IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\00440746450577075373182215
SQLite 3.x database, last written using SQLite version 3034000, page size 2048, file counter 6, database pages 53, cookie 0x22, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\05817041688375942296226764
SQLite 3.x database, last written using SQLite version 3041002, file counter 9, database pages 43, 1st free page 42, free pages 2, cookie 0x3f, schema 4, UTF-8, version-valid-for 9
dropped
C:\ProgramData\22428703343438507335441715
SQLite 3.x database, user version 12, last written using SQLite version 3037002, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\22428703343438507335441715-shm
data
dropped
C:\ProgramData\30562671907380543272507388
SQLite 3.x database, last written using SQLite version 3041002, file counter 9, database pages 43, 1st free page 42, free pages 2, cookie 0x3f, schema 4, UTF-8, version-valid-for 9
dropped
C:\ProgramData\35746121865178509047716708
SQLite 3.x database, last written using SQLite version 3034000, page size 2048, file counter 2, database pages 23, cookie 0xd, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\37707990510604932654966133
SQLite 3.x database, last written using SQLite version 3041002, page size 2048, file counter 7, database pages 57, cookie 0x30, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\38345013959471306846242542
SQLite 3.x database, last written using SQLite version 3034000, file counter 5, database pages 29, cookie 0x16, schema 4, UTF-8, version-valid-for 5
dropped
C:\ProgramData\41854390081158473842695081
SQLite 3.x database, last written using SQLite version 3041002, page size 2048, file counter 2, database pages 25, cookie 0x10, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\52766014303501464703169876
SQLite 3.x database, last written using SQLite version 3034000, file counter 11, database pages 8, 1st free page 8, free pages 1, cookie 0x4, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\59242670612831660624168672
SQLite 3.x database, last written using SQLite version 3034000, page size 2048, file counter 6, database pages 53, cookie 0x22, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\60379239670748708072323449
SQLite 3.x database, last written using SQLite version 3041002, page size 2048, file counter 7, database pages 57, cookie 0x30, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\77364074545019038892817732
SQLite 3.x database, user version 74, last written using SQLite version 3041002, page size 32768, writer version 2, read version 2, file counter 3, database pages 52, 1st free page 43, free pages 8, cookie 0x3c, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\77364074545019038892817732-shm
data
dropped
C:\ProgramData\93702365600485792059963927
SQLite 3.x database, last written using SQLite version 3034000, file counter 5, database pages 29, cookie 0x16, schema 4, UTF-8, version-valid-for 5
dropped
C:\ProgramData\98279768849475661070206458
SQLite 3.x database, last written using SQLite version 3041002, file counter 14, database pages 22, 1st free page 6, free pages 8, cookie 0x8, schema 4, UTF-8, version-valid-for 14
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
There are 13 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
C:\Users\user\Desktop\file.exe
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://t.me/
unknown
https://t.me/vogogorx
unknown
https://duckduckgo.com/ac/?q=
unknown
https://t.me/vogogorv
unknown
http://195.201.254.123:6012/Mu
unknown
http://195.201.254.123:6012/sCodecs.dlls
unknown
http://195.201.254.123:6012/sp1.zip
195.201.254.123
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.google.com/chrome/thank-you.html?statcb=1&installdataindex=empty&defaultbrowser=0
unknown
http://195.201.254.123:6012/0
unknown
https://www.autoitscript.com/files/autoit3/autoit-v3-setup.zipQ
unknown
https://sdlc-esd.oracle.com/ESD6/JSCDL/jdk/8u321-b07/df5ad55fdd604472a86a45a217032c7d/jre-8u321-wind
unknown
https://t.me/vogogorracvotsp1.zipMozilla/5.0
unknown
https://www.google.com/chrome/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://t.me/vogogorL
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/search%3Fq%3Dmicrosoft%26oq%3Dmic
unknown
https://www.google.com/search?q=test&oq=test&aqs=chrome..69i57j0i131i433i512j0i512j0i131i433i512l2j0
unknown
https://stubdownloader.services.mozilla.com/?attribution_code=c291cmNlPXd3dy5nb29nbGUuY29tJm1lZGl1bT
unknown
https://steamcommunity.com/profiles/76561199545993403update.zip
unknown
https://www.google.com/https://www.google.com/chrome/Thu
unknown
https://www.google.com/search?q=microsoft&oq=microsoft&gs_lcrp=EgZjaHJvbWUqEAgAEAAYgwEY4wIYsQMYgAQyE
unknown
http://www.sqlite.org/copyright.html.
unknown
http://195.201.254.123:6012/b2ced91faf30889899f34458f95b8e93
195.201.254.123
https://www.google.com/search?q=microsoft&sourceid=chrome&ie=UTF-8microsoft
unknown
http://195.201.254.123:6012/b2ced91faf30889899f34458f95b8e93k
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://aka.ms/vs/17/release/vc_redist.x64.exeD
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://steamcommunity.com/profiles/76561199545993403
https://javadl.oracle.com/webapps/download/AutoDL?BundleId=245807_df5ad55fdd604472a86a45a217032c7dM
unknown
http://195.201.254.123:6012/sp1.zipn)
unknown
http://195.201.254.123:6012/
195.201.254.123
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.autoitscript.com/cgi-bin/getfile.pl?autoit3/autoit-v3-setup.zip
unknown
https://www.google.com/search?q=test&sourceid=chrome&ie=UTF-8test
unknown
http://195.201.254.123:6012/m
unknown
https://www.ecosia.org/newtab/
unknown
https://dl.google.com/tag/s/appguid%3D%7B8A69D345-D564-463C-AFF1-A69D9E530F96%7D%26iid%3D%7B27E81B29
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://support.mozilla.org/products/firefox
unknown
https://www.google.com/chrome/thank-you.html?statcb=1&installdataindex=empty&defaultbrowser=0Google
unknown
https://www.google.com/favicon.ico
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.autoitscript.com/site/autoit/downloads/
unknown
https://www.google.com/chrome/Google
unknown
https://t.me/vogogor
149.154.167.99
https://www.autoitscript.com/site/autoit/downloads/https://www.autoitscript.com/site/Sun
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/search%3Fq%3Dtest%26oq%3Dtest%26a
unknown
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.google.com/search?q=microsoft&sourceid=chrome&ie=UTF-8microsoftt
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.
