IOC Report
UNUy8dUYWp.dll

loading gif

Files

File Path
Type
Category
Malicious
UNUy8dUYWp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\UNUy8dUYWp.dll"
malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\UNUy8dUYWp.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\UNUy8dUYWp.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\UNUy8dUYWp.dll,DllRegisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\MKDOLrYWnU\ZnvQHBfFrAXKVU.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\CoOkhAHrtQc\nRwgXrJuSZa.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\GoWbi\ladheq.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\RQcUhJCVUMzw\oVbDosZga.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\MKDOLrYWnU\ZnvQHBfFrAXKVU.dll
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\FWERpTiWwMFl\CxZPHYYNr.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZWpHraPiSSirRmt\eJPBXUgBzVlFM.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\HqxIOWhu\iwDMK.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\LhPRdzdtIG\UwTqVItszcvDL.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\OSbbRH\JNviIfIAbu.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\ZWpHraPiSSirRmt\eJPBXUgBzVlFM.dll
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\XkUZzl\jVHLVoJmMjstBzLj.dll"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\UNUy8dUYWp.dll",#1
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://172.105.115.71:8080/s.dll
unknown
https://172.105.115.71:8080/
unknown
https://172.105.115.71:8080/ifjgeqljeeoagd/80/
unknown
https://172.105.115.71:8080/ifjgeqljeeoagd/
unknown

IPs

IP
Domain
Country
Malicious
172.105.115.71
unknown
United States
malicious
188.165.79.151
unknown
France
malicious
196.44.98.190
unknown
Ghana
malicious
174.138.33.49
unknown
United States
malicious
36.67.23.59
unknown
Indonesia
malicious
103.41.204.169
unknown
Indonesia
malicious
85.214.67.203
unknown
Germany
malicious
83.229.80.93
unknown
United Kingdom
malicious
198.199.70.22
unknown
United States
malicious
93.104.209.107
unknown
Germany
malicious
186.250.48.5
unknown
Brazil
malicious
209.239.112.82
unknown
United States
malicious
175.126.176.79
unknown
Korea Republic of
malicious
128.199.242.164
unknown
United Kingdom
malicious
178.238.225.252
unknown
Germany
malicious
46.101.98.60
unknown
Netherlands
malicious
190.145.8.4
unknown
Colombia
malicious
82.98.180.154
unknown
Spain
malicious
103.71.99.57
unknown
India
malicious
87.106.97.83
unknown
Germany
malicious
103.254.12.236
unknown
Viet Nam
malicious
103.85.95.4
unknown
Indonesia
malicious
202.134.4.210
unknown
Indonesia
malicious
165.22.254.236
unknown
United States
malicious
78.47.204.80
unknown
Germany
malicious
118.98.72.86
unknown
Indonesia
malicious
139.59.80.108
unknown
Singapore
malicious
104.244.79.94
unknown
United States
malicious
37.44.244.177
unknown
Germany
malicious
51.75.33.122
unknown
France
malicious
160.16.143.191
unknown
Japan
malicious
103.56.149.105
unknown
Indonesia
malicious
85.25.120.45
unknown
Germany
malicious
139.196.72.155
unknown
China
malicious
115.178.55.22
unknown
Indonesia
malicious
103.126.216.86
unknown
Bangladesh
malicious
128.199.217.206
unknown
United Kingdom
malicious
114.79.130.68
unknown
India
malicious
103.224.241.74
unknown
India
malicious
210.57.209.142
unknown
Indonesia
malicious
202.28.34.99
unknown
Thailand
malicious
80.211.107.116
unknown
Italy
malicious
54.37.228.122
unknown
France
malicious
218.38.121.17
unknown
Korea Republic of
malicious
185.148.169.10
unknown
Germany
malicious
195.77.239.39
unknown
Spain
malicious
178.62.112.199
unknown
European Union
malicious
62.171.178.147
unknown
United Kingdom
malicious
64.227.55.231
unknown
United States
malicious
There are 39 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ZnvQHBfFrAXKVU.dll
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
eJPBXUgBzVlFM.dll
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
15CC5300000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
2C323270000
direct allocation
