IOC Report
badger_x64_stealth_rtl.bin.dll.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\badger_x64_stealth_rtl.bin.dll.dll"
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\badger_x64_stealth_rtl.bin.dll.dll,DllMain
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\badger_x64_stealth_rtl.bin.dll.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\badger_x64_stealth_rtl.bin.dll.dll,StartW
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\badger_x64_stealth_rtl.bin.dll.dll",DllMain
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\badger_x64_stealth_rtl.bin.dll.dll",StartW
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\badger_x64_stealth_rtl.bin.dll.dll",#1

URLs

Name
IP
Malicious
https://tiguanin.com:8041/admin.phpD
unknown
malicious
https://greshunka.com:8041/bazar.php&
unknown
malicious
https://tiguanin.com:8041/bazar.phpl
unknown
malicious
https://greshunka.com:8041/bazar.php$
unknown
malicious
https://greshunka.com:8041/bazar.php.muip
unknown
malicious
https://tiguanin.com:8041/A
unknown
malicious
https://tiguanin.com:8041/admin.phpgU
unknown
malicious
https://greshunka.com:8041/admin.phpx
unknown
malicious
https://greshunka.com:8041/bazar.php/
unknown
malicious
https://tiguanin.com:8041/bazar.phpf
unknown
malicious
https://tiguanin.com:8041/AppData
unknown
malicious
https://tiguanin.com:8041/bazar.phpF
unknown
malicious
https://tiguanin.com:8041/:
unknown
https://bazarunet.com:8041/admin.phpF
unknown
https://greshunka.com:8041/5
unknown
https://tiguanin.com:8041/=
unknown
https://tiguanin.com:8041/admin.phpU
unknown
https://bazarunet.com:8041/bazar.phpg
unknown
https://tiguanin.com/b
unknown
https://bazarunet.com:8041/bazar.phpk
unknown
https://greshunka.com:8041/1
unknown
https://tiguanin.com:8041/U
unknown
https://tiguanin.com:8041/bazar.php
unknown
https://tiguanin.com:8041/bazar.phpt
unknown
https://greshunka.com:8041/%
unknown
https://tiguanin.com:8041/I
unknown
https://greshunka.com:8041/&
unknown
https://greshunka.com:8041/bazar.php.mui
unknown
https://greshunka.com:8041/bazar.phpJ=
unknown
https://bazarunet.com:8041/dmin.php
unknown
https://bazarunet.com:8041/admin.phpem32
unknown
https://tiguanin.com:8041/admin.phpf
unknown
https://greshunka.com:8041/a
unknown
https://bazarunet.com:8041/q
unknown
https://bazarunet.com:8041/bazar.phpR
unknown
https://bazarunet.com:8041/Y
unknown
https://greshunka.com:8041/bazar.phpx
unknown
https://greshunka.com:8041/in.com:8041/.
unknown
https://tiguanin.com:8041/5
unknown
https://bazarunet.com:8041/
unknown
https://greshunka.com/
unknown
https://greshunka.com:8041/azar.php
unknown
https://bazarunet.com:8041/admin.php6
unknown
https://bazarunet.com:8041/bazar.phpD
unknown
https://greshunka.com/5:
unknown
https://bazarunet.com:8041/bazar.php~=
unknown
https://greshunka.com:8041/bazar.phpm:8041/bazar.php
unknown
https://tiguanin.com:8041/admin.php
unknown
https://greshunka.com:8041/bazar.phpf
unknown
https://bazarunet.com:8041/bazar.php7
unknown
https://greshunka.com:8041/admin.php;
unknown
https://greshunka.com:8041/bazar.phpe
unknown
https://tiguanin.com/V=6
unknown
https://bazarunet.com:8041/I
unknown
https://bazarunet.com:8041/bazar.php;
unknown
https://greshunka.com:8041/bazar.phpi
unknown
https://bazarunet.com/
unknown
https://greshunka.com:8041/bazar.phph
unknown
https://bazarunet.com:8041/bazar.php0
unknown
https://greshunka.com:8041/bazar.phpl
unknown
https://greshunka.com:8041/admin.phpA
unknown
https://tiguanin.com:8041/
unknown
https://tiguanin.com:8041/azar.php
unknown
https://tiguanin.com/
unknown
https://tiguanin.com:8041/admin.phpqU
unknown
https://bazarunet.com:8041/admin.phpD=
unknown
https://greshunka.com:8041/admin.phpD=
unknown
https://bazarunet.com:8041/admin.php:=R
unknown
https://greshunka.com:8041/bazar.php
unknown
https://tiguanin.com:8041/bazar.php/
unknown
https://bazarunet.com:8041/bazar.php
unknown
https://greshunka.com:8041/nka.com:8041/admin.php
unknown
https://tiguanin.com:8041/in.com:8041/
unknown
https://bazarunet.com:8041/admin.phpl
unknown
https://greshunka.com:8041/bazar.phpJ
unknown
https://tiguanin.com:8041/admin.php)
unknown
https://tiguanin.com:8041/bazar.phpH
unknown
https://tiguanin.com:8041/azar.php.
