IOC Report
1jPL5zru3u.exe

loading gif

Files

File Path
Type
Category
Malicious
1jPL5zru3u.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\amadka[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\CAEHDBAAEC.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AKJEGCFBGDHJJJJJKJECFCFCAA
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\DBKFHCFBGIIJKFHJDHDH
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\DGDBKFBAKFBFHIECFBFI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DGHDHIDGHIDGIECBKKJJJEHCFC
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GCGHJEBG
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\IIJDBAKKKFBFHIDGIIEH
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JJKEBGHJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KKFBAAFCGIEGDHIEBFIIECAAKF
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\explorti.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 18 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1jPL5zru3u.exe
"C:\Users\user\Desktop\1jPL5zru3u.exe"
malicious
C:\Users\user\AppData\Local\Temp\CAEHDBAAEC.exe
"C:\Users\user\AppData\Local\Temp\CAEHDBAAEC.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
"C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\CAEHDBAAEC.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\FHJKKECFIE.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://77.91.77.81/mine/amadka.exe
77.91.77.81
malicious
http://77.91.77.82/Hun4Ko/index.php
77.91.77.82
malicious
http://85.28.47.4/69934896f997d5bb/softokn3.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/mozglue.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/nss3.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/vcruntime140.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/freebl3.dll
85.28.47.4
malicious
http://85.28.47.4/920475a59bac849d.php
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/sqlite3.dll
85.28.47.4
malicious
85.28.47.4/920475a59bac849d.php
malicious
http://85.28.47.4/69934896f997d5bb/msvcp140.dll
85.28.47.4
malicious
http://85.28.47.4
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://duckduckgo.com/ac/?q=
unknown
http://77.91.77.81/cost/go.exe
unknown
http://77.91.77.82/Hun4Ko/index.phpO
unknown
http://77.91.77.82/Hun4Ko/index.phpI
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
http://77.91.77.82/Hun4Ko/index.phpE
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
http://85.28.47.4/69934896f997d5bb/softokn3.dll9
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://77.91.77.82/Hun4Ko/index.phpY
unknown
http://77.91.77.82/Hun4Ko/index.php/Hun4Ko/index.phpsJ0
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17chost.exe
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016.exe
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://www.sqlite.org/copyright.html.
unknown
http://77.91.77.81/mine/amadka.exe-Disposition:
unknown
http://77.91.77.82/Hun4Ko/index.php6
unknown
http://77.91.77.81/mine/amadka.exe00
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://77.91.77.81/cost/go.exeData
unknown
http://77.91.77.81/cost/go.exe00
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://upx.sf.net
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://85.28.47.4/920475a59bac849d.phpi
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://77.91.77.82/Hun4Ko/index.phpq
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://pki-ocsp.symauth.com0
unknown
http://77.91.77.82/Hun4Ko/index.phpg
unknown
http://77.91.77.82/Hun4Ko/index.phpe
unknown
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://77.91.77.82/Hun4Ko/index.phpx
unknown
There are 48 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
77.91.77.81
unknown
Russian Federation
malicious
85.28.47.4
unknown
Russian Federation
malicious
77.91.77.82
unknown
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4BB0000
direct allocation
page read and write
malicious
4CE0000
direct allocation
page read and write
malicious
531000
unkown
page execute and read and write
malicious
BA1000
unkown
page execute and read and write
malicious
CB1000
unkown
page execute and read and write
malicious
19F4000
heap
page read and write
malicious
BA1000
unkown
page execute and read and write
malicious
4850000
direct allocation
page read and write
malicious
4A10000
direct allocation
page read and write
malicious
BA1000
unkown
page execute and read and write
malicious
1B00000
heap
page read and write
4B70000
trusted library allocation
page read and write
3ADE000
stack
page read and write
3FDE000
stack
page read and write
4571000
heap
page read and write
BA0000
unkown
page readonly
411E000
stack
page read and write
230A6000
heap
page read and write
2A9F000
stack
page read and write
EB9000
unkown
page execute and write copy
DAD000
heap
page read and write
3C24000
direct allocation
page execute and read and write
4A4B000
stack
page read and write
4571000
heap
page read and write
4D20000
direct allocation
page execute and read and write
462E000
stack
page read and write
EEC000
unkown
page execute and write copy
DC0000
heap
page read and write
B84000
heap
page read and write
336E000
stack
page read and write
B84000
heap
page read and write
D92000
heap
page read and write
4571000
heap
page read and write
3E5E000
stack
page read and write
1A49000
heap
page read and write
3EDE000
stack
page read and write
10E0000
direct allocation
page read and write
B80000
direct allocation
page read and write
