IOC Report
360total.dll.exe

loading gif

Files

File Path
Type
Category
Malicious
360total.dll.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_360_68c96245dd5f839ff441fb79a97a9b35299d069_9cecb875_e8b4a60c-0a4b-406f-b4de-e74f5b66cb69\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_360_f6ce5fb8c554a1c5617cb52ea4bda5a5f52864d1_9cecb875_70d5a318-011b-4b09-9f21-f60ccd1d195e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6C76.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Apr 25 20:42:56 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6D80.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6DB0.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER93A5.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Apr 25 20:43:06 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9413.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9443.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Custom_update\Update_79066994.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Custom_update\update_data.dat
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\360total.dll.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\360total.dll.dll,CreateObject
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\360total.dll.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_79066994.dll", #1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\360total.dll.dll,homq
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\360total.dll.dll,RegisterInstallTime
malicious
C:\Windows\System32\cmd.exe
/c ipconfig /all
malicious
C:\Windows\System32\ipconfig.exe
ipconfig /all
malicious
C:\Windows\System32\cmd.exe
/c systeminfo
malicious
C:\Windows\System32\systeminfo.exe
systeminfo
malicious
C:\Windows\System32\cmd.exe
/c nltest /domain_trusts
malicious
C:\Windows\System32\cmd.exe
/c nltest /domain_trusts /all_trusts
malicious
C:\Windows\System32\cmd.exe
/c net view /all /domain
malicious
C:\Windows\System32\net.exe
net view /all /domain
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\360total.dll.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 5572 -s 452
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 5572 -s 472
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\nltest.exe
nltest /domain_trusts
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\nltest.exe
nltest /domain_trusts /all_trusts
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 16 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://wrankaget.site/live/
malicious
https://jarinamaers.shop/
unknown
malicious
https://grizmotras.com/live/
172.67.219.28
malicious
https://jarinamaers.shop/live/
172.67.136.103
malicious
https://jarinamaers.shop/live/dOIDInfo
unknown
https://jarinamaers.shop/n
unknown
https://jarinamaers.shop/rs
unknown
https://jarinamaers.shop/live/&
unknown
http://pconf.f.360.cn/safe_update.php
unknown
https://jarinamaers.shop/7
unknown
https://grizmotras.com/g
unknown
ftp://ftp%2desktop.ini
unknown
https://jarinamaers.shop/live/4K&
unknown
https://grizmotras.com/
unknown
http://upx.sf.net
unknown
https://grizmotras.com/live/U
unknown
https://pewwhranet.com/live/
unknown
https://grizmotras.com/live/)
unknown
http://pscan.f.360.cn/safe_update.php
unknown
https://jarinamaers.shop/7-
unknown
http://dr.f.360.cn/scanlist
unknown
https://grizmotras.com/live/p
unknown
http://pscan.f.360.cn/safe_update.phphttp://pconf.f.360.cn/safe_update.phphttp://sconf.f.360.cn/clie
unknown
http://sconf.f.360.cn/client_security_conf
unknown
http://dr.f.360.cn/scan
unknown
https://grizmotras.com/live/URLS1https://pewwhranet.com/live/COMMAND4front://sysinfo.bin
unknown
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
jarinamaers.shop
172.67.136.103
malicious
grizmotras.com
172.67.219.28
malicious

IPs

IP
Domain
Country
Malicious
172.67.136.103
jarinamaers.shop
United States
malicious
172.67.219.28
grizmotras.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{fdb6005e-7f1c-71d7-62ac-3f3748211696}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{fdb6005e-7f1c-71d7-62ac-3f3748211696}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{fdb6005e-7f1c-71d7-62ac-3f3748211696}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{fdb6005e-7f1c-71d7-62ac-3f3748211696}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{fdb6005e-7f1c-71d7-62ac-3f3748211696}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{fdb6005e-7f1c-71d7-62ac-3f3748211696}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
