IOC Report
U9M1w8FHBW.dll

loading gif

Files

File Path
Type
Category
Malicious
U9M1w8FHBW.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\U9M1w8FHBW.dll"
malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\U9M1w8FHBW.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\U9M1w8FHBW.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\U9M1w8FHBW.dll,DllRegisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\WRxgy\qtvnAcMlRvp.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PGSiUgwlRfXFiSpXn\loIGTpTFCkf.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\OFGaERpXgVdSBti\FPnTfFrwaToqIsch.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\JVTaKcz\aAjaNMMsWiQmy.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\PGSiUgwlRfXFiSpXn\loIGTpTFCkf.dll
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\GDjmYYTiXCunz\igKuzYeE.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\DChihhZAEIop\NZICbhYKmnAVT.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\YKYTbOgY\pyluVjQOzYMsbAJk.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\DahdrCXRHjoqlqPu\vvcfbAnuZpuTsj.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AvyZUmIIeGJLvcye\aPdTkvBLdrznCXG.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\DChihhZAEIop\NZICbhYKmnAVT.dll
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\OQOuTpy\WqdnfVdfYCxIlc.dll"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\U9M1w8FHBW.dll",#1
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://172.105.115.71:8080/zseolrnaqxs/
unknown
https://172.105.115.71:8080/s.dll3
unknown
http://ctl2.105.115.71:8080/
unknown
https://172.105.115.71:8080/cwaajpktaow/wluuqgbutatftfws/jndwc/hjilgypgsuce/
unknown
https://172.105.115.71:8080/s.dll6
unknown

Domains

Name
IP
Malicious
windowsupdatebg.s.llnwi.net
95.140.236.0

IPs

IP
Domain
Country
Malicious
172.105.115.71
unknown
United States
malicious
188.165.79.151
unknown
France
malicious
196.44.98.190
unknown
Ghana
malicious
174.138.33.49
unknown
United States
malicious
36.67.23.59
unknown
Indonesia
malicious
103.41.204.169
unknown
Indonesia
malicious
85.214.67.203
unknown
Germany
malicious
83.229.80.93
unknown
United Kingdom
malicious
198.199.70.22
unknown
United States
malicious
93.104.209.107
unknown
Germany
malicious
186.250.48.5
unknown
Brazil
malicious
209.239.112.82
unknown
United States
malicious
175.126.176.79
unknown
Korea Republic of
malicious
128.199.242.164
unknown
United Kingdom
malicious
178.238.225.252
unknown
Germany
malicious
46.101.98.60
unknown
Netherlands
malicious
190.145.8.4
unknown
Colombia
malicious
82.98.180.154
unknown
Spain
malicious
103.71.99.57
unknown
India
malicious
87.106.97.83
unknown
Germany
malicious
103.254.12.236
unknown
Viet Nam
malicious
103.85.95.4
unknown
Indonesia
malicious
202.134.4.210
unknown
Indonesia
malicious
165.22.254.236
unknown
United States
malicious
78.47.204.80
unknown
Germany
malicious
118.98.72.86
unknown
Indonesia
malicious
139.59.80.108
unknown
Singapore
malicious
104.244.79.94
unknown
United States
malicious
37.44.244.177
unknown
Germany
malicious
51.75.33.122
unknown
France
malicious
160.16.143.191
unknown
Japan
malicious
103.56.149.105
unknown
Indonesia
malicious
85.25.120.45
unknown
Germany
malicious
139.196.72.155
unknown
China
malicious
115.178.55.22
unknown
Indonesia
malicious
103.126.216.86
unknown
Bangladesh
malicious
128.199.217.206
unknown
United Kingdom
malicious
114.79.130.68
unknown
India
malicious
103.224.241.74
unknown
India
malicious
210.57.209.142
unknown
Indonesia
malicious
202.28.34.99
unknown
Thailand
malicious
80.211.107.116
unknown
Italy
malicious
54.37.228.122
unknown
France
malicious
218.38.121.17
unknown
Korea Republic of
malicious
185.148.169.10
unknown
Germany
malicious
195.77.239.39
unknown
Spain
malicious
178.62.112.199
unknown
European Union
malicious
62.171.178.147
unknown
United Kingdom
malicious
64.227.55.231
unknown
United States
malicious
There are 39 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
loIGTpTFCkf.dll
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
NZICbhYKmnAVT.dll
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
EA0000
direct allocation
page execute and read and write
malicious
1410000
direct allocation
page execute and read and write
malicious
196250F0000
direct allocation
page execute and read and write
malicious
2F0BAF50000
direct allocation
