Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
3sbn8ZI5nn.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\3sbn8ZI5nn.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\3sbn8ZI5nn.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\3sbn8ZI5nn.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\3sbn8ZI5nn.dll,DllRegisterServer
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\RDczMDqHt\aAoqtcPuM.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\UYBDis\zUQXLCCaPRO.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\UyotLQPaxHMZcAcJw\vcAnFxvlnpwAYy.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\OkmLFCYLyqOEAi\VeCtOcqCU.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\RDczMDqHt\aAoqtcPuM.dll
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\CefliwalFHXv\dxxQ.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\3sbn8ZI5nn.dll",#1
|
||
C:\Program Files\Windows Defender\MpCmdRun.exe
|
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://172.105.115.71:8080/nyiusq/dopl/wsaloufw/hnwwqhclt/
|
unknown
|
||
https://172.105.115.71:8080/l
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.105.115.71
|
unknown
|
United States
|
||
188.165.79.151
|
unknown
|
France
|
||
196.44.98.190
|
unknown
|
Ghana
|
||
174.138.33.49
|
unknown
|
United States
|
||
36.67.23.59
|
unknown
|
Indonesia
|
||
103.41.204.169
|
unknown
|
Indonesia
|
||
85.214.67.203
|
unknown
|
Germany
|
||
83.229.80.93
|
unknown
|
United Kingdom
|
||
198.199.70.22
|
unknown
|
United States
|
||
93.104.209.107
|
unknown
|
Germany
|
||
186.250.48.5
|
unknown
|
Brazil
|
||
209.239.112.82
|
unknown
|
United States
|
||
175.126.176.79
|
unknown
|
Korea Republic of
|
||
128.199.242.164
|
unknown
|
United Kingdom
|
||
178.238.225.252
|
unknown
|
Germany
|
||
46.101.98.60
|
unknown
|
Netherlands
|
||
190.145.8.4
|
unknown
|
Colombia
|
||
82.98.180.154
|
unknown
|
Spain
|
||
103.71.99.57
|
unknown
|
India
|
||
87.106.97.83
|
unknown
|
Germany
|
||
103.254.12.236
|
unknown
|
Viet Nam
|
||
103.85.95.4
|
unknown
|
Indonesia
|
||
202.134.4.210
|
unknown
|
Indonesia
|
||
165.22.254.236
|
unknown
|
United States
|
||
78.47.204.80
|
unknown
|
Germany
|
||
118.98.72.86
|
unknown
|
Indonesia
|
||
139.59.80.108
|
unknown
|
Singapore
|
||
104.244.79.94
|
unknown
|
United States
|
||
37.44.244.177
|
unknown
|
Germany
|
||
51.75.33.122
|
unknown
|
France
|
||
160.16.143.191
|
unknown
|
Japan
|
||
103.56.149.105
|
unknown
|
Indonesia
|
||
85.25.120.45
|
unknown
|
Germany
|
||
139.196.72.155
|
unknown
|
China
|
||
115.178.55.22
|
unknown
|
Indonesia
|
||
103.126.216.86
|
unknown
|
Bangladesh
|
||
128.199.217.206
|
unknown
|
United Kingdom
|
||
114.79.130.68
|
unknown
|
India
|
||
103.224.241.74
|
unknown
|
India
|
||
210.57.209.142
|
unknown
|
Indonesia
|
||
202.28.34.99
|
unknown
|
Thailand
|
||
80.211.107.116
|
unknown
|
Italy
|
||
54.37.228.122
|
unknown
|
France
|
||
218.38.121.17
|
unknown
|
Korea Republic of
|
||
185.148.169.10
|
unknown
|
Germany
|
||
195.77.239.39
|
unknown
|
Spain
|
||
178.62.112.199
|
unknown
|
European Union
|
||
62.171.178.147
|
unknown
|
United Kingdom
|
||
64.227.55.231
|
unknown
|
United States
|
There are 39 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
aAoqtcPuM.dll
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
295089F0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
970000
|
direct allocation
|
page execute and read and write
|
||
16F02FF0000
|
direct allocation
|
page execute and read and write
|
||
20B0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
440000
|
direct allocation
|
page execute and read and write
|
||
13C72960000
|
direct allocation
|
page execute and read and write
|
||
283E303D000
|
heap
|
page read and write
|
||
2820000
|
heap
|
page read and write
|
||
BF2307C000
|
stack
|
page read and write
|
||
204E000
|
heap
|
page read and write
|
||
283E304E000
|
heap
|
page read and write
|
||
7A2717D000
|
stack
|
page read and write
|
||
BF22F7E000
|
stack
|
page read and write
|
||
1FA0000
|
heap
|
page read and write
|
||
8D5000
|
heap
|
page read and write
|
||
B3A000
|
stack
|
page read and write
|
||
865000
|
heap
|
page read and write
|
||
1B49763D000
|
heap
|
page read and write
|
||
531000
|
heap
|
page read and write
|
||
4CE000
|
heap
|
