IOC Report
3sbn8ZI5nn.exe

loading gif

Files

File Path
Type
Category
Malicious
3sbn8ZI5nn.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\3sbn8ZI5nn.dll"
malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\3sbn8ZI5nn.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\3sbn8ZI5nn.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\3sbn8ZI5nn.dll,DllRegisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\RDczMDqHt\aAoqtcPuM.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\UYBDis\zUQXLCCaPRO.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\UyotLQPaxHMZcAcJw\vcAnFxvlnpwAYy.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\OkmLFCYLyqOEAi\VeCtOcqCU.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\RDczMDqHt\aAoqtcPuM.dll
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\CefliwalFHXv\dxxQ.dll"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\3sbn8ZI5nn.dll",#1
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://172.105.115.71:8080/nyiusq/dopl/wsaloufw/hnwwqhclt/
unknown
https://172.105.115.71:8080/l
unknown

IPs

IP
Domain
Country
Malicious
172.105.115.71
unknown
United States
malicious
188.165.79.151
unknown
France
malicious
196.44.98.190
unknown
Ghana
malicious
174.138.33.49
unknown
United States
malicious
36.67.23.59
unknown
Indonesia
malicious
103.41.204.169
unknown
Indonesia
malicious
85.214.67.203
unknown
Germany
malicious
83.229.80.93
unknown
United Kingdom
malicious
198.199.70.22
unknown
United States
malicious
93.104.209.107
unknown
Germany
malicious
186.250.48.5
unknown
Brazil
malicious
209.239.112.82
unknown
United States
malicious
175.126.176.79
unknown
Korea Republic of
malicious
128.199.242.164
unknown
United Kingdom
malicious
178.238.225.252
unknown
Germany
malicious
46.101.98.60
unknown
Netherlands
malicious
190.145.8.4
unknown
Colombia
malicious
82.98.180.154
unknown
Spain
malicious
103.71.99.57
unknown
India
malicious
87.106.97.83
unknown
Germany
malicious
103.254.12.236
unknown
Viet Nam
malicious
103.85.95.4
unknown
Indonesia
malicious
202.134.4.210
unknown
Indonesia
malicious
165.22.254.236
unknown
United States
malicious
78.47.204.80
unknown
Germany
malicious
118.98.72.86
unknown
Indonesia
malicious
139.59.80.108
unknown
Singapore
malicious
104.244.79.94
unknown
United States
malicious
37.44.244.177
unknown
Germany
malicious
51.75.33.122
unknown
France
malicious
160.16.143.191
unknown
Japan
malicious
103.56.149.105
unknown
Indonesia
malicious
85.25.120.45
unknown
Germany
malicious
139.196.72.155
unknown
China
malicious
115.178.55.22
unknown
Indonesia
malicious
103.126.216.86
unknown
Bangladesh
malicious
128.199.217.206
unknown
United Kingdom
malicious
114.79.130.68
unknown
India
malicious
103.224.241.74
unknown
India
malicious
210.57.209.142
unknown
Indonesia
malicious
202.28.34.99
unknown
Thailand
malicious
80.211.107.116
unknown
Italy
malicious
54.37.228.122
unknown
France
malicious
218.38.121.17
unknown
Korea Republic of
malicious
185.148.169.10
unknown
Germany
malicious
195.77.239.39
unknown
Spain
malicious
178.62.112.199
unknown
European Union
malicious
62.171.178.147
unknown
United Kingdom
malicious
64.227.55.231
unknown
United States
malicious
There are 39 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
aAoqtcPuM.dll
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
295089F0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
970000
direct allocation
page execute and read and write
malicious
16F02FF0000
direct allocation
page execute and read and write
malicious
20B0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
440000
direct allocation
page execute and read and write
malicious
13C72960000
direct allocation
page execute and read and write
malicious
283E303D000
heap
page read and write
2820000
heap
page read and write
BF2307C000
stack
page read and write
204E000
heap
page read and write
283E304E000
heap
page read and write
7A2717D000
stack
page read and write
BF22F7E000
stack
page read and write
1FA0000
heap
page read and write
8D5000
heap
page read and write
B3A000
stack
page read and write
865000
heap
page read and write
1B49763D000
heap
page read and write
531000
heap
page read and write
4CE000
heap
page read and write
512000
heap
page read and write
4DF000
heap
page read and write
FC7567C000
stack
page read and write
