IOC Report
Zachv5lCuu.exe

loading gif

Files

File Path
Type
Category
Malicious
Zachv5lCuu.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\amadka[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000006001\25bb638aac.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\GHCGDAFCFH.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\FIJDGIJJKEGIEBGCGDHCFIDAAE
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HIDAAKEGDBFIJJKFHCFBGHCGDH
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\IEHJJECBKKECFIEBGCAK
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\ProgramData\IIEHJKJJJECFHJJJKKECBGHDBF
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\ProgramData\JEGDGIIJJECFIDHJJKKF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KFIJEGCBGIDGHIDHDGCB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KJDAECAE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KKFHJJDH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\explorti.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 20 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Zachv5lCuu.exe
"C:\Users\user\Desktop\Zachv5lCuu.exe"
malicious
C:\Users\user\AppData\Local\Temp\GHCGDAFCFH.exe
"C:\Users\user\AppData\Local\Temp\GHCGDAFCFH.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
"C:\Users\user~1\AppData\Local\Temp\ad40971b6b\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user~1\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\1000006001\25bb638aac.exe
"C:\Users\user~1\AppData\Local\Temp\1000006001\25bb638aac.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user~1\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\GHCGDAFCFH.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\HIDAAKEGDB.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://77.91.77.81/mine/amadka.exe
77.91.77.81
malicious
http://85.28.47.4/
unknown
malicious
http://77.91.77.82/Hun4Ko/index.php
77.91.77.82
malicious
http://85.28.47.4/69934896f997d5bb/softokn3.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/mozglue.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/nss3.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/vcruntime140.dll
85.28.47.4
malicious
http://77.91.77.82/
unknown
malicious
http://85.28.47.4/69934896f997d5bb/freebl3.dll
85.28.47.4
malicious
http://85.28.47.4/920475a59bac849d.php
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/sqlite3.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/msvcp140.dll
85.28.47.4
malicious
http://85.28.47.4
unknown
malicious
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
http://77.91.77.82/Hun4Ko/index.phpS
unknown
http://77.91.77.82/Hun4Ko/index.phpcp:
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://77.91.77.81/cost/go.exe
unknown
http://77.91.77.81/mine/amadka.exeOpera
unknown
http://77.91.77.81/mine/amadka.exeAm
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://77.91.77.82/Hun4Ko/index.php_
unknown
http://77.91.77.82/Hun4Ko/index.phpY
unknown
http://77.91.77.81/mine/amadka.exephprefoxrefox
unknown
http://77.91.77.81/stealc/random.exe50673b5d7
unknown
http://85.28.47.4M
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://77.91.77.82/Hun4Ko/index.phpPp5
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
http://www.sqlite.org/copyright.html.
unknown
http://77.91.77.81/mine/amadka.exe00
unknown
http://77.91.77.82/Hun4Ko/index.phpky
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://77.91.77.81/stealc/random.exe
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
http://77.91.77.81/cost/go.exe00
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://77.91.77.82/Hun4Ko/index.php1y
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://ac.ecopnacl
unknown
http://85.28.47.4/20475a59bac849d.php7
unknown
http://85.28.47.4/69934896f997d5bb/sqlite3.dllv
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://pki-ocsp.symauth.com0
unknown
http://77.91.77.82/Hun4Ko/index.phpi
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
http://77.91.77.82/Hun4Ko/index.phprp
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
http://77.91.77.81/mine/amadka.exe~
unknown
https://support.mozilla.org
unknown
http://77.91.77.82/Hun4Ko/index.phpApD
unknown
https://ac.ecop
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://77.91.77.82/Hun4Ko/index.phpu
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
There are 54 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
77.91.77.81
unknown
Russian Federation
malicious
85.28.47.4
unknown
Russian Federation
malicious
77.91.77.82
unknown
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
BF1000
unkown
page execute and read and write
malicious
CD1000
unkown
page execute and read and write
malicious
BF1000
unkown
page execute and read and write
malicious
4E70000
direct allocation
page read and write
malicious
1FC5000
heap
page read and write
malicious
53F0000
direct allocation
page read and write
malicious
671000
unkown
page execute and read and write
malicious
53F0000
direct allocation
page read and write
malicious
E41000
unkown
page execute and read and write
malicious
1C3E000
heap
page read and write
malicious
BF1000
unkown
page execute and read and write
malicious
48D0000
direct allocation
page read and write
malicious
6CCA1000
unkown
page execute read
1610000
direct allocation
page read and write
10AA000
unkown
page execute and write copy
5540000
