IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\explorti.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
"C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious

URLs

Name
IP
Malicious
http://77.91.77.82/Hun4Ko/index.php
77.91.77.82
malicious
http://77.91.77.82/Hun4Ko/index.php/Hun4Ko/index.php
unknown
malicious
http://77.91.77.82/Hun4Ko/index.php-e9c77b0923665da6f1
unknown
http://77.91.77.82/Hun4Ko/index.phpS
unknown
http://77.91.77.82/Hun4Ko/index.php40971b6b
unknown
http://77.91.77.82/Hun4Ko/index.php;
unknown
http://77.91.77.82/Hun4Ko/index.phpz
unknown
http://77.91.77.82/Hun4Ko/index.phpG
unknown
http://77.91.77.82/Hun4Ko/index.php6
unknown
http://77.91.77.82/Hun4Ko/index.php%
unknown

IPs

IP
Domain
Country
Malicious
77.91.77.82
unknown
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4940000
direct allocation
page read and write
malicious
AB1000
unkown
page execute and read and write
malicious
171000
unkown
page execute and read and write
malicious
4C70000
direct allocation
page read and write
malicious
4980000
direct allocation
page read and write
malicious
171000
unkown
page execute and read and write
malicious
4EC0000
direct allocation
page read and write
malicious
171000
unkown
page execute and read and write
malicious
171000
unkown
page execute and read and write
malicious
52E0000
direct allocation
page read and write
malicious
171000
unkown
page execute and read and write
malicious
4950000
direct allocation
page read and write
malicious
5230000
direct allocation
page read and write
malicious
1254000
heap
page read and write
324F000
stack
page read and write
374E000
stack
page read and write
424F000
stack
page read and write
2CFF000
stack
page read and write
366E000
stack
page read and write
1216000
heap
page read and write
35F000
unkown
page execute and read and write
485000
unkown
page execute and write copy
44D1000
heap
page read and write
EDE000
stack
page read and write
135E000
stack
page read and write
300F000
stack
page read and write
4B10000
direct allocation
page execute and read and write
13C0000
heap
page read and write
38EE000
stack
page read and write
45D0000
trusted library allocation
page read and write
4A31000
heap
page read and write
1150000
heap
page read and write
53D0000
direct allocation
page execute and read and write
492F000
stack
page read and write
BAD000
stack
page read and write
424F000
stack
page read and write
2C3E000
stack
page read and write
42EF000
stack
page read and write
47CF000
stack
page read and write
44D6000
heap
page read and write
3D4F000
stack
page read and write
2ECF000
stack
page read and write
6480000
heap
page read and write
11DA000
heap
page read and write
51FE000
stack
page read and write
44D1000
heap
page read and write
120E000
heap
page read and write
4D90000
direct allocation
page read and write
4D90000
direct allocation
page read and write
E27000
heap
page read and write
2F0E000
stack
page read and write
BD4000
heap
page read and write
4AF0000
direct allocation
page execute and read and write
BD4000
heap
page read and write
1DB000
unkown
page execute and read and write
4E40000
direct allocation
page read and write
4A31000
heap
page read and write
4EC0000
direct allocation
page read and write
4A31000
heap
page read and write
437F000
stack
page read and write
6F50000
heap
page read and write
44D1000
heap
page read and write
466F000
stack
page read and write
54D0000
direct allocation
page execute and read and write
4E51000
heap
page read and write
44BF000
stack
page read and write
171000
unkown
page execute and write copy
145E000
stack
page read and write
BA0000
direct allocation
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
414E000
stack
page read and write
1233000
heap
page read and write
1D2000
unkown
page execute and read and write
13E4000
heap
page read and write
1196000
heap
page read and write
35CF000
stack
page read and write
1DB000
unkown
page execute and read and write
46F000
unkown
page execute and read and write
13E4000
heap
page read and write
BA0000
direct allocation
page read and write
4A31000
heap
page read and write
2ACE000
stack
page read and write
1254000
heap
page read and write
D00000
direct allocation
page read and write
406E000
stack
page read and write
1254000
heap
page read and write
4B00000
direct allocation
page execute and read and write
4E40000
direct allocation
page read and write
2EBE000
stack
page read and write
2D27000
heap
page read and write
4A31000
heap
page read and write
B1B000
unkown
page execute and read and write
364F000
stack
page read and write
BD0000
heap
page read and write
BD4000
heap
page read and write
5080000
direct allocation
page execute and read and write
537F000
stack
page read and write
44D1000
heap
page read and write
4A31000
heap
page read and write
410F000
stack
page read and write
486000
unkown
page execute and write copy
1254000
heap
page read and write
44D1000
heap
page read and write
170000
unkown
page readonly
1205000
heap
page read and write
1254000
heap
page read and write
623000
unkown
page execute and write copy
BA0000
direct allocation
page read and write
390E000
stack
page read and write
BA0000
direct allocation
page read and write
4B10000
direct allocation
page execute and read and write
41AE000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
2E7E000
stack
page read and write
2F7F000
stack
page read and write
DAF000
unkown
page execute and read and write
416F000
stack
page read and write
BF4000
heap
page read and write
6F60000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
47AF000
stack
page read and write
3CAF000
stack
page read and write
47D0000
direct allocation
page read and write
1577000
heap
page read and write
145E000
stack
page read and write
40FF000
stack
