IOC Report
3sbn8ZI5nn.dll

loading gif

Files

File Path
Type
Category
Malicious
3sbn8ZI5nn.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\3sbn8ZI5nn.dll"
malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\3sbn8ZI5nn.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\3sbn8ZI5nn.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\3sbn8ZI5nn.dll,DllRegisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AnqVDBzeQVYg\suEN.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\OePyddm\FhSZruvkFd.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\YMSlzINcbZQsPglHc\yBEIGVvdVsup.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\QBVSbmHeRpLG\chsmHcFLfM.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\AnqVDBzeQVYg\suEN.dll
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\UsQfes\NGOvoYPWjlP.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\RDczMDqHt\aAoqtcPuM.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\UYBDis\zUQXLCCaPRO.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\UyotLQPaxHMZcAcJw\vcAnFxvlnpwAYy.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\OkmLFCYLyqOEAi\VeCtOcqCU.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\RDczMDqHt\aAoqtcPuM.dll
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\CefliwalFHXv\dxxQ.dll"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\3sbn8ZI5nn.dll",#1
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://172.105.115.71:8080/ka/dll
unknown
https://172.105.115.71:8080/pegvndisbtalf/wkglflelmiac/imeka/D
unknown
https://172.105.115.71:8080/pegvndisbtalf/wkglflelmiac/imeka/
unknown
https://172.105.115.71:8080/nyiusq/dopl/wsaloufw/hnwwqhclt/
unknown
https://172.105.115.71:8080/l
unknown

IPs

IP
Domain
Country
Malicious
172.105.115.71
unknown
United States
malicious
188.165.79.151
unknown
France
malicious
196.44.98.190
unknown
Ghana
malicious
174.138.33.49
unknown
United States
malicious
36.67.23.59
unknown
Indonesia
malicious
103.41.204.169
unknown
Indonesia
malicious
85.214.67.203
unknown
Germany
malicious
83.229.80.93
unknown
United Kingdom
malicious
198.199.70.22
unknown
United States
malicious
93.104.209.107
unknown
Germany
malicious
186.250.48.5
unknown
Brazil
malicious
209.239.112.82
unknown
United States
malicious
175.126.176.79
unknown
Korea Republic of
malicious
128.199.242.164
unknown
United Kingdom
malicious
178.238.225.252
unknown
Germany
malicious
46.101.98.60
unknown
Netherlands
malicious
190.145.8.4
unknown
Colombia
malicious
82.98.180.154
unknown
Spain
malicious
103.71.99.57
unknown
India
malicious
87.106.97.83
unknown
Germany
malicious
103.254.12.236
unknown
Viet Nam
malicious
103.85.95.4
unknown
Indonesia
malicious
202.134.4.210
unknown
Indonesia
malicious
165.22.254.236
unknown
United States
malicious
78.47.204.80
unknown
Germany
malicious
118.98.72.86
unknown
Indonesia
malicious
139.59.80.108
unknown
Singapore
malicious
104.244.79.94
unknown
United States
malicious
37.44.244.177
unknown
Germany
malicious
51.75.33.122
unknown
France
malicious
160.16.143.191
unknown
Japan
malicious
103.56.149.105
unknown
Indonesia
malicious
85.25.120.45
unknown
Germany
malicious
139.196.72.155
unknown
China
malicious
115.178.55.22
unknown
Indonesia
malicious
103.126.216.86
unknown
Bangladesh
malicious
128.199.217.206
unknown
United Kingdom
malicious
114.79.130.68
unknown
India
malicious
103.224.241.74
unknown
India
malicious
210.57.209.142
unknown
Indonesia
malicious
202.28.34.99
unknown
Thailand
malicious
80.211.107.116
unknown
Italy
malicious
54.37.228.122
unknown
France
malicious
218.38.121.17
unknown
Korea Republic of
malicious
185.148.169.10
unknown
Germany
malicious
195.77.239.39
unknown
Spain
malicious
178.62.112.199
unknown
European Union
malicious
62.171.178.147
unknown
United Kingdom
malicious
64.227.55.231
unknown
United States
malicious
There are 39 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
suEN.dll
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
aAoqtcPuM.dll
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
22A0000
direct allocation
page execute and read and write
malicious
10F0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
233574C0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
174A2860000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
195D8F40000
