IOC Report
nvbbzu.xml

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\nvbbzu.dll"
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nvbbzu.dll",#1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nvbbzu.dll",#1

Memdumps

Base Address
Regiontype
Protect
Malicious
2C10000
direct allocation
page execute and read and write
24056D13000
heap
page read and write
2405B800000
trusted library allocation
page read and write
18B21CF0000
remote allocation
page read and write
2405BA70000
trusted library allocation
page read and write
1B4BEE5C000
heap
page read and write
F5D887B000
stack
page read and write
26C57387000
heap
page read and write
2025F658000
heap
page read and write
1B4BEC80000
heap
page read and write
680000
heap
page read and write
24056257000
heap
page read and write
26C57390000
heap
page read and write
24056D02000
heap
page read and write
1B4BF5C0000
remote allocation
page read and write
26C57390000
heap
page read and write
1725BA86000
heap
page read and write
2A239C92000
heap
page read and write
24057780000
trusted library allocation
page read and write
7B89E7B000
stack
page read and write
1B4BEDF0000
trusted library allocation
page read and write
178F000
stack
page read and write
14E0EF66000
heap
page read and write
26C57394000
heap
page read and write
2025F702000
heap
page read and write
2405BAA6000
heap
page read and write
684000
heap
page read and write
22AAD2D0000
heap
page read and write
2405BC40000
trusted library allocation
page read and write
2010663D000
heap
page read and write
1725B7A0000
heap
page read and write
1725BA62000
heap
page read and write
E36917F000
stack
page read and write
AF97BFF000
stack
page read and write
26C56A5D000
heap
page read and write
2025F63A000
heap
page read and write
2A239C52000
heap
page read and write
168E000
stack
page read and write
2405B9F0000
trusted library allocation
page read and write
2405BB02000
heap
page read and write
26C5738D000
heap
page read and write
775FEF9000
stack
page read and write
1D4C225E000
heap
page read and write
26C57802000
heap
page read and write
240562AA000
heap
page read and write
5428C7E000
stack
page read and write
6240000
trusted library allocation
page read and write
1E8F5D00000
trusted library allocation
page read and write
5FB76FE000
stack
page read and write
26C573A1000
heap
page read and write
20106602000
heap
page read and write
1E8F5090000
trusted library allocation
page read and write
1D4C227D000
heap
page read and write
26C573A6000
heap
page read and write
4C6A000
direct allocation
page read and write
1D4C226A000
heap
page read and write
18B2024C000
heap
page read and write
7EE26FE000
stack
page read and write
26C5734A000
heap
page read and write
1D4C2200000
heap
page read and write
20854300000
heap
page read and write
259D1400000
heap
page read and write
1E8F5C90000
heap
page readonly
1D4C2229000
heap
page read and write
1D4C2A02000
trusted library allocation
page read and write
24056C00000
heap
page read and write
22AAD440000
heap
page read and write
30B7000
heap
page read and write
7EE23FC000
stack
page read and write
1725BA7B000
heap
page read and write
1D4C227E000
heap
page read and write
26C56AE7000
heap
page read and write
5428AFF000
stack
page read and write
3150A7B000
stack
page read and write
26C56AEA000
heap
page read and write
1D4C225A000
heap
page read and write
1725BA3C000
heap
page read and write
259D1200000
heap
page read and write
A1FEFFE000
stack
page read and write
26C567E0000
heap
page read and write
2405629D000
heap
page read and write
2A239C8B000
heap
page read and write
20854270000
heap
page read and write
20854A02000
trusted library allocation
page read and write
26C57800000
heap
page read and write
14E0EF94000
heap
page read and write
14E0EF5B000
heap
page read and write
123D000
stack
page read and write
26C57802000
heap
page read and write
E36977C000
stack
page read and write
1A513213000
heap
page read and write
18B2028D000
heap
page read and write
26C57802000
heap
page read and write