page read and write
4A31000
heap
page read and write
622000
unkown
page execute and read and write
4A31000
heap
page read and write
4501000
heap
page read and write
384F000
stack
page read and write
442F000
stack
page read and write
670E000
stack
page read and write
4B10000
direct allocation
page execute and read and write
694C000
stack
page read and write
F64000
unkown
page execute and read and write
FBE000
stack
page read and write
4E50000
heap
page read and write
1254000
heap
page read and write
47D0000
direct allocation
page read and write
5450000
direct allocation
page execute and read and write
4A31000
heap
page read and write
4C4F000
stack
page read and write
53C0000
direct allocation
page execute and read and write
625000
unkown
page execute and write copy
47D0000
direct allocation
page read and write
3C3E000
stack
page read and write
13E4000
heap
page read and write
3E8F000
stack
page read and write
26FE000
stack
page read and write
4A31000
heap
page read and write
4D90000
direct allocation
page read and write
1D9000
unkown
page write copy
52E4000
heap
page read and write
1254000
heap
page read and write
27FF000
stack
page read and write
2E4F000
stack
page read and write
1404000
heap
page read and write
47D0000
direct allocation
page read and write
4E40000
direct allocation
page read and write
4B30000
trusted library allocation
page read and write
4980000
direct allocation
page read and write
2F47000
heap
page read and write
4E40000
direct allocation
page read and write
5020000
direct allocation
page execute and read and write
3ABF000
stack
page read and write
BE0000
direct allocation
page read and write
45C0000
trusted library allocation
page read and write
485000
unkown
page execute and read and write
34CE000
stack
page read and write
44D1000
heap
page read and write
1222000
heap
page read and write
44D1000
heap
page read and write
B04000
heap
page read and write
1254000
heap
page read and write
4F21000
direct allocation
page read and write
4E80000
direct allocation
page execute and read and write
13E4000
heap
page read and write
3ECE000
stack
page read and write
BD4000
heap
page read and write
2BFE000
stack
page read and write
543C000
stack
page read and write
46AF000
stack
page read and write
169F000
stack
page read and write
BCE000
stack
page read and write
1254000
heap
page read and write
1D9000
unkown
page read and write
2D4E000
stack
page read and write
B04000
heap
page read and write
475000
unkown
page execute and read and write
623000
unkown
page execute and write copy
11D1000
heap
page read and write
542F000
stack
page read and write
51AF000
stack
page read and write
49CF000
stack
page read and write
624000
unkown
page execute and read and write
2ABE000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
184E000
stack
page read and write
4A31000
heap
page read and write
B6E000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
4EC0000
direct allocation
page read and write
54C0000
direct allocation
page execute and read and write
3C0F000
stack
page read and write
AB0000
unkown
page read and write
3017000
heap
page read and write
475000
unkown
page execute and read and write
35FE000
stack
page read and write
1254000
heap
page read and write
44D1000
heap
page read and write
4E00000
direct allocation
page execute and read and write
4B00000
direct allocation
page execute and read and write
34CE000
stack
page read and write
1D9000
unkown
page read and write
46EE000
stack
page read and write
486000
unkown
page execute and write copy
4C70000
direct allocation
page read and write
2D10000
direct allocation
page read and write
44D1000
heap
page read and write
4A2F000
stack
page read and write
475000
unkown
page execute and read and write
5470000
direct allocation
page execute and read and write
4AD0000
direct allocation
page execute and read and write
316F000
stack
page read and write
38AF000
stack
page read and write
625000
unkown
page execute and write copy
1254000
heap
page read and write
4A31000
heap
page read and write
4E00000
direct allocation
page execute and read and write
658F000
stack
page read and write
4600000
trusted library allocation
page read and write
4B60000
direct allocation
page execute and read and write
4A31000
heap
page read and write
F63000
unkown
page execute and write copy
32AE000
stack
page read and write
4F50000
trusted library allocation
page read and write
4E0E000
stack
page read and write
5090000
direct allocation
page execute and read and write
30BF000
stack
page read and write
D20000
heap
page read and write
170000
unkown
page read and write
1254000
heap
page read and write
77B000
stack
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
54F0000
direct allocation
page execute and read and write
5470000
direct allocation
page execute and read and write
4B0F000
stack
page read and write
44C0000
heap
page read and write
4B40000
direct allocation
page execute and read and write
1254000
heap
page read and write
BD4000
heap
page read and write
45AE000
stack
page read and write
485000
unkown
page execute and read and write
120E000
heap
page read and write
3C0F000
stack
page read and write
4B4E000
stack
page read and write
1254000
heap
page read and write
B19000
unkown
page write copy
624000
unkown
page execute and read and write
4D90000
direct allocation
page read and write
BD4000
heap
page read and write
5490000
direct allocation
page execute and read and write
FAC000
stack
page read and write
DF7000
heap
page read and write
4E3F000
stack
page read and write
DC5000
unkown
page execute and write copy
1254000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
4A31000
heap
page read and write
BE0000
direct allocation
page read and write
3F4E000
stack
page read and write
366F000
stack
page read and write
47D0000