direct allocation
page execute and read and write
malicious
6B0000
direct allocation
page execute and read and write
malicious
765000
heap
page read and write
128E000
heap
page read and write
706000
heap
page read and write
76C000
heap
page read and write
3C0000
heap
page read and write
8C1A7E000
stack
page read and write
1165000
heap
page read and write
7FFD14661000
unkown
page execute read
FF1000
heap
page read and write
17E8EE77000
heap
page read and write
11D5000
heap
page read and write
9AE000
heap
page read and write
120B000
heap
page read and write
2CA0000
heap
page read and write
121C000
heap
page read and write
174A25B8000
heap
page read and write
7FFD14660000
unkown
page readonly
531000
heap
page read and write
7FFD14660000
unkown
page readonly
1EF3000
heap
page read and write
F4D000
stack
page read and write
8C1B7A000
stack
page read and write
F3BCCFD000
stack
page read and write
23357589000
heap
page read and write
26A75FF000
stack
page read and write
2B67000
heap
page read and write
174A28D5000
heap
page read and write
17E8EE58000
heap
page read and write
21945202000
heap
page read and write
11CF000
heap
page read and write
1496FBBA000
heap
page read and write
FCD000
heap
page read and write
7FFD14660000
unkown
page readonly
11F8000
heap
page read and write
4E9E000
stack
page read and write
F50000
heap
page read and write
121C000
heap
page read and write
21945A80000
remote allocation
page read and write
174A2580000
heap
page read and write
243C000
heap
page read and write
2B64000
heap
page read and write
54BD8FE000
stack
page read and write
8BADBF9000
stack
page read and write
527000
heap
page read and write
7FFD14698000
unkown
page readonly
6BECAFB000
stack
page read and write
8C16FB000
stack
page read and write
1216000
heap
page read and write
1496FA75000
heap
page read and write
1000000
heap
page read and write
22F0000
trusted library allocation
page read and write
2410000
heap
page read and write
18002C000
direct allocation
page read and write
7FFD146E2000
unkown
page readonly
11E5000
heap
page read and write
174A25D9000
heap
page read and write
460000
heap
page read and write
6B0000
heap
page read and write
120000
remote allocation
page read and write
122A000
heap
page read and write
1496FA13000
heap
page read and write
463000
heap
page read and write
59C0000
heap
page read and write
174A261C000
heap
page read and write
17E8EE74000
heap
page read and write
2B2A000
heap
page read and write
20DF4102000
heap
page read and write
11CE000
heap
page read and write
1E967CA0000
heap
page read and write
7FFD146DE000
unkown
page read and write
7FFD14660000
unkown
page readonly
14970602000
heap
page read and write
11CC000
heap
page read and write
3359000
heap
page read and write
3381000
heap
page read and write
2180DC6E000
heap
page read and write
11E5000
heap
page read and write
54BDC7E000
stack
page read and write
23357578000
heap
page read and write
A80000
heap
page read and write
1496FA29000
heap
page read and write
23357585000
heap
page read and write
174A2890000
direct allocation
page execute and read and write
18002B000
direct allocation
page readonly
1270000
heap
page read and write
6F5000
heap
page read and write
17E8EE56000
heap
page read and write
17E8EE6D000
heap
page read and write
8C197A000
stack
page read and write
1198000
heap
page read and write
1264000
heap
page read and write
11E5000
heap
page read and write
A25000
heap
page read and write
1496FA2C000
heap
page read and write
14970522000
heap
page read and write
7FFD146E2000
unkown
page readonly
54BD87E000
stack
page read and write
50D000
heap
page read and write
2180DC3F000
heap
page read and write
17E8F680000
trusted library allocation
page read and write
400000
heap
page read and write
6FD000
heap
page read and write
14970631000
heap
page read and write
14970543000
heap
page read and write
17E8EE47000
heap
page read and write
20DF4088000
heap
page read and write
20DF3DA0000
heap
page read and write
14970402000
heap
page read and write
18002D000
direct allocation
page readonly
7FFD146E2000
unkown
page readonly
B40000
remote allocation
page read and write
9DC9EFF000
stack
page read and write
195DAB10000
trusted library allocation
page read and write
14970592000
heap
page read and write
20DF406D000
heap
page read and write
