Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
U9M1w8FHBW.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\U9M1w8FHBW.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\U9M1w8FHBW.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\U9M1w8FHBW.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\U9M1w8FHBW.dll,DllRegisterServer
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\WRxgy\qtvnAcMlRvp.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PGSiUgwlRfXFiSpXn\loIGTpTFCkf.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\OFGaERpXgVdSBti\FPnTfFrwaToqIsch.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\JVTaKcz\aAjaNMMsWiQmy.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\PGSiUgwlRfXFiSpXn\loIGTpTFCkf.dll
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\GDjmYYTiXCunz\igKuzYeE.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\DChihhZAEIop\NZICbhYKmnAVT.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\YKYTbOgY\pyluVjQOzYMsbAJk.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\DahdrCXRHjoqlqPu\vvcfbAnuZpuTsj.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AvyZUmIIeGJLvcye\aPdTkvBLdrznCXG.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\DChihhZAEIop\NZICbhYKmnAVT.dll
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\OQOuTpy\WqdnfVdfYCxIlc.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\U9M1w8FHBW.dll",#1
|
There are 8 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://172.105.115.71:8080/zseolrnaqxs/
|
unknown
|
||
https://172.105.115.71:8080/s.dll3
|
unknown
|
||
http://ctl2.105.115.71:8080/
|
unknown
|
||
https://172.105.115.71:8080/cwaajpktaow/wluuqgbutatftfws/jndwc/hjilgypgsuce/
|
unknown
|
||
https://172.105.115.71:8080/s.dll6
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
windowsupdatebg.s.llnwi.net
|
95.140.236.0
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.105.115.71
|
unknown
|
United States
|
||
188.165.79.151
|
unknown
|
France
|
||
196.44.98.190
|
unknown
|
Ghana
|
||
174.138.33.49
|
unknown
|
United States
|
||
36.67.23.59
|
unknown
|
Indonesia
|
||
103.41.204.169
|
unknown
|
Indonesia
|
||
85.214.67.203
|
unknown
|
Germany
|
||
83.229.80.93
|
unknown
|
United Kingdom
|
||
198.199.70.22
|
unknown
|
United States
|
||
93.104.209.107
|
unknown
|
Germany
|
||
186.250.48.5
|
unknown
|
Brazil
|
||
209.239.112.82
|
unknown
|
United States
|
||
175.126.176.79
|
unknown
|
Korea Republic of
|
||
128.199.242.164
|
unknown
|
United Kingdom
|
||
178.238.225.252
|
unknown
|
Germany
|
||
46.101.98.60
|
unknown
|
Netherlands
|
||
190.145.8.4
|
unknown
|
Colombia
|
||
82.98.180.154
|
unknown
|
Spain
|
||
103.71.99.57
|
unknown
|
India
|
||
87.106.97.83
|
unknown
|
Germany
|
||
103.254.12.236
|
unknown
|
Viet Nam
|
||
103.85.95.4
|
unknown
|
Indonesia
|
||
202.134.4.210
|
unknown
|
Indonesia
|
||
165.22.254.236
|
unknown
|
United States
|
||
78.47.204.80
|
unknown
|
Germany
|
||
118.98.72.86
|
unknown
|
Indonesia
|
||
139.59.80.108
|
unknown
|
Singapore
|
||
104.244.79.94
|
unknown
|
United States
|
||
37.44.244.177
|
unknown
|
Germany
|
||
51.75.33.122
|
unknown
|
France
|
||
160.16.143.191
|
unknown
|
Japan
|
||
103.56.149.105
|
unknown
|
Indonesia
|
||
85.25.120.45
|
unknown
|
Germany
|
||
139.196.72.155
|
unknown
|
China
|
||
115.178.55.22
|
unknown
|
Indonesia
|
||
103.126.216.86
|
unknown
|
Bangladesh
|
||
128.199.217.206
|
unknown
|
United Kingdom
|
||
114.79.130.68
|
unknown
|
India
|
||
103.224.241.74
|
unknown
|
India
|
||
210.57.209.142
|
unknown
|
Indonesia
|
||
202.28.34.99
|
unknown
|
Thailand
|
||
80.211.107.116
|
unknown
|
Italy
|
||
54.37.228.122
|
unknown
|
France
|
||
218.38.121.17
|
unknown
|
Korea Republic of
|
||
185.148.169.10
|
unknown
|
Germany
|
||
195.77.239.39
|
unknown
|
Spain
|
||
178.62.112.199
|
unknown
|
European Union
|
||
62.171.178.147
|
unknown
|
United Kingdom
|
||
64.227.55.231
|
unknown
|
United States
|
There are 39 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
loIGTpTFCkf.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
NZICbhYKmnAVT.dll
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
EA0000
|
direct allocation
|
page execute and read and write
|
||
1410000
|
direct allocation
|
page execute and read and write
|
||
196250F0000
|
direct allocation
|
page execute and read and write
|
||