page read and write
|
||
512000
|
heap
|
page read and write
|
||
4DF000
|
heap
|
page read and write
|
||
FC7567C000
|
stack
|
page read and write
|
||
888000
|
heap
|
page read and write
|
||
F82A27C000
|
stack
|
page read and write
|
||
1B497689000
|
heap
|
page read and write
|
||
16F03112000
|
heap
|
page read and write
|
||
1FF5284A000
|
heap
|
page read and write
|
||
F8298EB000
|
stack
|
page read and write
|
||
532000
|
heap
|
page read and write
|
||
13C72780000
|
direct allocation
|
page execute and read and write
|
||
BF22ADC000
|
stack
|
page read and write
|
||
18A50A02000
|
heap
|
page read and write
|
||
257B000
|
stack
|
page read and write
|
||
EEF000
|
heap
|
page read and write
|
||
13C727F9000
|
heap
|
page read and write
|
||
2DAEBAE7000
|
heap
|
page read and write
|
||
7FFD14660000
|
unkown
|
page readonly
|
||
18A51270000
|
remote allocation
|
page read and write
|
||
1FF52800000
|
heap
|
page read and write
|
||
1B498100000
|
heap
|
page read and write
|
||
13C729D0000
|
trusted library allocation
|
page read and write
|
||
7FFD14660000
|
unkown
|
page readonly
|
||
7FFD146E5000
|
unkown
|
page readonly
|
||
26F0000
|
heap
|
page read and write
|
||
1B497643000
|
heap
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
5E8000
|
heap
|
page read and write
|
||
1B4981BD000
|
heap
|
page read and write
|
||
8B9EE7F000
|
stack
|
page read and write
|
||
1B4974C0000
|
heap
|
page read and write
|
||
593000
|
heap
|
page read and write
|
||
2DAEBA6E000
|
heap
|
page read and write
|
||
16F03020000
|
direct allocation
|
page execute and read and write
|
||
283E3061000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
8CD000
|
heap
|
page read and write
|
||
52C000
|
heap
|
page read and write
|
||
BBD000
|
heap
|
page read and write
|
||
2DAEC402000
|
heap
|
page read and write
|
||
7FFD14660000
|
unkown
|
page readonly
|
||
4DE000
|
heap
|
page read and write
|
||
60F0000
|
heap
|
page read and write
|
||
2079000
|
heap
|
page read and write
|
||
18A51270000
|
remote allocation
|
page read and write
|
||
2DAEBAE1000
|
heap
|
page read and write
|
||
16F03154000
|
heap
|
page read and write
|
||
593000
|
heap
|
page read and write
|
||
5B3000
|
heap
|
page read and write
|
||
2DAEBACA000
|
heap
|
page read and write
|
||
4F5000
|
heap
|
page read and write
|
||
F7D6FE000
|
stack
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
53B000
|
heap
|
page read and write
|
||
9C6000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
7FFD146E5000
|
unkown
|
page readonly
|
||
F06000
|
heap
|
page read and write
|
||
13C727E9000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
BC6000
|
heap
|
page read and write
|
||
16F03122000
|
heap
|
page read and write
|
||
857000
|
heap
|
page read and write
|
||
2950A4A0000
|
heap
|
page readonly
|
||
592000
|
heap
|
page read and write
|
||
320000
|
heap
|
page read and write
|
||
7B0000
|
remote allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
29508970000
|
heap
|
page read and write
|
||
9C5000
|
heap
|
page read and write
|
||
13C7282B000
|
heap
|
page read and write
|
||
525000
|
heap
|
page read and write
|
||
2063000
|
heap
|
page read and write
|
||
26702270000
|
heap
|
page read and write
|
||
13C741B0000
|
heap
|
page read and write
|
||
9C5000
|
heap
|
page read and write
|
||
56EF000
|
stack
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
26702200000
|
heap
|
page read and write
|
||
283E307A000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
588000
|
heap
|
page read and write
|
||
8B9F1FF000
|
stack
|
page read and write
|
||
2650000
|
remote allocation
|
page read and write
|
||
5FA000
|
heap
|
page read and write
|
||
18A50A13000
|
heap
|
page read and write
|
||
A1F1E79000
|
stack
|
page read and write
|
||
528000
|
heap
|
page read and write
|
||
7FFD14698000
|
unkown
|
page readonly
|
||
16F030EC000
|
heap
|
page read and write
|
||
857000
|
heap
|
page read and write
|
||
7FFD146DE000
|
unkown
|
page read and write
|
||
1B49762F000
|
heap
|
page read and write
|
||
7FFD146E5000
|
unkown
|
page readonly
|
||
4E2000
|
heap
|
page read and write
|
||
25AC000
|
stack
|
page read and write
|
||
262E000
|
stack
|
page read and write
|
||
23A9000
|
stack
|
page read and write
|
||
1B497600000
|
heap
|
