IOC Report
Cortex.exe

loading gif

Files

File Path
Type
Category
Malicious
Cortex.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Litiun\EBatt.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Litiun\Shorts.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\Public\ler1231.txt
ASCII text, with very long lines (510), with no line terminators
dropped
C:\Users\Public\ler4089.txt
ASCII text, with very long lines (510), with no line terminators
dropped
C:\Users\Public\ler4350.txt
ASCII text, with very long lines (510), with no line terminators
dropped
C:\Users\Public\ler6526.txt
ASCII text, with very long lines (510), with no line terminators
dropped
C:\Users\Public\ler8902.txt
ASCII text, with very long lines (510), with no line terminators
dropped
C:\Users\Public\ler9284.txt
ASCII text, with very long lines (510), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\conf[1].txt
ASCII text, with very long lines (510), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\conf[1].txt
ASCII text, with very long lines (510), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Aula[1].mpeg
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Boletim[1].jpg
PE32+ executable (GUI) x86-64, for MS Windows
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Litiun\Shorts.exe
c:\Litiun\Shorts.exe
malicious
C:\Litiun\EBatt.exe
c:\Litiun\EBatt.exe
malicious
C:\Litiun\Shorts.exe
"C:\Litiun\Shorts.exe"
malicious
C:\Litiun\EBatt.exe
"C:\Litiun\EBatt.exe"
malicious
C:\Litiun\Shorts.exe
"C:\Litiun\Shorts.exe"
malicious
C:\Litiun\EBatt.exe
"C:\Litiun\EBatt.exe"
malicious
C:\Users\user\Desktop\Cortex.exe
"C:\Users\user\Desktop\Cortex.exe"

URLs

Name
IP
Malicious
https://albumdecolegial.s3.eu-north-1.amazonaws.com/Aula.mpeg
16.12.9.22
malicious
https://albumdecolegial.s3.eu-north-1.amazonaws.com/Boletim.jpeg
16.12.9.22
malicious
http://www.somewhere.org
unknown
http://94.241.141.101/dm4/
unknown
https://s3.timew
unknown
http://94.241.141.101/dm4/Ahttps://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txt
unknown
http://94.241.141.101/teg/A
unknown
http://94.241.141.101/teg/PD
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txtnV
unknown
http://185.178.46.42/vo/ram
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txt2
unknown
http://94.241.141.101/teg/e?
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txt.
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txtM2Y
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txt~Y1
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txt
92.53.116.138
http://94.241.141.101/teg/
unknown
http://94.241.141.101/teg/Q
unknown
http://94.241.141.101/teg/publi.php1
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txtaY
unknown
https://s3.timeweb.com/t
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txt3W
unknown
https://s3.timeweb.com/ws
unknown
http://www.somewhere.orgze
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txtRRC:
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txtWv8
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txtdW
unknown
https://albumdecolegial.s3.eu-north-1.amazonaws.com/Aula.mpegC
unknown
http://94.241.141.101/teg/5
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txtY4
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txtcy
unknown
http://94.241.141.101/dm4/03x
unknown
https://s3.timeweb.com/?Ia
unknown
https://albumdecolegial.s3.eu-north-1.amazonaws.com/Boletim.jpeg(HF
unknown
http://94.241.141.101/teg/publi.php
unknown
https://albumdecolegial.s3.eu-north-1.amazonaws.com/Aula.mpeg0
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txt/41907bc4-chronocromdocrom/integra/
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txtW
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txtNv3
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/one/cnf.txt
unknown
http://94.241.141.101/dm4/03
unknown
https://albumdecolegial.s3.eu-north-1.amazonaws.com/Boletim.jpegb
unknown
https://s3.timeweb.com/kx
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txth
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txth=
unknown
http://185.178.46.42/vo/
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txtC:
unknown
http://94.241.141.101/teg/JX
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txt9Z
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txtrt
unknown
http://94.241.141.101/teg/publi.phpPD
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txt9W
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txtp/
unknown
http://94.241.141.101/teg/publi.php(
unknown
http://94.241.141.101/teg/a
unknown
https://s3.timeweb.com/
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txt5
unknown
https://albumdecolegial.s3.eu-north-1.amazonaws.com/Boletim.jpegL
