IOC Report
WinX.SUNBURST.zip

loading gif

Files

File Path
Type
Category
Malicious
WinX.SUNBURST.zip
Zip archive data, at least v6.3 to extract, compression method=AES Encrypted
initial sample
malicious
C:\Users\user\Desktop\WinX.SUNBURST\WinX.SUNBURST\019085a76ba7126fff22770d71bd901c325fc68ac55aa743327984e89f4b0134.exe
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\WinX.SUNBURST\WinX.SUNBURST\32519b85c0b422e4656de6e6c41878e95fd95026267daab4215ee59c107d6c77.exe
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\WinX.SUNBURST\WinX.SUNBURST\ce77d116a074dab7a22a0fd4f2c1ab475f16eec42e1ded3c0b0aa8211fe858d6
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\WinX.SUNBURST\WinX.SUNBURST.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Program Files\7-Zip\7zG.exe
"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\user\Desktop\WinX.SUNBURST\" -ad -an -ai#7zMap1138:82:7zEvent30935
C:\Program Files\7-Zip\7zG.exe
"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\user\Desktop\WinX.SUNBURST\WinX.SUNBURST\" -spe -an -ai#7zMap5700:110:7zEvent13992
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
C:\Windows\System32\notepad.exe
"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\WinX.SUNBURST\WinX.SUNBURST\ce77d116a074dab7a22a0fd4f2c1ab475f16eec42e1ded3c0b0aa8211fe858d6

URLs

Name
IP
Malicious
http://www.solarwinds.com/embedded_in_products/productLink.aspx?id=online_quote
unknown
http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09/IMaintUpdateNotifySvc/GetDataRespo
unknown
http://www.symauth.com/rpa00
unknown
https://www.solarwinds.com/embedded_in_products/productLink.aspx?id=online_quote
unknown
http://www.solarwinds.com/documentation/kbloader.aspx?lang=
unknown
https://www.solarwinds.com/documentation/kbloader.aspx?lang=
unknown
http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09L
unknown
http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09/IMaintUpdateNotifySvc/GetLouserzed
unknown
http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09/IMaintUpdateNotifySvc/GetDataT
unknown
http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09T
unknown
http://www.symauth.com/cps0(
unknown
http://thwackfeeds.solarwinds.com/blogs/orion-product-team-blog/rss.aspxT
unknown
http://solarwinds.s3.amazonaws.com/solarwinds/Release/MIB-Database/MIBs.zip
unknown
There are 3 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\7-Zip\Extraction
PathHistory
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\abgrcnq.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWindowsOnlyEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fPasteOriginalEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fReverse
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWrapAround
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fMatchCase
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
iWindowPosX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
iWindowPosY
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
iWindowPosDX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
iWindowPosDY
There are 20 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
22644CBB000
heap
page read and write
22646BAC000
heap
page read and write
22646B91000
heap
page read and write
22646BD8000
heap
page read and write
22646BA2000
heap
page read and write
22646B9E000
heap
page read and write
22646BC6000
heap
page read and write
18306BB0000
heap
page read and write
1EB84E7C000
heap
page read and write
1A31F5FF000
heap
page read and write
18305354000
heap
page read and write
226492A6000
heap
page read and write
22646B9A000
heap
page read and write
22648CA0000
trusted library allocation
page read and write
2264670E000
heap
page read and write
22646B8D000
heap
page read and write
22646BA2000
heap
page read and write
22646B84000
heap
page read and write
22646B7F000
heap
page read and write
22649640000
heap
page read and write
226467AC000
heap
page read and write
226467E9000
heap
page read and write
1EB86790000
heap
page read and write
2264679A000
heap
page read and write
226492ED000
heap
page read and write
226492EB000
heap
page read and write
22644C8F000
heap
page read and write
230780BE000
heap
page read and write
22644C7C000
heap
page read and write
22646BB0000
heap
page read and write
7ED4FFE000
stack
