IOC Report
wqmnYoVbHr.exe

loading gif

Files

File Path
Type
Category
Malicious
wqmnYoVbHr.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\amadka[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000022001\cb41bc9329.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\AFHDAKJKFC.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AAAAAAAAAAAAAAAAAAAAAAAAAA
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\AAFBAKEC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\CBGCAFIIECBFIDHIJKFBAKEGDG
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\CFIIIJJKJKFHIDGDBAKJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FBKJKEHIJECGCBFIJEGI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GHJKECAAAFHJECAAAEBF
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\ProgramData\HJECAAKKFHCFIECAAAKEGCFIEH
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IDHIDBAE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\explortu.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 20 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\wqmnYoVbHr.exe
"C:\Users\user\Desktop\wqmnYoVbHr.exe"
malicious
C:\Users\user\AppData\Local\Temp\AFHDAKJKFC.exe
"C:\Users\user\AppData\Local\Temp\AFHDAKJKFC.exe"
malicious
C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe
"C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe"
malicious
C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe
C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe
malicious
C:\Users\user\AppData\Local\Temp\1000022001\cb41bc9329.exe
"C:\Users\user\AppData\Local\Temp\1000022001\cb41bc9329.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\AFHDAKJKFC.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\EHCBAAAFHJ.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://77.91.77.81/mine/amadka.exe
77.91.77.81
malicious
http://77.91.77.81/cost/go.exe
unknown
malicious
http://85.28.47.4/X
unknown
malicious
http://85.28.47.4/
unknown
malicious
http://147.45.47.155/ku4Nor9/index.php
147.45.47.155
malicious
http://85.28.47.4/69934896f997d5bb/softokn3.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/mozglue.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/nss3.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/vcruntime140.dll
85.28.47.4
malicious
http://77.91.77.81/mine/amadka.exe00
unknown
malicious
http://85.28.47.4/69934896f997d5bb/freebl3.dll
85.28.47.4
malicious
http://85.28.47.4/920475a59bac849d.php
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/sqlite3.dll
85.28.47.4
malicious
http://77.91.77.81/cost/go.exe00
unknown
malicious
http://77.91.77.81/mine/amadka.exepera
unknown
malicious
http://85.28.47.4/69934896f997d5bb/msvcp140.dll
85.28.47.4
malicious
http://85.28.47.4
unknown
malicious
http://77.91.77.81/cost/go.exeAppData
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
http://85.28.47.4/69934896f997d5bb/vcruntime140.dllk
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsusersIncIEEERootCA.cr
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
http://85.28.47.4/69934896f997d5bb/nss3.dll5
unknown
http://85.28.47.4/t
unknown
http://85.28.47.4/69934896f997d5bb/freebl3.dllW
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://85.28.47.4/920475a59bac849d.php8L
unknown
http://85.28.47.4/69934896f997d5bb/freebl3.dllM
unknown
http://85.28.47.4/920475a59bac849d.phpD
unknown
http://www.sqlite.org/copyright.html.
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
http://85.28.47.4/920475a59bac849d.phpU
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://pki-ocsp.symauth.com0
unknown
http://85.28.47.4/920475a59bac849d.phpr
unknown
http://85.28.47.4/69934896f997d5bb/softokn3.dllk
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://85.28.47.4/69934896f997d5bb/vcruntime140.dllS
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
There are 45 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
147.45.47.155
unknown
Russian Federation
malicious
77.91.77.81
unknown
Russian Federation
malicious
85.28.47.4
unknown
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5C1000
unkown
page execute and read and write
malicious
721000
unkown
page execute and read and write
malicious
1BB4000
heap
page read and write
malicious
16CE000
heap
page read and write
malicious
4C30000
direct allocation
page read and write
malicious
581000
unkown
page execute and read and write
malicious
451000
unkown
page execute and read and write
malicious
51A0000
direct allocation
page read and write
malicious
48C0000
direct allocation
page read and write
malicious
3BA3000
direct allocation
page execute and read and write
3F0000
heap
page read and write
E1E000
heap
page read and write
450000
unkown
page readonly
2EE6E000
stack
page read and write
61ECC000
direct allocation
page read and write
4DF0000
direct allocation
page execute and read and write
C04000
heap
page read and write
22C31000
heap
