IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\amadka[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000006001\2e80f9dd27.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\KKKJKEBKFC.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\CFIEBKEHCAKFCBFIDAAKJDAAFC
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\DAFIEHIEGDHIDGDGHDHJ
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DGDBAKKJKKECGDGCAECA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\EGIDAFBA
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\EGIDAFBAEBKKEBFIJEBKJKJJDA
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HCFIJKKKKKFCAAAAFBKF
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\HDHCGHDHIDHCBGCBGCAEBAKEHC
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IJDHCBGH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\explorti.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 20 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\KKKJKEBKFC.exe
"C:\Users\user\AppData\Local\Temp\KKKJKEBKFC.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
"C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\1000006001\2e80f9dd27.exe
"C:\Users\user\AppData\Local\Temp\1000006001\2e80f9dd27.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\KKKJKEBKFC.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\BAAAKJDAAF.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://77.91.77.81/mine/amadka.exe
77.91.77.81
malicious
http://77.91.77.81/cost/go.exe
unknown
malicious
http://77.91.77.82/Hun4Ko/index.phpO
unknown
malicious
http://85.28.47.4/
unknown
malicious
http://85.28.47.4/69934896f997d5bb/vcruntime140.dllw9
unknown
malicious
http://77.91.77.82/Hun4Ko/index.php_
unknown
malicious
http://77.91.77.82/Hun4Ko/index.php
77.91.77.82
malicious
http://77.91.77.82/Hun4Ko/index.phpGw
unknown
malicious
http://77.91.77.81/stealc/random.exe50673b5d7
unknown
malicious
http://85.28.47.4/69934896f997d5bb/softokn3.dll
85.28.47.4
malicious
http://77.91.77.82/Hun4Ko/index.php%
unknown
malicious
http://77.91.77.82/Hun4Ko/index.php/Hun4Ko/index.php
unknown
malicious
http://85.28.47.4/69934896f997d5bb/mozglue.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/nss3.dll
85.28.47.4
malicious
http://77.91.77.82/Hun4Ko/index.php?
unknown
malicious
http://77.91.77.82/Hun4Ko/index.php;
unknown
malicious
http://85.28.47.4/69934896f997d5bb/vcruntime140.dll
85.28.47.4
malicious
http://85.28.47.4/920475a59bac849d.phpD
unknown
malicious
http://77.91.77.81/mine/amadka.exephprefoxx
unknown
malicious
http://77.91.77.81/mine/amadka.exe00
unknown
malicious
http://85.28.47.4/69934896f997d5bb/freebl3.dll
85.28.47.4
malicious
http://85.28.47.4/920475a59bac849d.php
85.28.47.4
malicious
http://85.28.47.4/920475a59bac849d.phpN
unknown
malicious
http://85.28.47.4/920475a59bac849d.phpon
unknown
malicious
http://85.28.47.4/920475a59bac849d.phpW
unknown
malicious
http://77.91.77.81/cost/go.exeData
unknown
malicious
http://85.28.47.4/69934896f997d5bb/sqlite3.dll
85.28.47.4
malicious
http://77.91.77.81/cost/go.exe00
unknown
malicious
http://77.91.77.81/mine/amadka.exea
unknown
malicious
http://85.28.47.4/69934896f997d5bb/msvcp140.dll
85.28.47.4
malicious
http://85.28.47.4
unknown
malicious
http://77.91.77.82/Hun4Ko/index.php8LzN
unknown
malicious
http://77.91.77.82/Hun4Ko/index.phps
unknown
malicious
http://85.28.47.4/920475a59bac849d.phph
unknown
malicious
http://85.28.47.4/69934896f997d5bb/mozglue.dllrK
unknown
malicious
http://77.91.77.82/Hun4Ko/index.php:_qX
unknown
malicious
http://77.91.77.82/Hun4Ko/index.phpw
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://duckduckgo.com/ac/?q=
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17chost.exe
unknown
http://85.28.47.43
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016.exe
unknown
http://77.91.77.81/stealc/random.exe3U
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://www.sqlite.org/copyright.html.