page execute and read and write
malicious
6B0000
direct allocation
page execute and read and write
malicious
FA0000
direct allocation
page execute and read and write
malicious
A00000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
225B3AC0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
225B3926000
heap
page read and write
26E6000
heap
page read and write
3C0000
heap
page read and write
2C3232B0000
heap
page read and write
18002B000
direct allocation
page readonly
7FF87C17E000
unkown
page read and write
DC0000
heap
page read and write
CD0000
remote allocation
page read and write
B35000
heap
page read and write
AE5000
heap
page read and write
5510000
trusted library allocation
page read and write
A86000
heap
page read and write
B55000
heap
page read and write
128E000
heap
page read and write
B0C000
heap
page read and write
15CC5340000
heap
page read and write
AEB000
heap
page read and write
AFC000
heap
page read and write
128A000
heap
page read and write
D4E000
heap
page read and write
12B1000
heap
page read and write
A68000
heap
page read and write
7F3000
heap
page read and write
D56000
heap
page read and write
AD3000
heap
page read and write
2C3233D0000
heap
page read and write
3D3E000
stack
page read and write
7BF000
heap
page read and write
AA6000
heap
page read and write
E87000
heap
page read and write
15CC6ED0000
trusted library allocation
page read and write
7FF87C182000
unkown
page readonly
EB8000
heap
page read and write
DFD000
heap
page read and write
740000
remote allocation
page read and write
EA6000
heap
page read and write
E45000
heap
page read and write
7FF87C182000
unkown
page readonly
15CC52A0000
heap
page read and write
12A0000
heap
page read and write
899E000
stack
page read and write
26D8000
heap
page read and write
18002B000
direct allocation
page readonly
2F4C27C000
stack
page read and write
16309108000
heap
page read and write
AA9000
heap
page read and write
738000
heap
page read and write
7FF87C17E000
unkown
page read and write
2C3219A0000
heap
page read and write
D71000
heap
page read and write
D56000
heap
page read and write
9E0000
heap
page read and write
286E000
stack
page read and write
DF5000
heap
page read and write
1296000
heap
page read and write
AAD000
heap
page read and write
7FF87C101000
unkown
page execute read
CF0000
heap
page read and write
26ED000
heap
page read and write
797000
heap
page read and write
16308FA0000
heap
page read and write
7FF87C101000
unkown
page execute read
2C321831000
heap
page read and write
225B3939000
heap
page read and write
C99000
stack
page read and write
225B5440000
heap
page read and write
AE5000
heap
page read and write
2E01000
heap
page read and write
5CDF000
stack
page read and write
D632DF9000
stack
page read and write
F30000
heap
page read and write
D70000
heap
page read and write
ADF000
heap
page read and write
A10000
heap
page read and write
E05000
heap
page read and write
AC9000
heap
page read and write
26E6000
heap
page read and write
221E000
stack
page read and write
2DB9000
heap
page read and write
26B1000
heap
page read and write
1490000
heap
page read and write
2A5F000
stack
page read and write
E9E000
heap
page read and write
219F000
stack
page read and write
225B3928000
heap
page read and write
730000
heap
page read and write
28B0000
trusted library allocation
page read and write
EC9000
heap
page read and write
28D0000
heap
page read and write
ACC000
heap
page read and write
2DE1000
heap
page read and write
8899000
stack
page read and write
1296000
heap
page read and write
7FF87C17E000
unkown
page read and write
2D98000
heap
page read and write
225B391F000
heap
page read and write
26ED000
heap
page read and write
A86000
heap
page read and write
225B3908000
heap
page read and write
B50000
heap
page read and write
E21000
heap
page read and write
16308FC0000
heap
page read and write
980000
heap
page read and write
225B3880000
heap
page read and write
7FF87C101000
unkown
page execute read
FEC000
heap
page read and write
797000
heap
page read and write
B49000
heap
page read and write
59D0000