22AAD429000
heap
page read and write
5ED897B000
stack
page read and write
259D142A000
heap
page read and write
2D3B000
heap
page read and write
F5D8B7F000
stack
page read and write
24056D18000
heap
page read and write
2405BA4A000
heap
page read and write
20106520000
heap
page read and write
1725BB08000
heap
page read and write
11F0000
heap
page read and write
1B4BEE00000
heap
page read and write
259D1370000
trusted library allocation
page read and write
18B2031C000
heap
page read and write
1725BB13000
heap
page read and write
35728FB000
stack
page read and write
26C57390000
heap
page read and write
14FE8FC000
stack
page read and write
2405BAF0000
heap
page read and write
A1FF07F000
unkown
page read and write
31505BE000
stack
page read and write
2A239C78000
heap
page read and write
14E0EF77000
heap
page read and write
1D4C226D000
heap
page read and write
E36947C000
stack
page read and write
7B89FF9000
stack
page read and write
26C57202000
heap
page read and write
259D1270000
heap
page read and write
775FFFE000
stack
page read and write
26C57394000
heap
page read and write
1A513200000
heap
page read and write
2A239B30000
trusted library allocation
page read and write
2A239C3C000
heap
page read and write
1B4BEE56000
heap
page read and write
26C5738D000
heap
page read and write
1725BB02000
heap
page read and write
E368F7C000
stack
page read and write
26C57803000
heap
page read and write
124B000
heap
page read and write
22AAD43C000
heap
page read and write
201064C0000
heap
page read and write
14FE9FE000
stack
page read and write
A8EE27B000
stack
page read and write
26C57384000
heap
page read and write
20106E02000
trusted library allocation
page read and write
1A51323D000
heap
page read and write
154E000
stack
page read and write
22AAD502000
heap
page read and write
259D14CB000
heap
page read and write
2159E77000
stack
page read and write
18B200E0000
heap
page read and write
1E8F5C80000
trusted library allocation
page read and write
26C57820000
heap
page read and write
1E8F4E3F000
heap
page read and write
2A239C13000
heap
page read and write
26C57384000
heap
page read and write
1B4BF602000
trusted library allocation
page read and write
26C573A6000
heap
page read and write
E36927F000
stack
page read and write
1725BA8A000
heap
page read and write
26C56A5C000
heap
page read and write
2D47000
heap
page read and write
1D4C222E000
heap
page read and write
26C56A13000
heap
page read and write
26C56AE1000
heap
page read and write
2D3F000
heap
page read and write
1D4C2240000
heap
page read and write
861000
direct allocation
page execute read
30B0000
heap
page read and write
A8EE17B000
stack
page read and write
26C56AEA000
heap
page read and write
18B21E02000
trusted library allocation
page read and write
20106613000
heap
page read and write
2A2399D0000
heap
page read and write
24056290000
heap
page read and write
1B4BF5C0000
remote allocation
page read and write
1B4BEE13000
heap
page read and write
2405BAFD000
heap
page read and write
20106713000
heap
page read and write
F5D8C7A000
stack
page read and write
1E8F4DF9000
heap
page read and write
1A513300000
heap
page read and write
24056325000
heap
page read and write
26C56A3C000
heap
page read and write
18B20313000
heap
page read and write
2C9F000
stack
page read and write
AF97DFE000
stack
page read and write
26C56AB3000
heap
page read and write
5FB75FE000
stack
page read and write
1D4C1FB0000
heap
page read and write
26C567F0000
heap
page read and write
2025F530000
heap
page read and write
DF0000
heap
page read and write
7EE1B5C000
stack
page read and write
7EE24FC000
stack
page read and write
A1FE97E000
stack
page read and write
2D54000
heap
page read and write
26C57300000
heap
page read and write
14FE52E000
stack
page read and write
201064B0000
heap
page read and write
2405BAFA000
heap
page read and write
5ED917A000
stack
page read and write
2025F5D0000
trusted library allocation
page read and write
26C56A69000
heap
page read and write
2A23A402000
trusted library allocation
