IOC Report
gdazhx1EIP.exe

loading gif

Files

File Path
Type
Category
Malicious
gdazhx1EIP.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\gdazhx1EIP.dll"
malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\gdazhx1EIP.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\gdazhx1EIP.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\gdazhx1EIP.dll,DllRegisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\RSNLKxhQH\IhDzTlHldHNg.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\VGdnyYmEzk\YPrp.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\XeFlcoVt\wPzeOKW.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\MtAvdtxCDyblyei\mPrhkfVupthqSBxp.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\RSNLKxhQH\IhDzTlHldHNg.dll
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\EHrtIMNuOOnxGF\cDTWQXzuCIj.dll"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\gdazhx1EIP.dll",#1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://172.105.115.71:8080/
unknown
https://112.105.115.71:8080/
unknown
https://172.105.115.71:8080/lsug/nhhwenwy/qahixm/
unknown

IPs

IP
Domain
Country
Malicious
172.105.115.71
unknown
United States
malicious
188.165.79.151
unknown
France
malicious
196.44.98.190
unknown
Ghana
malicious
174.138.33.49
unknown
United States
malicious
36.67.23.59
unknown
Indonesia
malicious
103.41.204.169
unknown
Indonesia
malicious
85.214.67.203
unknown
Germany
malicious
83.229.80.93
unknown
United Kingdom
malicious
198.199.70.22
unknown
United States
malicious
93.104.209.107
unknown
Germany
malicious
186.250.48.5
unknown
Brazil
malicious
209.239.112.82
unknown
United States
malicious
175.126.176.79
unknown
Korea Republic of
malicious
128.199.242.164
unknown
United Kingdom
malicious
178.238.225.252
unknown
Germany
malicious
46.101.98.60
unknown
Netherlands
malicious
190.145.8.4
unknown
Colombia
malicious
82.98.180.154
unknown
Spain
malicious
103.71.99.57
unknown
India
malicious
87.106.97.83
unknown
Germany
malicious
103.254.12.236
unknown
Viet Nam
malicious
103.85.95.4
unknown
Indonesia
malicious
202.134.4.210
unknown
Indonesia
malicious
165.22.254.236
unknown
United States
malicious
78.47.204.80
unknown
Germany
malicious
118.98.72.86
unknown
Indonesia
malicious
139.59.80.108
unknown
Singapore
malicious
104.244.79.94
unknown
United States
malicious
37.44.244.177
unknown
Germany
malicious
51.75.33.122
unknown
France
malicious
160.16.143.191
unknown
Japan
malicious
103.56.149.105
unknown
Indonesia
malicious
85.25.120.45
unknown
Germany
malicious
139.196.72.155
unknown
China
malicious
115.178.55.22
unknown
Indonesia
malicious
103.126.216.86
unknown
Bangladesh
malicious
128.199.217.206
unknown
United Kingdom
malicious
114.79.130.68
unknown
India
malicious
103.224.241.74
unknown
India
malicious
210.57.209.142
unknown
Indonesia
malicious
202.28.34.99
unknown
Thailand
malicious
80.211.107.116
unknown
Italy
malicious
54.37.228.122
unknown
France
malicious
218.38.121.17
unknown
Korea Republic of
malicious
185.148.169.10
unknown
Germany
malicious
195.77.239.39
unknown
Spain
malicious
178.62.112.199
unknown
European Union
malicious
62.171.178.147
unknown
United Kingdom
malicious
64.227.55.231
unknown
United States
malicious
There are 39 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
IhDzTlHldHNg.dll
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
490000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
18104890000
direct allocation
page execute and read and write
malicious
28E0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
B60000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
222D2E50000
direct allocation
page execute and read and write
malicious
1FD03F10000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
1A093AB0000
remote allocation
page read and write
F60000
heap
page read and write
520000
heap
page read and write
265EFE000
stack
page read and write
14388322000
heap
page read and write
E08000
heap
page read and write
83A077E000
stack
page read and write
190000
heap
page read and write
52D000
heap
page read and write
1A093502000
heap
page read and write
14388343000
heap
page read and write
1A2C552B000
heap
page read and write
610BEFC000
stack
page read and write
222D1570000
heap
page read and write
40E5B7C000
stack
page read and write
8B5000
heap
page read and write
9B0000
heap
page read and write
2669000