direct allocation
page read and write
DCA000
heap
page read and write
44D1000
heap
page read and write
4B10000
direct allocation
page execute and read and write
D24000
heap
page read and write
4B30000
direct allocation
page execute and read and write
4A31000
heap
page read and write
1233000
heap
page read and write
47EF000
stack
page read and write
BF0000
heap
page read and write
446E000
stack
page read and write
52E0000
direct allocation
page read and write
11F2000
heap
page read and write
5070000
direct allocation
page execute and read and write
14BD000
heap
page read and write
44D1000
heap
page read and write
450E000
stack
page read and write
13E4000
heap
page read and write
B04000
heap
page read and write
30FE000
stack
page read and write
428E000
stack
page read and write
6BC000
stack
page read and write
A20000
heap
page read and write
4A31000
heap
page read and write
AB0000
unkown
page readonly
1254000
heap
page read and write
35F000
unkown
page execute and read and write
4D3E000
stack
page read and write
44D1000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
5470000
direct allocation
page execute and read and write
1550000
heap
page read and write
BF4000
heap
page read and write
4E40000
direct allocation
page read and write
170000
unkown
page readonly
B04000
heap
page read and write
4A31000
heap
page read and write
13E4000
heap
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
44D1000
heap
page read and write
B04000
heap
page read and write
318E000
stack
page read and write
D00000
direct allocation
page read and write
418F000
stack
page read and write
4A31000
heap
page read and write
B04000
heap
page read and write
4B10000
direct allocation
page execute and read and write
36AE000
stack
page read and write
BF4000
heap
page read and write
1404000
heap
page read and write
1404000
heap
page read and write
1404000
heap
page read and write
4BEE000
stack
page read and write
2E2F000
stack
page read and write
46CE000
stack
page read and write
53F0000
direct allocation
page execute and read and write
4A31000
heap
page read and write
350F000
stack
page read and write
B04000
heap
page read and write
1D9000
unkown
page write copy
3C6F000
stack
page read and write
4ADC000
stack
page read and write
BF4000
heap
page read and write
4A31000
heap
page read and write
5030000
direct allocation
page execute and read and write
482E000
stack
page read and write
D20000
heap
page read and write
E52000
heap
page read and write
44D1000
heap
page read and write
44D0000
heap
page read and write
360E000
stack
page read and write
1254000
heap
page read and write
DBE000
stack
page read and write
4A31000
heap
page read and write
50E0000
direct allocation
page execute and read and write
297E000
stack
page read and write
5400000
direct allocation
page execute and read and write
53C0000
direct allocation
page execute and read and write
BF4000
heap
page read and write
120E000
stack
page read and write
44CF000
stack
page read and write
6F60000
heap
page read and write
DC0000
heap
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
44D1000
heap
page read and write
BE0000
direct allocation
page read and write
31AB000
stack
page read and write
2D00000
heap
page read and write
125C000
stack
page read and write
B12000
unkown
page execute and read and write
D2B000
heap
page read and write
4BAF000
stack
page read and write
2BBF000
stack
page read and write
44D1000
heap
page read and write
4A31000
heap
page read and write
368E000
stack
page read and write
4A31000
heap
page read and write
B87000
heap
page read and write
44D1000
heap
page read and write
4E00000
direct allocation
page execute and read and write
84F1000
heap
page read and write
4E30000
direct allocation
page execute and read and write
D24000
heap
page read and write
D00000
direct allocation
page read and write
44D1000
heap
page read and write
35CF000
stack
page read and write
7BC000
stack
page read and write
BA0000
direct allocation
page read and write
44C1000
heap
page read and write
BF4000
heap
page read and write
430E000
stack
page read and write
EE0000
heap
page read and write
4501000
heap
page read and write
BF4000
heap
page read and write
6C1C000
stack
page read and write
2D10000
direct allocation
page read and write
5440000
direct allocation
page execute and read and write
4A31000
heap
page read and write
1254000
heap
page read and write
4E40000
direct allocation
page read and write
4F0F000
stack
page read and write
4CBE000
stack
page read and write
BA0000
direct allocation
page read and write
283B000
stack
page read and write
370F000
stack
page read and write
1222000
heap
page read and write
29C7000
heap
page read and write
373E000
stack
page read and write
4E00000
direct allocation
page execute and read and write
3F6E000
stack
page read and write
1DB000
unkown
page execute and read and write
622000
unkown
page execute and read and write
2D10000
direct allocation
page read and write
374E000
stack
page read and write
4A31000
heap
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
388E000
stack
page read and write
1DB000
unkown
page execute and read and write
4A31000
heap
page read and write
4E40000
direct allocation
page read and write
44D1000
heap
page read and write
BD4000
heap
page read and write
458E000
stack
page read and write
4AC0000
direct allocation
page execute and read and write
171000
unkown
page execute and write copy
4A31000
heap
page read and write
342E000
stack
page read and write
498C000
stack
page read and write
3AFE000
stack
page read and write
2C7B000
stack
page read and write
3FBF000
stack
page read and write
106A000
stack
page read and write
D00000
direct allocation
page read and write
171000
unkown
page execute and write copy
4501000
heap
page read and write
44D1000
heap