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txtG/
unknown
https://albumdecolegial.s3.eu-north-1.amazonaws.com/Aula.mpegq_
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txtP
unknown
https://albumdecolegial.s3.eu-north-1.amazonaws.com/Boletim.jpegC
unknown
http://94.241.141.101/teg/q
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txtE
unknown
https://albumdecolegial.s3.eu-north-1.amazonaws.com/Aula.mpegy
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txtD
unknown
https://albumdecolegial.s3.eu-north-1.amazonaws.com/
unknown
https://s3.timeweb.com/41907bc4-chronocromdocrom/integra/conf.txtLMEM
unknown
There are 58 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s3-r-w.eu-north-1.amazonaws.com
16.12.9.22
malicious
s3.timeweb.com
92.53.116.138
albumdecolegial.s3.eu-north-1.amazonaws.com
unknown

IPs

IP
Domain
Country
Malicious
16.12.9.22
s3-r-w.eu-north-1.amazonaws.com
United States
malicious
92.53.116.138
s3.timeweb.com
Russian Federation
94.241.141.101
unknown
Iran (ISLAMIC Republic Of)

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Nick
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Litiun
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
474F000
stack
page read and write
818000
unkown
page read and write
4CBB000
stack
page read and write
5E19000
heap
page read and write
1A0000
heap
page read and write
9EC000
heap
page read and write
D9D000
direct allocation
page read and write
9F8000
heap
page read and write
8C7000
unkown
page readonly
5E14000
heap
page read and write
267C000
direct allocation
page read and write
DAB000
direct allocation
page read and write
82B000
unkown
page read and write
87D000
unkown
page read and write
26ED000
direct allocation
page read and write
2624000
direct allocation
page read and write
1202000
heap
page read and write
11BB000
heap
page read and write
88E000
unkown
page readonly
56AE000
stack
page read and write
2698000
direct allocation
page read and write
930000
heap
page read and write
E8C000
heap
page read and write
A98000
heap
page read and write
25D9000
direct allocation
page read and write
97A000
heap
page read and write
2990000
heap
page read and write
831000
unkown
page read and write
9F9000
heap
page read and write
2ECC000
stack
page read and write
9F8000
heap
page read and write
C4F000
stack
page read and write
180000
heap
page read and write
DED000
direct allocation
page read and write
3E50000
heap
page read and write
481F000
direct allocation
page read and write
2D90000
direct allocation
page read and write
2655000
direct allocation
page read and write
7CD000
unkown
page read and write
983000
heap
page read and write
4C5F000
stack
page read and write
401000
unkown
page execute read
2C90000
heap
page read and write
1215000
heap
page read and write
262B000
direct allocation
page read and write
2594000
direct allocation
page read and write
D8E000
direct allocation
page read and write
A9F000
heap
page read and write
2BC0000
heap
page read and write
7FF000
unkown
page read and write
9D1000
heap
page read and write
5E02000
heap
page read and write
A90000
heap
page read and write
5DFB000
heap
page read and write
1C0000
heap
page read and write
A0B000
heap
page read and write
9CA000
heap
page read and write
840000
unkown
page read and write
DE6000
direct allocation
page read and write
81B000
unkown
page read and write
4877000
direct allocation
page read and write
432D000
stack
page read and write
933000
heap
page read and write
9F8000
heap
page read and write
E1D000
direct allocation
page read and write
121C000
heap
page read and write
481C000
direct allocation
page read and write
489F000
direct allocation
page read and write
2670000
direct allocation
page read and write
822000
unkown
page read and write
83E000
unkown
page read and write
902000
unkown
page readonly
F75000
heap
page read and write
9D4000
heap
page read and write
EBC000
heap
page read and write
D69000
direct allocation
page read and write
A9D000
heap
page read and write
2665000
direct allocation
page read and write
D3D000
direct allocation
page read and write
2606000
direct allocation
page read and write
2D60000
heap
page read and write
2791000
direct allocation
page read and write
2D6C000
direct allocation
page read and write
2671000
direct allocation
page read and write
1B0000
heap
page read and write
945000
heap
page read and write
9F8000
heap
page read and write
7EF000
unkown
page read and write
99D000
heap
page read and write
3560000
trusted library allocation
page read and write
D56000
direct allocation
page read and write
480B000
direct allocation
page read and write
920000
direct allocation
page execute and read and write
844000
unkown
page read and write
26DF000
direct allocation
page read and write
9D9000
heap
page read and write