stack
page read and write
1A2C5502000
heap
page read and write
268B000
stack
page read and write
7FFC28938000
unkown
page readonly
222D141A000
heap
page read and write
189DE713000
heap
page read and write
181048D0000
heap
page readonly
18002C000
direct allocation
page read and write
14387A8C000
heap
page read and write
40B6EB000
stack
page read and write
14387BE5000
heap
page read and write
1FB7E62A000
heap
page read and write
2881000
heap
page read and write
265FB160000
trusted library allocation
page read and write
1A74EE47000
heap
page read and write
E00000
remote allocation
page read and write
FDD000
heap
page read and write
1FF8000
heap
page read and write
7FFC28900000
unkown
page readonly
7FFC28901000
unkown
page execute read
2A9E000
stack
page read and write
53B000
heap
page read and write
40B7EE000
stack
page read and write
1A093AB0000
remote allocation
page read and write
1FAD4202000
heap
page read and write
545000
heap
page read and write
1FD03E10000
heap
page read and write
1A2C5400000
heap
page read and write
506000
heap
page read and write
880000
heap
page read and write
504000
heap
page read and write
1FB7E652000
heap
page read and write
31D8179000
stack
page read and write
14387880000
heap
page read and write
12C8E100000
heap
page read and write
E26000
heap
page read and write
6C0000
remote allocation
page read and write
2893000
heap
page read and write
31D807E000
stack
page read and write
52D000
heap
page read and write
18002D000
direct allocation
page readonly
1000000
heap
page read and write
1A2C545A000
heap
page read and write
839FBAB000
stack
page read and write
FEF000
heap
page read and write
181061E0000
heap
page read and write
A3B000
heap
page read and write
1A74EE62000
heap
page read and write
743000
heap
page read and write
1FF8000
heap
page read and write
7A0000
heap
page read and write
265FA5D1000
heap
page read and write
7FFC2897E000
unkown
page read and write
1FD025A1000
heap
page read and write
E6C000
heap
page read and write
2470000
heap
page read and write
53F000
heap
page read and write
1A2C5500000
heap
page read and write
265FA4D0000
trusted library allocation
page read and write
A1E917C000
stack
page read and write
23DF000
stack
page read and write
189DE602000
heap
page read and write
1A74EE39000
heap
page read and write
200B000
heap
page read and write
200B000
heap
page read and write
34D4E7D000
stack
page read and write
50E000
heap
page read and write
F65000
heap
page read and write
1A2C5370000
trusted library allocation
page read and write
1FD0257D000
heap
page read and write
AF1000
heap
page read and write
C00000
heap
page read and write
1EB000
stack
page read and write
630000
heap
page read and write
7FFC28982000
unkown
page readonly
31D7D6C000
stack
page read and write
12C8E258000
heap
page read and write
A1E8F7F000
stack
page read and write
533000
heap
page read and write
28A9000
heap
page read and write
1FB7E602000
heap
page read and write
B90000
direct allocation
page execute and read and write
265FA5D4000
heap
page read and write
8D0000
remote allocation
page read and write
222D12F0000
heap
page read and write
12C8E268000
heap
page read and write
12C8E279000
heap
page read and write
280E000
stack
page read and write
FE5000
heap
page read and write
1FD0257B000
heap
page read and write
3AAD000
stack
page read and write
52D000
heap
page read and write
1A74EE13000
heap
page read and write
527000
heap
page read and write
14388300000
heap
page read and write
610BFFC000
stack
page read and write
222D13EE000
heap
page read and write
1A74EE43000
heap
page read and write
1A093413000
heap
page read and write
8AD000
heap
page read and write
1A74EE66000
heap
page read and write
1438836D000
heap
page read and write
200B000
heap
page read and write
ACD000
heap
page read and write
181063C0000
heap
page read and write
1A2C545A000
heap
page read and write
1A2C5440000
heap
page read and write
40E5CFF000
stack
page read and write
513000
heap
page read and write
222D13D8000
heap
page read and write
2890000
heap
page read and write
18002C000
direct allocation
page read and write
1FB7E580000
trusted library allocation
page read and write
2670000
trusted library allocation
page read and write
222D2D50000
heap
page read and write
12C8E110000
heap
page read and write
517000
heap
page read and write
20DC000
stack
page read and write
189DE702000