page read and write
2405BB02000
heap
page read and write
315087D000
stack
page read and write
1E8F4E5A000
heap
page read and write
5ED8B7A000
stack
page read and write
1D4C2267000
heap
page read and write
2025F65A000
heap
page read and write
46D0000
direct allocation
page read and write
1725B7B0000
heap
page read and write
1D4C222F000
heap
page read and write
1725BA7B000
heap
page read and write
A8EE47F000
stack
page read and write
22AAD41F000
heap
page read and write
A1FEE7F000
stack
page read and write
20854190000
trusted library allocation
page read and write
1E8F4D30000
heap
page read and write
26C57384000
heap
page read and write
2D3F000
heap
page read and write
2A239C00000
heap
page read and write
24056302000
heap
page read and write
240562B3000
heap
page read and write
3150E7F000
stack
page read and write
20854302000
heap
page read and write
1725BA13000
heap
page read and write
F5D8F7D000
stack
page read and write
22AAD2C0000
heap
page read and write
5ED937E000
stack
page read and write
2A239D00000
heap
page read and write
18B20190000
trusted library allocation
page read and write
2D3F000
heap
page read and write
542874B000
stack
page read and write
26C57802000
heap
page read and write
14E0EF74000
heap
page read and write
240562FC000
heap
page read and write
2830000
heap
page read and write
2405B950000
trusted library allocation
page read and write
2405BAE9000
heap
page read and write
2A239C86000
heap
page read and write
26C5737A000
heap
page read and write
1B4BEE2A000
heap
page read and write
2025F623000
heap
page read and write
2405B950000
trusted library allocation
page read and write
2405BA60000
heap
page read and write
11C0000
trusted library allocation
page read and write
2A2399C0000
heap
page read and write
7B8A07E000
stack
page read and write
22AAD430000
heap
page read and write
775FDFE000
stack
page read and write
20854020000
heap
page read and write
2A239C47000
heap
page read and write
5FB77FE000
stack
page read and write
2A239A30000
heap
page read and write
1D4C2255000
heap
page read and write
7B8A179000
stack
page read and write
1D4C2302000
heap
page read and write
2085428D000
heap
page read and write
1A513313000
heap
page read and write
18B201C0000
trusted library allocation
page read and write
20854256000
heap
page read and write
2D37000
heap
page read and write
1D4C2257000
heap
page read and write
2405B964000
trusted library allocation
page read and write
F5D897E000
stack
page read and write
259D14BA000
heap
page read and write
259D14C1000
heap
page read and write
14E0F190000
heap
page read and write
1E8F4BF0000
heap
page read and write
1D4C2120000
trusted library allocation
page read and write
1E8F4DC0000
trusted library allocation
page read and write
20854308000
heap
page read and write
26C56A8B000
heap
page read and write
26C57371000
heap
page read and write
26C57390000
heap
page read and write
2405BC80000
remote allocation
page read and write
1A513000000
heap
page read and write
2D1A000
direct allocation
page read and write
2405BAA4000
heap
page read and write
18B21C70000
trusted library allocation
page read and write
2405626D000
heap
page read and write
22AADBC0000
trusted library allocation
page read and write
AF977FC000
stack
page read and write
600000
trusted library allocation
page read and write
26C57802000
heap
page read and write
18B2023D000
heap
page read and write
2D10000
heap
page read and write
24056307000
heap
page read and write
22AAD452000
heap
page read and write
1D4C2262000
heap
page read and write
26C5736D000
heap
page read and write
1D4C2259000
heap
page read and write
24056213000
heap
page read and write
26C57390000
heap
page read and write
AF97EFE000
stack
page read and write
24056D04000
heap
page read and write
240562A8000
heap
page read and write
26C56AAF000
heap
page read and write
2D3F000
heap
page read and write
1A51327B000
heap
page read and write
2405BA80000
trusted library allocation
page read and write
2405BD90000
trusted library allocation