page read and write
22646BBA000
heap
page read and write
2264929F000
heap
page read and write
FD8FF7B000
stack
page read and write
22646B9A000
heap
page read and write
1EB84FE0000
heap
page read and write
226467A2000
heap
page read and write
22646B76000
heap
page read and write
22644C1B000
heap
page read and write
1A31F617000
heap
page read and write
22646B91000
heap
page read and write
183053C7000
heap
page read and write
18305365000
heap
page read and write
22646BB1000
heap
page read and write
2264671C000
heap
page read and write
183053EF000
heap
page read and write
1EB84E88000
heap
page read and write
22646B7F000
heap
page read and write
22646BC6000
heap
page read and write
226492BD000
heap
page read and write
226492C9000
heap
page read and write
22646B9E000
heap
page read and write
226467C8000
heap
page read and write
1EB84E40000
heap
page read and write
226492AA000
heap
page read and write
22646B7A000
heap
page read and write
22644C38000
heap
page read and write
22644CB1000
heap
page read and write
1A31F603000
heap
page read and write
226467FB000
heap
page read and write
226492EC000
heap
page read and write
22644C9E000
heap
page read and write
22644C7C000
heap
page read and write
22646780000
heap
page read and write
FD8FCFD000
stack
page read and write
22646B94000
heap
page read and write
1A31F612000
heap
page read and write
22646B6F000
heap
page read and write
230782D0000
heap
page read and write
226467B4000
heap
page read and write
183053EF000
heap
page read and write
22646BC1000
heap
page read and write
22646B99000
heap
page read and write
22646B96000
heap
page read and write
22646BA6000
heap
page read and write
22646B9A000
heap
page read and write
22644C69000
heap
page read and write
1EB84FE5000
heap
page read and write
22644C62000
heap
page read and write
22646BB5000
heap
page read and write
FD8FD7B000
stack
page read and write
18305349000
heap
page read and write
22646BAC000
heap
page read and write
22646BC1000
heap
page read and write
1EB84E90000
heap
page read and write
22644C8C000
heap
page read and write
22646BC1000
heap
page read and write
22646BCB000
heap
page read and write
22646B7F000
heap
page read and write
22646B96000
heap
page read and write
22646B88000
heap
page read and write
2264929F000
heap
page read and write
22646B67000
heap
page read and write
22644CBD000
heap
page read and write
226467CA000
heap
page read and write
22646730000
heap
page read and write
1EB84E8C000
heap
page read and write
22646B91000
heap
page read and write
22646BA7000
heap
page read and write
22646786000
heap
page read and write
226492C3000
heap
page read and write
2264670D000
heap
page read and write
1A31F639000
heap
page read and write
22644C84000
heap
page read and write
1A31F633000
heap
page read and write
226492A3000
heap
page read and write
22646748000
heap
page read and write
226492D2000
heap
page read and write
1A31F614000
heap
page read and write
22646BAE000
heap
page read and write
22646B7F000
heap
page read and write
1A322C30000
trusted library allocation
page read and write
22646B74000
heap
page read and write
22644C4F000
heap
page read and write
7106FE000
stack
page read and write
22646B91000
heap
page read and write
7105FD000
stack
page read and write
22649281000
heap
page read and write
22646BD7000
heap
page read and write
1EB84E9B000
heap
page read and write
226467E7000
heap
page read and write
226492BB000
heap
page read and write
22646B76000
heap
page read and write
22644CD2000
heap
page read and write
2264BB10000
heap
page readonly
7DF465501000
trusted library allocation
page execute read
22646B95000
heap
page read and write
1830536E000
heap
page read and write
1A31F625000
heap
page read and write
1EB84E7E000
heap
page read and write
22646734000
heap
page read and write
22644C5B000
heap
page read and write
22644C35000
heap
page read and write
1EB86FD0000
trusted library allocation
page read and write
22646BB1000
heap
page read and write
22646748000
heap
page read and write
1A31F645000
heap
page read and write
22646B6B000
heap
page read and write
1A31F410000
heap
page read and write
22646BB0000
heap
page read and write
2264661D000
heap
page read and write
22646BC5000
heap
page read and write
226467B4000
heap
page read and write
22646792000
heap
page read and write
22646BCC000
heap
page read and write