heap
page read and write
ACD000
heap
page read and write
222D1560000
heap
page read and write
7FFC28938000
unkown
page readonly
7FFC28987000
unkown
page readonly
1A74ED20000
heap
page read and write
189DE65B000
heap
page read and write
BB5000
heap
page read and write
595000
heap
page read and write
7C0000
heap
page read and write
18002D000
direct allocation
page readonly
28A8000
heap
page read and write
1A74EF02000
heap
page read and write
E40000
heap
page read and write
20F0000
trusted library allocation
page read and write
1A2C6E02000
trusted library allocation
page read and write
2A30000
trusted library allocation
page read and write
8D0000
remote allocation
page read and write
189DE66B000
heap
page read and write
7FFC28900000
unkown
page readonly
ADC000
heap
page read and write
54D000
heap
page read and write
506000
heap
page read and write
265FA5D3000
heap
page read and write
A97000
heap
page read and write
4FF000
heap
page read and write
1A74EE58000
heap
page read and write
8B6000
heap
page read and write
265FA588000
heap
page read and write
1A74EE60000
heap
page read and write
AB4000
heap
page read and write
80C000
heap
page read and write
5AF000
heap
page read and write
2850000
heap
page read and write
73F000
stack
page read and write
265FA5D1000
heap
page read and write
555000
heap
page read and write
555000
heap
page read and write
FE5000
heap
page read and write
222D13AC000
heap
page read and write
14388430000
heap
page read and write
7FFC28987000
unkown
page readonly
534000
heap
page read and write
1FAD3A84000
heap
page read and write
534000
heap
page read and write
A30000
heap
page read and write
40B76E000
stack
page read and write
83A097F000
stack
page read and write
14387A65000
heap
page read and write
2140000
heap
page read and write
1FB7E613000
heap
page read and write
245E000
stack
page read and write
8BA000
stack
page read and write
610C07B000
stack
page read and write
7FFC28938000
unkown
page readonly
FDD000
heap
page read and write
180000000
direct allocation
page read and write
1A74EE85000
heap
page read and write
189DE63D000
heap
page read and write
2001000
heap
page read and write
1A74EE30000
heap
page read and write
1FD02400000
heap
page read and write
1FAD3A24000
heap
page read and write
54A000
heap
page read and write
E47007B000
stack
page read and write
1A2C5471000
heap
page read and write
1FD03F40000
direct allocation
page execute and read and write
40E57DC000
stack
page read and write
7A5000
heap
page read and write
FE5000
heap
page read and write
265FA5D1000
heap
page read and write
1A2C6DE0000
remote allocation
page read and write
5B7000
heap
page read and write
14387A6E000
heap
page read and write
A76000
heap
page read and write
1FD0254D000
heap
page read and write
AAE000
heap
page read and write
54D000
heap
page read and write
534000
heap
page read and write
12C8E200000
heap
page read and write
1A74EE7C000
heap
page read and write
517000
heap
page read and write
6C0000
remote allocation
page read and write
143883C6000
heap
page read and write
189DE460000
heap
page read and write
A1E88BB000
stack
page read and write
1A74EE69000
heap
page read and write
265FB430000
trusted library allocation
page read and write
222D2F90000
trusted library allocation
page read and write
14387810000
heap
page read and write
18104820000
heap
page read and write
83A047D000
stack
page read and write
1FAD3B13000
heap
page read and write
7FFC28987000
unkown
page readonly
69E000
stack
page read and write
5AB000
heap
page read and write
1A2C5465000
heap
page read and write
14388413000
heap
page read and write
18104949000
heap
page read and write
14387B13000
heap
page read and write
E49000
heap
page read and write
1FAD3A6D000
heap
page read and write
265FA580000
heap
page read and write
52B000
heap
page read and write
53C000
heap
page read and write
1FB7E600000
heap
page read and write
2DFE000
stack
page read and write
E5B000
heap
page read and write
181048F0000
heap
page read and write
260E000
stack
page read and write
180000000
direct allocation
page read and write
D75000
heap
page read and write
4C8000
heap
page read and write
1FD02567000
heap
page read and write
1FB7E624000
heap
page read and write
27E0000
heap
page read and write
1A74EE5A000
heap
page read and write
1A74EE64000
heap
page read and write
2110000
remote allocation
page read and write