3E6E000
stack
page read and write
43C1000
heap
page read and write
2BEE000
stack
page read and write
3B3F000
stack
page read and write
230D7000
heap
page read and write
2AAB000
stack
page read and write
43C1000
heap
page read and write
403F000
stack
page read and write
C09000
unkown
page write copy
C09000
unkown
page read and write
B84000
heap
page read and write
2C3F000
stack
page read and write
EBA000
unkown
page execute and write copy
230B3000
heap
page read and write
1A9D000
heap
page read and write
61E00000
direct allocation
page execute and read and write
68DE000
heap
page read and write
3FCE000
stack
page read and write
8FD000
stack
page read and write
109E000
stack
page read and write
470000
heap
page read and write
6C3C0000
unkown
page readonly
894000
heap
page read and write
43C1000
heap
page read and write
4A30000
direct allocation
page execute and read and write
B84000
heap
page read and write
A74000
heap
page read and write
293A8000
heap
page read and write
230BD000
heap
page read and write
1D13D000
heap
page read and write
19DE000
heap
page read and write
417E000
stack
page read and write
2C5F000
stack
page read and write
3D1F000
stack
page read and write
4C00000
direct allocation
page execute and read and write
4571000
heap
page read and write
4571000
heap
page read and write
1AEF000
heap
page read and write
1D02D000
stack
page read and write
B80000
direct allocation
page read and write
4571000
heap
page read and write
4571000
heap
page read and write
49B0000
direct allocation
page execute and read and write
1C62F000
stack
page read and write
4BA0000
direct allocation
page execute and read and write
1058000
unkown
page execute and read and write
13DF000
unkown
page execute and read and write
600000
heap
page read and write
4560000
direct allocation
page read and write
43C1000
heap
page read and write
101C000
unkown
page execute and read and write
B87000
heap
page read and write
43C1000
heap
page read and write
1FA000
stack
page read and write
386E000
stack
page read and write
4571000
heap
page read and write
349E000
stack
page read and write
322E000
stack
page read and write
230DA000
heap
page read and write
2D5F000
stack
page read and write
317E000
stack
page read and write
894000
heap
page read and write
1E9E000
stack
page read and write
385E000
stack
page read and write
B3C000
stack
page read and write
4DE000
stack
page read and write
4EC0000
direct allocation
page execute and read and write
77A000
heap
page read and write
43C1000
heap
page read and write
1967000
heap
page read and write
770000
heap
page read and write
10E0000
direct allocation
page read and write
4560000
direct allocation
page read and write
287F000
stack
page read and write
D9E000
heap
page read and write
230DD000
heap
page read and write
323F000
stack
page read and write
297F000
stack
page read and write
2ABF000
stack
page read and write
D97000
heap
page read and write
B70000
direct allocation
page read and write
1036000
unkown
page execute and read and write
4571000
heap
page read and write
EAA000
unkown
page execute and read and write
68E0000
heap
page read and write
3FEE000
stack
page read and write
2B20000
direct allocation
page read and write
3D2F000
stack
page read and write
43C1000
heap
page read and write
1B48000
heap
page read and write
56C000
stack
page read and write
CCE000
stack
page read and write
1D031000
heap
page read and write
3EFE000
stack
page read and write
363E000
stack
page read and write
43C1000
heap
page read and write
B84000
heap
page read and write
427F000
stack
page read and write
A74000
heap
page read and write
2F6F000
stack
page read and write
4571000
heap
page read and write
6C640000
unkown
page read and write
D9D000
unkown
page execute and read and write
4571000
heap
page read and write
230D5000
heap
page read and write
359F000
stack
page read and write
3EAE000
stack
page read and write
EB9000
unkown
page execute and read and write
1058000
unkown
page execute and read and write
43C1000
heap
page read and write
43C1000
heap
page read and write
4560000
direct allocation
page read and write
C09000
unkown
page read and write
230C2000
heap
page read and write
34AE000
stack
page read and write
68D0000
heap
page read and write
43C1000
heap
page read and write
49D0000
direct allocation
page execute and read and write
B70000
direct allocation
page read and write
230BC000
heap
page read and write
B70000
direct allocation
page read and write
A74000
heap
page read and write
3C2E000
direct allocation
page execute and read and write
4571000
heap
page read and write
4570000
heap
page read and write
4E40000
direct allocation
page execute and read and write
43C1000
heap
page read and write
407E000
stack
page read and write
A74000
heap
page read and write
4E40000
direct allocation
page execute and read and write
4571000
heap
page read and write
77E000
heap
page read and write
4571000
heap
page read and write
B84000
heap
page read and write
EE7000
unkown
page execute and read and write
10E0000
direct allocation
page read and write
43C1000
heap
page read and write
327F000
stack
page read and write
1ADC000
heap
page read and write
BFC000
stack
page read and write
4571000
heap
page read and write
B84000
heap
page read and write
4571000
heap
page read and write
EA2000
unkown
page execute and read and write
CD4000
unkown
page execute and write copy
EBA000
unkown
page execute and write copy
28FF000
stack
page read and write
