IOC Report
UvswnLTk5d.exe

loading gif

Files

File Path
Type
Category
Malicious
UvswnLTk5d.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AEBAFBGIDHCBFHIECFCB
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BAEBGHCFCAAFIECAFIII
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DTBZGIOOSO.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EBAKEBAE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\FBAAAKFCAFIIDHIDGHIECGDGID
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\GDBKJDGI
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\IDHIEBAAKJDHIECAAFHCAECAFC
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\IJJJKEGHJKFHJKFHDHCFIJEGCA
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JDDHMPCDUJ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\KATAXZVCPS.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\LTKMYBSEYZ.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_UvswnLTk5d.exe_40c4cbc1e7e68f9b5ee8a3a354e75a1451eb173_ff7284e0_bc5e2775-ce80-4979-9f77-0f0621df618c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER944.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Apr 17 04:57:38 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA5E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERABD.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\ONBQCLYSPU.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\RAYHIWGKDI.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\RAYHIWGKDI.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\SFPUSAFIOL.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\SUAVTZKNFL.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\VLZDGUKUTZ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\XZXHAVGRAG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\XZXHAVGRAG.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 29 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\UvswnLTk5d.exe
"C:\Users\user\Desktop\UvswnLTk5d.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5900 -s 2100

URLs

Name
IP
Malicious
http://185.172.128.23/8e6d9db21fb63946/nss3.dll
185.172.128.23
malicious
185.172.128.23/f993692117a3fda2.php
malicious
http://185.172.128.23/f993692117a3fda2.php
185.172.128.23
malicious
http://185.172.128.23/8e6d9db21fb63946/msvcp140.dll
185.172.128.23
malicious
http://185.172.128.23/8e6d9db21fb63946/mozglue.dll
185.172.128.23
malicious
http://185.172.128.23/f993692117
unknown
malicious
http://185.172.1
unknown
malicious
http://185.172.128.23/8e6d9db21fb63946/sqlite3.dll
185.172.128.23
malicious
http://185.172.128.23/f993692117a3fda2.p
unknown
malicious
http://185.172.128.23/f9
unknown
malicious
http://185.172.128.23/8e6d9db21fb63946/softokn3.dll
185.172.128.23
malicious
http://185.172.128.23/8e6d9db21fb63946/vcruntime140.dll
185.172.128.23
malicious
http://185.172.128.23
unknown
malicious
http://185.172.128.23/8e6d9db21fb63946/freebl3.dll
185.172.128.23
malicious
http://185.172.128.23/f993692117a3fda2.phpt
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.172.128.23/8e6d9db21fb63946/msvcp140.dll)
unknown
http://185.172.128.23/f993692117a3fda2.p;
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://185.172.128.23/8e6d9db21fb63946/nss3.dll$?Wg
unknown
http://185.172.128.23/f993692117a3fda2.phpo
unknown
http://185.172.128.23/f993692117a3fda2.pF
unknown
http://185.172.128.23/f993692117a3fda2.phpWe
unknown
http://185.172.128.23/f993692117a3fda2.phpV
unknown
http://185.172.128.23/f993692117a3fda2.phpX
unknown
http://185.172.1Y
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.172.128.23/f993692117a3fda2.phpb
unknown
http://185.172.128.23XYIg
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17chost.exe
unknown
http://185.172.128.23/f993692117a3fda2.phpF
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016.exe
unknown
http://185.172.128.23/f993692117a3fda2.phpN
unknown
http://www.sqlite.org/copyright.html.
unknown
http://185.172.128.23/8e6d9db21fb63946/sqlite3.dll8
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://185.172.128.23/f993692117a3fda2.php&
unknown
http://upx.sf.net
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://www.ecosia.org/newtab/
unknown
http://185.172.128.23/f993692117a3fda2.php.
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.172.128.23/f993692117a3fda2.p2
unknown
http://185.172.128.23/8e6d9db21fb63946/nss3.dllJ
unknown
http://185.172.128.23/f993692117a3fda2.phpDz
unknown
http://185.172.128.23/f993692117a3fda2.phpuments
unknown
https://support.mozilla.org
unknown
http://185.172.128.23/8e6d9db21fb63946/sqlite3.dllo
unknown
http://185.172.128.23/8e6d9db21fb63946/sqlite3.dllc_
unknown
http://185.172.128.23/8e6d9db21fb63946/softokn3.dll5
unknown
http://185.172.128.23/f993692117a3fda2.phped4e30b6bb11025203694d8734761
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 49 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.172.128.23
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{34dc07af-c4f6-8377-37c8-2113c6d02d0c}\Root\InventoryApplicationFile\uvswnltk5d.exe|b552c468437beca9
ProgramId
\REGISTRY\A\{34dc07af-c4f6-8377-37c8-2113c6d02d0c}\Root\InventoryApplicationFile\uvswnltk5d.exe|b552c468437beca9
FileId
\REGISTRY\A\{34dc07af-c4f6-8377-37c8-2113c6d02d0c}\Root\InventoryApplicationFile\uvswnltk5d.exe|b552c468437beca9
LowerCaseLongPath