page read and write
4D90000
direct allocation
page read and write
485000
unkown
page execute and write copy
4D90000
direct allocation
page read and write
2870000
direct allocation
page read and write
5440000
direct allocation
page execute and read and write
392E000
stack
page read and write
680F000
stack
page read and write
D24000
heap
page read and write
BA0000
direct allocation
page read and write
1254000
heap
page read and write
3D7E000
stack
page read and write
354E000
stack
page read and write
1D9000
unkown
page write copy
4D90000
direct allocation
page read and write
4D90000
direct allocation
page read and write
4A31000
heap
page read and write
4AF0000
direct allocation
page execute and read and write
E32000
heap
page read and write
52FE000
stack
page read and write
4A31000
heap
page read and write
D24000
heap
page read and write
4501000
heap
page read and write
11D0000
heap
page read and write
456E000
stack
page read and write
DCE000
heap
page read and write
170000
unkown
page readonly
475000
unkown
page execute and read and write
33EE000
stack
page read and write
46F000
unkown
page execute and read and write
53C0000
direct allocation
page execute and read and write
44D1000
heap
page read and write
4940000
direct allocation
page read and write
44D1000
heap
page read and write
4CD1000
direct allocation
page read and write
BD4000
heap
page read and write
4AA0000
direct allocation
page execute and read and write
5470000
direct allocation
page execute and read and write
3A6E000
stack
page read and write
43CE000
stack
page read and write
6ECE000
stack
page read and write
D24000
heap
page read and write
4E20000
direct allocation
page execute and read and write
44D1000
heap
page read and write
170000
unkown
page read and write
624000
unkown
page execute and read and write
1254000
heap
page read and write
2D10000
direct allocation
page read and write
47D0000
direct allocation
page read and write
BA0000
direct allocation
page read and write
4B10000
direct allocation
page execute and read and write
44D1000
heap
page read and write
4C8E000
stack
page read and write
334F000
stack
page read and write
D00000
direct allocation
page read and write
44D1000
heap
page read and write
48E0000
trusted library allocation
page read and write
4DA1000
heap
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
53B0000
direct allocation
page execute and read and write
4A31000
heap
page read and write
4E40000
direct allocation
page read and write
47E1000
heap
page read and write
37CE000
stack
page read and write
3DCF000
stack
page read and write
2D3E000
stack
page read and write
170000
unkown
page read and write
3F0F000
stack
page read and write
442E000
stack
page read and write
2D10000
direct allocation
page read and write
52E0000
direct allocation
page read and write
4B20000
direct allocation
page execute and read and write
3E2E000
stack
page read and write
D24000
heap
page read and write
527E000
stack
page read and write
4E40000
direct allocation
page read and write
7BD000
stack
page read and write
4A31000
heap
page read and write
3010000
heap
page read and write
BA0000
direct allocation
page read and write
32EE000
stack
page read and write
121C000
heap
page read and write
298F000
stack
page read and write
442000
unkown
page execute and read and write
5050000
direct allocation
page execute and read and write
1404000
heap
page read and write
4980000
direct allocation
page read and write
4D90000
direct allocation
page read and write
47E1000
heap
page read and write
43BE000
stack
page read and write
37EE000
stack
page read and write
387E000
stack
page read and write
326F000
stack
page read and write
4A0E000
stack
page read and write
485000
unkown
page execute and read and write
53E0000
direct allocation
page execute and read and write
11CB000
heap
page read and write
625000
unkown
page execute and write copy
3DEF000
stack
page read and write
3DAF000
stack
page read and write
34BE000
stack
page read and write
4D8F000
stack
page read and write
4940000
direct allocation
page read and write
1404000
heap
page read and write
1404000
heap
page read and write
485000
unkown
page execute and write copy
338E000
stack
page read and write
BF4000
heap
page read and write
BD4000
heap
page read and write
2C8E000
stack
page read and write
5470000
direct allocation
page execute and read and write
397F000
stack
page read and write
485000
unkown
page execute and read and write
DC6000
unkown
page execute and write copy
3C4E000
stack
page read and write
50A0000
direct allocation
page execute and read and write
44D1000
heap
page read and write
33EF000
stack
page read and write
4A31000
heap
page read and write
4AAE000
stack
page read and write
408E000
stack
page read and write
47D0000
direct allocation
page read and write
362F000
stack
page read and write
3A2F000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
3EBE000
stack
page read and write
B04000
heap
page read and write
288C000
heap
page read and write
4A31000
heap
page read and write
5230000
direct allocation
page read and write
AB1000
unkown
page execute and write copy
2B0F000
stack
page read and write
E01000
heap
page read and write
54B0000
direct allocation
page execute and read and write
1254000
heap
page read and write
CFD000
stack
page read and write
5480000
direct allocation
page execute and read and write
44D1000
heap
page read and write
2CBE000
stack
page read and write
49A1000
direct allocation
page read and write
DB5000
unkown
page execute and read and write
644E000
stack
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
2C4F000
stack
page read and write
38CF000
stack
page read and write
1254000
heap
page read and write
478E000
stack
page read and write
1215000
heap
page read and write
44D1000
heap