direct allocation
page execute and read and write
23661000
heap
page read and write
5550000
direct allocation
page execute and read and write
208F000
heap
page read and write
2C37000
heap
page read and write
1626000
heap
page read and write
3FBF000
stack
page read and write
39BE000
stack
page read and write
323E000
stack
page read and write
5050000
direct allocation
page execute and read and write
3E7F000
stack
page read and write
33EE000
stack
page read and write
55C0000
direct allocation
page execute and read and write
107C000
unkown
page execute and write copy
3B50000
heap
page read and write
1151000
heap
page read and write
23650000
heap
page read and write
1710000
direct allocation
page read and write
325F000
stack
page read and write
4EAE000
stack
page read and write
347F000
stack
page read and write
23646000
heap
page read and write
670000
unkown
page read and write
387E000
stack
page read and write
1610000
direct allocation
page read and write
4F51000
heap
page read and write
20CB000
heap
page read and write
49D1000
heap
page read and write
490E000
stack
page read and write
23652000
heap
page read and write
55B0000
direct allocation
page execute and read and write
1060000
direct allocation
page read and write
1126000
heap
page read and write
113C000
stack
page read and write
4F51000
heap
page read and write
5030000
direct allocation
page execute and read and write
5570000
direct allocation
page execute and read and write
2B8E000
stack
page read and write
23660000
heap
page read and write
156D000
unkown
page execute and read and write
7AB000
heap
page read and write
4F53000
heap
page read and write
3679B000
stack
page read and write
10CE000
heap
page read and write
6780000
heap
page read and write
4F51000
heap
page read and write
321E000
stack
page read and write
1BC0000
heap
page read and write
61ED3000
direct allocation
page read and write
20C6000
heap
page read and write
3E0F000
stack
page read and write
2000000
heap
page read and write
23647000
heap
page read and write
4F51000
heap
page read and write
5A0000
direct allocation
page read and write
61ECD000
direct allocation
page readonly
1D38E000
stack
page read and write
6285000
heap
page read and write
1812000
unkown
page execute and read and write
BC0000
heap
page read and write
2364A000
heap
page read and write
3CAF000
stack
page read and write
5610000
direct allocation
page execute and read and write
EF5000
unkown
page execute and read and write
23650000
heap
page read and write
4F51000
heap
page read and write
3F94000
direct allocation
page execute and read and write
2807000
heap
page read and write
3BCE000
stack
page read and write
F0C000
unkown
page execute and read and write
4F2F000
stack
page read and write
1684000
heap
page read and write
5C4000
heap
page read and write
664E000
stack
page read and write
E00000
heap
page read and write
2364A000
heap
page read and write
3C6F000
stack
page read and write
1D24C000
stack
page read and write
3699C000
stack
page read and write
4F51000
heap
page read and write
5D7D000
stack
page read and write
46EE000
stack
page read and write
1D6C1000
heap
page read and write
4450000
heap
page read and write
2E3F000
stack
page read and write
BE0000
direct allocation
page read and write
2364D000
heap
page read and write
413E000
stack
page read and write
4BEE000
stack
page read and write
61E00000
direct allocation
page execute and read and write
4F51000
heap
page read and write
542C000
stack
page read and write
2C10000
heap
page read and write
2F922000
heap
page read and write
1610000
direct allocation
page read and write
1CE4F000
stack
page read and write
36CE000
stack
page read and write
4F60000
heap
page read and write
1BA0000
heap
page read and write
DFC000
stack
page read and write
112D000
heap
page read and write
1070000
heap
page read and write
1610000
direct allocation
page read and write
5540000
direct allocation
page execute and read and write
11D0000
heap
page read and write
4F51000
heap
page read and write
5A0000
direct allocation
page read and write
4CEF000
stack
page read and write
1CA4E000
stack
page read and write
2F4E000
stack
page read and write
114B000
heap
page read and write
342F000
stack
page read and write
2F87F000
stack
page read and write
332F000
stack
page read and write
5A0000
direct allocation
page read and write
4F51000
heap
page read and write
4A20000
direct allocation
page execute and read and write
E41000
unkown
page execute and write copy
1F60000
heap
page read and write
107A000
heap
page read and write
1650000
direct allocation
page read and write
4E2F000
stack
page read and write
27E0000
direct allocation
page execute and read and write
98B000
unkown
page execute and read and write
EC7000
unkown
page execute and read and write
4A50000
direct allocation
page execute and read and write
3ABF000
stack
page read and write
4AAE000
stack
page read and write
3DA0000
direct allocation
page execute and read and write
103C000
unkown
page execute and read and write
1D6C0000
trusted library allocation
page read and write
C52000
unkown
page execute and read and write
23669000
heap
page read and write
4F51000
heap
page read and write
40E3000
heap
page read and write
4F51000
heap
page read and write
DEA000
unkown
page execute and read and write
2C0C000
stack
page read and write
41F0000
heap
page read and write
4F51000
heap
page read and write
4F51000