18305368000
heap
page read and write
226467C1000
heap
page read and write
226467DD000
heap
page read and write
22646BAC000
heap
page read and write
22646BA8000
heap
page read and write
22646700000
heap
page read and write
18305380000
heap
page read and write
226492EC000
heap
page read and write
FD8FBFE000
stack
page read and write
226492AD000
heap
page read and write
22646BA2000
heap
page read and write
22646BB2000
heap
page read and write
22646746000
heap
page read and write
22644CAC000
heap
page read and write
22646B84000
heap
page read and write
22644B20000
heap
page read and write
22644C08000
heap
page read and write
18305350000
heap
page read and write
18305392000
heap
page read and write
22646BA3000
heap
page read and write
226492BF000
heap
page read and write
22644CA5000
heap
page read and write
FD8F798000
stack
page read and write
22646BB5000
heap
page read and write
226492BF000
heap
page read and write
22646B91000
heap
page read and write
22644C9B000
heap
page read and write
22644C8D000
heap
page read and write
7107FE000
stack
page read and write
226492EC000
heap
page read and write
18305366000
heap
page read and write
22646B9E000
heap
page read and write
2264670A000
heap
page read and write
22646BB9000
heap
page read and write
22646BA6000
heap
page read and write
22646752000
heap
page read and write
22646B7F000
heap
page read and write
1A31F615000
heap
page read and write
183051F0000
heap
page read and write
22644C28000
heap
page read and write
22646B72000
heap
page read and write
2264678B000
heap
page read and write
22646BD2000
heap
page read and write
226467BC000
heap
page read and write
22646BB9000
heap
page read and write
22646BAC000
heap
page read and write
22646BB5000
heap
page read and write
23078070000
heap
page read and write
22646BC1000
heap
page read and write
18306CA0000
trusted library allocation
page read and write
1A31F63B000
heap
page read and write
22644CB6000
heap
page read and write
22646BB9000
heap
page read and write
2264929F000
heap
page read and write
22646711000
heap
page read and write
22646BD2000
heap
page read and write
22646BA3000
heap
page read and write
22646BA2000
heap
page read and write
1830534C000
heap
page read and write
22646BD0000
heap
page read and write
22644AE0000
heap
page read and write
23077F70000
heap
page read and write
23078220000
heap
page read and write
22646803000
heap
page read and write
18305362000
heap
page read and write
FD8FAFE000
stack
page read and write
1EB84CF0000
heap
page read and write
7ED4EFD000
stack
page read and write
22646B9E000
heap
page read and write
1EB84E71000
heap
page read and write
1341D9E000
stack
page read and write
22646B77000
heap
page read and write
22646BC1000
heap
page read and write
22644C96000
heap
page read and write
1EB84E8C000
heap
page read and write
226492CF000
heap
page read and write
22646BB0000
heap
page read and write
22646B91000
heap
page read and write
22646BDA000
heap
page read and write
22646B9E000
heap
page read and write
22646B7B000
heap
page read and write
22646BA8000
heap
page read and write
22646BAC000
heap
page read and write
1EB84E47000
heap
page read and write
22649290000
heap
page read and write
22646730000
heap
page read and write
18305349000
heap
page read and write
22644C4B000
heap
page read and write
22646BA2000
heap
page read and write
1EB84E9D000
heap
page read and write
226467B1000
heap
page read and write
22644C38000
heap
page read and write
22646BC6000
heap
page read and write
22646711000
heap
page read and write
230780B7000
heap
page read and write
22646736000
heap
page read and write
1EB84FB0000
heap
page read and write
9A0E57F000
stack
page read and write
22646BC1000
heap
page read and write
2264BC10000
heap
page read and write
22644CDE000
heap
page read and write
22644C8A000
heap
page read and write
22646BC6000
heap
page read and write
FD8FC7E000
stack
page read and write
1A31F62F000
heap
page read and write
22646B6F000
heap
page read and write
22646B84000
heap
page read and write
22646B91000
heap
page read and write
22646615000
heap
page read and write
22646BAC000
heap
page read and write
18305345000
heap
page read and write
1EB84E82000
heap
page read and write
226492C9000
heap
page read and write
22646B8A000
heap
page read and write
22646B50000
heap
page read and write