2F0BAF50000
|
direct allocation
|
page execute and read and write
|
||
2B90000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
2426C8D0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
457E000
|
stack
|
page read and write
|
||
16E49D13000
|
heap
|
page read and write
|
||
2AED000
|
heap
|
page read and write
|
||
211EE28B000
|
heap
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
1149000
|
heap
|
page read and write
|
||
2B47000
|
heap
|
page read and write
|
||
DB7000
|
heap
|
page read and write
|
||
15AC000
|
heap
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
1929D67A000
|
heap
|
page read and write
|
||
108F000
|
heap
|
page read and write
|
||
7FFD14660000
|
unkown
|
page readonly
|
||
18002C000
|
direct allocation
|
page read and write
|
||
1275000
|
heap
|
page read and write
|
||
1929D67B000
|
heap
|
page read and write
|
||
2F0BB00F000
|
heap
|
page read and write
|
||
1929D613000
|
heap
|
page read and write
|
||
2F0BB011000
|
heap
|
page read and write
|
||
22DBADD0000
|
trusted library allocation
|
page read and write
|
||
1305000
|
heap
|
page read and write
|
||
2426CBE0000
|
heap
|
page read and write
|
||
1164000
|
heap
|
page read and write
|
||
1929D550000
|
heap
|
page read and write
|
||
7FFD146E5000
|
unkown
|
page readonly
|
||
11C5000
|
heap
|
page read and write
|
||
2426C998000
|
heap
|
page read and write
|
||
1248000
|
heap
|
page read and write
|
||
11EB000
|
heap
|
page read and write
|
||
1929D659000
|
heap
|
page read and write
|
||
1929D67D000
|
heap
|
page read and write
|
||
2F0BAEB0000
|
heap
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
196251B5000
|
heap
|
page read and write
|
||
19625068000
|
heap
|
page read and write
|
||
CF2FDFF000
|
stack
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
115C000
|
heap
|
page read and write
|
||
67422FF000
|
stack
|
page read and write
|
||
2F0BAF90000
|
heap
|
page read and write
|
||
2F0BAFCB000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
2426C9A7000
|
heap
|
page read and write
|
||
FD78B3C000
|
stack
|
page read and write
|
||
2CBE9A02000
|
trusted library allocation
|
page read and write
|
||
FD797FE000
|
stack
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
2F0BAFF2000
|
heap
|
page read and write
|
||
384CF4C000
|
stack
|
page read and write
|
||
22DBAE59000
|
heap
|
page read and write
|
||
2B09000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
22DBAE5B000
|
heap
|
page read and write
|
||
1929D62E000
|
heap
|
page read and write
|
||
CF2FBFE000
|
stack
|
page read and write
|
||
21C07613000
|
heap
|
page read and write
|
||
32FF000
|
heap
|
page read and write
|
||
180F0FC000
|
stack
|
page read and write
|
||
16E4A543000
|
heap
|
page read and write
|
||
DD6000
|
heap
|
page read and write
|
||
384D27F000
|
stack
|
page read and write
|
||
D5B000
|
heap
|
page read and write
|
||
2B13000
|
heap
|
page read and write
|
||
2426C9E7000
|
heap
|
page read and write
|
||
2BF0000
|
trusted library allocation
|
page read and write
|
||
2AEF000
|
stack
|
page read and write
|
||
3110000
|
remote allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
47D807D000
|
stack
|
page read and write
|
||
7FFD146E5000
|
unkown
|
page readonly
|
||
1162000
|
heap
|
page read and write
|
||
1962500F000
|
heap
|
page read and write
|
||
7FFD146DE000
|
unkown
|
page read and write
|
||
322B000
|
stack
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
6BD000
|
heap
|
page read and write
|
||
113E000
|
heap
|
page read and write
|
||
2F0BAFF2000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
2CBE9013000
|
heap
|
page read and write
|
||
2B43000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
2B36000
|
heap
|
page read and write
|
||
91D000
|
stack
|
page read and write
|
||
211EE287000
|
heap
|
page read and write
|
||
3C0000
|
remote allocation
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
11A0000
|
heap
|
page read and write
|
||
1962505F000
|
heap
|
page read and write
|
||
22DBAE76000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1136000
|
heap
|
page read and write
|
||
107A000
|
stack
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
1929D674000
|
heap
|
page read and write
|
||
21C07629000
|
heap
|
page read and write
|
||
7FFD146DE000
|
unkown
|
page read and write
|
||