unknown
https://bazarunet.com:8041/5
unknown
https://bazarunet.com:8041/admin.phpe
unknown
https://greshunka.com:8041/nk
unknown
https://greshunka.com:8041/admin.php
unknown
https://tiguanin.com:8041/p
unknown
https://tiguanin.com:8041/admin.php2
unknown
https://greshunka.com:8041/bazar.php;
unknown
https://greshunka.com:8041/admin.phpV=6
unknown
https://tiguanin.com:8041/bazar.phpX
unknown
https://greshunka.com:8041/
unknown
https://bazarunet.com:8041/nka.com:8041/
unknown
https://bazarunet.com:8041/admin.php
unknown
https://tiguanin.com:8041/nka.com:8041/
unknown
https://tiguanin.com:8041/bazar.phpR
unknown
https://tiguanin.com:8041/in.com:8041/.
unknown
https://bazarunet.com:8041/AppData
unknown
There are 84 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
greshunka.com
82.115.223.39
malicious
tiguanin.com
80.78.24.30
malicious
bazarunet.com
80.78.24.30
malicious

IPs

IP
Domain
Country
Malicious
82.115.223.39
greshunka.com
Russian Federation
malicious
80.78.24.30
tiguanin.com
Cyprus
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
22FBF16F000
heap
page read and write
malicious
266261A0000
heap
page readonly
22FC0C4D000
heap
page read and write
22FC0D58000
direct allocation
page readonly
22FC1100000
remote allocation
page read and write
26626094000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
26626089000
heap
page read and write
26626220000
trusted library allocation
page read and write
28956700000
heap
page read and write
22FC0C79000
heap
page read and write
22FC0C46000
heap
page read and write
E4A11FE000
stack
page read and write
E4A117F000
trusted library allocation
page read and write
22FC1100000
trusted library allocation
page read and write
26626690000
trusted library allocation
page read and write
26626690000
trusted library allocation
page read and write
22FC0C5F000
heap
page read and write
22FC0C46000
heap
page read and write
2895802A000
heap
page read and write
26626220000
trusted library allocation
page read and write
E4A1175000
trusted library allocation
page read and write
26329EF5000
heap
page read and write
7F03D75000
trusted library allocation
page read and write
133793E0000
heap
page read and write
22FC0C4D000
heap
page read and write
266260A3000
heap
page read and write
7F03D75000
trusted library allocation
page read and write
E4A157F000
trusted library allocation
page read and write
22FC0C69000
heap
page read and write
26626093000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
26626089000
heap
page read and write
266260A3000
heap
page read and write
26626093000
heap
page read and write
22FC0C79000
heap
page read and write
26626085000
heap
page read and write
7F04175000
trusted library allocation
page read and write
22FC0C6B000
heap
page read and write
7FFCAC160000
unkown
page readonly
E4A1575000
trusted library allocation
page read and write
22FC0C79000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
7F03D75000
trusted library allocation
page read and write
E4A157F000
trusted library allocation
page read and write
7F0417F000
trusted library allocation
page read and write
E4A157F000
trusted library allocation
page read and write
E4A12FD000
stack
page read and write
C00207E000
stack
page read and write
26329F00000
direct allocation
page execute and read and write
2321C685000
heap
page read and write
2321C680000
heap
page read and write
26626220000
trusted library allocation
page read and write
22FC0C5D000
heap
page read and write
26626079000
heap
page read and write
22FBF160000
heap
page read and write
22FC0C46000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
22FC0C5B000
heap
page read and write
28956528000
heap
page read and write
22FC0D6B000
direct allocation
page readonly
22FC1100000
trusted library allocation
page read and write
26626220000
trusted library allocation
page read and write
26626089000
heap
page read and write
7F04175000
trusted library allocation
page read and write
26626089000
heap
page read and write
E4A117F000
trusted library allocation
page read and write
26626093000
heap
page read and write
266247B0000
heap
page read and write
22FC0D68000
direct allocation
page read and write
7F04175000
trusted library allocation
page read and write
22FC0C5E000
heap
page read and write
7F03D7F000
trusted library allocation
page read and write
22FC0D20000
direct allocation
page readonly
7F03FFF000
stack
page read and write
22FC1100000
trusted library allocation
page read and write
22FC0C4D000
heap
page read and write
7F0417F000
trusted library allocation
page read and write
22FC0C2B000
heap
page read and write
E4A1575000
trusted library allocation
page read and write
F9C71FE000
stack
page read and write
7FFCAC161000
unkown
page execute read
E4A157F000
trusted library allocation
page read and write
22FC1100000
trusted library allocation
page read and write
7F04175000
trusted library allocation
page read and write
