IOC Report
dlawt.exe

loading gif

Files

File Path
Type
Category
Malicious
dlawt.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\nsq995B.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Algae62\plkkers\Reputation\network-cellular-4g-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Arbejdskraftproblemer\CoverEdCtrl.manifest
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (923), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Arbejdskraftproblemer\Lakridset.bmp
PC bitmap, Windows 3.x format, 72 x 399 x 24, image size 86184, cbSize 86238, bits offset 54
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Bacin\Besjlings\network-wireless-connected-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Baggesen\audio-x-generic-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Baggesen\changes-prevent-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Buyback\preguiltiness\Hydroxytryptamine\Forlben\dialog-information-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Buyback\preguiltiness\Hydroxytryptamine\Forlben\drive-harddisk-solidstate-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Buyback\preguiltiness\Hydroxytryptamine\Forlben\folder-download.png
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Buyback\preguiltiness\Hydroxytryptamine\Forlben\folder-drag-accept-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Buyback\preguiltiness\Hydroxytryptamine\Forlben\folder-visiting.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Buyback\preguiltiness\Hydroxytryptamine\Forlben\format-text-bold-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Buyback\preguiltiness\Hydroxytryptamine\Forlben\format-text-direction-symbolic-rtl.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Buyback\preguiltiness\Hydroxytryptamine\Forlben\go-previous-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Buyback\preguiltiness\Hydroxytryptamine\Forlben\idxcaption.xsl
exported SGML document, ASCII text
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Buyback\preguiltiness\Hydroxytryptamine\Forlben\media-playback-stop-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Buyback\preguiltiness\Hydroxytryptamine\Forlben\media-playlist-repeat.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Buyback\preguiltiness\Hydroxytryptamine\Forlben\mmapwarm.c
C source, ASCII text
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\Isdkkede\Charterrejsens\phone-apple-iphone-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\preferences-desktop-theme.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\text-x-generic.png
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\user-offline.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Begravedes\Viewer\Rammedes\view-wrapped-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\dlawt.exe
"C:\Users\user\Desktop\dlawt.exe"

URLs

Name
IP
Malicious
http://sun.com/2000/XMLSearch
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://creativecommons.org/licenses/by-sa/4.0/
unknown
http://openoffice.org/2000/chart
unknown
http://openoffice.org/2000/style
unknown
http://openoffice.org/2000/help
unknown
http://openoffice.org/2000/table
unknown
http://jimmac.musichall.czif
unknown
http://openoffice.org/2000/drawing
unknown
http://openoffice.org/2000/meta
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://openoffice.org/2000/text
unknown
http://openoffice.org/2000/datastyle
unknown
http://mozilla.org/MPL/2.0/.
unknown
http://openoffice.org/2000/office
unknown
There are 5 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3208000
trusted library allocation
page execute and read and write
malicious
1D673D36000
heap
page read and write
2203C64D000
heap
page read and write
5C8D27B000
stack
page read and write
1D6733A0000
trusted library allocation
page read and write
1D674140000
remote allocation
page read and write
492E99F000
stack
page read and write
1D673D00000
heap
page read and write
1D67344A000
heap
page read and write
1CD8CA43000
heap
page read and write
1D673C02000
heap
page read and write
1D6734E0000
heap
page read and write
1CD8D600000
heap
page read and write
2203C658000
heap
page read and write
60B000
heap
page read and write
5E0000
heap
page read and write
422000
unkown
page read and write
25732602000
trusted library allocation
page read and write
54ADAFF000
stack
page read and write
CB1C08B000
stack
page read and write
1CD8D343000
heap
page read and write
20DE25C0000
heap
page read and write
25731B50000
heap
page read and write
1D673D4E000
heap
page read and write
3160000
trusted library allocation
