IOC Report
U9M1w8FHBW.exe

loading gif

Files

File Path
Type
Category
Malicious
U9M1w8FHBW.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\U9M1w8FHBW.dll"
malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\U9M1w8FHBW.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\U9M1w8FHBW.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\U9M1w8FHBW.dll,DllRegisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\DChihhZAEIop\NZICbhYKmnAVT.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\YKYTbOgY\pyluVjQOzYMsbAJk.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\DahdrCXRHjoqlqPu\vvcfbAnuZpuTsj.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AvyZUmIIeGJLvcye\aPdTkvBLdrznCXG.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\DChihhZAEIop\NZICbhYKmnAVT.dll
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\OQOuTpy\WqdnfVdfYCxIlc.dll"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\U9M1w8FHBW.dll",#1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://172.105.115.71:8080/cwaajpktaow/wluuqgbutatftfws/jndwc/hjilgypgsuce/
unknown
https://172.105.115.71:8080/s.dll6
unknown

IPs

IP
Domain
Country
Malicious
172.105.115.71
unknown
United States
malicious
188.165.79.151
unknown
France
malicious
196.44.98.190
unknown
Ghana
malicious
174.138.33.49
unknown
United States
malicious
36.67.23.59
unknown
Indonesia
malicious
103.41.204.169
unknown
Indonesia
malicious
85.214.67.203
unknown
Germany
malicious
83.229.80.93
unknown
United Kingdom
malicious
198.199.70.22
unknown
United States
malicious
93.104.209.107
unknown
Germany
malicious
186.250.48.5
unknown
Brazil
malicious
209.239.112.82
unknown
United States
malicious
175.126.176.79
unknown
Korea Republic of
malicious
128.199.242.164
unknown
United Kingdom
malicious
178.238.225.252
unknown
Germany
malicious
46.101.98.60
unknown
Netherlands
malicious
190.145.8.4
unknown
Colombia
malicious
82.98.180.154
unknown
Spain
malicious
103.71.99.57
unknown
India
malicious
87.106.97.83
unknown
Germany
malicious
103.254.12.236
unknown
Viet Nam
malicious
103.85.95.4
unknown
Indonesia
malicious
202.134.4.210
unknown
Indonesia
malicious
165.22.254.236
unknown
United States
malicious
78.47.204.80
unknown
Germany
malicious
118.98.72.86
unknown
Indonesia
malicious
139.59.80.108
unknown
Singapore
malicious
104.244.79.94
unknown
United States
malicious
37.44.244.177
unknown
Germany
malicious
51.75.33.122
unknown
France
malicious
160.16.143.191
unknown
Japan
malicious
103.56.149.105
unknown
Indonesia
malicious
85.25.120.45
unknown
Germany
malicious
139.196.72.155
unknown
China
malicious
115.178.55.22
unknown
Indonesia
malicious
103.126.216.86
unknown
Bangladesh
malicious
128.199.217.206
unknown
United Kingdom
malicious
114.79.130.68
unknown
India
malicious
103.224.241.74
unknown
India
malicious
210.57.209.142
unknown
Indonesia
malicious
202.28.34.99
unknown
Thailand
malicious
80.211.107.116
unknown
Italy
malicious
54.37.228.122
unknown
France
malicious
218.38.121.17
unknown
Korea Republic of
malicious
185.148.169.10
unknown
Germany
malicious
195.77.239.39
unknown
Spain
malicious
178.62.112.199
unknown
European Union
malicious
62.171.178.147
unknown
United Kingdom
malicious
64.227.55.231
unknown
United States
malicious
There are 39 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
NZICbhYKmnAVT.dll
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1040000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
C70000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
2080000
direct allocation
page execute and read and write
malicious
188495D0000
direct allocation
page execute and read and write
malicious
2A683620000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
2735FB40000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
1106000
heap
page read and write
12D0000
remote allocation
page read and write
18181B70000
trusted library allocation
page read and write
117E000
heap
page read and write
1249EC60000
heap
page read and write
1CA61040000
heap
page read and write
180F89D0000
trusted library allocation
page read and write
10CC000
heap
page read and write
18847B99000
heap
page read and write
1249EE56000
heap
page read and write
1010000
heap