heap
page read and write
C5B000
unkown
page execute and read and write
37AF000
stack
page read and write
4F50000
heap
page read and write
1112000
heap
page read and write
4451000
heap
page read and write
1610000
direct allocation
page read and write
35BF000
stack
page read and write
4F51000
heap
page read and write
42EF000
stack
page read and write
3A2E000
stack
page read and write
1212000
unkown
page execute and read and write
1D0BC000
stack
page read and write
4F51000
heap
page read and write
99F000
stack
page read and write
1684000
heap
page read and write
53E0000
direct allocation
page read and write
1060000
direct allocation
page read and write
4BAE000
stack
page read and write
EFE000
unkown
page execute and read and write
4FF0000
direct allocation
page execute and read and write
4F51000
heap
page read and write
239E000
stack
page read and write
F0C000
unkown
page execute and write copy
34BE000
stack
page read and write
6CCA0000
unkown
page readonly
5590000
direct allocation
page execute and read and write
4A0F000
stack
page read and write
1C00000
heap
page read and write
5020000
direct allocation
page execute and read and write
1740000
heap
page read and write
C5B000
unkown
page execute and read and write
5C4000
heap
page read and write
1FA0000
heap
page read and write
1CEBE000
stack
page read and write
55D0000
direct allocation
page execute and read and write
3DE4000
direct allocation
page execute and read and write
4F71000
heap
page read and write
671000
unkown
page execute and write copy
1F3E000
stack
page read and write
35FE000
stack
page read and write
47EF000
stack
page read and write
2366F000
heap
page read and write
B2A000
unkown
page execute and write copy
1060000
direct allocation
page read and write
222E000
stack
page read and write
23661000
heap
page read and write
4F51000
heap
page read and write
4A20000
direct allocation
page execute and read and write
BF0000
unkown
page readonly
2366F000
heap
page read and write
6286000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
98C000
unkown
page execute and write copy
23635000
heap
page read and write
1610000
direct allocation
page read and write
CA0000
heap
page read and write
4F51000
heap
page read and write
D76000
unkown
page execute and read and write
DEA000
unkown
page execute and read and write
456E000
stack
page read and write
1F75000
heap
page read and write
EF5000
unkown
page execute and read and write
1D5C0000
heap
page read and write
1684000
heap
page read and write
1060000
direct allocation
page read and write
496E000
stack
page read and write
2E0E000
stack
page read and write
1112000
heap
page read and write
1060000
direct allocation
page read and write
4A20000
direct allocation
page execute and read and write
406F000
stack
page read and write
1056000
unkown
page execute and read and write
1150000
heap
page read and write
6DB000
unkown
page execute and read and write
2364F000
heap
page read and write
CF4000
unkown
page execute and write copy
5451000
direct allocation
page read and write
113C000
stack
page read and write
4FAF000
stack
page read and write
41AE000
stack
page read and write
5284000
heap
page read and write
432E000
stack
page read and write
3DE4000
direct allocation
page execute and read and write
4F51000
heap
page read and write
2158000
heap
page read and write
5280000
heap
page read and write
5000000
direct allocation
page execute and read and write
14FD000
stack
page read and write
30BF000
stack
page read and write
1F70000
heap
page read and write
290F000
stack
page read and write
4F51000
heap
page read and write
5A0000
direct allocation
page read and write
98B000
unkown
page execute and write copy
10BE000
heap
page read and write
1FAA000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
5C4000
heap
page read and write
10CD000
heap
page read and write
3B6F000
stack
page read and write
53E0000
direct allocation
page read and write
5550000
direct allocation
page execute and read and write
872E000
stack
page read and write
2366F000
heap
page read and write
4F51000
heap
page read and write
1710000
direct allocation
page read and write
3F6E000
stack
page read and write
2364D000
heap
page read and write
366E000
stack
page read and write
5090000
direct allocation
page execute and read and write
5550000
direct allocation
page execute and read and write
3F90000
direct allocation
page execute and read and write
492E000
stack
page read and write
23644000
heap
page read and write
3A8E000
stack
page read and write
5B3E000
stack
page read and write
20D0000
heap
page read and write
7F450000
direct allocation
page execute and read and write
47EF000
stack
page read and write
4451000
heap
page read and write
2364D000
heap
page read and write
674F000
stack
page read and write
2364D000
heap
page read and write
5A0000
direct allocation
page read and write
23655000
heap
page read and write
107E000
heap
page read and write
3B80000
direct allocation
page execute and read and write
5ADE000
stack
page read and write
4FF0000
direct allocation
page execute and read and write
23660000
heap
page read and write
837C000
stack
page read and write
3D7E000
stack
page read and write
3260000
heap
page read and write
4F51000
heap
page read and write
2366F000
heap
page read and write
55A0000
direct allocation
page execute and read and write
23641000
heap
page read and write
23647000
heap
page read and write
