IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\amadka[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\JJEGIJEGDB.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AFBAFBKEGCFBGCBFIDAK
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\AKFIDHDG
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\CAEHJEBKFCAKKFIEHDBFIEHDHI
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\CFIEGDAE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EGIDBFBFHJDGCAKEGHJECGHCGC
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\FCAAEHJDBKJJKFHJEBKF
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\FCAEBFIJKEBGHIDHIEGI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\HDAFBGIJKEGIECAAFHDHDGCBFC
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\explorti.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 18 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\JJEGIJEGDB.exe
"C:\Users\user\AppData\Local\Temp\JJEGIJEGDB.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
"C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\JJEGIJEGDB.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\KJJJJDHIDB.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://85.28.47.30/69934896f997d5bb/softokn3.dll
85.28.47.30
malicious
http://85.28.47.30/69934896f997d5bb/freebl3.dll
85.28.47.30
malicious
http://77.91.77.82/Hun4Ko/index.php
77.91.77.82
malicious
http://85.28.47.30/69934896f997d5bb/nss3.dll
85.28.47.30
malicious
http://77.91.77.82/Hun4Ko/index.php/
unknown
malicious
http://85.28.47.30/69934896f997d5bb/sqlite3.dll
85.28.47.30
malicious
http://77.91.77.82/Hun4Ko/index.php/Hun4Ko/index.php
unknown
malicious
http://85.28.47.30/69934896f997d5bb/vcruntime140.dll
85.28.47.30
malicious
85.28.47.30/920475a59bac849d.php
malicious
http://85.28.47.30/920475a59bac849d.php
85.28.47.30
malicious
http://85.28.47.30/69934896f997d5bb/msvcp140.dll
85.28.47.30
malicious
http://85.28.47.30/69934896f997d5bb/mozglue.dll
85.28.47.30
malicious
http://85.28.47.30
unknown
malicious
http://77.91.77.81/mine/amadka.exe
77.91.77.81
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://duckduckgo.com/ac/?q=
unknown
http://77.91.77.81/cost/go.exe
unknown
http://77.91.77.82/Hun4Ko/index.phpG
unknown
http://77.91.77.82/Hun4Ko/index.phpt.
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
http://85.28.47.30/69934896f997d5bb/softokn3.dll=
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://77.91.77.82/Hun4Ko/index.phpZ
unknown
http://77.91.77.82/Hun4Ko/index.php-
unknown
http://85.28.47.30/69934896f997d5bb/nss3.dlldf
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://85.28.47.30/920475a59bac849d.phpI
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17chost.exe
unknown
http://85.28.47.30/69934896f997d5bb/mozglue.dllhg
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016.exe
unknown
http://77.91.77.82/Hun4Ko/index.php9
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://www.sqlite.org/copyright.html.
unknown
http://77.91.77.81/mine/amadka.exe-Disposition:
unknown
http://77.91.77.81/mine/amadka.exeQ
unknown
http://77.91.77.81/mine/amadka.exe00
unknown
http://77.91.77.82/Hun4Ko/index.php40971b6b
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://77.91.77.82/Hun4Ko/index.php8.
unknown
http://77.91.77.81/cost/go.exeData
unknown
http://77.91.77.81/cost/go.exe00
unknown
http://77.91.77.82/Hun4Ko/index.php#
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://upx.sf.net
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://ac.ecopnacl
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://pki-ocsp.symauth.com0
unknown
http://77.91.77.82/Hun4Ko/index.phpq)
unknown
https://support.mozilla.org
unknown
https://ac.ecop
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 54 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
85.28.47.30
unknown
Russian Federation
malicious
77.91.77.82
unknown
Russian Federation
malicious
77.91.77.81
unknown
Russian Federation

Memdumps

Base Address
Regiontype
Protect
Malicious
51C0000
direct allocation
page read and write
malicious
4D60000
direct allocation
page read and write
malicious
191000
unkown
page execute and read and write
malicious
191000
unkown
page execute and read and write
malicious
4B1000
unkown
page execute and read and write
malicious
1324000
heap
page read and write
malicious
5230000
direct allocation
page read and write
malicious
A11000
unkown
page execute and read and write
malicious
5260000
direct allocation
page read and write
malicious
191000
unkown
page execute and read and write
malicious
229D2000
heap
page read and write
12B8000
stack
page read and write
376E000
stack
page read and write
5484000
heap
page read and write
484E000
stack
page read and write
30F0000
direct allocation
page read and write
1384000
heap
page read and write
1430000
heap
page read and write
6656000
heap
page read and write
4D31000
heap
page read and write
41CF000
stack
page read and write
4DD1000
heap
page read and write
4D31000
heap
page read and write
15A4000
heap
page read and write
3EAF000
stack
page read and write
1A5000
heap
page read and write
53C0000
direct allocation
page execute and read and write
229D0000
heap
page read and write
5450000
direct allocation
page execute and read and write
1384000
heap
page read and write
527E000
stack
page read and write
39AF000
stack
page read and write
468E000
stack
page read and write
1384000
heap
page read and write
FB4000
heap
page read and write
229ED000
heap
page read and write
6650000
heap
page read and write
464E000
stack
page read and write
4D10000
heap
page read and write
3DAE000