page read and write
2B4A000
heap
page read and write
7FFD146DE000
unkown
page read and write
50F000
heap
page read and write
7FFD146E2000
unkown
page readonly
1249EE6B000
heap
page read and write
2B3B000
heap
page read and write
2735FBA6000
heap
page read and write
180F8A3E000
heap
page read and write
25E2F7F0000
trusted library allocation
page read and write
18181C3C000
heap
page read and write
D4A000
heap
page read and write
25E2F902000
heap
page read and write
180000000
direct allocation
page read and write
1114000
heap
page read and write
18182522000
heap
page read and write
7FFD14660000
unkown
page readonly
547000
heap
page read and write
1F60000
heap
page readonly
18849600000
direct allocation
page execute and read and write
D19000
heap
page read and write
18847BB7000
heap
page read and write
BAA19FE000
stack
page read and write
7FFD146E7000
unkown
page readonly
1249EE60000
heap
page read and write
BD5000
heap
page read and write
2735FBC9000
heap
page read and write
CCA767B000
stack
page read and write
18181C65000
heap
page read and write
181825BC000
heap
page read and write
11DD000
heap
page read and write
1249EE47000
heap
page read and write
21A9000
stack
page read and write
BAA1B7F000
stack
page read and write
910000
heap
page read and write
1249EE77000
heap
page read and write
1249EE63000
heap
page read and write
1172000
heap
page read and write
A10000
heap
page read and write
18002C000
direct allocation
page read and write
180F9300000
heap
page read and write
10CD000
heap
page read and write
10AD000
heap
page read and write
749000
stack
page read and write
33FC000
heap
page read and write
E05000
heap
page read and write
7FFD146E7000
unkown
page readonly
D37000
heap
page read and write
1025000
heap
page read and write
2CAE0FF0000
heap
page read and write
18847D20000
heap
page read and write
1249EE65000
heap
page read and write
92A53F9000
stack
page read and write
2B49000
heap
page read and write
BF21BF7000
stack
page read and write
2A683735000
heap
page read and write
7FFD146E2000
unkown
page readonly
1016000
heap
page read and write
55E000
heap
page read and write
18849710000
trusted library allocation
page read and write
C10000
heap
page read and write
25E2F802000
heap
page read and write
D7636FE000
stack
page read and write
1249EE7E000
heap
page read and write
10F0000
heap
page read and write
18002B000
direct allocation
page readonly
1026000
heap
page read and write
180F8AE2000
heap
page read and write
770000
remote allocation
page read and write
D09000
heap
page read and write
10AD000
heap
page read and write
18002C000
direct allocation
page read and write
7FFD14698000
unkown
page readonly
547000
heap
page read and write
18181DE6000
heap
page read and write
18182600000
heap
page read and write
BF21B7E000
stack
page read and write
BDC000
heap
page read and write
2A683713000
heap
page read and write
1E5B57F000
stack
page read and write
2B47000
heap
page read and write
D2A000
heap
page read and write
2C8E000
stack
page read and write
5370000
trusted library allocation
page read and write
2735FBC9000
heap
page read and write
180F8A88000
heap
page read and write
25E2F852000
heap
page read and write
18002B000
direct allocation
page readonly
1249EE40000
heap
page read and write
18182543000
heap
page read and write
1249EE7B000
heap
page read and write
2A685205000
heap
page read and write
59B000
heap
page read and write
FF8000
heap
page read and write
18847E20000
heap
page read and write
EA5000
heap
page read and write
EA0000
heap
page read and write
2A683762000
heap
page read and write
180000000
direct allocation
page read and write
32B0000
heap
page read and write
2A6835F0000
heap
page read and write
116F000
heap
page read and write
10C6000
heap
page read and write
2A09BC000
stack
page read and write
D19000
heap
page read and write
1CA61029000
heap
page read and write
1E5AC7B000
stack
page read and write
1249EE6D000
heap
page read and write
2735FDC0000
heap
page read and write
530000
heap
page read and write
180F8AE7000
heap
page read and write
1249F602000
trusted library allocation
page read and write
117E000
heap
page read and write
810000
remote allocation
page read and write
4E77BCF000