page read and write
|
||
1B498143000
|
heap
|
page read and write
|
||
D0E000
|
stack
|
page read and write
|
||
1FF5283D000
|
heap
|
page read and write
|
||
1B497676000
|
heap
|
page read and write
|
||
875000
|
heap
|
page read and write
|
||
EFD000
|
heap
|
page read and write
|
||
1B497658000
|
heap
|
page read and write
|
||
1FF52902000
|
heap
|
page read and write
|
||
7FFD14660000
|
unkown
|
page readonly
|
||
1B4974D0000
|
heap
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
9DB7F7D000
|
stack
|
page read and write
|
||
13C72710000
|
heap
|
page read and write
|
||
29508A63000
|
heap
|
page read and write
|
||
8B0000
|
remote allocation
|
page read and write
|
||
13C741DD000
|
heap
|
page read and write
|
||
593000
|
heap
|
page read and write
|
||
1B4977B9000
|
heap
|
page read and write
|
||
27F1000
|
heap
|
page read and write
|
||
B95000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
998000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
1B49778E000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
5E8000
|
heap
|
page read and write
|
||
29508A8B000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
857000
|
heap
|
page read and write
|
||
4DC000
|
heap
|
page read and write
|
||
1B498202000
|
heap
|
page read and write
|
||
283E3054000
|
heap
|
page read and write
|
||
13C727E9000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
16F02E80000
|
heap
|
page read and write
|
||
27F1000
|
heap
|
page read and write
|
||
1FF53002000
|
trusted library allocation
|
page read and write
|
||
2DAEBB02000
|
heap
|
page read and write
|
||
283E304B000
|
heap
|
page read and write
|
||
512000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
50C000
|
heap
|
page read and write
|
||
BF22FFF000
|
stack
|
page read and write
|
||
4ED000
|
heap
|
page read and write
|
||
13C727C6000
|
heap
|
page read and write
|
||
202B000
|
heap
|
page read and write
|
||
283E304D000
|
heap
|
page read and write
|
||
26702C02000
|
trusted library allocation
|
page read and write
|
||
4ED000
|
heap
|
page read and write
|
||
16F03131000
|
heap
|
page read and write
|
||
5740000
|
trusted library allocation
|
page read and write
|
||
4CE000
|
heap
|
page read and write
|
||
2DAEB9B0000
|
heap
|
page read and write
|
||
7A26C7B000
|
stack
|
page read and write
|
||
BBD000
|
heap
|
page read and write
|
||
8B9EFF9000
|
stack
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
1B49823B000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
4DE000
|
heap
|
page read and write
|
||
16F030C3000
|
heap
|
page read and write
|
||
283E3000000
|
heap
|
page read and write
|
||
283E304F000
|
heap
|
page read and write
|
||
F0C000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
2DAEBAC1000
|
heap
|
page read and write
|
||
1B497684000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
85C000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
283E3046000
|
heap
|
page read and write
|
||
9B5000
|
heap
|
page read and write
|
||
59D000
|
heap
|
page read and write
|
||
7A272FD000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
283E3029000
|
heap
|
page read and write
|
||
1FE9000
|
heap
|
page read and write
|
||
7A26F7E000
|
stack
|
page read and write
|
||
5D0000
|
remote allocation
|
page read and write
|
||
7FFD146E5000
|
unkown
|
page readonly
|
||
A1F1F7F000
|
stack
|
page read and write
|
||
1FDC000
|
heap
|
page read and write
|
||
1B498002000
|
heap
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
29508A50000
|
heap
|
page read and write
|
||
BF22EF7000
|
stack
|
page read and write
|
||
283E3079000
|
heap
|
page read and write
|
||
5D0000
|
remote allocation
|
page read and write
|
||
7A26EFE000
|
stack
|
page read and write
|
||
1FF52829000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
9BD000
|
heap
|
page read and write
|
||
BF22E7C000
|
stack
|
page read and write
|
||
7FFD146E2000
|
unkown
|
page readonly
|
||
AD6CFE000
|
stack
|
page read and write
|
||
FC758FE000
|
stack
|
page read and write
|
||
16F03112000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
283E3030000
|
heap
|
page read and write
|
||
F829E7E000
|
stack
|
page read and write
|
||
5CE000
|
heap
|
page read and write
|
||
7FFD146E7000
|
unkown
|
page readonly
|
||
B60000
|
remote allocation
|