3CCF000
stack
page read and write
BF0000
unkown
page readonly
4F51000
heap
page read and write
5040000
direct allocation
page execute and read and write
4B6F000
stack
page read and write
1610000
direct allocation
page read and write
154E000
heap
page read and write
6D2000
unkown
page execute and read and write
B6B000
stack
page read and write
358E000
stack
page read and write
4F51000
heap
page read and write
1660000
heap
page read and write
1500000
heap
page read and write
3F94000
direct allocation
page execute and read and write
4F51000
heap
page read and write
2364A000
heap
page read and write
BF1000
unkown
page execute and write copy
5580000
direct allocation
page execute and read and write
61E01000
direct allocation
page execute read
41CF000
stack
page read and write
416F000
stack
page read and write
6CD2E000
unkown
page read and write
1610000
direct allocation
page read and write
3E50000
direct allocation
page execute and read and write
DEA000
unkown
page execute and read and write
4F51000
heap
page read and write
57E000
stack
page read and write
5C0000
heap
page read and write
4F6F000
stack
page read and write
6DAE000
heap
page read and write
6CF1E000
unkown
page read and write
23660000
heap
page read and write
2364F000
heap
page read and write
5560000
direct allocation
page execute and read and write
5C4000
heap
page read and write
23669000
heap
page read and write
113E000
heap
page read and write
15A4000
heap
page read and write
23650000
heap
page read and write
1F77000
heap
page read and write
278E000
stack
page read and write
E1A000
unkown
page execute and read and write
1650000
direct allocation
page read and write
1C3A000
heap
page read and write
4F51000
heap
page read and write
4F51000
heap
page read and write
575E000
stack
page read and write
49C1000
heap
page read and write
3A2F000
stack
page read and write
3DEE000
direct allocation
page execute and read and write
23669000
heap
page read and write
1D0FD000
stack
page read and write
43BE000
stack
page read and write
D18000
unkown
page execute and read and write
10A8000
unkown
page execute and read and write
F07000
unkown
page execute and read and write
5590000
direct allocation
page execute and read and write
874B000
heap
page read and write
4F51000
heap
page read and write
2B8F000
stack
page read and write
4A20000
direct allocation
page execute and read and write
542E000
stack
page read and write
160E000
stack
page read and write
6D9000
unkown
page read and write
4A90000
direct allocation
page execute and read and write
199C000
heap
page read and write
2366F000
heap
page read and write
1060000
direct allocation
page read and write
1620000
heap
page read and write
1B3E000
stack
page read and write
3B8E000
stack
page read and write
670000
unkown
page readonly
193F000
stack
page read and write
390F000
stack
page read and write
2366F000
heap
page read and write
3F94000
direct allocation
page execute and read and write
40CE000
stack
page read and write
473F000
stack
page read and write
45FF000
stack
page read and write
1650000
direct allocation
page read and write
112E000
heap
page read and write
C59000
unkown
page write copy
380E000
stack
page read and write
23646000
heap
page read and write
1060000
direct allocation
page read and write
34EF000
stack
page read and write
4A6F000
stack
page read and write
4F51000
heap
page read and write
55E0000
direct allocation
page execute and read and write
46AE000
stack
page read and write
3DC0000
heap
page read and write
1DF3000
stack
page read and write
5A0000
direct allocation
page read and write
1730000
direct allocation
page execute and read and write
2366F000
heap
page read and write
F0B000
unkown
page execute and write copy
315E000
stack
page read and write
442F000
stack
page read and write
3655C000
stack
page read and write
B28000
unkown
page execute and read and write
2C8F000
stack
page read and write
37CF000
stack
page read and write
4F51000
heap
page read and write
373E000
stack
page read and write
430F000
stack
page read and write
E10000
heap
page read and write
4F51000
heap
page read and write
23655000
heap
page read and write
23655000
heap
page read and write
2E7E000
stack
page read and write
1124000
heap
page read and write
4F51000
heap
page read and write
10CE000
heap
page read and write
1684000
heap
page read and write
4F70000
heap
page read and write
3D10000
heap
page read and write
1650000
direct allocation
page read and write
55E0000
direct allocation
page execute and read and write
1577000
heap
page read and write
5560000
direct allocation
page execute and read and write
3CAE000
stack
page read and write
20E2000
heap
page read and write
40AE000
stack
page read and write
11C6000
unkown
page execute and read and write
4F71000
heap
page read and write
2800000
heap
page read and write
3D0E000
stack
page read and write
3A4F000
stack
page read and write
3F2E000
stack
page read and write
4A60000
direct allocation
page execute and read and write
10B4000
heap
page read and write
1DF8000
stack
page read and write
1F77000
heap
page read and write
4E00000
heap
page read and write
4F51000
heap
page read and write
C52000
unkown
page execute and read and write
466E000
stack
page read and write
408E000
stack
page read and write
10AA000
unkown
page execute and write copy
1610000
direct allocation
page read and write
650E000
stack
page read and write