page execute and read and write
malicious
2B90000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
2426C8D0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
457E000
stack
page read and write
16E49D13000
heap
page read and write
2AED000
heap
page read and write
211EE28B000
heap
page read and write
2C30000
heap
page read and write
1149000
heap
page read and write
2B47000
heap
page read and write
DB7000
heap
page read and write
15AC000
heap
page read and write
32B0000
heap
page read and write
1180000
heap
page read and write
1929D67A000
heap
page read and write
108F000
heap
page read and write
7FFD14660000
unkown
page readonly
18002C000
direct allocation
page read and write
1275000
heap
page read and write
1929D67B000
heap
page read and write
2F0BB00F000
heap
page read and write
1929D613000
heap
page read and write
2F0BB011000
heap
page read and write
22DBADD0000
trusted library allocation
page read and write
1305000
heap
page read and write
2426CBE0000
heap
page read and write
1164000
heap
page read and write
1929D550000
heap
page read and write
7FFD146E5000
unkown
page readonly
11C5000
heap
page read and write
2426C998000
heap
page read and write
1248000
heap
page read and write
11EB000
heap
page read and write
1929D659000
heap
page read and write
1929D67D000
heap
page read and write
2F0BAEB0000
heap
page read and write
E50000
heap
page read and write
196251B5000
heap
page read and write
19625068000
heap
page read and write
CF2FDFF000
stack
page read and write
DB0000
heap
page read and write
115C000
heap
page read and write
67422FF000
stack
page read and write
2F0BAF90000
heap
page read and write
2F0BAFCB000
heap
page read and write
6C5000
heap
page read and write
2426C9A7000
heap
page read and write
FD78B3C000
stack
page read and write
2CBE9A02000
trusted library allocation
page read and write
FD797FE000
stack
page read and write
DD0000
heap
page read and write
18002B000
direct allocation
page readonly
2F0BAFF2000
heap
page read and write
384CF4C000
stack
page read and write
22DBAE59000
heap
page read and write
2B09000
heap
page read and write
F50000
heap
page read and write
9B0000
heap
page read and write
22DBAE5B000
heap
page read and write
1929D62E000
heap
page read and write
CF2FBFE000
stack
page read and write
21C07613000
heap
page read and write
32FF000
heap
page read and write
180F0FC000
stack
page read and write
16E4A543000
heap
page read and write
DD6000
heap
page read and write
384D27F000
stack
page read and write
D5B000
heap
page read and write
2B13000
heap
page read and write
2426C9E7000
heap
page read and write
2BF0000
trusted library allocation
page read and write
2AEF000
stack
page read and write
3110000
remote allocation
page read and write
9E0000
heap
page read and write
47D807D000
stack
page read and write
7FFD146E5000
unkown
page readonly
1162000
heap
page read and write
1962500F000
heap
page read and write
7FFD146DE000
unkown
page read and write
322B000
stack
page read and write
12D0000
heap
page read and write
6BD000
heap
page read and write
113E000
heap
page read and write
2F0BAFF2000
heap
page read and write
18002D000
direct allocation
page readonly
2CBE9013000
heap
page read and write
2B43000
heap
page read and write
180000000
direct allocation
page read and write
2B36000
heap
page read and write
91D000
stack
page read and write
211EE287000
heap
page read and write
3C0000
remote allocation
page read and write
18002D000
direct allocation
page readonly
11A0000
heap
page read and write
1962505F000
heap
page read and write
22DBAE76000
heap
page read and write
2AEE000
heap
page read and write
1136000
heap
page read and write
107A000
stack
page read and write
2AF0000
heap
page read and write
6B0000
heap
page read and write
1929D674000
heap
page read and write
21C07629000
heap
page read and write
7FFD146DE000
unkown
page read and write
22DBAC60000
heap
page read and write
18002D000
direct allocation
page readonly
22DBAE13000
heap
page read and write
1929D663000
heap
page read and write
FD794FD000
stack
page read and write
C60000
heap
page read and write
47D7E7D000
stack
page read and write
970000
heap
page read and write
7FFD146E5000
unkown
page readonly
2F20000
heap
page read and write
2B43000
heap
page read and write
16E49C76000
heap
page read and write
7FFD14660000
unkown
page readonly
18002C000
direct allocation
page read and write
1929D63D000
heap
page read and write