trusted library allocation
page read and write
E05000
heap
page read and write
CB0000
trusted library allocation
page read and write
CD0000
heap
page read and write
A90000
heap
page read and write
CC0000
remote allocation
page read and write
D63277C000
stack
page read and write
797000
heap
page read and write
A9F000
heap
page read and write
879F000
stack
page read and write
2F4C37E000
stack
page read and write
1000000
heap
page read and write
1268000
heap
page read and write
A86000
heap
page read and write
DA0000
heap
page read and write
B3B000
heap
page read and write
7FF87C185000
unkown
page readonly
7A5000
heap
page read and write
A86000
heap
page read and write
7FF87C187000
unkown
page readonly
7B5000
heap
page read and write
7FF87C101000
unkown
page execute read
2F4C3FE000
stack
page read and write
7FF87C100000
unkown
page readonly
FEA000
stack
page read and write
CB0000
trusted library allocation
page read and write
2C321760000
heap
page read and write
2C321843000
heap
page read and write
1296000
heap
page read and write
B05327E000
stack
page read and write
AFC000
heap
page read and write
AE8000
heap
page read and write
2C321816000
heap
page read and write
23C7000
stack
page read and write
5D10000
heap
page read and write
2F4C4FC000
stack
page read and write
18002C000
direct allocation
page read and write
E09000
heap
page read and write
1495000
heap
page read and write
7FF87C100000
unkown
page readonly
9E0000
heap
page read and write
A50000
trusted library allocation
page read and write
E15000
heap
page read and write
225B3B50000
heap
page read and write
A8F000
heap
page read and write
15CC5399000
heap
page read and write
18002D000
direct allocation
page readonly
CD0000
remote allocation
page read and write
67B000
stack
page read and write
AAD000
heap
page read and write
710000
trusted library allocation
page read and write
2C3217E3000
heap
page read and write
2C323465000
heap
page read and write
E10000
direct allocation
page execute and read and write
E95000
heap
page read and write
2C32180E000
heap
page read and write
1045000
heap
page read and write
225B3930000
heap
page read and write
225B38E7000
heap
page read and write
950000
remote allocation
page read and write
B3B000
heap
page read and write
740000
remote allocation
page read and write
DF9000
heap
page read and write
B3B000
heap
page read and write
7DA000
heap
page read and write
15CC6E00000
heap
page read and write
225B3B40000
trusted library allocation
page read and write
7FF87C182000
unkown
page readonly
790000
heap
page read and write
18002C000
direct allocation
page read and write
E1C000
heap
page read and write
D57000
heap
page read and write
B35000
heap
page read and write
AC9000
heap
page read and write
AC9000
heap
page read and write
2620000
heap
page read and write
E10000
heap
page read and write
EA4000
heap
page read and write
149C000
heap
page read and write
2C3217DD000
heap
page read and write
2C3217D0000
heap
page read and write
2F75000
heap
page read and write
DD0000
heap
page read and write
180000000
direct allocation
page read and write
7B7000
heap
page read and write
163090B0000
trusted library allocation
page read and write
AD2000
heap
page read and write
F9E000
stack
page read and write
2C3232A0000
direct allocation
page execute and read and write
CD0000
remote allocation
page read and write
AC9000
heap
page read and write
16309040000
heap
page read and write
7FF87C185000
unkown
page readonly
26EF000
heap
page read and write
18002D000
direct allocation
page readonly
B0531F9000
stack
page read and write
B1D000
heap
page read and write
EB8000
heap
page read and write
28BF000
stack
page read and write
16308E70000
trusted library allocation
page read and write
7FF87C187000
unkown
page readonly
2CB0000
heap
page read and write
AC9000
heap
page read and write
7B7000
heap
page read and write
FE5000
heap
page read and write
45CE000
stack
page read and write
129C000
heap
page read and write
719000
stack
page read and write
CB0000
trusted library allocation
page read and write
163091C0000