888000
heap
page read and write
F82A27C000
stack
page read and write
1B497689000
heap
page read and write
16F03112000
heap
page read and write
1FF5284A000
heap
page read and write
F8298EB000
stack
page read and write
532000
heap
page read and write
13C72780000
direct allocation
page execute and read and write
BF22ADC000
stack
page read and write
18A50A02000
heap
page read and write
257B000
stack
page read and write
EEF000
heap
page read and write
13C727F9000
heap
page read and write
2DAEBAE7000
heap
page read and write
7FFD14660000
unkown
page readonly
18A51270000
remote allocation
page read and write
1FF52800000
heap
page read and write
1B498100000
heap
page read and write
13C729D0000
trusted library allocation
page read and write
7FFD14660000
unkown
page readonly
7FFD146E5000
unkown
page readonly
26F0000
heap
page read and write
1B497643000
heap
page read and write
575000
heap
page read and write
A90000
heap
page read and write
9E0000
heap
page read and write
5E8000
heap
page read and write
1B4981BD000
heap
page read and write
8B9EE7F000
stack
page read and write
1B4974C0000
heap
page read and write
593000
heap
page read and write
2DAEBA6E000
heap
page read and write
16F03020000
direct allocation
page execute and read and write
283E3061000
heap
page read and write
1D0000
heap
page read and write
8CD000
heap
page read and write
52C000
heap
page read and write
BBD000
heap
page read and write
2DAEC402000
heap
page read and write
7FFD14660000
unkown
page readonly
4DE000
heap
page read and write
60F0000
heap
page read and write
2079000
heap
page read and write
18A51270000
remote allocation
page read and write
2DAEBAE1000
heap
page read and write
16F03154000
heap
page read and write
593000
heap
page read and write
5B3000
heap
page read and write
2DAEBACA000
heap
page read and write
4F5000
heap
page read and write
F7D6FE000
stack
page read and write
18002C000
direct allocation
page read and write
53B000
heap
page read and write
9C6000
heap
page read and write
B70000
heap
page read and write
7FFD146E5000
unkown
page readonly
F06000
heap
page read and write
13C727E9000
heap
page read and write
850000
heap
page read and write
BC6000
heap
page read and write
16F03122000
heap
page read and write
857000
heap
page read and write
2950A4A0000
heap
page readonly
592000
heap
page read and write
320000
heap
page read and write
7B0000
remote allocation
page read and write
690000
heap
page read and write
29508970000
heap
page read and write
9C5000
heap
page read and write
13C7282B000
heap
page read and write
525000
heap
page read and write
2063000
heap
page read and write
26702270000
heap
page read and write
13C741B0000
heap
page read and write
9C5000
heap
page read and write
56EF000
stack
page read and write
7F0000
heap
page read and write
26702200000
heap
page read and write
283E307A000
heap
page read and write
6E0000
heap
page read and write
588000
heap
page read and write
8B9F1FF000
stack
page read and write
2650000
remote allocation
page read and write
5FA000
heap
page read and write
18A50A13000
heap
page read and write
A1F1E79000
stack
page read and write
528000
heap
page read and write
7FFD14698000
unkown
page readonly
16F030EC000
heap
page read and write
857000
heap
page read and write
7FFD146DE000
unkown
page read and write
1B49762F000
heap
page read and write
7FFD146E5000
unkown
page readonly
4E2000
heap
page read and write
25AC000
stack
page read and write
262E000
stack
page read and write
23A9000
stack
page read and write
1B497600000
heap
page read and write
1B498143000
heap
page read and write
D0E000
stack
page read and write
1FF5283D000
heap
page read and write
1B497676000
heap
page read and write
875000
heap
page read and write
EFD000
heap
page read and write
1B497658000
heap
page read and write
1FF52902000
heap
page read and write
7FFD14660000
unkown
page readonly
1B4974D0000
heap
page read and write
4A0000
heap
page read and write
9DB7F7D000
stack
page read and write
13C72710000
heap
page read and write
29508A63000
heap
page read and write
8B0000
remote allocation
page read and write
13C741DD000
heap
page read and write
593000
heap
page read and write
1B4977B9000
heap
page read and write
27F1000
heap
page read and write
B95000
heap
page read and write
EF0000
heap
page read and write
18002D000