stack
page read and write
3261000
heap
page read and write
D38000
heap
page read and write
480000
heap
page read and write
2CAE1313000
heap
page read and write
A26000
heap
page read and write
BF21CFF000
stack
page read and write
18181D13000
heap
page read and write
1106000
heap
page read and write
1080000
heap
page read and write
1249EE84000
heap
page read and write
AF0000
remote allocation
page read and write
18847B69000
heap
page read and write
1249EE62000
heap
page read and write
4810000
heap
page read and write
10F5000
heap
page read and write
12E5000
heap
page read and write
1088000
heap
page read and write
1114000
heap
page read and write
1025000
heap
page read and write
5D00000
heap
page read and write
13DC000
heap
page read and write
18847BDC000
heap
page read and write
810000
remote allocation
page read and write
1CA618B0000
remote allocation
page read and write
7FFD146E2000
unkown
page readonly
181825B0000
heap
page read and write
2A683747000
heap
page read and write
7FFD146E7000
unkown
page readonly
DD0000
heap
page read and write
12D0000
remote allocation
page read and write
4E77B4F000
stack
page read and write
10C8000
heap
page read and write
2735FD90000
trusted library allocation
page read and write
2CAE123C000
heap
page read and write
A40000
heap
page read and write
180F8ABA000
heap
page read and write
D4A000
heap
page read and write
10BE000
heap
page read and write
10F5000
heap
page read and write
F0C000
heap
page read and write
18847A70000
heap
page read and write
4E77ACC000
stack
page read and write
2735FBB5000
heap
page read and write
18847BB9000
heap
page read and write
2CAE1213000
heap
page read and write
18002C000
direct allocation
page read and write
D30000
heap
page read and write
E4967E000
stack
page read and write
B9D000
heap
page read and write
1F50000
direct allocation
page execute and read and write
180F8ACB000
heap
page read and write
2B3B000
heap
page read and write
7FFD14660000
unkown
page readonly
7FFD146E5000
unkown
page readonly
1157000
heap
page read and write
11D6000
heap
page read and write
18181C87000
heap
page read and write
10CC000
heap
page read and write
180F9202000
heap
page read and write
1249EC00000
heap
page read and write
13D5000
heap
page read and write
111D000
heap
page read and write
5EA000
stack
page read and write
1249EE59000
heap
page read and write
11B0000
heap
page read and write
58E0000
trusted library allocation
page read and write
BF217AC000
stack
page read and write
117E000
heap
page read and write
1E5B47E000
stack
page read and write
25E30202000
trusted library allocation
page read and write
180000000
direct allocation
page read and write
1249EE5A000
heap
page read and write
5500000
trusted library allocation
page read and write
2735FD40000
direct allocation
page execute and read and write
FD0000
heap
page read and write
547000
heap
page read and write
1CA60F70000
heap
page read and write
18002C000
direct allocation
page read and write
7FFD146E5000
unkown
page readonly
10CC000
heap
page read and write
18847B6F000
heap
page read and write
18002D000
direct allocation
page readonly
1175000
heap
page read and write
304C000
stack
page read and write
BA5000
heap
page read and write
2A0E7E000
stack
page read and write
E00000
heap
page read and write
18181C78000
heap
page read and write
4EB000
heap
page read and write
E497FD000
stack
page read and write
BAA16FC000
stack
page read and write
18181C75000
heap
page read and write
18847BA7000
heap
page read and write
2735FB8F000
heap
page read and write
18182628000
heap
page read and write
AF0000
remote allocation
page read and write
2AED000
heap
page read and write
11B8000
heap
page read and write
11FB000
heap
page read and write
18847B71000
heap
page read and write
7FFD146E5000
unkown
page readonly
10E7000
heap
page read and write
2CAE1270000
heap
page read and write
7FFD14660000
unkown
page readonly
18182511000
heap
page read and write
2A80000
heap
page read and write
92A50FA000
stack
page read and write
7FFD146E2000
unkown
page readonly
92A4BCB000
stack
page read and write
2CAE122A000
heap
page read and write
11FB000
heap
page read and write
2CAE1060000
heap
page read and write
18182522000
heap