2321C380000
heap
page read and write
E4A117F000
trusted library allocation
page read and write
26329DB0000
heap
page read and write
22FC0BE0000
heap
page readonly
266245D0000
heap
page read and write
7FFCAC1A0000
unkown
page read and write
26626093000
heap
page read and write
E4A157F000
trusted library allocation
page read and write
26624704000
heap
page read and write
2321C580000
heap
page read and write
2321CB40000
heap
page read and write
7F0417F000
trusted library allocation
page read and write
22FC0D60000
direct allocation
page read and write
22FC0C5E000
heap
page read and write
26626220000
trusted library allocation
page read and write
22FC1100000
trusted library allocation
page read and write
2662605B000
heap
page read and write
26626220000
trusted library allocation
page read and write
13379260000
heap
page read and write
7F0417F000
trusted library allocation
page read and write
7F0407B000
stack
page read and write
26626093000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
22FC1100000
trusted library allocation
page read and write
26626093000
heap
page read and write
26626220000
trusted library allocation
page read and write
2321C48D000
heap
page read and write
E4A1175000
trusted library allocation
page read and write
7F03D7F000
trusted library allocation
page read and write
22FC0C66000
heap
page read and write
26626093000
heap
page read and write
22FC0C2B000
heap
page read and write
26626690000
trusted library allocation
page read and write
E4A1575000
trusted library allocation
page read and write
22FBF1B1000
heap
page read and write
26626089000
heap
page read and write
266260A3000
heap
page read and write
E4A117F000
trusted library allocation
page read and write
E4A13FF000
stack
page read and write
26626078000
heap
page read and write
22FC0C69000
heap
page read and write
22FC0D65000
direct allocation
page read and write
26626089000
heap
page read and write
266246D7000
heap
page read and write
289566B0000
heap
page read and write
26624702000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
22FC0C46000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
22FBF280000
heap
page read and write
7F0417F000
trusted library allocation
page read and write
22FBF2E0000
direct allocation
page execute and read and write
22FC0D6A000
direct allocation
page read and write
22FC1100000
trusted library allocation
page read and write
E4A107C000
stack
page read and write
7FFCAC1A1000
unkown
page readonly
22FC0C46000
heap
page read and write
22FC0C2A000
heap
page read and write
7FFCAC160000
unkown
page readonly
22FC0C2E000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
22FC0C5F000
heap
page read and write
266246D7000
heap
page read and write
7FFCAC1A6000
unkown
page read and write
7F04175000
trusted library allocation
page read and write
26626220000
trusted library allocation
page read and write
22FC0C46000
heap
page read and write
E4A147B000
stack
page read and write
2662607A000
heap
page read and write
26626690000
trusted library allocation
page read and write
2321C498000
heap
page read and write
26626089000
heap
page read and write
22FC0C2A000
heap
page read and write
22FBF184000
heap
page read and write
22FC0C46000
heap
page read and write
26626093000
heap
page read and write
22FC0C79000
heap
page read and write
26626088000
heap
page read and write
26626690000
trusted library allocation
page read and write
2662605C000
heap
page read and write
22FC0C5E000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
22FC1100000
trusted library allocation
page read and write
22FC0C22000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
22FC0C69000
heap
page read and write
E4A1175000
trusted library allocation
page read and write
26626220000
trusted library allocation
page read and write
26626220000
trusted library allocation
page read and write
7FFCAC1A1000
unkown
page readonly
7F04175000
trusted library allocation
page read and write
26626220000
trusted library allocation
page read and write
26626690000
trusted library allocation
page read and write
FBC3C7C000
stack
page read and write
117AEFC000
stack
page read and write
7F03D7F000
trusted library allocation
page read and write
E4A157F000
trusted library allocation
page read and write
26626078000
heap
page read and write
E4A117F000
trusted library allocation
page read and write
7F03D75000
trusted library allocation
page read and write
26626150000
direct allocation
page read and write
266260A3000
heap
page read and write
7F03D75000
trusted library allocation
page read and write
22FC1100000
trusted library allocation
page read and write
26626690000
trusted library allocation
page read and write
26626690000
trusted library allocation
page read and write
22FC0C69000
heap
page read and write
26626085000
heap
page read and write
7F03D7F000
trusted library allocation
page read and write
E4A117F000
trusted library allocation