page read and write
40A000
unkown
page write copy
5F1000
heap
page read and write
2955000
trusted library allocation
page read and write
1CD8D630000
heap
page read and write
29A36DE0000
remote allocation
page read and write
54ADC79000
stack
page read and write
1D673429000
heap
page read and write
AB560FF000
stack
page read and write
2203C64C000
heap
page read and write
20DE286A000
heap
page read and write
492E91B000
stack
page read and write
1D673D5B000
heap
page read and write
20DE285A000
heap
page read and write
1D673D90000
heap
page read and write
1D673D5B000
heap
page read and write
CD2587B000
stack
page read and write
2203C700000
heap
page read and write
5EB000
heap
page read and write
60B000
heap
page read and write
2203C3A0000
heap
page read and write
1801A200000
heap
page read and write
5F5000
heap
page read and write
401000
unkown
page execute read
1D673D92000
heap
page read and write
92DB87F000
stack
page read and write
28650913000
heap
page read and write
5F1000
heap
page read and write
1D673D45000
heap
page read and write
85C73FE000
stack
page read and write
28650828000
heap
page read and write
1B6C9FD000
stack
page read and write
5F1000
heap
page read and write
1D673DB2000
heap
page read and write
1B25F800000
heap
page read and write
2957000
trusted library allocation
page read and write
1CD8CA43000
heap
page read and write
2203C68F000
heap
page read and write
CB1C77E000
stack
page read and write
16F61013000
heap
page read and write
5F5000
heap
page read and write
1D673D27000
heap
page read and write
19420A0C000
heap
page read and write
92DB5FB000
stack
page read and write
16F61802000
heap
page read and write
1D6734D3000
heap
page read and write
20DE2863000
heap
page read and write
1D6734FA000
heap
page read and write
2955000
trusted library allocation
page read and write
1D674140000
remote allocation
page read and write
3AA2FF000
stack
page read and write
16F60DD0000
heap
page read and write
54AD9FB000
stack
page read and write
2203C670000
heap
page read and write
1D673D9A000
heap
page read and write
5F1000
heap
page read and write
25731AF0000
heap
page read and write
CB1C97C000
stack
page read and write
1CD8CBB9000
heap
page read and write
2504000
heap
page read and write
AB55EFE000
stack
page read and write
20DE2865000
heap
page read and write
B89A4FE000
stack
page read and write
28650813000
heap
page read and write
1D673D9E000
heap
page read and write
1CD8D602000
heap
page read and write
20DE287B000
heap
page read and write
60B000
heap
page read and write
1D673D94000
heap
page read and write
5F5000
heap
page read and write
19420A0C000
heap
page read and write
5F5000
heap
page read and write
85C797F000
stack
page read and write
29A353C0000
trusted library allocation
page read and write
60B000
heap
page read and write
2203C656000
heap
page read and write
3180000
trusted library allocation
page read and write
1D673413000
heap
page read and write
1D673D4E000
heap
page read and write
20DE286D000
heap
page read and write
608000
heap
page read and write
1801A302000
heap
page read and write
5F5000
heap
page read and write
2203C410000
heap
page read and write
85C78F7000
stack
page read and write
29A35500000
heap
page read and write
1D673D4E000
heap
page read and write
1CD8CA89000
heap
page read and write
CB1C67F000
stack
page read and write
5E0000
heap
page read and write
60B000
heap
page read and write
16F61000000
heap
page read and write
608000
heap
page read and write
1801AA02000
trusted library allocation
page read and write
1D6734EB000
heap
page read and write
5EB000
heap
page read and write
2954000
trusted library allocation
page read and write
25731C02000
heap
page read and write
5F5000
heap
page read and write
2203C600000
heap
page read and write
25731C13000
heap
page read and write
1801A202000
heap
page read and write
5EB000
heap
page read and write
1B6C7FE000
stack
page read and write
60B000
heap
page read and write
99000
stack
page read and write
2957000
trusted library allocation
page read and write
1CD8D3B1000
heap
page read and write
194209F8000
heap
page read and write
29A351C0000
heap
page read and write
20DE3002000
trusted library allocation
page read and write
1CDE2C46000
heap
page read and write
1D673513000
heap
page read and write
3AA57D000
stack
page read and write
1CD8CA75000
heap
page read and write
373D000
stack
page read and write
5F1000
heap
page read and write
5E0000
heap
page read and write
20DE2867000
heap
page read and write
16F61029000
heap
page read and write
1D6734C6000
heap
page read and write
5F1000
heap
page read and write