22646BA7000
heap
page read and write
18306CC0000
heap
page read and write
22646738000
heap
page read and write
22646712000
heap
page read and write
1EB84E74000
heap
page read and write
1EB84DF0000
heap
page read and write
22646713000
heap
page read and write
18305384000
heap
page read and write
22644CC2000
heap
page read and write
1EB84E81000
heap
page read and write
22646B88000
heap
page read and write
1A31F62B000
heap
page read and write
22646772000
heap
page read and write
226492CB000
heap
page read and write
18307189000
heap
page read and write
18305392000
heap
page read and write
2264674E000
heap
page read and write
22646770000
heap
page read and write
22646BC6000
heap
page read and write
22644C31000
heap
page read and write
22644CB7000
heap
page read and write
22646B9A000
heap
page read and write
1EB84EA6000
heap
page read and write
2264BB00000
trusted library allocation
page read and write
183052D0000
heap
page read and write
7ED4DFD000
stack
page read and write
18306C00000
heap
page read and write
22646B61000
heap
page read and write
230780B0000
heap
page read and write
1A31F7D4000
heap
page read and write
22644CBF000
heap
page read and write
22646BBA000
heap
page read and write
22646BBD000
heap
page read and write
2264929F000
heap
page read and write
226467F2000
heap
page read and write
22646BB5000
heap
page read and write
9A0E4FE000
stack
page read and write
2264B392000
trusted library allocation
page read and write
22646BA2000
heap
page read and write
22644C79000
heap
page read and write
230782D5000
heap
page read and write
22644BE0000
heap
page read and write
22646BA8000
heap
page read and write
22646B91000
heap
page read and write
22646BC0000
heap
page read and write
1EB84E92000
heap
page read and write
1A31F7F0000
heap
page read and write
22646BB1000
heap
page read and write
22646BAD000
heap
page read and write
22644CAF000
heap
page read and write
22649297000
heap
page read and write
22646B9E000
heap
page read and write
22646BC1000
heap
page read and write
22646BBD000
heap
page read and write
226492A4000
heap
page read and write
1EB86FE0000
trusted library allocation
page read and write
22644A00000
heap
page read and write
1A31F7F5000
heap
page read and write
22646BAC000
heap
page read and write
22646BBD000
heap
page read and write
226467DD000
heap
page read and write
1A31F63F000
heap
page read and write
22646B7F000
heap
page read and write
226492A4000
heap
page read and write
1A31F4F0000
heap
page read and write
2264673E000
heap
page read and write
18305387000
heap
page read and write
9A0E47C000
stack
page read and write
226467A4000
heap
page read and write
7ED4CFA000
stack
page read and write
22644C0E000
heap
page read and write
22646B96000
heap
page read and write
226492A9000
heap
page read and write
22646BC6000
heap
page read and write
22644C5B000
heap
page read and write
22646BB1000
heap
page read and write
18308C70000
trusted library allocation
page read and write
226467E4000
heap
page read and write
18305366000
heap
page read and write
22646BB1000
heap
page read and write
22646BA2000
heap
page read and write
22646B84000
heap
page read and write
18305390000
heap
page read and write
22644CDA000
heap
page read and write
1830536B000
heap
page read and write
2264679C000
heap
page read and write
22646BC2000
heap
page read and write
22646BA6000
heap
page read and write
22646B91000
heap
page read and write
22646BBA000
heap
page read and write
22646752000
heap
page read and write
22646B79000
heap
page read and write
1EB84E9E000
heap
page read and write
22644CBE000
heap
page read and write
22644C31000
heap
page read and write
22646752000
heap
page read and write
22646BAC000
heap
page read and write
18306D23000
heap
page read and write
226492A7000
heap
page read and write
22646B7F000
heap
page read and write
22644CBE000
heap
page read and write
22646B88000
heap
page read and write
22649290000
heap
page read and write
22644C8F000
heap
page read and write
22646BCA000
heap
page read and write
226467E0000
heap
page read and write
22644C7C000
heap
page read and write
226467EC000
heap
page read and write
226492E5000
heap
page read and write
22646BA8000
heap
page read and write
22646BA2000
heap
page read and write
22646B9E000
heap
page read and write
22646BB8000
heap
page read and write
22644CA4000
heap