OriginalFileName
\REGISTRY\A\{fdb6005e-7f1c-71d7-62ac-3f3748211696}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{fdb6005e-7f1c-71d7-62ac-3f3748211696}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{fdb6005e-7f1c-71d7-62ac-3f3748211696}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{fdb6005e-7f1c-71d7-62ac-3f3748211696}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{fdb6005e-7f1c-71d7-62ac-3f3748211696}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{fdb6005e-7f1c-71d7-62ac-3f3748211696}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{fdb6005e-7f1c-71d7-62ac-3f3748211696}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{fdb6005e-7f1c-71d7-62ac-3f3748211696}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{fdb6005e-7f1c-71d7-62ac-3f3748211696}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
AppxPackageFullName
\REGISTRY\A\{fdb6005e-7f1c-71d7-62ac-3f3748211696}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
AppxPackageRelativeId
\REGISTRY\A\{fdb6005e-7f1c-71d7-62ac-3f3748211696}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{fdb6005e-7f1c-71d7-62ac-3f3748211696}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{fdb6005e-7f1c-71d7-62ac-3f3748211696}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
\REGISTRY\A\{fdb6005e-7f1c-71d7-62ac-3f3748211696}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000F00DF6E8B
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\mlang.dll,-4387
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\mlang.dll,-4407
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
22380120000
direct allocation
page read and write
malicious
20342FE0000
direct allocation
page read and write
malicious
203431C0000
direct allocation
page execute and read and write
malicious
22381EB0000
direct allocation
page execute and read and write
malicious
A88ED78000
stack
page read and write
malicious
22380230000
direct allocation
page execute and read and write
malicious
26C61E20000
direct allocation
page execute and read and write
malicious
22380130000
direct allocation
page execute and read and write
malicious
22380230000
direct allocation
page execute and read and write
malicious
22381EB0000
direct allocation
page execute and read and write
malicious
26C61E10000
direct allocation
page read and write
malicious
22380230000
direct allocation
page execute and read and write
malicious
22380180000
trusted library allocation
page read and write
1BF15D64000
heap
page read and write
85B0BFE000
stack
page read and write
2673EE70000
heap
page read and write
20343300000
trusted library allocation
page read and write
19A2FC70000
heap
page read and write
20342FF0000
heap
page read and write
22381B40000
direct allocation
page execute and read and write
21E82425000
heap
page read and write
214A3C90000
heap
page read and write
241B2250000
heap
page read and write
21E823E5000
heap
page read and write
215C28F0000
heap
page read and write
83689FF000
stack
page read and write
223FFF27000
heap
page read and write
241B2270000
heap
page read and write
241B22DA000
heap
page read and write
22381B40000
direct allocation
page execute and read and write
F8949FF000
unkown
page read and write
21E82418000
heap
page read and write
223FFF60000
heap
page read and write
15B5FDD000
stack
page read and write
1BF15D6C000
heap
page read and write
241B22E6000
heap
page read and write
21E8240A000
heap
page read and write
1BF15D71000
heap
page read and write
1AFCBF10000
heap
page read and write
20344B70000
direct allocation
page execute and read and write
223FFF60000
heap
page read and write
F3B9AFB000
stack
page read and write
21E82403000
heap
page read and write
20344C00000
direct allocation
page execute and read and write
26C61C90000
heap
page read and write
180000000
unkown
page readonly
241B2525000
heap
page read and write
6F27B0F000
stack
page read and write
1BF15D61000
heap
page read and write
214A3BE0000
heap
page read and write
22382090000
direct allocation