120000
remote allocation
page read and write
23357578000
heap
page read and write
18002B000
direct allocation
page readonly
7FFD146E5000
unkown
page readonly
18002D000
direct allocation
page readonly
527000
heap
page read and write
21945140000
heap
page read and write
6F5000
heap
page read and write
195D8F80000
heap
page read and write
195D8FD9000
heap
page read and write
51C0000
trusted library allocation
page read and write
9AE000
heap
page read and write
23358F20000
heap
page read and write
122A000
heap
page read and write
2260000
trusted library allocation
page read and write
21945150000
heap
page read and write
23357597000
heap
page read and write
351F000
heap
page read and write
195D8E60000
heap
page read and write
49C000
heap
page read and write
127D000
heap
page read and write
2AE9000
heap
page read and write
21F87DC000
stack
page read and write
8BAD6FE000
stack
page read and write
17E8EE84000
heap
page read and write
2B70000
heap
page read and write
6BECA7D000
stack
page read and write
18002D000
direct allocation
page readonly
195D9250000
heap
page readonly
1496F970000
heap
page read and write
1264000
heap
page read and write
703000
heap
page read and write
11D8000
heap
page read and write
988000
heap
page read and write
18002D000
direct allocation
page readonly
1180000
remote allocation
page read and write
1264000
heap
page read and write
11D8000
heap
page read and write
7FFD146E2000
unkown
page readonly
7DAEFF000
stack
page read and write
11DC000
heap
page read and write
195D8ED0000
heap
page read and write
6BECCFF000
stack
page read and write
1496FA8C000
heap
page read and write
180000000
direct allocation
page read and write
18002B000
direct allocation
page readonly
17E8EE75000
heap
page read and write
4EF000
heap
page read and write
B70000
heap
page read and write
2B6C000
heap
page read and write
11D5000
heap
page read and write
2B6A000
heap
page read and write
17E8F802000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
FD6000
heap
page read and write
CFB000
stack
page read and write
515000
heap
page read and write
11CA000
heap
page read and write
174A25D9000
heap
page read and write
195D8F9F000
heap
page read and write
538000
heap
page read and write
174A25E7000
heap
page read and write
174A4120000
heap
page read and write
C85000
heap
page read and write
2363000
heap
page read and write
11D5000
heap
page read and write
174A25D9000
heap
page read and write
3338000
heap
page read and write
527000
heap
page read and write
6FD000
heap
page read and write
23357350000
heap
page read and write
F3BCE7E000
stack
page read and write
5130000
trusted library allocation
page read and write
23358DF0000
heap
page read and write
9BF000
heap
page read and write
3380000
heap
page read and write
A60000
heap
page read and write
36CE000
stack
page read and write
4C0000
heap
page read and write
20DF4013000
heap
page read and write
195D8FEB000
heap
page read and write
17E8EE31000
heap
page read and write
1216000
heap
page read and write
9DC99FD000
stack
page read and write
1216000
heap
page read and write
9DCA0FF000
stack
page read and write
23359070000
heap
page read and write
7FFD146E5000
unkown
page readonly
8BAD8FF000
stack
page read and write
D20000
remote allocation
page read and write
17E8EE57000
heap
page read and write
14970290000
trusted library allocation
page read and write
127D000
heap
page read and write
4A0000
heap
page read and write
33A1000
heap
page read and write
23357586000
heap
page read and write
2B6C000
heap
page read and write
18002B000
direct allocation
page readonly
9AE000
heap
page read and write
54D000
heap
page read and write
11BE000
heap
page read and write
980000
heap
page read and write
2180E402000
trusted library allocation
page read and write
174A25A9000
heap
page read and write
180000000
direct allocation
page read and write
21945A80000
remote allocation
page read and write
1264000
heap
page read and write
11BE000
heap
page read and write
6BEC5FF000
stack
page read and write
17E8EE7E000
heap
page read and write
9DC9BFD000
stack
page read and write
9DC97FA000
stack
page read and write
528000
heap
page read and write
1180000
remote allocation
page read and write
7FFD146DE000
unkown
page read and write
20DF4802000
heap
page read and write
1E967E44000
heap