265FA900000
trusted library allocation
page read and write
1810490F000
heap
page read and write
1FB7EE02000
trusted library allocation
page read and write
40BB7E000
stack
page read and write
2110000
remote allocation
page read and write
555000
heap
page read and write
760000
heap
page read and write
180000000
direct allocation
page read and write
9BA79FE000
stack
page read and write
8B5000
heap
page read and write
7FFC28901000
unkown
page execute read
69A000
stack
page read and write
FD9000
heap
page read and write
180000000
direct allocation
page read and write
180000000
direct allocation
page read and write
1A74EE75000
heap
page read and write
222D13D8000
heap
page read and write
4ED000
heap
page read and write
222D13F7000
heap
page read and write
1A093400000
heap
page read and write
1001000
heap
page read and write
AC8000
heap
page read and write
1FAD3920000
heap
page read and write
1810495B000
heap
page read and write
2007000
heap
page read and write
52D000
heap
page read and write
20F0000
trusted library allocation
page read and write
A1E8CFE000
stack
page read and write
7FFC28938000
unkown
page readonly
12C8E1A0000
trusted library allocation
page read and write
258D000
stack
page read and write
1A74EE46000
heap
page read and write
1A093AB0000
remote allocation
page read and write
FDD000
heap
page read and write
18002B000
direct allocation
page readonly
50D000
heap
page read and write
AA0000
heap
page read and write
7FFC28900000
unkown
page readonly
1FB7E480000
heap
page read and write
18002C000
direct allocation
page read and write
B20000
heap
page read and write
15E0AFF000
stack
page read and write
4FB000
heap
page read and write
1FD02575000
heap
page read and write
9BA716C000
stack
page read and write
83A057F000
stack
page read and write
28C9000
heap
page read and write
265FA5DB000
heap
page read and write
40D547F000
stack
page read and write
1A74EE33000
heap
page read and write
2190000
heap
page read and write
DB0000
heap
page read and write
15E03DC000
stack
page read and write
A1E947E000
stack
page read and write
2920000
heap
page readonly
7FFC28982000
unkown
page readonly
1FB7E430000
heap
page read and write
29AE000
stack
page read and write
14387A92000
heap
page read and write
2009000
heap
page read and write
1A74EE4E000
heap
page read and write
B30000
heap
page read and write
222D1400000
heap
page read and write
E49000
heap
page read and write
595000
heap
page read and write
7FFC28985000
unkown
page readonly
1F7C000
heap
page read and write
24F0000
heap
page read and write
40BE7E000
stack
page read and write
2A30000
trusted library allocation
page read and write
34D517F000
stack
page read and write
1A2C5518000
heap
page read and write
189DE4D0000
heap
page read and write
E2F000
heap
page read and write
14387A3C000
heap
page read and write
1FD03E3C000
heap
page read and write
7FFC28901000
unkown
page execute read
51A000
heap
page read and write
A00000
heap
page read and write
E36000
heap
page read and write
7FFC28987000
unkown
page readonly
ABF000
heap
page read and write
14388423000
heap
page read and write
4FB000
heap
page read and write
1FAD39B0000
trusted library allocation
page read and write
143883CA000
heap
page read and write
A60000
heap
page read and write
2001000
heap
page read and write
18002C000
direct allocation
page read and write
1A74EDB0000
trusted library allocation
page read and write
610BD7E000
stack
page read and write
12C8E313000
heap
page read and write
18002D000
direct allocation
page readonly
AD5000
heap
page read and write
2A3D000
stack
page read and write
2110000
remote allocation
page read and write
507000
heap
page read and write
12C8E264000
heap
page read and write
E18000
heap
page read and write
222D2D7D000
heap
page read and write
222D2E80000
direct allocation
page execute and read and write
800000
heap
page read and write
5AB000
heap
page read and write
14387A58000
heap
page read and write
1A74EE63000
heap
page read and write
1A74EE5B000
heap
page read and write
222D13F5000
heap
page read and write
FE5000
heap
page read and write
26588B000
stack
page read and write
1A74EE2C000
heap
page read and write
1A74EE5D000
heap
page read and write
265DFB000
stack
page read and write
14387A2D000
heap
page read and write
AC9000
heap
page read and write
1A74EE33000
heap
page read and write
517000
heap
page read and write
1FB7E644000