22DBAC60000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
22DBAE13000
|
heap
|
page read and write
|
||
1929D663000
|
heap
|
page read and write
|
||
FD794FD000
|
stack
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
47D7E7D000
|
stack
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
7FFD146E5000
|
unkown
|
page readonly
|
||
2F20000
|
heap
|
page read and write
|
||
2B43000
|
heap
|
page read and write
|
||
16E49C76000
|
heap
|
page read and write
|
||
7FFD14660000
|
unkown
|
page readonly
|
||
18002C000
|
direct allocation
|
page read and write
|
||
1929D63D000
|
heap
|
page read and write
|
||
47D7BFE000
|
stack
|
page read and write
|
||
11C5000
|
heap
|
page read and write
|
||
2F0BB034000
|
heap
|
page read and write
|
||
117F000
|
heap
|
page read and write
|
||
2CBE9056000
|
heap
|
page read and write
|
||
16E4A56D000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
2F0BAFF2000
|
heap
|
page read and write
|
||
117F000
|
heap
|
page read and write
|
||
19624FE0000
|
direct allocation
|
page execute and read and write
|
||
16E49C92000
|
heap
|
page read and write
|
||
6C6000
|
heap
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
2426C970000
|
heap
|
page read and write
|
||
2DA3000
|
heap
|
page read and write
|
||
1929D660000
|
heap
|
page read and write
|
||
1962501D000
|
heap
|
page read and write
|
||
180EAAB000
|
stack
|
page read and write
|
||
FD796FC000
|
stack
|
page read and write
|
||
2B38000
|
heap
|
page read and write
|
||
CF2FAFE000
|
stack
|
page read and write
|
||
7FFD14661000
|
unkown
|
page execute read
|
||
FBAEF3C000
|
stack
|
page read and write
|
||
1962508B000
|
heap
|
page read and write
|
||
16E49AD0000
|
heap
|
page read and write
|
||
211EE130000
|
heap
|
page read and write
|
||
1275000
|
heap
|
page read and write
|
||
2B38000
|
heap
|
page read and write
|
||
2426CA0C000
|
heap
|
page read and write
|
||
211EE302000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
19625120000
|
heap
|
page readonly
|
||
67420FF000
|
stack
|
page read and write
|
||
D88D27B000
|
stack
|
page read and write
|
||
19625059000
|
heap
|
page read and write
|
||
1136000
|
heap
|
page read and write
|
||
88BE000
|
stack
|
page read and write
|
||
2F0BCA40000
|
trusted library allocation
|
page read and write
|
||
19625170000
|
trusted library allocation
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
2F0BAFF2000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
10E3000
|
heap
|
page read and write
|
||
7FFD14698000
|
unkown
|
page readonly
|
||
1962501D000
|
heap
|
page read and write
|
||
7FFD14661000
|
unkown
|
page execute read
|
||
16E4A5BC000
|
heap
|
page read and write
|
||
22DBACD0000
|
heap
|
page read and write
|
||
FD793FB000
|
stack
|
page read and write
|
||
DB7000
|
heap
|
page read and write
|
||
16E49C00000
|
heap
|
page read and write
|
||
6741E7E000
|
stack
|
page read and write
|
||
16E4A5AE000
|
heap
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
2426C720000
|
heap
|
page read and write
|
||
16E49C6F000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
2426C9E0000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
21C07420000
|
heap
|
page read and write
|
||
10A5000
|
heap
|
page read and write
|
||
6BD000
|
heap
|
page read and write
|
||
109F000
|
stack
|
page read and write
|
||
7FFD14661000
|
unkown
|
page execute read
|
||
211EE1A0000
|
heap
|
page read and write
|
||
FD7927C000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
2426C9C9000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
2426C9C9000
|
heap
|
page read and write
|
||
11E1000
|
heap
|
page read and write
|
||
883C000
|
stack
|
page read and write
|
||
211EED00000
|
heap
|
page read and write
|
||
111F000
|
heap
|
page read and write
|
||
126D000
|
heap
|
page read and write
|
||
E7A000
|
stack
|
page read and write
|
||
DA8000
|
heap
|
page read and write
|
||
16E49D8E000
|
heap
|
page read and write
|
||
16E49C43000
|
heap
|
page read and write
|
||
22DBAE2A000
|
heap
|
page read and write
|
||
109D000
|
heap
|
page read and write
|
||
16E4A511000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
1929D64D000
|
heap
|
page read and write
|
||
19625071000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
1159000
|
heap
|
page read and write
|
||
22DBAE00000
|
heap
|