page read and write
174A28A0000
heap
page readonly
7DB1FB000
stack
page read and write
FC6000
heap
page read and write
174A4090000
trusted library allocation
page read and write
6BEC67C000
stack
page read and write
1E967E13000
heap
page read and write
122A000
heap
page read and write
180000000
direct allocation
page read and write
20DF40C2000
heap
page read and write
B40000
remote allocation
page read and write
11FD000
heap
page read and write
8C13FF000
stack
page read and write
2CCB000
stack
page read and write
18002D000
direct allocation
page readonly
17E8EE00000
heap
page read and write
54F000
heap
page read and write
2AAE000
stack
page read and write
6F0000
heap
page read and write
18002B000
direct allocation
page readonly
2180D9E0000
heap
page read and write
26A70FB000
stack
page read and write
70C000
heap
page read and write
1264000
heap
page read and write
174A24B0000
heap
page read and write
9DC939B000
stack
page read and write
527000
heap
page read and write
3380000
heap
page read and write
7DB077000
stack
page read and write
6BEC47B000
stack
page read and write
C80000
heap
page read and write
174A25F0000
heap
page read and write
174A4090000
trusted library allocation
page read and write
18002C000
direct allocation
page read and write
195D8F9F000
heap
page read and write
122A000
heap
page read and write
14970500000
heap
page read and write
18002C000
direct allocation
page read and write
7DB17F000
stack
page read and write
21945240000
heap
page read and write
11DD000
heap
page read and write
1216000
heap
page read and write
2180DD02000
heap
page read and write
23357520000
trusted library allocation
page read and write
11BE000
heap
page read and write
17E8EE4E000
heap
page read and write
11D8000
heap
page read and write
20DF3D90000
heap
page read and write
2AB0000
heap
page read and write
1E967E37000
heap
page read and write
1FB0000
trusted library allocation
page read and write
195D8EF0000
heap
page read and write
F3BCF7D000
stack
page read and write
7FFD146E5000
unkown
page readonly
1496FA92000
heap
page read and write
7FFD146E7000
unkown
page readonly
8C1779000
stack
page read and write
219451E0000
trusted library allocation
page read and write
1496FA6F000
heap
page read and write
21F8C7E000
stack
page read and write
FA0000
heap
page read and write
11E3000
heap
page read and write
17E8EE60000
heap
page read and write
20DF40E6000
heap
page read and write
2ADC000
heap
page read and write
6BEC87B000
stack
page read and write
1130000
heap
page readonly
17E8EDE0000
heap
page read and write
11CE000
heap
page read and write
8C147F000
stack
page read and write
195D92A5000
heap
page read and write
225E000
stack
page read and write
318C000
stack
page read and write
17E8EE6F000
heap
page read and write
6BECEFE000
stack
page read and write
180000
heap
page read and write
240E000
stack
page read and write
2180DC5A000
heap
page read and write
21F8AFF000
stack
page read and write
9DC9FFF000
stack
page read and write
515000
heap
page read and write
2180DA40000
heap
page read and write
195D8FC5000
heap
page read and write
180000000
direct allocation
page read and write
1496FB13000
heap
page read and write
FC0000
heap
page read and write
7FFD14698000
unkown
page readonly
B50000
heap
page read and write
20DF4029000
heap
page read and write
17E8EE42000
heap
page read and write
702000
heap
page read and write
8C15FF000
stack
page read and write
2B0D000
heap
page read and write
6D0000
heap
page read and write
505000
heap
page read and write
195D8FB0000
heap
page read and write
14970502000
heap
page read and write
4EA0000
trusted library allocation
page read and write
23357590000
heap
page read and write
1E967E02000
heap
page read and write
120C000
heap
page read and write
18002B000
direct allocation
page readonly
7FFD14661000
unkown
page execute read
195D9150000
heap
page read and write
7FFD146E7000
unkown
page readonly
23357558000
heap
page read and write
556000
heap
page read and write
17E8EE7B000
heap
page read and write
7DAE7C000
stack
page read and write
8C127B000
stack
page read and write
1E9685A0000
trusted library allocation
page read and write
17E8ED70000
heap
page read and write
2B5F000
heap
page read and write
1E967F02000
heap
page read and write
760000
heap
page read and write
515000
heap