page read and write
22C3F000
heap
page read and write
2DFE000
stack
page read and write
4441000
heap
page read and write
2D4F000
stack
page read and write
7EB80000
direct allocation
page execute and read and write
476F000
stack
page read and write
4D01000
heap
page read and write
1B70000
direct allocation
page execute and read and write
4D01000
heap
page read and write
780000
unkown
page execute and read and write
4D01000
heap
page read and write
3ECD000
stack
page read and write
22C36000
heap
page read and write
C04000
heap
page read and write
D90000
heap
page read and write
76E000
unkown
page execute and write copy
E43000
heap
page read and write
744000
unkown
page execute and write copy
3940000
heap
page read and write
4D01000
heap
page read and write
6CB3E000
unkown
page read and write
29C0000
heap
page read and write
3E2E000
stack
page read and write
3B4E000
stack
page read and write
414F000
stack
page read and write
C04000
heap
page read and write
14D4000
heap
page read and write
581000
unkown
page execute and write copy
580000
unkown
page readonly
8DF000
unkown
page execute and write copy
4D01000
heap
page read and write
14D4000
heap
page read and write
4D01000
heap
page read and write
6C961000
unkown
page execute read
3BB4000
direct allocation
page execute and read and write
14D4000
heap
page read and write
16C0000
heap
page read and write
388F000
stack
page read and write
4D01000
heap
page read and write
22C39000
heap
page read and write
4D01000
heap
page read and write
11BC000
heap
page read and write
22C3F000
heap
page read and write
36AE000
direct allocation
page execute and read and write
1CCB3000
heap
page read and write
1C0FF000
stack
page read and write
C04000
heap
page read and write
E25000
heap
page read and write
4E10000
direct allocation
page execute and read and write
4441000
heap
page read and write
34CF000
stack
page read and write
4D01000
heap
page read and write
22C56000
heap
page read and write
22C26000
heap
page read and write
BE0000
direct allocation
page read and write
22C40000
heap
page read and write
360F000
stack
page read and write
4441000
heap
page read and write
22C40000
heap
page read and write
C04000
heap
page read and write
C04000
heap
page read and write
4B9000
unkown
page execute and read and write
5E56000
heap
page read and write
DC0000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
29FF000
stack
page read and write
2EF11000
heap
page read and write
627000
unkown
page write copy
22C3C000
heap
page read and write
22C56000
heap
page read and write
4D01000
heap
page read and write
22C25000
heap
page read and write
468E000
stack
page read and write
2EF03000
heap
page read and write
5330000
direct allocation
page execute and read and write
8CF000
unkown
page execute and read and write
33FF000
stack
page read and write
D60000
heap
page read and write
4D01000
heap
page read and write
66DC000
stack
page read and write
300E000
stack
page read and write
3ECE000
stack
page read and write
64CB000
stack
page read and write
D0F000
stack
page read and write
22C5F000
heap
page read and write
4D01000
heap
page read and write
5E55000
heap
page read and write
22C3C000
heap
page read and write
22C56000
heap
page read and write
5330000
direct allocation
page execute and read and write
36A4000
direct allocation
page execute and read and write
2EF0B000
heap
page read and write
4D01000
heap
page read and write
47A1000
heap
page read and write
2E8F000
stack
page read and write
7B7000
unkown
page execute and read and write
5310000
direct allocation
page execute and read and write
5320000
direct allocation
page execute and read and write
22C5F000
heap
page read and write
BE0000
direct allocation
page read and write
22C51000
heap
page read and write
BE0000
direct allocation
page read and write
660D000
stack
page read and write
E2C000
heap
page read and write
465000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
32FE000
stack
page read and write
4451000
heap
page read and write
4441000
heap
page read and write
4790000
direct allocation
page read and write
61EB7000
direct allocation
page readonly
364E000
stack
page read and write
4441000
heap
page read and write
418E000
stack
page read and write
2A3E000
stack
page read and write
4E20000
direct allocation
page execute and read and write
22C4C000
heap
page read and write
EC4000
heap
page read and write
2EE70000
trusted library allocation
page read and write
14D4000
heap
page read and write
1B9E000
heap
page read and write
400F000
stack
page read and write
1CCB0000
trusted library allocation
page read and write
4441000
heap
page read and write
22C40000
heap
page read and write
8DE000
unkown
page execute and write copy
4D01000
heap
page read and write
E2A000
heap
page read and write
6C8C0000
unkown
page readonly
3560000
direct allocation
page execute and read and write
5C0000
unkown
page read and write
4D01000
heap
page read and write