page read and write
5460000
direct allocation
page execute and read and write
1254000
heap
page read and write
6F5E000
heap
page read and write
5410000
direct allocation
page execute and read and write
44D1000
heap
page read and write
BF4000
heap
page read and write
4B60000
direct allocation
page execute and read and write
39CE000
stack
page read and write
42EE000
stack
page read and write
1DB000
unkown
page execute and read and write
50AE000
stack
page read and write
456E000
stack
page read and write
35BF000
stack
page read and write
352F000
stack
page read and write
4DA1000
heap
page read and write
CDF000
stack
page read and write
13E4000
heap
page read and write
4CF0000
heap
page read and write
398F000
stack
page read and write
6460000
heap
page read and write
4A31000
heap
page read and write
44D1000
heap
page read and write
4A30000
heap
page read and write
B04000
heap
page read and write
1404000
heap
page read and write
BF4000
heap
page read and write
3D3F000
stack
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
44D1000
heap
page read and write
624000
unkown
page execute and read and write
474F000
stack
page read and write
1404000
heap
page read and write
5020000
heap
page read and write
1850000
heap
page read and write
BF4000
heap
page read and write
11F2000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
4E40000
direct allocation
page read and write
44D1000
heap
page read and write
4A42000
heap
page read and write
4DA1000
heap
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
1D9000
unkown
page write copy
B04000
heap
page read and write
3CAE000
stack
page read and write
4D90000
direct allocation
page read and write
BF4000
heap
page read and write
4A31000
heap
page read and write
49B1000
direct allocation
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
119D000
heap
page read and write
53C0000
direct allocation
page execute and read and write
1216000
heap
page read and write
BF4000
heap
page read and write
2E8E000
stack
page read and write
44D1000
heap
page read and write
12FD000
stack
page read and write
E53000
heap
page read and write
468F000
stack
page read and write
312F000
stack
page read and write
1D2000
unkown
page execute and read and write
310E000
stack
page read and write
2D10000
direct allocation
page read and write
4A31000
heap
page read and write
2D10000
direct allocation
page read and write
4AD0000
direct allocation
page execute and read and write
3B2F000
stack
page read and write
52E0000
direct allocation
page read and write
44D1000
heap
page read and write
D60000
heap
page read and write
7E0000
heap
page read and write
1254000
heap
page read and write
4AA0000
direct allocation
page execute and read and write
4EA0000
trusted library allocation
page read and write
D00000
direct allocation
page read and write
624000
unkown
page execute and read and write
4B50000
direct allocation
page execute and read and write
1222000
heap
page read and write
3FCF000
stack
page read and write
304E000
stack
page read and write
5040000
direct allocation
page execute and read and write
3E0E000
stack
page read and write
BF4000
heap
page read and write
46AE000
stack
page read and write
4DE0000
direct allocation
page execute and read and write
44D1000
heap
page read and write
11AF000
heap
page read and write
44D1000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
532E000
stack
page read and write
D00000
direct allocation
page read and write
337E000
stack
page read and write
42CF000
stack
page read and write
4A31000
heap
page read and write
3E8F000
stack
page read and write
44D1000
heap
page read and write
BF4000
heap
page read and write
314F000
stack
page read and write
4B20000
direct allocation
page execute and read and write
44D1000
heap
page read and write
D24000
heap
page read and write
44D1000
heap
page read and write
44F0000
heap
page read and write
BD4000
heap
page read and write
47D0000
direct allocation
page read and write
13E4000
heap
page read and write
65CE000
stack
page read and write
4A31000
heap
page read and write
1404000
heap
page read and write
4E70000
direct allocation
page execute and read and write
DC5000
unkown
page execute and read and write
47D0000
direct allocation
page read and write
1404000
heap
page read and write
492E000
stack
page read and write
623000
unkown
page execute and write copy
4A31000
heap
page read and write
38EF000
stack
page read and write
54A0000
direct allocation
page execute and read and write
50D0000
direct allocation
page execute and read and write
41CE000
stack
page read and write
4A31000
heap
page read and write
340E000
stack
page read and write
4F0E000
stack
page read and write
5060000
direct allocation
page execute and read and write
684B000
stack
page read and write
4910000
heap
page read and write
2F40000
heap
page read and write
13E4000
heap
page read and write
44D1000
heap
page read and write
11F2000
heap
page read and write
623000
unkown
page execute and write copy
2D0F000
stack
page read and write
4A31000
heap
page read and write
44D1000
heap
page read and write
2D10000
direct allocation
page read and write
2870000
direct allocation
page read and write
285F000
stack
page read and write
44D1000
heap
page read and write
150E000
stack
page read and write
BF4000
heap
page read and write
44D1000
heap
page read and write
11F2000
heap
page read and write
442000
unkown
page execute and read and write
622000
unkown
page execute and read and write
42AF000
stack
page read and write
4B00000
direct allocation
page execute and read and write
44D1000
heap
page read and write
47E0000
heap
page read and write
488F000
stack
page read and write
BD4000
heap
page read and write
1254000
heap
page read and write
1234000
heap
page read and write
4A31000
heap
page read and write
320F000
stack