page read and write
|
||
7FFD146E7000
|
unkown
|
page readonly
|
||
26702213000
|
heap
|
page read and write
|
||
201E000
|
stack
|
page read and write
|
||
26702190000
|
heap
|
page read and write
|
||
16F030DC000
|
heap
|
page read and write
|
||
F21000
|
heap
|
page read and write
|
||
FC759FE000
|
stack
|
page read and write
|
||
AD6EFE000
|
stack
|
page read and write
|
||
59D000
|
heap
|
page read and write
|
||
8CD000
|
heap
|
page read and write
|
||
4F5000
|
heap
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
7FFD146E5000
|
unkown
|
page readonly
|
||
16F03142000
|
heap
|
page read and write
|
||
4E5000
|
heap
|
page read and write
|
||
53B000
|
heap
|
page read and write
|
||
1B498154000
|
heap
|
page read and write
|
||
13C7281A000
|
heap
|
page read and write
|
||
F82A37E000
|
stack
|
page read and write
|
||
50F000
|
heap
|
page read and write
|
||
F82A17B000
|
stack
|
page read and write
|
||
283E3062000
|
heap
|
page read and write
|
||
2DAEB950000
|
heap
|
page read and write
|
||
2670225F000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
18A50A3D000
|
heap
|
page read and write
|
||
29508A20000
|
heap
|
page read and write
|
||
1FB0000
|
heap
|
page read and write
|
||
26702302000
|
heap
|
page read and write
|
||
18A50A24000
|
heap
|
page read and write
|
||
8B9ED7A000
|
stack
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
87F000
|
heap
|
page read and write
|
||
283E2F00000
|
heap
|
page read and write
|
||
7FFD146E2000
|
unkown
|
page readonly
|
||
26F3000
|
heap
|
page read and write
|
||
13C727B8000
|
heap
|
page read and write
|
||
89A000
|
stack
|
page read and write
|
||
8B9F47E000
|
stack
|
page read and write
|
||
F7D679000
|
stack
|
page read and write
|
||
1B497613000
|
heap
|
page read and write
|
||
532000
|
heap
|
page read and write
|
||
232E000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
283E307D000
|
heap
|
page read and write
|
||
9A0000
|
heap
|
page readonly
|
||
18002B000
|
direct allocation
|
page readonly
|
||
D8C000
|
heap
|
page read and write
|
||
13C727FF000
|
heap
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
283E37A0000
|
trusted library allocation
|
page read and write
|
||
16F03165000
|
heap
|
page read and write
|
||
267021C0000
|
trusted library allocation
|
page read and write
|
||
8D5000
|
heap
|
page read and write
|
||
CB000
|
stack
|
page read and write
|
||
283E306A000
|
heap
|
page read and write
|
||
868000
|
heap
|
page read and write
|
||
1B498223000
|
heap
|
page read and write
|
||
283E3042000
|
heap
|
page read and write
|
||
59D000
|
heap
|
page read and write
|
||
576E000
|
stack
|
page read and write
|
||
8A8000
|
heap
|
page read and write
|
||
13C72806000
|
heap
|
page read and write
|
||
BF22BDF000
|
stack
|
page read and write
|
||
593000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
13C72798000
|
heap
|
page read and write
|
||
4E5000
|
heap
|
page read and write
|
||
1B498190000
|
heap
|
page read and write
|
||
4CE000
|
heap
|
page read and write
|
||
29508A3F000
|
heap
|
page read and write
|
||
1F80000
|
direct allocation
|
page execute and read and write
|
||
532000
|
heap
|
page read and write
|
||
1FF52660000
|
heap
|
page read and write
|
||
283E3066000
|
heap
|
page read and write
|
||
BDC000
|
heap
|
page read and write
|
||
1B498102000
|
heap
|
page read and write
|
||
89A000
|
heap
|
page read and write
|
||
2DAEBA2A000
|
heap
|
page read and write
|
||
1B498200000
|
heap
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
295089B0000
|
heap
|
page read and write
|
||
2DAEBAB9000
|
heap
|
page read and write
|
||
591000
|
heap
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
1FF52802000
|
heap
|
page read and write
|
||
2373000
|
heap
|
page read and write
|
||
18A51270000
|
remote allocation
|
page read and write
|
||
1B497681000
|
heap
|
page read and write
|
||
9DB887F000
|
stack
|
page read and write
|
||
7FFD146E2000
|
unkown
|
page readonly
|
||
9B0000
|
trusted library allocation
|
page read and write
|
||
2950A490000
|
direct allocation
|
page execute and read and write
|
||
59D000
|
heap
|
page read and write
|
||
242E000
|
stack
|
page read and write
|
||
F829CFC000
|
stack
|
page read and write
|
||
1F90000
|
heap
|
page readonly
|
||
1B498227000
|
heap
|