C04000
heap
page read and write
4441000
heap
page read and write
5E50000
heap
page read and write
19C0000
heap
page read and write
2EC6E000
stack
page read and write
E2C000
heap
page read and write
36A4000
direct allocation
page execute and read and write
353F000
stack
page read and write
4D01000
heap
page read and write
4440000
heap
page read and write
10E7000
unkown
page execute and write copy
4441000
heap
page read and write
15F8000
stack
page read and write
2ACF000
stack
page read and write
4A10000
heap
page read and write
C04000
heap
page read and write
2B3F000
stack
page read and write
E44000
unkown
page execute and read and write
1CBB0000
heap
page read and write
22C51000
heap
page read and write
957000
unkown
page execute and read and write
C04000
heap
page read and write
4441000
heap
page read and write
6C960000
unkown
page readonly
3DDE000
stack
page read and write
4D01000
heap
page read and write
5A0000
heap
page read and write
36BE000
stack
page read and write
14D4000
heap
page read and write
31BE000
stack
page read and write
4E00000
direct allocation
page read and write
4441000
heap
page read and write
343E000
stack
page read and write
394E000
stack
page read and write
6CB3F000
unkown
page write copy
61ED0000
direct allocation
page read and write
3A7E000
stack
page read and write
14D4000
heap
page read and write
14D4000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
76E000
unkown
page execute and read and write
4D01000
heap
page read and write
4441000
heap
page read and write
4441000
heap
page read and write
38FF000
stack
page read and write
BE0000
direct allocation
page read and write
29C7000
heap
page read and write
4D01000
heap
page read and write
EC4000
heap
page read and write
491F000
direct allocation
page read and write
4441000
heap
page read and write
C04000
heap
page read and write
758000
unkown
page execute and read and write
3F0E000
stack
page read and write
174F000
heap
page read and write
4E50000
direct allocation
page execute and read and write
4441000
heap
page read and write
22C3D000
heap
page read and write
14D4000
heap
page read and write
4441000
heap
page read and write
22C51000
heap
page read and write
B35000
unkown
page execute and read and write
4D01000
heap
page read and write
4441000
heap
page read and write
4C30000
direct allocation
page read and write
DA7000
heap
page read and write
D50000
direct allocation
page read and write
14D4000
heap
page read and write
4D01000
heap
page read and write
1CBB1000
heap
page read and write
1709000
heap
page read and write
5A4000
unkown
page execute and write copy
5C1000
unkown
page execute and write copy
3B0F000
stack
page read and write
BE0000
direct allocation
page read and write
42CE000
stack
page read and write
38B0000
heap
page read and write
4D01000
heap
page read and write
6251000
heap
page read and write
C04000
heap
page read and write
64B000
unkown
page execute and read and write
B9E000
stack
page read and write
1B90000
heap
page read and write
4E00000
direct allocation
page execute and read and write
1C2FF000
stack
page read and write
3DCE000
stack
page read and write
4D01000
heap
page read and write
4441000
heap
page read and write
4D01000
heap
page read and write
22C33000
heap
page read and write
191E000
stack
page read and write
4E00000
direct allocation
page read and write
BE0000
direct allocation
page read and write
C04000
heap
page read and write
4D01000
heap
page read and write
3BB0000
direct allocation
page execute and read and write
3F1E000
stack
page read and write
14D4000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
4441000
heap
page read and write
4C30000
direct allocation
page read and write
4441000
heap
page read and write
4E00000
direct allocation
page read and write
3D8F000
stack
page read and write
38EE000
stack
page read and write
398E000
stack
page read and write
C04000
heap
page read and write
324F000
stack
page read and write
629000
unkown
page execute and read and write
4A40000
direct allocation
page execute and read and write
6C94E000
unkown
page read and write
4D01000
heap
page read and write
51A0000
direct allocation
page read and write
17FC000
stack
page read and write
3CBF000
stack
page read and write
4D01000
heap
page read and write
4441000
heap
page read and write
DC2000
heap
page read and write
22C3F000
heap
page read and write
4E00000
direct allocation
page read and write
E31000
heap
page read and write
E22000
heap
page read and write
1790000
heap
page read and write
4441000
heap
page read and write
4E40000
direct allocation
page execute and read and write
4D01000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
4D01000
heap
page read and write
580000
unkown
page readonly
10E4000
unkown
page execute and write copy
38B3000
heap
page read and write
EC4000
heap
page read and write
BE0000
direct allocation
page read and write
90F000
unkown