unknown
https://cdn.stubdownloader.services.mozilla.com/builds/firefox-stub/en-US/win/4b14f052f39ceffb32abd8
unknown
There are 46 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
t.me
149.154.167.99

IPs

IP
Domain
Country
Malicious
149.154.167.99
t.me
United Kingdom
195.201.254.123
unknown
Germany

Memdumps

Base Address
Regiontype
Protect
Malicious
4100000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
4160000
direct allocation
page read and write
malicious
4886000
heap
page read and write
4478000
heap
page read and write
11271000
heap
page read and write
4337000
heap
page read and write
49FF000
heap
page read and write
1AABE750000
heap
page read and write
48BD000
heap
page read and write
4977000
heap
page read and write
12DA35C0000
heap
page read and write
12DA3F4D000
heap
page read and write
12DA3F6F000
heap
page read and write
476F000
heap
page read and write
43D2000
heap
page read and write
2517000
heap
page read and write
252EFA000
stack
page read and write
4986000
heap
page read and write
12DA3F7A000
heap
page read and write
48A2000
heap
page read and write
12DA3F40000
heap
page read and write
12DA3E15000
heap
page read and write
4B38000
heap
page read and write
1AABF280000
heap
page read and write
4840000
heap
page read and write
4606000
heap
page read and write
56BF000
stack
page read and write
472D000
heap
page read and write
11042000
heap
page read and write
49AA000
heap
page read and write
12DA3F59000
heap
page read and write
12DA3F70000
heap
page read and write
1AABF241000
heap
page read and write
249E3497000
heap
page read and write
2CBF9FE000
stack
page read and write
47FA000
heap
page read and write
46C2000
heap
page read and write
4983000
heap
page read and write
4A03000
heap
page read and write
10EAD000
heap
page read and write
47BC000
heap
page read and write
1AABE83F000
heap
page read and write
4822000
heap
page read and write
46A5000
heap
page read and write
45CD000
heap
page read and write
4648000
heap
page read and write
44CD000
heap
page read and write
4B7A000
heap
page read and write
163372D6000
heap
page read and write
447B000
heap
page read and write
10A3F000
heap
page read and write
12DA3F59000
heap
page read and write
25DB000
heap
page read and write
1AABE853000
heap
page read and write
61EB4000
direct allocation
page read and write
48DD000
heap
page read and write
1AABF265000
heap
page read and write
1D304D00000
heap
page read and write
12DA4668000
heap
page read and write
5BBD000
stack
page read and write
2551000
heap
page read and write
4507000
heap
page read and write
4AA1000
heap
page read and write
10EA0000
heap
page read and write
4B97000
heap
page read and write
45BC000
heap
page read and write
163372B0000
heap
page read and write
12DA36E0000
heap
page read and write
4873000
heap
page read and write
1AABE8A0000
heap
page read and write
49BD000
heap
page read and write
4835000
heap
page read and write
48E8000
heap
page read and write
12DA369B000
heap
page read and write
46D1000
heap
page read and write
48D2000
heap
page read and write
48AA000
heap
page read and write
1AABF293000
heap
page read and write
462D000
heap
page read and write
10EB1000
heap
page read and write
1AABE8A0000
heap
page read and write
45DC000
heap
page read and write
1AABF283000
heap
page read and write
10EBB000
heap
page read and write
1AABF293000
heap
page read and write
4593000
heap
page read and write
2CBF97F000
stack
page read and write
4351000
heap
page read and write
11A9F000
heap
page read and write
4538000
heap
page read and write
16337B03000
heap
page read and write
1AABF5DC000
heap
page read and write
43F6000
heap
page read and write
58632FF000
stack
page read and write
4707000
heap
page read and write
46D9000
heap
page read and write
249E3400000
heap
page read and write
4B34000
heap
page read and write
4944000
heap
page read and write
4A8B000
heap
page read and write
467000
unkown
page execute and read and write
16337298000
heap
page read and write
1AABE81E000
heap
page read and write
4767000
heap
page read and write
1AABF47B000
heap
page read and write
4687000
heap
page read and write
1D3066B0000
remote allocation
page read and write
12DA372B000
heap
page read and write
44C9000
heap
page read and write
10EB7000
heap
page read and write
45C4000
heap
page read and write
4948000
heap
page read and write
25A2000
heap
page read and write
1AABF2A5000
heap
page read and write
491B000
heap
page read and write
49F4000
heap
page read and write
1AABE864000
heap
page read and write
45FE000
heap
page read and write
1AABF27D000
heap
page read and write
4529000
heap
page read and write
1AABF294000
heap
page read and write
469A000
heap
page read and write
1AABE806000
heap
page read and write
47E4000
heap
page read and write
1AABE853000
heap
page read and write
24EE000
stack
page read and write
475C000
heap
page read and write
10EAF000
heap
page read and write
10FA0000
trusted library allocation
page read and write
49B9000
heap
page read and write
4EB2A7D000
stack
page read and write
25AA000
heap
page read and write
1AABF470000
heap
page read and write
4A0E000
heap
page read and write
1AABF26A000
heap
page read and write
4AEB000
heap
page read and write
16337B02000
heap
page read and write
1AABE9B0000
heap
page read and write
49FB000
heap
page read and write
4B67000
heap
page read and write
1AABE863000
heap
page read and write
12DA3F37000
heap
page read and write
12DA4661000
heap
page read and write
488A000
heap
page read and write
1AABE853000
heap
page read and write
4868000
heap
page read and write
45FA000
heap
page read and write
12DA3F5B000
heap
page read and write
1AABF27A000