page read and write
|
||
16F03112000
|
heap
|
page read and write
|
||
1FF5282F000
|
heap
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
13C72A00000
|
heap
|
page read and write
|
||
525000
|
heap
|
page read and write
|
||
2097000
|
stack
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
7FFD14661000
|
unkown
|
page execute read
|
||
590000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
F21000
|
heap
|
page read and write
|
||
2DAEB9E0000
|
trusted library allocation
|
page read and write
|
||
1FF52843000
|
heap
|
page read and write
|
||
7FFD14661000
|
unkown
|
page execute read
|
||
58F0000
|
trusted library allocation
|
page read and write
|
||
2DAEBA13000
|
heap
|
page read and write
|
||
16F030B0000
|
heap
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
205B000
|
heap
|
page read and write
|
||
4F5000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
7FFD146DE000
|
unkown
|
page read and write
|
||
525000
|
heap
|
page read and write
|
||
3D6E000
|
stack
|
page read and write
|
||
EF5000
|
heap
|
page read and write
|
||
7A271FE000
|
stack
|
page read and write
|
||
2DAEBA00000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
4E5000
|
heap
|
page read and write
|
||
8B9EF7B000
|
stack
|
page read and write
|
||
F829FFC000
|
stack
|
page read and write
|
||
2843000
|
heap
|
page read and write
|
||
7FFD14660000
|
unkown
|
page readonly
|
||
589000
|
heap
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
283E3055000
|
heap
|
page read and write
|
||
29508A28000
|
heap
|
page read and write
|
||
59D000
|
heap
|
page read and write
|
||
277E000
|
stack
|
page read and write
|
||
AD70F9000
|
stack
|
page read and write
|
||
5B8000
|
heap
|
page read and write
|
||
86E000
|
heap
|
page read and write
|
||
593000
|
heap
|
page read and write
|
||
2811000
|
heap
|
page read and write
|
||
480000
|
remote allocation
|
page read and write
|
||
4F3000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
59D000
|
heap
|
page read and write
|
||
5D8000
|
heap
|
page read and write
|
||
4F5000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
283E2E90000
|
heap
|
page read and write
|
||
2DAEBA24000
|
heap
|
page read and write
|
||
1FF52846000
|
heap
|
page read and write
|
||
283E306C000
|
heap
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
A1F197B000
|
stack
|
page read and write
|
||
26702240000
|
heap
|
page read and write
|
||
495000
|
heap
|
page read and write
|
||
9DB867E000
|
stack
|
page read and write
|
||
2DAEB940000
|
heap
|
page read and write
|
||
1B498230000
|
heap
|
page read and write
|
||
13C72A05000
|
heap
|
page read and write
|
||
7FB000
|
heap
|
page read and write
|
||
7FFD14698000
|
unkown
|
page readonly
|
||
9DB827D000
|
stack
|
page read and write
|
||
8D6000
|
heap
|
page read and write
|
||
283E3047000
|
heap
|
page read and write
|
||
9DB807F000
|
stack
|
page read and write
|
||
5AE000
|
heap
|
page read and write
|
||
7FFD14661000
|
unkown
|
page execute read
|
||
8AB000
|
heap
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
283E3076000
|
heap
|
page read and write
|
||
16F03131000
|
heap
|
page read and write
|
||
13C727BD000
|
heap
|
page read and write
|
||
283E3040000
|
heap
|
page read and write
|
||
52B000
|
heap
|
page read and write
|
||
16F03050000
|
trusted library allocation
|
page read and write
|
||
9DB857F000
|
stack
|
page read and write
|
||
1B497678000
|
heap
|
page read and write
|
||
2670225A000
|
heap
|
page read and write
|
||
47B000
|
stack
|
page read and write
|
||
29508900000
|
heap
|
page read and write
|
||
D85000
|
heap
|
page read and write
|
||
5A9000
|
stack
|
page read and write
|
||
512000
|
heap
|
page read and write
|
||
16F04B05000
|
heap
|
page read and write
|
||
27C8000
|
heap
|
page read and write
|
||
2811000
|
heap
|
page read and write
|
||
56DE000
|
stack
|
page read and write
|
||
283E2EA0000
|
heap
|
page read and write
|
||
26702276000
|
heap
|
page read and write
|
||
16F03112000
|
heap
|
page read and write
|
||
7FFD146E2000
|
unkown
|
page readonly
|
||
13C727F6000
|
heap
|
page read and write
|
||
EF5000
|
heap
|
page read and write
|
||
21E0000
|
trusted library allocation
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
2950A5A0000
|
trusted library allocation
|