page execute and read and write
22381EA0000
direct allocation
page execute and read and write
223FFF23000
heap
page read and write
2673EBC0000
heap
page read and write
2F8657E000
stack
page read and write
15B627E000
stack
page read and write
2673EBF0000
heap
page read and write
19A2FA20000
heap
page read and write
A88E9CC000
stack
page read and write
21E82403000
heap
page read and write
20343315000
heap
page read and write
180001000
unkown
page execute read
22547B90000
heap
page read and write
20344C20000
direct allocation
page execute and read and write
180086000
unkown
page readonly
665C11F000
stack
page read and write
70D6B2C000
stack
page read and write
12D40978000
heap
page read and write
F894AFF000
stack
page read and write
1AFCBFC9000
heap
page read and write
12D40970000
heap
page read and write
22381EC0000
direct allocation
page execute and read and write
1BF15D64000
heap
page read and write
223FFE50000
heap
page read and write
21E82418000
heap
page read and write
39029FF000
stack
page read and write
20343300000
direct allocation
page execute and read and write
12D40CE0000
heap
page read and write
26C61DB0000
heap
page read and write
241B22CE000
heap
page read and write
22381F80000
remote allocation
page read and write
21E82415000
heap
page read and write
21E823E6000
heap
page read and write
21E82403000
heap
page read and write
223801C0000
heap
page read and write
D39117C000
stack
page read and write
1800C6000
unkown
page write copy
215C2980000
heap
page read and write
21E82415000
heap
page read and write
1AFCC370000
heap
page read and write
214A39E0000
heap
page read and write
241B22F8000
heap
page read and write
180086000
unkown
page readonly
1BF19113000
heap
page read and write
1AFCBFC0000
heap
page read and write
7A78A7E000
stack
page read and write
390255C000
stack
page read and write
223FFF5D000
heap
page read and write
21E8240A000
heap
page read and write
6F27A8C000
stack
page read and write
1BF15D6B000
heap
page read and write
2673EC43000
heap
page read and write
223FFF66000
heap
page read and write
85B0A7C000
stack
page read and write
241B22E0000
heap
page read and write
180000000
unkown
page readonly
26C61E85000
heap
page read and write
20344C60000
heap
page read and write
180000000
unkown
page readonly
223FFF5D000
heap
page read and write
223FFF5D000
heap
page read and write
21E82414000
heap
page read and write
202B1E4D000
heap
page read and write
1AAA0650000
heap
page read and write
21E8240D000
heap
page read and write
180001000
unkown
page execute read
A88EDFF000
stack
page read and write
2872CFF000
stack
page read and write
214A3A38000
heap
page read and write
12D40B60000
heap
page read and write
2872AFB000
stack
page read and write
18016C000
unkown
page readonly
F3B9BFE000
unkown
page read and write
1BF15D64000
heap
page read and write
1AAA06A7000
heap
page read and write
1BF15D5F000
heap
page read and write
70D6BAE000
stack
page read and write
21E82425000
heap
page read and write
12D40B80000
heap
page read and write
214A3A1D000
heap
page read and write
22380230000
direct allocation
page execute and read and write
19A2FA50000
heap
page read and write
7A7874E000
stack
page read and write
20344BA0000
direct allocation
page execute and read and write
2872BFF000
unkown
page read and write
1BF19070000
heap
page read and write
A88EE7E000
stack
page read and write
21E8241F000
heap
page read and write
21E82411000
heap
page read and write
223FFEEA000
heap
page read and write
20344AC0000
trusted library allocation
page read and write
19A2FB50000
heap
page read and write
21E8240F000
heap
page read and write
1800C6000
unkown
page write copy
223FFF18000
heap
page read and write
215C2900000
heap
page read and write
26C61C98000
heap
page read and write
21E822F0000
heap
page read and write
1BF15D5C000
heap
page read and write
20344AC0000
trusted library allocation
page read and write
22380180000
trusted library allocation
page read and write
202B2060000
heap
page read and write
22381B40000
direct allocation
page execute and read and write
215C298B000
heap
page read and write
21E823E4000
heap
page read and write
A88EFFB000
stack
page read and write
1BF15C90000
heap
page read and write
7A787CE000
stack
page read and write
22381EC0000