page read and write
23357586000
heap
page read and write
11F8000
heap
page read and write
23357581000
heap
page read and write
1496FA58000
heap
page read and write
23357578000
heap
page read and write
7DAFFC000
stack
page read and write
6BECBFE000
stack
page read and write
1F9E000
stack
page read and write
1496FA78000
heap
page read and write
174A25D9000
heap
page read and write
1203000
heap
page read and write
17E8EE67000
heap
page read and write
F3BCA7B000
stack
page read and write
174A25AE000
heap
page read and write
23358E1C000
heap
page read and write
87B000
stack
page read and write
11C0000
heap
page read and write
6FD000
heap
page read and write
14970600000
heap
page read and write
21945A80000
remote allocation
page read and write
11DC000
heap
page read and write
2B64000
heap
page read and write
7FFD146E7000
unkown
page readonly
20DF3E00000
heap
page read and write
22D0000
direct allocation
page execute and read and write
23358E1C000
heap
page read and write
2180DC00000
heap
page read and write
540000
heap
page read and write
23357500000
heap
page read and write
18002D000
direct allocation
page readonly
174A25A9000
heap
page read and write
17E8EE6A000
heap
page read and write
1E967E00000
heap
page read and write
20DF4113000
heap
page read and write
56A0000
heap
page read and write
4E8000
heap
page read and write
8A0000
heap
page read and write
2180DB40000
trusted library allocation
page read and write
8BAD9FE000
stack
page read and write
26B0000
heap
page read and write
1496FA95000
heap
page read and write
2B2B000
stack
page read and write
21F8BF9000
stack
page read and write
21945258000
heap
page read and write
195D8F9F000
heap
page read and write
1E967CB0000
heap
page read and write
20DF4000000
heap
page read and write
7FFD146E5000
unkown
page readonly
23357580000
heap
page read and write
FCD000
heap
page read and write
721000
heap
page read and write
1E967E52000
heap
page read and write
18002C000
direct allocation
page read and write
1120000
direct allocation
page execute and read and write
121D000
heap
page read and write
9D7000
heap
page read and write
233574F0000
direct allocation
page execute and read and write
23357550000
heap
page read and write
4E0000
heap
page read and write
174A25F9000
heap
page read and write
33E0000
heap
page read and write
2B61000
heap
page read and write
14970623000
heap
page read and write
1F1F000
stack
page read and write
22E0000
heap
page readonly
23359075000
heap
page read and write
274F000
stack
page read and write
20000
heap
page read and write
7FFD14698000
unkown
page readonly
20DF4900000
heap
page read and write
1222000
heap
page read and write
2300000
heap
page read and write
1497056F000
heap
page read and write
31DE000
stack
page read and write
174A260A000
heap
page read and write
495000
heap
page read and write
1496F960000
heap
page read and write
F3BCD7C000
stack
page read and write
57B000
heap
page read and write
2180DC13000
heap
page read and write
FCD000
heap
page read and write
195D8F89000
heap
page read and write
9B3000
heap
page read and write
527000
heap
page read and write
2B6A000
heap
page read and write
23357490000
heap
page read and write
5C0000
heap
page read and write
7DB0FE000
stack
page read and write
17E8EE55000
heap
page read and write
2BC0000
heap
page read and write
F9000
stack
page read and write
6A0000
remote allocation
page read and write
258E000
stack
page read and write
1496FA85000
heap
page read and write
546000
heap
page read and write
20DF403E000
heap
page read and write
7FFD146DE000
unkown
page read and write
555000
heap
page read and write
1496FB8F000
heap
page read and write
17E8ED80000
heap
page read and write
1160000
heap
page read and write
1E967E2F000
heap
page read and write
23357563000
heap
page read and write
558000
heap
page read and write
1496FA00000
heap
page read and write
490000
heap
page read and write
1496FA89000
heap
page read and write
100000
remote allocation
page read and write
100000
remote allocation
page read and write
2B61000
heap
page read and write
18002C000
direct allocation
page read and write
6D8000
heap
page read and write
21F8A7F000
stack
page read and write
11DC000
heap
page read and write
120C000
heap
page read and write
2B2F000
stack
page read and write
1202000
heap
page read and write