stack
page read and write
158A000
heap
page read and write
685F000
stack
page read and write
3510000
direct allocation
page execute and read and write
4D31000
heap
page read and write
28F77000
heap
page read and write
1C01F000
stack
page read and write
D12000
unkown
page execute and write copy
30F0000
direct allocation
page read and write
135F000
heap
page read and write
2D6E000
stack
page read and write
4DD1000
heap
page read and write
364E000
stack
page read and write
4DD1000
heap
page read and write
4D90000
direct allocation
page read and write
1384000
heap
page read and write
48C0000
direct allocation
page read and write
48C0000
direct allocation
page read and write
4AC000
heap
page read and write
F44000
heap
page read and write
4D31000
heap
page read and write
4DAE000
stack
page read and write
14DE000
stack
page read and write
1420000
heap
page read and write
4DD1000
heap
page read and write
4D31000
heap
page read and write
4EAF000
stack
page read and write
FB4000
heap
page read and write
4D31000
heap
page read and write
4DD1000
heap
page read and write
4D90000
direct allocation
page read and write
2FEE000
stack
page read and write
4D31000
heap
page read and write
1384000
heap
page read and write
FB4000
heap
page read and write
4C8F000
stack
page read and write
3BCE000
stack
page read and write
4D31000
heap
page read and write
1308000
heap
page read and write
5360000
direct allocation
page execute and read and write
3AEF000
stack
page read and write
380E000
stack
page read and write
39CF000
stack
page read and write
6C82F000
unkown
page readonly
15A2000
heap
page read and write
324F000
stack
page read and write
372F000
stack
page read and write
229D0000
heap
page read and write
1454000
heap
page read and write
4D31000
heap
page read and write
2FFFC000
stack
page read and write
1384000
heap
page read and write
14F7000
heap
page read and write
4D31000
heap
page read and write
1384000
heap
page read and write
FB4000
heap
page read and write
559B000
stack
page read and write
2FDFB000
stack
page read and write
624000
unkown
page execute and read and write
3C8E000
stack
page read and write
53C0000
direct allocation
page execute and read and write
4D31000
heap
page read and write
101B000
heap
page read and write
229C3000
heap
page read and write
324E000
stack
page read and write
15BA000
heap
page read and write
3554000
direct allocation
page execute and read and write
FB4000
heap
page read and write
4DE0000
heap
page read and write
1550000
heap
page read and write
6C86E000
unkown
page read and write
48CF000
stack
page read and write
4D31000
heap
page read and write
15AB000
heap
page read and write
4D31000
heap
page read and write
190000
unkown
page readonly
31AE000
stack
page read and write
1550000
heap
page read and write
6C682000
unkown
page readonly
EA4000
unkown
page execute and read and write
FD0000
heap
page read and write
28ED0000
trusted library allocation
page read and write
12FA000
stack
page read and write
4D31000
heap
page read and write
61ED0000
direct allocation
page read and write
6C5F1000
unkown
page execute read
412F000
stack
page read and write
4DD1000
heap
page read and write
4D31000
heap
page read and write
48D1000
heap
page read and write
E89000
unkown
page execute and write copy
F44000
heap
page read and write
1F2000
unkown
page execute and read and write
474F000
stack
page read and write
4DD1000
heap
page read and write
374F000
stack
page read and write
229DF000
heap
page read and write
229E4000
heap
page read and write
35EF000
stack
page read and write
1377000
heap
page read and write
4B0F000
stack
page read and write
4D20000
direct allocation
page read and write
A10000
unkown
page read and write
56DF000
stack
page read and write
1454000
heap
page read and write
3554000
direct allocation
page execute and read and write
15BA000
heap
page read and write
17CE000
stack
page read and write
4D20000
direct allocation
page read and write
4D31000
heap
page read and write
4D31000
heap
page read and write
22AB8000
heap
page read and write
626000
unkown
page execute and write copy
15CE000
heap
page read and write
3480000
heap
page read and write
31CE000
stack
page read and write
722C000
stack
page read and write
48C0000
direct allocation
page read and write
2BEF000
stack
page read and write
4D31000
heap
page read and write
663E000
stack
page read and write
4DD1000
heap
page read and write
4DD1000
heap
page read and write
6E1B000
stack
page read and write
1C941000
heap
page read and write
1454000
heap
page read and write
360E000
stack
page read and write
1384000
heap
page read and write
5350000
direct allocation
page execute and read and write
5480000
heap
page read and write
FB4000
heap
page read and write
4DA1000
heap
page read and write
36CE000
stack
page read and write
3F8F000
stack
page read and write
37BE000
stack
page read and write
4DD1000
heap
page read and write
191000
unkown
page execute and write copy
61ED4000
direct allocation
page readonly
229D5000
heap
page read and write
4DD1000
heap
page read and write
45CE000
stack
page read and write
2FAF000
stack
page read and write
1F9000
unkown
page read and write
348F000
stack
page read and write
4D31000
heap
page read and write
3A0E000
stack
page read and write
FB4000
heap
page read and write
15A2000
heap
page read and write
4DD1000
heap
page read and write
39EE000
stack
page read and write
229D9000
heap
page read and write
4D31000
heap
page read and write
1C940000
heap
page read and write
4DD1000
heap
page read and write
229EA000
heap
page read and write
69DE000
stack
page read and write
28F78000
heap