page read and write
18847B6E000
heap
page read and write
BA5000
heap
page read and write
D7634FC000
stack
page read and write
2C0C000
stack
page read and write
7FFD14661000
unkown
page execute read
1F4F000
stack
page read and write
18181DBA000
heap
page read and write
25E2F843000
heap
page read and write
116F000
heap
page read and write
2A6856F0000
heap
page read and write
7FFD146DE000
unkown
page read and write
10C5000
heap
page read and write
18849610000
heap
page readonly
1249EE4D000
heap
page read and write
18002C000
direct allocation
page read and write
18181C43000
heap
page read and write
2A683728000
heap
page read and write
18181B90000
trusted library allocation
page read and write
E496FC000
stack
page read and write
11E5000
heap
page read and write
2A683774000
heap
page read and write
10CC000
heap
page read and write
1000000
heap
page read and write
4E77E7E000
stack
page read and write
18847BC2000
heap
page read and write
1CA61002000
heap
page read and write
18181C90000
heap
page read and write
18182623000
heap
page read and write
116F000
heap
page read and write
26D0000
heap
page read and write
18002D000
direct allocation
page readonly
18182602000
heap
page read and write
2735FB78000
heap
page read and write
2735FBA0000
heap
page read and write
10D6000
heap
page read and write
D5C000
heap
page read and write
ECE000
stack
page read and write
116F000
heap
page read and write
1CA61024000
heap
page read and write
117E000
heap
page read and write
7FFD14698000
unkown
page readonly
18849800000
heap
page read and write
FF0000
heap
page read and write
566000
heap
page read and write
284E000
stack
page read and write
10DD000
heap
page read and write
7FFD14660000
unkown
page readonly
D7639FE000
stack
page read and write
1CA60FE0000
heap
page read and write
18181C6F000
heap
page read and write
25E2F846000
heap
page read and write
E49B7C000
stack
page read and write
24D0000
heap
page read and write
25E2F7C0000
heap
page read and write
1114000
heap
page read and write
18181C13000
heap
page read and write
7FFD14661000
unkown
page execute read
18182513000
heap
page read and write
11DD000
heap
page read and write
4C0000
heap
page read and write
BAA147B000
stack
page read and write
2A683700000
heap
page read and write
D19000
heap
page read and write
2C8B000
stack
page read and write
1CA60F80000
heap
page read and write
7FFD14661000
unkown
page execute read
2735FA60000
heap
page read and write
2AEE000
heap
page read and write
BAA177E000
stack
page read and write
1249EE41000
heap
page read and write
E49A7E000
stack
page read and write
2A683739000
heap
page read and write
A25000
heap
page read and write
D7638F9000
stack
page read and write
BAA1AFD000
stack
page read and write
5B70000
heap
page read and write
E00000
heap
page read and write
7FFD14698000
unkown
page readonly
180000000
direct allocation
page read and write
18002B000
direct allocation
page readonly
B8F000
heap
page read and write
1249EE3A000
heap
page read and write
11DD000
heap
page read and write
9EF000
stack
page read and write
1157000
heap
page read and write
18182554000
heap
page read and write
180F8A13000
heap
page read and write
111D000
heap
page read and write
2A6834B0000
heap
page read and write
7FFD146E7000
unkown
page readonly
1249EE6A000
heap
page read and write
18181C57000
heap
page read and write
BF21C7C000
stack
page read and write
780000
heap
page read and write
11E5000
heap
page read and write
10F0000
heap
page read and write
E4997D000
stack
page read and write
D7635FE000
stack
page read and write
1E5B4FF000
stack
page read and write
7FFD14698000
unkown
page readonly
E49C7E000
stack
page read and write
18002D000
direct allocation
page readonly
CCA727C000
stack
page read and write
690000
heap
page read and write
2CAE1259000
heap
page read and write
139D000
stack
page read and write
18182631000
heap
page read and write
1CA61051000
heap
page read and write
2A68371D000
heap
page read and write
18847B99000
heap
page read and write
B5E000
stack
page read and write
A25000
heap
page read and write
B70000
heap
page read and write
2735FBC6000
heap
page read and write
180F8A70000
heap
page read and write
578000
heap
page read and write
BD0000
heap