47D7BFE000
stack
page read and write
11C5000
heap
page read and write
2F0BB034000
heap
page read and write
117F000
heap
page read and write
2CBE9056000
heap
page read and write
16E4A56D000
heap
page read and write
18002D000
direct allocation
page readonly
2F0BAFF2000
heap
page read and write
117F000
heap
page read and write
19624FE0000
direct allocation
page execute and read and write
16E49C92000
heap
page read and write
6C6000
heap
page read and write
10E0000
trusted library allocation
page read and write
2426C970000
heap
page read and write
2DA3000
heap
page read and write
1929D660000
heap
page read and write
1962501D000
heap
page read and write
180EAAB000
stack
page read and write
FD796FC000
stack
page read and write
2B38000
heap
page read and write
CF2FAFE000
stack
page read and write
7FFD14661000
unkown
page execute read
FBAEF3C000
stack
page read and write
1962508B000
heap
page read and write
16E49AD0000
heap
page read and write
211EE130000
heap
page read and write
1275000
heap
page read and write
2B38000
heap
page read and write
2426CA0C000
heap
page read and write
211EE302000
heap
page read and write
180000000
direct allocation
page read and write
D70000
heap
page read and write
19625120000
heap
page readonly
67420FF000
stack
page read and write
D88D27B000
stack
page read and write
19625059000
heap
page read and write
1136000
heap
page read and write
88BE000
stack
page read and write
2F0BCA40000
trusted library allocation
page read and write
19625170000
trusted library allocation
page read and write
2A90000
heap
page read and write
2F0BAFF2000
heap
page read and write
1200000
heap
page read and write
10E3000
heap
page read and write
7FFD14698000
unkown
page readonly
1962501D000
heap
page read and write
7FFD14661000
unkown
page execute read
16E4A5BC000
heap
page read and write
22DBACD0000
heap
page read and write
FD793FB000
stack
page read and write
DB7000
heap
page read and write
16E49C00000
heap
page read and write
6741E7E000
stack
page read and write
16E4A5AE000
heap
page read and write
11E5000
heap
page read and write
2426C720000
heap
page read and write
16E49C6F000
heap
page read and write
1300000
heap
page read and write
2426C9E0000
heap
page read and write
18002D000
direct allocation
page readonly
21C07420000
heap
page read and write
10A5000
heap
page read and write
6BD000
heap
page read and write
109F000
stack
page read and write
7FFD14661000
unkown
page execute read
211EE1A0000
heap
page read and write
FD7927C000
stack
page read and write
180000000
direct allocation
page read and write
2426C9C9000
heap
page read and write
18002C000
direct allocation
page read and write
2426C9C9000
heap
page read and write
11E1000
heap
page read and write
883C000
stack
page read and write
211EED00000
heap
page read and write
111F000
heap
page read and write
126D000
heap
page read and write
E7A000
stack
page read and write
DA8000
heap
page read and write
16E49D8E000
heap
page read and write
16E49C43000
heap
page read and write
22DBAE2A000
heap
page read and write
109D000
heap
page read and write
16E4A511000
heap
page read and write
11D0000
heap
page read and write
1929D64D000
heap
page read and write
19625071000
heap
page read and write
18002B000
direct allocation
page readonly
1159000
heap
page read and write
22DBAE00000
heap
page read and write
1929D67E000
heap
page read and write
FB9000
stack
page read and write
2F0BAFBE000
heap
page read and write
18002B000
direct allocation
page readonly
690000
heap
page read and write
10F8000
heap
page read and write
1929D65A000
heap
page read and write
10A6000
heap
page read and write
DC0000
heap
page read and write
FD791FE000
stack
page read and write
6C1000
heap
page read and write
2B43000
heap
page read and write
2426C910000
heap
page readonly
FBAF5F9000
stack
page read and write
180F179000
stack
page read and write
1078000
heap
page read and write
1929D65F000
heap
page read and write
130C000
heap
page read and write
1162000
heap
page read and write
43DE000
stack
page read and write
6741FFE000
stack
page read and write
2426C9A7000
heap
page read and write
CF2F6FC000
stack
page read and write
1177000
heap
page read and write
CC0000
heap
page read and write
1108000
heap
page read and write
180EFFF000
stack
page read and write
2F0BAFCE000
heap
page read and write
2F0BCA20000
heap
page read and write
2AC9000
heap
page read and write
384D379000
stack