4571000
heap
page read and write
6C44E000
unkown
page read and write
230B3000
heap
page read and write
230BA000
heap
page read and write
4861000
heap
page read and write
230BA000
heap
page read and write
3CBE000
stack
page read and write
3E9E000
stack
page read and write
3AEE000
stack
page read and write
4571000
heap
page read and write
4A71000
direct allocation
page read and write
3840000
direct allocation
page execute and read and write
D80000
heap
page read and write
B84000
heap
page read and write
3F50000
trusted library allocation
page read and write
B84000
heap
page read and write
3D6D000
stack
page read and write
230BD000
heap
page read and write
809000
heap
page read and write
4571000
heap
page read and write
4560000
direct allocation
page read and write
4BE0000
direct allocation
page execute and read and write
B84000
heap
page read and write
61ED0000
direct allocation
page read and write
443E000
stack
page read and write
230DA000
heap
page read and write
4560000
direct allocation
page read and write
605E000
stack
page read and write
10E0000
direct allocation
page read and write
A74000
heap
page read and write
C02000
unkown
page execute and read and write
4B70000
direct allocation
page execute and read and write
7F9000
heap
page read and write
2D7F000
stack
page read and write
2B3E000
stack
page read and write
4D60000
direct allocation
page execute and read and write
43C1000
heap
page read and write
AC0000
heap
page read and write
3B3E000
stack
page read and write
449F000
stack
page read and write
4D40000
direct allocation
page execute and read and write
403E000
stack
page read and write
230C0000
heap
page read and write
7F530000
direct allocation
page execute and read and write
377F000
stack
page read and write
1100000
heap
page read and write
4E90000
direct allocation
page execute and read and write
4DC0000
direct allocation
page execute and read and write
6C460000
unkown
page readonly
592000
unkown
page execute and read and write
230CF000
heap
page read and write
2EBE000
stack
page read and write
B80000
direct allocation
page read and write
3B50000
heap
page read and write
4FBF000
stack
page read and write
35FF000
stack
page read and write
43C1000
heap
page read and write
7EAC000
stack
page read and write
3C24000
direct allocation
page execute and read and write
43C1000
heap
page read and write
19DA000
heap
page read and write
B84000
heap
page read and write
230DD000
heap
page read and write
230BD000
heap
page read and write
B84000
heap
page read and write
BA0000
unkown
page read and write
43C1000
heap
page read and write
3E13000
heap
page read and write
9E6000
unkown
page execute and read and write
3E5F000
stack
page read and write
230D0000
heap
page read and write
43C1000
heap
page read and write
1AF4000
heap
page read and write
4B80000
heap
page read and write
277F000
stack
page read and write
1960000
heap
page read and write
DAA000
heap
page read and write
52D000
stack
page read and write
2940000
direct allocation
page read and write
43C1000
heap
page read and write
43C1000
heap
page read and write
43C1000
heap
page read and write
BF2000
stack
page read and write
3E10000
heap
page read and write
4571000
heap
page read and write
230DD000
heap
page read and write
601F000
stack
page read and write
5C96000
heap
page read and write
2960000
heap
page read and write
43C1000
heap
page read and write
B70000
direct allocation
page read and write
230CF000
heap
page read and write
B84000
heap
page read and write
3C24000
direct allocation
page execute and read and write
A74000
heap
page read and write
B80000
heap
page read and write
126E000
stack
page read and write
43C1000
heap
page read and write
1AE6000
heap
page read and write
498F000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
4571000
heap
page read and write
563E000
stack
page read and write
3DFE000
stack
page read and write
B84000
heap
page read and write
4A60000
direct allocation
page execute and read and write
230C0000
heap
page read and write
43C1000
heap
page read and write
B1E000
stack
page read and write
7EEE000
stack
page read and write
1900000
direct allocation
page execute and read and write
4E20000
direct allocation
page execute and read and write
230CF000
heap
page read and write
43C1000
heap
page read and write
B84000
heap
page read and write
4731000
heap
page read and write
10E0000
direct allocation
page read and write
4571000
heap
page read and write
4B4F000
stack
page read and write
49E0000
direct allocation
page execute and read and write
43C1000
heap
page read and write
2FAE000
stack
page read and write
4A20000
direct allocation
page execute and read and write
44AF000
stack
page read and write
34BF000
stack
page read and write
230C0000
heap
page read and write
B70000
direct allocation
page read and write
3C14000
direct allocation
page execute and read and write
33FE000
stack
page read and write
4D70000
direct allocation
page execute and read and write
C8F000
stack
page read and write
61EB7000
direct allocation
page readonly
29BE000
stack
page read and write
4B84000
heap
page read and write
371E000
stack
page read and write
230D1000
heap
page read and write
3FAF000
stack
page read and write
43C1000
heap
page read and write
1059000
unkown
page execute and write copy
4571000
heap
page read and write
B60000
heap
page read and write
815C000
stack
page read and write
345F000
stack
page read and write
1057000
unkown
page execute and write copy