page read and write
|
||
1929D67E000
|
heap
|
page read and write
|
||
FB9000
|
stack
|
page read and write
|
||
2F0BAFBE000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
690000
|
heap
|
page read and write
|
||
10F8000
|
heap
|
page read and write
|
||
1929D65A000
|
heap
|
page read and write
|
||
10A6000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
FD791FE000
|
stack
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
2B43000
|
heap
|
page read and write
|
||
2426C910000
|
heap
|
page readonly
|
||
FBAF5F9000
|
stack
|
page read and write
|
||
180F179000
|
stack
|
page read and write
|
||
1078000
|
heap
|
page read and write
|
||
1929D65F000
|
heap
|
page read and write
|
||
130C000
|
heap
|
page read and write
|
||
1162000
|
heap
|
page read and write
|
||
43DE000
|
stack
|
page read and write
|
||
6741FFE000
|
stack
|
page read and write
|
||
2426C9A7000
|
heap
|
page read and write
|
||
CF2F6FC000
|
stack
|
page read and write
|
||
1177000
|
heap
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
1108000
|
heap
|
page read and write
|
||
180EFFF000
|
stack
|
page read and write
|
||
2F0BAFCE000
|
heap
|
page read and write
|
||
2F0BCA20000
|
heap
|
page read and write
|
||
2AC9000
|
heap
|
page read and write
|
||
384D379000
|
stack
|
page read and write
|
||
11EA000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
DB7000
|
heap
|
page read and write
|
||
21C07602000
|
heap
|
page read and write
|
||
1929D641000
|
heap
|
page read and write
|
||
31AE000
|
stack
|
page read and write
|
||
111F000
|
heap
|
page read and write
|
||
2CBE9029000
|
heap
|
page read and write
|
||
2426C860000
|
heap
|
page read and write
|
||
211EE313000
|
heap
|
page read and write
|
||
7FFD14661000
|
unkown
|
page execute read
|
||
21C07410000
|
heap
|
page read and write
|
||
2B46000
|
heap
|
page read and write
|
||
1929D658000
|
heap
|
page read and write
|
||
6110000
|
trusted library allocation
|
page read and write
|
||
2426CA70000
|
heap
|
page read and write
|
||
FD795FF000
|
stack
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
19625018000
|
heap
|
page read and write
|
||
16E4A602000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
DA5000
|
heap
|
page read and write
|
||
22DBAE02000
|
heap
|
page read and write
|
||
21C07658000
|
heap
|
page read and write
|
||
115C000
|
heap
|
page read and write
|
||
873F000
|
stack
|
page read and write
|
||
2426C900000
|
direct allocation
|
page execute and read and write
|
||
19625049000
|
heap
|
page read and write
|
||
2290000
|
heap
|
page read and write
|
||
1929D62F000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page readonly
|
||
2CBE9002000
|
heap
|
page read and write
|
||
7FFD14660000
|
unkown
|
page readonly
|
||
1122000
|
heap
|
page read and write
|
||
21C07600000
|
heap
|
page read and write
|
||
1929D62D000
|
heap
|
page read and write
|
||
D88D47E000
|
stack
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
2F0BB022000
|
heap
|
page read and write
|
||
7FFD146E7000
|
unkown
|
page readonly
|
||
5BAE000
|
stack
|
page read and write
|
||
211EE2BE000
|
heap
|
page read and write
|
||
7BC2179000
|
stack
|
page read and write
|
||
22DBAE3C000
|
heap
|
page read and write
|
||
F5F000
|
stack
|
page read and write
|
||
7FFD14660000
|
unkown
|
page readonly
|
||
2D37000
|
stack
|
page read and write
|
||
2F0BB01A000
|
heap
|
page read and write
|
||
360000
|
heap
|
page read and write
|
||
1139000
|
heap
|
page read and write
|
||
2B3D000
|
heap
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
1266000
|
heap
|
page read and write
|
||
2CBE9049000
|
heap
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
211EE22A000
|
heap
|
page read and write
|
||
211EE1D0000
|
trusted library allocation
|
page read and write
|
||
211EE213000
|
heap
|
page read and write
|
||
1929D679000
|
heap
|
page read and write
|
||
7FFD146E7000
|
unkown
|
page readonly
|
||
16E49DE5000
|
heap
|
page read and write
|
||
19625049000
|
heap
|
page read and write
|
||
7FFD146E7000
|
unkown
|
page readonly
|
||
2F0BAFF2000
|
heap
|
page read and write
|
||
7FFD146DE000
|
unkown
|
page read and write
|
||
2F0BB002000
|
heap
|
page read and write
|
||
1119000
|
heap
|
page read and write
|
||
67421FE000
|
stack
|
page read and write
|
||
DD6000
|
heap
|
page read and write
|
||
DB0000