page read and write
229DF000
heap
page read and write
5260000
direct allocation
page read and write
3C2F000
stack
page read and write
1384000
heap
page read and write
33AE000
stack
page read and write
4D31000
heap
page read and write
51C0000
direct allocation
page read and write
3E8F000
stack
page read and write
158F000
heap
page read and write
2EAE000
stack
page read and write
229D0000
heap
page read and write
43E000
stack
page read and write
48C0000
direct allocation
page read and write
350E000
stack
page read and write
1BE1F000
stack
page read and write
328E000
stack
page read and write
464F000
stack
page read and write
4DD1000
heap
page read and write
48C0000
direct allocation
page read and write
480F000
stack
page read and write
229B6000
heap
page read and write
836000
unkown
page execute and read and write
6BB0000
heap
page read and write
229B6000
heap
page read and write
626000
unkown
page execute and write copy
5410000
direct allocation
page execute and read and write
229EA000
heap
page read and write
15CD000
heap
page read and write
55DE000
stack
page read and write
1F2000
unkown
page execute and read and write
4DD1000
heap
page read and write
48C0000
direct allocation
page read and write
229D0000
heap
page read and write
229DB000
heap
page read and write
6655000
heap
page read and write
3554000
direct allocation
page execute and read and write
492000
unkown
page execute and write copy
ADC000
stack
page read and write
1384000
heap
page read and write
FB4000
heap
page read and write
158F000
heap
page read and write
4D31000
heap
page read and write
374000
unkown
page execute and read and write
1454000
heap
page read and write
229CD000
heap
page read and write
229DF000
heap
page read and write
4D31000
heap
page read and write
1310000
heap
page read and write
4D31000
heap
page read and write
1384000
heap
page read and write
35CF000
stack
page read and write
3230000
direct allocation
page execute and read and write
738F000
heap
page read and write
5450000
direct allocation
page execute and read and write
7371000
heap
page read and write
1007000
heap
page read and write
3330000
direct allocation
page execute and read and write
4BCF000
stack
page read and write
34EE000
stack
page read and write
3D8E000
stack
page read and write
5420000
direct allocation
page execute and read and write
571E000
stack
page read and write
1384000
heap
page read and write
4DE7000
heap
page read and write
6BB0000
heap
page read and write
5FA000
unkown
page execute and read and write
229D4000
heap
page read and write
4DD1000
heap
page read and write
4D20000
direct allocation
page read and write
368F000
stack
page read and write
470000
direct allocation
page execute and read and write
53C0000
direct allocation
page execute and read and write
46CF000
stack
page read and write
4DD1000
heap
page read and write
4DD1000
heap
page read and write
229B6000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
7EF70000
direct allocation
page execute and read and write
1A7000
heap
page read and write
4D90000
direct allocation
page read and write
229CC000
heap
page read and write
4DD1000
heap
page read and write
414F000
stack
page read and write
229D0000
heap
page read and write
28F69000
heap
page read and write
5B1D000
stack
page read and write
4DD1000
heap
page read and write
1A7000
heap
page read and write
1384000
heap
page read and write
A10000
unkown
page readonly
4DD1000
heap
page read and write
2D2F000
stack
page read and write
5340000
direct allocation
page execute and read and write
1567000
heap
page read and write
3E4E000
stack
page read and write
310D000
heap
page read and write
4D90000
direct allocation
page read and write
1384000
heap
page read and write
4DA0000
heap
page read and write
F44000
heap
page read and write
384F000
stack
page read and write
490E000
stack
page read and write
1C66D000
stack
page read and write
1450000
heap
page read and write
2E6F000
stack
page read and write
492000
unkown
page execute and write copy
4D0F000
stack
page read and write
4F30000
direct allocation
page execute and read and write
4ED0000
direct allocation
page execute and read and write
4D31000
heap
page read and write
1F9000
unkown
page read and write
229DF000
heap
page read and write
1CA4C000
heap
page read and write
430F000
stack
page read and write
4CC000
unkown
page execute and write copy
158F000
heap
page read and write
1C6AE000
stack
page read and write
4D31000
heap
page read and write
53FC000
stack
page read and write
30F0000
direct allocation
page read and write
6B00000
heap
page read and write
38CE000
stack
page read and write
4D30000
heap
page read and write
53D0000
direct allocation
page execute and read and write
53AF000
stack
page read and write
6FEC000
stack
page read and write
4D31000
heap
page read and write
1F9000
unkown
page read and write
4DD1000
heap
page read and write
43CF000
stack
page read and write
1384000
heap
page read and write
FB4000
heap
page read and write
4DD1000
heap
page read and write
388F000
stack
page read and write
FB4000
heap
page read and write
190000
unkown
page readonly
30F0000
direct allocation
page read and write
48D1000
heap
page read and write
6E7000
unkown
page execute and read and write
414E000
stack
page read and write
15AE000
heap
page read and write
15A3000
heap
page read and write
1574000
heap
page read and write
4F20000
direct allocation
page execute and read and write
14FC000
heap
page read and write
1384000
heap
page read and write
4D31000
heap
page read and write
229ED000
heap
page read and write
4DD1000
heap
page read and write
FB4000
heap
page read and write