trusted library allocation
page read and write
1005000
heap
page read and write
26D8000
heap
page read and write
1630910F000
heap
page read and write
15CC5330000
direct allocation
page execute and read and write
7FF87C138000
unkown
page readonly
2C321805000
heap
page read and write
2C321831000
heap
page read and write
2F4C5FE000
stack
page read and write
929000
stack
page read and write
FE0000
heap
page read and write
E87000
heap
page read and write
225B38D5000
heap
page read and write
D632BFF000
stack
page read and write
1220000
heap
page read and write
D4A000
heap
page read and write
225B3919000
heap
page read and write
26E1000
heap
page read and write
A6F000
heap
page read and write
7FF87C17E000
unkown
page read and write
2B6C000
stack
page read and write
1296000
heap
page read and write
225B3B00000
heap
page readonly
7FF87C100000
unkown
page readonly
E87000
heap
page read and write
2C32319C000
heap
page read and write
D56000
heap
page read and write
AA1000
heap
page read and write
D45000
heap
page read and write
B35000
heap
page read and write
7FF87C185000
unkown
page readonly
E98000
heap
page read and write
27AB000
stack
page read and write
2C323460000
heap
page read and write
180000000
direct allocation
page read and write
225B3908000
heap
page read and write
ADB000
heap
page read and write
225B3810000
heap
page read and write
5A700FE000
stack
page read and write
797000
heap
page read and write
A7E000
heap
page read and write
AD3000
heap
page read and write
AB4000
heap
page read and write
1630910D000
heap
page read and write
2630000
heap
page read and write
350000
heap
page read and write
2C321803000
heap
page read and write
EA6000
heap
page read and write
15CC535F000
heap
page read and write
75B000
stack
page read and write
E87000
heap
page read and write
18002D000
direct allocation
page readonly
15CC53AB000
heap
page read and write
7FF87C185000
unkown
page readonly
5B40000
trusted library allocation
page read and write
2F4C477000
stack
page read and write
AE5000
heap
page read and write
128E000
heap
page read and write
18002C000
direct allocation
page read and write
7FF87C182000
unkown
page readonly
AA9000
heap
page read and write
16309126000
heap
page read and write
7FF87C185000
unkown
page readonly
E0C000
heap
page read and write
AD2000
heap
page read and write
B0530FE000
stack
page read and write
D3F000
heap
page read and write
163090C0000
heap
page read and write
2BD0000
heap
page read and write
1630910F000
heap
page read and write
7FF87C187000
unkown
page readonly
163090C8000
heap
page read and write
2240000
heap
page read and write
891E000
stack
page read and write
1260000
heap
page read and write
128E000
heap
page read and write
7FF87C138000
unkown
page readonly
16308E60000
heap
page read and write
15CC5386000
heap
page read and write
AA9000
heap
page read and write
D4E000
heap
page read and write
6E5000
heap
page read and write
AA7000
heap
page read and write
3E0000
heap
page read and write
750000
heap
page read and write
D632EFE000
stack
page read and write
A70000
heap
page read and write
7F0000
heap
page read and write
15CC5280000
heap
page read and write
7FF87C100000
unkown
page readonly
E50000
heap
page read and write
D79000
heap
page read and write
760000
heap
page read and write
AEB000
heap
page read and write
AFA000
heap
page read and write
12B1000
heap
page read and write
2F4C67B000
stack
page read and write
180000000
direct allocation
page read and write
780000
remote allocation
page read and write
7FF87C182000
unkown
page readonly
E20000
heap
page read and write
A7E000
heap
page read and write
1240000
heap
page read and write
1296000
heap
page read and write
D632AFF000
stack
page read and write
6F0000
direct allocation
page execute and read and write
180000000
direct allocation
page read and write
AFA000
heap
page read and write
E87000
heap
page read and write
A60000
heap
page read and write
D10000
heap
page read and write
225B38B0000
heap
page read and write
15CC6CB0000
heap
page read and write
1280000
heap
page read and write
2D71000
heap