19420A01000
heap
page read and write
1D673D8F000
heap
page read and write
AB557FB000
stack
page read and write
295D000
trusted library allocation
page read and write
1D6734B2000
heap
page read and write
1CD8CA58000
heap
page read and write
1D673240000
heap
page read and write
5F5000
heap
page read and write
1CD8C8B0000
heap
page read and write
5F5000
heap
page read and write
5E0000
heap
page read and write
29A35461000
heap
page read and write
2203C702000
heap
page read and write
3A9BAB000
stack
page read and write
1801A21F000
heap
page read and write
1D673DA9000
heap
page read and write
1B25F650000
heap
page read and write
2957000
trusted library allocation
page read and write
25731C00000
heap
page read and write
54ADE7A000
stack
page read and write
20DE2877000
heap
page read and write
1B25F6B0000
heap
page read and write
3AA67E000
stack
page read and write
1D673D89000
heap
page read and write
1B6CA7E000
stack
page read and write
B89A1FE000
stack
page read and write
20DE2829000
heap
page read and write
492EC7F000
stack
page read and write
29A36DE0000
remote allocation
page read and write
5EB000
heap
page read and write
25731C29000
heap
page read and write
5EB000
heap
page read and write
B89A2FE000
stack
page read and write
1D673D4E000
heap
page read and write
1D673D6E000
heap
page read and write
1CD8CA00000
heap
page read and write
AB55DFF000
stack
page read and write
28650720000
heap
page read and write
2203C629000
heap
page read and write
1D6734BF000
heap
page read and write
5EB000
heap
page read and write
1801A110000
trusted library allocation
page read and write
60B000
heap
page read and write
54AE07F000
stack
page read and write
5F1000
heap
page read and write
20DE2840000
heap
page read and write
2203CE02000
trusted library allocation
page read and write
1CD8D623000
heap
page read and write
241F000
stack
page read and write
1CDE2D08000
heap
page read and write
CB1CC7D000
stack
page read and write
3AA3FC000
stack
page read and write
1D673D27000
heap
page read and write
3F63D7F000
stack
page read and write
16F60E40000
heap
page read and write
5EB000
heap
page read and write
1D673D42000
heap
page read and write
1D673D1B000
heap
page read and write
60B000
heap
page read and write
1D6734BF000
heap
page read and write
29A35518000
heap
page read and write
2203C63C000
heap
page read and write
5C8D67A000
stack
page read and write
1D673D9C000
heap
page read and write
25731C77000
heap
page read and write
2953000
trusted library allocation
page read and write
3F63BF9000
stack
page read and write
1D673D36000
heap
page read and write
1D673D1D000
heap
page read and write
5B8000
heap
page read and write
20DE284E000
heap
page read and write
5DC000
heap
page read and write
5E0000
heap
page read and write
1D673D27000
heap
page read and write
2203C651000
heap
page read and write
85C7CFC000
stack
page read and write
1D673D8B000
heap
page read and write
29A35513000
heap
page read and write
1D673D8C000
heap
page read and write
1D673D9E000
heap
page read and write
1D673D1D000
heap
page read and write
1D673D85000
heap
page read and write
60B000
heap
page read and write
3F63AFF000
stack
page read and write
20DE2826000
heap
page read and write
1CDE33C0000
trusted library allocation
page read and write
16F6107F000
heap
page read and write
85C737E000
stack
page read and write
1CDE2AB0000
heap
page read and write
1D673451000
heap
page read and write
1CD8D322000
heap
page read and write
1801A231000
heap
page read and write
1CDE3402000
trusted library allocation
page read and write
1B25F813000
heap
page read and write
60B000
heap
page read and write
492EE7B000
stack
page read and write
2203C659000
heap
page read and write
1CD8CA70000
heap
page read and write
5F5000
heap
page read and write
20DE2630000
heap
page read and write
1D673D4E000
heap
page read and write
286507B0000
trusted library allocation
page read and write
1801A213000
heap
page read and write
85C72FC000
stack
page read and write
1B25F829000
heap
page read and write
1D673D4E000
heap
page read and write
1CDE2D13000
heap
page read and write
1CD8D36F000
heap
page read and write
2203C668000
heap
page read and write
2950000
trusted library allocation
page read and write
1D6734A8000
heap
page read and write
29A35413000
heap
page read and write
5C8D47E000
stack
page read and write
5EB000
heap
page read and write
5E0000
heap
page read and write
295D000
trusted library allocation
page read and write
29A35400000
heap
page read and write
1D673D18000
heap
page read and write
92DB16E000
stack
page read and write
1CDE2D02000
heap
page read and write