699F000
stack
page read and write
61EB7000
direct allocation
page readonly
229EA000
heap
page read and write
1454000
heap
page read and write
229EA000
heap
page read and write
4D60000
direct allocation
page read and write
229E8000
heap
page read and write
61ECD000
direct allocation
page readonly
4D90000
direct allocation
page read and write
30F0000
direct allocation
page read and write
154E000
heap
page read and write
15CD000
heap
page read and write
354F000
stack
page read and write
FB4000
heap
page read and write
4D31000
heap
page read and write
585E000
stack
page read and write
1384000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
229D0000
heap
page read and write
338E000
stack
page read and write
4D31000
heap
page read and write
394E000
stack
page read and write
48C0000
direct allocation
page read and write
3FCF000
stack
page read and write
4D4000
unkown
page execute and write copy
467E000
stack
page read and write
4B4F000
stack
page read and write
229C9000
heap
page read and write
14AB000
heap
page read and write
30F0000
direct allocation
page read and write
190000
unkown
page read and write
4D20000
direct allocation
page read and write
30F0000
direct allocation
page read and write
330E000
stack
page read and write
48C0000
direct allocation
page read and write
3220000
heap
page read and write
4D31000
heap
page read and write
4D31000
heap
page read and write
4DD1000
heap
page read and write
52AC000
stack
page read and write
4F50000
direct allocation
page execute and read and write
53F0000
direct allocation
page execute and read and write
148B000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
4CCE000
stack
page read and write
310E000
stack
page read and write
4D31000
heap
page read and write
626000
unkown
page execute and write copy
358E000
stack
page read and write
190000
unkown
page read and write
30F0000
direct allocation
page read and write
477F000
stack
page read and write
48C0000
direct allocation
page read and write
2FCE000
stack
page read and write
48C0000
direct allocation
page read and write
229E5000
heap
page read and write
3A4F000
stack
page read and write
3543000
direct allocation
page execute and read and write
6D5000
unkown
page execute and read and write
53F0000
direct allocation
page execute and read and write
1F9000
unkown
page write copy
5440000
direct allocation
page execute and read and write
1C930000
heap
page read and write
374000
unkown
page execute and read and write
4F10000
direct allocation
page execute and read and write
F8E000
stack
page read and write
438F000
stack
page read and write
4D31000
heap
page read and write
4DD1000
heap
page read and write
12FD000
stack
page read and write
4DD1000
heap
page read and write
5320000
direct allocation
page execute and read and write
14B0000
heap
page read and write
7370000
heap
page read and write
388E000
stack
page read and write
30F0000
direct allocation
page read and write
1384000
heap
page read and write
1370000
heap
page read and write
FB4000
heap
page read and write
14FA000
heap
page read and write
1FB000
unkown
page execute and read and write
483000
unkown
page execute and read and write
F44000
heap
page read and write
492000
unkown
page execute and read and write
6CE0000
heap
page read and write
FB4000
heap
page read and write
48C0000
direct allocation
page read and write
53F0000
direct allocation
page execute and read and write
1FB000
unkown
page execute and read and write
4DD1000
heap
page read and write
FB4000
heap
page read and write
3550000
direct allocation
page execute and read and write
4DD1000
heap
page read and write
33CE000
stack
page read and write
E8C000
unkown
page execute and read and write
4D31000
heap
page read and write
2C2E000
stack
page read and write
4F80000
direct allocation
page execute and read and write
736E000
stack
page read and write
308F000
stack
page read and write
1384000
heap
page read and write
4DD1000
heap
page read and write
150F000
heap
page read and write
4DD1000
heap
page read and write
4D31000
heap
page read and write
134B000
heap
page read and write
229EA000
heap
page read and write
326E000
stack
page read and write
4D31000
heap
page read and write
1454000
heap
page read and write
402E000
stack
page read and write
34CE000
stack
page read and write
338F000
stack
page read and write
493000
unkown
page execute and write copy
624000
unkown
page execute and read and write
4DD1000
heap
page read and write
191000
unkown
page execute and write copy
624000
unkown
page execute and read and write
F3B000
stack
page read and write
420E000
stack
page read and write
1340000
heap
page read and write
48C0000
direct allocation
page read and write
28CBE000
stack
page read and write
6E7000
unkown
page execute and write copy
5170000
trusted library allocation
page read and write
F44000
heap
page read and write
28EBE000
stack
page read and write
30E0000
heap
page read and write
FB4000
heap
page read and write
5210000
heap
page read and write
1384000
heap
page read and write
43FE000
stack
page read and write
30CF000
stack
page read and write
4DD1000
heap
page read and write
1F9000
unkown
page write copy
4130000
heap
page read and write
5430000
direct allocation
page execute and read and write
377E000
stack
page read and write
4D8F000
stack
page read and write
4DD1000
heap
page read and write
4DA1000
heap
page read and write
4D31000
heap
page read and write
15BA000
heap
page read and write
1384000
heap
page read and write
4D31000
heap
page read and write
1384000
heap
page read and write
5390000
direct allocation
page execute and read and write
5C5D000
stack