page read and write
780000
remote allocation
page read and write
B35000
heap
page read and write
15CC5397000
heap
page read and write
26E1000
heap
page read and write
797000
heap
page read and write
26E6000
heap
page read and write
870000
heap
page read and write
A9F000
heap
page read and write
2C323170000
heap
page read and write
797000
heap
page read and write
180000000
direct allocation
page read and write
15CC5370000
heap
page read and write
D4E000
stack
page read and write
15CC5210000
heap
page read and write
A40000
heap
page readonly
225B38DB000
heap
page read and write
EAF000
heap
page read and write
2C3217F7000
heap
page read and write
A86000
heap
page read and write
E2B000
heap
page read and write
A86000
heap
page read and write
AD3000
heap
page read and write
78A000
heap
page read and write
7FF87C100000
unkown
page readonly
AF1000
heap
page read and write
225B3908000
heap
page read and write
225B5300000
heap
page read and write
AE5000
heap
page read and write
B35000
heap
page read and write
2F4C57F000
stack
page read and write
660000
heap
page read and write
211F000
stack
page read and write
283E000
stack
page read and write
28EE000
stack
page read and write
7C8000
heap
page read and write
7FF87C138000
unkown
page readonly
A9B000
heap
page read and write
A7E000
heap
page read and write
225B3908000
heap
page read and write
1040000
heap
page read and write
DD8000
heap
page read and write
26E1000
heap
page read and write
A7A000
heap
page read and write
26E1000
heap
page read and write
B3B000
heap
page read and write
A50000
heap
page read and write
FE0000
heap
page readonly
2CB3000
heap
page read and write
6E0000
heap
page read and write
15CC535F000
heap
page read and write
16309045000
heap
page read and write
7FF87C101000
unkown
page execute read
881E000
stack
page read and write
D40000
heap
page read and write
960000
heap
page read and write
2C3217F7000
heap
page read and write
F9F000
stack
page read and write
D15000
heap
page read and write
B3B000
heap
page read and write
7FF87C182000
unkown
page readonly
2C6C000
stack
page read and write
16309050000
trusted library allocation
page read and write
2DE0000
heap
page read and write
EDB000
heap
page read and write
18002D000
direct allocation
page readonly
163090D0000
heap
page read and write
ADA000
heap
page read and write
5A70079000
stack
page read and write
25BD000
stack
page read and write
DF0000
heap
page read and write
7FF87C187000
unkown
page readonly
127F000
heap
page read and write
18002B000
direct allocation
page readonly
293B000
stack
page read and write
225B38B8000
heap
page read and write
2BEC000
stack
page read and write
2C50000
heap
page read and write
18002C000
direct allocation
page read and write
AA6000
heap
page read and write
1285000
heap
page read and write
16309107000
heap
page read and write
D80000
heap
page read and write
7FF87C185000
unkown
page readonly
D56000
heap
page read and write
ACC000
heap
page read and write
2A60000
heap
page read and write
15CC6DF0000
trusted library allocation
page read and write
225B3A80000
heap
page read and write
7B0000
heap
page read and write
2690000
heap
page read and write
B3B000
heap
page read and write
16309F20000
trusted library allocation
page read and write
128E000
heap
page read and write
E87000
heap
page read and write
16309049000
heap
page read and write
2D6E000
stack
page read and write
1285000
heap
page read and write
AFC000
heap
page read and write
18002B000
direct allocation
page readonly
27B0000
heap
page read and write
7FF87C138000
unkown
page readonly
5A6FCDC000
stack
page read and write
2C3232D0000
trusted library allocation
page read and write
950000
remote allocation
page read and write
D20000
heap
page read and write
B052DCC000
stack
page read and write
225B3AF0000
direct allocation
page execute and read and write
26ED000
heap
page read and write
E05000
heap
page read and write
2CEF000
stack
page read and write
A30000
direct allocation
page execute and read and write
B05317E000
stack
page read and write
16309F00000
heap
page readonly
225B394B000