heap
page read and write
249E3432000
heap
page read and write
4965000
heap
page read and write
12DA3F52000
heap
page read and write
249E3C02000
trusted library allocation
page read and write
4B3C000
heap
page read and write
48AE000
heap
page read and write
44E3000
heap
page read and write
10E99000
heap
page read and write
471A000
heap
page read and write
4917000
heap
page read and write
1AABF473000
heap
page read and write
1AABF293000
heap
page read and write
491F000
heap
page read and write
12DA36AC000
heap
page read and write
460F000
heap
page read and write
12DA3F79000
heap
page read and write
461B000
heap
page read and write
4EB267D000
stack
page read and write
45F7000
heap
page read and write
12DA3F80000
heap
page read and write
4376000
heap
page read and write
419E000
stack
page read and write
463C000
heap
page read and write
1AABF262000
heap
page read and write
5BF0000
remote allocation
page read and write
487E000
heap
page read and write
12DA367C000
heap
page read and write
46F3000
heap
page read and write
12DA3F56000
heap
page read and write
474D000
heap
page read and write
469E000
heap
page read and write
44F2000
heap
page read and write
10E99000
heap
page read and write
249E3431000
heap
page read and write
45D1000
heap
page read and write
45C0000
heap
page read and write
58634FE000
stack
page read and write
10E99000
heap
page read and write
1AABE7A0000
heap
page read and write
10EAC000
heap
page read and write
4626000
heap
page read and write
47A2000
heap
page read and write
483C000
heap
page read and write
482D000
heap
page read and write
1AABF28B000
heap
page read and write
16337B0A000
heap
page read and write
243D000
unkown
page readonly
439F000
heap
page read and write
1198E000
heap
page read and write
4602000
heap
page read and write
45A6000
heap
page read and write
449E000
heap
page read and write
46BC000
heap
page read and write
4755000
heap
page read and write
4731000
heap
page read and write
1AABE83F000
heap
page read and write
1AABF2AD000
heap
page read and write
1AABF47A000
heap
page read and write
428E000
stack
page read and write
163372E2000
heap
page read and write
4AF6000
heap
page read and write
1AABE9C0000
heap
page read and write
2533FC000
stack
page read and write
4890000
heap
page read and write
46B0000
heap
page read and write
4970000
heap
page read and write
4390000
heap
page read and write
1AABF285000
heap
page read and write
1D304D13000
heap
page read and write
10E92000
heap
page read and write
1AABE825000
heap
page read and write
4A49000
heap
page read and write
4882000
heap
page read and write
1AABE88A000
heap
page read and write
2510000
heap
page read and write
254D000
heap
page read and write
1D304C00000
heap
page read and write
46FE000
heap
page read and write
2515000
heap
page read and write
61ECC000
direct allocation
page read and write
48B5000
heap
page read and write
12DA3F79000
heap
page read and write
2575000
heap
page read and write
43E9000
heap
page read and write
456F000
heap
page read and write
1633727D000
heap
page read and write
4968000
heap
page read and write
4751000
heap
page read and write
468F000
heap
page read and write
4A16000
heap
page read and write
249E3458000
heap
page read and write
46B4000
heap
page read and write
10EB7000
heap
page read and write
1AABF293000
heap
page read and write
48C0000
heap
page read and write
1AABE811000
heap
page read and write
4364000
heap
page read and write
1633727E000
heap
page read and write
12DA3F5B000
heap
page read and write
49AE000
heap
page read and write
1AABF279000
heap
page read and write
24AE000
stack
page read and write
4859000
heap
page read and write
258F000
heap
page read and write
490A000
heap
page read and write
1D3066B0000
remote allocation
page read and write
249E3441000
heap
page read and write
4B88000
heap
page read and write
4758000
heap
page read and write
44DC000
heap
page read and write
4540000
heap
page read and write
61ED0000
direct allocation
page read and write
12DA3F57000
heap
page read and write
16337298000
heap
page read and write
1AABE88A000
heap
page read and write
4B49000
heap
page read and write
249E3438000
heap
page read and write
4788000
heap
page read and write
255C000
heap
page read and write
2532FC000
stack
page read and write
45B1000
heap
page read and write
4359000
heap
page read and write
1AABF283000
heap
page read and write
4893000
heap
page read and write
4826000
heap
page read and write
4831000
heap
page read and write
1AABE864000
heap
page read and write
1AABF293000
heap
page read and write
47E8000
heap
page read and write
44EF000
heap
page read and write
1D304D02000
heap
page read and write
1AABF264000
heap
page read and write
49D0000
heap
page read and write
16337251000
heap
page read and write
163372B1000
heap
page read and write
452D000
heap
page read and write
12DA372A000
heap
page read and write
487B000
heap
page read and write
49E9000
heap
page read and write
16337302000
heap
page read and write
2529CE000
stack
page read and write
1AABF47A000
heap
page read and write
43C3000
heap
page read and write
12DA368D000
heap
page read and write
46A9000
heap
page read and write
45E4000
heap
page read and write
4A32000
heap
page read and write
47D1000
heap
page read and write
249E344D000
heap
page read and write
4AE3000
heap
page read and write
4782000
heap
page read and write
4A9E000
heap
page read and write
1AABF285000
heap
page read and write
4817000
heap
page read and write
10E99000
heap
page read and write
58631FE000
stack
page read and write
1AABE7C9000
heap
page read and write
492A000
heap
page read and write
43B8000
heap
page read and write
4355000