EFA000
stack
page read and write
23666000
heap
page read and write
10EE000
heap
page read and write
170C000
stack
page read and write
4063000
heap
page read and write
2158000
heap
page read and write
259F000
stack
page read and write
47EE000
stack
page read and write
4F51000
heap
page read and write
23661000
heap
page read and write
2A8E000
stack
page read and write
4F51000
heap
page read and write
85EC000
stack
page read and write
14FD000
stack
page read and write
356E000
stack
page read and write
1B0000
heap
page read and write
589E000
stack
page read and write
344E000
stack
page read and write
23661000
heap
page read and write
5A0000
direct allocation
page read and write
1077000
unkown
page execute and write copy
1650000
direct allocation
page read and write
23643000
heap
page read and write
C59000
unkown
page read and write
44FE000
stack
page read and write
6CF1F000
unkown
page write copy
10A8000
unkown
page execute and read and write
318F000
stack
page read and write
3267000
heap
page read and write
2366E000
heap
page read and write
6320000
heap
page read and write
1D5C1000
heap
page read and write
362F000
stack
page read and write
23643000
heap
page read and write
C5B000
unkown
page execute and read and write
1C91000
heap
page read and write
6CF20000
unkown
page read and write
E64000
unkown
page execute and write copy
6CD41000
unkown
page execute read
4F51000
heap
page read and write
6CEDF000
unkown
page readonly
1610000
direct allocation
page read and write
3BFF000
stack
page read and write
5C4000
heap
page read and write
1D58D000
stack
page read and write
EF5000
unkown
page execute and read and write
107C000
unkown
page execute and read and write
4FE0000
direct allocation
page execute and read and write
4F51000
heap
page read and write
11AE000
stack
page read and write
151E000
heap
page read and write
4F51000
heap
page read and write
3DEE000
direct allocation
page execute and read and write
18FE000
stack
page read and write
5570000
direct allocation
page execute and read and write
5390000
trusted library allocation
page read and write
2019000
heap
page read and write
41AF000
stack
page read and write
4F71000
heap
page read and write
3F83000
direct allocation
page execute and read and write
3D20000
heap
page read and write
2366D000
heap
page read and write
4A20000
direct allocation
page execute and read and write
4A80000
direct allocation
page execute and read and write
5451000
direct allocation
page read and write
1650000
direct allocation
page read and write
452F000
stack
page read and write
6DB0000
heap
page read and write
7BB000
heap
page read and write
40AD000
stack
page read and write
3DE0000
direct allocation
page execute and read and write
2366F000
heap
page read and write
3F2F000
stack
page read and write
23650000
heap
page read and write
23654000
heap
page read and write
23636000
heap
page read and write
114B000
heap
page read and write
F20000
heap
page read and write
31CE000
stack
page read and write
3F84000
direct allocation
page execute and read and write
164E000
stack
page read and write
394E000
stack
page read and write
1650000
direct allocation
page read and write
BF1000
unkown
page execute and write copy
151A000
heap
page read and write
1812000
unkown
page execute and write copy
1C77000
heap
page read and write
EFE000
unkown
page execute and read and write
55F0000
direct allocation
page execute and read and write
2366F000
heap
page read and write
3DE4000
direct allocation
page execute and read and write
2137000
heap
page read and write
552F000
stack
page read and write
4F51000
heap
page read and write
4A2F000
stack
page read and write
1255000
unkown
page execute and read and write
1D04E000
stack
page read and write
1D5B0000
heap
page read and write
55C0000
direct allocation
page execute and read and write
8730000
heap
page read and write
408F000
stack
page read and write
442E000
stack
page read and write
53E0000
direct allocation
page read and write
27F0000
direct allocation
page execute and read and write
61EB7000
direct allocation
page readonly
5570000
direct allocation
page execute and read and write
599F000
stack
page read and write
5A0000
direct allocation
page read and write
EAC000
unkown
page execute and read and write
590000
heap
page read and write
326C000
heap
page read and write
20C8000
heap
page read and write
23646000
heap
page read and write
F25000
heap
page read and write
16A2000
unkown
page execute and write copy
5A0000
direct allocation
page read and write
174B000
heap
page read and write
1CE7F000
stack
page read and write
3A6E000
stack
page read and write
4E60000
direct allocation
page read and write
23660000
heap
page read and write
23643000
heap
page read and write
3B6E000
stack
page read and write
1124000
heap
page read and write
193E000
stack
page read and write
2373F000
heap
page read and write
5060000
direct allocation
page execute and read and write
4A10000
direct allocation
page execute and read and write
45AD000
stack
page read and write
427E000
stack
page read and write
53E000
stack
page read and write
41EE000
stack
page read and write
F0B000
unkown
page execute and write copy
5550000
direct allocation
page execute and read and write
38EF000
stack
page read and write
BBB000
stack
page read and write
6280000
heap
page read and write
23650000
heap
page read and write
3E4E000
stack
page read and write
3EBE000
stack