page read and write
|
||
59D000
|
heap
|
page read and write
|
||
1B497655000
|
heap
|
page read and write
|
||
16F030D7000
|
heap
|
page read and write
|
||
26EF000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
16F0311F000
|
heap
|
page read and write
|
||
29508A79000
|
heap
|
page read and write
|
||
BF22B5E000
|
stack
|
page read and write
|
||
8CD000
|
heap
|
page read and write
|
||
7FFD146DE000
|
unkown
|
page read and write
|
||
1B498230000
|
heap
|
page read and write
|
||
283E3802000
|
trusted library allocation
|
page read and write
|
||
4F3000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
283E305F000
|
heap
|
page read and write
|
||
18A509A0000
|
heap
|
page read and write
|
||
18A50A00000
|
heap
|
page read and write
|
||
16F030E4000
|
heap
|
page read and write
|
||
1B49816F000
|
heap
|
page read and write
|
||
1B497690000
|
heap
|
page read and write
|
||
18A50930000
|
heap
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
50C000
|
heap
|
page read and write
|
||
13C727AF000
|
heap
|
page read and write
|
||
B8E000
|
stack
|
page read and write
|
||
B9C000
|
heap
|
page read and write
|
||
1FF52813000
|
heap
|
page read and write
|
||
1EA0000
|
heap
|
page read and write
|
||
1B498122000
|
heap
|
page read and write
|
||
283E3083000
|
heap
|
page read and write
|
||
7FFD146DE000
|
unkown
|
page read and write
|
||
857000
|
heap
|
page read and write
|
||
283E3064000
|
heap
|
page read and write
|
||
7FFD146E7000
|
unkown
|
page readonly
|
||
8B9F0FA000
|
stack
|
page read and write
|
||
BBD000
|
heap
|
page read and write
|
||
7FFD146E2000
|
unkown
|
page readonly
|
||
18002D000
|
direct allocation
|
page readonly
|
||
593000
|
heap
|
page read and write
|
||
3DB000
|
stack
|
page read and write
|
||
4E8000
|
heap
|
page read and write
|
||
F82A57E000
|
stack
|
page read and write
|
||
7FFD14661000
|
unkown
|
page execute read
|
||
9B0000
|
trusted library allocation
|
page read and write
|
||
29508A76000
|
heap
|
page read and write
|
||
50C000
|
heap
|
page read and write
|
||
50C000
|
heap
|
page read and write
|
||
AD6DFE000
|
stack
|
page read and write
|
||
9DB837D000
|
stack
|
page read and write
|
||
283E3049000
|
heap
|
page read and write
|
||
F82A0FE000
|
stack
|
page read and write
|
||
26702130000
|
heap
|
page read and write
|
||
21B0000
|
heap
|
page read and write
|
||
F7D4FF000
|
stack
|
page read and write
|
||
7FFD146E2000
|
unkown
|
page readonly
|
||
4A8000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
5BF000
|
heap
|
page read and write
|
||
9BD000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
50C000
|
heap
|
page read and write
|
||
7DF000
|
stack
|
page read and write
|
||
59D000
|
heap
|
page read and write
|
||
16F0312F000
|
heap
|
page read and write
|
||
8B0000
|
remote allocation
|
page read and write
|
||
8B9E94B000
|
stack
|
page read and write
|
||
9DB847F000
|
stack
|
page read and write
|
||
7FFD14698000
|
unkown
|
page readonly
|
||
7FFD14661000
|
unkown
|
page execute read
|
||
1B49766D000
|
heap
|
page read and write
|
||
EFD000
|
heap
|
page read and write
|
||
96F000
|
stack
|
page read and write
|
||
18A50B02000
|
heap
|
page read and write
|
||
857000
|
heap
|
page read and write
|
||
16F03112000
|
heap
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
7FFD14698000
|
unkown
|
page readonly
|
||
508000
|
heap
|
page read and write
|
||
7FFD146E7000
|
unkown
|
page readonly
|
||
5AE000
|
heap
|
page read and write
|
||
13C74320000
|
heap
|
page read and write
|
||
2430000
|
heap
|
page read and write
|
||
2057000
|
heap
|
page read and write
|
||
4ED000
|
heap
|
page read and write
|
||
857000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
26702120000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
26EC000
|
stack
|
page read and write
|
||
9C5000
|
heap
|
page read and write
|
||
283E3069000
|
heap
|
page read and write
|
||
29508A79000
|
heap
|
page read and write
|
||
16F0313A000
|
heap
|
page read and write
|
||
18A51402000
|
trusted library allocation
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
525000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
16F030ED000
|
heap
|
page read and write
|
||
16F04950000
|
heap
|
page read and write
|
||
51E000
|
stack
|
page read and write
|
||
593000