page read and write
22FC0C46000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
26626690000
trusted library allocation
page read and write
22FC1100000
trusted library allocation
page read and write
7F04175000
trusted library allocation
page read and write
26626690000
trusted library allocation
page read and write
7F03D75000
trusted library allocation
page read and write
2632B8A9000
heap
page read and write
289564A0000
heap
page read and write
133793E5000
heap
page read and write
22FC0C5E000
heap
page read and write
26626089000
heap
page read and write
26626690000
trusted library allocation
page read and write
7F0417F000
trusted library allocation
page read and write
22FC0C2B000
heap
page read and write
26329E0E000
heap
page read and write
7F03D7F000
trusted library allocation
page read and write
22FC1100000
trusted library allocation
page read and write
2321C7FD000
heap
page read and write
2321C480000
heap
page read and write
266260A3000
heap
page read and write
22FC0C5F000
heap
page read and write
28956705000
heap
page read and write
117B27F000
stack
page read and write
2662607A000
heap
page read and write
22FBF17A000
heap
page read and write
22FC1100000
remote allocation
page read and write
22FC0C63000
heap
page read and write
26329DB8000
heap
page read and write
E4A117F000
trusted library allocation
page read and write
22FC0C46000
heap
page read and write
7F03D7F000
trusted library allocation
page read and write
22FC1100000
trusted library allocation
page read and write
26626088000
heap
page read and write
22FC0C5E000
heap
page read and write
26626088000
heap
page read and write
266261CD000
heap
page read and write
26626084000
heap
page read and write
7F03D75000
trusted library allocation
page read and write
26626082000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
E4A1175000
trusted library allocation
page read and write
26626690000
trusted library allocation
page read and write
22FC0C2B000
heap
page read and write
22FC0C46000
heap
page read and write
F9C6FFF000
stack
page read and write
26626690000
trusted library allocation
page read and write
22FC0C79000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
7F0417F000
trusted library allocation
page read and write
F9C6EFC000
stack
page read and write
2321C670000
heap
page read and write
22FC0C5E000
heap
page read and write
7FFCAC161000
unkown
page execute read
117AF7F000
stack
page read and write
26626094000
heap
page read and write
26624704000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
266246D7000
heap
page read and write
266246D7000
heap
page read and write
289564D0000
direct allocation
page execute and read and write
22FC1100000
trusted library allocation
page read and write
22FC1100000
trusted library allocation
page read and write
26626089000
heap
page read and write
FBC3DFE000
stack
page read and write
26626220000
remote allocation
page read and write
26626092000
heap
page read and write
266260A3000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
26626220000
trusted library allocation
page read and write
7F03D75000
trusted library allocation
page read and write
22FC1100000
trusted library allocation
page read and write
2662607A000
heap
page read and write
7F03EFB000
stack
page read and write
22FBF17D000
heap
page read and write
26626093000
heap
page read and write
26329D90000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
22FC0C5F000
heap
page read and write
266260A3000
heap
page read and write
E4A117F000
trusted library allocation
page read and write
2321C489000
heap
page read and write
E4A1175000
trusted library allocation
page read and write
2662605B000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
266246D1000
heap
page read and write
7FFCAC1A5000
unkown
page readonly
2632BA21000
heap
page read and write
E4A157F000
trusted library allocation
page read and write
E4A117F000
trusted library allocation
page read and write
133791F0000
heap
page read and write
26626220000
trusted library allocation
page read and write
22FC0C5E000
heap
page read and write
E4A1175000
trusted library allocation
page read and write
22FC0C2B000
heap
page read and write
26626220000
trusted library allocation
page read and write
22FC0C21000
heap
page read and write
26626089000
heap
page read and write
117AFFF000
stack
page read and write
26626040000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
26626093000
heap
page read and write
7FFCAC1A6000
unkown
page read and write
26626093000
heap
page read and write
13379110000
heap
page read and write
22FC0D56000
direct allocation
page read and write
22FC0D25000
heap
page read and write
26626089000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
E4A157F000
trusted library allocation
page read and write
266247F0000
heap
page read and write
E4A137B000
stack
page read and write
7F0417F000
trusted library allocation
page read and write
26626088000
heap