page read and write
7EE20FF000
stack
page read and write
20854200000
heap
page read and write
5ED86F7000
stack
page read and write
2405BA00000
heap
page read and write
1725BA22000
heap
page read and write
1A513A02000
trusted library allocation
page read and write
1725BA8C000
heap
page read and write
2159CFB000
stack
page read and write
259D143E000
heap
page read and write
26C5737E000
heap
page read and write
150E000
stack
page read and write
1725BA7D000
heap
page read and write
935000
direct allocation
page readonly
24056200000
heap
page read and write
26C57389000
heap
page read and write
1E8F4E3D000
heap
page read and write
1E8F4E3D000
heap
page read and write
18B21CF0000
remote allocation
page read and write
2025F5A0000
heap
page read and write
5ED8C7B000
stack
page read and write
357247C000
stack
page read and write
2405BA2D000
heap
page read and write
26C56A00000
heap
page read and write
22AAD439000
heap
page read and write
1A513229000
heap
page read and write
1D4C2248000
heap
page read and write
26C573B7000
heap
page read and write
18B20300000
heap
page read and write
2A239C4F000
heap
page read and write
2405B810000
trusted library allocation
page read and write
1E8F4DF0000
heap
page read and write
5428E7D000
stack
page read and write
240562A4000
heap
page read and write
259D1D14000
heap
page read and write
24056C02000
heap
page read and write
7EE21FE000
stack
page read and write
20106629000
heap
page read and write
2A239C59000
heap
page read and write
A1FE8FE000
stack
page read and write
14FE97F000
stack
page read and write
26C56AA9000
heap
page read and write
240561B0000
trusted library allocation
page read and write
1D4C2242000
heap
page read and write
1D4C2235000
heap
page read and write
26C573B1000
heap
page read and write
26C56A60000
heap
page read and write
20854213000
heap
page read and write
1A513266000
heap
page read and write
20854250000
heap
page read and write
2025F540000
heap
page read and write
1D4C2261000
heap
page read and write
2405BC30000
trusted library allocation
page read and write
2A239C4C000
heap
page read and write
2405BA62000
heap
page read and write
1D4C2241000
heap
page read and write
2405BA20000
heap
page read and write
A1FEF77000
stack
page read and write
26C573A1000
heap
page read and write
5FB71EE000
stack
page read and write
28DB000
stack
page read and write
2025F65E000
heap
page read and write
2C5E000
stack
page read and write
22AAD320000
heap
page read and write
4AEA000
direct allocation
page read and write
1725BB00000
heap
page read and write
A1FED79000
stack
page read and write
931000
direct allocation
page execute read
4976000
direct allocation
page read and write
2405BAFA000
heap
page read and write
1D4C226F000
heap
page read and write
26C5736D000
heap
page read and write
2025F63F000
heap
page read and write
1725BA2A000
heap
page read and write
259D1D39000
heap
page read and write
26C57390000
heap
page read and write
20260002000
trusted library allocation
page read and write
2A239C27000
heap
page read and write
2010665A000
heap
page read and write
20106702000
heap
page read and write
240562FC000
heap
page read and write
1D4C2256000
heap
page read and write
35727FB000
stack
page read and write
20854313000
heap
page read and write
26C56A52000
heap
page read and write
2405BC80000
remote allocation
page read and write
E3692FC000
stack
page read and write
259D1424000
heap
page read and write
2A239C55000
heap
page read and write
14E0EF82000
heap
page read and write
1D4C2232000
heap
page read and write
1725BA64000
heap
page read and write
1725B810000
heap
page read and write
26C5738D000
heap
page read and write
1A513258000
heap
page read and write
24056277000
heap
page read and write
2025F5F0000
remote allocation
page read and write
26C56950000
trusted library allocation
page read and write
2025F672000
heap
page read and write
5ED887C000
stack
page read and write
2025F5F0000
remote allocation
page read and write
1725C202000
trusted library allocation
page read and write
AF97FFE000