direct allocation
page readonly
998000
heap
page read and write
8A0000
heap
page read and write
1B49778E000
heap
page read and write
590000
heap
page read and write
5E8000
heap
page read and write
29508A8B000
heap
page read and write
850000
heap
page read and write
857000
heap
page read and write
4DC000
heap
page read and write
1B498202000
heap
page read and write
283E3054000
heap
page read and write
13C727E9000
heap
page read and write
5E0000
heap
page read and write
16F02E80000
heap
page read and write
27F1000
heap
page read and write
1FF53002000
trusted library allocation
page read and write
2DAEBB02000
heap
page read and write
283E304B000
heap
page read and write
512000
heap
page read and write
18002C000
direct allocation
page read and write
50C000
heap
page read and write
BF22FFF000
stack
page read and write
4ED000
heap
page read and write
13C727C6000
heap
page read and write
202B000
heap
page read and write
283E304D000
heap
page read and write
26702C02000
trusted library allocation
page read and write
4ED000
heap
page read and write
16F03131000
heap
page read and write
5740000
trusted library allocation
page read and write
4CE000
heap
page read and write
2DAEB9B0000
heap
page read and write
7A26C7B000
stack
page read and write
BBD000
heap
page read and write
8B9EFF9000
stack
page read and write
1A0000
heap
page read and write
1B49823B000
heap
page read and write
18002B000
direct allocation
page readonly
4DE000
heap
page read and write
16F030C3000
heap
page read and write
283E3000000
heap
page read and write
283E304F000
heap
page read and write
F0C000
heap
page read and write
700000
heap
page read and write
2DAEBAC1000
heap
page read and write
1B497684000
heap
page read and write
8C0000
heap
page read and write
85C000
heap
page read and write
7C0000
heap
page read and write
283E3046000
heap
page read and write
9B5000
heap
page read and write
59D000
heap
page read and write
7A272FD000
stack
page read and write
180000000
direct allocation
page read and write
283E3029000
heap
page read and write
1FE9000
heap
page read and write
7A26F7E000
stack
page read and write
5D0000
remote allocation
page read and write
7FFD146E5000
unkown
page readonly
A1F1F7F000
stack
page read and write
1FDC000
heap
page read and write
1B498002000
heap
page read and write
56E0000
trusted library allocation
page read and write
29508A50000
heap
page read and write
BF22EF7000
stack
page read and write
283E3079000
heap
page read and write
5D0000
remote allocation
page read and write
7A26EFE000
stack
page read and write
1FF52829000
heap
page read and write
580000
heap
page read and write
9BD000
heap
page read and write
BF22E7C000
stack
page read and write
7FFD146E2000
unkown
page readonly
AD6CFE000
stack
page read and write
FC758FE000
stack
page read and write
16F03112000
heap
page read and write
A80000
heap
page read and write
283E3030000
heap
page read and write
F829E7E000
stack
page read and write
5CE000
heap
page read and write
7FFD146E7000
unkown
page readonly
B60000
remote allocation
page read and write
7FFD146E7000
unkown
page readonly
26702213000
heap
page read and write
201E000
stack
page read and write
26702190000
heap
page read and write
16F030DC000
heap
page read and write
F21000
heap
page read and write
FC759FE000
stack
page read and write
AD6EFE000
stack
page read and write
59D000
heap
page read and write
8CD000
heap
page read and write
4F5000
heap
page read and write
D40000
heap
page read and write
7FFD146E5000
unkown
page readonly
16F03142000
heap
page read and write
4E5000
heap
page read and write
53B000
heap
page read and write
1B498154000
heap
page read and write
13C7281A000
heap
page read and write
F82A37E000
stack
page read and write
50F000
heap
page read and write
F82A17B000
stack
page read and write
283E3062000
heap
page read and write
2DAEB950000
heap
page read and write
2670225F000
heap
page read and write
18002B000
direct allocation
page readonly
18A50A3D000
heap
page read and write
29508A20000
heap
page read and write
1FB0000
heap
page read and write
26702302000
heap
page read and write
18A50A24000
heap
page read and write
8B9ED7A000
stack
page read and write
18002C000
direct allocation
page read and write
87F000
heap
page read and write
283E2F00000
heap
page read and write
7FFD146E2000
unkown
page readonly