page execute and write copy
57E000
stack
page read and write
BE0000
direct allocation
page read and write
39B000
stack
page read and write
2DBF000
stack
page read and write
4A40000
direct allocation
page execute and read and write
1610000
heap
page read and write
4D01000
heap
page read and write
EC4000
heap
page read and write
4D01000
heap
page read and write
5300000
direct allocation
page execute and read and write
4A50000
direct allocation
page execute and read and write
4441000
heap
page read and write
E37000
heap
page read and write
407F000
stack
page read and write
22C59000
heap
page read and write
4CCB000
stack
page read and write
22C3F000
heap
page read and write
1C8FD000
stack
page read and write
338F000
stack
page read and write
4D7F000
stack
page read and write
EB0000
heap
page read and write
4D01000
heap
page read and write
73C000
unkown
page execute and write copy
4441000
heap
page read and write
C04000
heap
page read and write
EC4000
heap
page read and write
3460000
direct allocation
page execute and read and write
6CA000
unkown
page execute and read and write
1836000
heap
page read and write
4441000
heap
page read and write
4D01000
heap
page read and write
5F9E000
stack
page read and write
E43000
heap
page read and write
627000
unkown
page read and write
61ED3000
direct allocation
page read and write
61ED4000
direct allocation
page readonly
13F0000
heap
page read and write
14D4000
heap
page read and write
3B7F000
stack
page read and write
4441000
heap
page read and write
4441000
heap
page read and write
4FA000
stack
page read and write
A7E000
unkown
page execute and read and write
5330000
direct allocation
page execute and read and write
C04000
heap
page read and write
35B5C000
stack
page read and write
6CAFF000
unkown
page readonly
1CBB1000
heap
page read and write
35F9D000
stack
page read and write
41BF000
stack
page read and write
47A0000
heap
page read and write
19D0000
heap
page read and write
22C44000
heap
page read and write
EC4000
heap
page read and write
C04000
heap
page read and write
4441000
heap
page read and write
14D4000
heap
page read and write
186A000
heap
page read and write
C04000
heap
page read and write
EC0000
heap
page read and write
4D01000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
4790000
direct allocation
page read and write
467000
heap
page read and write
720000
unkown
page readonly
4441000
heap
page read and write
957000
unkown
page execute and write copy
14D4000
heap
page read and write
E2D000
heap
page read and write
4790000
direct allocation
page read and write
5B7000
heap
page read and write
3A70000
direct allocation
page execute and read and write
4441000
heap
page read and write
721000
unkown
page execute and write copy
139B000
stack
page read and write
4441000
heap
page read and write
78C000
unkown
page execute and read and write
D3A000
heap
page read and write
4441000
heap
page read and write
6C93D000
unkown
page readonly
4441000
heap
page read and write
4441000
heap
page read and write
29BE000
stack
page read and write
C04000
heap
page read and write
4441000
heap
page read and write
4D01000
heap
page read and write
14D4000
heap
page read and write
4E00000
direct allocation
page read and write
196E000
stack
page read and write
1C93D000
stack
page read and write
4A40000
direct allocation
page execute and read and write
307E000
stack
page read and write
39F0000
heap
page read and write
22C40000
heap
page read and write
C04000
heap
page read and write
2C0F000
stack
page read and write
47A1000
heap
page read and write
4E00000
direct allocation
page read and write
287E000
stack
page read and write
22C20000
heap
page read and write
4A90000
direct allocation
page execute and read and write
4A60000
direct allocation
page execute and read and write
443F000
stack
page read and write
51FF000
direct allocation
page read and write
81E7000
heap
page read and write
388E000
stack
page read and write
C04000
heap
page read and write
7BC000
unkown
page execute and read and write
22C58000
heap
page read and write
39CE000
stack
page read and write
357E000
stack
page read and write
4E30000
direct allocation
page execute and read and write
90D000
unkown
page execute and write copy
1783000
heap
page read and write
CA4000
unkown
page execute and read and write
4441000
heap
page read and write
1C04000
heap
page read and write
E2C000
heap
page read and write
4D01000
heap
page read and write
1CDFD000
stack
page read and write
4D01000
heap
page read and write
EC4000
heap
page read and write
454E000
stack
page read and write
37FE000
stack
page read and write
4D01000
heap
page read and write
22C4C000
heap
page read and write
EC4000
heap
page read and write
4441000
heap
page read and write
4A10000
direct allocation
page execute and read and write
4D01000
heap
page read and write
EC4000
heap
page read and write
2CBE000
stack
page read and write
4441000
heap
page read and write