|
heap
|
page read and write
|
||
4ED000
|
heap
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
13C72990000
|
heap
|
page readonly
|
||
F03000
|
heap
|
page read and write
|
||
512000
|
heap
|
page read and write
|
||
1FF52852000
|
heap
|
page read and write
|
||
1B4981D1000
|
heap
|
page read and write
|
||
13C72808000
|
heap
|
page read and write
|
||
13C727E9000
|
heap
|
page read and write
|
||
13C726A0000
|
heap
|
page read and write
|
||
BB6000
|
heap
|
page read and write
|
||
211E000
|
stack
|
page read and write
|
||
4F5000
|
heap
|
page read and write
|
||
532000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
9E1000
|
heap
|
page read and write
|
||
2950A5A0000
|
trusted library allocation
|
page read and write
|
||
29508A3F000
|
heap
|
page read and write
|
||
A05000
|
heap
|
page read and write
|
||
FC75BFE000
|
stack
|
page read and write
|
||
13C727BD000
|
heap
|
page read and write
|
||
9DB79BC000
|
stack
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
1B497629000
|
heap
|
page read and write
|
||
24FF000
|
stack
|
page read and write
|
||
8B9F2FE000
|
stack
|
page read and write
|
||
A1F217C000
|
stack
|
page read and write
|
||
16F0497C000
|
heap
|
page read and write
|
||
1ECC000
|
heap
|
page read and write
|
||
565F000
|
stack
|
page read and write
|
||
525000
|
heap
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
3B4E000
|
stack
|
page read and write
|
||
283E3013000
|
heap
|
page read and write
|
||
81F000
|
heap
|
page read and write
|
||
7FFD146E5000
|
unkown
|
page readonly
|
||
16F02FC0000
|
heap
|
page read and write
|
||
888000
|
heap
|
page read and write
|
||
4DA000
|
heap
|
page read and write
|
||
5C7000
|
heap
|
page read and write
|
||
1FF5284C000
|
heap
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
FC7577E000
|
stack
|
page read and write
|
||
2950A3BC000
|
heap
|
page read and write
|
||
204E000
|
heap
|
page read and write
|
||
520000
|
trusted library allocation
|
page read and write
|
||
283E3096000
|
heap
|
page read and write
|
||
18A50940000
|
heap
|
page read and write
|
||
1B4977E5000
|
heap
|
page read and write
|
||
7FFD14661000
|
unkown
|
page execute read
|
||
9DB877E000
|
stack
|
page read and write
|
||
2DAEBA3E000
|
heap
|
page read and write
|
||
59D000
|
heap
|
page read and write
|
||
1B497713000
|
heap
|
page read and write
|
||
13C72811000
|
heap
|
page read and write
|
||
9AF000
|
heap
|
page read and write
|
||
52E000
|
heap
|
page read and write
|
||
26702313000
|
heap
|
page read and write
|
||
2DAEC532000
|
heap
|
page read and write
|
||
13C729D0000
|
trusted library allocation
|
page read and write
|
||
1B498213000
|
heap
|
page read and write
|
||
1B49765B000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
1B49766F000
|
heap
|
page read and write
|
||
53B000
|
heap
|
page read and write
|
||
1B4981C7000
|
heap
|
page read and write
|
||
51A000
|
heap
|
page read and write
|
||
592000
|
heap
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
8D5000
|
heap
|
page read and write
|
||
F7D57F000
|
stack
|
page read and write
|
||
21E0000
|
trusted library allocation
|
page read and write
|
||
283E3102000
|
heap
|
page read and write
|
||
8C6000
|
heap
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
59D000
|
heap
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
2453000
|
heap
|
page read and write
|
||
F829F7F000
|
stack
|
page read and write
|
||
26702202000
|
heap
|
page read and write
|
||
7B0000
|
remote allocation
|
page read and write
|
||
200E000
|
heap
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
480000
|
remote allocation
|
page read and write
|
||
283E3045000
|
heap
|
page read and write
|
||
B60000
|
remote allocation
|
page read and write
|
||
BD5000
|
heap
|
page read and write
|
||
2DAEBA87000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
277F000
|
stack
|
page read and write
|
||
512000
|
heap
|
page read and write
|
||
18A50A5C000
|
heap
|
page read and write
|
||
ED8000
|
heap
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
2DAEBA68000
|
heap
|
page read and write
|
||
13C727E9000
|
heap
|
page read and write
|
||
26702224000
|
heap
|
page read and write
|
||
1B498122000
|
heap
|
page read and write
|
||
2500000
|
heap
|
page read and write
|
||
27ED000