1496FA55000
heap
page read and write
120C000
heap
page read and write
D20000
remote allocation
page read and write
400000
heap
page read and write
17E8EE29000
heap
page read and write
17E8EE40000
heap
page read and write
127D000
heap
page read and write
174A25AF000
heap
page read and write
174A25EA000
heap
page read and write
2335757E000
heap
page read and write
18002C000
direct allocation
page read and write
26A76F9000
stack
page read and write
174A25F7000
heap
page read and write
710000
heap
page read and write
1E967E29000
heap
page read and write
FD5000
heap
page read and write
2B64000
heap
page read and write
721000
heap
page read and write
535000
heap
page read and write
11FD000
heap
page read and write
174A2760000
heap
page read and write
3381000
heap
page read and write
21F8B7E000
stack
page read and write
1FD0000
heap
page read and write
20DF40B9000
heap
page read and write
9DC98FE000
stack
page read and write
9BC000
heap
page read and write
2607000
stack
page read and write
26A77FF000
stack
page read and write
320F000
stack
page read and write
195D8FD9000
heap
page read and write
2180DC2A000
heap
page read and write
238E000
stack
page read and write
7FFD146DE000
unkown
page read and write
545000
heap
page read and write
1E0000
heap
page read and write
17E8EE96000
heap
page read and write
1496FA43000
heap
page read and write
1180000
remote allocation
page read and write
2B5F000
heap
page read and write
A2C000
heap
page read and write
233575C4000
heap
page read and write
21D9000
stack
page read and write
2B5F000
heap
page read and write
14970628000
heap
page read and write
6A0000
remote allocation
page read and write
558000
heap
page read and write
706000
heap
page read and write
20DF3F00000
trusted library allocation
page read and write
1223000
heap
page read and write
21F8CFF000
stack
page read and write
121C000
heap
page read and write
9E8000
heap
page read and write
A20000
heap
page read and write
9DC9CFF000
stack
page read and write
17E8EE3C000
heap
page read and write
29CD000
stack
page read and write
7FFD14660000
unkown
page readonly
1496FA3C000
heap
page read and write
308D000
stack
page read and write
174A2588000
heap
page read and write
1020000
heap
page read and write
9E8000
heap
page read and write
7FFD14661000
unkown
page execute read
67A000
stack
page read and write
17E8EF02000
heap
page read and write
21945C02000
trusted library allocation
page read and write
174A25B1000
heap
page read and write
555000
heap
page read and write
7FFD146E5000
unkown
page readonly
6F0000
heap
page read and write
1190000
heap
page read and write
7FFD14661000
unkown
page execute read
1496F9D0000
heap
page read and write
1496FA68000
heap
page read and write
1496FBE6000
heap
page read and write
5BD0000
trusted library allocation
page read and write
516000
heap
page read and write
530000
heap
page read and write
21945224000
heap
page read and write
520000
heap
page read and write
14970270000
trusted library allocation
page read and write
2CD0000
trusted library allocation
page read and write
120B000
heap
page read and write
2180DC02000
heap
page read and write
149705C0000
heap
page read and write
D9000
stack
page read and write
2960000
heap
page read and write
AA0000
heap
page read and write
7FFD146E2000
unkown
page readonly
3311000
heap
page read and write
14970554000
heap
page read and write
180000000
direct allocation
page read and write
195DAB40000
heap
page read and write
122A000
heap
page read and write
127A000
heap
page read and write
174A25F9000
heap
page read and write
FF0000
heap
page read and write
215E000
stack
page read and write
174A2540000
heap
page read and write
1EF0000
heap
page read and write
6E0000
direct allocation
page execute and read and write
17E8EE62000
heap
page read and write
F3BCFFE000
stack
page read and write
325F000
stack
page read and write
330C000
stack
page read and write
8BADAFD000
stack
page read and write
2963000
heap
page read and write
174A2520000
heap
page read and write
1275000
heap
page read and write
180000000
direct allocation
page read and write
120B000
heap
page read and write
21945200000
heap
page read and write
8C187E000
stack
page read and write
54BDA7E000
stack
page read and write
50D000
heap
page read and write
174A25B0000
heap
page read and write