1CBA0000
heap
page read and write
1C7FF000
stack
page read and write
E31000
heap
page read and write
22C5E000
heap
page read and write
4441000
heap
page read and write
1720000
heap
page read and write
95C000
unkown
page execute and read and write
14D4000
heap
page read and write
4BC0000
heap
page read and write
22C3F000
heap
page read and write
3660000
direct allocation
page execute and read and write
7B7000
unkown
page execute and write copy
4D01000
heap
page read and write
4790000
direct allocation
page read and write
39E0000
heap
page read and write
7BB000
unkown
page execute and read and write
4441000
heap
page read and write
4441000
heap
page read and write
4441000
heap
page read and write
4D01000
heap
page read and write
40BE000
stack
page read and write
F44000
unkown
page execute and write copy
22C3F000
heap
page read and write
19D5000
heap
page read and write
4441000
heap
page read and write
4441000
heap
page read and write
4D01000
heap
page read and write
75F000
unkown
page execute and read and write
4441000
heap
page read and write
4C7E000
stack
page read and write
4D01000
heap
page read and write
14D4000
heap
page read and write
460000
heap
page read and write
4441000
heap
page read and write
2B0E000
stack
page read and write
E37000
heap
page read and write
C04000
heap
page read and write
4790000
direct allocation
page read and write
4D01000
heap
page read and write
90E000
unkown
page execute and read and write
61ECD000
direct allocation
page readonly
4D01000
heap
page read and write
C04000
heap
page read and write
3E8D000
stack
page read and write
428F000
stack
page read and write
4441000
heap
page read and write
4D01000
heap
page read and write
4D01000
heap
page read and write
4441000
heap
page read and write
1C5FF000
stack
page read and write
22C3F000
heap
page read and write
22C51000
heap
page read and write
620000
unkown
page execute and read and write
4441000
heap
page read and write
4B28000
stack
page read and write
4A30000
direct allocation
page execute and read and write
303F000
stack
page read and write
2D8E000
stack
page read and write
C04000
heap
page read and write
5E2E000
stack
page read and write
16A0000
heap
page read and write
4790000
direct allocation
page read and write
15F3000
stack
page read and write
E25000
heap
page read and write
4D01000
heap
page read and write
4441000
heap
page read and write
14D4000
heap
page read and write
36A4000
direct allocation
page execute and read and write
4441000
heap
page read and write
22C3D000
heap
page read and write
6260000
heap
page read and write
5330000
direct allocation
page execute and read and write
3693000
direct allocation
page execute and read and write
18D0000
heap
page read and write
4D01000
heap
page read and write
22C5C000
heap
page read and write
378E000
stack
page read and write
6C8C1000
unkown
page execute read
4DC0000
direct allocation
page execute and read and write
314E000
stack
page read and write
4B7000
unkown
page write copy
22C51000
heap
page read and write
4441000
heap
page read and write
3A3E000
stack
page read and write
36A4000
direct allocation
page execute and read and write
72E000
unkown
page execute and read and write
4441000
heap
page read and write
4441000
heap
page read and write
27FF000
stack
page read and write
7EA90000
direct allocation
page execute and read and write
3B70000
direct allocation
page execute and read and write
317F000
stack
page read and write
3694000
direct allocation
page execute and read and write
1CFFE000
stack
page read and write
4441000
heap
page read and write
22D21000
heap
page read and write
11C0000
heap
page read and write
626000
unkown
page execute and read and write
AA6000
unkown
page execute and read and write
4441000
heap
page read and write
47A1000
heap
page read and write
4D01000
heap
page read and write
4441000
heap
page read and write
36A4000
direct allocation
page execute and read and write
4441000
heap
page read and write
1CBFF000
stack
page read and write
3E3E000
stack
page read and write
4DA0000
direct allocation
page execute and read and write
4D01000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
4D01000
heap
page read and write
2B7E000
stack
page read and write
22CC3000
heap
page read and write
1CBF000
stack
page read and write
E31000
heap
page read and write
4D01000
heap
page read and write
C04000
heap
page read and write
14D4000
heap
page read and write
E2D000
heap
page read and write
22C40000
heap
page read and write
E01000
heap
page read and write
22C5F000
heap
page read and write
76F000
unkown
page execute and write copy
456F000
stack
page read and write
35D9B000
stack
page read and write
4A20000
direct allocation
page execute and read and write
E8E000
stack
page read and write
4441000
heap
page read and write
1ABE000
stack
page read and write
4D01000
heap
page read and write
59C000
unkown
page execute and write copy
4E00000
