CC000
direct allocation
page read and write
400000
unkown
page readonly
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
8DF000
stack
page read and write
1CAD1000
heap
page read and write
5F5000
heap
page read and write
1CAD1000
heap
page read and write
5F5000
heap
page read and write
1DDC0000
direct allocation
page read and write
476000
unkown
page readonly
1CAD1000
heap
page read and write
400000
unkown
page readonly
1A81000
heap
page read and write
5F5000
heap
page read and write
1DDC8000
direct allocation
page read and write
1E720000
direct allocation
page read and write
1CAD1000
heap
page read and write
8E0000
trusted library allocation
page read and write
5ED000
heap
page read and write
5F5000
heap
page read and write
1DDC8000
direct allocation
page read and write
1CAD1000
heap
page read and write
1E6F8000
direct allocation
page read and write
1D4D4000
direct allocation
page read and write
32A0000
heap
page read and write
5F5000
heap
page read and write
1CAD1000
heap
page read and write
1DDC0000
direct allocation
page read and write
1D590000
direct allocation
page read and write
1CAD1000
heap
page read and write
1B3F000
stack
page read and write
1CAD1000
heap
page read and write
190E000
stack
page read and write
1C0000
remote allocation
page read and write
1CAD1000
heap
page read and write
1A8C000
heap
page read and write
1CAD1000
heap
page read and write
1D500000
direct allocation
page read and write
5F5000
heap
page read and write
1CAD1000
heap
page read and write
1D4D4000
direct allocation
page read and write
1A81000
heap
page read and write
1A69000
heap
page read and write
1DDCC000
direct allocation
page read and write
1CAD1000
heap
page read and write
1DDF4000
direct allocation
page read and write
1E76C000
direct allocation
page read and write
2FDC000
stack
page read and write
5EF000
heap
page read and write
1CAD1000
heap
page read and write
5F5000
heap
page read and write
1DDC0000
direct allocation
page read and write
3410000
heap
page read and write
5F5000
heap
page read and write
1A8C000
heap
page read and write
1CAD1000
heap
page read and write
1DDC4000
direct allocation
page read and write
5F5000
heap
page read and write
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
5F5000
heap
page read and write
5F5000
heap
page read and write
33FE000
stack
page read and write
1D4D4000
direct allocation
page read and write
1D500000
direct allocation
page read and write
5F5000
heap
page read and write
400000
unkown
page readonly
1D2D0000
remote allocation
page read and write
401000
unkown
page execute read
100000
trusted library allocation
page read and write
1A7B000
heap
page read and write
5F5000
heap
page read and write
5F5000
heap
page read and write
40A000
unkown
page read and write
1CAD1000
heap
page read and write
1D560000
direct allocation
page read and write
476000
unkown
page readonly
1DDC0000
direct allocation
page read and write
5F5000
heap
page read and write
1D4F0000
direct allocation
page read and write
1DDC0000
direct allocation
page read and write
2CC1000
heap
page read and write
1DDC0000
direct allocation
page read and write
10001000
unkown
page execute read
1E780000
direct allocation
page read and write
33BE000
stack
page read and write
1D4E8000
direct allocation
page read and write
1A8C000
heap
page read and write
1CAD6000
heap
page read and write
1EBE0000
trusted library allocation
page read and write
1CAD1000
heap
page read and write
2E40000
trusted library allocation
page read and write
5F5000
heap
page read and write
1A8C000
heap
page read and write
1D580000
direct allocation
page read and write
40A000
unkown
page write copy
1DDC8000
direct allocation
page read and write
1A7B000
heap
page read and write
1A7B000
heap
page read and write
5F5000
heap
page read and write
1D16F000
stack
page read and write
1DDCC000
direct allocation
page read and write
1DDF8000
direct allocation
page read and write
431000
unkown
page read and write
2F70000
heap
page read and write
1D530000
direct allocation
page read and write
476000
unkown
page readonly
1D180000
heap
page read and write
1CAD1000
heap
page read and write
1D530000
direct allocation
page read and write
1CAD1000
heap
page read and write
1D4F0000
direct allocation
page read and write
1E740000
direct allocation
page read and write
1D4D4000
direct allocation
page read and write
1CAD1000
heap