heap
page read and write
12DA3F32000
heap
page read and write
16337216000
heap
page read and write
46EB000
heap
page read and write
4394000
heap
page read and write
10EBB000
heap
page read and write
12DA362F000
heap
page read and write
1AABF262000
heap
page read and write
16337B00000
heap
page read and write
4ADC000
heap
page read and write
1AABE7D1000
heap
page read and write
46EF000
heap
page read and write
1AABE83B000
heap
page read and write
4525000
heap
page read and write
4A3D000
heap
page read and write
2534FE000
stack
page read and write
4AEF000
heap
page read and write
44C2000
heap
page read and write
4B55000
heap
page read and write
12DA3DF0000
remote allocation
page read and write
1AABF27A000
heap
page read and write
10EBB000
heap
page read and write
4855000
heap
page read and write
259D000
heap
page read and write
4342000
heap
page read and write
486F000
heap
page read and write
1AABF29A000
heap
page read and write
249E3444000
heap
page read and write
1D3066B0000
remote allocation
page read and write
43BF000
heap
page read and write
48A6000
heap
page read and write
12DA3F30000
heap
page read and write
10EBB000
heap
page read and write
249E3462000
heap
page read and write
1AABE8A0000
heap
page read and write
9C000
stack
page read and write
1AABE83F000
heap
page read and write
10EB7000
heap
page read and write
10A11000
heap
page read and write
249E348F000
heap
page read and write
4B8B000
heap
page read and write
1AABE88A000
heap
page read and write
1AABE853000
heap
page read and write
4597000
heap
page read and write
4330000
heap
page read and write
10FF0000
heap
page read and write
257D000
heap
page read and write
4802000
heap
page read and write
4B82000
heap
page read and write
4740000
heap
page read and write
462A000
heap
page read and write
249E3470000
heap
page read and write
10EBA000
heap
page read and write
49B6000
heap
page read and write
25A6000
heap
page read and write
16337213000
heap
page read and write
4B40000
heap
page read and write
25B5000
heap
page read and write
163372B4000
heap
page read and write
4806000
heap
page read and write
1AABF477000
heap
page read and write
4573000
heap
page read and write
4950000
heap
page read and write
1D304B20000
heap
page read and write
47B5000
heap
page read and write
12DA3613000
heap
page read and write
4704000
heap
page read and write
10EA0000
heap
page read and write
10EAD000
heap
page read and write
1AABE820000
heap
page read and write
25D7000
heap
page read and write
12DA3DF0000
remote allocation
page read and write
4470000
heap
page read and write
49C5000
heap
page read and write
12DA3F32000
heap
page read and write
48E4000
heap
page read and write
2558000
heap
page read and write
4EB24FC000
stack
page read and write
2528CB000
stack
page read and write
44C5000
heap
page read and write
455C000
heap
page read and write
12DA3F76000
heap
page read and write
1AABF360000
heap
page read and write
1AABF25F000
heap
page read and write
25BD000
heap
page read and write
1AABE88A000
heap
page read and write
45A9000
heap
page read and write
47B8000
heap
page read and write
249E3610000
heap
page read and write
1157C000
heap
page read and write
1AABF265000
heap
page read and write
1AABF475000
heap
page read and write
4914000
heap
page read and write
478F000
heap
page read and write
1AABE8A0000
heap
page read and write
4516000
heap
page read and write
1AABE853000
heap
page read and write
45A2000
heap
page read and write
43AE000
heap
page read and write
4851000
heap
page read and write
4613000
heap
page read and write
4A4C000
heap
page read and write
1AABE7C8000
heap
page read and write
11EBD000
stack
page read and write
1AABE88A000
heap
page read and write
10EA6000
heap
page read and write
1AABF5DC000
heap
page read and write
4546000
heap
page read and write
400000
unkown
page readonly
12DA3F7C000
heap
page read and write
249E345C000
heap
page read and write
434E000
heap
page read and write
4A41000
heap
page read and write
454D000
heap
page read and write
249E345A000
heap
page read and write
47CD000
heap
page read and write
496C000
heap
page read and write
48FB000
heap
page read and write
48EC000
heap
page read and write
1AABF5D6000
heap
page read and write
25294F000
stack
page read and write
1AABF474000
heap
page read and write
44E0000
heap
page read and write
12DA4602000
heap
page read and write
4644000
heap
page read and write
1AABF29B000
heap
page read and write
1D0000
heap
page read and write
16337298000
heap
page read and write
11046000
heap
page read and write
5862D3B000
stack
page read and write
4320000
heap
page read and write
16337231000
heap
page read and write
448F000
heap
page read and write
2530FF000
stack
page read and write
48D9000
heap
page read and write
12DA35F0000
heap
page read and write
12DA4652000
heap
page read and write
4992000
heap
page read and write
249E3459000
heap
page read and write
43F0000
heap
page read and write
49EC000
heap
page read and write
10E93000
heap
page read and write
25CC000
heap
page read and write
497B000
heap
page read and write
1AABF5CC000
heap
page read and write
1AABF5C8000
heap
page read and write
4670000
heap
page read and write
45E0000
heap
page read and write
249E3AA0000
trusted library allocation
page read and write
45D5000
heap
page read and write
255F000
heap
page read and write
4844000
heap
page read and write
25D3000
heap
page read and write
44F6000
heap
page read and write
42EE000
stack
page read and write
12DA3F93000
heap
page read and write
499F000
heap
page read and write
49DD000
heap
page read and write
2CBFCFD000
stack
page read and write
4EB2BFD000
stack
page read and write