direct allocation
page read and write
4441000
heap
page read and write
4D01000
heap
page read and write
4E00000
trusted library allocation
page read and write
3A0E000
stack
page read and write
4441000
heap
page read and write
22C3A000
heap
page read and write
4441000
heap
page read and write
4D01000
heap
page read and write
906000
unkown
page execute and read and write
2F3E000
stack
page read and write
4441000
heap
page read and write
8EC000
unkown
page execute and read and write
1887000
heap
page read and write
4441000
heap
page read and write
22C51000
heap
page read and write
4A80000
direct allocation
page execute and read and write
43CF000
stack
page read and write
4D01000
heap
page read and write
F47000
unkown
page execute and write copy
EC4000
heap
page read and write
3BB4000
direct allocation
page execute and read and write
4D01000
heap
page read and write
C04000
heap
page read and write
1851000
heap
page read and write
32BF000
stack
page read and write
E16000
heap
page read and write
5C0000
unkown
page readonly
8C8000
unkown
page execute and read and write
3BB4000
direct allocation
page execute and read and write
E2C000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
22C51000
heap
page read and write
3C4F000
stack
page read and write
F47000
unkown
page execute and read and write
4D01000
heap
page read and write
3BB4000
direct allocation
page execute and read and write
3E30000
heap
page read and write
17F7000
stack
page read and write
400000
heap
page read and write
4D01000
heap
page read and write
41FE000
stack
page read and write
3BA4000
direct allocation
page execute and read and write
C04000
heap
page read and write
4D01000
heap
page read and write
4441000
heap
page read and write
393E000
stack
page read and write
4D01000
heap
page read and write
4D01000
heap
page read and write
4441000
heap
page read and write
4D01000
heap
page read and write
14D4000
heap
page read and write
404E000
stack
page read and write
4E00000
direct allocation
page read and write
38CE000
stack
page read and write
4441000
heap
page read and write
4441000
heap
page read and write
4D01000
heap
page read and write
22C26000
heap
page read and write
4441000
heap
page read and write
4D01000
heap
page read and write
E2E000
heap
page read and write
D50000
direct allocation
page read and write
28FF000
stack
page read and write
D20000
heap
page read and write
1D0000
heap
page read and write
51A0000
direct allocation
page read and write
4441000
heap
page read and write
464F000
stack
page read and write
EC4000
heap
page read and write
4D01000
heap
page read and write
61E00000
direct allocation
page execute and read and write
D30000
heap
page read and write
4441000
heap
page read and write
22C5F000
heap
page read and write
4D01000
heap
page read and write
61E01000
direct allocation
page execute read
4441000
heap
page read and write
3CFE000
stack
page read and write
4790000
direct allocation
page read and write
1B9A000
heap
page read and write
95C000
unkown
page execute and read and write
4441000
heap
page read and write
11B0000
heap
page read and write
451000
unkown
page execute and write copy
C04000
heap
page read and write
DE1000
heap
page read and write
3DFF000
stack
page read and write
4790000
direct allocation
page read and write
4C8F000
direct allocation
page read and write
450000
unkown
page readonly
E43000
heap
page read and write
4441000
heap
page read and write
22C3C000
heap
page read and write
1620000
heap
page read and write
36A4000
direct allocation
page execute and read and write
4D01000
heap
page read and write
7B1000
unkown
page execute and read and write
1C4FE000
stack
page read and write
6CB45000
unkown
page readonly
3D9E000
stack
page read and write
4441000
heap
page read and write
4BC4000
heap
page read and write
3F3F000
stack
page read and write
E2C000
heap
page read and write
AF1000
unkown
page execute and read and write
4D01000
heap
page read and write
C04000
heap
page read and write
4441000
heap
page read and write
D10000
heap
page read and write
4441000
heap
page read and write
A7D000
unkown
page execute and write copy
39CF000
stack
page read and write
406F000
stack
page read and write
4D01000
heap
page read and write
22C37000
heap
page read and write
9AC000
stack
page read and write
4441000
heap
page read and write
35D5C000
stack
page read and write
4B7000
unkown
page read and write
4790000
direct allocation
page read and write
4441000
heap
page read and write
3FA0000
heap
page read and write
6250000
heap
page read and write
BE0000
direct allocation
page read and write
4441000
heap
page read and write
4D01000
heap
page read and write
374F000
stack
page read and write
3BBE000
direct allocation
page execute and read and write
4D01000
heap
page read and write
BE0000
direct allocation
page read and write
DDC000
heap
page read and write
4A40000
direct allocation
page execute and read and write