529D000
stack
page read and write
B70000
direct allocation
page read and write
4840000
direct allocation
page read and write
3C3F000
stack
page read and write
230DD000
heap
page read and write
539D000
stack
page read and write
D3F000
heap
page read and write
43C1000
heap
page read and write
230CF000
heap
page read and write
395F000
stack
page read and write
D9D000
unkown
page execute and read and write
1684000
unkown
page execute and write copy
44EE000
stack
page read and write
48B1000
direct allocation
page read and write
43C1000
heap
page read and write
4C30000
direct allocation
page execute and read and write
43C1000
heap
page read and write
A74000
heap
page read and write
43C1000
heap
page read and write
EAA000
unkown
page execute and read and write
42FE000
stack
page read and write
615F000
stack
page read and write
5EDF000
stack
page read and write
4560000
direct allocation
page read and write
43C1000
heap
page read and write
ED5000
unkown
page execute and read and write
BA0000
unkown
page read and write
4E40000
direct allocation
page execute and read and write
4590000
heap
page read and write
1A2D000
heap
page read and write
4571000
heap
page read and write
7C72000
heap
page read and write
B70000
heap
page read and write
6C452000
unkown
page readonly
2FFE000
stack
page read and write
4571000
heap
page read and write
531000
unkown
page execute and write copy
890000
heap
page read and write
2BAF000
stack
page read and write
4C20000
direct allocation
page execute and read and write
33BE000
stack
page read and write
230C0000
heap
page read and write
3BDF000
stack
page read and write
B84000
heap
page read and write
D30000
heap
page read and write
4B90000
direct allocation
page execute and read and write
D95000
heap
page read and write
230C0000
heap
page read and write
3D1E000
stack
page read and write
D80000
heap
page read and write
2E7F000
stack
page read and write
35AF000
stack
page read and write
230D4000
heap
page read and write
1CE2C000
stack
page read and write
DC0000
heap
page read and write
4571000
heap
page read and write
230D9000
heap
page read and write
4571000
heap
page read and write
D95000
heap
page read and write
4840000
direct allocation
page read and write
43C1000
heap
page read and write
B84000
heap
page read and write
43C1000
heap
page read and write
4571000
heap
page read and write
3C24000
direct allocation
page execute and read and write
4540000
heap
page read and write
37BE000
stack
page read and write
4571000
heap
page read and write
19AE000
stack
page read and write
894000
heap
page read and write
1B5A000
heap
page read and write
230D9000
heap
page read and write
40EF000
stack
page read and write
43C1000
heap
page read and write
1AFA000
heap
page read and write
1126000
heap
page read and write
4571000
heap
page read and write
29FF000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
B84000
heap
page read and write
3AAF000
stack
page read and write
2BFF000
stack
page read and write
230BB000
heap
page read and write
4E1F000
stack
page read and write
230A6000
heap
page read and write
68E0000
heap
page read and write
4560000
direct allocation
page read and write
3EBF000
stack
page read and write
5D0000
heap
page read and write
2930F000
stack
page read and write
EBA000
unkown
page execute and write copy
4560000
direct allocation
page read and write
75D000
stack
page read and write
2B40000
direct allocation
page execute and read and write
4D00000
direct allocation
page execute and read and write
45EF000
stack
page read and write
2967000
heap
page read and write
CF8000
unkown
page execute and read and write
BA1000
unkown
page execute and write copy
43C1000
heap
page read and write
D80000
heap
page read and write
B70000
direct allocation
page read and write
4BB0000
direct allocation
page execute and read and write
1056000
unkown
page execute and read and write
1AED000
heap
page read and write
CB1000
unkown
page execute and write copy
453F000
stack
page read and write
68D1000
heap
page read and write
34FE000
stack
page read and write
43C1000
heap
page read and write
41BE000
stack
page read and write
106A000
unkown
page execute and read and write
230D4000
heap
page read and write
230C2000
heap
page read and write
B84000
heap
page read and write
2B1E000
stack
page read and write
3A40000
direct allocation
page execute and read and write
2DBE000
stack
page read and write
4B90000
direct allocation
page execute and read and write
1CA2F000
stack
page read and write
43C1000
heap
page read and write
230BD000
heap
page read and write
43C1000
heap
page read and write
377E000
stack
page read and write
4571000
heap
page read and write
3C20000
direct allocation
page execute and read and write
38BE000
stack
page read and write
8EB000
heap
page read and write
43C1000
heap
page read and write
10E0000
direct allocation
page read and write
4571000
heap
page read and write
43C1000
heap
page read and write
8E0000
heap
page read and write
363F000
stack
page read and write
436F000
stack
page read and write
4571000
heap
page read and write
4E40000
direct allocation
page execute and read and write
36DF000
stack
page read and write
293B1000
heap
page read and write
894000
heap
page read and write
2F9E000
stack
page read and write
230A7000
heap
page read and write
39D000
stack
page read and write
D5C000
heap
page read and write
10E0000
direct allocation
page read and write
B70000
direct allocation
page read and write