1D304BC0000
heap
page read and write
4956000
heap
page read and write
46D5000
heap
page read and write
4AAD000
heap
page read and write
401000
unkown
page execute read
10E99000
heap
page read and write
10EA0000
heap
page read and write
1AABF7C3000
heap
page read and write
2542000
heap
page read and write
12DA3F72000
heap
page read and write
437D000
heap
page read and write
11472000
heap
page read and write
12DA363F000
heap
page read and write
448B000
heap
page read and write
1AABE83E000
heap
page read and write
16337298000
heap
page read and write
47E0000
heap
page read and write
481E000
heap
page read and write
12DA3F2A000
heap
page read and write
48F7000
heap
page read and write
480C000
heap
page read and write
249E342B000
heap
page read and write
47FE000
heap
page read and write
1AABE8A0000
heap
page read and write
2554000
heap
page read and write
43B4000
heap
page read and write
72D73FE000
stack
page read and write
12DA3F52000
heap
page read and write
4A36000
heap
page read and write
61ED4000
direct allocation
page readonly
4496000
heap
page read and write
4B07000
heap
page read and write
5ABE000
stack
page read and write
484E000
heap
page read and write
1AABE83B000
heap
page read and write
47D9000
heap
page read and write
12DA3F30000
heap
page read and write
72D6F8E000
stack
page read and write
1AABE88A000
heap
page read and write
12DA3F52000
heap
page read and write
2531FB000
stack
page read and write
1AABE853000
heap
page read and write
438C000
heap
page read and write
47A9000
heap
page read and write
4230000
heap
page read and write
16337170000
heap
page read and write
586307E000
stack
page read and write
4534000
heap
page read and write
1103E000
heap
page read and write
4B46000
heap
page read and write
4B58000
heap
page read and write
1AABF274000
heap
page read and write
1AABE809000
heap
page read and write
1AABF5C7000
heap
page read and write
4567000
heap
page read and write
489B000
heap
page read and write
48C4000
heap
page read and write
1AABE8A0000
heap
page read and write
2593000
heap
page read and write
10EA0000
heap
page read and write
4480000
heap
page read and write
494C000
heap
page read and write
12DA3F59000
heap
page read and write
49CC000
heap
page read and write
4B29000
heap
page read and write
2572000
heap
page read and write
4333000
heap
page read and write
44A5000
heap
page read and write
43CE000
heap
page read and write
44A1000
heap
page read and write
44E7000
heap
page read and write
4974000
heap
page read and write
1633727D000
heap
page read and write
4864000
heap
page read and write
4877000
heap
page read and write
249E3469000
heap
page read and write
49A3000
heap
page read and write
43BC000
heap
page read and write
49DA000
heap
page read and write
4998000
heap
page read and write
4B1A000
heap
page read and write
1AABF47E000
heap
page read and write
1AABF277000
heap
page read and write
1AABF25B000
heap
page read and write
43D6000
heap
page read and write
249E3463000
heap
page read and write
46CA000
heap
page read and write
4564000
heap
page read and write
249E34AA000
heap
page read and write
4B0B000
heap
page read and write
252D7E000
stack
page read and write
1D304C26000
heap
page read and write
4B22000
heap
page read and write
447D000
heap
page read and write
4AB4000
heap
page read and write
27EF000
stack
page read and write
4897000
heap
page read and write
249E346C000
heap
page read and write
47EB000
heap
page read and write
482A000
heap
page read and write
45E8000
heap
page read and write
249E3413000
heap
page read and write
4A96000
heap
page read and write
10A11000
heap
page read and write
433B000
heap
page read and write
4504000
heap
page read and write
4368000
heap
page read and write
4BA9000
heap
page read and write
4773000
heap
page read and write
5BF0000
remote allocation
page read and write
451A000
heap
page read and write
10E99000
heap
page read and write
471E000
heap
page read and write
1AABF279000
heap
page read and write
1AABF28B000
heap
page read and write
2579000
heap
page read and write
44A9000
heap
page read and write
4722000
heap
page read and write
408F000
stack
page read and write
163372B8000
heap
page read and write
12DA3550000
heap
page read and write
1AABF273000
heap
page read and write
1AABE825000
heap
page read and write
4932000
heap
page read and write
4734000
heap
page read and write
12DA3F55000
heap
page read and write
1AABE7DA000
heap
page read and write
10FDC000
stack
page read and write
16337070000
heap
page read and write
49C1000
heap
page read and write
45D9000
heap
page read and write
12DA3F56000
heap
page read and write
45CA000
heap
page read and write
459A000
heap
page read and write
43CB000
heap
page read and write
4522000
heap
page read and write
4549000
heap
page read and write
10000
heap
page read and write
4346000
heap
page read and write
12DA3F0E000
heap
page read and write
45AD000
heap
page read and write
249E345B000
heap
page read and write
1AABF29D000
heap
page read and write
12DA4600000
heap
page read and write
44B4000
heap
page read and write
2CBFBFF000
stack
page read and write
479A000
heap
page read and write
4372000
heap
page read and write
4B13000
heap
page read and write
4AA9000
heap
page read and write
4B2D000
heap
page read and write
1AABE825000
heap
page read and write
44E000
unkown
page write copy
1AABF282000
heap
page read and write
40F0000
heap
page read and write
10EBA000
heap
page read and write
1AABF472000
heap
page read and write
490E000
heap
page read and write
4AC2000
heap
page read and write
1D304C6E000
heap
page read and write
5F50000
unclassified section
page read and write
4EB297E000
stack