9FF000
heap
page read and write
9B9000
heap
page read and write
485E000
direct allocation
page read and write
822000
unkown
page read and write
4820000
direct allocation
page read and write
D0E000
direct allocation
page read and write
2603000
direct allocation
page read and write
808000
unkown
page read and write
190000
heap
page read and write
959000
heap
page read and write
9EE000
heap
page read and write
97A000
heap
page read and write
9AF000
heap
page read and write
1150000
heap
page read and write
95C000
heap
page read and write
A30000
heap
page read and write
7F2000
unkown
page read and write
A55000
heap
page read and write
19B000
stack
page read and write
1C0000
heap
page read and write
9F0000
heap
page read and write
E36000
direct allocation
page read and write
26B3000
direct allocation
page read and write
975000
heap
page read and write
4D70000
trusted library allocation
page read and write
7FF000
unkown
page read and write
831000
unkown
page read and write
D86000
direct allocation
page read and write
2950000
direct allocation
page execute and read and write
7F4000
unkown
page read and write
3210000
heap
page read and write
A2E000
heap
page read and write
5DF2000
heap
page read and write
822000
unkown
page read and write
E14000
direct allocation
page read and write
2583000
direct allocation
page read and write
26FF000
direct allocation
page read and write
95E000
heap
page read and write
828000
unkown
page read and write
9F8000
heap
page read and write
D3F000
direct allocation
page read and write
4852000
direct allocation
page read and write
4840000
direct allocation
page read and write
134F000
stack
page read and write
7E2000
unkown
page read and write
2F6F000
stack
page read and write
2711000
direct allocation
page read and write
4859000
direct allocation
page read and write
2D32000
direct allocation
page read and write
2636000
direct allocation
page read and write
9AE000
heap
page read and write
4863000
direct allocation
page read and write
486E000
direct allocation
page read and write
88A000
unkown
page read and write
4852000
direct allocation
page read and write
A05000
heap
page read and write
9A6000
heap
page read and write
857000
unkown
page read and write
9FD000
heap
page read and write
82B000
unkown
page read and write
808000
unkown
page read and write
A06000
heap
page read and write
4879000
direct allocation
page read and write
82B000
unkown
page read and write
9AB000
heap
page read and write
5DED000
heap
page read and write
7FB000
unkown
page read and write
DDF000
direct allocation
page read and write
474F000
stack
page read and write
485E000
direct allocation
page read and write
5DED000
heap
page read and write
4B2E000
unkown
page read and write
1231000
heap
page read and write
844000
unkown
page read and write
9A9000
heap
page read and write
265B000
direct allocation
page read and write
82D000
unkown
page read and write
A51000
heap
page read and write
E2C000
direct allocation
page read and write
121000
stack
page read and write
482D000
direct allocation
page read and write
2703000
direct allocation
page read and write
275C000
direct allocation
page read and write
A0E000
heap
page read and write
2D1B000
direct allocation
page read and write
A02000
heap
page read and write
11F6000
heap
page read and write
FF5000
heap
page read and write
9D9000
heap
page read and write
484B000
direct allocation
page read and write
3520000
trusted library allocation
page read and write
4816000
direct allocation
page read and write
DC0000
direct allocation
page read and write
D5D000
direct allocation
page read and write
47DA000
direct allocation
page read and write
882000
unkown
page read and write
47EC000
direct allocation
page read and write
F4C000
heap
page read and write
C8F000
stack
page read and write
841000
unkown
page read and write
828000
unkown
page read and write
2659000
direct allocation
page read and write
26C4000
direct allocation
page read and write
2F90000
remote allocation
page read and write
D7D000
direct allocation
page read and write
9AF000
heap
page read and write
86B000
unkown
page read and write
87B000
unkown
page read and write
DF4000
direct allocation
page read and write
47EA000
direct allocation
page read and write
276D000
direct allocation
page read and write
9F6000
heap
page read and write
956000
heap
page read and write
2619000
direct allocation
page read and write
6BA000
unkown
page readonly
3D60000
heap
page read and write
F45000
heap
page read and write
E53000
direct allocation
page read and write
2DBC000
direct allocation
page read and write
2D74000
direct allocation
page read and write
2BCF000
stack
page read and write
9AF000
heap
page read and write
25FF000
direct allocation
page read and write
26AB000
direct allocation
page read and write