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://77.91.77.81/stealc/random.exe
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://upx.sf.net
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://pki-ocsp.symauth.com0
unknown
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 59 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
85.28.47.4
unknown
Russian Federation
malicious
77.91.77.82
unknown
Russian Federation
malicious
77.91.77.81
unknown
Russian Federation

Memdumps

Base Address
Regiontype
Protect
Malicious
961000
unkown
page execute and read and write
malicious
B01000
unkown
page execute and read and write
malicious
B01000
unkown
page execute and read and write
malicious
E41000
unkown
page execute and read and write
malicious
1CBE000
heap
page read and write
malicious
4B50000
direct allocation
page read and write
malicious
961000
unkown
page execute and read and write
malicious
48F0000
direct allocation
page read and write
malicious
18B4000
heap
page read and write
malicious
5160000
direct allocation
page read and write
malicious
9C2000
unkown
page execute and read and write
4461000
heap
page read and write
4461000
heap
page read and write
4461000
heap
page read and write
E40000
unkown
page read and write
1D380000
heap
page read and write
94E000
stack
page read and write
5F5000
heap
page read and write
3F54000
direct allocation
page execute and read and write
38CE000
stack
page read and write
3F5E000
direct allocation
page execute and read and write
3B4E000
stack
page read and write
5E80000
heap
page read and write
360F000
stack
page read and write
E30000
direct allocation
page read and write
4461000
heap
page read and write
1E15000
heap
page read and write
4461000
heap
page read and write
2980000
heap
page read and write
41C0000
heap
page read and write
6840000
heap
page read and write
2366C000
heap
page read and write
B91000
unkown
page execute and read and write
940000
direct allocation
page read and write
39CF000
stack
page read and write
4CD1000
heap
page read and write
4461000
heap
page read and write
34CF000
stack
page read and write
3A4F000
stack
page read and write
4461000
heap
page read and write
23660000
heap
page read and write
331E000
stack
page read and write
4560000
trusted library allocation
page read and write
380E000
stack
page read and write
36C3000
direct allocation
page execute and read and write
4461000
heap
page read and write
469E000
stack
page read and write
F2F000
stack
page read and write
4CD1000
heap
page read and write
390F000
stack
page read and write
23745000
heap
page read and write
4CF0000
heap
page read and write
115D000
unkown
page execute and write copy
23675000
heap
page read and write
42CF000
stack
page read and write
4461000
heap
page read and write
1C15F000
stack
page read and write
5390000
direct allocation
page execute and read and write
4461000
heap
page read and write
299B1000
heap
page read and write
4CD1000
heap
page read and write
660000
heap
page read and write
3690000
direct allocation
page execute and read and write
4461000
heap
page read and write
9C9000
unkown
page read and write
319F000
stack
page read and write
350E000
stack
page read and write
1CA5E000
stack
page read and write
880000
heap
page read and write
17B5000
heap
page read and write
725000
heap
page read and write
17B000
stack
page read and write
47D0000
trusted library allocation
page read and write
4461000
heap
page read and write
45CE000
stack
page read and write
744000
heap
page read and write
E30000
direct allocation
page read and write
36D4000
direct allocation
page execute and read and write
4CD1000
heap
page read and write
3B40000
direct allocation
page execute and read and write
4CD1000
heap
page read and write
305F000
stack
page read and write
5300000
direct allocation
page execute and read and write
6232000
heap
page read and write
E86000
unkown
page execute and read and write
4461000
heap
page read and write
4461000
heap
page read and write
5380000
direct allocation
page execute and read and write
23653000
heap
page read and write
B58000
unkown
page execute and read and write
4C90000
direct allocation
page execute and read and write
418E000
stack
page read and write
4D10000
direct allocation
page execute and read and write
3F54000
direct allocation
page execute and read and write
4CD1000
heap
page read and write
1310000
heap
page read and write
36DE000
direct allocation
page execute and read and write
2367E000
heap
page read and write
740000
heap
page read and write
4A70000
direct allocation
page execute and read and write
4461000
heap
page read and write
37DF000
stack
page read and write
940000
direct allocation
page read and write
23670000
heap
page read and write
990000
direct allocation
page execute and read and write
4CC0000
direct allocation
page read and write
724000
heap
page read and write
3B00000
heap
page read and write
3DCE000
stack
page read and write
4CD1000
heap
page read and write
328E000
stack
page read and write
72D000
heap
page read and write
2365D000
heap
page read and write
AE0000
heap
page read and write
4CD1000
heap
page read and write
2363E000
stack
page read and write
4CD1000
heap