page read and write
11EA000
heap
page read and write
180000000
direct allocation
page read and write
DB7000
heap
page read and write
21C07602000
heap
page read and write
1929D641000
heap
page read and write
31AE000
stack
page read and write
111F000
heap
page read and write
2CBE9029000
heap
page read and write
2426C860000
heap
page read and write
211EE313000
heap
page read and write
7FFD14661000
unkown
page execute read
21C07410000
heap
page read and write
2B46000
heap
page read and write
1929D658000
heap
page read and write
6110000
trusted library allocation
page read and write
2426CA70000
heap
page read and write
FD795FF000
stack
page read and write
2750000
heap
page read and write
19625018000
heap
page read and write
16E4A602000
heap
page read and write
F70000
heap
page read and write
10D0000
trusted library allocation
page read and write
DA5000
heap
page read and write
22DBAE02000
heap
page read and write
21C07658000
heap
page read and write
115C000
heap
page read and write
873F000
stack
page read and write
2426C900000
direct allocation
page execute and read and write
19625049000
heap
page read and write
2290000
heap
page read and write
1929D62F000
heap
page read and write
F70000
heap
page readonly
2CBE9002000
heap
page read and write
7FFD14660000
unkown
page readonly
1122000
heap
page read and write
21C07600000
heap
page read and write
1929D62D000
heap
page read and write
D88D47E000
stack
page read and write
422E000
stack
page read and write
2F0BB022000
heap
page read and write
7FFD146E7000
unkown
page readonly
5BAE000
stack
page read and write
211EE2BE000
heap
page read and write
7BC2179000
stack
page read and write
22DBAE3C000
heap
page read and write
F5F000
stack
page read and write
7FFD14660000
unkown
page readonly
2D37000
stack
page read and write
2F0BB01A000
heap
page read and write
360000
heap
page read and write
1139000
heap
page read and write
2B3D000
heap
page read and write
1450000
heap
page read and write
1266000
heap
page read and write
2CBE9049000
heap
page read and write
10F0000
heap
page read and write
211EE22A000
heap
page read and write
211EE1D0000
trusted library allocation
page read and write
211EE213000
heap
page read and write
1929D679000
heap
page read and write
7FFD146E7000
unkown
page readonly
16E49DE5000
heap
page read and write
19625049000
heap
page read and write
7FFD146E7000
unkown
page readonly
2F0BAFF2000
heap
page read and write
7FFD146DE000
unkown
page read and write
2F0BB002000
heap
page read and write
1119000
heap
page read and write
67421FE000
stack
page read and write
DD6000
heap
page read and write
DB0000
remote allocation
page read and write
2CBE8F40000
heap
page read and write
15A0000
heap
page read and write
1144000
heap
page read and write
11B0000
heap
page read and write
D40000
remote allocation
page read and write
2D3D000
stack
page read and write
19625049000
heap
page read and write
3110000
remote allocation
page read and write
6C5000
heap
page read and write
47D7FFD000
stack
page read and write
2426C880000
heap
page read and write
7FFD14698000
unkown
page readonly
2F0BAFA3000
heap
page read and write
211EEC02000
heap
page read and write
1325000
heap
page read and write
2B38000
heap
page read and write
19625056000
heap
page read and write
DE8000
heap
page read and write
2426C9E9000
heap
page read and write
2426C9FA000
heap
page read and write
1929D66A000
heap
page read and write
FE0000
remote allocation
page read and write
19624F90000
heap
page read and write
7FFD14698000
unkown
page readonly
10B8000
heap
page read and write
DDF000
heap
page read and write
19625150000
heap
page read and write
10A5000
heap
page read and write
5580000
trusted library allocation
page read and write
118B000
heap
page read and write
22DBAF02000
heap
page read and write
63B0000
heap
page read and write
16E4A554000
heap
page read and write
112D000
heap
page read and write
18002B000
direct allocation
page readonly
118B000
heap
page read and write
118B000
heap
page read and write
DE0000
heap
page readonly
16E4A50C000
heap
page read and write
22DBAC70000
heap
page read and write
FD790FF000
stack
page read and write
11E6000
heap
page read and write
34BB000
heap
page read and write
D50000
heap
page read and write
9BC000
heap
page read and write
2CBE9047000
heap
page read and write
CF2F8FD000
stack
page read and write
7FFD14698000
unkown
page readonly
2B3D000
heap