382F000
stack
page read and write
B5C000
stack
page read and write
230D9000
heap
page read and write
33BF000
stack
page read and write
4731000
heap
page read and write
C4E000
stack
page read and write
BA0000
unkown
page read and write
D95000
heap
page read and write
45DF000
stack
page read and write
10E0000
direct allocation
page read and write
230D8000
heap
page read and write
43C1000
heap
page read and write
9E9000
unkown
page execute and write copy
CCC000
unkown
page execute and write copy
38BF000
stack
page read and write
1056000
unkown
page execute and read and write
1057000
unkown
page execute and write copy
D3E000
heap
page read and write
43C1000
heap
page read and write
3D5E000
stack
page read and write
4E40000
direct allocation
page execute and read and write
19D0000
heap
page read and write
2E2F000
stack
page read and write
4840000
direct allocation
page read and write
4ED0000
direct allocation
page execute and read and write
49A0000
direct allocation
page execute and read and write
4EA0000
direct allocation
page execute and read and write
DC0000
heap
page read and write
4571000
heap
page read and write
43C1000
heap
page read and write
39AE000
stack
page read and write
C0B000
unkown
page execute and read and write
372E000
stack
page read and write
4571000
heap
page read and write
43C1000
heap
page read and write
4571000
heap
page read and write
59B000
unkown
page execute and read and write
DAD000
heap
page read and write
4C11000
direct allocation
page read and write
530000
unkown
page read and write
230D9000
heap
page read and write
B1F000
stack
page read and write
E74000
unkown
page execute and read and write
4C10000
direct allocation
page execute and read and write
894000
heap
page read and write
43C1000
heap
page read and write
230D9000
heap
page read and write
230C9000
heap
page read and write
43C1000
heap
page read and write
4E60000
direct allocation
page execute and read and write
49C0000
direct allocation
page execute and read and write
412E000
stack
page read and write
1687000
unkown
page execute and read and write
EAA000
unkown
page execute and read and write
BA1000
unkown
page execute and write copy
1058000
unkown
page execute and read and write
6C5FF000
unkown
page readonly
35DE000
stack
page read and write
4571000
heap
page read and write
54DE000
stack
page read and write
6C461000
unkown
page execute read
4A50000
direct allocation
page execute and read and write
4730000
heap
page read and write
10E0000
direct allocation
page read and write
331F000
stack
page read and write
3A3E000
stack
page read and write
346F000
stack
page read and write
4571000
heap
page read and write
49D0000
direct allocation
page execute and read and write
4571000
heap
page read and write
36EF000
stack
page read and write
4560000
direct allocation
page read and write
B84000
heap
page read and write
4571000
heap
page read and write
B84000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
50FF000
stack
page read and write
8260000
heap
page read and write
7B0000
heap
page read and write
832000
unkown
page execute and read and write
4571000
heap
page read and write
3F50000
heap
page read and write
4D50000
direct allocation
page execute and read and write
1A7B000
heap
page read and write
C8E000
stack
page read and write
4861000
heap
page read and write
3B60000
heap
page read and write
472F000
stack
page read and write
230DD000
heap
page read and write
C0B000
unkown
page execute and read and write
39FF000
stack
page read and write
4560000
direct allocation
page read and write
D98000
heap
page read and write
61ECD000
direct allocation
page readonly
1967000
heap
page read and write
301EC000
stack
page read and write
4DB0000
direct allocation
page execute and read and write
B90000
heap
page read and write
40DF000
stack
page read and write
4D41000
direct allocation
page read and write
471F000
stack
page read and write
230BD000
heap
page read and write
396F000
stack
page read and write
230DD000
heap
page read and write
8282000
heap
page read and write
43C1000
heap
page read and write
44DE000
stack
page read and write
1687000
unkown
page execute and write copy
1965000
heap
page read and write
230CF000
heap
page read and write
43C1000
heap
page read and write
3D5E000
stack
page read and write
327E000
stack
page read and write
D56000
unkown
page execute and read and write
230C0000
heap
page read and write
1D031000
heap
page read and write
4A10000
direct allocation
page execute and read and write
4571000
heap
page read and write
4861000
heap
page read and write
230DD000
heap
page read and write
4B90000
direct allocation
page execute and read and write
B84000
heap
page read and write
61ED4000
direct allocation
page readonly
A74000
heap
page read and write
4571000
heap
page read and write
413F000
stack
page read and write
804000
unkown
page execute and read and write
18F0000
heap
page read and write
61ED3000
direct allocation
page read and write
3DDE000
stack
page read and write
B80000
direct allocation
page read and write
39FE000
stack
page read and write
4D20000
direct allocation
page execute and read and write
A0E000
stack
page read and write
4571000
heap
page read and write
2FFEC000
stack
page read and write
425E000
stack
page read and write
DAA000
heap
page read and write
18DC000
heap
page read and write
2EFE000
stack
page read and write
4571000
heap
page read and write
10E0000
direct allocation
page read and write
43C1000
heap