page read and write
6840000
heap
page read and write
2367E000
heap
page read and write
2F0F000
stack
page read and write
409F000
stack
page read and write
7BD2000
heap
page read and write
710000
heap
page read and write
5FDE000
stack
page read and write
39ED000
stack
page read and write
3A8E000
stack
page read and write
3AEE000
stack
page read and write
3CA0000
heap
page read and write
960000
unkown
page read and write
31CE000
stack
page read and write
48F0000
direct allocation
page read and write
E20000
heap
page read and write
6CD000
heap
page read and write
940000
direct allocation
page read and write
3F43000
direct allocation
page execute and read and write
37CE000
stack
page read and write
137E000
stack
page read and write
4CC0000
direct allocation
page read and write
29920000
trusted library allocation
page read and write
E40000
unkown
page readonly
23658000
heap
page read and write
35DE000
stack
page read and write
730000
heap
page read and write
5160000
direct allocation
page read and write
710000
heap
page read and write
4CD1000
heap
page read and write
4461000
heap
page read and write
4A80000
direct allocation
page execute and read and write
2A8F000
stack
page read and write
23656000
heap
page read and write
4CD1000
heap
page read and write
440E000
stack
page read and write
1E0000
heap
page read and write
710000
heap
page read and write
4CC0000
direct allocation
page read and write
23657000
heap
page read and write
940000
direct allocation
page read and write
4461000
heap
page read and write
4461000
heap
page read and write
4461000
heap
page read and write
DFE000
stack
page read and write
4461000
heap
page read and write
4461000
heap
page read and write
41AE000
stack
page read and write
67E000
heap
page read and write
4A60000
direct allocation
page execute and read and write
359E000
stack
page read and write
4461000
heap
page read and write
36C4000
direct allocation
page execute and read and write
4CD1000
heap
page read and write
9E0000
direct allocation
page execute and read and write
1D494000
heap
page read and write
1230000
heap
page read and write
5340000
direct allocation
page execute and read and write
4CD1000
heap
page read and write
8DE000
stack
page read and write
354F000
stack
page read and write
36D0000
direct allocation
page execute and read and write
2365B000
heap
page read and write
6C5F0000
unkown
page readonly
1457000
heap
page read and write
36D4000
direct allocation
page execute and read and write
4461000
heap
page read and write
374F000
stack
page read and write
4CC0000
direct allocation
page read and write
2987000
heap
page read and write
4BB1000
direct allocation
page read and write
4CD1000
heap
page read and write
4461000
heap
page read and write
744000
heap
page read and write
6E9000
heap
page read and write
61ED0000
direct allocation
page read and write
4461000
heap
page read and write
394E000
stack
page read and write
3D0E000
stack
page read and write
F70000
heap
page read and write
414F000
stack
page read and write
2366C000
heap
page read and write
C7C000
unkown
page execute and read and write
4CA0000
direct allocation
page execute and read and write
4AD0000
direct allocation
page execute and read and write
4B9E000
stack
page read and write
E30000
direct allocation
page read and write
4461000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
1C55E000
stack
page read and write
2970000
direct allocation
page execute and read and write
4461000
heap
page read and write
4461000
heap
page read and write
498F000
stack
page read and write
4461000
heap
page read and write
731000
heap
page read and write
52D0000
direct allocation
page execute and read and write
381E000
stack
page read and write
3CE0000
direct allocation
page execute and read and write
940000
direct allocation
page read and write
744000
heap
page read and write
961000
unkown
page execute and write copy
304F000
stack
page read and write
7D0B000
stack
page read and write
683E000
heap
page read and write
4CD1000
heap
page read and write
4A80000
direct allocation
page execute and read and write
4461000
heap
page read and write
5360000
direct allocation
page execute and read and write
4CD1000
heap
page read and write
731000
heap
page read and write
74F000
heap
page read and write
4CD0000
heap
page read and write
4CD1000
heap
page read and write
3A9E000
stack
page read and write
90E000
stack
page read and write
E1E000
unkown
page execute and write copy
4CD1000
heap
page read and write
6A6000
heap
page read and write
750000
heap
page read and write
4B00000
direct allocation
page execute and read and write
37CF000
stack
page read and write
46D1000
heap
page read and write
4461000
heap
page read and write
7F4E000
stack
page read and write
5160000
direct allocation
page read and write
DBC000
stack
page read and write
E30000
direct allocation
page read and write
2367E000
heap
page read and write
C4A000
unkown
page execute and read and write
36D4000
direct allocation
page execute and read and write
4CD1000
heap
page read and write
E30000
direct allocation
page read and write
C32000
unkown
page execute and read and write
B58000
unkown
page execute and read and write
3F54000
direct allocation