page read and write
158F000
heap
page read and write
5D5E000
stack
page read and write
14D4000
heap
page read and write
4D20000
direct allocation
page read and write
32CF000
stack
page read and write
D12000
unkown
page execute and read and write
4EE0000
direct allocation
page execute and read and write
53F0000
direct allocation
page execute and read and write
1384000
heap
page read and write
A7B000
unkown
page execute and read and write
3F4F000
stack
page read and write
158F000
heap
page read and write
458F000
stack
page read and write
EA6000
unkown
page execute and write copy
A72000
unkown
page execute and read and write
10B000
stack
page read and write
1000000
heap
page read and write
4D31000
heap
page read and write
492000
unkown
page execute and read and write
5330000
direct allocation
page execute and read and write
4D20000
direct allocation
page read and write
53E0000
direct allocation
page execute and read and write
4D20000
direct allocation
page read and write
2AEE000
stack
page read and write
336F000
stack
page read and write
480000
heap
page read and write
373E000
stack
page read and write
454E000
stack
page read and write
6F1C000
stack
page read and write
53B0000
direct allocation
page execute and read and write
149E000
heap
page read and write
4D31000
heap
page read and write
30DF000
stack
page read and write
1FB000
unkown
page execute and read and write
15B7000
heap
page read and write
42CE000
stack
page read and write
48D0000
heap
page read and write
191000
unkown
page execute and write copy
3ECF000
stack
page read and write
5400000
direct allocation
page execute and read and write
520E000
stack
page read and write
1F2000
unkown
page execute and read and write
4DD1000
heap
page read and write
4DD1000
heap
page read and write
6C5F0000
unkown
page readonly
355E000
direct allocation
page execute and read and write
4D90000
direct allocation
page read and write
2F8F000
stack
page read and write
229EA000
heap
page read and write
156E000
heap
page read and write
483000
heap
page read and write
3554000
direct allocation
page execute and read and write
4DD1000
heap
page read and write
5260000
direct allocation
page read and write
149E000
stack
page read and write
488F000
stack
page read and write
4D31000
heap
page read and write
4DD1000
heap
page read and write
34AF000
stack
page read and write
726E000
stack
page read and write
492000
unkown
page execute and write copy
4D90000
direct allocation
page read and write
4D90000
direct allocation
page read and write
1C46E000
stack
page read and write
30F0000
direct allocation
page read and write
498E000
stack
page read and write
4D31000
heap
page read and write
689E000
stack
page read and write
370F000
stack
page read and write
3DCE000
stack
page read and write
1384000
heap
page read and write
FB4000
heap
page read and write
4F60000
direct allocation
page execute and read and write
FC0000
heap
page read and write
FCE000
stack
page read and write
14AC000
heap
page read and write
FB4000
heap
page read and write
4D31000
heap
page read and write
FB4000
heap
page read and write
140E000
stack
page read and write
16EF000
stack
page read and write
48C0000
direct allocation
page read and write
4DD1000
heap
page read and write
4D31000
heap
page read and write
4D31000
heap
page read and write
43BF000
stack
page read and write
53D0000
direct allocation
page execute and read and write
229D2000
heap
page read and write
14BB000
heap
page read and write
6CE2000
heap
page read and write
3A8E000
stack
page read and write
355E000
direct allocation
page execute and read and write
4DD1000
heap
page read and write
3C4F000
stack
page read and write
4D31000
heap
page read and write
4D90000
direct allocation
page read and write
FB4000
heap
page read and write
53A0000
direct allocation
page execute and read and write
3F0E000
stack
page read and write
5260000
direct allocation
page read and write
4DD1000
heap
page read and write
53E0000
direct allocation
page execute and read and write
4DD1000
heap
page read and write
FB4000
heap
page read and write
4A0E000
stack
page read and write
53C0000
direct allocation
page execute and read and write
1384000
heap
page read and write
170000
heap
page read and write
229E4000
heap
page read and write
15B7000
heap
page read and write
FB4000
heap
page read and write
4DD1000
heap
page read and write
48D1000
heap
page read and write
30F0000
direct allocation
page read and write
6CE4000
heap
page read and write
390F000
stack
page read and write
FB4000
heap
page read and write
4D20000
direct allocation
page read and write
1384000
heap
page read and write
229ED000
heap
page read and write
53F0000
direct allocation
page execute and read and write
FB4000
heap
page read and write
6BA1000
heap
page read and write
1384000
heap
page read and write
F44000
heap
page read and write
428F000
stack
page read and write
229C3000
heap
page read and write
15A2000
heap
page read and write
229EA000
heap
page read and write
3EEE000
stack
page read and write
53A0000
direct allocation
page execute and read and write
229E5000
heap
page read and write
1384000
heap
page read and write
1454000
heap
page read and write
4DD1000
heap
page read and write
229E1000
heap
page read and write
4D20000
direct allocation
page read and write
229ED000
heap
page read and write
229ED000
heap
page read and write
FB4000
heap
page read and write
320F000
stack
page read and write
4DD1000
heap
page read and write
4D31000
heap
page read and write
D13000
unkown
page execute and write copy
483000
unkown
page execute and read and write
47CE000
stack
page read and write