26F3000
heap
page read and write
13C727B8000
heap
page read and write
89A000
stack
page read and write
8B9F47E000
stack
page read and write
F7D679000
stack
page read and write
1B497613000
heap
page read and write
532000
heap
page read and write
232E000
stack
page read and write
180000000
direct allocation
page read and write
283E307D000
heap
page read and write
9A0000
heap
page readonly
18002B000
direct allocation
page readonly
D8C000
heap
page read and write
13C727FF000
heap
page read and write
2780000
heap
page read and write
18002B000
direct allocation
page readonly
283E37A0000
trusted library allocation
page read and write
16F03165000
heap
page read and write
267021C0000
trusted library allocation
page read and write
8D5000
heap
page read and write
CB000
stack
page read and write
283E306A000
heap
page read and write
868000
heap
page read and write
1B498223000
heap
page read and write
283E3042000
heap
page read and write
59D000
heap
page read and write
576E000
stack
page read and write
8A8000
heap
page read and write
13C72806000
heap
page read and write
BF22BDF000
stack
page read and write
593000
heap
page read and write
18002D000
direct allocation
page readonly
13C72798000
heap
page read and write
4E5000
heap
page read and write
1B498190000
heap
page read and write
4CE000
heap
page read and write
29508A3F000
heap
page read and write
1F80000
direct allocation
page execute and read and write
532000
heap
page read and write
1FF52660000
heap
page read and write
283E3066000
heap
page read and write
BDC000
heap
page read and write
1B498102000
heap
page read and write
89A000
heap
page read and write
2DAEBA2A000
heap
page read and write
1B498200000
heap
page read and write
2840000
heap
page read and write
295089B0000
heap
page read and write
2DAEBAB9000
heap
page read and write
591000
heap
page read and write
2720000
heap
page read and write
1FF52802000
heap
page read and write
2373000
heap
page read and write
18A51270000
remote allocation
page read and write
1B497681000
heap
page read and write
9DB887F000
stack
page read and write
7FFD146E2000
unkown
page readonly
9B0000
trusted library allocation
page read and write
2950A490000
direct allocation
page execute and read and write
59D000
heap
page read and write
242E000
stack
page read and write
F829CFC000
stack
page read and write
1F90000
heap
page readonly
1B498227000
heap
page read and write
16F03112000
heap
page read and write
1FF5282F000
heap
page read and write
BC5000
heap
page read and write
13C72A00000
heap
page read and write
525000
heap
page read and write
2097000
stack
page read and write
7E0000
heap
page read and write
7FFD14661000
unkown
page execute read
590000
heap
page read and write
590000
heap
page read and write
F21000
heap
page read and write
2DAEB9E0000
trusted library allocation
page read and write
1FF52843000
heap
page read and write
7FFD14661000
unkown
page execute read
58F0000
trusted library allocation
page read and write
2DAEBA13000
heap
page read and write
16F030B0000
heap
page read and write
28F0000
heap
page read and write
205B000
heap
page read and write
4F5000
heap
page read and write
4EE000
heap
page read and write
7FFD146DE000
unkown
page read and write
525000
heap
page read and write
3D6E000
stack
page read and write
EF5000
heap
page read and write
7A271FE000
stack
page read and write
2DAEBA00000
heap
page read and write
F10000
heap
page read and write
4E5000
heap
page read and write
8B9EF7B000
stack
page read and write
F829FFC000
stack
page read and write
2843000
heap
page read and write
7FFD14660000
unkown
page readonly
589000
heap
page read and write
4F0000
heap
page read and write
283E3055000
heap
page read and write
29508A28000
heap
page read and write
59D000
heap
page read and write
277E000
stack
page read and write
AD70F9000
stack
page read and write
5B8000
heap
page read and write
86E000
heap
page read and write
593000
heap
page read and write
2811000
heap
page read and write
480000
remote allocation
page read and write
4F3000
heap
page read and write
BB0000
heap
page read and write
575000
heap
page read and write
59D000
heap
page read and write
5D8000
heap
page read and write
4F5000
heap
page read and write
5D0000
heap
page read and write
283E2E90000
heap
page read and write
2DAEBA24000
heap
page read and write