|
stack
|
page read and write
|
||
13C727E9000
|
heap
|
page read and write
|
||
F7D5FE000
|
stack
|
page read and write
|
||
4ED000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
13C72808000
|
heap
|
page read and write
|
||
1E9E000
|
stack
|
page read and write
|
||
2530000
|
trusted library allocation
|
page read and write
|
||
16F03112000
|
heap
|
page read and write
|
||
13C72730000
|
heap
|
page read and write
|
||
A1F207F000
|
stack
|
page read and write
|
||
480000
|
heap
|
page readonly
|
||
215C000
|
stack
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
16F03050000
|
trusted library allocation
|
page read and write
|
||
2650000
|
remote allocation
|
page read and write
|
||
16F030B8000
|
heap
|
page read and write
|
||
9BD000
|
heap
|
page read and write
|
||
B98000
|
heap
|
page read and write
|
||
2950A390000
|
heap
|
page read and write
|
||
A79000
|
stack
|
page read and write
|
||
EFD000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
7FFD146E7000
|
unkown
|
page readonly
|
||
7FFD14698000
|
unkown
|
page readonly
|
||
B90000
|
heap
|
page read and write
|
||
295089A0000
|
heap
|
page read and write
|
||
508000
|
heap
|
page read and write
|
||
283E3039000
|
heap
|
page read and write
|
||
295089A5000
|
heap
|
page read and write
|
||
16F030DF000
|
heap
|
page read and write
|
||
20A3000
|
heap
|
page read and write
|
||
16F03030000
|
heap
|
page read and write
|
||
5AE000
|
heap
|
page read and write
|
||
AD695C000
|
stack
|
page read and write
|
||
2670228A000
|
heap
|
page read and write
|
||
2982000
|
heap
|
page read and write
|
||
4E6000
|
heap
|
page read and write
|
||
FC75AFE000
|
stack
|
page read and write
|
||
7FFD146E7000
|
unkown
|
page readonly
|
||
2350000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
7FFD14698000
|
unkown
|
page readonly
|
||
21DB000
|
stack
|
page read and write
|
||
1B497530000
|
heap
|
page read and write
|
||
53B000
|
heap
|
page read and write
|
||
4E8000
|
heap
|
page read and write
|
||
7FFD146DE000
|
unkown
|
page read and write
|
||
9DB7DFB000
|
stack
|
page read and write
|
||
8B9F37F000
|
stack
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
AD6FFE000
|
stack
|
page read and write
|
||
1FF52848000
|
heap
|
page read and write
|
||
2530000
|
trusted library allocation
|
page read and write
|
||
1FF52650000
|
heap
|
page read and write
|
||
18A509D0000
|
trusted library allocation
|
page read and write
|
||
1B4981AF000
|
heap
|
page read and write
|
||
2450000
|
heap
|
page read and write
|
||
27C8000
|
heap
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
52B000
|
heap
|
page read and write
|
||
2DAEBB13000
|
heap
|
page read and write
|
||
1FF527B0000
|
trusted library allocation
|
page read and write
|
||
520000
|
trusted library allocation
|
page read and write
|
||
1B497580000
|
trusted library allocation
|
page read and write
|
||
470000
|
direct allocation
|
page execute and read and write
|
||
575000
|
heap
|
page read and write
|
||
7FFD14660000
|
unkown
|
page readonly
|
||
13C72790000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
58E0000
|
trusted library allocation
|
page read and write
|
||
29508A3F000
|
heap
|
page read and write
|
||
200D000
|
heap
|
page read and write
|
||
16F04AB0000
|
heap
|
page read and write
|
||
2DAEC500000
|
heap
|
page read and write
|
||
F82A47C000
|
stack
|
page read and write
|
||
2950A5D0000
|
heap
|
page read and write
|
||
F06000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
16F04B00000
|
heap
|
page read and write
|
||
7E0000
|
direct allocation
|
page execute and read and write
|
||
F02000
|
heap
|
page read and write
|
||
FC756FE000
|
stack
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
7FFD146DE000
|
unkown
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
16F03128000
|
heap
|
page read and write
|
||
7A2737C000
|
stack
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
1B497560000
|
trusted library allocation
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
EFD000
|
heap
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
F7D47C000
|
stack
|
page read and write
|
||
2650000
|
remote allocation
|
page read and write
|
||
1FF526B0000
|
heap
|
page read and write
|
There are 723 hidden memdumps, click here to show them.