9CE000
heap
page read and write
1203000
heap
page read and write
219451B0000
heap
page read and write
128A000
heap
page read and write
1FE0000
heap
page read and write
FD5000
heap
page read and write
1E968602000
trusted library allocation
page read and write
174A2602000
heap
page read and write
7FFD146E5000
unkown
page readonly
21945302000
heap
page read and write
195D917C000
heap
page read and write
1219000
heap
page read and write
7DAF7F000
stack
page read and write
6EF000
heap
page read and write
2B6C000
heap
page read and write
23357520000
trusted library allocation
page read and write
4CB000
heap
page read and write
2180DD13000
heap
page read and write
2C4D000
stack
page read and write
195D8FC9000
heap
page read and write
50F000
stack
page read and write
7FFD146E7000
unkown
page readonly
7FFD146DE000
unkown
page read and write
6F5000
heap
page read and write
F3BD0FD000
stack
page read and write
7FFD14661000
unkown
page execute read
1E967E3E000
heap
page read and write
2B61000
heap
page read and write
2194522A000
heap
page read and write
2610000
trusted library allocation
page read and write
4A0000
heap
page read and write
7FFD14698000
unkown
page readonly
20DF40CA000
heap
page read and write
FD5000
heap
page read and write
54D000
heap
page read and write
233575B2000
heap
page read and write
174A25D9000
heap
page read and write
14970613000
heap
page read and write
2B4E000
heap
page read and write
195D92A0000
heap
page read and write
54BDB7E000
stack
page read and write
4FF000
heap
page read and write
128E000
heap
page read and write
C40000
heap
page read and write
7FFD146E7000
unkown
page readonly
17E8EE7A000
heap
page read and write
480000
heap
page read and write
2B67000
heap
page read and write
195D8FD7000
heap
page read and write
3010000
trusted library allocation
page read and write
546000
heap
page read and write
2B2C000
heap
page read and write
420000
heap
page read and write
2180DC69000
heap
page read and write
7FFD14698000
unkown
page readonly
195D8F70000
direct allocation
page execute and read and write
56A000
heap
page read and write
7FFD14660000
unkown
page readonly
233575B2000
heap
page read and write
6BECDFD000
stack
page read and write
8BAD7FE000
stack
page read and write
527000
heap
page read and write
B1A000
stack
page read and write
54D000
heap
page read and write
6FD000
heap
page read and write
149705B2000
heap
page read and write
7FFD146DE000
unkown
page read and write
14970522000
heap
page read and write
1FA0000
heap
page readonly
40000
heap
page read and write
17E8EE13000
heap
page read and write
3A80000
heap
page read and write
7FFD14698000
unkown
page readonly
127C000
heap
page read and write
1496FA65000
heap
page read and write
54BDD7F000
stack
page read and write
50D000
heap
page read and write
2B6A000
heap
page read and write
47B000
stack
page read and write
226D000
stack
page read and write
2B67000
heap
page read and write
54BD58B000
stack
page read and write
FA8000
heap
page read and write
9FA000
heap
page read and write
53E000
heap
page read and write
21945213000
heap
page read and write
7FFD146E2000
unkown
page readonly
1140000
trusted library allocation
page read and write
8BAD3AC000
stack
page read and write
195D9290000
trusted library allocation
page read and write
310D000
stack
page read and write
1E967D00000
heap
page read and write
1216000
heap
page read and write
546000
heap
page read and write
2180D9D0000
heap
page read and write
1202000
heap
page read and write
17E8EE5C000
heap
page read and write
11FD000
heap
page read and write
7FFD14661000
unkown
page execute read
120A000
heap
page read and write
11E5000
heap
page read and write
2360000
heap
page read and write
2180DC77000
heap
page read and write
1E967E49000
heap
page read and write
174A28D0000
heap
page read and write
F3BCAFE000
stack
page read and write
555000
heap
page read and write
6BEC97F000
stack
page read and write
26A74FE000
stack
page read and write
149705C7000
heap
page read and write
121E000
heap
page read and write
17E8EE5A000
heap
page read and write
11CE000
heap
page read and write
7FFD146E7000
unkown
page readonly
3310000
heap
page read and write
9DC9DFF000
stack
page read and write
195D8FB2000
heap
page read and write
There are 700 hidden memdumps, click here to show them.