page execute and read and write
E30000
direct allocation
page read and write
3080C000
stack
page read and write
39A0000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
52AF000
stack
page read and write
4461000
heap
page read and write
391F000
stack
page read and write
940000
direct allocation
page read and write
61ECD000
direct allocation
page readonly
D25000
unkown
page execute and read and write
59FD000
stack
page read and write
6CE000
heap
page read and write
4CD1000
heap
page read and write
3B8F000
stack
page read and write
4CD1000
heap
page read and write
73B000
heap
page read and write
4461000
heap
page read and write
4461000
heap
page read and write
4461000
heap
page read and write
2367E000
heap
page read and write
4461000
heap
page read and write
744000
heap
page read and write
23676000
heap
page read and write
3047000
heap
page read and write
4A3F000
stack
page read and write
1D10000
heap
page read and write
D7E000
stack
page read and write
87E000
stack
page read and write
314F000
stack
page read and write
D37000
unkown
page execute and read and write
1CE9F000
stack
page read and write
4CF0000
direct allocation
page execute and read and write
4461000
heap
page read and write
1422000
heap
page read and write
D25000
unkown
page execute and read and write
4461000
heap
page read and write
3F9E000
stack
page read and write
4461000
heap
page read and write
7EAB0000
direct allocation
page execute and read and write
330E000
stack
page read and write
4461000
heap
page read and write
B24000
unkown
page execute and write copy
4461000
heap
page read and write
4CD1000
heap
page read and write
1C8E000
stack
page read and write
549B000
stack
page read and write
D3C000
unkown
page execute and read and write
3F54000
direct allocation
page execute and read and write
4CA0000
heap
page read and write
4C9F000
stack
page read and write
4461000
heap
page read and write
1D11E000
stack
page read and write
5320000
direct allocation
page execute and read and write
4CB0000
direct allocation
page execute and read and write
561E000
stack
page read and write
4CD1000
heap
page read and write
6830000
heap
page read and write
2365F000
heap
page read and write
23675000
heap
page read and write
1E59000
heap
page read and write
E1C000
unkown
page execute and read and write
4163000
heap
page read and write
940000
direct allocation
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
736000
heap
page read and write
1BFC000
stack
page read and write
4FA000
stack
page read and write
52F0000
direct allocation
page execute and read and write
4CD1000
heap
page read and write
8AE000
stack
page read and write
176B000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
23647000
heap
page read and write
6C66D000
unkown
page readonly
4D30000
direct allocation
page execute and read and write
3B90000
heap
page read and write
F6E000
stack
page read and write
23646000
heap
page read and write
14CB000
unkown
page execute and read and write
E86000
unkown
page execute and read and write
4CD1000
heap
page read and write
23647000
heap
page read and write
744000
heap
page read and write
4CD1000
heap
page read and write
1D391000
heap
page read and write
2365F000
heap
page read and write
46D1000
heap
page read and write
C6C000
unkown
page execute and read and write
4A80000
direct allocation
page execute and read and write
7FC000
stack
page read and write
4461000
heap
page read and write
9CB000
unkown
page execute and read and write
5CFD000
stack
page read and write
5E96000
heap
page read and write
17B0000
heap
page read and write
4461000
heap
page read and write
72D000
heap
page read and write
6D0000
heap
page read and write
2366C000
heap
page read and write
2367E000
heap
page read and write
E1C000
unkown
page execute and read and write
1C95D000
stack
page read and write
4461000
heap
page read and write
281F000
stack
page read and write
23670000
heap
page read and write
3A0E000
stack
page read and write
4CD1000
heap
page read and write
23660000
heap
page read and write
4CD1000
heap
page read and write
4461000
heap
page read and write
4CD1000
heap
page read and write
35B000
stack
page read and write
E30000
direct allocation
page read and write
2950000
direct allocation
page read and write
4461000
heap
page read and write
364E000
stack
page read and write
4CD1000
heap
page read and write
17B7000
heap
page read and write
2367E000
heap
page read and write
4461000
heap
page read and write
294E000
stack
page read and write
5DFE000
stack
page read and write
960000
unkown
page readonly
1D69000
heap
page read and write
B01000
unkown
page execute and write copy
61E01000
direct allocation
page execute read
1D490000
trusted library allocation
page read and write
5330000
direct allocation
page execute and read and write
4CD1000
heap
page read and write
2E0E000
stack
page read and write
2FFC000
stack
page read and write
4461000
heap
page read and write
18EA000
heap
page read and write
86F000
stack
page read and write
3CDF000
stack
page read and write
940000
direct allocation
page read and write
6EA000
heap
page read and write
6C875000
unkown
page readonly
E30000
direct allocation
page read and write
4461000
heap
page read and write