page read and write
12DA3D50000
trusted library allocation
page read and write
47AD000
heap
page read and write
12DA3713000
heap
page read and write
48CC000
heap
page read and write
4B76000
heap
page read and write
12DA3680000
heap
page read and write
46DC000
heap
page read and write
4A83000
heap
page read and write
12DA3F2A000
heap
page read and write
10EBA000
heap
page read and write
49E5000
heap
page read and write
4696000
heap
page read and write
5BF0000
remote allocation
page read and write
57BF000
stack
page read and write
1AABF290000
heap
page read and write
10FA0000
trusted library allocation
page read and write
4AE0000
heap
page read and write
1AABE7C4000
heap
page read and write
439B000
heap
page read and write
4B73000
heap
page read and write
2546000
heap
page read and write
44FA000
heap
page read and write
11020000
trusted library allocation
page read and write
4B6B000
heap
page read and write
61E01000
direct allocation
page execute read
458B000
heap
page read and write
1AABF477000
heap
page read and write
10EA0000
heap
page read and write
25C0000
heap
page read and write
25AE000
heap
page read and write
1103A000
heap
page read and write
1AABF28B000
heap
page read and write
2549000
heap
page read and write
10E99000
heap
page read and write
12DA3F6B000
heap
page read and write
25CF000
heap
page read and write
450B000
heap
page read and write
10EBB000
heap
page read and write
4ACD000
heap
page read and write
479E000
heap
page read and write
453C000
heap
page read and write
4716000
heap
page read and write
1AABF5C0000
heap
page read and write
1AABF5D8000
heap
page read and write
47F3000
heap
page read and write
163372B4000
heap
page read and write
1AABF290000
heap
page read and write
47C0000
heap
page read and write
44AD000
heap
page read and write
499B000
heap
page read and write
2580000
heap
page read and write
4A2B000
heap
page read and write
11270000
heap
page read and write
49B2000
heap
page read and write
4AFE000
heap
page read and write
12DA3E02000
heap
page read and write
48FF000
heap
page read and write
16337248000
heap
page read and write
4A1C000
heap
page read and write
4BCA000
heap
page read and write
468B000
heap
page read and write
1AABF25B000
heap
page read and write
1AABE864000
heap
page read and write
4939000
heap
page read and write
10EA0000
heap
page read and write
4A12000
heap
page read and write
61ECD000
direct allocation
page readonly
4A5F000
heap
page read and write
249E3443000
heap
page read and write
12DA460F000
heap
page read and write
12DA3F2C000
heap
page read and write
477A000
heap
page read and write
451E000
heap
page read and write
43DD000
heap
page read and write
4631000
heap
page read and write
4961000
heap
page read and write
10E99000
heap
page read and write
4ABC000
heap
page read and write
4B4D000
heap
page read and write
10F90000
heap
page read and write
456B000
heap
page read and write
5862DBE000
stack
page read and write
43A6000
heap
page read and write
4B64000
heap
page read and write
10B10000
heap
page read and write
10E91000
heap
page read and write
1AABF27D000
heap
page read and write
457E000
heap
page read and write
473C000
heap
page read and write
4A8F000
heap
page read and write
249E3451000
heap
page read and write
12DA3F13000
heap
page read and write
249E3484000
heap
page read and write
12DA3702000
heap
page read and write
4738000
heap
page read and write
48C8000
heap
page read and write
243D000
unkown
page readonly
16337B03000
heap
page read and write
61ED3000
direct allocation
page read and write
249E3460000
heap
page read and write
249E3434000
heap
page read and write
4EB217B000
stack
page read and write
1AABF6C0000
heap
page read and write
72D72FF000
stack
page read and write
12DA3F66000
heap
page read and write
1D304C40000
heap
page read and write
1AABF285000
heap
page read and write
12DA362B000
heap
page read and write
4622000
heap
page read and write
486C000
heap
page read and write
2520000
heap
page read and write
1D304C8B000
heap
page read and write
1D304B90000
heap
page read and write
1AABF277000
heap
page read and write
4AD4000
heap
page read and write
4AFA000
heap
page read and write
44B8000
heap
page read and write
4793000
heap
page read and write
1AABF250000
heap
page read and write
47EF000
heap
page read and write
12DA36EC000
heap
page read and write
4A87000
heap
page read and write
12DA3F2D000
heap
page read and write
16337298000
heap
page read and write
1103A000
heap
page read and write
1AABE8A0000
heap
page read and write
1258C000
heap
page read and write
25E1000
heap
page read and write
108F7000
heap
page read and write
1D306680000
trusted library allocation
page read and write
1AABF28D000
heap
page read and write
477E000
heap
page read and write
12DA36A6000
heap
page read and write
1AABE88A000
heap
page read and write
49E1000
heap
page read and write
46FA000
heap
page read and write
4B6F000
heap
page read and write
493D000
heap
page read and write
163372DA000
heap
page read and write
252FFB000
stack
page read and write
10E90000
heap
page read and write
12DA3F00000
heap
page read and write
4487000
heap
page read and write
2584000
heap
page read and write
1AABE843000
heap
page read and write
4385000
heap
page read and write
4483000
heap
page read and write
46B000
unkown
page execute and read and write
12DA3F56000
heap
page read and write
1AABE7C0000
heap
page read and write
163372B1000
heap
page read and write
4AC5000
heap
page read and write
4839000
heap
page read and write
10E91000
heap
page read and write
19D000
stack
page read and write
4327000
heap
page read and write
12DA3DF0000
remote allocation
page read and write
1AABF283000