heap
page read and write
ED5000
heap
page read and write
1A2C5210000
heap
page read and write
1FAD4313000
heap
page read and write
275F000
stack
page read and write
12C8E27D000
heap
page read and write
222D2E90000
heap
page readonly
E4701F9000
stack
page read and write
533000
heap
page read and write
50D000
heap
page read and write
61B0000
heap
page read and write
28C9000
heap
page read and write
1FD025B3000
heap
page read and write
265FA550000
heap
page read and write
765000
heap
page read and write
534000
heap
page read and write
DE2000
heap
page read and write
14388392000
heap
page read and write
15E07FF000
stack
page read and write
1FB7E62F000
heap
page read and write
12C8E228000
heap
page read and write
40E5AFE000
stack
page read and write
1FD0256E000
heap
page read and write
28A9000
heap
page read and write
40BD7F000
stack
page read and write
1A74EE6C000
heap
page read and write
14387A00000
heap
page read and write
189DEE02000
trusted library allocation
page read and write
7FFC28901000
unkown
page execute read
7FFC28982000
unkown
page readonly
20E0000
trusted library allocation
page read and write
5AB000
heap
page read and write
FD0000
heap
page read and write
265FA4C0000
heap
page read and write
A0000
heap
page read and write
1A74EE31000
heap
page read and write
547000
heap
page read and write
24E0000
heap
page read and write
1A093402000
heap
page read and write
34D4FFD000
stack
page read and write
1A74EE6E000
heap
page read and write
AF1000
heap
page read and write
265FA5DA000
heap
page read and write
34D476B000
stack
page read and write
7FFC28985000
unkown
page readonly
143883B0000
heap
page read and write
1F50000
heap
page read and write
AA8000
heap
page read and write
34D4C7C000
stack
page read and write
1A093429000
heap
page read and write
1A74EE42000
heap
page read and write
AEB000
heap
page read and write
58E000
heap
page read and write
1A2C544A000
heap
page read and write
E29000
heap
page read and write
58BF000
stack
page read and write
58F000
heap
page read and write
AD6000
heap
page read and write
5AB000
heap
page read and write
14387A13000
heap
page read and write
E00000
remote allocation
page read and write
ACD000
heap
page read and write
1A74EE6B000
heap
page read and write
180000
remote allocation
page read and write
222D13E5000
heap
page read and write
A76000
heap
page read and write
5AF000
heap
page read and write
1A2C5513000
heap
page read and write
189DE629000
heap
page read and write
A1E927C000
stack
page read and write
513000
heap
page read and write
610C37C000
stack
page read and write
159000
stack
page read and write
40D4EFA000
stack
page read and write
222D1380000
heap
page read and write
6A0000
heap
page read and write
1A2C5402000
heap
page read and write
7FFC28985000
unkown
page readonly
14388202000
heap
page read and write
1A2C548B000
heap
page read and write
DB8000
heap
page read and write
40D4A9B000
stack
page read and write
BD9000
stack
page read and write
2A16000
heap
page read and write
E4703FB000
stack
page read and write
4F60000
trusted library allocation
page read and write
18002B000
direct allocation
page readonly
1FD03FE0000
heap
page read and write
26D0000
heap
page read and write
410000
remote allocation
page read and write
265FB1D0000
trusted library allocation
page read and write
18104948000
heap
page read and write
5CA0000
heap
page read and write
7FFC2897E000
unkown
page read and write
AD9000
heap
page read and write
18002B000
direct allocation
page readonly
595000
heap
page read and write
1FD02567000
heap
page read and write
1A2C5413000
heap
page read and write
12C8E240000
heap
page read and write
7FFC28982000
unkown
page readonly
9BA74FE000
stack
page read and write
40D55FE000
stack
page read and write
1FAD3AB9000
heap
page read and write
265FFF000
stack
page read and write
1FD02553000
heap
page read and write
545000
heap
page read and write
2A27000
stack
page read and write
7FFC28901000
unkown
page execute read
5AB000
heap
page read and write
1FD03F70000
trusted library allocation
page read and write
222D13A7000
heap
page read and write
58F000
heap
page read and write
EE0000
heap
page read and write
5AF000
heap
page read and write
24DE000
stack
page read and write
517000
heap
page read and write
14387A69000
heap
page read and write
34D4BFC000
stack
page read and write
2473000
heap
page read and write
1FAD3AC0000