\REGISTRY\A\{34dc07af-c4f6-8377-37c8-2113c6d02d0c}\Root\InventoryApplicationFile\uvswnltk5d.exe|b552c468437beca9
LongPathHash
\REGISTRY\A\{34dc07af-c4f6-8377-37c8-2113c6d02d0c}\Root\InventoryApplicationFile\uvswnltk5d.exe|b552c468437beca9
Name
\REGISTRY\A\{34dc07af-c4f6-8377-37c8-2113c6d02d0c}\Root\InventoryApplicationFile\uvswnltk5d.exe|b552c468437beca9
OriginalFileName
\REGISTRY\A\{34dc07af-c4f6-8377-37c8-2113c6d02d0c}\Root\InventoryApplicationFile\uvswnltk5d.exe|b552c468437beca9
Publisher
\REGISTRY\A\{34dc07af-c4f6-8377-37c8-2113c6d02d0c}\Root\InventoryApplicationFile\uvswnltk5d.exe|b552c468437beca9
Version
\REGISTRY\A\{34dc07af-c4f6-8377-37c8-2113c6d02d0c}\Root\InventoryApplicationFile\uvswnltk5d.exe|b552c468437beca9
BinFileVersion
\REGISTRY\A\{34dc07af-c4f6-8377-37c8-2113c6d02d0c}\Root\InventoryApplicationFile\uvswnltk5d.exe|b552c468437beca9
BinaryType
\REGISTRY\A\{34dc07af-c4f6-8377-37c8-2113c6d02d0c}\Root\InventoryApplicationFile\uvswnltk5d.exe|b552c468437beca9
ProductName
\REGISTRY\A\{34dc07af-c4f6-8377-37c8-2113c6d02d0c}\Root\InventoryApplicationFile\uvswnltk5d.exe|b552c468437beca9
ProductVersion
\REGISTRY\A\{34dc07af-c4f6-8377-37c8-2113c6d02d0c}\Root\InventoryApplicationFile\uvswnltk5d.exe|b552c468437beca9
LinkDate
\REGISTRY\A\{34dc07af-c4f6-8377-37c8-2113c6d02d0c}\Root\InventoryApplicationFile\uvswnltk5d.exe|b552c468437beca9
BinProductVersion
\REGISTRY\A\{34dc07af-c4f6-8377-37c8-2113c6d02d0c}\Root\InventoryApplicationFile\uvswnltk5d.exe|b552c468437beca9
AppxPackageFullName
\REGISTRY\A\{34dc07af-c4f6-8377-37c8-2113c6d02d0c}\Root\InventoryApplicationFile\uvswnltk5d.exe|b552c468437beca9
AppxPackageRelativeId
\REGISTRY\A\{34dc07af-c4f6-8377-37c8-2113c6d02d0c}\Root\InventoryApplicationFile\uvswnltk5d.exe|b552c468437beca9
Size
\REGISTRY\A\{34dc07af-c4f6-8377-37c8-2113c6d02d0c}\Root\InventoryApplicationFile\uvswnltk5d.exe|b552c468437beca9
Language
\REGISTRY\A\{34dc07af-c4f6-8377-37c8-2113c6d02d0c}\Root\InventoryApplicationFile\uvswnltk5d.exe|b552c468437beca9
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2DD5000
heap
page read and write
malicious
4980000
direct allocation
page execute and read and write
malicious
49B0000
direct allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
1CDAF000
stack
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
6D06F000
unkown
page write copy
233EC000
heap
page read and write
2E25000
heap
page read and write
6D075000
unkown
page readonly
6D070000
unkown
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
233EB000
heap
page read and write
233F0000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
30DF000
stack
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
233F0000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
61ED0000
direct allocation
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F790000
trusted library allocation
page read and write
2F07000
heap
page read and write
233E7000
heap
page read and write
233EB000
heap
page read and write
2F00000
heap
page read and write
1D460000
trusted library allocation
page read and write
1D04E000
stack
page read and write
2F07000
heap
page read and write
29513000
heap
page read and write
2D1B000
unkown
page readonly
2F07000
heap
page read and write
29752000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
294E4000
heap
page read and write
233D6000
heap
page read and write
2D90000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
1CC6F000
stack
page read and write
233EB000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
1CB6E000
stack
page read and write
2340A000
heap
page read and write
2DC0000
heap
page execute and read and write
233E3000
heap
page read and write
624000
unkown
page execute and read and write
2F07000
heap
page read and write
1D1EE000
stack
page read and write
2969F000
stack
page read and write
2DAE000
heap
page read and write
2F07000
heap
page read and write
23470000
heap
page read and write
233FE000
heap
page read and write
2F07000
heap
page read and write
23472000
heap
page read and write
1CEFF000
stack
page read and write
29460000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
233D7000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
549000
unkown
page execute and read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2E06000
heap
page read and write
2F07000
heap
page read and write
233EB000
heap
page read and write
1D09E000
stack
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
49E0000
heap
page read and write
233EC000
heap
page read and write
2D30000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2DA0000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
497E000
stack
page read and write
2D1A000
unkown
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
233FB000
heap
page read and write
2DAA000
heap
page read and write
2340B000
heap
page read and write
234DE000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
29440000
heap
page read and write
61ED3000
direct allocation
page read and write
1D361000
heap
page read and write
2F07000
heap
page read and write
233E6000
heap
page read and write
1D361000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
636000
unkown
page execute and read and write
2F07000
heap
page read and write
2340B000
heap
page read and write
6D02F000
unkown
page readonly
2F07000
heap
page read and write
2F07000
heap
page read and write