direct allocation
page execute and read and write
215C2C10000
heap
page read and write
215C298D000
heap
page read and write
1BF15D65000
heap
page read and write
214A3A10000
heap
page read and write
202B21A0000
heap
page read and write
223FFF60000
heap
page read and write
20344B50000
direct allocation
page execute and read and write
22381F80000
remote allocation
page read and write
1BF17820000
heap
page read and write
22381B50000
direct allocation
page execute and read and write
241B22CA000
heap
page read and write
20342F60000
heap
page read and write
223FFF70000
heap
page read and write
22380260000
direct allocation
page execute and read and write
214A3A1B000
heap
page read and write
214A39D0000
heap
page read and write
7A78B7E000
stack
page read and write
1AAA0660000
heap
page read and write
22382110000
direct allocation
page execute and read and write
22380180000
direct allocation
page execute and read and write
7A78AFF000
stack
page read and write
26C61BB0000
heap
page read and write
241B22D4000
heap
page read and write
85B0AFE000
stack
page read and write
223FFED4000
heap
page read and write
214A3A36000
heap
page read and write
22547D4D000
heap
page read and write
1BF15D5C000
heap
page read and write
22381F9D000
heap
page read and write
1800C5000
unkown
page read and write
665C09A000
stack
page read and write
26C61E80000
heap
page read and write
2F8647F000
stack
page read and write
22547C70000
heap
page read and write
1BF19110000
heap
page read and write
241B22D0000
heap
page read and write
223FFED2000
heap
page read and write
22382120000
direct allocation
page execute and read and write
21E825D0000
heap
page read and write
241B252B000
heap
page read and write
21E821F0000
heap
page read and write
1AFCBF40000
heap
page read and write
241B5E60000
heap
page read and write
829D37E000
stack
page read and write
21E823EA000
heap
page read and write
223FFE40000
heap
page read and write
223FFF60000
heap
page read and write
202B1E40000
heap
page read and write
2673EC2B000
heap
page read and write
241B22F0000
heap
page read and write
A88F07F000
stack
page read and write
19A2F940000
heap
page read and write
21E823F3000
heap
page read and write
20344C70000
direct allocation
page execute and read and write
202B2020000
heap
page read and write
1800C6000
unkown
page write copy
21E82415000
heap
page read and write
22547D49000
heap
page read and write
1AFCC375000
heap
page read and write
21E825D5000
heap
page read and write
D3915FF000
stack
page read and write
21E82412000
heap
page read and write
22381F80000
remote allocation
page read and write
1AAA06A0000
heap
page read and write
19A2FC60000
heap
page read and write
829D2FE000
stack
page read and write
223FFF2E000
heap
page read and write
1BF15D89000
heap
page read and write
223FFF33000
heap
page read and write
1BF15D58000
heap
page read and write
241B22CA000
heap
page read and write
223FFE80000
heap
page read and write
22382130000
direct allocation
page execute and read and write
2F864FE000
stack
page read and write
20344B50000
direct allocation
page execute and read and write
20342FF8000
heap
page read and write
215C2920000
heap
page read and write
15B637E000
stack
page read and write
223FFF70000
heap
page read and write
1AAA09C0000
heap
page read and write
1BF15D64000
heap
page read and write
22380180000
trusted library allocation
page read and write
26C637F0000
heap
page read and write
19A2FA5D000
heap
page read and write
241B2520000
heap
page read and write
85B0B7E000
stack
page read and write
223801A0000
direct allocation
page execute and read and write
12D40A80000
heap
page read and write
20344B80000
direct allocation
page execute and read and write
1AAA0680000
heap
page read and write
21E82403000
heap
page read and write
70D6E7E000
stack
page read and write
20344BE0000
direct allocation
page execute and read and write
223820D0000
direct allocation
page execute and read and write
20342F80000
heap
page read and write
223FFF66000
heap
page read and write
223FFE88000
heap
page read and write
83688FE000
stack
page read and write
21E8240A000
heap
page read and write
20342FFE000
heap
page read and write
18016C000
unkown
page readonly
1BF19560000
trusted library allocation
page read and write
2673EC2D000