page read and write
1159000
heap
page read and write
660F000
stack
page read and write
42EE000
stack
page read and write
36FF000
stack
page read and write
23650000
heap
page read and write
23660000
heap
page read and write
14C000
stack
page read and write
49EF000
stack
page read and write
38EE000
stack
page read and write
1060000
direct allocation
page read and write
4E10000
trusted library allocation
page read and write
23650000
heap
page read and write
5010000
direct allocation
page execute and read and write
1684000
heap
page read and write
274F000
stack
page read and write
2126000
heap
page read and write
1FEC000
heap
page read and write
4F51000
heap
page read and write
23649000
heap
page read and write
5A0000
direct allocation
page read and write
4F51000
heap
page read and write
5C4000
heap
page read and write
BF0000
unkown
page readonly
4E2E000
stack
page read and write
3DD4000
direct allocation
page execute and read and write
1759000
heap
page read and write
1CA7F000
stack
page read and write
5C4000
heap
page read and write
366F000
stack
page read and write
2C30000
heap
page read and write
E5C000
unkown
page execute and write copy
20D9000
heap
page read and write
4A6E000
stack
page read and write
F0C000
unkown
page execute and write copy
39D0000
direct allocation
page execute and read and write
1552000
heap
page read and write
F0B000
unkown
page execute and write copy
1610000
direct allocation
page read and write
42AF000
stack
page read and write
2F928000
heap
page read and write
3F94000
direct allocation
page execute and read and write
11A0000
heap
page read and write
4F51000
heap
page read and write
1060000
direct allocation
page read and write
31DF000
stack
page read and write
38AF000
stack
page read and write
2A4E000
stack
page read and write
3DEE000
stack
page read and write
5080000
direct allocation
page execute and read and write
5C4000
heap
page read and write
47BF000
stack
page read and write
BDE000
stack
page read and write
1650000
direct allocation
page read and write
3F50000
direct allocation
page execute and read and write
4F51000
heap
page read and write
1650000
direct allocation
page read and write
3B2F000
stack
page read and write
4F51000
heap
page read and write
383F000
stack
page read and write
BF1000
unkown
page execute and write copy
4F70000
heap
page read and write
5F7D000
stack
page read and write
4F51000
heap
page read and write
1610000
direct allocation
page read and write
4F51000
heap
page read and write
F0C000
unkown
page execute and write copy
23650000
heap
page read and write
3BAE000
stack
page read and write
47AF000
stack
page read and write
421E000
stack
page read and write
7A0000
heap
page read and write
23635000
heap
page read and write
4F51000
heap
page read and write
EA0000
unkown
page execute and read and write
4F51000
heap
page read and write
444F000
stack
page read and write
4E6E000
stack
page read and write
7C6000
heap
page read and write
492F000
stack
page read and write
6CF25000
unkown
page readonly
4F51000
heap
page read and write
4451000
heap
page read and write
5C7E000
stack
page read and write
1D5C1000
heap
page read and write
23650000
heap
page read and write
23667000
heap
page read and write
1D44F000
stack
page read and write
10E5000
unkown
page execute and read and write
1CC7E000
stack
page read and write
446E000
stack
page read and write
4CAF000
stack
page read and write
86A000
unkown
page execute and read and write
1E00000
direct allocation
page execute and read and write
4931000
direct allocation
page read and write
33AF000
stack
page read and write
5A0000
direct allocation
page read and write
4AC0000
direct allocation
page execute and read and write
1F80000
heap
page read and write
11A0000
heap
page read and write
10AA000
unkown
page execute and write copy
5C4000
heap
page read and write
4A70000
direct allocation
page execute and read and write
4F51000
heap
page read and write
2366C000
heap
page read and write
1158000
heap
page read and write
304F000
stack
page read and write
169F000
unkown
page execute and write copy
5570000
direct allocation
page execute and read and write
423F000
stack
page read and write
23668000
heap
page read and write
862D000
stack
page read and write
16A2000
unkown
page execute and read and write
79F000
stack
page read and write
1C84F000
stack
page read and write
1610000
direct allocation
page read and write
3DD0000
heap
page read and write
3D8E000
stack
page read and write
1112000
heap
page read and write
1970000
heap
page read and write
23660000
heap
page read and write
4FD000
stack
page read and write
420E000
stack
page read and write
30FE000
stack
page read and write
C59000
unkown
page write copy
4F51000
heap
page read and write
337E000
stack
page read and write
4F51000
heap
page read and write
482E000
stack
page read and write
1E0000
heap
page read and write
BF0000
unkown
page read and write
5530000
direct allocation
page execute and read and write
4F51000
heap
page read and write
9AB000
stack
page read and write
3D0E000
stack
page read and write
477E000
stack
page read and write
3B4E000
stack
page read and write
5570000
direct allocation
page execute and read and write
585F000
stack
page read and write
23662000
heap
page read and write
3F8E000
stack
page read and write
1CA9000
heap
page read and write
402F000
stack
page read and write
2366F000
heap
page read and write
23657000