233D5000
heap
page read and write
1CB2F000
stack
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
30881000
heap
page read and write
233EB000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
233E6000
heap
page read and write
61EB7000
direct allocation
page readonly
23409000
heap
page read and write
233E7000
heap
page read and write
4A5B000
heap
page read and write
2F07000
heap
page read and write
6CE91000
unkown
page execute read
233D6000
heap
page read and write
2F07000
heap
page read and write
233E8000
heap
page read and write
2F07000
heap
page read and write
197000
stack
page read and write
4A50000
heap
page read and write
2F07000
heap
page read and write
23403000
heap
page read and write
9B000
stack
page read and write
233E3000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
233D7000
heap
page read and write
2D7E000
stack
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2340B000
heap
page read and write
2F07000
heap
page read and write
233DE000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
423000
unkown
page write copy
2340B000
heap
page read and write
233F0000
heap
page read and write
233FE000
heap
page read and write
2F07000
heap
page read and write
401000
unkown
page execute read
2F07000
heap
page read and write
2F07000
heap
page read and write
233DB000
heap
page read and write
61E01000
direct allocation
page execute read
2F07000
heap
page read and write
1D350000
heap
page read and write
429000
unkown
page write copy
1CCAE000
stack
page read and write
23409000
heap
page read and write
2F07000
heap
page read and write
233ED000
heap
page read and write
233E7000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
233F0000
heap
page read and write
2F07000
heap
page read and write
6F922000
unkown
page readonly
400000
unkown
page readonly
2F07000
heap
page read and write
2F07000
heap
page read and write
30D90000
heap
page read and write
2F07000
heap
page read and write
4A3E000
stack
page read and write
6F890000
unkown
page readonly
2D1B000
unkown
page readonly
2F07000
heap
page read and write
2F07000
heap
page read and write
23406000
heap
page read and write
1D19D000
stack
page read and write
448000
unkown
page execute and read and write
1CDFE000
stack
page read and write
2F07000
heap
page read and write
233ED000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
233F0000
heap
page read and write
233FE000
heap
page read and write
6F91E000
unkown
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
6CE90000
unkown
page readonly
2F07000
heap
page read and write
2F07000
heap
page read and write
2F05000
heap
page read and write
1F0000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
1CF4E000
stack
page read and write
2DF3000
heap
page read and write
2340C000
heap
page read and write
6F891000
unkown
page execute read
233E3000
heap
page read and write
2EDE000
stack
page read and write
233FE000
heap
page read and write
2F07000
heap
page read and write
233FD000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
233E3000
heap
page read and write
2950A000
heap
page read and write
233E8000
heap
page read and write
61ECC000
direct allocation
page read and write
29758000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
1D360000
heap
page read and write
61ED4000
direct allocation
page readonly
2F07000
heap
page read and write
61ECD000
direct allocation
page readonly
2F07000
heap
page read and write
1D463000
heap
page read and write
2974C000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
1D2EE000
stack
page read and write
2340B000
heap
page read and write
233EB000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
23409000
heap
page read and write
29750000
heap
page read and write
6D06E000
unkown
page read and write
61EB4000
direct allocation
page read and write
2F07000
heap
page read and write
192000
stack
page read and write
3027A000
heap
page read and write
233E7000
heap
page read and write
233D0000
heap
page read and write
2340B000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
233E6000
heap
page read and write
1D370000
heap
page read and write
2F07000
heap
page read and write
29744000
heap
page read and write
233E7000
heap
page read and write
61E00000
direct allocation
page execute and read and write
29480000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
41A000
unkown
page readonly
2F07000
heap
page read and write
2F07000
heap
page read and write
233EA000
heap
page read and write
2F07000
heap
page read and write
23403000
heap
page read and write
233D7000
heap
page read and write
2F07000
heap
page read and write
233D6000
heap
page read and write
23482000
heap
page read and write
233E0000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
30270000
heap
page read and write
2F07000
heap
page read and write
23402000
heap
page read and write
2F07000
heap
page read and write
2340B000
heap
page read and write
19B000
stack
page read and write
44B000
unkown
page execute and read and write
2959E000
stack
page read and write
233F0000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
29730000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
233D6000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
2F07000
heap
page read and write
6F90D000
unkown
page readonly
233EB000
heap
page read and write
There are 314 hidden memdumps, click here to show them.