page read and write
5F5000
heap
page read and write
1DDC8000
direct allocation
page read and write
10020000
trusted library allocation
page read and write
42F000
unkown
page read and write
1AD1000
heap
page read and write
1DDC4000
direct allocation
page read and write
5F5000
heap
page read and write
476000
unkown
page readonly
5F5000
heap
page read and write
1DAE0000
direct allocation
page read and write
18C4000
heap
page read and write
1950000
trusted library allocation
page read and write
1DDC0000
direct allocation
page read and write
1CAD1000
heap
page read and write
1D590000
direct allocation
page read and write
1D560000
direct allocation
page read and write
1CAD1000
heap
page read and write
1DDC0000
direct allocation
page read and write
1CAD1000
heap
page read and write
194F000
stack
page read and write
1E788000
direct allocation
page read and write
1E7CC000
direct allocation
page read and write
43F000
unkown
page read and write
1E912000
direct allocation
page read and write
1D550000
direct allocation
page read and write
1D5E0000
direct allocation
page read and write
40A000
unkown
page write copy
5A0000
heap
page read and write
1CAD1000
heap
page read and write
476000
unkown
page readonly
5F5000
heap
page read and write
401000
unkown
page execute read
1A81000
heap
page read and write
1D540000
direct allocation
page read and write
1CAD1000
heap
page read and write
3250000
unclassified section
page readonly
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
5F5000
heap
page read and write
5F5000
heap
page read and write
1ADA000
heap
page read and write
1CAD1000
heap
page read and write
1A81000
heap
page read and write
40A000
unkown
page write copy
1CAD1000
heap
page read and write
1A81000
heap
page read and write
5F5000
heap
page read and write
5F5000
heap
page read and write
408000
unkown
page readonly
5F5000
heap
page read and write
1D4D4000
direct allocation
page read and write
45C000
unkown
page read and write
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
1AD6000
heap
page read and write
5F5000
heap
page read and write
1CAD1000
heap
page read and write
1E730000
direct allocation
page read and write
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
40A000
unkown
page write copy
1D0000
heap
page read and write
5F5000
heap
page read and write
1CAD1000
heap
page read and write
F0000
heap
page read and write
5F5000
heap
page read and write
1D5A0000
direct allocation
page read and write
1CAD1000
heap
page read and write
18AE000
stack
page read and write
1DDCC000
direct allocation
page read and write
1DDC8000
direct allocation
page read and write
1CAD1000
heap
page read and write
5F5000
heap
page read and write
1CAD1000
heap
page read and write
1CAD0000
heap
page read and write
1E714000
direct allocation
page read and write
5F5000
heap
page read and write
1D22E000
stack
page read and write
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
354F000
stack
page read and write
1D48C000
stack
page read and write
5F5000
heap
page read and write
1DDCC000
direct allocation
page read and write
5F5000
heap
page read and write
1D4D4000
direct allocation
page read and write
1E724000
direct allocation
page read and write
1DA34000
direct allocation
page read and write
1CAD1000
heap
page read and write
1E758000
direct allocation
page read and write
5F5000
heap
page read and write
1DDC8000
direct allocation
page read and write
1D4E0000
direct allocation
page read and write
5F5000
heap
page read and write
473000
unkown
page read and write
1CAD1000
heap
page read and write
1C0000
remote allocation
page read and write
18C0000
heap
page read and write
5F5000
heap
page read and write
10059000
trusted library allocation
page read and write
1CAD1000
heap
page read and write
5F5000
heap
page read and write
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
1A90000
heap
page read and write
1CAD1000
heap
page read and write
1E75C000
direct allocation
page read and write
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
1D590000
direct allocation
page read and write
2CC0000
heap
page read and write
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
1CAD1000
heap
page read and write
23E0000
heap
page read and write
401000
unkown
page execute read
96000
stack
page read and write
60000
direct allocation
page read and write
There are 659 hidden memdumps, click here to show them.