1D673D36000
heap
page read and write
1D673D27000
heap
page read and write
1801A223000
heap
page read and write
1B6CCFE000
stack
page read and write
2203C510000
trusted library allocation
page read and write
1801A010000
heap
page read and write
AB55CFF000
stack
page read and write
28650802000
heap
page read and write
29A35448000
heap
page read and write
5E0000
heap
page read and write
2203C653000
heap
page read and write
92DB0EC000
stack
page read and write
3A9FFC000
stack
page read and write
401000
unkown
page execute read
1D673D86000
heap
page read and write
1D673D93000
heap
page read and write
2500000
heap
page read and write
5F5000
heap
page read and write
40A000
unkown
page read and write
1CD8D322000
heap
page read and write
29A35230000
heap
page read and write
28650864000
heap
page read and write
194209F9000
heap
page read and write
5E0000
heap
page read and write
19420A0C000
heap
page read and write
1CD8CA13000
heap
page read and write
19420A0F000
heap
page read and write
1B25F7B0000
trusted library allocation
page read and write
29A35458000
heap
page read and write
92DB97E000
stack
page read and write
54AD5BB000
stack
page read and write
6F561000
unkown
page execute read
1D673D4C000
heap
page read and write
3F63A7A000
stack
page read and write
60B000
heap
page read and write
16F610CB000
heap
page read and write
5F1000
heap
page read and write
20DE2800000
heap
page read and write
1D673D8F000
heap
page read and write
2203C67B000
heap
page read and write
1B6CB7D000
stack
page read and write
1801A252000
heap
page read and write
20DE285C000
heap
page read and write
16F6106D000
heap
page read and write
194208E0000
heap
page read and write
1B6C77C000
stack
page read and write
1D673D91000
heap
page read and write
5EB000
heap
page read and write
16F6103E000
heap
page read and write
5F1000
heap
page read and write
AB558FF000
stack
page read and write
492F17F000
stack
page read and write
28650900000
heap
page read and write
5EB000
heap
page read and write
5F5000
heap
page read and write
16F61088000
heap
page read and write
295A000
trusted library allocation
page read and write
19420C95000
heap
page read and write
2203C65A000
heap
page read and write
5E0000
heap
page read and write
295A000
trusted library allocation
page read and write
92DBA7E000
stack
page read and write
1801A229000
heap
page read and write
1D673481000
heap
page read and write
1D673D5C000
heap
page read and write
30000
heap
page read and write
5F5000
heap
page read and write
1CD8CB8E000
heap
page read and write
1D673D8B000
heap
page read and write
1B25F640000
heap
page read and write
AB55FFE000
stack
page read and write
1D6734A7000
heap
page read and write
228E000
stack
page read and write
1D673D91000
heap
page read and write
16F60DE0000
heap
page read and write
1D673508000
heap
page read and write
1D674140000
remote allocation
page read and write
1D673D8B000
heap
page read and write
29A35330000
trusted library allocation
page read and write
1D673D67000
heap
page read and write
1CDE2C56000
heap
page read and write
5EB000
heap
page read and write
5F5000
heap
page read and write
29A35458000
heap
page read and write
1CD8D302000
heap
page read and write
29A35402000
heap
page read and write
5EB000
heap
page read and write
1D673D85000
heap
page read and write
1CDE2C4C000
heap
page read and write
295D000
trusted library allocation
page read and write
1D673D6B000
heap
page read and write
20DE283B000
heap
page read and write
5F1000
heap
page read and write
5F1000
heap
page read and write
5E0000
heap
page read and write
1CD8C8A0000
heap
page read and write
AB55BFD000
stack
page read and write
1CD8CA52000
heap
page read and write
1801A23A000
heap
page read and write
1D673D27000
heap
page read and write
19420C90000
heap
page read and write
1CD8CA29000
heap
page read and write
2316000
heap
page read and write
CD25A7F000
stack
page read and write
16F61113000
heap
page read and write
20DE285F000
heap
page read and write
5F5000
heap
page read and write
408000
unkown
page readonly
1D673D91000
heap
page read and write
1D673D22000
heap
page read and write
16F610E3000
heap
page read and write
19420A12000
heap
page read and write
2203C649000
heap
page read and write
20DE2842000
heap
page read and write
1D6734E7000
heap
page read and write
CD2577B000
stack
page read and write
CD2547B000
stack
page read and write
3AA87E000
stack
page read and write
20DE2844000
heap
page read and write
85C7A7E000
stack
page read and write
459000
unkown
page readonly
2203C648000
heap
page read and write
2203C655000
heap
page read and write
492F07F000