F15000
unkown
page execute and read and write
B48000
unkown
page execute and read and write
36D4000
direct allocation
page execute and read and write
6C5F1000
unkown
page execute read
726000
heap
page read and write
1E81000
heap
page read and write
4461000
heap
page read and write
961000
unkown
page execute and write copy
4CC0000
direct allocation
page read and write
23656000
heap
page read and write
3F54000
direct allocation
page execute and read and write
5E95000
heap
page read and write
338F000
stack
page read and write
4461000
heap
page read and write
4A90000
direct allocation
page execute and read and write
4461000
heap
page read and write
217E000
stack
page read and write
46D1000
heap
page read and write
31DE000
stack
page read and write
46CF000
stack
page read and write
4CD1000
heap
page read and write
1228000
unkown
page execute and read and write
73B000
heap
page read and write
723000
heap
page read and write
3F50000
direct allocation
page execute and read and write
2367B000
heap
page read and write
2367E000
heap
page read and write
6D0000
heap
page read and write
3BA0000
direct allocation
page execute and read and write
4461000
heap
page read and write
E6C000
unkown
page execute and read and write
4B5F000
stack
page read and write
59AF000
stack
page read and write
710000
heap
page read and write
478F000
stack
page read and write
349E000
stack
page read and write
13CA000
heap
page read and write
23664000
heap
page read and write
4461000
heap
page read and write
4461000
heap
page read and write
C64000
unkown
page execute and read and write
2343E000
stack
page read and write
F7B000
heap
page read and write
D3C000
unkown
page execute and write copy
4B8E000
stack
page read and write
E30000
direct allocation
page read and write
7BD0000
heap
page read and write
4D00000
direct allocation
page execute and read and write
23653000
heap
page read and write
23646000
heap
page read and write
23660000
heap
page read and write
6C86F000
unkown
page write copy
413E000
stack
page read and write
324F000
stack
page read and write
6831000
heap
page read and write
C7C000
unkown
page execute and read and write
1CEDD000
stack
page read and write
E30000
direct allocation
page read and write
4CD1000
heap
page read and write
491E000
stack
page read and write
930000
heap
page read and write
3F54000
direct allocation
page execute and read and write
4CD1000
heap
page read and write
4461000
heap
page read and write
4461000
heap
page read and write
400F000
stack
page read and write
290F000
stack
page read and write
4A5E000
stack
page read and write
1228000
unkown
page execute and read and write
14C8000
unkown
page execute and write copy
299BF000
heap
page read and write
17E0000
heap
page read and write
4CD1000
heap
page read and write
4B20000
direct allocation
page execute and read and write
36D4000
direct allocation
page execute and read and write
4CD1000
heap
page read and write
4A50000
direct allocation
page execute and read and write
4CD1000
heap
page read and write
365E000
stack
page read and write
378E000
stack
page read and write
E27000
heap
page read and write
12FC000
unkown
page execute and read and write
2991F000
stack
page read and write
2365D000
heap
page read and write
4CC0000
direct allocation
page read and write
4461000
heap
page read and write
139A000
heap
page read and write
E41000
unkown
page execute and write copy
4461000
heap
page read and write
940000
direct allocation
page read and write
1235000
heap
page read and write
3AAE000
stack
page read and write
6221000
heap
page read and write
B1C000
unkown
page execute and write copy
3D1E000
stack
page read and write
36D4000
direct allocation
page execute and read and write
6CD000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
2EBE000
stack
page read and write
3800000
heap
page read and write
E30000
direct allocation
page read and write
1909000
heap
page read and write
3E5E000
stack
page read and write
4461000
heap
page read and write
3F44000
direct allocation
page execute and read and write
4461000
heap
page read and write
4CD1000
heap
page read and write
14CB000
unkown
page execute and write copy
4510000
heap
page read and write
9C9000
unkown
page write copy
4CC0000
direct allocation
page read and write
4CB0000
direct allocation
page execute and read and write
61ED4000
direct allocation
page readonly
2F5E000
stack
page read and write
23670000
heap
page read and write
4CD1000
heap
page read and write
34A0000
direct allocation
page execute and read and write
61ECC000
direct allocation
page read and write
4CC0000
heap
page read and write
4CD1000
heap
page read and write
30A4C000
stack
page read and write
2DCF000
stack
page read and write
3ECF000
stack
page read and write
58AE000
stack
page read and write
1CA1F000
stack
page read and write
4461000
heap
page read and write
D3C000
unkown
page execute and read and write
237E000
stack
page read and write
73B000
heap
page read and write
12FE000
unkown
page execute and write copy
2C8F000
stack
page read and write
C7D000
unkown
page execute and write copy
4461000
heap
page read and write
144B000
heap
page read and write
52C0000
direct allocation
page execute and read and write