|
remote allocation
|
page read and write
|
||
2CBE8F40000
|
heap
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
D40000
|
remote allocation
|
page read and write
|
||
2D3D000
|
stack
|
page read and write
|
||
19625049000
|
heap
|
page read and write
|
||
3110000
|
remote allocation
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
47D7FFD000
|
stack
|
page read and write
|
||
2426C880000
|
heap
|
page read and write
|
||
7FFD14698000
|
unkown
|
page readonly
|
||
2F0BAFA3000
|
heap
|
page read and write
|
||
211EEC02000
|
heap
|
page read and write
|
||
1325000
|
heap
|
page read and write
|
||
2B38000
|
heap
|
page read and write
|
||
19625056000
|
heap
|
page read and write
|
||
DE8000
|
heap
|
page read and write
|
||
2426C9E9000
|
heap
|
page read and write
|
||
2426C9FA000
|
heap
|
page read and write
|
||
1929D66A000
|
heap
|
page read and write
|
||
FE0000
|
remote allocation
|
page read and write
|
||
19624F90000
|
heap
|
page read and write
|
||
7FFD14698000
|
unkown
|
page readonly
|
||
10B8000
|
heap
|
page read and write
|
||
DDF000
|
heap
|
page read and write
|
||
19625150000
|
heap
|
page read and write
|
||
10A5000
|
heap
|
page read and write
|
||
5580000
|
trusted library allocation
|
page read and write
|
||
118B000
|
heap
|
page read and write
|
||
22DBAF02000
|
heap
|
page read and write
|
||
63B0000
|
heap
|
page read and write
|
||
16E4A554000
|
heap
|
page read and write
|
||
112D000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
118B000
|
heap
|
page read and write
|
||
118B000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page readonly
|
||
16E4A50C000
|
heap
|
page read and write
|
||
22DBAC70000
|
heap
|
page read and write
|
||
FD790FF000
|
stack
|
page read and write
|
||
11E6000
|
heap
|
page read and write
|
||
34BB000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
9BC000
|
heap
|
page read and write
|
||
2CBE9047000
|
heap
|
page read and write
|
||
CF2F8FD000
|
stack
|
page read and write
|
||
7FFD14698000
|
unkown
|
page readonly
|
||
2B3D000
|
heap
|
page read and write
|
||
11A3000
|
heap
|
page read and write
|
||
21C07702000
|
heap
|
page read and write
|
||
7FFD146E2000
|
unkown
|
page readonly
|
||
2CBE000
|
stack
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
2426C9C9000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2F0BC900000
|
heap
|
page read and write
|
||
9B5000
|
heap
|
page read and write
|
||
1929D65C000
|
heap
|
page read and write
|
||
15A5000
|
heap
|
page read and write
|
||
118B000
|
heap
|
page read and write
|
||
126D000
|
heap
|
page read and write
|
||
19625068000
|
heap
|
page read and write
|
||
2F0BB008000
|
heap
|
page read and write
|
||
113D000
|
heap
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
180F4FE000
|
stack
|
page read and write
|
||
1929D66B000
|
heap
|
page read and write
|
||
D1B000
|
stack
|
page read and write
|
||
10A5000
|
heap
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
D88D67F000
|
stack
|
page read and write
|
||
1929D66D000
|
heap
|
page read and write
|
||
132C000
|
heap
|
page read and write
|
||
1929D629000
|
heap
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
1929D63B000
|
heap
|
page read and write
|
||
1962698D000
|
heap
|
page read and write
|
||
19625049000
|
heap
|
page read and write
|
||
19625049000
|
heap
|
page read and write
|
||
16E49C85000
|
heap
|
page read and write
|
||
21C075B0000
|
remote allocation
|
page read and write
|
||
112F000
|
heap
|
page read and write
|
||
CF2F5FE000
|
stack
|
page read and write
|
||
FA5000
|
heap
|
page read and write
|
||
1929D5B0000
|
heap
|
page read and write
|
||
2426C9F2000
|
heap
|
page read and write
|
||
1929D684000
|
heap
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
6741B9E000
|
stack
|
page read and write
|
||
DB7000
|
heap
|
page read and write
|
||
384D2FE000
|
stack
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
211EE200000
|
heap
|
page read and write
|
||
1929D675000
|
heap
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
7BC207E000
|
stack
|
page read and write
|
||
3730000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
1929D655000
|
heap
|
page read and write
|
||
22DBAE3F000
|
heap
|
page read and write
|
||
59FF000
|
stack
|
page read and write
|
||
16E4A502000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