heap
page read and write
12DA3F8F000
heap
page read and write
4640000
heap
page read and write
4959000
heap
page read and write
25F8000
heap
page read and write
478B000
heap
page read and write
16337237000
heap
page read and write
476B000
heap
page read and write
1D304C56000
heap
page read and write
47A6000
heap
page read and write
1AABF47A000
heap
page read and write
12DA3F67000
heap
page read and write
11376000
heap
page read and write
41DE000
stack
page read and write
46CD000
heap
page read and write
4776000
heap
page read and write
4813000
heap
page read and write
12DA3F63000
heap
page read and write
4558000
heap
page read and write
16337010000
heap
page read and write
434A000
heap
page read and write
495D000
heap
page read and write
4379000
heap
page read and write
44D4000
heap
page read and write
48F0000
heap
page read and write
4906000
heap
page read and write
12DA3E00000
heap
page read and write
1AABE8A0000
heap
page read and write
1AABF277000
heap
page read and write
4746000
heap
page read and write
1D304C13000
heap
page read and write
1AABF258000
heap
page read and write
4AB8000
heap
page read and write
249E345F000
heap
page read and write
4A2E000
heap
page read and write
48D5000
heap
page read and write
4635000
heap
page read and write
4B1E000
heap
page read and write
1AABF293000
heap
page read and write
16337298000
heap
page read and write
449A000
heap
page read and write
470F000
heap
page read and write
4AD1000
heap
page read and write
4EB21FF000
stack
page read and write
10E96000
heap
page read and write
1AABE8B2000
heap
page read and write
10EB0000
heap
page read and write
47D5000
heap
page read and write
481B000
heap
page read and write
1AABF280000
heap
page read and write
43DA000
heap
page read and write
252E000
heap
page read and write
256A000
heap
page read and write
252DFE000
stack
page read and write
4764000
heap
page read and write
480F000
heap
page read and write
497F000
heap
page read and write
4A07000
heap
page read and write
12DA3F3B000
heap
page read and write
2CBFB7C000
stack
page read and write
163371A0000
trusted library allocation
page read and write
45F3000
heap
page read and write
46A1000
heap
page read and write
11066000
heap
page read and write
4B0F000
heap
page read and write
1AABE853000
heap
page read and write
458F000
heap
page read and write
4492000
heap
page read and write
4B60000
heap
page read and write
4A80000
heap
page read and write
45B8000
heap
page read and write
44FE000
heap
page read and write
16337298000
heap
page read and write
4A50000
heap
page read and write
61E00000
direct allocation
page execute and read and write
46B8000
heap
page read and write
59BF000
stack
page read and write
1AABF351000
heap
page read and write
252CF9000
stack
page read and write
4AD8000
heap
page read and write
1AABF283000
heap
page read and write
1AABF280000
heap
page read and write
1D306802000
trusted library allocation
page read and write
1AABF274000
heap
page read and write
4555000
heap
page read and write
12DA3F5D000
heap
page read and write
48B9000
heap
page read and write
1AABE841000
heap
page read and write
1AABE9B5000
heap
page read and write
4713000
heap
page read and write
25C8000
heap
page read and write
4A45000
heap
page read and write
1AABF292000
heap
page read and write
1AABF27D000
heap
page read and write
1AABE8A0000
heap
page read and write
252A000
heap
page read and write
12DA3F5F000
heap
page read and write
12DA365E000
heap
page read and write
1AABF280000
heap
page read and write
436C000
heap
page read and write
1633725E000
heap
page read and write
464E000
heap
page read and write
46E4000
heap
page read and write
1116C000
heap
page read and write
4551000
heap
page read and write
12DA3F55000
heap
page read and write
249E346E000
heap
page read and write
1AABE83F000
heap
page read and write
249E3428000
heap
page read and write
25B1000
heap
page read and write
1AABF280000
heap
page read and write
4923000
heap
page read and write
1AABF7CF000
heap
page read and write
4A54000
heap
page read and write
4848000
heap
page read and write
11889000
heap
page read and write
12DA3F72000
heap
page read and write
4683000
heap
page read and write
10EBB000
heap
page read and write
43E5000
heap
page read and write
1AABF275000
heap
page read and write
16337253000
heap
page read and write
43AA000
heap
page read and write
12DA3684000
heap
page read and write
1D304C83000
heap
page read and write
4A92000
heap
page read and write
16337200000
heap
page read and write
446E000
stack
page read and write
1633727E000
heap
page read and write
450F000
heap
page read and write
1AABF240000
heap
page read and write
163372C2000
heap
page read and write
47C4000
heap
page read and write
2CBFC7F000
stack
page read and write
1AABE7CB000
heap
page read and write
249E348B000
heap
page read and write
4680000
heap
page read and write
11030000
heap
page read and write
4A1F000
heap
page read and write
1AABF271000
heap
page read and write
1AABE88A000
heap
page read and write
2CBF8FF000
stack
page read and write
2517000
heap
page read and write
4090000
direct allocation
page execute and read and write
1AABE88A000
heap
page read and write
43C7000
heap
page read and write
49F8000
heap
page read and write
1AABE8A0000
heap
page read and write
12DA4673000
heap
page read and write
4725000
heap
page read and write
435D000
heap
page read and write
1D304BF0000
trusted library allocation
page read and write
44EB000
heap
page read and write
163372B0000
heap
page read and write
4B51000
heap
page read and write
12DA3F5A000
heap
page read and write
485D000
heap
page read and write
249E3468000
heap