page read and write
4C5000
heap
page read and write
BF21A7F000
stack
page read and write
2B0B000
heap
page read and write
2EC0000
heap
page read and write
2CAE1160000
trusted library allocation
page read and write
1F70000
heap
page read and write
A25000
heap
page read and write
1249EE55000
heap
page read and write
10D6000
heap
page read and write
547000
heap
page read and write
2B47000
heap
page read and write
1249EE57000
heap
page read and write
CCA787D000
stack
page read and write
E40000
trusted library allocation
page read and write
2500000
heap
page read and write
1114000
heap
page read and write
1114000
heap
page read and write
10F6000
heap
page read and write
4E77EF9000
stack
page read and write
2A683735000
heap
page read and write
2735FB8F000
heap
page read and write
4E77F7E000
stack
page read and write
CCA7A7E000
stack
page read and write
1CA61880000
trusted library allocation
page read and write
D6D000
heap
page read and write
101D000
heap
page read and write
10F9000
heap
page read and write
840000
heap
page read and write
31EF000
stack
page read and write
1E5B0FB000
stack
page read and write
10BB000
heap
page read and write
1310000
heap
page read and write
10BE000
heap
page read and write
2735FB8F000
heap
page read and write
7FFD146DE000
unkown
page read and write
1200000
heap
page readonly
CCA7D7E000
stack
page read and write
2A684FA0000
heap
page read and write
10B0000
heap
page read and write
1114000
heap
page read and write
58A000
heap
page read and write
E80000
heap
page read and write
18181C91000
heap
page read and write
2A107F000
stack
page read and write
30CC000
stack
page read and write
7FFD14660000
unkown
page readonly
D27000
heap
page read and write
11E6000
heap
page read and write
170000
heap
page read and write
18182508000
heap
page read and write
A1D000
heap
page read and write
2230000
trusted library allocation
page read and write
1249EE13000
heap
page read and write
10CC000
heap
page read and write
E4957E000
stack
page read and write
60E0000
heap
page read and write
1249EE31000
heap
page read and write
2AC9000
heap
page read and write
7FFD146E7000
unkown
page readonly
7FFD14661000
unkown
page execute read
CCA7C7F000
stack
page read and write
10C5000
heap
page read and write
117E000
heap
page read and write
273617B0000
heap
page read and write
1025000
heap
page read and write
11D0000
heap
page read and write
F05000
heap
page read and write
18002D000
direct allocation
page readonly
BAA197D000
stack
page read and write
18181A70000
heap
page read and write
CA0000
direct allocation
page execute and read and write
2503000
heap
page read and write
101D000
heap
page read and write
2CAE1202000
heap
page read and write
BA6000
heap
page read and write
A21000
heap
page read and write
1240000
heap
page read and write
E493FB000
stack
page read and write
DD0000
heap
page read and write
1818256D000
heap
page read and write
1CA61013000
heap
page read and write
315B000
stack
page read and write
18002B000
direct allocation
page readonly
1CA618B0000
remote allocation
page read and write
4E0000
heap
page read and write
18002C000
direct allocation
page read and write
1168000
heap
page read and write
A1D000
heap
page read and write
2CAE1A02000
trusted library allocation
page read and write
2A683736000
heap
page read and write
CCB000
stack
page read and write
CB0000
heap
page read and write
1190000
heap
page read and write
578000
heap
page read and write
18181D8F000
heap
page read and write
B9D000
heap
page read and write
18182502000
heap
page read and write
7FFD146E5000
unkown
page readonly
18182613000
heap
page read and write
1E5B179000
stack
page read and write
C20000
heap
page read and write
18181C29000
heap
page read and write
12D0000
remote allocation
page read and write
2DAB000
stack
page read and write
E4987B000
stack
page read and write
47B000
stack
page read and write
7FFD146DE000
unkown
page read and write
CF0000
remote allocation
page read and write
BF21D7C000
stack
page read and write
2A0CFE000
stack
page read and write
25E2F800000
heap
page read and write
28C7000
stack
page read and write
A41000
heap
page read and write
1249EE3C000
heap
page read and write
180F8A00000
heap
page read and write