1FF52846000
heap
page read and write
283E306C000
heap
page read and write
575000
heap
page read and write
A1F197B000
stack
page read and write
26702240000
heap
page read and write
495000
heap
page read and write
9DB867E000
stack
page read and write
2DAEB940000
heap
page read and write
1B498230000
heap
page read and write
13C72A05000
heap
page read and write
7FB000
heap
page read and write
7FFD14698000
unkown
page readonly
9DB827D000
stack
page read and write
8D6000
heap
page read and write
283E3047000
heap
page read and write
9DB807F000
stack
page read and write
5AE000
heap
page read and write
7FFD14661000
unkown
page execute read
8AB000
heap
page read and write
750000
heap
page read and write
BD0000
heap
page read and write
283E3076000
heap
page read and write
16F03131000
heap
page read and write
13C727BD000
heap
page read and write
283E3040000
heap
page read and write
52B000
heap
page read and write
16F03050000
trusted library allocation
page read and write
9DB857F000
stack
page read and write
1B497678000
heap
page read and write
2670225A000
heap
page read and write
47B000
stack
page read and write
29508900000
heap
page read and write
D85000
heap
page read and write
5A9000
stack
page read and write
512000
heap
page read and write
16F04B05000
heap
page read and write
27C8000
heap
page read and write
2811000
heap
page read and write
56DE000
stack
page read and write
283E2EA0000
heap
page read and write
26702276000
heap
page read and write
16F03112000
heap
page read and write
7FFD146E2000
unkown
page readonly
13C727F6000
heap
page read and write
EF5000
heap
page read and write
21E0000
trusted library allocation
page read and write
180000000
direct allocation
page read and write
2950A5A0000
trusted library allocation
page read and write
59D000
heap
page read and write
1B497655000
heap
page read and write
16F030D7000
heap
page read and write
26EF000
stack
page read and write
180000000
direct allocation
page read and write
16F0311F000
heap
page read and write
29508A79000
heap
page read and write
BF22B5E000
stack
page read and write
8CD000
heap
page read and write
7FFD146DE000
unkown
page read and write
1B498230000
heap
page read and write
283E3802000
trusted library allocation
page read and write
4F3000
heap
page read and write
18002D000
direct allocation
page readonly
283E305F000
heap
page read and write
18A509A0000
heap
page read and write
18A50A00000
heap
page read and write
16F030E4000
heap
page read and write
1B49816F000
heap
page read and write
1B497690000
heap
page read and write
18A50930000
heap
page read and write
740000
heap
page read and write
50C000
heap
page read and write
13C727AF000
heap
page read and write
B8E000
stack
page read and write
B9C000
heap
page read and write
1FF52813000
heap
page read and write
1EA0000
heap
page read and write
1B498122000
heap
page read and write
283E3083000
heap
page read and write
7FFD146DE000
unkown
page read and write
857000
heap
page read and write
283E3064000
heap
page read and write
7FFD146E7000
unkown
page readonly
8B9F0FA000
stack
page read and write
BBD000
heap
page read and write
7FFD146E2000
unkown
page readonly
18002D000
direct allocation
page readonly
593000
heap
page read and write
3DB000
stack
page read and write
4E8000
heap
page read and write
F82A57E000
stack
page read and write
7FFD14661000
unkown
page execute read
9B0000
trusted library allocation
page read and write
29508A76000
heap
page read and write
50C000
heap
page read and write
50C000
heap
page read and write
AD6DFE000
stack
page read and write
9DB837D000
stack
page read and write
283E3049000
heap
page read and write
F82A0FE000
stack
page read and write
26702130000
heap
page read and write
21B0000
heap
page read and write
F7D4FF000
stack
page read and write
7FFD146E2000
unkown
page readonly
4A8000
heap
page read and write
597000
heap
page read and write
876000
heap
page read and write
5BF000
heap
page read and write
9BD000
heap
page read and write
A00000
heap
page read and write
400000
heap
page read and write
50C000
heap
page read and write
7DF000
stack
page read and write
59D000
heap
page read and write
16F0312F000
heap
page read and write
8B0000
remote allocation
page read and write
8B9E94B000
stack
page read and write
9DB847F000
stack
page read and write
7FFD14698000
unkown