heap
page read and write
1AFCBF20000
heap
page read and write
22547D40000
heap
page read and write
21E82419000
heap
page read and write
1800C5000
unkown
page read and write
829D27E000
stack
page read and write
241B24F3000
heap
page read and write
665C19F000
stack
page read and write
22381B40000
direct allocation
page execute and read and write
7A786CB000
stack
page read and write
21E823C9000
heap
page read and write
829CFCA000
stack
page read and write
241B22C7000
heap
page read and write
15B62FF000
stack
page read and write
F3B9CFF000
stack
page read and write
214A3CA0000
heap
page read and write
241B22DA000
heap
page read and write
1BF15D6B000
heap
page read and write
1800C5000
unkown
page read and write
21E82415000
heap
page read and write
22381FA8000
heap
page read and write
22381B50000
direct allocation
page execute and read and write
18016C000
unkown
page readonly
1BF15D81000
heap
page read and write
223FFF66000
heap
page read and write
214A3A33000
heap
page read and write
202B1E4B000
heap
page read and write
241B22DB000
heap
page read and write
223FFF66000
heap
page read and write
215C2C20000
heap
page read and write
21E822D0000
heap
page read and write
202B1F40000
heap
page read and write
1AAA09C5000
heap
page read and write
22380230000
direct allocation
page execute and read and write
2F8647B000
stack
page read and write
22382090000
direct allocation
page execute and read and write
20343310000
heap
page read and write
241B22B9000
heap
page read and write
202B1E66000
heap
page read and write
19A2FA5B000
heap
page read and write
22382110000
direct allocation
page execute and read and write
6F27B8F000
stack
page read and write
F8948FC000
stack
page read and write
202B2040000
heap
page read and write
22380290000
direct allocation
page execute and read and write
A88EC7C000
stack
page read and write
22382160000
direct allocation
page execute and read and write
22380250000
direct allocation
page execute and read and write
22381F90000
heap
page read and write
1BF16075000
heap
page read and write
223820D0000
direct allocation
page execute and read and write
21E8240A000
heap
page read and write
26C61D90000
heap
page read and write
A88EEFB000
stack
page read and write
21E82408000
heap
page read and write
19A2FA78000
heap
page read and write
83685CC000
stack
page read and write
12D40CE5000
heap
page read and write
1BF15D48000
heap
page read and write
180086000
unkown
page readonly
1BF15CC0000
heap
page read and write
21E823F5000
heap
page read and write
241B24F0000
heap
page read and write
21E823E4000
heap
page read and write
223802A5000
heap
page read and write
241B5660000
trusted library allocation
page read and write
1BF15D40000
heap
page read and write
1BF15CA0000
heap
page read and write
223FFED9000
heap
page read and write
21E823C0000
heap
page read and write
223FFF70000
heap
page read and write
D3914FF000
unkown
page read and write
223FFF1C000
heap
page read and write
223800D0000
heap
page read and write
223FFF2B000
heap
page read and write
A88EF7F000
stack
page read and write
21E8240A000
heap
page read and write
19A2FA73000
heap
page read and write
202B1E63000
heap
page read and write
20344BC0000
direct allocation
page execute and read and write
22547D58000
heap
page read and write
241B22B0000
heap
page read and write
223802A0000
heap
page read and write
1BF15D65000
heap
page read and write
241B24C0000
heap
page read and write
241B2240000
heap
page read and write
1BF16070000
heap
page read and write
20343300000
trusted library allocation
page read and write
1BF1607B000
heap
page read and write
2673EBD0000
heap
page read and write
241B22D4000
heap
page read and write
2673EC20000
heap
page read and write
20342F50000
heap
page read and write
223FFF70000
heap
page read and write
21E823EA000
heap
page read and write
180001000
unkown
page execute read
26C61E32000
direct allocation
page execute and read and write
223FFF5D000
heap
page read and write
39028FF000
unkown
page read and write
22380180000
trusted library allocation
page read and write
2673EE60000
heap
page read and write
1BF15D75000
heap
page read and write
215C29A2000
heap
page read and write
22381FA5000
heap
page read and write
There are 355 hidden memdumps, click here to show them.