stack
page read and write
1D673D27000
heap
page read and write
29A3543D000
heap
page read and write
60B000
heap
page read and write
20DE286B000
heap
page read and write
1B260002000
trusted library allocation
page read and write
AB553DC000
stack
page read and write
20DE287E000
heap
page read and write
5EB000
heap
page read and write
25731C5B000
heap
page read and write
1CDE2C13000
heap
page read and write
1B25F7E0000
remote allocation
page read and write
6F565000
unkown
page readonly
1D673D4E000
heap
page read and write
1CD8D613000
heap
page read and write
20DE2902000
heap
page read and write
5B0000
heap
page read and write
19420A01000
heap
page read and write
1D673D31000
heap
page read and write
28650780000
heap
page read and write
1CD8CB13000
heap
page read and write
1CDE2C86000
heap
page read and write
1CD8D1D0000
trusted library allocation
page read and write
1CDE2C4F000
heap
page read and write
1D673D5B000
heap
page read and write
400000
unkown
page readonly
19420A01000
heap
page read and write
3AA1FB000
stack
page read and write
54ADD7E000
stack
page read and write
20DE2856000
heap
page read and write
1CD8D627000
heap
page read and write
400000
unkown
page readonly
20DE287A000
heap
page read and write
1CD8CA92000
heap
page read and write
5C8D579000
stack
page read and write
1CDE2C52000
heap
page read and write
92DB6F7000
stack
page read and write
16F60F40000
trusted library allocation
page read and write
194209D0000
heap
page read and write
CD2597E000
stack
page read and write
20DE2857000
heap
page read and write
18019FB0000
heap
page read and write
29A35448000
heap
page read and write
194209E2000
heap
page read and write
5E0000
heap
page read and write
1CD8C910000
heap
page read and write
28650800000
heap
page read and write
29A35502000
heap
page read and write
1D673D27000
heap
page read and write
29A35447000
heap
page read and write
1CD8CA3C000
heap
page read and write
1CDE2C7C000
heap
page read and write
22D0000
heap
page read and write
20DE2730000
trusted library allocation
page read and write
1CD8CBE5000
heap
page read and write
2310000
heap
page read and write
28650868000
heap
page read and write
16F610BA000
heap
page read and write
25731C3D000
heap
page read and write
20DE2860000
heap
page read and write
1CDE2C53000
heap
page read and write
435000
unkown
page read and write
6F560000
unkown
page readonly
AB559FB000
stack
page read and write
1D67344F000
heap
page read and write
3F63C7A000
stack
page read and write
18019FC0000
heap
page read and write
2203C668000
heap
page read and write
295B000
trusted library allocation
page read and write
1CD8D300000
heap
page read and write
60B000
heap
page read and write
5EB000
heap
page read and write
1D673DA3000
heap
page read and write
5E0000
heap
page read and write
1CD8D354000
heap
page read and write
1801A258000
heap
page read and write
16F610EA000
heap
page read and write
295C000
trusted library allocation
page read and write
5E0000
heap
page read and write
5E0000
heap
page read and write
20DE2845000
heap
page read and write
20DE2858000
heap
page read and write
408000
unkown
page readonly
2203C3B0000
heap
page read and write
5F1000
heap
page read and write
5F5000
heap
page read and write
B899D4B000
stack
page read and write
2203C685000
heap
page read and write
B89A17E000
stack
page read and write
1D673D85000
heap
page read and write
1D673D85000
heap
page read and write
85C7BFE000
stack
page read and write
19420A0F000
heap
page read and write
6F563000
unkown
page readonly
1CDE2B20000
heap
page read and write
25731D13000
heap
page read and write
16F61900000
heap
page read and write
1B25F7E0000
remote allocation
page read and write
5F1000
heap
page read and write
29A35471000
heap
page read and write
3F63B7F000
stack
page read and write
1D673D80000
heap
page read and write
1D6734B2000
heap
page read and write
3170000
trusted library allocation
page read and write
29A351D0000
heap
page read and write
16F61023000
heap
page read and write
1CD8CA86000
heap
page read and write
A30000
trusted library allocation
page read and write
194209E7000
heap
page read and write
1801A23C000
heap
page read and write
1D67344C000
heap
page read and write
1D673D5B000
heap
page read and write
2203C713000
heap
page read and write
19A000
stack
page read and write
54ADBFB000
stack
page read and write
16F610C1000
heap
page read and write
1D673D74000
heap
page read and write
42C000
unkown
page read and write
1D6734EA000
heap
page read and write
1D673D1C000
heap
page read and write
1D673D85000
heap
page read and write
194207B0000
heap
page read and write