962000
heap
page read and write
2660000
direct allocation
page read and write
4BE0000
remote allocation
page read and write
2D64000
direct allocation
page read and write
866000
unkown
page write copy
E03000
direct allocation
page read and write
6B3000
unkown
page read and write
190000
heap
page read and write
A10000
heap
page read and write
953000
heap
page read and write
7F2000
unkown
page read and write
11F8000
heap
page read and write
5DF6000
heap
page read and write
A40000
heap
page read and write
2B93000
heap
page read and write
7FF000
unkown
page read and write
2691000
direct allocation
page read and write
4BE0000
remote allocation
page read and write
5DF9000
heap
page read and write
E3D000
direct allocation
page read and write
D70000
direct allocation
page read and write
11E1000
heap
page read and write
DC0000
heap
page read and write
85A000
unkown
page read and write
442B000
stack
page read and write
2D2B000
direct allocation
page read and write
84F000
unkown
page read and write
A1F000
heap
page read and write
C3F000
stack
page read and write
87D000
unkown
page read and write
57CA000
heap
page read and write
5390000
heap
page read and write
D41000
direct allocation
page read and write
A59000
heap
page read and write
3650000
trusted library allocation
page read and write
A1A000
heap
page read and write
AEB000
heap
page read and write
E20000
heap
page read and write
C7E000
stack
page read and write
958000
heap
page read and write
25D1000
direct allocation
page read and write
4866000
direct allocation
page read and write
9FF000
heap
page read and write
9C1000
heap
page read and write
2BC3000
heap
page read and write
2DC3000
direct allocation
page read and write
4D6F000
stack
page read and write
F7C000
heap
page read and write
7C8000
unkown
page write copy
832000
unkown
page read and write
47E3000
direct allocation
page read and write
88C000
unkown
page readonly
1220000
heap
page read and write
57C8000
heap
page read and write
84F000
unkown
page read and write
80B000
unkown
page read and write
1C0000
heap
page read and write
7DC000
unkown
page read and write
DB9000
direct allocation
page read and write
97F000
heap
page read and write
7F2000
unkown
page read and write
25D4000
direct allocation
page read and write
26CD000
direct allocation
page read and write
E30000
heap
page read and write
999000
heap
page read and write
2CA0000
heap
page read and write
D99000
direct allocation
page read and write
81E000
unkown
page read and write
180000
heap
page read and write
882000
unkown
page read and write
2706000
direct allocation
page read and write
9F0000
heap
page read and write
959000
heap
page read and write
87D000
unkown
page read and write
2620000
direct allocation
page read and write
2715000
direct allocation
page read and write
2DD1000
direct allocation
page read and write
9ED000
heap
page read and write
95F000
heap
page read and write
950000
direct allocation
page execute and read and write
271D000
direct allocation
page read and write
25B3000
direct allocation
page read and write
47F5000
direct allocation
page read and write
B08000
heap
page read and write
D39000
direct allocation
page read and write
26D5000
direct allocation
page read and write
DF4000
direct allocation
page read and write
9B9000
heap
page read and write
837000
unkown
page readonly
4E2F000
stack
page read and write
4834000
direct allocation
page read and write
26B5000
direct allocation
page read and write
D50000
direct allocation
page read and write
122D000
heap
page read and write
A03000
heap
page read and write
9FE000
heap
page read and write
A49000
heap
page read and write
2615000
direct allocation
page read and write
2696000
direct allocation
page read and write
5DF6000
heap
page read and write
58B0000
heap
page read and write
82D000
unkown
page read and write
86B000
unkown
page read and write
910000
heap
page read and write
2DA6000
direct allocation
page read and write
26E9000
direct allocation
page read and write
841000
unkown
page read and write
2651000
direct allocation
page read and write
A37000
heap
page read and write
485C000
direct allocation
page read and write
9DD000
heap
page read and write
26BA000
direct allocation
page read and write
FF0000
heap
page read and write
2F90000
remote allocation
page read and write
484E000
direct allocation
page read and write
887000
unkown
page read and write
25E9000
direct allocation
page read and write
9F9000
heap
page read and write
5E05000
heap
page read and write
D88000
direct allocation
page read and write
120000
stack
page read and write
81E000
unkown
page read and write
A10000
direct allocation
page execute and read and write
53C5000
heap
page read and write
270A000
direct allocation
page read and write
5DF0000
heap
page read and write