stack
page read and write
1E8F4C00000
trusted library allocation
page read and write
2405BA86000
heap
page read and write
18B2022A000
heap
page read and write
18B20200000
heap
page read and write
14E0EF66000
heap
page read and write
2025F629000
heap
page read and write
2A239C58000
heap
page read and write
30BA000
heap
page read and write
26C57317000
heap
page read and write
1240000
heap
page read and write
2A239C29000
heap
page read and write
26C57380000
heap
page read and write
2A239C46000
heap
page read and write
2A239C4B000
heap
page read and write
14E0EF93000
heap
page read and write
24056314000
heap
page read and write
26C57394000
heap
page read and write
26C571B0000
remote allocation
page read and write
AF9767B000
stack
page read and write
1D4C2263000
heap
page read and write
1D4C224D000
heap
page read and write
2D1A000
heap
page read and write
2405BC80000
remote allocation
page read and write
20106600000
heap
page read and write
2025F655000
heap
page read and write
1A513202000
heap
page read and write
14E0F195000
heap
page read and write
18B20140000
heap
page read and write
24056120000
heap
page read and write
2D5B000
heap
page read and write
1E8F5CB0000
trusted library allocation
page read and write
259D1D00000
heap
page read and write
2159F7F000
stack
page read and write
2159AFE000
stack
page read and write
26C571B0000
remote allocation
page read and write
1B4BEE02000
heap
page read and write
1D4C223B000
heap
page read and write
2405BC60000
trusted library allocation
page read and write
1D4C2235000
heap
page read and write
20106DC0000
trusted library allocation
page read and write
1D4C2268000
heap
page read and write
240562B3000
heap
page read and write
259D1210000
heap
page read and write
2405B9F0000
trusted library allocation
page read and write
2025F602000
heap
page read and write
2A239C57000
heap
page read and write
26C57392000
heap
page read and write
26C56A59000
heap
page read and write
14FE879000
stack
page read and write
26C56AF8000
heap
page read and write
1D4C2275000
heap
page read and write
14E0EF8E000
heap
page read and write
18B20202000
heap
page read and write
22AAD402000
heap
page read and write
26C57394000
heap
page read and write
1E8F5A40000
trusted library allocation
page read and write
259D1413000
heap
page read and write
14E0EF10000
heap
page read and write
14FE4AA000
stack
page read and write
1E8F5089000
heap
page read and write
2D49000
heap
page read and write
24056BF0000
trusted library allocation
page read and write
3150C7E000
stack
page read and write
26C5738E000
heap
page read and write
AF978FD000
stack
page read and write
2D5B000
heap
page read and write
26C57802000
heap
page read and write
18B20302000
heap
page read and write
1725BA52000
heap
page read and write
240572E0000
trusted library allocation
page read and write
26C57315000
heap
page read and write
29BE000
stack
page read and write
1E8F4E35000
heap
page read and write
315097B000
stack
page read and write
2405623F000
heap
page read and write
A1FEC77000
stack
page read and write
26C56A5A000
heap
page read and write
24056302000
heap
page read and write
AF9747C000
stack
page read and write
1A513100000
trusted library allocation
page read and write
26C57396000
heap
page read and write
26C56ABE000
heap
page read and write
2A239C50000
heap
page read and write
115C000
stack
page read and write
24056229000
heap
page read and write
1725BA5E000
heap
page read and write
26C57802000
heap
page read and write
2159D7E000
stack
page read and write
2405B928000
trusted library allocation
page read and write
775FC7E000
stack
page read and write
18B2025C000
heap
page read and write
1D4C2213000
heap
page read and write
1725B910000
trusted library allocation
page read and write
1E8F5085000
heap
page read and write
24056272000
heap
page read and write
4971000
direct allocation
page execute read
5FB78FF000
stack
page read and write
1D4C1FC0000
heap
page read and write
866000
direct allocation
page read and write
2025F5F0000
remote allocation