2735FD90000
trusted library allocation
page read and write
1F80000
heap
page read and write
E48FEB000
stack
page read and write
2736159C000
heap
page read and write
1157000
heap
page read and write
18849710000
trusted library allocation
page read and write
180F8AC9000
heap
page read and write
2B47000
heap
page read and write
18181A10000
heap
page read and write
F00000
heap
page read and write
18847B70000
heap
page read and write
CF0000
remote allocation
page read and write
1249EE26000
heap
page read and write
E0C000
heap
page read and write
7FFD146E2000
unkown
page readonly
1E5AFFF000
stack
page read and write
117E000
heap
page read and write
18847BB9000
heap
page read and write
180F933A000
heap
page read and write
18181C8A000
heap
page read and write
2735FBDB000
heap
page read and write
2CAE1287000
heap
page read and write
B95000
heap
page read and write
2A68373D000
heap
page read and write
2B4E000
heap
page read and write
1249EE00000
heap
page read and write
1CA61020000
heap
page read and write
770000
remote allocation
page read and write
180F8B13000
heap
page read and write
2735FBB9000
heap
page read and write
1CA61000000
heap
page read and write
18002B000
direct allocation
page readonly
18847BAA000
heap
page read and write
18002D000
direct allocation
page readonly
7F3000
heap
page read and write
25E2F837000
heap
page read and write
1220000
trusted library allocation
page read and write
565000
heap
page read and write
31F0000
heap
page read and write
1E5AE7A000
stack
page read and write
7FFD146DE000
unkown
page read and write
11FB000
heap
page read and write
18847B99000
heap
page read and write
10DE000
heap
page read and write
26CF000
stack
page read and write
D7637FE000
stack
page read and write
D38000
heap
page read and write
1106000
heap
page read and write
1CA618B0000
remote allocation
page read and write
CB8000
heap
page read and write
212D000
stack
page read and write
18002B000
direct allocation
page readonly
180F88D0000
heap
page read and write
18847E25000
heap
page read and write
109A000
stack
page read and write
2A83000
heap
page read and write
E40000
trusted library allocation
page read and write
1249EE58000
heap
page read and write
1313000
heap
page read and write
2A685200000
heap
page read and write
13D0000
heap
page read and write
180000000
direct allocation
page read and write
9F8000
heap
page read and write
18002D000
direct allocation
page readonly
111D000
heap
page read and write
10F6000
heap
page read and write
E30000
heap
page readonly
25E2F829000
heap
page read and write
101D000
heap
page read and write
3288000
heap
page read and write
180000000
direct allocation
page read and write
547000
heap
page read and write
9F0000
heap
page read and write
295F000
stack
page read and write
18182402000
heap
page read and write
1E5B27A000
stack
page read and write
18181C00000
heap
page read and write
2A117E000
stack
page read and write
18181C6C000
heap
page read and write
7FFD14661000
unkown
page execute read
7FFD146DE000
unkown
page read and write
180F8860000
heap
page read and write
2A68372E000
heap
page read and write
CCA7B7E000
stack
page read and write
B9D000
heap
page read and write
29DE000
stack
page read and write
8FB000
stack
page read and write
2A683730000
heap
page read and write
7FFD14698000
unkown
page readonly
2A683762000
heap
page read and write
2A683680000
trusted library allocation
page read and write
1CA61075000
heap
page read and write
25E2F813000
heap
page read and write
D19000
heap
page read and write
555000
heap
page read and write
180F8A2A000
heap
page read and write
566000
heap
page read and write
7FFD146E5000
unkown
page readonly
BF21AFF000
stack
page read and write
10F0000
heap
page read and write
2735FAD0000
heap
page read and write
7F0000
heap
page read and write
2A4E000
stack
page read and write
18847B48000
heap
page read and write
AC9000
stack
page read and write
7FFD146E2000
unkown
page readonly
5EC0000
trusted library allocation
page read and write
CE2000
heap
page read and write
18847B99000
heap
page read and write
A25000
heap
page read and write
2ABC000
heap
page read and write
10D6000
heap
page read and write
1249EE5E000
heap
page read and write