49FF000
stack
page read and write
61DF000
stack
page read and write
14D4000
heap
page read and write
22C28000
heap
page read and write
D4E000
stack
page read and write
4441000
heap
page read and write
4D01000
heap
page read and write
1C6FF000
stack
page read and write
4441000
heap
page read and write
C00000
heap
page read and write
D6E000
heap
page read and write
11D0000
direct allocation
page execute and read and write
22C40000
heap
page read and write
36A4000
direct allocation
page execute and read and write
38FE000
stack
page read and write
1C0E000
heap
page read and write
14D4000
heap
page read and write
22C51000
heap
page read and write
4441000
heap
page read and write
3A7D000
stack
page read and write
4A40000
direct allocation
page execute and read and write
440E000
stack
page read and write
4441000
heap
page read and write
625E000
heap
page read and write
350E000
stack
page read and write
36AE000
direct allocation
page execute and read and write
E44000
heap
page read and write
CFD000
stack
page read and write
E25000
heap
page read and write
2EF0F000
heap
page read and write
E01000
heap
page read and write
2C7F000
stack
page read and write
451000
unkown
page execute and write copy
4D01000
heap
page read and write
DDB000
heap
page read and write
22C2A000
heap
page read and write
4441000
heap
page read and write
1F8F000
stack
page read and write
E1E000
heap
page read and write
2C4E000
stack
page read and write
C04000
heap
page read and write
450F000
stack
page read and write
4DB0000
direct allocation
page execute and read and write
467000
heap
page read and write
1CBB1000
heap
page read and write
C04000
heap
page read and write
E01000
heap
page read and write
4441000
heap
page read and write
426F000
stack
page read and write
7BC000
unkown
page execute and write copy
4450000
heap
page read and write
183F000
heap
page read and write
95C000
unkown
page execute and write copy
609F000
stack
page read and write
4D01000
heap
page read and write
4D01000
heap
page read and write
1C9FF000
stack
page read and write
4D01000
heap
page read and write
22C39000
heap
page read and write
58D000
stack
page read and write
22C2E000
heap
page read and write
C04000
heap
page read and write
4441000
heap
page read and write
4D01000
heap
page read and write
4AA0000
direct allocation
page execute and read and write
22C4C000
heap
page read and write
3890000
heap
page read and write
4D01000
heap
page read and write
7A5000
unkown
page execute and read and write
177E000
heap
page read and write
48FB000
stack
page read and write
22C5F000
heap
page read and write
310F000
stack
page read and write
1739000
heap
page read and write
2ECE000
stack
page read and write
367F000
stack
page read and write
C04000
heap
page read and write
33CE000
stack
page read and write
1789000
heap
page read and write
DB3000
heap
page read and write
89E000
unkown
page execute and read and write
5C8000
unkown
page execute and read and write
11BC000
heap
page read and write
5B0000
heap
page read and write
4C30000
direct allocation
page read and write
801F000
stack
page read and write
DE9000
heap
page read and write
4D01000
heap
page read and write
4441000
heap
page read and write
22C5E000
heap
page read and write
22C3F000
heap
page read and write
14D4000
heap
page read and write
D50000
direct allocation
page read and write
81BC000
stack
page read and write
22C51000
heap
page read and write
4441000
heap
page read and write
4D01000
heap
page read and write
36A0000
direct allocation
page execute and read and write
1630000
heap
page read and write
14D4000
heap
page read and write
4E00000
direct allocation
page read and write
945000
unkown
page execute and read and write
4441000
heap
page read and write
C04000
heap
page read and write
392E000
stack
page read and write
4D01000
heap
page read and write
4D01000
heap
page read and write
3C8E000
stack
page read and write
3F7E000
stack
page read and write
4441000
heap
page read and write
BE0000
direct allocation
page read and write
1C0000
heap
page read and write
4D01000
heap
page read and write
3E33000
heap
page read and write
4D01000
heap
page read and write
478F000
stack
page read and write
10E7000
unkown
page execute and read and write
14D4000
heap
page read and write
4D01000
heap
page read and write
4E00000
direct allocation
page read and write
297F000
stack
page read and write
E01000
heap
page read and write
19B0000
heap
page read and write
11B8000
heap
page read and write
6260000
heap
page read and write
4441000
heap
page read and write
4D01000
heap
page read and write
2FCF000
stack
page read and write
720000
unkown
page readonly
6CB40000
unkown
page read and write
4E00000
direct allocation
page read and write
5F5F000
stack
page read and write
4A40000
direct allocation
page execute and read and write
BE0000
direct allocation
page read and write
4D01000
heap
page read and write
4441000
heap