heap
page read and write
16309030000
trusted library allocation
page read and write
A75000
heap
page read and write
2F4C2FE000
stack
page read and write
18002C000
direct allocation
page read and write
15CC5220000
heap
page read and write
B35000
heap
page read and write
AC9000
heap
page read and write
FD0000
heap
page read and write
ACC000
heap
page read and write
B4F000
heap
page read and write
700000
heap
page readonly
15CC5225000
heap
page read and write
7FF87C17E000
unkown
page read and write
AE0000
heap
page read and write
225B5400000
trusted library allocation
page read and write
7FF87C17E000
unkown
page read and write
AA1000
heap
page read and write
15CC6CDC000
heap
page read and write
225B3908000
heap
page read and write
2D70000
heap
page read and write
247E000
stack
page read and write
7FF87C100000
unkown
page readonly
26ED000
heap
page read and write
A7E000
heap
page read and write
16309F70000
trusted library allocation
page read and write
7C8000
heap
page read and write
7AE000
heap
page read and write
15CC535F000
heap
page read and write
FF0000
trusted library allocation
page read and write
D4E000
heap
page read and write
2950000
heap
page read and write
AFC000
heap
page read and write
B50000
heap
page read and write
5DD0000
trusted library allocation
page read and write
D632CFE000
stack
page read and write
A75000
heap
page read and write
2250000
heap
page read and write
AD7000
heap
page read and write
5A7017E000
stack
page read and write
104C000
heap
page read and write
D45000
heap
page read and write
2C3217FE000
heap
page read and write
2C3232D0000
trusted library allocation
page read and write
18002C000
direct allocation
page read and write
16309CB0000
trusted library allocation
page read and write
D28000
heap
page read and write
D4E000
heap
page read and write
7FF87C187000
unkown
page readonly
D5E000
heap
page read and write
D73000
heap
page read and write
770000
heap
page read and write
2C32319C000
heap
page read and write
7FF87C138000
unkown
page readonly
ACC000
heap
page read and write
AFC000
heap
page read and write
AE8000
heap
page read and write
225B3928000
heap
page read and write
2C3217F7000
heap
page read and write
B3B000
heap
page read and write
29DF000
stack
page read and write
225B3916000
heap
page read and write
26E6000
heap
page read and write
15CC6DB0000
heap
page readonly
E06000
heap
page read and write
225B38D6000
heap
page read and write
ADA000
heap
page read and write
7FF87C187000
unkown
page readonly
5D5E000
stack
page read and write
1210000
remote allocation
page read and write
5A701F9000
stack
page read and write
2DE0000
heap
page read and write
DFD000
heap
page read and write
23D0000
trusted library allocation
page read and write
550E000
stack
page read and write
15CC5399000
heap
page read and write
A8C000
heap
page read and write
B34000
heap
page read and write
18002D000
direct allocation
page readonly
180000000
direct allocation
page read and write
7FF87C138000
unkown
page readonly
AE8000
heap
page read and write
2669000
heap
page read and write
18002B000
direct allocation
page readonly
1296000
heap
page read and write
1630910F000
heap
page read and write
7FF87C101000
unkown
page execute read
6A0000
heap
page read and write
AE7000
heap
page read and write
2691000
heap
page read and write
AE1000
heap
page read and write
C9B000
stack
page read and write
1210000
remote allocation
page read and write
16309EF0000
trusted library allocation
page read and write
A58000
heap
page read and write
18002B000
direct allocation
page readonly
DFD000
heap
page read and write
15CC5348000
heap
page read and write
18002D000
direct allocation
page readonly
7EB000
heap
page read and write
2953000
heap
page read and write
16309F10000
trusted library allocation
page read and write
AAD000
heap
page read and write
7A8000
heap
page read and write
65D0000
heap
page read and write
B05307F000
stack
page read and write
CC0000
remote allocation
page read and write
225B3B55000
heap
page read and write
There are 555 hidden memdumps, click here to show them.