page read and write
3CCE000
stack
page read and write
4A31000
heap
page read and write
1254000
heap
page read and write
1DB000
unkown
page execute and read and write
44C1000
heap
page read and write
E4F000
heap
page read and write
1186000
heap
page read and write
D24000
heap
page read and write
4E00000
direct allocation
page execute and read and write
F65000
unkown
page execute and write copy
4A31000
heap
page read and write
1254000
heap
page read and write
11B0000
heap
page read and write
1460000
heap
page read and write
171000
unkown
page execute and write copy
2D10000
direct allocation
page read and write
4A31000
heap
page read and write
121C000
heap
page read and write
E9E000
stack
page read and write
115A000
heap
page read and write
84F0000
heap
page read and write
44D1000
heap
page read and write
BE0000
direct allocation
page read and write
48CE000
stack
page read and write
4E40000
direct allocation
page read and write
6A8E000
stack
page read and write
13E4000
heap
page read and write
47E1000
heap
page read and write
5050000
direct allocation
page execute and read and write
39EF000
stack
page read and write
427E000
stack
page read and write
2F2F000
stack
page read and write
3B0E000
stack
page read and write
3A4E000
stack
page read and write
C9F000
unkown
page execute and read and write
B00000
heap
page read and write
49E1000
direct allocation
page read and write
3F2F000
stack
page read and write
356E000
stack
page read and write
485000
unkown
page execute and write copy
1222000
heap
page read and write
4A6F000
stack
page read and write
400E000
stack
page read and write
1D9000
unkown
page write copy
1216000
heap
page read and write
A5E000
stack
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
4EC0000
direct allocation
page read and write
1558000
heap
page read and write
404F000
stack
page read and write
1206000
heap
page read and write
47D0000
direct allocation
page read and write
82F4000
heap
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
44D1000
heap
page read and write
2D8F000
stack
page read and write
3FFE000
stack
page read and write
82F0000
heap
page read and write
2EFB000
stack
page read and write
BE0000
direct allocation
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
1DB000
unkown
page execute and read and write
406F000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
6BC000
stack
page read and write
44D1000
heap
page read and write
4DBF000
stack
page read and write
121D000
heap
page read and write
413E000
stack
page read and write
4A31000
heap
page read and write
35F000
unkown
page execute and read and write
2887000
heap
page read and write
BD4000
heap
page read and write
BA0000
direct allocation
page read and write
352E000
stack
page read and write
2C0E000
stack
page read and write
D7B000
stack
page read and write
54E0000
direct allocation
page execute and read and write
13E4000
heap
page read and write
BE0000
direct allocation
page read and write
5050000
direct allocation
page execute and read and write
44D1000
heap
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
3BAE000
stack
page read and write
623000
unkown
page execute and write copy
5510000
direct allocation
page execute and read and write
486000
unkown
page execute and write copy
170000
unkown
page readonly
9EC000
stack
page read and write
625000
unkown
page execute and write copy
44C1000
heap
page read and write
44D1000
heap
page read and write
3C4E000
stack
page read and write
324E000
stack
page read and write
D24000
heap
page read and write
F1B000
heap
page read and write
4E51000
heap
page read and write
B19000
unkown
page read and write
BF4000
heap
page read and write
46F000
unkown
page execute and read and write
5470000
direct allocation
page execute and read and write
475000
unkown
page execute and read and write
44D1000
heap
page read and write
4DA0000
heap
page read and write
BF4000
heap
page read and write
D00000
direct allocation
page read and write
500F000
stack
page read and write
1254000
heap
page read and write
4E40000
direct allocation
page read and write
3C8F000
stack
page read and write
2FBE000
stack
page read and write
44D1000
heap
page read and write
1D9000
unkown
page read and write
3B6F000
stack
page read and write
A9E000
stack
page read and write
5050000
direct allocation
page execute and read and write
4A31000
heap
page read and write
533D000
stack
page read and write
14A0000
heap
page read and write
D3E000
stack
page read and write
348F000
stack
page read and write
428E000
stack
page read and write
33AF000
stack
page read and write
31FF000
stack
page read and write
486000
unkown
page execute and write copy
1250000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
37AE000
stack
page read and write
1404000
heap
page read and write
43CE000
stack
page read and write
4A31000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
5420000
direct allocation
page execute and read and write
BF4000
heap
page read and write
1254000
heap
page read and write
115E000
heap
page read and write
3B4F000
stack
page read and write
1D9000
unkown
page write copy
A20000
heap
page read and write
44CF000
stack
page read and write
1254000
heap
page read and write
5341000
direct allocation
page read and write
485000
unkown
page execute and read and write
376F000
stack
page read and write
423F000
stack
page read and write
4E50000
direct allocation
page execute and read and write
3ACF000
stack
page read and write
3D8E000
stack
page read and write
388E000
stack
page read and write
4A31000
heap
page read and write
B5E000
stack
page read and write
1D2000
unkown
page execute and read and write
BE0000
direct allocation
page read and write
4D90000
direct allocation
page read and write
4A31000
heap
page read and write
485000
unkown
page execute and write copy