page readonly
7FFD14661000
unkown
page execute read
1B49766D000
heap
page read and write
EFD000
heap
page read and write
96F000
stack
page read and write
18A50B02000
heap
page read and write
857000
heap
page read and write
16F03112000
heap
page read and write
575000
heap
page read and write
7FFD14698000
unkown
page readonly
508000
heap
page read and write
7FFD146E7000
unkown
page readonly
5AE000
heap
page read and write
13C74320000
heap
page read and write
2430000
heap
page read and write
2057000
heap
page read and write
4ED000
heap
page read and write
857000
heap
page read and write
590000
heap
page read and write
26702120000
heap
page read and write
18002C000
direct allocation
page read and write
26EC000
stack
page read and write
9C5000
heap
page read and write
283E3069000
heap
page read and write
29508A79000
heap
page read and write
16F0313A000
heap
page read and write
18A51402000
trusted library allocation
page read and write
180000000
direct allocation
page read and write
525000
heap
page read and write
18002C000
direct allocation
page read and write
18002B000
direct allocation
page readonly
16F030ED000
heap
page read and write
16F04950000
heap
page read and write
51E000
stack
page read and write
593000
heap
page read and write
4ED000
heap
page read and write
27F0000
heap
page read and write
13C72990000
heap
page readonly
F03000
heap
page read and write
512000
heap
page read and write
1FF52852000
heap
page read and write
1B4981D1000
heap
page read and write
13C72808000
heap
page read and write
13C727E9000
heap
page read and write
13C726A0000
heap
page read and write
BB6000
heap
page read and write
211E000
stack
page read and write
4F5000
heap
page read and write
532000
heap
page read and write
10000
heap
page read and write
5BC000
heap
page read and write
9E1000
heap
page read and write
2950A5A0000
trusted library allocation
page read and write
29508A3F000
heap
page read and write
A05000
heap
page read and write
FC75BFE000
stack
page read and write
13C727BD000
heap
page read and write
9DB79BC000
stack
page read and write
560000
heap
page read and write
1B497629000
heap
page read and write
24FF000
stack
page read and write
8B9F2FE000
stack
page read and write
A1F217C000
stack
page read and write
16F0497C000
heap
page read and write
1ECC000
heap
page read and write
565F000
stack
page read and write
525000
heap
page read and write
490000
heap
page read and write
3B4E000
stack
page read and write
283E3013000
heap
page read and write
81F000
heap
page read and write
7FFD146E5000
unkown
page readonly
16F02FC0000
heap
page read and write
888000
heap
page read and write
4DA000
heap
page read and write
5C7000
heap
page read and write
1FF5284C000
heap
page read and write
855000
heap
page read and write
FC7577E000
stack
page read and write
2950A3BC000
heap
page read and write
204E000
heap
page read and write
520000
trusted library allocation
page read and write
283E3096000
heap
page read and write
18A50940000
heap
page read and write
1B4977E5000
heap
page read and write
7FFD14661000
unkown
page execute read
9DB877E000
stack
page read and write
2DAEBA3E000
heap
page read and write
59D000
heap
page read and write
1B497713000
heap
page read and write
13C72811000
heap
page read and write
9AF000
heap
page read and write
52E000
heap
page read and write
26702313000
heap
page read and write
2DAEC532000
heap
page read and write
13C729D0000
trusted library allocation
page read and write
1B498213000
heap
page read and write
1B49765B000
heap
page read and write
18002B000
direct allocation
page readonly
1B49766F000
heap
page read and write
53B000
heap
page read and write
1B4981C7000
heap
page read and write
51A000
heap
page read and write
592000
heap
page read and write
2370000
heap
page read and write
8D5000
heap
page read and write
F7D57F000
stack
page read and write
21E0000
trusted library allocation
page read and write
283E3102000
heap
page read and write
8C6000
heap
page read and write
BC5000
heap
page read and write
59D000
heap
page read and write
BC5000
heap
page read and write
2453000
heap
page read and write
F829F7F000
stack
page read and write
26702202000
heap
page read and write
7B0000
remote allocation
page read and write
200E000
heap
page read and write
855000
heap
page read and write
480000
remote allocation