page read and write
11A3000
heap
page read and write
21C07702000
heap
page read and write
7FFD146E2000
unkown
page readonly
2CBE000
stack
page read and write
1000000
heap
page read and write
2426C9C9000
heap
page read and write
6E0000
heap
page read and write
2F0BC900000
heap
page read and write
9B5000
heap
page read and write
1929D65C000
heap
page read and write
15A5000
heap
page read and write
118B000
heap
page read and write
126D000
heap
page read and write
19625068000
heap
page read and write
2F0BB008000
heap
page read and write
113D000
heap
page read and write
322F000
stack
page read and write
180F4FE000
stack
page read and write
1929D66B000
heap
page read and write
D1B000
stack
page read and write
10A5000
heap
page read and write
DD5000
heap
page read and write
D88D67F000
stack
page read and write
1929D66D000
heap
page read and write
132C000
heap
page read and write
1929D629000
heap
page read and write
2DA0000
heap
page read and write
1929D63B000
heap
page read and write
1962698D000
heap
page read and write
19625049000
heap
page read and write
19625049000
heap
page read and write
16E49C85000
heap
page read and write
21C075B0000
remote allocation
page read and write
112F000
heap
page read and write
CF2F5FE000
stack
page read and write
FA5000
heap
page read and write
1929D5B0000
heap
page read and write
2426C9F2000
heap
page read and write
1929D684000
heap
page read and write
2CC0000
trusted library allocation
page read and write
6741B9E000
stack
page read and write
DB7000
heap
page read and write
384D2FE000
stack
page read and write
860000
heap
page read and write
211EE200000
heap
page read and write
1929D675000
heap
page read and write
1070000
heap
page read and write
7BC207E000
stack
page read and write
3730000
heap
page read and write
DA0000
heap
page read and write
1929D655000
heap
page read and write
22DBAE3F000
heap
page read and write
59FF000
stack
page read and write
16E4A502000
heap
page read and write
18002C000
direct allocation
page read and write
E0B000
heap
page read and write
19626960000
heap
page read and write
2426CBE5000
heap
page read and write
1455000
heap
page read and write
2C3B000
stack
page read and write
2B3D000
heap
page read and write
2F0BC92C000
heap
page read and write
1962507A000
heap
page read and write
11B8000
heap
page read and write
7FFD146E2000
unkown
page readonly
7FFD146E5000
unkown
page readonly
2F0BAFBC000
heap
page read and write
32D8000
heap
page read and write
7BC1D1C000
stack
page read and write
6B6000
heap
page read and write
21C075B0000
remote allocation
page read and write
2293000
heap
page read and write
21C07580000
trusted library allocation
page read and write
6C5000
heap
page read and write
11DD000
heap
page read and write
22DBAF13000
heap
page read and write
1149000
heap
page read and write
112B000
heap
page read and write
1139000
heap
page read and write
2B43000
heap
page read and write
7FFD146E5000
unkown
page readonly
2F0BAFFF000
heap
page read and write
3C0000
remote allocation
page read and write
113D000
heap
page read and write
2426C99D000
heap
page read and write
950000
heap
page read and write
89BB000
stack
page read and write
113E000
heap
page read and write
47D770B000
stack
page read and write
16E49C66000
heap
page read and write
16E49C58000
heap
page read and write
180000000
direct allocation
page read and write
1119000
heap
page read and write
DC8000
heap
page read and write
F80000
trusted library allocation
page read and write
610F000
stack
page read and write
2F0BB045000
heap
page read and write
1010000
heap
page read and write
D88D77F000
stack
page read and write
3110000
remote allocation
page read and write
1929D632000
heap
page read and write
1929D662000
heap
page read and write
16E4A590000
heap
page read and write
1320000
heap
page read and write
CF2F9FF000
stack
page read and write
16E49C29000
heap
page read and write
180000000
direct allocation
page read and write
2B36000
heap
page read and write
1929D600000
heap
page read and write
6280000
heap
page read and write
10E8000
heap
page read and write
1200000
heap
page read and write
2426C950000
trusted library allocation
page read and write
16E4A627000
heap
page read and write
10DF000
heap
page read and write
7BC20FE000
stack
page read and write
19624FF8000
heap
page read and write
1929D5E0000
trusted library allocation
page read and write
FA0000
heap
page read and write