E0B000
|
heap
|
page read and write
|
||
19626960000
|
heap
|
page read and write
|
||
2426CBE5000
|
heap
|
page read and write
|
||
1455000
|
heap
|
page read and write
|
||
2C3B000
|
stack
|
page read and write
|
||
2B3D000
|
heap
|
page read and write
|
||
2F0BC92C000
|
heap
|
page read and write
|
||
1962507A000
|
heap
|
page read and write
|
||
11B8000
|
heap
|
page read and write
|
||
7FFD146E2000
|
unkown
|
page readonly
|
||
7FFD146E5000
|
unkown
|
page readonly
|
||
2F0BAFBC000
|
heap
|
page read and write
|
||
32D8000
|
heap
|
page read and write
|
||
7BC1D1C000
|
stack
|
page read and write
|
||
6B6000
|
heap
|
page read and write
|
||
21C075B0000
|
remote allocation
|
page read and write
|
||
2293000
|
heap
|
page read and write
|
||
21C07580000
|
trusted library allocation
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
11DD000
|
heap
|
page read and write
|
||
22DBAF13000
|
heap
|
page read and write
|
||
1149000
|
heap
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
1139000
|
heap
|
page read and write
|
||
2B43000
|
heap
|
page read and write
|
||
7FFD146E5000
|
unkown
|
page readonly
|
||
2F0BAFFF000
|
heap
|
page read and write
|
||
3C0000
|
remote allocation
|
page read and write
|
||
113D000
|
heap
|
page read and write
|
||
2426C99D000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
89BB000
|
stack
|
page read and write
|
||
113E000
|
heap
|
page read and write
|
||
47D770B000
|
stack
|
page read and write
|
||
16E49C66000
|
heap
|
page read and write
|
||
16E49C58000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1119000
|
heap
|
page read and write
|
||
DC8000
|
heap
|
page read and write
|
||
F80000
|
trusted library allocation
|
page read and write
|
||
610F000
|
stack
|
page read and write
|
||
2F0BB045000
|
heap
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
D88D77F000
|
stack
|
page read and write
|
||
3110000
|
remote allocation
|
page read and write
|
||
1929D632000
|
heap
|
page read and write
|
||
1929D662000
|
heap
|
page read and write
|
||
16E4A590000
|
heap
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
CF2F9FF000
|
stack
|
page read and write
|
||
16E49C29000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
2B36000
|
heap
|
page read and write
|
||
1929D600000
|
heap
|
page read and write
|
||
6280000
|
heap
|
page read and write
|
||
10E8000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
2426C950000
|
trusted library allocation
|
page read and write
|
||
16E4A627000
|
heap
|
page read and write
|
||
10DF000
|
heap
|
page read and write
|
||
7BC20FE000
|
stack
|
page read and write
|
||
19624FF8000
|
heap
|
page read and write
|
||
1929D5E0000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
22DBB602000
|
trusted library allocation
|
page read and write
|
||
211EE2E2000
|
heap
|
page read and write
|
||
1162000
|
heap
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
2426C9DA000
|
heap
|
page read and write
|
||
1095000
|
heap
|
page read and write
|
||
1929D702000
|
heap
|
page read and write
|
||
6741B1B000
|
stack
|
page read and write
|
||
7FFD14660000
|
unkown
|
page readonly
|
||
CF2FCFF000
|
stack
|
page read and write
|
||
2F0BAFB7000
|
heap
|
page read and write
|
||
D40000
|
remote allocation
|
page read and write
|
||
2F0BAF98000
|
heap
|
page read and write
|
||
DCE000
|
heap
|
page read and write
|
||
7FFD14661000
|
unkown
|
page execute read
|
||
21C075B0000
|
remote allocation
|
page read and write
|
||
6E1000
|
heap
|
page read and write
|
||
47D7EFE000
|
stack
|
page read and write
|
||
16E4A600000
|
heap
|
page read and write
|
||
180F27E000
|
stack
|
page read and write
|
||
2B3D000
|
heap
|
page read and write
|
||
2F0BAF80000
|
direct allocation
|
page execute and read and write
|
||
7FFD146E2000
|
unkown
|
page readonly
|
||
384CFCF000
|
stack
|
page read and write
|
||
3349000
|
heap
|
page read and write
|
||
115C000
|
heap
|
page read and write
|
||
1162000
|
heap
|
page read and write
|
||
384D3FE000
|
stack
|
page read and write
|
||
BE0000
|
remote allocation
|
page read and write
|
||
7FFD146E7000
|
unkown
|
page readonly
|
||
7FFD14698000
|
unkown
|
page readonly
|
||
10F0000
|
heap
|
page read and write
|
||
CF2F47A000
|
stack
|
page read and write
|
||
2426C9C9000
|
heap
|
page read and write