4DD1000
heap
page read and write
FB4000
heap
page read and write
400F000
stack
page read and write
1C21F000
stack
page read and write
3B0E000
stack
page read and write
4DC1000
direct allocation
page read and write
4D31000
heap
page read and write
4DD1000
heap
page read and write
4DD1000
heap
page read and write
1454000
heap
page read and write
493000
unkown
page execute and write copy
229DF000
heap
page read and write
4D48000
heap
page read and write
F44000
heap
page read and write
229D0000
heap
page read and write
14F0000
heap
page read and write
4DA1000
heap
page read and write
40CE000
stack
page read and write
1384000
heap
page read and write
4D31000
heap
page read and write
4D31000
heap
page read and write
1529000
heap
page read and write
5230000
direct allocation
page read and write
FB4000
heap
page read and write
47C000
unkown
page execute and read and write
CD0000
unkown
page execute and read and write
556000
unkown
page execute and read and write
F44000
heap
page read and write
3B4E000
stack
page read and write
5350000
direct allocation
page execute and read and write
398F000
stack
page read and write
4A4E000
stack
page read and write
4DD1000
heap
page read and write
334F000
stack
page read and write
1454000
heap
page read and write
17EF000
stack
page read and write
3B2E000
stack
page read and write
229E1000
heap
page read and write
3F8E000
stack
page read and write
4DD1000
heap
page read and write
CFC000
unkown
page execute and read and write
120E000
stack
page read and write
FB4000
heap
page read and write
4D31000
heap
page read and write
1384000
heap
page read and write
4D31000
heap
page read and write
3ECE000
stack
page read and write
229EA000
heap
page read and write
4F40000
direct allocation
page execute and read and write
4D31000
heap
page read and write
FB4000
heap
page read and write
39CE000
stack
page read and write
440E000
stack
page read and write
229CD000
heap
page read and write
61E01000
direct allocation
page execute read
4D31000
heap
page read and write
A11000
unkown
page execute and write copy
483000
unkown
page execute and read and write
1300000
heap
page read and write
38AE000
stack
page read and write
229CA000
heap
page read and write
2FDE000
stack
page read and write
4D31000
heap
page read and write
FB4000
heap
page read and write
6C66D000
unkown
page readonly
FDC000
stack
page read and write
4DD1000
heap
page read and write
3B0F000
stack
page read and write
3554000
direct allocation
page execute and read and write
4F70000
direct allocation
page execute and read and write
374000
unkown
page execute and read and write
4D31000
heap
page read and write
6EC000
unkown
page execute and write copy
158A000
heap
page read and write
4D31000
heap
page read and write
12B3000
stack
page read and write
4EF0000
direct allocation
page execute and read and write
146E000
stack
page read and write
15A2000
heap
page read and write
12FD000
stack
page read and write
4DD1000
heap
page read and write
6BA0000
heap
page read and write
53C0000
direct allocation
page execute and read and write
4DD1000
heap
page read and write
322F000
stack
page read and write
51C0000
direct allocation
page read and write
494F000
stack
page read and write
229DF000
heap
page read and write
15A2000
heap
page read and write
595F000
stack
page read and write
5210000
trusted library allocation
page read and write
F44000
heap
page read and write
3FEF000
stack
page read and write
1454000
heap
page read and write
FB4000
heap
page read and write
4D31000
heap
page read and write
4D31000
heap
page read and write
3C4E000
stack
page read and write
5C1C000
stack
page read and write
386F000
stack
page read and write
190000
unkown
page read and write
4D90000
direct allocation
page read and write
4DF0000
heap
page read and write
478E000
stack
page read and write
4D90000
direct allocation
page read and write
4D20000
direct allocation
page read and write
229D0000
heap
page read and write
1437000
heap
page read and write
FB4000
heap
page read and write
362E000
stack
page read and write
1384000
heap
page read and write
14FA000
heap
page read and write
4D31000
heap
page read and write
156F000
heap
page read and write
450000
unkown
page execute and read and write
1F9000
unkown
page write copy
4D31000
heap
page read and write
229ED000
heap
page read and write
6C67E000
unkown
page read and write
4DD1000
heap
page read and write
5230000
direct allocation
page read and write
478F000
stack
page read and write
4D31000
heap
page read and write
158B000
heap
page read and write
3D6F000
stack
page read and write
229ED000
heap
page read and write
48C0000
direct allocation
page read and write
130F000
stack
page read and write
3107000
heap
page read and write
4DD0000
heap
page read and write
30F0000
direct allocation
page read and write
4D20000
direct allocation
page read and write
1384000
heap
page read and write
51C0000
direct allocation
page read and write
1384000
heap
page read and write
492000
unkown
page execute and read and write
5490000
direct allocation
page execute and read and write
378E000
stack
page read and write
48BF000
stack
page read and write
229D0000
heap
page read and write
5EBF000
stack
page read and write
1544000
heap
page read and write
417E000
stack
page read and write
D03000
unkown
page execute and read and write
229CF000
heap
page read and write
450000
unkown
page execute and read and write
4D31000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
FB4000
heap
page read and write
460000
heap
page read and write
53F0000
direct allocation
page execute and read and write
229CD000
heap
page read and write