page read and write
2D40000
heap
page read and write
1D4C227B000
heap
page read and write
5FB716C000
stack
page read and write
2405B941000
trusted library allocation
page read and write
1D4C2284000
heap
page read and write
1E8F5CA0000
trusted library allocation
page read and write
2405BC50000
trusted library allocation
page read and write
24057761000
trusted library allocation
page read and write
18B200D0000
heap
page read and write
20000
direct allocation
page read and write
A8EE377000
stack
page read and write
26C57390000
heap
page read and write
24056D58000
heap
page read and write
18B20259000
heap
page read and write
26C57802000
heap
page read and write
1B4BEC90000
heap
page read and write
775FA7C000
stack
page read and write
4813000
direct allocation
page read and write
1B4BEF02000
heap
page read and write
A8EDD5C000
stack
page read and write
1E8F4E3D000
heap
page read and write
26C57802000
heap
page read and write
20854279000
heap
page read and write
F5D88FE000
stack
page read and write
24056110000
heap
page read and write
E368B6C000
stack
page read and write
22AAD445000
heap
page read and write
5ED8A7E000
stack
page read and write
5F0000
trusted library allocation
page read and write
26C57380000
heap
page read and write
2405B960000
trusted library allocation
page read and write
1D4C222D000
heap
page read and write
22AAD413000
heap
page read and write
F5D8A7A000
stack
page read and write
163000
direct allocation
page read and write
E36957C000
stack
page read and write
1B4BECF0000
heap
page read and write
24056C15000
heap
page read and write
14E0EF82000
heap
page read and write
259D1C02000
heap
page read and write
1E8F5080000
heap
page read and write
2A239C92000
heap
page read and write
1A513302000
heap
page read and write
2405BAF8000
heap
page read and write
18B20213000
heap
page read and write
26C56B02000
heap
page read and write
14E0EF76000
heap
page read and write
1E8F4E01000
heap
page read and write
3150D7C000
stack
page read and write
2D3C000
heap
page read and write
1725BA00000
heap
page read and write
26C57844000
heap
page read and write
20854030000
heap
page read and write
2A239D02000
heap
page read and write
259D14C8000
heap
page read and write
2405B92E000
trusted library allocation
page read and write
5FB747E000
stack
page read and write
18B2025C000
heap
page read and write
29FF000
stack
page read and write
26C56B16000
heap
page read and write
26C57390000
heap
page read and write
20854281000
heap
page read and write
2A239D08000
heap
page read and write
2940000
trusted library allocation
page read and write
3572AFE000
stack
page read and write
26C5738F000
heap
page read and write
1E8F4DE0000
trusted library allocation
page read and write
14E0EEF0000
heap
page read and write
7B8A0FE000
stack
page read and write
1A51326A000
heap
page read and write
2405BA64000
heap
page read and write
20854229000
heap
page read and write
14E0EF8F000
heap
page read and write
26C57802000
heap
page read and write
14E0EF82000
heap
page read and write
F5D8E7E000
stack
page read and write
14E0EF72000
heap
page read and write
E36987F000
stack
page read and write
18B20249000
heap
page read and write
1D4C226B000
heap
page read and write
2405BA89000
heap
page read and write
9DA000
direct allocation
page read and write
26C5738D000
heap
page read and write
11D0000
direct allocation
page execute and read and write
2405BB00000
heap
page read and write
26C57384000
heap
page read and write
259D1502000
heap
page read and write
24056BF3000
trusted library allocation
page read and write
1D4C2260000
heap
page read and write
2CC0000
heap
page read and write
1E8F4DD0000
trusted library allocation
page read and write
14E0EDC0000
heap
page read and write
1725BA5A000
heap
page read and write
1725BA5C000
heap
page read and write
14E0EF61000
heap
page read and write
4A45000
direct allocation
page readonly
5428EFF000
stack
page read and write
2025F613000
heap
page read and write
1D4C2226000
heap
page read and write
24056180000
heap