3CC000
stack
page read and write
5F0000
heap
page read and write
B6C000
unkown
page execute and read and write
42CE000
stack
page read and write
4460000
heap
page read and write
1E3D000
heap
page read and write
4461000
heap
page read and write
435E000
stack
page read and write
4461000
heap
page read and write
92E000
stack
page read and write
B00000
unkown
page readonly
430F000
stack
page read and write
5C3C000
stack
page read and write
115C000
unkown
page execute and read and write
4461000
heap
page read and write
1F0000
heap
page read and write
23670000
heap
page read and write
6C682000
unkown
page readonly
5160000
direct allocation
page read and write
4461000
heap
page read and write
4461000
heap
page read and write
421E000
stack
page read and write
940000
direct allocation
page read and write
9AF000
stack
page read and write
4461000
heap
page read and write
4461000
heap
page read and write
4461000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
3810000
heap
page read and write
FBD000
stack
page read and write
1D6F000
heap
page read and write
4CD1000
heap
page read and write
739000
heap
page read and write
158F000
stack
page read and write
40CE000
stack
page read and write
358E000
stack
page read and write
3E1E000
stack
page read and write
23654000
heap
page read and write
940000
direct allocation
page read and write
13D0000
heap
page read and write
744000
heap
page read and write
1C75F000
stack
page read and write
D37000
unkown
page execute and write copy
723000
heap
page read and write
6C0000
heap
page read and write
1CC9E000
stack
page read and write
6010000
heap
page read and write
5370000
direct allocation
page execute and read and write
4461000
heap
page read and write
4CD1000
heap
page read and write
23675000
heap
page read and write
23653000
heap
page read and write
2CDE000
stack
page read and write
1BF8000
stack
page read and write
3B0F000
stack
page read and write
18D8000
heap
page read and write
1144000
unkown
page execute and read and write
2B5F000
stack
page read and write
B00000
unkown
page readonly
940000
direct allocation
page read and write
3A6D000
stack
page read and write
309E000
stack
page read and write
1D31D000
stack
page read and write
318F000
stack
page read and write
C6C000
unkown
page execute and read and write
4CD1000
heap
page read and write
23670000
heap
page read and write
6CE000
heap
page read and write
3084B000
stack
page read and write
4C8F000
stack
page read and write
4461000
heap
page read and write
39A3000
heap
page read and write
5350000
direct allocation
page execute and read and write
6EE000
heap
page read and write
4160000
heap
page read and write
13F8000
heap
page read and write
395E000
stack
page read and write
4461000
heap
page read and write
731000
heap
page read and write
3F10000
direct allocation
page execute and read and write
308E000
stack
page read and write
2367E000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
4CD1000
heap
page read and write
2367E000
heap
page read and write
B00000
unkown
page readonly
4461000
heap
page read and write
4CD1000
heap
page read and write
3060C000
stack
page read and write
6F6000
heap
page read and write
455E000
stack
page read and write
2950000
direct allocation
page read and write
4461000
heap
page read and write
744000
heap
page read and write
F8B000
heap
page read and write
4461000
heap
page read and write
493E000
stack
page read and write
72D000
heap
page read and write
291F000
stack
page read and write
2365C000
heap
page read and write
3F5F000
stack
page read and write
4CD1000
heap
page read and write
1390000
heap
page read and write
621F000
stack
page read and write
3680000
heap
page read and write
23659000
heap
page read and write
17B7000
heap
page read and write
4461000
heap
page read and write
9D5000
heap
page read and write
B60000
unkown
page execute and read and write
6C691000
unkown
page execute read
4CD1000
heap
page read and write
B24000
unkown
page execute and write copy
4461000
heap
page read and write
52F0000
direct allocation
page execute and read and write
EA9000
unkown
page read and write
7E4E000
stack
page read and write
1D391000
heap
page read and write
17D0000
heap
page read and write
4AF0000
direct allocation
page execute and read and write
5310000
direct allocation
page execute and read and write
1CB0000
heap
page read and write
361E000
stack
page read and write
4461000
heap
page read and write
444F000
stack
page read and write
4461000
heap
page read and write
4A80000
direct allocation
page execute and read and write
4CD1000
heap
page read and write
448E000
stack
page read and write
3F54000
direct allocation
page execute and read and write
3F0E000
stack
page read and write
23678000
heap
page read and write
5AFD000
stack
page read and write
450F000
stack
page read and write
1CD5F000
stack
page read and write
2367E000
heap
page read and write
2B9E000
stack
page read and write
52F0000
direct allocation
page execute and read and write
3040000
heap
page read and write
2950000
direct allocation
page read and write
3E0000
heap
page read and write
36DE000
direct allocation
page execute and read and write
4461000
heap
page read and write
F15000