page read and write
4B7E000
heap
page read and write
2CBFA7B000
stack
page read and write
1AABF5CF000
heap
page read and write
10A10000
heap
page read and write
4B93000
heap
page read and write
498A000
heap
page read and write
4576000
heap
page read and write
2567000
heap
page read and write
44D1000
heap
page read and write
2597000
heap
page read and write
5D2F000
stack
page read and write
12DA3681000
heap
page read and write
249E3310000
heap
page read and write
43A3000
heap
page read and write
4388000
heap
page read and write
4B16000
heap
page read and write
4513000
heap
page read and write
45EF000
heap
page read and write
1AABF290000
heap
page read and write
163372B8000
heap
page read and write
4860000
heap
page read and write
47F7000
heap
page read and write
4749000
heap
page read and write
4582000
heap
page read and write
1AABE7C7000
heap
page read and write
2CBFAFE000
stack
page read and write
249E3461000
heap
page read and write
1AABF47E000
heap
page read and write
1AABE8A0000
heap
page read and write
48E1000
heap
page read and write
1D304C2B000
heap
page read and write
4531000
heap
page read and write
46E0000
heap
page read and write
25C4000
heap
page read and write
2606000
heap
page read and write
12DA3F56000
heap
page read and write
16337A02000
heap
page read and write
492E000
heap
page read and write
4327000
heap
page read and write
498E000
heap
page read and write
25B9000
heap
page read and write
44B0000
heap
page read and write
1AABE88A000
heap
page read and write
4A7E000
heap
page read and write
12DA3600000
heap
page read and write
4B5C000
heap
page read and write
49F0000
heap
page read and write
461E000
heap
page read and write
12DA466A000
heap
page read and write
12DA36B1000
heap
page read and write
4AF2000
heap
page read and write
11271000
heap
page read and write
4729000
heap
page read and write
249E345D000
heap
page read and write
470B000
heap
page read and write
49C8000
heap
page read and write
12DA3F55000
heap
page read and write
12DA3F52000
heap
page read and write
4397000
heap
page read and write
4AA5000
heap
page read and write
43EC000
heap
page read and write
45B5000
heap
page read and write
12DA3F10000
heap
page read and write
16337B02000
heap
page read and write
249E3455000
heap
page read and write
58633FF000
stack
page read and write
47B1000
heap
page read and write
4A23000
heap
page read and write
1AABF293000
heap
page read and write
47CA000
heap
page read and write
459E000
heap
page read and write
1AABF2B1000
heap
page read and write
72D6E8C000
stack
page read and write
4B25000
heap
page read and write
258C000
heap
page read and write
44BC000
heap
page read and write
4A58000
heap
page read and write
1AABF29A000
heap
page read and write
44D8000
heap
page read and write
4381000
heap
page read and write
4B8F000
heap
page read and write
12DA3F74000
heap
page read and write
49D4000
heap
page read and write
4560000
heap
page read and write
46E8000
heap
page read and write
4A3A000
heap
page read and write
4692000
heap
page read and write
16337285000
heap
page read and write
4AB0000
heap
page read and write
4B31000
heap
page read and write
1AABF5D1000
heap
page read and write
4AC9000
heap
page read and write
256E000
heap
page read and write
4AE7000
heap
page read and write
10EA0000
heap
page read and write
46AD000
heap
page read and write
2563000
heap
page read and write
47DC000
heap
page read and write
10E95000
heap
page read and write
16337B0A000
heap
page read and write
10EA0000
heap
page read and write
4B04000
heap
page read and write
249E3502000
heap
page read and write
12DA3F79000
heap
page read and write
178000
stack
page read and write
249E32A0000
heap
page read and write
1AABF280000
heap
page read and write
2588000
heap
page read and write
4360000
heap
page read and write
1AABE853000
heap
page read and write
249E3422000
heap
page read and write
12DA3F5B000
heap
page read and write
46C6000
heap
page read and write
4639000
heap
page read and write
12DA4646000
heap
page read and write
24F0000
heap
page read and write
12DA4613000
heap
page read and write
4797000
heap
page read and write
48F3000
heap
page read and write
4935000
heap
page read and write
4EB2AFE000
stack
page read and write
1AABF287000
heap
page read and write
46F7000
heap
page read and write
48B1000
heap
page read and write
433F000
heap
page read and write
2CBF877000
stack
page read and write
421E000
stack
page read and write
1AABF290000
heap
page read and write
4A9A000
heap
page read and write
4941000
heap
page read and write
4A27000
heap
page read and write
4A0A000
heap
page read and write
4588000
heap
page read and write
457A000
heap
page read and write
43E1000
heap
page read and write
4C90000
heap
page read and write
460C000
heap
page read and write
249E3457000
heap
page read and write
10EAD000
heap
page read and write
A98C000
heap
page read and write
5C2E000
stack
page read and write
4902000
heap
page read and write
4926000
heap
page read and write
1104C000
heap
page read and write
12DA3F29000
heap
page read and write
489F000
heap
page read and write
1AABE8B2000
heap
page read and write
58BF000
stack
page read and write
16337285000
heap
page read and write
4617000
heap
page read and write
4BA6000
heap
page read and write
1AABE88A000
heap
page read and write
249E3492000
heap
page read and write
61EB7000
direct allocation
page readonly
1AABF277000
heap
page read and write
4760000
heap
page read and write
49A7000
heap
page read and write
45EB000
heap
page read and write
1D304D17000
heap
page read and write
12DA3DD0000
remote allocation
page read and write
There are 1096 hidden memdumps, click here to show them.