117A000
heap
page read and write
265C000
direct allocation
page read and write
9E7000
heap
page read and write
999000
heap
page read and write
960000
heap
page read and write
3250000
trusted library allocation
page read and write
DED000
direct allocation
page read and write
1240000
heap
page read and write
2676000
direct allocation
page read and write
6AE000
unkown
page read and write
8F8000
unkown
page readonly
401000
unkown
page execute read
830000
unkown
page write copy
9FC000
heap
page read and write
2664000
direct allocation
page read and write
CF6000
direct allocation
page read and write
4813000
direct allocation
page read and write
484C000
direct allocation
page read and write
25A4000
direct allocation
page read and write
869000
unkown
page read and write
443B000
stack
page read and write
272B000
direct allocation
page read and write
EB5000
heap
page read and write
7EF000
unkown
page read and write
95E000
heap
page read and write
269D000
direct allocation
page read and write
266D000
direct allocation
page read and write
262F000
direct allocation
page read and write
2695000
direct allocation
page read and write
9FC000
heap
page read and write
E3C000
heap
page read and write
2DB4000
direct allocation
page read and write
4860000
direct allocation
page read and write
DC7000
direct allocation
page read and write
4854000
direct allocation
page read and write
A10000
direct allocation
page execute and read and write
9CF000
heap
page read and write
268F000
direct allocation
page read and write
268C000
direct allocation
page read and write
2DCA000
direct allocation
page read and write
47D8000
direct allocation
page read and write
9E7000
heap
page read and write
9E5000
heap
page read and write
A19000
heap
page read and write
9A8000
heap
page read and write
6BC000
unkown
page readonly
9FE000
heap
page read and write
959000
heap
page read and write
D06000
direct allocation
page read and write
261D000
direct allocation
page read and write
2774000
direct allocation
page read and write
2D98000
direct allocation
page read and write
919000
heap
page read and write
26F4000
direct allocation
page read and write
7DC000
unkown
page read and write
A55000
heap
page read and write
4806000
direct allocation
page read and write
2669000
direct allocation
page read and write
877000
unkown
page read and write
A6C000
heap
page read and write
2DD8000
direct allocation
page read and write
7C8000
unkown
page read and write
2D82000
direct allocation
page read and write
810000
unkown
page read and write
857000
unkown
page read and write
5DE9000
heap
page read and write
980000
heap
page read and write
5E12000
heap
page read and write
25C4000
direct allocation
page read and write
2D42000
direct allocation
page read and write
662000
unkown
page read and write
2F90000
remote allocation
page read and write
E2C000
heap
page read and write
14A000
stack
page read and write
4811000
direct allocation
page read and write
D2E000
direct allocation
page read and write
A80000
heap
page read and write
2666000
direct allocation
page read and write
9CF000
heap
page read and write
9A6000
heap
page read and write
9AE000
heap
page read and write
4892000
direct allocation
page read and write
9F9000
heap
page read and write
DA4000
direct allocation
page read and write
950000
direct allocation
page execute and read and write
9F9000
heap
page read and write
9A3000
heap
page read and write
265F000
direct allocation
page read and write
26C8000
direct allocation
page read and write
9DE000
heap
page read and write
268A000
direct allocation
page read and write
57C3000
heap
page read and write
120B000
heap
page read and write
2D7B000
direct allocation
page read and write
F40000
heap
page read and write
989000
heap
page read and write
1202000
heap
page read and write
401000
unkown
page execute read
885000
unkown
page write copy
5DF0000
heap
page read and write
1B0000
heap
page read and write
55D0000
trusted library allocation
page read and write
958000
heap
page read and write
1189000
heap
page read and write
1A0000
heap
page read and write
2D89000
direct allocation
page read and write
84A000
unkown
page read and write
9B0000
heap
page read and write
2A83000
heap
page read and write
482B000
direct allocation
page read and write
264D000
direct allocation
page read and write
A96000
heap
page read and write
6B5000
unkown
page write copy
882000
unkown
page read and write
810000
unkown
page read and write
2674000
direct allocation
page read and write
83E000
unkown
page read and write
47E7000
direct allocation
page read and write
1176000
heap
page read and write
5E0A000
heap
page read and write
D73000
direct allocation
page read and write
9A8000
heap
page read and write
26E6000
direct allocation
page read and write
9F8000
heap