1569000
heap
page read and write
37CF000
stack
page read and write
229E7000
heap
page read and write
314C000
stack
page read and write
4D31000
heap
page read and write
1384000
heap
page read and write
6C690000
unkown
page readonly
4D31000
heap
page read and write
4B0000
unkown
page readonly
4DD1000
heap
page read and write
5DBE000
stack
page read and write
FA0000
heap
page read and write
16EF000
stack
page read and write
5221000
direct allocation
page read and write
3D8F000
stack
page read and write
53C0000
direct allocation
page execute and read and write
14FE000
heap
page read and write
5380000
direct allocation
page execute and read and write
5350000
direct allocation
page execute and read and write
53F0000
direct allocation
page execute and read and write
4D31000
heap
page read and write
1FC000
unkown
page execute and read and write
5420000
direct allocation
page execute and read and write
4A0000
heap
page read and write
FB4000
heap
page read and write
FB4000
heap
page read and write
229E9000
heap
page read and write
229E4000
heap
page read and write
463F000
stack
page read and write
4DD1000
heap
page read and write
61ED3000
direct allocation
page read and write
453E000
stack
page read and write
4DD1000
heap
page read and write
229E4000
heap
page read and write
229ED000
heap
page read and write
1384000
heap
page read and write
1C941000
heap
page read and write
43CE000
stack
page read and write
581F000
stack
page read and write
3C0F000
stack
page read and write
1ED000
stack
page read and write
8C5000
unkown
page execute and read and write
4DD1000
heap
page read and write
4D31000
heap
page read and write
1C41F000
stack
page read and write
1384000
heap
page read and write
5350000
direct allocation
page execute and read and write
47C000
unkown
page execute and read and write
4DD1000
heap
page read and write
229CD000
heap
page read and write
4C0E000
stack
page read and write
1CA40000
trusted library allocation
page read and write
360F000
stack
page read and write
493000
unkown
page execute and write copy
6C86F000
unkown
page write copy
1384000
heap
page read and write
229ED000
heap
page read and write
19CF000
stack
page read and write
5ACF000
stack
page read and write
F44000
heap
page read and write
2FDBC000
stack
page read and write
53E0000
direct allocation
page execute and read and write
3ACF000
stack
page read and write
1427000
heap
page read and write
4D31000
heap
page read and write
130E000
heap
page read and write
229CE000
heap
page read and write
A79000
unkown
page read and write
229CB000
heap
page read and write
4D31000
heap
page read and write
3554000
direct allocation
page execute and read and write
229EA000
heap
page read and write
BF4000
unkown
page execute and read and write
229D0000
heap
page read and write
4A8F000
stack
page read and write
4D20000
direct allocation
page read and write
30EF000
stack
page read and write
4DD1000
heap
page read and write
4B0000
unkown
page readonly
FB4000
heap
page read and write
229CD000
heap
page read and write
4D31000
heap
page read and write
F44000
heap
page read and write
3B8F000
stack
page read and write
28F70000
heap
page read and write
160000
heap
page read and write
BDD000
stack
page read and write
1384000
heap
page read and write
5230000
direct allocation
page read and write
229CA000
heap
page read and write
F44000
heap
page read and write
1384000
heap
page read and write
229CB000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
4B4E000
stack
page read and write
4D31000
heap
page read and write
53C0000
direct allocation
page execute and read and write
427F000
stack
page read and write
4D31000
heap
page read and write
4D20000
direct allocation
page read and write
460F000
stack
page read and write
4DD1000
heap
page read and write
137B000
heap
page read and write
4D31000
heap
page read and write
4DD1000
heap
page read and write
4D31000
heap
page read and write
5390000
direct allocation
page execute and read and write
4D31000
heap
page read and write
30F0000
direct allocation
page read and write
3D0E000
stack
page read and write
28A7D000
stack
page read and write
470E000
stack
page read and write
3C6E000
stack
page read and write
448E000
stack
page read and write
14AE000
stack
page read and write
410F000
stack
page read and write
156C000
heap
page read and write
4DD1000
heap
page read and write
E8C000
unkown
page execute and write copy
340F000
stack
page read and write
5480000
direct allocation
page execute and read and write
229DF000
heap
page read and write
229D2000
heap
page read and write
4D31000
heap
page read and write
4DD1000
heap
page read and write
FB4000
heap
page read and write
318F000
stack
page read and write
4D31000
heap
page read and write
14F0000
heap
page read and write
3100000
heap
page read and write
4D60000
direct allocation
page read and write
537F000
stack
page read and write
14EB000
stack
page read and write
3544000
direct allocation
page execute and read and write
229D0000
heap
page read and write
5470000
direct allocation
page execute and read and write
59CE000
stack
page read and write
400E000
stack
page read and write
31EE000
stack
page read and write
FAC000
stack
page read and write
14FA000
heap
page read and write
5320000
heap
page read and write
3D8F000
stack
page read and write
15CD000
heap
page read and write
FB4000
heap
page read and write
229C4000
heap
page read and write
450E000
stack
page read and write
12BC000
stack
page read and write
BE3000
unkown
page execute and read and write
4F8000
unkown
page execute and read and write
1454000
heap
page read and write
4D31000
heap