page read and write
26C57386000
heap
page read and write
E3693FE000
stack
page read and write
2D37000
heap
page read and write
26C56B08000
heap
page read and write
1725BA60000
heap
page read and write
259D146C000
heap
page read and write
5428FFD000
stack
page read and write
7EE22FE000
stack
page read and write
3150B77000
stack
page read and write
2405B9F0000
trusted library allocation
page read and write
259D1513000
heap
page read and write
289A000
stack
page read and write
6E0000
trusted library allocation
page read and write
164E000
stack
page read and write
215979B000
stack
page read and write
18B20262000
heap
page read and write
18B20318000
heap
page read and write
2405BC10000
trusted library allocation
page read and write
1D4C225D000
heap
page read and write
18B21CF0000
remote allocation
page read and write
26C56B13000
heap
page read and write
E36967E000
stack
page read and write
AF97AFD000
stack
page read and write
2A239C4D000
heap
page read and write
22AADC02000
trusted library allocation
page read and write
1A512FA0000
heap
page read and write
1B4BF5C0000
remote allocation
page read and write
A1FEB78000
stack
page read and write
2405BD70000
trusted library allocation
page read and write
26C57392000
heap
page read and write
26C571B0000
remote allocation
page read and write
1D4C2274000
heap
page read and write
2025F64A000
heap
page read and write
215A07F000
stack
page read and write
170000
heap
page read and write
14E0EF50000
heap
page read and write
26C56850000
heap
page read and write
2405B780000
trusted library allocation
page read and write
18B20269000
heap
page read and write
18B20170000
trusted library allocation
page read and write
A8EE07F000
stack
page read and write
20854090000
heap
page read and write
2405C000000
heap
page read and write
2D47000
heap
page read and write
A8EDDDF000
stack
page read and write
1D4C2258000
heap
page read and write
2085423C000
heap
page read and write
AF97CFF000
stack
page read and write
26C57384000
heap
page read and write
1E8F4D50000
heap
page read and write
24056D00000
heap
page read and write
1D4C2264000
heap
page read and write
4A41000
direct allocation
page execute read
26C56A66000
heap
page read and write
26C57386000
heap
page read and write
5428BFC000
stack
page read and write
26C573D5000
heap
page read and write
105D000
stack
page read and write
259D1489000
heap
page read and write
24056D18000
heap
page read and write
2405BA3D000
heap
page read and write
1D4C2020000
heap
page read and write
14FE5AE000
stack
page read and write
18B2024C000
heap
page read and write
26C56AC5000
heap
page read and write
1725BA67000
heap
page read and write
2A239C70000
heap
page read and write
F5D8D7E000
stack
page read and write
26C56A5B000
heap
page read and write
2159A7E000
stack
page read and write
26C5731D000
heap
page read and write
2405B940000
trusted library allocation
page read and write
2405B944000
trusted library allocation
page read and write
240562BA000
heap
page read and write
26C56A29000
heap
page read and write
2405B920000
trusted library allocation
page read and write
A8EE57F000
stack
page read and write
1D4C2265000
heap
page read and write
26C5737E000
heap
page read and write
1B4BEE40000
heap
page read and write
5ED82DB000
stack
page read and write
2A239D13000
heap
page read and write
A1FE87C000
stack
page read and write
26C56A5F000
heap
page read and write
1A512F90000
heap
page read and write
315053B000
stack
page read and write
2405BA15000
heap
page read and write
22AAD400000
heap
page read and write
2405B790000
trusted library allocation
page read and write
20106676000
heap
page read and write
35729FB000
stack
page read and write
1D4C223D000
heap
page read and write
2025F600000
heap
page read and write
2405628B000
heap
page read and write
5ED8F7F000
stack
page read and write
26C57350000
heap
page read and write
2405B920000
trusted library allocation
page read and write
26C573D1000
heap
page read and write
There are 686 hidden memdumps, click here to show them.