|
||
1275000
|
heap
|
page read and write
|
||
7FFD146E5000
|
unkown
|
page readonly
|
||
1929D664000
|
heap
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
1929D540000
|
heap
|
page read and write
|
||
7FFD14698000
|
unkown
|
page readonly
|
||
18002D000
|
direct allocation
|
page readonly
|
||
7FFD146DE000
|
unkown
|
page read and write
|
||
2426E470000
|
heap
|
page read and write
|
||
2CBE8EE0000
|
heap
|
page read and write
|
||
16E4A522000
|
heap
|
page read and write
|
||
67A000
|
stack
|
page read and write
|
||
2426C9D7000
|
heap
|
page read and write
|
||
10FE000
|
heap
|
page read and write
|
||
16E49C13000
|
heap
|
page read and write
|
||
19624E30000
|
heap
|
page read and write
|
||
16E4A630000
|
heap
|
page read and write
|
||
D7B000
|
stack
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
1003000
|
heap
|
page read and write
|
||
FE0000
|
remote allocation
|
page read and write
|
||
32AB000
|
stack
|
page read and write
|
||
6BD000
|
heap
|
page read and write
|
||
5A80000
|
trusted library allocation
|
page read and write
|
||
2B1C000
|
heap
|
page read and write
|
||
11D6000
|
heap
|
page read and write
|
||
1929D648000
|
heap
|
page read and write
|
||
10F7000
|
heap
|
page read and write
|
||
1159000
|
heap
|
page read and write
|
||
19625025000
|
heap
|
page read and write
|
||
11DD000
|
heap
|
page read and write
|
||
7FFD146E2000
|
unkown
|
page readonly
|
||
1240000
|
heap
|
page read and write
|
||
FBAF3FE000
|
stack
|
page read and write
|
||
FBAF6FE000
|
stack
|
page read and write
|
||
5A7E000
|
stack
|
page read and write
|
||
16E49A70000
|
heap
|
page read and write
|
||
1139000
|
heap
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
D88D579000
|
stack
|
page read and write
|
||
16E4A500000
|
heap
|
page read and write
|
||
16E49C43000
|
heap
|
page read and write
|
||
FD7937C000
|
stack
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
113D000
|
heap
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
116B000
|
heap
|
page read and write
|
||
1929D642000
|
heap
|
page read and write
|
||
FD78F7B000
|
stack
|
page read and write
|
||
1149000
|
heap
|
page read and write
|
||
11DD000
|
heap
|
page read and write
|
||
211EE2CF000
|
heap
|
page read and write
|
||
2426C998000
|
heap
|
page read and write
|
||
19625066000
|
heap
|
page read and write
|
||
16E49BD0000
|
trusted library allocation
|
page read and write
|
||
2BF0000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
1929D656000
|
heap
|
page read and write
|
||
2426C99D000
|
heap
|
page read and write
|
||
10DF000
|
heap
|
page read and write
|
||
109D000
|
heap
|
page read and write
|
||
DE8000
|
heap
|
page read and write
|
||
180EEFA000
|
stack
|
page read and write
|
||
2F0BCEC0000
|
heap
|
page read and write
|
||
2CBE9000000
|
heap
|
page read and write
|
||
7FFD146E7000
|
unkown
|
page readonly
|
||
211EE140000
|
heap
|
page read and write
|
||
2F0BCA10000
|
heap
|
page read and write
|
||
16E49A60000
|
heap
|
page read and write
|
||
1173000
|
heap
|
page read and write
|
||
2426C9E9000
|
heap
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
DB7000
|
heap
|
page read and write
|
||
1929D657000
|
heap
|
page read and write
|
||
1929D640000
|
heap
|
page read and write
|
||
2426C9C9000
|
heap
|
page read and write
|
||
1929D66F000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
1929D668000
|
heap
|
page read and write
|
||
D7F000
|
heap
|
page read and write
|
||
893E000
|
stack
|
page read and write
|
||
DFA000
|
heap
|
page read and write
|
||
1137000
|
heap
|
page read and write
|
||
21C07640000
|
heap
|
page read and write
|
||
2CBE8EF0000
|
heap
|
page read and write
|
||
3329000
|
heap
|
page read and write
|
||
16E4A402000
|
heap
|
page read and write
|
||
2F0BCA15000
|
heap
|
page read and write
|
||
2CBE902F000
|
heap
|
page read and write
|
||
7FFD14660000
|
unkown
|
page readonly
|
||
7BC1D9E000
|
stack
|
page read and write
|
||
109D000
|
heap
|
page read and write
|
||
113D000
|
heap
|
page read and write
|
||
608E000
|
stack
|
page read and write
|
||
211EED13000
|
heap
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
2F0BCA00000
|
trusted library allocation
|
page read and write
|
||
21C07480000
|
heap
|
page read and write
|
||
16E49C74000
|
heap
|
page read and write
|
||
7BC21FE000