page read and write
22FC0C4D000
heap
page read and write
22FC0C5F000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
E4A157F000
stack
page read and write
FBC3D7F000
stack
page read and write
133793C0000
heap
page read and write
E4A1267000
stack
page read and write
22FBF260000
heap
page read and write
266246B0000
heap
page read and write
F9C70FF000
stack
page read and write
26626220000
remote allocation
page read and write
7F03D75000
trusted library allocation
page read and write
7F04175000
trusted library allocation
page read and write
22FC1100000
trusted library allocation
page read and write
22FC1100000
trusted library allocation
page read and write
22FC0C5E000
heap
page read and write
7FFCAC163000
unkown
page write copy
22FC0C5B000
heap
page read and write
266247F5000
heap
page read and write
22FC0C69000
heap
page read and write
26626093000
heap
page read and write
2321C5A0000
direct allocation
page execute and read and write
22FC1100000
trusted library allocation
page read and write
22FC1100000
trusted library allocation
page read and write
7F03D7F000
trusted library allocation
page read and write
22FC0C79000
heap
page read and write
22FC0D63000
direct allocation
page read and write
7F04175000
trusted library allocation
page read and write
22FC0C69000
heap
page read and write
22FC0C2B000
heap
page read and write
7F04175000
trusted library allocation
page read and write
2662607A000
heap
page read and write
22FC0C63000
heap
page read and write
22FC0C5F000
heap
page read and write
C001CBC000
stack
page read and write
22FC0C10000
heap
page read and write
2662608F000
heap
page read and write
C001DBE000
stack
page read and write
26626089000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
22FC1100000
trusted library allocation
page read and write
26626690000
trusted library allocation
page read and write
E4A1175000
trusted library allocation
page read and write
28956520000
heap
page read and write
E4A1575000
trusted library allocation
page read and write
E4A1175000
trusted library allocation
page read and write
7F0417F000
trusted library allocation
page read and write
26626093000
heap
page read and write
22FC0C2B000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
22FC1100000
trusted library allocation
page read and write
7F03D75000
trusted library allocation
page read and write
22FC0C79000
heap
page read and write
E4A1175000
trusted library allocation
page read and write
2321C460000
heap
page read and write
7F04175000
trusted library allocation
page read and write
266260A3000
heap
page read and write
2632B890000
heap
page read and write
26626220000
trusted library allocation
page read and write
22FC0C2B000
heap
page read and write
22FBF17D000
heap
page read and write
26626083000
heap
page read and write
26626088000
heap
page read and write
7F03D7F000
trusted library allocation
page read and write
22FBF2D0000
heap
page read and write
26626094000
heap
page read and write
26626690000
trusted library allocation
page read and write
E4A1572000
stack
page read and write
22FC1100000
trusted library allocation
page read and write
26626220000
trusted library allocation
page read and write
26626088000
heap
page read and write
22FBF17A000
heap
page read and write
26626220000
trusted library allocation
page read and write
FBC3CFF000
stack
page read and write
E4A1175000
trusted library allocation
page read and write
22FBF2D5000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
7F03D7F000
trusted library allocation
page read and write
26626690000
trusted library allocation
page read and write
22FC1100000
remote allocation
page read and write
22FC0C4D000
heap
page read and write
E4A117F000
trusted library allocation
page read and write
22FC0C46000
heap
page read and write
26626089000
heap
page read and write
266246CE000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
7FFCAC163000
unkown
page write copy
E4A117F000
trusted library allocation
page read and write
7F04175000
trusted library allocation
page read and write
22FC0DA6000
heap
page read and write
26626220000
trusted library allocation
page read and write
26329DBF000
heap
page read and write
22FC0C46000
heap
page read and write
26626220000
trusted library allocation
page read and write
266247D0000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
22FC1100000
trusted library allocation
page read and write
7F04175000
trusted library allocation
page read and write
C001D3E000
stack
page read and write
26626088000
heap
page read and write
26626220000
trusted library allocation
page read and write
1337AD10000
heap
page read and write
22FC0C5E000
heap
page read and write
22FC0C5B000
heap
page read and write
266260A3000
heap
page read and write
26626690000
trusted library allocation
page read and write
7F0417F000
trusted library allocation
page read and write
7F04175000
trusted library allocation
page read and write
7F03E7E000