page read and write
894000
heap
page read and write
D9E000
heap
page read and write
43BF000
stack
page read and write
D9D000
unkown
page execute and read and write
C09000
unkown
page write copy
4A00000
direct allocation
page read and write
435F000
stack
page read and write
61EB4000
direct allocation
page read and write
3A9F000
stack
page read and write
461E000
stack
page read and write
4560000
direct allocation
page read and write
10E0000
direct allocation
page read and write
49B0000
trusted library allocation
page read and write
6E0000
heap
page read and write
3042C000
stack
page read and write
79B000
stack
page read and write
35EE000
stack
page read and write
6C645000
unkown
page readonly
230BB000
heap
page read and write
3C7E000
stack
page read and write
43C1000
heap
page read and write
43C1000
heap
page read and write
B70000
direct allocation
page read and write
230A7000
heap
page read and write
30EE000
stack
page read and write
230CF000
heap
page read and write
230D9000
heap
page read and write
FB000
stack
page read and write
4571000
heap
page read and write
D80000
heap
page read and write
367E000
stack
page read and write
4571000
heap
page read and write
332F000
stack
page read and write
61E01000
direct allocation
page execute read
B5E000
stack
page read and write
3F9E000
stack
page read and write
4B60000
direct allocation
page execute and read and write
10E0000
direct allocation
page read and write
7DAC000
stack
page read and write
D9D000
heap
page read and write
A74000
heap
page read and write
9E8000
unkown
page execute and read and write
2E5F000
stack
page read and write
EA2000
unkown
page execute and read and write
43C1000
heap
page read and write
4571000
heap
page read and write
EB9000
unkown
page execute and write copy
6F0000
heap
page read and write
3F3E000
stack
page read and write
B70000
direct allocation
page read and write
524F000
stack
page read and write
5F1E000
stack
page read and write
4560000
direct allocation
page read and write
2B57000
heap
page read and write
7B3000
heap
page read and write
29310000
trusted library allocation
page read and write
439E000
stack
page read and write
230D4000
heap
page read and write
4571000
heap
page read and write
C09000
unkown
page read and write
4571000
heap
page read and write
4571000
heap
page read and write
673E000
stack
page read and write
4D7E000
stack
page read and write
C00000
heap
page read and write
C09000
unkown
page write copy
10E0000
direct allocation
page read and write
43C1000
heap
page read and write
43C1000
heap
page read and write
B84000
heap
page read and write
4B90000
direct allocation
page execute and read and write
43C1000
heap
page read and write
599000
unkown
page write copy
DC1000
heap
page read and write
A70000
heap
page read and write
2AFE000
stack
page read and write
335E000
stack
page read and write
4D30000
direct allocation
page execute and read and write
6170000
heap
page read and write
EB9000
unkown
page execute and write copy
849000
unkown
page execute and read and write
230C2000
heap
page read and write
4CA0000
trusted library allocation
page read and write
7C70000
heap
page read and write
3C13000
direct allocation
page execute and read and write
293A0000
heap
page read and write
B90000
heap
page read and write
3D9E000
stack
page read and write
849000
unkown
page execute and write copy
CEA000
heap
page read and write
1A97000
heap
page read and write
488E000
stack
page read and write
B84000
heap
page read and write
1059000
unkown
page execute and write copy
230D4000
heap
page read and write
30FF000
stack
page read and write
4571000
heap
page read and write
230D4000
heap
page read and write
230B3000
heap
page read and write
4E40000
direct allocation
page execute and read and write
10E0000
direct allocation
page read and write
4571000
heap
page read and write
B80000
direct allocation
page read and write
683F000
stack
page read and write
B84000
heap
page read and write
1CC2F000
stack
page read and write
43C1000
heap
page read and write
230C0000
heap
page read and write
43C1000
heap
page read and write
4D20000
direct allocation
page execute and read and write
B80000
direct allocation
page read and write
2AFF000
stack
page read and write
10DB000
stack
page read and write
4571000
heap
page read and write
43C1000
heap
page read and write
43D1000
heap
page read and write
31DF000
stack
page read and write
C02000
unkown
page execute and read and write
B84000
heap
page read and write
D9E000
heap
page read and write
CB0000
unkown
page readonly
C02000
unkown
page execute and read and write
65C000
stack
page read and write
4D90000
direct allocation
page execute and read and write
49F0000
direct allocation
page execute and read and write
293E000
stack
page read and write
387F000
stack
page read and write
2FFF000
stack
page read and write
135F000
stack
page read and write
B84000
heap
page read and write
6C63F000
unkown
page write copy
1D030000
heap
page read and write
3BE0000
direct allocation
page execute and read and write
43C1000
heap
page read and write
2EBF000
stack
page read and write
3C2E000
direct allocation
page execute and read and write
4571000
heap
page read and write
42BF000
stack
page read and write
43C1000
heap
page read and write
4571000
heap
page read and write
43C1000
heap
page read and write
3C24000
direct allocation
page execute and read and write
30AF000
stack
page read and write
43C1000
heap
page read and write
293AE000
heap