unkown
page execute and read and write
1112000
unkown
page execute and read and write
5F9F000
stack
page read and write
EA2000
unkown
page execute and read and write
4CC0000
direct allocation
page read and write
C32000
unkown
page execute and read and write
4D50000
direct allocation
page execute and read and write
3BCE000
stack
page read and write
63E000
stack
page read and write
571F000
stack
page read and write
4461000
heap
page read and write
115C000
unkown
page execute and write copy
3C0000
heap
page read and write
4D20000
direct allocation
page execute and read and write
404E000
stack
page read and write
4461000
heap
page read and write
6C86E000
unkown
page read and write
2366C000
heap
page read and write
4461000
heap
page read and write
299CF000
heap
page read and write
4CC0000
direct allocation
page read and write
61EB4000
direct allocation
page read and write
960000
unkown
page readonly
23646000
heap
page read and write
E30000
direct allocation
page read and write
C7D000
unkown
page execute and write copy
D37000
unkown
page execute and read and write
9C9000
unkown
page read and write
6C82F000
unkown
page readonly
EA9000
unkown
page write copy
2971E000
stack
page read and write
2365C000
heap
page read and write
1D7B000
heap
page read and write
1CB5C000
stack
page read and write
3BDE000
stack
page read and write
3F8E000
stack
page read and write
344E000
stack
page read and write
4CD1000
heap
page read and write
D37000
unkown
page execute and write copy
9CB000
unkown
page execute and read and write
4A1F000
stack
page read and write
BA6000
unkown
page execute and read and write
61EB7000
direct allocation
page readonly
23658000
heap
page read and write
4461000
heap
page read and write
2367E000
heap
page read and write
48DF000
stack
page read and write
4CD1000
heap
page read and write
4461000
heap
page read and write
2F4E000
stack
page read and write
23670000
heap
page read and write
4CC0000
direct allocation
page read and write
23670000
heap
page read and write
1220000
heap
page read and write
14C8000
unkown
page execute and write copy
1D2A000
heap
page read and write
428F000
stack
page read and write
4461000
heap
page read and write
4CD1000
heap
page read and write
3E0F000
stack
page read and write
744000
heap
page read and write
23657000
heap
page read and write
D3C000
unkown
page execute and write copy
4CD1000
heap
page read and write
299B9000
heap
page read and write
23670000
heap
page read and write
3C4F000
stack
page read and write
368F000
stack
page read and write
7BD4000
heap
page read and write
431F000
stack
page read and write
46D0000
heap
page read and write
3B9C000
heap
page read and write
46D1000
heap
page read and write
5E90000
heap
page read and write
2367E000
heap
page read and write
299C7000
heap
page read and write
4CD1000
heap
page read and write
6EB000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
52F0000
direct allocation
page execute and read and write
3CCF000
stack
page read and write
14CB000
unkown
page execute and write copy
B01000
unkown
page execute and write copy
23656000
heap
page read and write
4CD1000
heap
page read and write
189A000
heap
page read and write
9D0000
heap
page read and write
445F000
stack
page read and write
6C67E000
unkown
page read and write
4461000
heap
page read and write
E30000
direct allocation
page read and write
420E000
stack
page read and write
4461000
heap
page read and write
1D0DC000
stack
page read and write
EAB000
unkown
page execute and read and write
4461000
heap
page read and write
304C000
heap
page read and write
4461000
heap
page read and write
2366C000
heap
page read and write
3E4E000
stack
page read and write
3B0000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
32CF000
stack
page read and write
4461000
heap
page read and write
23658000
heap
page read and write
4CD1000
heap
page read and write
1890000
heap
page read and write
4461000
heap
page read and write
960000
unkown
page read and write
F96000
heap
page read and write
37F0000
heap
page read and write
23663000
heap
page read and write
1D64000
heap
page read and write
114C000
unkown
page execute and read and write
81BC000
stack
page read and write
940000
direct allocation
page read and write
1C81F000
stack
page read and write
4461000
heap
page read and write
4CD1000
heap
page read and write
67A000
heap
page read and write
4CE0000
heap
page read and write
48F0000
direct allocation
page read and write
C7C000
unkown
page execute and write copy
4461000
heap
page read and write
189E000
heap
page read and write
3A5F000
stack
page read and write
73B000
heap
page read and write
4461000
heap
page read and write
5E6E000
stack
page read and write
41DF000
stack
page read and write
36DE000
stack
page read and write
4461000
heap
page read and write
4CD1000
heap
page read and write
3CD0000
heap
page read and write
40CF000
stack
page read and write
4461000
heap
page read and write
6FD000
stack
page read and write
E00000
heap
page read and write
51C1000
direct allocation
page read and write
40DE000
stack
page read and write
303E000
stack
page read and write
4AA0000
direct allocation
page execute and read and write
4461000
heap
page read and write