page read and write
D43000
direct allocation
page read and write
950000
heap
page read and write
2674000
direct allocation
page read and write
97000
stack
page read and write
7CD000
unkown
page read and write
995000
heap
page read and write
A6F000
heap
page read and write
828000
unkown
page read and write
E35000
heap
page read and write
930000
heap
page read and write
DAA000
direct allocation
page read and write
7D3000
unkown
page read and write
26AC000
direct allocation
page read and write
26A4000
direct allocation
page read and write
4879000
direct allocation
page read and write
7CC000
unkown
page read and write
9F6000
heap
page read and write
1120000
heap
page read and write
83E000
unkown
page read and write
2677000
direct allocation
page read and write
D6C000
direct allocation
page read and write
5DD0000
heap
page read and write
2644000
direct allocation
page read and write
26C1000
direct allocation
page read and write
484B000
direct allocation
page read and write
869000
unkown
page read and write
81C000
unkown
page read and write
118A000
heap
page read and write
5E0C000
heap
page read and write
1A0000
heap
page read and write
9D7000
heap
page read and write
4861000
direct allocation
page read and write
6B9000
unkown
page read and write
4878000
direct allocation
page read and write
55D0000
trusted library allocation
page read and write
D77000
direct allocation
page read and write
E2F000
direct allocation
page read and write
57B0000
heap
page read and write
484D000
direct allocation
page read and write
AAD000
heap
page read and write
4840000
direct allocation
page read and write
2D3B000
direct allocation
page read and write
969000
heap
page read and write
2783000
direct allocation
page read and write
1184000
heap
page read and write
10D0000
heap
page read and write
15E6000
heap
page read and write
86B000
unkown
page read and write
CE4000
direct allocation
page read and write
847000
unkown
page read and write
D95000
direct allocation
page read and write
DA6000
direct allocation
page read and write
7C8000
unkown
page read and write
9EE000
heap
page read and write
190000
heap
page read and write
538F000
stack
page read and write
D95000
direct allocation
page read and write
267D000
direct allocation
page read and write
7EF000
unkown
page read and write
53CC000
heap
page read and write
2641000
direct allocation
page read and write
84F000
unkown
page read and write
1239000
heap
page read and write
D48000
direct allocation
page read and write
2645000
direct allocation
page read and write
486E000
direct allocation
page read and write
26FC000
direct allocation
page read and write
DE5000
direct allocation
page read and write
FAE000
stack
page read and write
4866000
direct allocation
page read and write
2DAD000
direct allocation
page read and write
400000
unkown
page readonly
9FE000
heap
page read and write
14A000
stack
page read and write
81E000
unkown
page read and write
5310000
heap
page read and write
F60000
heap
page read and write
5DD0000
heap
page read and write
2A80000
heap
page read and write
808000
unkown
page read and write
9C3000
heap
page read and write
269D000
direct allocation
page read and write
1187000
heap
page read and write
5DFB000
heap
page read and write
D5A000
direct allocation
page read and write
2635000
direct allocation
page read and write
475F000
stack
page read and write
A7E000
heap
page read and write
82D000
unkown
page read and write
432F000
stack
page read and write
1B0000
heap
page read and write
11FF000
heap
page read and write
123C000
heap
page read and write
2686000
direct allocation
page read and write
2718000
direct allocation
page read and write
4866000
direct allocation
page read and write
9C9000
heap
page read and write
2BDF000
stack
page read and write
2D12000
direct allocation
page read and write
9A6000
heap
page read and write
2609000
direct allocation
page read and write
9E5000
heap
page read and write
886000
unkown
page read and write
E61000
direct allocation
page read and write
A90000
heap
page read and write
A07000
heap
page read and write
1225000
heap
page read and write
5720000
trusted library allocation
page read and write
3283000
heap
page read and write
E44000
direct allocation
page read and write
4830000
direct allocation
page read and write
124B000
heap
page read and write
26F7000
direct allocation
page read and write
869000
unkown
page read and write
980000
heap
page read and write
2B90000
heap
page read and write
956000
heap
page read and write
2766000
direct allocation
page read and write
A4E000
heap
page read and write
121000
stack
page read and write
2683000
direct allocation
page read and write
9F3000
heap
page read and write
DFB000
direct allocation
page read and write
D8A000
direct allocation
page read and write