page read and write
3B7E000
stack
page read and write
4560000
direct allocation
page read and write
4571000
heap
page read and write
293B9000
heap
page read and write
8FB000
heap
page read and write
39BF000
stack
page read and write
230B9000
heap
page read and write
B84000
heap
page read and write
D94000
heap
page read and write
B80000
direct allocation
page read and write
4571000
heap
page read and write
421F000
stack
page read and write
43C1000
heap
page read and write
4E7F000
stack
page read and write
6E5000
heap
page read and write
4EBE000
stack
page read and write
230C0000
heap
page read and write
43C1000
heap
page read and write
230D5000
heap
page read and write
230A6000
heap
page read and write
2ADE000
stack
page read and write
43C1000
heap
page read and write
599000
unkown
page read and write
230D1000
heap
page read and write
43C1000
heap
page read and write
EA2000
unkown
page execute and read and write
B80000
direct allocation
page read and write
2CEF000
stack
page read and write
4571000
heap
page read and write
B8D000
heap
page read and write
43C1000
heap
page read and write
4FFE000
stack
page read and write
1B77000
heap
page read and write
7DB000
heap
page read and write
479F000
stack
page read and write
230BD000
heap
page read and write
4573000
heap
page read and write
43C1000
heap
page read and write
4571000
heap
page read and write
43C0000
heap
page read and write
B80000
direct allocation
page read and write
1940000
heap
page read and write
894000
heap
page read and write
110A000
heap
page read and write
1B36000
heap
page read and write
A1E000
stack
page read and write
43C1000
heap
page read and write
530000
unkown
page readonly
43C1000
heap
page read and write
1AE8000
heap
page read and write
313E000
stack
page read and write
43C1000
heap
page read and write
38FE000
stack
page read and write
230C5000
heap
page read and write
2F5F000
stack
page read and write
3C7F000
stack
page read and write
B80000
direct allocation
page read and write
4571000
heap
page read and write
2B20000
direct allocation
page read and write
553D000
stack
page read and write
E74000
unkown
page execute and read and write
4571000
heap
page read and write
1B78000
heap
page read and write
1A77000
heap
page read and write
DA7000
heap
page read and write
43C1000
heap
page read and write
49D0000
direct allocation
page execute and read and write
894000
heap
page read and write
3C24000
direct allocation
page execute and read and write
337F000
stack
page read and write
34FF000
stack
page read and write
230C0000
heap
page read and write
43FF000
stack
page read and write
53DD000
stack
page read and write
B70000
direct allocation
page read and write
230DD000
heap
page read and write
4D1E000
stack
page read and write
230C2000
heap
page read and write
4580000
heap
page read and write
353E000
stack
page read and write
43C1000
heap
page read and write
B80000
direct allocation
page read and write
49D0000
direct allocation
page execute and read and write
43C1000
heap
page read and write
4571000
heap
page read and write
399E000
stack
page read and write
7AD000
heap
page read and write
906000
heap
page read and write
894000
heap
page read and write
4D80000
direct allocation
page execute and read and write
230CF000
heap
page read and write
CEE000
heap
page read and write
4571000
heap
page read and write
2C7E000
stack
page read and write
1A85000
heap
page read and write
825C000
stack
page read and write
4D10000
direct allocation
page execute and read and write
43C1000
heap
page read and write
4A00000
direct allocation
page read and write
AFE000
stack
page read and write
AC7000
heap
page read and write
B84000
heap
page read and write
230C0000
heap
page read and write
3C1E000
stack
page read and write
43C1000
heap
page read and write
4B90000
direct allocation
page execute and read and write
3FD0000
heap
page read and write
230D9000
heap
page read and write
4571000
heap
page read and write
230C0000
heap
page read and write
2D7E000
stack
page read and write
426E000
stack
page read and write
B84000
heap
page read and write
1BAC000
heap
page read and write
321E000
stack
page read and write
2B20000
direct allocation
page read and write
49D0000
direct allocation
page execute and read and write
2C3E000
stack
page read and write
4B90000
direct allocation
page execute and read and write
4E70000
direct allocation
page execute and read and write
B84000
heap
page read and write
4A40000
direct allocation
page execute and read and write
B80000
heap
page read and write
230B9000
heap
page read and write
4571000
heap
page read and write
5DDE000
stack
page read and write
3BEF000
stack
page read and write
A6E000
stack
page read and write
230DD000
heap
page read and write
43C1000
heap
page read and write
49EC000
stack
page read and write
230D9000
heap
page read and write
3DBF000
stack
page read and write
2A6F000
stack
page read and write
230DD000
heap
page read and write
4B80000
direct allocation
page execute and read and write
303E000
stack
page read and write
4D20000
direct allocation
page execute and read and write
475E000
stack
page read and write
3022C000
stack
page read and write
43C1000
heap
page read and write
DAA000
heap
page read and write
1C82F000
stack
page read and write
2940000
direct allocation
page read and write
8C0000
heap
page read and write
6C3C1000
unkown
page execute read
230C4000
heap
page read and write
43C1000
heap
page read and write
61ECC000
direct allocation