398F000
stack
page read and write
338E000
stack
page read and write
F62000
unkown
page execute and read and write
170000
unkown
page readonly
438F000
stack
page read and write
4B30000
direct allocation
page execute and read and write
1400000
heap
page read and write
B60000
heap
page read and write
4B50000
direct allocation
page execute and read and write
121C000
heap
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
BA0000
direct allocation
page read and write
4C70000
direct allocation
page read and write
39BE000
stack
page read and write
2D20000
heap
page read and write
4B70000
direct allocation
page execute and read and write
4A31000
heap
page read and write
2B4B000
stack
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
4C7B000
stack
page read and write
4A31000
heap
page read and write
464E000
stack
page read and write
48EF000
stack
page read and write
1254000
heap
page read and write
442000
unkown
page execute and read and write
35F000
unkown
page execute and read and write
44D1000
heap
page read and write
498E000
stack
page read and write
44D1000
heap
page read and write
2D10000
direct allocation
page read and write
110F000
stack
page read and write
348F000
stack
page read and write
121D000
heap
page read and write
625000
unkown
page execute and write copy
2BCF000
stack
page read and write
432E000
stack
page read and write
4A41000
heap
page read and write
3ACF000
stack
page read and write
5050000
direct allocation
page execute and read and write
378F000
stack
page read and write
44D1000
heap
page read and write
BE0000
direct allocation
page read and write
44D1000
heap
page read and write
5291000
direct allocation
page read and write
6485000
heap
page read and write
1404000
heap
page read and write
44D1000
heap
page read and write
4A31000
heap
page read and write
37AF000
stack
page read and write
4A31000
heap
page read and write
BE0000
direct allocation
page read and write
13E4000
heap
page read and write
4E00000
direct allocation
page execute and read and write
4E40000
direct allocation
page execute and read and write
4D90000
direct allocation
page read and write
2D10000
direct allocation
page read and write
4DA1000
heap
page read and write
44D1000
heap
page read and write
BF4000
heap
page read and write
2D10000
direct allocation
page read and write
44D1000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
2A7F000
stack
page read and write
11F2000
heap
page read and write
50B0000
direct allocation
page execute and read and write
44D1000
heap
page read and write
2870000
direct allocation
page read and write
328F000
stack
page read and write
4A31000
heap
page read and write
47E1000
heap
page read and write
4A31000
heap
page read and write
44D1000
heap
page read and write
47EE000
stack
page read and write
BE0000
direct allocation
page read and write
4A8F000
stack
page read and write
E02000
heap
page read and write
13E4000
heap
page read and write
53C0000
direct allocation
page execute and read and write
410F000
stack
page read and write
440F000
stack
page read and write
4AC0000
direct allocation
page execute and read and write
454F000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
1254000
heap
page read and write
D24000
heap
page read and write
D00000
direct allocation
page read and write
4E90000
direct allocation
page execute and read and write
BE0000
direct allocation
page read and write
44D1000
heap
page read and write
6F51000
heap
page read and write
2F8F000
stack
page read and write
84EC000
stack
page read and write
BE0000
direct allocation
page read and write
3A2E000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
442000
unkown
page execute and read and write
44D1000
heap
page read and write
46F000
unkown
page execute and read and write
33CF000
stack
page read and write
47D0000
direct allocation
page read and write
4A31000
heap
page read and write
293F000
stack
page read and write
66CF000
stack
page read and write
304F000
stack
page read and write
4AE0000
direct allocation
page execute and read and write
452F000
stack
page read and write
370F000
stack
page read and write
3CEE000
stack
page read and write
4A31000
heap
page read and write
35F000
unkown
page execute and read and write
4A31000
heap
page read and write
4CEF000
stack
page read and write
D24000
heap
page read and write
1D2000
unkown
page execute and read and write
B04000
heap
page read and write
B04000
heap
page read and write
2FCE000
stack
page read and write
1D9000
unkown
page read and write
2E7E000
stack
page read and write
1DB000
unkown
page execute and read and write
D00000
direct allocation
page read and write
2CFE000
stack
page read and write
3FCF000
stack
page read and write
BA0000
direct allocation
page read and write
BA0000
direct allocation
page read and write
D00000
direct allocation
page read and write
47D0000
direct allocation
page read and write
47D0000
direct allocation
page read and write
174F000
stack
page read and write
36FF000
stack
page read and write
1404000
heap
page read and write
4E40000
direct allocation
page read and write
1254000
heap
page read and write
D00000
direct allocation
page read and write
13E4000
heap
page read and write
52E0000
heap
page read and write
41EE000
stack
page read and write
44D1000
heap
page read and write
4940000
direct allocation
page read and write
622000
unkown
page execute and read and write
6486000
heap
page read and write
622000
unkown
page execute and read and write
314F000
stack
page read and write
171000
unkown
page execute and write copy
44C1000
heap
page read and write
4E51000
heap
page read and write
384F000
stack
page read and write
D24000
heap
page read and write
BE0000
direct allocation
page read and write
4A31000
heap
page read and write
3B6E000
stack
page read and write
3F2E000