page read and write
22646B89000
heap
page read and write
7109FF000
stack
page read and write
1A31F590000
heap
page read and write
1830534A000
heap
page read and write
1EB84F80000
trusted library allocation
page read and write
22649644000
heap
page read and write
22646B91000
heap
page read and write
18305351000
heap
page read and write
22646BA2000
heap
page read and write
22644C8D000
heap
page read and write
22646BC5000
heap
page read and write
1341C99000
stack
page read and write
22644CA9000
heap
page read and write
2264675F000
heap
page read and write
22644C7C000
heap
page read and write
2264674E000
heap
page read and write
22644CA7000
heap
page read and write
22646BB9000
heap
page read and write
226492D1000
heap
page read and write
22646B88000
heap
page read and write
22646BBE000
heap
page read and write
1EB84F70000
heap
page read and write
18305341000
heap
page read and write
1EB88530000
trusted library allocation
page read and write
1A31F7D0000
heap
page read and write
22646BCA000
heap
page read and write
22646BBE000
heap
page read and write
1830538F000
heap
page read and write
22646BC5000
heap
page read and write
22644CCE000
heap
page read and write
18306C0C000
heap
page read and write
9A0E5FE000
stack
page read and write
22646B7B000
heap
page read and write
1A323431000
heap
page read and write
22646786000
heap
page read and write
22646BAC000
heap
page read and write
1EB84E81000
heap
page read and write
22646BB2000
heap
page read and write
18306D20000
heap
page read and write
1830533E000
heap
page read and write
7ED52FE000
stack
page read and write
22646B69000
heap
page read and write
2264673C000
heap
page read and write
22646B9E000
heap
page read and write
22646BA7000
heap
page read and write
2264929B000
heap
page read and write
22644C84000
heap
page read and write
1EB84EA6000
heap
page read and write
22646BBD000
heap
page read and write
22646B79000
heap
page read and write
226492B7000
heap
page read and write
1A31F61D000
heap
page read and write
1341D1D000
stack
page read and write
22646B91000
heap
page read and write
1A3214D0000
trusted library allocation
page read and write
226467E7000
heap
page read and write
22646762000
heap
page read and write
2264675D000
heap
page read and write
22646BB1000
heap
page read and write
18307188000
heap
page read and write
22646BCA000
heap
page read and write
22646B91000
heap
page read and write
1A31F60F000
heap
page read and write
22646BBD000
heap
page read and write
22646BA8000
heap
page read and write
226492BB000
heap
page read and write
1EB8679A000
heap
page read and write
22646BCB000
heap
page read and write
1EB84F73000
heap
page read and write
1A31F6D0000
heap
page read and write
22646B91000
heap
page read and write
7104FA000
stack
page read and write
22646BAC000
heap
page read and write
22646BBD000
heap
page read and write
18305341000
heap
page read and write
22646767000
heap
page read and write
1EB84E8B000
heap
page read and write
22646BB5000
heap
page read and write
22646706000
heap
page read and write
22646B72000
heap
page read and write
226492A3000
heap
page read and write
22646BA3000
heap
page read and write
22646BA2000
heap
page read and write
226492C9000
heap
page read and write
1A31F5E3000
heap
page read and write
1EB84E7A000
heap
page read and write
1A31F6E1000
heap
page read and write
226467DE000
heap
page read and write
22646BB5000
heap
page read and write
22644C6F000
heap
page read and write
22646BBD000
heap
page read and write
22646B70000
heap
page read and write
226492D3000
heap
page read and write
226492E9000
heap
page read and write
1A31F6D8000
heap
page read and write
7ED51FE000
stack
page read and write
22646BA2000
heap
page read and write
22646B96000
heap
page read and write
22646B96000
heap
page read and write
22646B9E000
heap
page read and write
18305347000
heap
page read and write
18305318000
heap
page read and write
22646BB1000
heap
page read and write
22644C84000
heap
page read and write
22646BB9000
heap
page read and write
22646B9A000
heap
page read and write
18305393000
heap
page read and write
22646B9A000
heap
page read and write
226467EC000
heap
page read and write
13420FE000
stack
page read and write
22646725000
heap
page read and write
22646BC1000
heap
page read and write
22646B96000
heap
page read and write
134207E000
stack
page read and write