heap
page read and write
556000
heap
page read and write
1FD02540000
heap
page read and write
420000
heap
page read and write
AF1000
heap
page read and write
4FF000
heap
page read and write
40D50FB000
stack
page read and write
18104949000
heap
page read and write
1A74EE31000
heap
page read and write
40E5C7E000
stack
page read and write
189DE665000
heap
page read and write
1A74EE41000
heap
page read and write
BB0000
heap
page read and write
83A017E000
stack
page read and write
27DF000
stack
page read and write
14387A29000
heap
page read and write
181046E0000
heap
page read and write
2881000
heap
page read and write
1A2C544A000
heap
page read and write
1A2C5200000
heap
page read and write
ED0000
heap
page read and write
FEB000
heap
page read and write
54D000
heap
page read and write
AD9000
heap
page read and write
50C000
heap
page read and write
14388302000
heap
page read and write
18002B000
direct allocation
page readonly
50D000
heap
page read and write
2EDF000
stack
page read and write
A97000
heap
page read and write
7FFC28985000
unkown
page readonly
189DE5D0000
trusted library allocation
page read and write
181048F9000
heap
page read and write
59D0000
heap
page read and write
265FA5C9000
heap
page read and write
5B1000
heap
page read and write
1FD02573000
heap
page read and write
222D139E000
heap
page read and write
18002D000
direct allocation
page readonly
1FAD3ACA000
heap
page read and write
58E000
heap
page read and write
40BC7E000
stack
page read and write
5AF000
heap
page read and write
222D13D8000
heap
page read and write
8AD000
heap
page read and write
F6C000
heap
page read and write
1A74EE59000
heap
page read and write
12C8E213000
heap
page read and write
14387A43000
heap
page read and write
F00000
heap
page read and write
21CB000
stack
page read and write
1A74EE78000
heap
page read and write
5B6000
heap
page read and write
14388400000
heap
page read and write
1FB0000
heap
page read and write
555000
heap
page read and write
539000
heap
page read and write
130000
heap
page read and write
31D80FE000
stack
page read and write
1FAD4339000
heap
page read and write
FB8000
heap
page read and write
FB0000
heap
page read and write
7FFC2897E000
unkown
page read and write
1A74EE76000
heap
page read and write
1FD04065000
heap
page read and write
1FAD3A3E000
heap
page read and write
1810494C000
heap
page read and write
14387A78000
heap
page read and write
E47027C000
stack
page read and write
8B5000
heap
page read and write
7FFC28985000
unkown
page readonly
189DE613000
heap
page read and write
1FAD3B02000
heap
page read and write
18002D000
direct allocation
page readonly
2810000
heap
page read and write
610BB7C000
stack
page read and write
189DE470000
heap
page read and write
14388430000
heap
page read and write
1A2C6DA0000
trusted library allocation
page read and write
222D2F90000
trusted library allocation
page read and write
1FD03F70000
trusted library allocation
page read and write
50D000
heap
page read and write
4ED000
heap
page read and write
1A2C5447000
heap
page read and write
51A000
heap
page read and write
610BE7F000
stack
page read and write
1FD02578000
heap
page read and write
A67000
heap
page read and write
18002C000
direct allocation
page read and write
1A74ED10000
heap
page read and write
1A0932C0000
heap
page read and write
1FD04060000
heap
page read and write
222D13AC000
heap
page read and write
595000
heap
page read and write
222D1360000
heap
page read and write
AC5000
heap
page read and write
595000
heap
page read and write
517000
heap
page read and write
1FD03F50000
heap
page read and write
1A2C53C0000
trusted library allocation
page read and write
143883BC000
heap
page read and write
1F89000
heap
page read and write
52D000
heap
page read and write
14387A54000
heap
page read and write
E18000
heap
page read and write
2F5B000
stack
page read and write
7FFC28900000
unkown
page readonly
1FB7E702000
heap
page read and write
1FAD3980000
heap
page read and write
1A74EE27000
heap
page read and write
1A093320000
heap
page read and write
513000
heap
page read and write
595000
heap
page read and write
1A74EE61000
heap
page read and write
7FFC2897E000
unkown
page read and write
222D1409000
heap
page read and write
14388402000
heap
page read and write
15E08FA000
stack
page read and write
1A74EE2A000
heap
page read and write
EB0000
heap
page read and write