22DBB602000
trusted library allocation
page read and write
211EE2E2000
heap
page read and write
1162000
heap
page read and write
2DBE000
stack
page read and write
2426C9DA000
heap
page read and write
1095000
heap
page read and write
1929D702000
heap
page read and write
6741B1B000
stack
page read and write
7FFD14660000
unkown
page readonly
CF2FCFF000
stack
page read and write
2F0BAFB7000
heap
page read and write
D40000
remote allocation
page read and write
2F0BAF98000
heap
page read and write
DCE000
heap
page read and write
7FFD14661000
unkown
page execute read
21C075B0000
remote allocation
page read and write
6E1000
heap
page read and write
47D7EFE000
stack
page read and write
16E4A600000
heap
page read and write
180F27E000
stack
page read and write
2B3D000
heap
page read and write
2F0BAF80000
direct allocation
page execute and read and write
7FFD146E2000
unkown
page readonly
384CFCF000
stack
page read and write
3349000
heap
page read and write
115C000
heap
page read and write
1162000
heap
page read and write
384D3FE000
stack
page read and write
BE0000
remote allocation
page read and write
7FFD146E7000
unkown
page readonly
7FFD14698000
unkown
page readonly
10F0000
heap
page read and write
CF2F47A000
stack
page read and write
2426C9C9000
heap
page read and write
1275000
heap
page read and write
7FFD146E5000
unkown
page readonly
1929D664000
heap
page read and write
11E5000
heap
page read and write
1929D540000
heap
page read and write
7FFD14698000
unkown
page readonly
18002D000
direct allocation
page readonly
7FFD146DE000
unkown
page read and write
2426E470000
heap
page read and write
2CBE8EE0000
heap
page read and write
16E4A522000
heap
page read and write
67A000
stack
page read and write
2426C9D7000
heap
page read and write
10FE000
heap
page read and write
16E49C13000
heap
page read and write
19624E30000
heap
page read and write
16E4A630000
heap
page read and write
D7B000
stack
page read and write
6C5000
heap
page read and write
1003000
heap
page read and write
FE0000
remote allocation
page read and write
32AB000
stack
page read and write
6BD000
heap
page read and write
5A80000
trusted library allocation
page read and write
2B1C000
heap
page read and write
11D6000
heap
page read and write
1929D648000
heap
page read and write
10F7000
heap
page read and write
1159000
heap
page read and write
19625025000
heap
page read and write
11DD000
heap
page read and write
7FFD146E2000
unkown
page readonly
1240000
heap
page read and write
FBAF3FE000
stack
page read and write
FBAF6FE000
stack
page read and write
5A7E000
stack
page read and write
16E49A70000
heap
page read and write
1139000
heap
page read and write
2D60000
heap
page read and write
D88D579000
stack
page read and write
16E4A500000
heap
page read and write
16E49C43000
heap
page read and write
FD7937C000
stack
page read and write
18002B000
direct allocation
page readonly
113D000
heap
page read and write
112B000
heap
page read and write
116B000
heap
page read and write
1929D642000
heap
page read and write
FD78F7B000
stack
page read and write
1149000
heap
page read and write
11DD000
heap
page read and write
211EE2CF000
heap
page read and write
2426C998000
heap
page read and write
19625066000
heap
page read and write
16E49BD0000
trusted library allocation
page read and write
2BF0000
trusted library allocation
page read and write
B80000
heap
page read and write
1929D656000
heap
page read and write
2426C99D000
heap
page read and write
10DF000
heap
page read and write
109D000
heap
page read and write
DE8000
heap
page read and write
180EEFA000
stack
page read and write
2F0BCEC0000
heap
page read and write
2CBE9000000
heap
page read and write
7FFD146E7000
unkown
page readonly
211EE140000
heap
page read and write
2F0BCA10000
heap
page read and write
16E49A60000
heap
page read and write
1173000
heap
page read and write
2426C9E9000
heap
page read and write
3D0000
heap
page read and write
DB7000
heap
page read and write
1929D657000
heap
page read and write
1929D640000
heap
page read and write
2426C9C9000
heap
page read and write
1929D66F000
heap
page read and write
18002C000
direct allocation
page read and write
1929D668000
heap
page read and write
D7F000
heap
page read and write
893E000
stack
page read and write
DFA000
heap
page read and write
1137000
heap
page read and write
21C07640000
heap
page read and write
2CBE8EF0000
heap
page read and write