page read and write
4BD0000
direct allocation
page execute and read and write
230BF000
heap
page read and write
49D0000
direct allocation
page execute and read and write
E74000
unkown
page execute and read and write
CE0000
heap
page read and write
3A30000
heap
page read and write
6C63E000
unkown
page read and write
B84000
heap
page read and write
4A00000
direct allocation
page execute and read and write
B80000
direct allocation
page read and write
10C5000
unkown
page execute and read and write
4571000
heap
page read and write
BA0000
unkown
page readonly
4E80000
direct allocation
page execute and read and write
1A8A000
heap
page read and write
32BE000
stack
page read and write
4571000
heap
page read and write
3DBE000
stack
page read and write
1A90000
heap
page read and write
43C1000
heap
page read and write
381F000
stack
page read and write
894000
heap
page read and write
43C1000
heap
page read and write
2FBF000
stack
page read and write
1056000
unkown
page execute and read and write
4800000
trusted library allocation
page read and write
B80000
direct allocation
page read and write
2E6E000
stack
page read and write
1059000
unkown
page execute and write copy
29C000
stack
page read and write
417F000
stack
page read and write
4D20000
direct allocation
page execute and read and write
4571000
heap
page read and write
43C1000
heap
page read and write
B84000
heap
page read and write
4560000
direct allocation
page read and write
D67000
heap
page read and write
BA0000
unkown
page readonly
459F000
stack
page read and write
CB0000
unkown
page readonly
6C43D000
unkown
page readonly
894000
heap
page read and write
485F000
stack
page read and write
4BEE000
stack
page read and write
43C1000
heap
page read and write
B70000
direct allocation
page read and write
B84000
heap
page read and write
18D0000
heap
page read and write
B84000
heap
page read and write
230CF000
heap
page read and write
A74000
heap
page read and write
83A000
unkown
page execute and read and write
DAD000
heap
page read and write
49A0000
heap
page read and write
43C1000
heap
page read and write
230D1000
heap
page read and write
7FEF000
stack
page read and write
5C90000
heap
page read and write
43AE000
stack
page read and write
D95000
heap
page read and write
D94000
heap
page read and write
313F000
stack
page read and write
B70000
direct allocation
page read and write
BF8000
stack
page read and write
2D3F000
stack
page read and write
43C1000
heap
page read and write
B84000
heap
page read and write
3C24000
direct allocation
page execute and read and write
460000
heap
page read and write
DFA000
unkown
page execute and read and write
DAD000
heap
page read and write
B84000
heap
page read and write
3EFF000
stack
page read and write
230B4000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
B84000
heap
page read and write
5C95000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
B84000
heap
page read and write
4860000
heap
page read and write
A10000
heap
page read and write
4CEF000
stack
page read and write
42BE000
stack
page read and write
209E000
stack
page read and write
4D20000
direct allocation
page execute and read and write
3AFF000
stack
page read and write
230BE000
heap
page read and write
1AE2000
heap
page read and write
894000
heap
page read and write
4E50000
direct allocation
page execute and read and write
EB9000
unkown
page execute and read and write
4571000
heap
page read and write
230D9000
heap
page read and write
1057000
unkown
page execute and write copy
43C1000
heap
page read and write
D94000
heap
page read and write
30DE000
stack
page read and write
31EF000
stack
page read and write
373F000
stack
page read and write
A74000
heap
page read and write
B84000
heap
page read and write
B7E000
stack
page read and write
9E7000
unkown
page execute and write copy
4571000
heap
page read and write
4CF0000
direct allocation
page execute and read and write
4571000
heap
page read and write
4E30000
direct allocation
page execute and read and write
7F0000
heap
page read and write
422F000
stack
page read and write
4571000
heap
page read and write
B84000
heap
page read and write
C0B000
unkown
page execute and read and write
2B50000
heap
page read and write
3FFF000
stack
page read and write
230CF000
heap
page read and write
2D2E000
stack
page read and write
230D1000
heap
page read and write
43C1000
heap
page read and write
B70000
direct allocation
page read and write
B84000
heap
page read and write
84A000
unkown
page execute and write copy
111B000
heap
page read and write
EE7000
unkown
page execute and write copy
43C1000
heap
page read and write
3C2E000
stack
page read and write
B80000
direct allocation
page read and write
BA1000
unkown
page execute and write copy
4731000
heap
page read and write
4D3B000
stack
page read and write
43C1000
heap
page read and write
4A00000
direct allocation
page read and write
43C1000
heap
page read and write
309F000
stack
page read and write
D5F000
heap
page read and write
2940000
direct allocation
page read and write
72D000
unkown
page execute and read and write
EB9000
unkown
page execute and read and write
EEC000
unkown
page execute and read and write
231A5000
heap
page read and write
514E000
stack
page read and write
A74000
heap
page read and write
43C1000
heap
page read and write
3E9D000
stack
page read and write
3D7F000
stack
page read and write
B7F000
stack
page read and write
There are 1047 hidden memdumps, click here to show them.