heap
page read and write
10ED000
heap
page read and write
3C3E000
stack
page read and write
2364F000
heap
page read and write
1650000
direct allocation
page read and write
1124000
heap
page read and write
5C3F000
stack
page read and write
53CC000
stack
page read and write
23648000
heap
page read and write
61EB4000
direct allocation
page read and write
1B7E000
stack
page read and write
1077000
unkown
page execute and read and write
397F000
stack
page read and write
84EC000
stack
page read and write
6DA0000
heap
page read and write
40CE000
stack
page read and write
1CC4F000
stack
page read and write
4F51000
heap
page read and write
4F51000
heap
page read and write
3DEF000
stack
page read and write
EC7000
unkown
page execute and read and write
36AE000
stack
page read and write
CEC000
unkown
page execute and write copy
4FD0000
direct allocation
page execute and read and write
552F000
stack
page read and write
55F0000
direct allocation
page execute and read and write
F0B000
unkown
page execute and read and write
2F919000
heap
page read and write
39EF000
stack
page read and write
6CD40000
unkown
page readonly
4CEE000
stack
page read and write
3DE4000
direct allocation
page execute and read and write
64CF000
stack
page read and write
E40000
unkown
page readonly
1980000
direct allocation
page execute and read and write
4F51000
heap
page read and write
2364D000
heap
page read and write
EF5000
unkown
page execute and read and write
1650000
direct allocation
page read and write
340F000
stack
page read and write
CD0000
unkown
page readonly
4890000
trusted library allocation
page read and write
354F000
stack
page read and write
2F921000
heap
page read and write
5C4000
heap
page read and write
402E000
stack
page read and write
EC7000
unkown
page execute and read and write
7F960000
direct allocation
page execute and read and write
1125000
heap
page read and write
4F51000
heap
page read and write
3F4F000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
13FD000
unkown
page execute and read and write
1990000
heap
page read and write
6CD1D000
unkown
page readonly
392E000
stack
page read and write
16CE000
stack
page read and write
947000
unkown
page execute and read and write
1BD0000
direct allocation
page execute and read and write
1060000
direct allocation
page read and write
40E0000
heap
page read and write
3B0E000
stack
page read and write
5550000
direct allocation
page execute and read and write
3B70000
heap
page read and write
6D9000
unkown
page write copy
3FFE000
stack
page read and write
55A0000
direct allocation
page execute and read and write
1650000
direct allocation
page read and write
437F000
stack
page read and write
4FF0000
direct allocation
page execute and read and write
15C0000
heap
page read and write
4F51000
heap
page read and write
3DE4000
direct allocation
page execute and read and write
4AA0000
direct allocation
page execute and read and write
2FBE000
stack
page read and write
4F51000
heap
page read and write
571B000
stack
page read and write
5A0000
direct allocation
page read and write
11B0000
heap
page read and write
10A8000
unkown
page execute and read and write
434E000
stack
page read and write
2BCE000
stack
page read and write
48BE000
stack
page read and write
206F000
heap
page read and write
1124000
heap
page read and write
202E000
stack
page read and write
37EE000
stack
page read and write
5070000
direct allocation
page execute and read and write
2F91A000
heap
page read and write
487F000
stack
page read and write
4BAF000
stack
page read and write
3F9E000
direct allocation
page execute and read and write
BF0000
unkown
page read and write
352E000
stack
page read and write
2366F000
heap
page read and write
4F51000
heap
page read and write
23636000
heap
page read and write
23654000
heap
page read and write
1060000
direct allocation
page read and write
23661000
heap
page read and write
BF0000
unkown
page read and write
27CE000
stack
page read and write
F07000
unkown
page execute and write copy
3CCE000
stack
page read and write
113A000
heap
page read and write
3DE4000
direct allocation
page execute and read and write
32CF000
stack
page read and write
1C87F000
stack
page read and write
1060000
direct allocation
page read and write
F30000
heap
page read and write
20AF000
heap
page read and write
23636000
heap
page read and write
3F94000
direct allocation
page execute and read and write
376F000
stack
page read and write
1650000
direct allocation
page read and write
49C0000
heap
page read and write
2364D000
heap
page read and write
1115000
heap
page read and write
1684000
heap
page read and write
4E60000
direct allocation
page read and write
1710000
direct allocation
page read and write
6DB0000
heap
page read and write
53B0000
trusted library allocation
page read and write
BE0000
direct allocation
page read and write
40FF000
stack
page read and write
15C8000
heap
page read and write
BE0000
direct allocation
page read and write
5600000
direct allocation
page execute and read and write
E40000
unkown
page readonly
1510000
heap
page read and write
5A0000
direct allocation
page read and write
63CE000
stack
page read and write
23649000
heap
page read and write
4F51000
heap
page read and write
4060000
heap
page read and write
1010000
heap
page read and write
DF7000
stack
page read and write
4F30000
heap
page read and write
5580000
direct allocation