page read and write
283E3045000
heap
page read and write
B60000
remote allocation
page read and write
BD5000
heap
page read and write
2DAEBA87000
heap
page read and write
AB0000
heap
page read and write
277F000
stack
page read and write
512000
heap
page read and write
18A50A5C000
heap
page read and write
ED8000
heap
page read and write
4D0000
heap
page read and write
2DAEBA68000
heap
page read and write
13C727E9000
heap
page read and write
26702224000
heap
page read and write
1B498122000
heap
page read and write
2500000
heap
page read and write
27ED000
stack
page read and write
13C727E9000
heap
page read and write
F7D5FE000
stack
page read and write
4ED000
heap
page read and write
18002D000
direct allocation
page readonly
13C72808000
heap
page read and write
1E9E000
stack
page read and write
2530000
trusted library allocation
page read and write
16F03112000
heap
page read and write
13C72730000
heap
page read and write
A1F207F000
stack
page read and write
480000
heap
page readonly
215C000
stack
page read and write
670000
heap
page read and write
16F03050000
trusted library allocation
page read and write
2650000
remote allocation
page read and write
16F030B8000
heap
page read and write
9BD000
heap
page read and write
B98000
heap
page read and write
2950A390000
heap
page read and write
A79000
stack
page read and write
EFD000
heap
page read and write
18002D000
direct allocation
page readonly
7FFD146E7000
unkown
page readonly
7FFD14698000
unkown
page readonly
B90000
heap
page read and write
295089A0000
heap
page read and write
508000
heap
page read and write
283E3039000
heap
page read and write
295089A5000
heap
page read and write
16F030DF000
heap
page read and write
20A3000
heap
page read and write
16F03030000
heap
page read and write
5AE000
heap
page read and write
AD695C000
stack
page read and write
2670228A000
heap
page read and write
2982000
heap
page read and write
4E6000
heap
page read and write
FC75AFE000
stack
page read and write
7FFD146E7000
unkown
page readonly
2350000
heap
page read and write
ED0000
heap
page read and write
7FFD14698000
unkown
page readonly
21DB000
stack
page read and write
1B497530000
heap
page read and write
53B000
heap
page read and write
4E8000
heap
page read and write
7FFD146DE000
unkown
page read and write
9DB7DFB000
stack
page read and write
8B9F37F000
stack
page read and write
18002C000
direct allocation
page read and write
AD6FFE000
stack
page read and write
1FF52848000
heap
page read and write
2530000
trusted library allocation
page read and write
1FF52650000
heap
page read and write
18A509D0000
trusted library allocation
page read and write
1B4981AF000
heap
page read and write
2450000
heap
page read and write
27C8000
heap
page read and write
575000
heap
page read and write
990000
heap
page read and write
52B000
heap
page read and write
2DAEBB13000
heap
page read and write
1FF527B0000
trusted library allocation
page read and write
520000
trusted library allocation
page read and write
1B497580000
trusted library allocation
page read and write
470000
direct allocation
page execute and read and write
575000
heap
page read and write
7FFD14660000
unkown
page readonly
13C72790000
heap
page read and write
800000
heap
page read and write
58E0000
trusted library allocation
page read and write
29508A3F000
heap
page read and write
200D000
heap
page read and write
16F04AB0000
heap
page read and write
2DAEC500000
heap
page read and write
F82A47C000
stack
page read and write
2950A5D0000
heap
page read and write
F06000
heap
page read and write
B90000
heap
page read and write
16F04B00000
heap
page read and write
7E0000
direct allocation
page execute and read and write
F02000
heap
page read and write
FC756FE000
stack
page read and write
D80000
heap
page read and write
7FFD146DE000
unkown
page read and write
B90000
heap
page read and write
16F03128000
heap
page read and write
7A2737C000
stack
page read and write
575000
heap
page read and write
1B497560000
trusted library allocation
page read and write
180000000
direct allocation
page read and write
EFD000
heap
page read and write
876000
heap
page read and write
F7D47C000
stack
page read and write
2650000
remote allocation
page read and write
1FF526B0000
heap
page read and write
There are 723 hidden memdumps, click here to show them.