3329000
heap
page read and write
16E4A402000
heap
page read and write
2F0BCA15000
heap
page read and write
2CBE902F000
heap
page read and write
7FFD14660000
unkown
page readonly
7BC1D9E000
stack
page read and write
109D000
heap
page read and write
113D000
heap
page read and write
608E000
stack
page read and write
211EED13000
heap
page read and write
5BB0000
trusted library allocation
page read and write
2F0BCA00000
trusted library allocation
page read and write
21C07480000
heap
page read and write
16E49C74000
heap
page read and write
7BC21FE000
stack
page read and write
16E4A522000
heap
page read and write
1276000
heap
page read and write
1440000
heap
page readonly
180F57F000
stack
page read and write
1260000
heap
page read and write
3080000
trusted library allocation
page read and write
DE0000
heap
page read and write
19625170000
trusted library allocation
page read and write
18002B000
direct allocation
page readonly
2CBE903E000
heap
page read and write
1149000
heap
page read and write
2B65000
heap
page read and write
1130000
heap
page read and write
111F000
heap
page read and write
2B36000
heap
page read and write
3300000
heap
page read and write
196251B0000
heap
page read and write
19624F70000
heap
page read and write
10A0000
direct allocation
page execute and read and write
211EE26E000
heap
page read and write
319C000
stack
page read and write
16E49C91000
heap
page read and write
1929D626000
heap
page read and write
D50000
heap
page read and write
2F0BAF20000
heap
page read and write
2426CB70000
trusted library allocation
page read and write
F00000
heap
page read and write
16E49C52000
heap
page read and write
87B7000
stack
page read and write
11DA000
heap
page read and write
DF0000
heap
page read and write
DB7000
heap
page read and write
211EE23E000
heap
page read and write
2CBC000
stack
page read and write
2F0BB011000
heap
page read and write
7FFD146E7000
unkown
page readonly
11C5000
heap
page read and write
10B0000
heap
page read and write
2B3D000
heap
page read and write
2426C978000
heap
page read and write
47D7D7E000
stack
page read and write
2CBE9102000
heap
page read and write
557E000
stack
page read and write
32B1000
heap
page read and write
115C000
heap
page read and write
2ABC000
heap
page read and write
2850000
trusted library allocation
page read and write
16E4A3A0000
trusted library allocation
page read and write
7FFD146DE000
unkown
page read and write
211EE2CD000
heap
page read and write
7FFD14661000
unkown
page execute read
30FE000
stack
page read and write
1929D661000
heap
page read and write
11C5000
heap
page read and write
2B38000
heap
page read and write
F60000
direct allocation
page execute and read and write
2F0BAFF2000
heap
page read and write
2CBE8F70000
trusted library allocation
page read and write
19624FF0000
heap
page read and write
16E49DB9000
heap
page read and write
DB0000
remote allocation
page read and write
11E5000
heap
page read and write
18002C000
direct allocation
page read and write
11E5000
heap
page read and write
FBAF4FE000
stack
page read and write
2B43000
heap
page read and write
16E49C8A000
heap
page read and write
16E4A623000
heap
page read and write
DD0000
direct allocation
page execute and read and write
DC5000
heap
page read and write
7FFD146E2000
unkown
page readonly
C7B000
stack
page read and write
16E4A613000
heap
page read and write
47D7C7E000
stack
page read and write
16E49C3C000
heap
page read and write
1201000
heap
page read and write
2F0BAFC3000
heap
page read and write
112F000
heap
page read and write
1929D665000
heap
page read and write
21C07E02000
trusted library allocation
page read and write
180F37A000
stack
page read and write
1139000
heap
page read and write
698000
heap
page read and write
ED0000
heap
page read and write
1929E002000
trusted library allocation
page read and write
7FFD146DE000
unkown
page read and write
2B38000
heap
page read and write
7FFD146E2000
unkown
page readonly
180F47F000
stack
page read and write
11E9000
heap
page read and write
CF2F27B000
stack
page read and write
BE0000
remote allocation
page read and write
2CBE903A000
heap
page read and write
10ED000
heap
page read and write
1220000
heap
page read and write
10DF000
heap
page read and write
126D000
heap
page read and write
D50000
heap
page read and write
FBAF2FE000
stack
page read and write
There are 710 hidden memdumps, click here to show them.