page execute and read and write
5550000
direct allocation
page execute and read and write
413E000
stack
page read and write
1D2FD000
stack
page read and write
4F51000
heap
page read and write
23636000
heap
page read and write
11AC000
unkown
page execute and read and write
1060000
direct allocation
page read and write
4F51000
heap
page read and write
10FA000
heap
page read and write
5570000
direct allocation
page execute and read and write
ED1000
unkown
page execute and read and write
32AC000
stack
page read and write
1133000
heap
page read and write
352F000
stack
page read and write
6DA1000
heap
page read and write
23660000
heap
page read and write
3EEF000
stack
page read and write
EFE000
unkown
page execute and read and write
4D2E000
stack
page read and write
12AF000
stack
page read and write
4F51000
heap
page read and write
1680000
heap
page read and write
1060000
direct allocation
page read and write
4F51000
heap
page read and write
1650000
direct allocation
page read and write
4F51000
heap
page read and write
5570000
direct allocation
page execute and read and write
3F9E000
direct allocation
page execute and read and write
49BF000
stack
page read and write
23650000
heap
page read and write
975000
unkown
page execute and read and write
8140000
heap
page read and write
37AE000
stack
page read and write
4A30000
direct allocation
page execute and read and write
4DEF000
stack
page read and write
463E000
stack
page read and write
4A20000
direct allocation
page execute and read and write
5EBC000
stack
page read and write
97E000
unkown
page execute and read and write
19FE000
stack
page read and write
3675C000
stack
page read and write
4F51000
heap
page read and write
1C30000
heap
page read and write
55D0000
direct allocation
page execute and read and write
2F880000
trusted library allocation
page read and write
40ED000
stack
page read and write
55B0000
direct allocation
page execute and read and write
2364F000
heap
page read and write
1684000
heap
page read and write
1610000
direct allocation
page read and write
180F000
unkown
page execute and write copy
5DBE000
stack
page read and write
4F51000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
49BF000
stack
page read and write
61ED4000
direct allocation
page readonly
4F51000
heap
page read and write
48EF000
stack
page read and write
3DAF000
stack
page read and write
C59000
unkown
page read and write
F0B000
unkown
page execute and read and write
46AF000
stack
page read and write
308E000
stack
page read and write
4F51000
heap
page read and write
4F51000
heap
page read and write
1065000
unkown
page execute and read and write
1C7D000
heap
page read and write
1684000
heap
page read and write
607E000
stack
page read and write
5C4000
heap
page read and write
3220000
heap
page read and write
2D3F000
stack
page read and write
2A0F000
stack
page read and write
23656000
heap
page read and write
6CD32000
unkown
page readonly
C52000
unkown
page execute and read and write
2366E000
heap
page read and write
59DE000
stack
page read and write
1DFC000
stack
page read and write
C59000
unkown
page write copy
2364A000
heap
page read and write
20DD000
heap
page read and write
1C06000
heap
page read and write
61ED0000
direct allocation
page read and write
406E000
stack
page read and write
1594000
heap
page read and write
61ECC000
direct allocation
page read and write
1150000
heap
page read and write
23650000
heap
page read and write
4F51000
heap
page read and write
827C000
stack
page read and write
4F51000
heap
page read and write
2366A000
heap
page read and write
4ED1000
direct allocation
page read and write
4F51000
heap
page read and write
3DD3000
direct allocation
page execute and read and write
3CEE000
stack
page read and write
23668000
heap
page read and write
4220000
heap
page read and write
5A0000
direct allocation
page read and write
3F94000
direct allocation
page execute and read and write
2F7F000
stack
page read and write
F0B000
unkown
page execute and read and write
23647000
heap
page read and write
4F51000
heap
page read and write
3DE4000
direct allocation
page execute and read and write
5550000
direct allocation
page execute and read and write
3D3F000
stack
page read and write
4E60000
direct allocation
page read and write
31FF000
stack
page read and write
C59000
unkown
page read and write
330E000
stack
page read and write
4FC0000
direct allocation
page execute and read and write
1684000
heap
page read and write
2364A000
heap
page read and write
5C4000
heap
page read and write
4A40000
direct allocation
page execute and read and write
CD0000
unkown
page readonly
2CCE000
stack
page read and write
43EF000
stack
page read and write
1FAE000
heap
page read and write
368F000
stack
page read and write
CD1000
unkown
page execute and write copy
10A2000
unkown
page execute and read and write
3AFE000
stack
page read and write
3227000
heap
page read and write
4F51000
heap
page read and write
2DCF000
stack
page read and write
2B4F000
stack
page read and write
333F000
stack
page read and write
3FCE000
stack
page read and write
2F0F000
stack
page read and write
3E2E000
stack
page read and write
2F67E000
stack
page read and write
F0C000
unkown
page execute and write copy
3F94000
direct allocation
page execute and read and write
44BF000
stack
page read and write
456F000
stack
page read and write
There are 985 hidden memdumps, click here to show them.