|
stack
|
page read and write
|
||
16E4A522000
|
heap
|
page read and write
|
||
1276000
|
heap
|
page read and write
|
||
1440000
|
heap
|
page readonly
|
||
180F57F000
|
stack
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
3080000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
19625170000
|
trusted library allocation
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
2CBE903E000
|
heap
|
page read and write
|
||
1149000
|
heap
|
page read and write
|
||
2B65000
|
heap
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
111F000
|
heap
|
page read and write
|
||
2B36000
|
heap
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
196251B0000
|
heap
|
page read and write
|
||
19624F70000
|
heap
|
page read and write
|
||
10A0000
|
direct allocation
|
page execute and read and write
|
||
211EE26E000
|
heap
|
page read and write
|
||
319C000
|
stack
|
page read and write
|
||
16E49C91000
|
heap
|
page read and write
|
||
1929D626000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
2F0BAF20000
|
heap
|
page read and write
|
||
2426CB70000
|
trusted library allocation
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
16E49C52000
|
heap
|
page read and write
|
||
87B7000
|
stack
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
DB7000
|
heap
|
page read and write
|
||
211EE23E000
|
heap
|
page read and write
|
||
2CBC000
|
stack
|
page read and write
|
||
2F0BB011000
|
heap
|
page read and write
|
||
7FFD146E7000
|
unkown
|
page readonly
|
||
11C5000
|
heap
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
2B3D000
|
heap
|
page read and write
|
||
2426C978000
|
heap
|
page read and write
|
||
47D7D7E000
|
stack
|
page read and write
|
||
2CBE9102000
|
heap
|
page read and write
|
||
557E000
|
stack
|
page read and write
|
||
32B1000
|
heap
|
page read and write
|
||
115C000
|
heap
|
page read and write
|
||
2ABC000
|
heap
|
page read and write
|
||
2850000
|
trusted library allocation
|
page read and write
|
||
16E4A3A0000
|
trusted library allocation
|
page read and write
|
||
7FFD146DE000
|
unkown
|
page read and write
|
||
211EE2CD000
|
heap
|
page read and write
|
||
7FFD14661000
|
unkown
|
page execute read
|
||
30FE000
|
stack
|
page read and write
|
||
1929D661000
|
heap
|
page read and write
|
||
11C5000
|
heap
|
page read and write
|
||
2B38000
|
heap
|
page read and write
|
||
F60000
|
direct allocation
|
page execute and read and write
|
||
2F0BAFF2000
|
heap
|
page read and write
|
||
2CBE8F70000
|
trusted library allocation
|
page read and write
|
||
19624FF0000
|
heap
|
page read and write
|
||
16E49DB9000
|
heap
|
page read and write
|
||
DB0000
|
remote allocation
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
FBAF4FE000
|
stack
|
page read and write
|
||
2B43000
|
heap
|
page read and write
|
||
16E49C8A000
|
heap
|
page read and write
|
||
16E4A623000
|
heap
|
page read and write
|
||
DD0000
|
direct allocation
|
page execute and read and write
|
||
DC5000
|
heap
|
page read and write
|
||
7FFD146E2000
|
unkown
|
page readonly
|
||
C7B000
|
stack
|
page read and write
|
||
16E4A613000
|
heap
|
page read and write
|
||
47D7C7E000
|
stack
|
page read and write
|
||
16E49C3C000
|
heap
|
page read and write
|
||
1201000
|
heap
|
page read and write
|
||
2F0BAFC3000
|
heap
|
page read and write
|
||
112F000
|
heap
|
page read and write
|
||
1929D665000
|
heap
|
page read and write
|
||
21C07E02000
|
trusted library allocation
|
page read and write
|
||
180F37A000
|
stack
|
page read and write
|
||
1139000
|
heap
|
page read and write
|
||
698000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
1929E002000
|
trusted library allocation
|
page read and write
|
||
7FFD146DE000
|
unkown
|
page read and write
|
||
2B38000
|
heap
|
page read and write
|
||
7FFD146E2000
|
unkown
|
page readonly
|
||
180F47F000
|
stack
|
page read and write
|
||
11E9000
|
heap
|
page read and write
|
||
CF2F27B000
|
stack
|
page read and write
|
||
BE0000
|
remote allocation
|
page read and write
|
||
2CBE903A000
|
heap
|
page read and write
|
||
10ED000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
10DF000
|
heap
|
page read and write
|
||
126D000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
FBAF2FE000
|
stack
|
page read and write
|
There are 710 hidden memdumps, click here to show them.