page read and write
14D4000
heap
page read and write
3BB4000
direct allocation
page execute and read and write
22C25000
heap
page read and write
6394000
heap
page read and write
1D1FD000
stack
page read and write
C04000
heap
page read and write
26FE000
stack
page read and write
EC4000
heap
page read and write
15B000
stack
page read and write
11BC000
heap
page read and write
4441000
heap
page read and write
4D90000
direct allocation
page execute and read and write
1BDA000
heap
page read and write
22C2D000
heap
page read and write
22C39000
heap
page read and write
4B7000
unkown
page write copy
4D01000
heap
page read and write
EC4000
heap
page read and write
1796000
heap
page read and write
450000
unkown
page read and write
3960000
heap
page read and write
A7C000
unkown
page execute and read and write
4DC0000
direct allocation
page execute and read and write
4D01000
heap
page read and write
4441000
heap
page read and write
22C40000
heap
page read and write
4790000
direct allocation
page read and write
44D000
stack
page read and write
EC4000
heap
page read and write
4441000
heap
page read and write
4E00000
direct allocation
page read and write
3AA0000
heap
page read and write
4E00000
direct allocation
page read and write
4D01000
heap
page read and write
37BF000
stack
page read and write
E2C000
heap
page read and write
C04000
heap
page read and write
2EF17000
heap
page read and write
14D4000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
4DE0000
direct allocation
page execute and read and write
4E00000
direct allocation
page read and write
433E000
stack
page read and write
4441000
heap
page read and write
995000
unkown
page execute and read and write
6C952000
unkown
page readonly
4D01000
heap
page read and write
22C56000
heap
page read and write
22C4C000
heap
page read and write
5330000
direct allocation
page execute and read and write
A8C000
unkown
page execute and read and write
4441000
heap
page read and write
3BB4000
direct allocation
page execute and read and write
4790000
direct allocation
page read and write
3BB4000
direct allocation
page execute and read and write
4790000
direct allocation
page read and write
39CE000
stack
page read and write
5330000
direct allocation
page execute and read and write
4441000
heap
page read and write
4D01000
heap
page read and write
4A70000
direct allocation
page execute and read and write
C04000
heap
page read and write
EC4000
heap
page read and write
4B0000
unkown
page execute and read and write
BE0000
direct allocation
page read and write
4D01000
heap
page read and write
DE9000
heap
page read and write
4D01000
heap
page read and write
3BBE000
stack
page read and write
109F000
stack
page read and write
4790000
direct allocation
page read and write
4D01000
heap
page read and write
61F0000
heap
page read and write
1887000
heap
page read and write
3BBE000
direct allocation
page execute and read and write
4441000
heap
page read and write
90C000
unkown
page execute and read and write
4D01000
heap
page read and write
4441000
heap
page read and write
22C59000
heap
page read and write
6390000
heap
page read and write
3A3F000
stack
page read and write
E38000
heap
page read and write
22C56000
heap
page read and write
22C51000
heap
page read and write
A7F000
unkown
page execute and write copy
47A1000
heap
page read and write
4D01000
heap
page read and write
951000
unkown
page execute and read and write
BDC000
stack
page read and write
4D01000
heap
page read and write
D3E000
heap
page read and write
4D01000
heap
page read and write
22C33000
heap
page read and write
4441000
heap
page read and write
11B8000
heap
page read and write
81C0000
heap
page read and write
4441000
heap
page read and write
37A0000
direct allocation
page execute and read and write
1BEC000
heap
page read and write
48A0000
trusted library allocation
page read and write
22C25000
heap
page read and write
2EFF000
stack
page read and write
22C5F000
heap
page read and write
1CB3D000
stack
page read and write
65CC000
stack
page read and write
4790000
direct allocation
page read and write
42FF000
stack
page read and write
22C56000
heap
page read and write
15FC000
stack
page read and write
53E000
stack
page read and write
E17000
heap
page read and write
16CA000
heap
page read and write
61EB4000
direct allocation
page read and write
60DE000
stack
page read and write
4D01000
heap
page read and write
22C5B000
heap
page read and write
22C4C000
heap
page read and write
328E000
stack
page read and write
E31000
heap
page read and write
76E000
unkown
page execute and write copy
379E000
stack
page read and write
4441000
heap
page read and write
4540000
trusted library allocation
page read and write
BE0000
direct allocation
page read and write
E01000
heap
page read and write
8DE000
unkown
page execute and read and write
22C34000
heap
page read and write
There are 935 hidden memdumps, click here to show them.