2724000
direct allocation
page read and write
1158000
heap
page read and write
818000
unkown
page write copy
A56000
heap
page read and write
9D7000
heap
page read and write
5DF9000
heap
page read and write
400000
unkown
page readonly
97E000
heap
page read and write
15E0000
heap
page read and write
25F0000
direct allocation
page read and write
EB0000
heap
page read and write
1227000
heap
page read and write
7F4000
unkown
page read and write
958000
heap
page read and write
2685000
direct allocation
page read and write
877000
unkown
page read and write
1214000
heap
page read and write
979000
heap
page read and write
E80000
heap
page read and write
47E9000
direct allocation
page read and write
2601000
direct allocation
page read and write
E85000
heap
page read and write
2686000
direct allocation
page read and write
810000
unkown
page read and write
1225000
heap
page read and write
E25000
heap
page read and write
818000
unkown
page read and write
11F3000
heap
page read and write
839000
unkown
page readonly
9FE000
heap
page read and write
42C000
unkown
page execute read
53B6000
heap
page read and write
826000
unkown
page read and write
969000
heap
page read and write
9C9000
heap
page read and write
9FC000
heap
page read and write
274D000
direct allocation
page read and write
AB5000
heap
page read and write
A15000
heap
page read and write
AE2000
heap
page read and write
D30000
direct allocation
page read and write
4849000
direct allocation
page read and write
190000
heap
page read and write
25F7000
direct allocation
page read and write
662000
unkown
page write copy
7F4000
unkown
page read and write
26DC000
direct allocation
page read and write
25C1000
direct allocation
page read and write
94D000
heap
page read and write
190000
heap
page read and write
2D5D000
direct allocation
page read and write
D71000
direct allocation
page read and write
180000
heap
page read and write
2744000
direct allocation
page read and write
264D000
direct allocation
page read and write
2930000
heap
page read and write
518F000
stack
page read and write
14A000
stack
page read and write
A5D000
heap
page read and write
4838000
direct allocation
page read and write
3280000
heap
page read and write
7DC000
unkown
page read and write
275F000
direct allocation
page read and write
26CD000
direct allocation
page read and write
15E9000
heap
page read and write
267F000
direct allocation
page read and write
995000
heap
page read and write
2D9F000
direct allocation
page read and write
4859000
direct allocation
page read and write
4BAF000
stack
page read and write
9CF000
heap
page read and write
D7F000
direct allocation
page read and write
25F1000
direct allocation
page read and write
DCD000
direct allocation
page read and write
400000
unkown
page readonly
4840000
direct allocation
page read and write
4860000
direct allocation
page read and write
5310000
heap
page read and write
818000
unkown
page read and write
664000
unkown
page read and write
F70000
heap
page read and write
DD6000
direct allocation
page read and write
DC4000
direct allocation
page read and write
E11000
direct allocation
page read and write
190000
heap
page read and write
818000
unkown
page read and write
A37000
heap
page read and write
9ED000
heap
page read and write
844000
unkown
page read and write
D46000
direct allocation
page read and write
2624000
direct allocation
page read and write
482D000
direct allocation
page read and write
26C6000
direct allocation
page read and write
4BE0000
remote allocation
page read and write
26DA000
direct allocation
page read and write
9A7000
heap
page read and write
2993000
heap
page read and write
57AF000
stack
page read and write
DCF000
direct allocation
page read and write
9CF000
heap
page read and write
835000
unkown
page read and write
1130000
direct allocation
page execute and read and write
9E5000
heap
page read and write
26F0000
direct allocation
page read and write
4849000
direct allocation
page read and write
9A8000
heap
page read and write
81C000
unkown
page read and write
940000
heap
page read and write
DDC000
direct allocation
page read and write
7F8000
unkown
page read and write
857000
unkown
page read and write
2654000
direct allocation
page read and write
930000
heap
page read and write
AEB000
heap
page read and write
818000
unkown
page read and write
818000
unkown
page read and write
26A4000
direct allocation
page read and write
4888000
direct allocation
page read and write
2614000
direct allocation
page read and write
CF3000
direct allocation
page read and write
2627000
direct allocation
page read and write
822000
unkown
page read and write
9F6000
heap
page read and write
7C8000
unkown
page read and write
877000
unkown
page read and write
There are 709 hidden memdumps, click here to show them.