2CAE1200000
heap
page read and write
3261000
heap
page read and write
7FFD14698000
unkown
page readonly
18182500000
heap
page read and write
1070000
direct allocation
page execute and read and write
2735FDC5000
heap
page read and write
CCA757F000
stack
page read and write
2E4F000
stack
page read and write
18847BB0000
heap
page read and write
BD0000
heap
page read and write
536F000
stack
page read and write
2A684FCC000
heap
page read and write
2CAE1000000
heap
page read and write
7FFD14661000
unkown
page execute read
CCA797F000
stack
page read and write
2FD0000
trusted library allocation
page read and write
2D2F000
stack
page read and write
180F8AC1000
heap
page read and write
2B2E000
heap
page read and write
D19000
heap
page read and write
10D3000
heap
page read and write
10B0000
remote allocation
page read and write
110C000
heap
page read and write
CFA000
heap
page read and write
10B0000
remote allocation
page read and write
18847BCA000
heap
page read and write
1249EE7A000
heap
page read and write
180F9313000
heap
page read and write
18847AE0000
heap
page read and write
B78000
heap
page read and write
1E5B37E000
stack
page read and write
A1D000
heap
page read and write
10E7000
heap
page read and write
12E0000
heap
page read and write
1249EE29000
heap
page read and write
10AD000
heap
page read and write
1249ED60000
trusted library allocation
page read and write
180F8A23000
heap
page read and write
2A0F7E000
stack
page read and write
1249EBF0000
heap
page read and write
2735FD50000
heap
page readonly
1210000
trusted library allocation
page read and write
2CAE125B000
heap
page read and write
180F8870000
heap
page read and write
18847B77000
heap
page read and write
2B3B000
heap
page read and write
25E2F770000
heap
page read and write
10D6000
heap
page read and write
25E2F82F000
heap
page read and write
1249EE67000
heap
page read and write
7A0000
heap
page read and write
92A52FE000
stack
page read and write
18181A00000
heap
page read and write
1210000
trusted library allocation
page read and write
8F0000
heap
page read and write
2A683728000
heap
page read and write
CCA747B000
stack
page read and write
2CAE1302000
heap
page read and write
12B0000
heap
page read and write
18847B99000
heap
page read and write
D19000
heap
page read and write
2A683650000
direct allocation
page execute and read and write
7FFD14660000
unkown
page readonly
18847B40000
heap
page read and write
1E0000
heap
page read and write
92A51FF000
stack
page read and write
1157000
heap
page read and write
2EBE000
stack
page read and write
111D000
heap
page read and write
25E2F760000
heap
page read and write
2735FB70000
heap
page read and write
BA5000
heap
page read and write
7FFD146E7000
unkown
page readonly
116F000
heap
page read and write
2230000
trusted library allocation
page read and write
1106000
heap
page read and write
2A683660000
heap
page read and write
558000
heap
page read and write
10F0000
heap
page read and write
10C8000
heap
page read and write
117E000
heap
page read and write
2A0C7E000
stack
page read and write
2A90000
heap
page read and write
A16000
heap
page read and write
28C0000
heap
page read and write
547000
heap
page read and write
E2F000
stack
page read and write
2735FAF0000
heap
page read and write
A10000
heap
page read and write
10BA000
heap
page read and write
25E2F83C000
heap
page read and write
1CA61A02000
trusted library allocation
page read and write
116F000
heap
page read and write
1249EF02000
heap
page read and write
56F000
heap
page read and write
18847B00000
heap
page read and write
D41000
heap
page read and write
27361570000
heap
page read and write
18182592000
heap
page read and write
2B70000
heap
page read and write
C00000
heap
page read and write
11E5000
heap
page read and write
1249EE42000
heap
page read and write
18847B69000
heap
page read and write
1CA61102000
heap
page read and write
180F8B02000
heap
page read and write
2A683708000
heap
page read and write
1ECF000
stack
page read and write
7FFD146E5000
unkown
page readonly
2B2E000
heap
page read and write
222E000
stack
page read and write
2A683680000
trusted library allocation
page read and write
There are 697 hidden memdumps, click here to show them.