stack
page read and write
1254000
heap
page read and write
460F000
stack
page read and write
3E7F000
stack
page read and write
3EEF000
stack
page read and write
4A31000
heap
page read and write
442000
unkown
page execute and read and write
11D8000
heap
page read and write
698E000
stack
page read and write
4A31000
heap
page read and write
1404000
heap
page read and write
44D1000
heap
page read and write
53C0000
direct allocation
page execute and read and write
1DB000
unkown
page execute and read and write
1254000
heap
page read and write
4E40000
direct allocation
page read and write
3ECE000
stack
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
121A000
heap
page read and write
44D1000
heap
page read and write
4A31000
heap
page read and write
5450000
direct allocation
page execute and read and write
E43000
heap
page read and write
4A31000
heap
page read and write
5390000
direct allocation
page execute and read and write
4A31000
heap
page read and write
D82000
unkown
page execute and read and write
323E000
stack
page read and write
44D1000
heap
page read and write
BE0000
direct allocation
page read and write
1254000
heap
page read and write
13E4000
heap
page read and write
2A8F000
stack
page read and write
485000
unkown
page execute and write copy
170000
unkown
page read and write
306E000
stack
page read and write
BA0000
direct allocation
page read and write
32CE000
stack
page read and write
39CE000
stack
page read and write
5430000
direct allocation
page execute and read and write
170000
unkown
page read and write
13E0000
heap
page read and write
4B40000
direct allocation
page execute and read and write
383F000
stack
page read and write
5460000
direct allocation
page execute and read and write
D00000
direct allocation
page read and write
2880000
heap
page read and write
BF4000
heap
page read and write
D00000
direct allocation
page read and write
44D1000
heap
page read and write
BF4000
heap
page read and write
333F000
stack
page read and write
135D000
stack
page read and write
4B10000
direct allocation
page execute and read and write
5230000
direct allocation
page read and write
4D90000
direct allocation
page read and write
316E000
stack
page read and write
11A1000
heap
page read and write
44D1000
heap
page read and write
444E000
stack
page read and write
3D8E000
stack
page read and write
41AF000
stack
page read and write
44D1000
heap
page read and write
4A31000
heap
page read and write
3BFF000
stack
page read and write
170000
unkown
page readonly
43EF000
stack
page read and write
438F000
stack
page read and write
29C0000
heap
page read and write
BF4000
heap
page read and write
400E000
stack
page read and write
14AA000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
5050000
direct allocation
page execute and read and write
40AE000
stack
page read and write
4A8F000
stack
page read and write
496E000
stack
page read and write
1D2000
unkown
page execute and read and write
2DCE000
stack
page read and write
50C0000
direct allocation
page execute and read and write
3D4F000
stack
page read and write
CFF000
stack
page read and write
34EF000
stack
page read and write
B80000
heap
page read and write
3B8E000
stack
page read and write
2E3F000
stack
page read and write
154E000
stack
page read and write
44E0000
heap
page read and write
414E000
stack
page read and write
4A31000
heap
page read and write
4E60000
direct allocation
page execute and read and write
44D1000
heap
page read and write
120D000
heap
page read and write
44D1000
heap
page read and write
3DEE000
stack
page read and write
4A31000
heap
page read and write
E43000
heap
page read and write
BF4000
heap
page read and write
4C70000
direct allocation
page read and write
486000
unkown
page execute and write copy
3B0E000
stack
page read and write
53A0000
direct allocation
page execute and read and write
4DF0000
direct allocation
page execute and read and write
BF4000
heap
page read and write
4AF0000
direct allocation
page execute and read and write
44D1000
heap
page read and write
3A0F000
stack
page read and write
1310000
heap
page read and write
30CF000
stack
page read and write
2D10000
direct allocation
page read and write
334F000
stack
page read and write
7F0000
heap
page read and write
1254000
heap
page read and write
347F000
stack
page read and write
4A31000
heap
page read and write
1254000
heap
page read and write
E27000
heap
page read and write
121C000
heap
page read and write
CF0000
heap
page read and write
360E000
stack
page read and write
402F000
stack
page read and write
BF4000
heap
page read and write
1254000
heap
page read and write
4B10000
direct allocation
page execute and read and write
1254000
heap
page read and write
32AF000
stack
page read and write
302F000
stack
page read and write
1254000
heap
page read and write
6DCE000
stack
page read and write
4D90000
direct allocation
page read and write
4E10000
direct allocation
page execute and read and write
47D0000
direct allocation
page read and write
5230000
direct allocation
page read and write
171000
unkown
page execute and write copy
2A0E000
stack
page read and write
F10000
heap
page read and write
5500000
direct allocation
page execute and read and write
D46000
heap
page read and write
46F000
unkown
page execute and read and write
2D10000
direct allocation
page read and write
29B0000
heap
page read and write
4E51000
heap
page read and write
2F3E000
stack
page read and write
1490000
heap
page read and write
44D1000
heap
page read and write
1D9000
unkown
page read and write
26BE000
stack
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
121C000
heap
page read and write
BD0000
heap
page read and write
1254000
heap
page read and write
4A31000
heap
page read and write
There are 1203 hidden memdumps, click here to show them.