B89A3FE000
stack
page read and write
5EB000
heap
page read and write
1CDE2C70000
heap
page read and write
2203C650000
heap
page read and write
2865083C000
heap
page read and write
1B25F7E0000
remote allocation
page read and write
1D673D8C000
heap
page read and write
224E000
stack
page read and write
1D673D4C000
heap
page read and write
5EB000
heap
page read and write
20DE2832000
heap
page read and write
5EB000
heap
page read and write
60B000
heap
page read and write
3AA77C000
stack
page read and write
28650710000
heap
page read and write
194209DB000
heap
page read and write
1B25F802000
heap
page read and write
194209E6000
heap
page read and write
1D673D4C000
heap
page read and write
1CD8D1B0000
trusted library allocation
page read and write
492EF77000
stack
page read and write
16F61102000
heap
page read and write
28650879000
heap
page read and write
54ADF7F000
stack
page read and write
5F1000
heap
page read and write
29A36DE0000
remote allocation
page read and write
20DE25D0000
heap
page read and write
60B000
heap
page read and write
1CDE2C2A000
heap
page read and write
25731B80000
trusted library allocation
page read and write
20DE2884000
heap
page read and write
CB1C87F000
stack
page read and write
1D673D8B000
heap
page read and write
1CD8CA90000
heap
page read and write
1D673D9C000
heap
page read and write
1CD8CA73000
heap
page read and write
1D673230000
heap
page read and write
1CDE2C3C000
heap
page read and write
2203C708000
heap
page read and write
2956000
trusted library allocation
page read and write
20DE2813000
heap
page read and write
85C7DF8000
stack
page read and write
1CD8D392000
heap
page read and write
5F5000
heap
page read and write
25731AE0000
heap
page read and write
16F610E8000
heap
page read and write
1D673D27000
heap
page read and write
1D673502000
heap
page read and write
60B000
heap
page read and write
1CDE2C8C000
heap
page read and write
28651202000
trusted library allocation
page read and write
1CDE2AC0000
heap
page read and write
1B25F85C000
heap
page read and write
29A36E02000
trusted library allocation
page read and write
5F5000
heap
page read and write
1CD8D202000
heap
page read and write
85C7B78000
stack
page read and write
5E0000
heap
page read and write
1D6732A0000
heap
page read and write
1D673D91000
heap
page read and write
29A3542A000
heap
page read and write
29A35350000
trusted library allocation
page read and write
19420900000
heap
page read and write
5F1000
heap
page read and write
20DE2848000
heap
page read and write
25731D02000
heap
page read and write
28650902000
heap
page read and write
60B000
heap
page read and write
2956000
trusted library allocation
page read and write
3F63CFF000
stack
page read and write
1CD8D3C9000
heap
page read and write
28650857000
heap
page read and write
427000
unkown
page read and write
29A35380000
trusted library allocation
page read and write
383E000
stack
page read and write
29A35457000
heap
page read and write
5F1000
heap
page read and write
19420A0F000
heap
page read and write
4D0000
heap
page read and write
B899DCE000
stack
page read and write
1D67343C000
heap
page read and write
1D673D5B000
heap
page read and write
2951000
trusted library allocation
page read and write
3A9F7F000
stack
page read and write
85C76FB000
stack
page read and write
459000
unkown
page readonly
294F000
stack
page read and write
25731C67000
heap
page read and write
1CDE2C00000
heap
page read and write
1D673D48000
heap
page read and write
3AA47B000
stack
page read and write
60B000
heap
page read and write
1CDE2D00000
heap
page read and write
CB1C4FD000
stack
page read and write
1D673D91000
heap
page read and write
2203C64E000
heap
page read and write
1D673462000
heap
page read and write
92DB77F000
stack
page read and write
5E0000
heap
page read and write
85C77F7000
stack
page read and write
20DE283D000
heap
page read and write
92DB1EE000
stack
page read and write
60B000
heap
page read and write
2203C613000
heap
page read and write
1B25F840000
heap
page read and write
1B25F823000
heap
page read and write
1CD8CA7D000
heap
page read and write
CB1CA7C000
stack
page read and write
20DE2862000
heap
page read and write
1B6C28B000
stack
page read and write
1CD8D3BD000
heap
page read and write
1D673516000
heap
page read and write
54ADFFE000
stack
page read and write
25731C75000
heap
page read and write
1B25F902000
heap
page read and write
5C8D77F000
stack
page read and write
1D673400000
heap
page read and write
29A35489000
heap
page read and write
5F1000
heap
page read and write
There are 620 hidden memdumps, click here to show them.