page read and write
2FBBC000
stack
page read and write
229B7000
heap
page read and write
434E000
stack
page read and write
37C0000
heap
page read and write
1384000
heap
page read and write
4D31000
heap
page read and write
4DD1000
heap
page read and write
1A0000
heap
page read and write
FB4000
heap
page read and write
3D4F000
stack
page read and write
444E000
stack
page read and write
229E1000
heap
page read and write
61E00000
direct allocation
page execute and read and write
5350000
direct allocation
page execute and read and write
4D31000
heap
page read and write
4DD1000
heap
page read and write
229ED000
heap
page read and write
1C8AC000
stack
page read and write
E40000
heap
page read and write
4DD1000
heap
page read and write
4D90000
direct allocation
page read and write
4DD1000
heap
page read and write
4D90000
direct allocation
page read and write
4C8E000
stack
page read and write
12D0000
heap
page read and write
6ADF000
stack
page read and write
5440000
direct allocation
page execute and read and write
229E4000
heap
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
4D10000
trusted library allocation
page read and write
1454000
heap
page read and write
4B1000
unkown
page execute and write copy
374E000
stack
page read and write
229DF000
heap
page read and write
4D31000
heap
page read and write
1384000
heap
page read and write
450000
unkown
page execute and read and write
346E000
stack
page read and write
5430000
direct allocation
page execute and read and write
81C000
unkown
page execute and read and write
229C3000
heap
page read and write
13F0000
heap
page read and write
4D31000
heap
page read and write
1384000
heap
page read and write
4DD1000
heap
page read and write
FB4000
heap
page read and write
53F0000
direct allocation
page execute and read and write
190000
unkown
page readonly
49CF000
stack
page read and write
5400000
direct allocation
page execute and read and write
F40000
heap
page read and write
4DD1000
heap
page read and write
1384000
heap
page read and write
4D31000
heap
page read and write
48CE000
stack
page read and write
3490000
heap
page read and write
FB0000
heap
page read and write
4D31000
heap
page read and write
4D31000
heap
page read and write
4DD1000
heap
page read and write
3CCF000
stack
page read and write
5350000
direct allocation
page execute and read and write
15B7000
heap
page read and write
47C000
unkown
page execute and read and write
4D60000
direct allocation
page read and write
5291000
direct allocation
page read and write
229C9000
heap
page read and write
44CF000
stack
page read and write
14E0000
heap
page read and write
312E000
stack
page read and write
53D0000
direct allocation
page execute and read and write
4DD1000
heap
page read and write
47BE000
stack
page read and write
1010000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
424F000
stack
page read and write
229D2000
heap
page read and write
408F000
stack
page read and write
4C4F000
stack
page read and write
4D31000
heap
page read and write
6C870000
unkown
page read and write
4D31000
heap
page read and write
4ACE000
stack
page read and write
51E0000
trusted library allocation
page read and write
1454000
heap
page read and write
344E000
stack
page read and write
FB4000
heap
page read and write
42BE000
stack
page read and write
30F0000
direct allocation
page read and write
4D20000
direct allocation
page read and write
44FF000
stack
page read and write
15AB000
heap
page read and write
14FE000
heap
page read and write
229E1000
heap
page read and write
15A2000
heap
page read and write
61ECC000
direct allocation
page read and write
5370000
direct allocation
page execute and read and write
4DD1000
heap
page read and write
34CF000
stack
page read and write
28F71000
heap
page read and write
61EB4000
direct allocation
page read and write
404E000
stack
page read and write
147A000
heap
page read and write
5460000
direct allocation
page execute and read and write
4DCF000
stack
page read and write
1384000
heap
page read and write
4D40000
heap
page read and write
229B7000
heap
page read and write
4D31000
heap
page read and write
229CD000
heap
page read and write
156E000
heap
page read and write
158F000
heap
page read and write
3554000
direct allocation
page execute and read and write
4D90000
direct allocation
page read and write
6EC000
unkown
page execute and read and write
418E000
stack
page read and write
6C875000
unkown
page readonly
1384000
heap
page read and write
229EA000
heap
page read and write
4B8E000
stack
page read and write
530F000
stack
page read and write
3E0F000
stack
page read and write
1454000
heap
page read and write
4DD1000
heap
page read and write
1454000
heap
page read and write
6BAE000
heap
page read and write
4D31000
heap
page read and write
4F00000
direct allocation
page execute and read and write
1384000
heap
page read and write
1380000
heap
page read and write
53B0000
direct allocation
page execute and read and write
53C0000
direct allocation
page execute and read and write
FB4000
heap
page read and write
229DF000
heap
page read and write
859000
unkown
page execute and read and write
6C691000
unkown
page execute read
4D31000
heap
page read and write
4DD1000
heap
page read and write
428E000
stack
page read and write
5410000
direct allocation
page execute and read and write
28C7D000
stack
page read and write
1372000
heap
page read and write
A79000
unkown
page write copy
15AA000
heap
page read and write
450E000
stack
page read and write
52C1000
direct allocation
page read and write
4A0F000
stack
page read and write
There are 1082 hidden memdumps, click here to show them.