226467FE000
heap
page read and write
22646B88000
heap
page read and write
22646B91000
heap
page read and write
18305310000
heap
page read and write
22646B91000
heap
page read and write
1EB84E8F000
heap
page read and write
22644C77000
heap
page read and write
2264673A000
heap
page read and write
22649280000
heap
page read and write
22646800000
heap
page read and write
22646B60000
heap
page read and write
226492D4000
heap
page read and write
1A31F5FF000
heap
page read and write
226492B7000
heap
page read and write
22646B84000
heap
page read and write
1A31F510000
heap
page read and write
22646BC5000
heap
page read and write
18305346000
heap
page read and write
22646BBE000
heap
page read and write
226492BF000
heap
page read and write
22646BDA000
heap
page read and write
18305349000
heap
page read and write
18309470000
heap
page read and write
13421FE000
stack
page read and write
1EB84E78000
heap
page read and write
226467C5000
heap
page read and write
22646B95000
heap
page read and write
22644C77000
heap
page read and write
226492BB000
heap
page read and write
226492BD000
heap
page read and write
22646789000
heap
page read and write
2264679B000
heap
page read and write
18305345000
heap
page read and write
22646B7F000
heap
page read and write
22646BA6000
heap
page read and write
22646B94000
heap
page read and write
226467FE000
heap
page read and write
22646BA2000
heap
page read and write
22646759000
heap
page read and write
226467F2000
heap
page read and write
22646B91000
heap
page read and write
22644C28000
heap
page read and write
2264679E000
heap
page read and write
2264676B000
heap
page read and write
226467EC000
heap
page read and write
22644C89000
heap
page read and write
1A32180B000
heap
page read and write
23078050000
heap
page read and write
22646B96000
heap
page read and write
18305384000
heap
page read and write
226492C1000
heap
page read and write
1EB84E81000
heap
page read and write
2264661E000
heap
page read and write
226467BC000
heap
page read and write
22646BA8000
heap
page read and write
22646BCA000
heap
page read and write
1A31F5D7000
heap
page read and write
1A31F60F000
heap
page read and write
22646BC1000
heap
page read and write
22646B91000
heap
page read and write
22646610000
heap
page read and write
22646BC1000
heap
page read and write
18307160000
heap
page read and write
22649290000
heap
page read and write
22644C71000
heap
page read and write
22646730000
heap
page read and write
22646BA2000
heap
page read and write
1EB84E82000
heap
page read and write
226467E7000
heap
page read and write
22646BB5000
heap
page read and write
226467BC000
heap
page read and write
1EB84E74000
heap
page read and write
18306C05000
heap
page read and write
1A31F5D0000
heap
page read and write
22646BC6000
heap
page read and write
22646BBC000
heap
page read and write
1830538E000
heap
page read and write
2264B8A0000
heap
page read and write
22646728000
heap
page read and write
1830535D000
heap
page read and write
22646BB5000
heap
page read and write
22649290000
heap
page read and write
2264677A000
heap
page read and write
22646763000
heap
page read and write
2264675B000
heap
page read and write
22644CCA000
heap
page read and write
1A321600000
trusted library allocation
page read and write
1A31F60E000
heap
page read and write
22646BB2000
heap
page read and write
22644C07000
heap
page read and write
22646BAC000
heap
page read and write
22646746000
heap
page read and write
22646730000
heap
page read and write
22644CB4000
heap
page read and write
18305371000
heap
page read and write
22644C8A000
heap
page read and write
22644CBB000
heap
page read and write
22646BB5000
heap
page read and write
18307161000
heap
page read and write
22646BAC000
heap
page read and write
22646BA4000
heap
page read and write
22646B9F000
heap
page read and write
FD8FA7E000
stack
page read and write
7108FE000
stack
page read and write
22644C7C000
heap
page read and write
22646B91000
heap
page read and write
18309672000
heap
page read and write
134217F000
stack
page read and write
1EB88530000
trusted library allocation
page read and write
FD8FB7D000
stack
page read and write
1A31F615000
heap
page read and write
1EB84DD0000
heap
page read and write
22646BD9000
heap
page read and write
There are 591 hidden memdumps, click here to show them.