744000
heap
page read and write
4461000
heap
page read and write
E30000
direct allocation
page read and write
2CCE000
stack
page read and write
4461000
heap
page read and write
4CD1000
heap
page read and write
C64000
unkown
page execute and read and write
4CC0000
direct allocation
page read and write
E1E000
unkown
page execute and write copy
41CF000
stack
page read and write
74F000
heap
page read and write
739000
heap
page read and write
1CB8000
heap
page read and write
744000
heap
page read and write
52F0000
direct allocation
page execute and read and write
3E1F000
stack
page read and write
1E5A000
heap
page read and write
1D76000
heap
page read and write
2A1F000
stack
page read and write
465F000
stack
page read and write
2C9F000
stack
page read and write
2367E000
heap
page read and write
434E000
stack
page read and write
14CB000
unkown
page execute and read and write
479F000
stack
page read and write
388F000
stack
page read and write
4461000
heap
page read and write
408F000
stack
page read and write
61ED3000
direct allocation
page read and write
724000
heap
page read and write
340F000
stack
page read and write
3B9F000
stack
page read and write
1D390000
heap
page read and write
744000
heap
page read and write
1CC5E000
stack
page read and write
4471000
heap
page read and write
723000
heap
page read and write
4461000
heap
page read and write
4CD1000
heap
page read and write
1E24000
heap
page read and write
4951000
direct allocation
page read and write
4461000
heap
page read and write
980000
heap
page read and write
2365C000
heap
page read and write
E6C000
unkown
page execute and read and write
1C3D000
stack
page read and write
1C35F000
stack
page read and write
52F0000
direct allocation
page execute and read and write
3B30000
heap
page read and write
4CD1000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
4CC0000
direct allocation
page read and write
4A80000
direct allocation
page execute and read and write
1038000
unkown
page execute and read and write
6220000
heap
page read and write
458F000
stack
page read and write
2365C000
heap
page read and write
4B10000
direct allocation
page execute and read and write
4461000
heap
page read and write
4461000
heap
page read and write
C7C000
unkown
page execute and write copy
33CE000
stack
page read and write
2B8F000
stack
page read and write
4CD1000
heap
page read and write
355F000
stack
page read and write
3D8F000
stack
page read and write
514C000
stack
page read and write
3E90000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
23675000
heap
page read and write
2A5E000
stack
page read and write
2367E000
heap
page read and write
1BF3000
stack
page read and write
3E5E000
stack
page read and write
4CD1000
heap
page read and write
2E1E000
stack
page read and write
6C690000
unkown
page readonly
139E000
heap
page read and write
3E80000
heap
page read and write
731000
heap
page read and write
341F000
stack
page read and write
EBC000
stack
page read and write
47DE000
stack
page read and write
369F000
stack
page read and write
7F0A0000
direct allocation
page execute and read and write
B1C000
unkown
page execute and write copy
1C7D000
stack
page read and write
2367E000
heap
page read and write
9C2000
unkown
page execute and read and write
6BE000
heap
page read and write
1412000
heap
page read and write
6C870000
unkown
page read and write
48F0000
direct allocation
page read and write
4461000
heap
page read and write
B00000
unkown
page readonly
52E0000
direct allocation
page execute and read and write
7E0C000
stack
page read and write
744000
heap
page read and write
4DD0000
trusted library allocation
page read and write
23660000
heap
page read and write
36D4000
direct allocation
page execute and read and write
32DF000
stack
page read and write
4CD6000
heap
page read and write
4461000
heap
page read and write
51AC000
stack
page read and write
3A2E000
stack
page read and write
4AE0000
direct allocation
page execute and read and write
4CC0000
direct allocation
page read and write
5B3E000
stack
page read and write
3C8E000
stack
page read and write
4CC4000
heap
page read and write
670000
heap
page read and write
4461000
heap
page read and write
4A80000
direct allocation
page execute and read and write
3F5E000
direct allocation
page execute and read and write
345E000
stack
page read and write
4461000
heap
page read and write
36CE000
stack
page read and write
4461000
heap
page read and write
61E00000
direct allocation
page execute and read and write
9C9000
unkown
page write copy
3F4F000
stack
page read and write
43CE000
stack
page read and write
60DF000
stack
page read and write
72C000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
4461000
heap
page read and write
2DDF000
stack
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
4CC0000
direct allocation
page read and write
80BB000
stack
page read and write
23660000
heap
page read and write
2F1F000
stack
page read and write
2FBF000
stack
page read and write
611E000
stack
page read and write
940000
direct allocation
page read and write
4D40000
direct allocation
page execute and read and write
7F7000
stack
page read and write
There are 948 hidden memdumps, click here to show them.