stack
page read and write
22FC0C2B000
heap
page read and write
E4A1175000
trusted library allocation
page read and write
22FC0C4D000
heap
page read and write
26626089000
heap
page read and write
26626690000
trusted library allocation
page read and write
266246B8000
heap
page read and write
26329EB0000
heap
page read and write
22FC0C69000
heap
page read and write
13379210000
heap
page read and write
2662605B000
heap
page read and write
7F03C7C000
stack
page read and write
26626690000
trusted library allocation
page read and write
1337AB98000
heap
page read and write
26626088000
heap
page read and write
E4A117F000
trusted library allocation
page read and write
7F0417F000
trusted library allocation
page read and write
E4A1575000
trusted library allocation
page read and write
2321C580000
heap
page read and write
22FC0C5D000
heap
page read and write
7F0417F000
trusted library allocation
page read and write
E4A157F000
trusted library allocation
page read and write
7F03D75000
trusted library allocation
page read and write
266246CE000
heap
page read and write
7F0417F000
trusted library allocation
page read and write
22FC1100000
trusted library allocation
page read and write
E4A1575000
trusted library allocation
page read and write
E4A1175000
trusted library allocation
page read and write
7F03D75000
trusted library allocation
page read and write
26626690000
trusted library allocation
page read and write
22FC0C79000
heap
page read and write
7F03F7B000
stack
page read and write
26626220000
trusted library allocation
page read and write
22FC0C69000
heap
page read and write
26626690000
trusted library allocation
page read and write
7F03D7F000
trusted library allocation
page read and write
22FC0D5E000
direct allocation
page read and write
7F03DFF000
stack
page read and write
13379268000
heap
page read and write
22FC0D21000
direct allocation
page execute read
E4A1575000
trusted library allocation
page read and write
26626220000
trusted library allocation
page read and write
22FC0C69000
heap
page read and write
22FC0C79000
heap
page read and write
7FFCAC1A5000
unkown
page readonly
289563A0000
heap
page read and write
7FFCAC1A0000
unkown
page read and write
22FC1100000
trusted library allocation
page read and write
26626690000
trusted library allocation
page read and write
22FC0C4D000
heap
page read and write
266246D1000
heap
page read and write
7F0417F000
trusted library allocation
page read and write
26626356000
heap
page read and write
26626051000
heap
page read and write
26626087000
heap
page read and write
22FC0C63000
heap
page read and write
26626089000
heap
page read and write
22FC0C69000
heap
page read and write
26626093000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
E4A157F000
trusted library allocation
page read and write
22FBF070000
heap
page read and write
2321C782000
heap
page read and write
7F03E67000
stack
page read and write
26626094000
heap
page read and write
22FC1100000
trusted library allocation
page read and write
7F03D7F000
trusted library allocation
page read and write
26626690000
trusted library allocation
page read and write
26626050000
heap
page read and write
E4A1575000
trusted library allocation
page read and write
26626220000
remote allocation
page read and write
26626052000
heap
page read and write
E4A1575000
trusted library allocation
page read and write
7F04175000
trusted library allocation
page read and write
22FC0C5C000
heap
page read and write
26626055000
heap
page read and write
7F0417F000
trusted library allocation
page read and write
7F03D7F000
trusted library allocation
page read and write
22FC1100000
trusted library allocation
page read and write
22FC0C79000
heap
page read and write
26329CB0000
heap
page read and write
26626690000
trusted library allocation
page read and write
26329EF0000
heap
page read and write
26626220000
trusted library allocation
page read and write
22FC0C20000
heap
page read and write
28956480000
heap
page read and write
13379360000
direct allocation
page execute and read and write
22FC0C5E000
heap
page read and write
28957EB2000
heap
page read and write
26626088000
heap
page read and write
266260A3000
heap
page read and write
26626220000
trusted library allocation
page read and write
22FC0C69000
heap
page read and write
E4A117F000
trusted library allocation
page read and write
E4A157F000
trusted library allocation
page read and write
22FC1100000
trusted library allocation
page read and write
E4A1575000
trusted library allocation
page read and write
22FC0C69000
heap
page read and write
22FBF168000
heap
page read and write
E4A1175000
trusted library allocation
page read and write
26624810000
direct allocation
page execute and read and write
E4A1575000
trusted library allocation
page read and write
266246CB000
heap
page read and write
22FC0C5F000
heap
page read and write
There are 511 hidden memdumps, click here to show them.