AD5000
heap
page read and write
180000000
direct allocation
page read and write
610C27E000
stack
page read and write
7FFC28938000
unkown
page readonly
FDD000
heap
page read and write
E470379000
stack
page read and write
40D54FF000
stack
page read and write
7FFC28985000
unkown
page readonly
9BA77FE000
stack
page read and write
A97000
heap
page read and write
222D13D8000
heap
page read and write
222D13F7000
heap
page read and write
1FB7E420000
heap
page read and write
5B6000
heap
page read and write
E37000
heap
page read and write
BA0000
heap
page readonly
1A74EE45000
heap
page read and write
40E5BF7000
stack
page read and write
527000
heap
page read and write
790000
direct allocation
page execute and read and write
534000
heap
page read and write
7FFC2897E000
unkown
page read and write
CBB000
stack
page read and write
AB6000
heap
page read and write
440000
heap
page read and write
180000
remote allocation
page read and write
143879A0000
trusted library allocation
page read and write
8AD000
heap
page read and write
240F000
stack
page read and write
14388427000
heap
page read and write
14387820000
heap
page read and write
1A093C02000
trusted library allocation
page read and write
610C17E000
stack
page read and write
5760000
heap
page read and write
2001000
heap
page read and write
222D1388000
heap
page read and write
1A2C6DE0000
remote allocation
page read and write
1FAD4300000
heap
page read and write
41AE000
stack
page read and write
18104920000
heap
page read and write
265FA5DA000
heap
page read and write
265FA5F3000
heap
page read and write
A55000
heap
page read and write
2050000
heap
page readonly
8A5000
heap
page read and write
542000
heap
page read and write
40D4FFF000
stack
page read and write
1FAD3A88000
heap
page read and write
1FD1000
heap
page read and write
E18000
heap
page read and write
1FB7E63E000
heap
page read and write
2001000
heap
page read and write
4ED000
heap
page read and write
12C8E170000
heap
page read and write
34D4EFE000
stack
page read and write
AA8000
heap
page read and write
AB6000
heap
page read and write
1FD02587000
heap
page read and write
40E5A7E000
stack
page read and write
18002B000
direct allocation
page readonly
1810490F000
heap
page read and write
31D7DEF000
stack
page read and write
4F0000
heap
page read and write
7A0000
heap
page read and write
1A74EE00000
heap
page read and write
509000
heap
page read and write
E18000
heap
page read and write
1A0932B0000
heap
page read and write
1810490F000
heap
page read and write
222D13A5000
heap
page read and write
509000
heap
page read and write
14387B8E000
heap
page read and write
9BA78F9000
stack
page read and write
265FA8F5000
heap
page read and write
1A74EE7B000
heap
page read and write
40D537E000
stack
page read and write
14387A70000
heap
page read and write
1A74EE2E000
heap
page read and write
270E000
stack
page read and write
14387A92000
heap
page read and write
AC0000
heap
page read and write
2910000
direct allocation
page execute and read and write
A97000
heap
page read and write
7FFC28900000
unkown
page readonly
51D0000
trusted library allocation
page read and write
58F000
heap
page read and write
805000
heap
page read and write
6EB000
stack
page read and write
555000
heap
page read and write
E18000
heap
page read and write
51A000
heap
page read and write
555000
heap
page read and write
18002D000
direct allocation
page readonly
1A093440000
heap
page read and write
E18000
heap
page read and write
9BA75FE000
stack
page read and write
610C47E000
stack
page read and write
83A027D000
stack
page read and write
31D81FE000
stack
page read and write
1A74EE3C000
heap
page read and write
40D5179000
stack
page read and write
265FB410000
trusted library allocation
page read and write
18104BA0000
trusted library allocation
page read and write
40D527A000
stack
page read and write
1A2C5457000
heap
page read and write
15E09FC000
stack
page read and write
7FFC28982000
unkown
page readonly
555000
heap
page read and write
14387BB9000
heap
page read and write
14388322000
heap
page read and write
517000
heap
page read and write
88B000
heap
page read and write
14387980000
trusted library allocation
page read and write
410000
remote allocation
page read and write
555000
heap
page read and write
7FFC28900000
unkown
page readonly
189DE675000
heap
page read and write
265FB1C0000
trusted library allocation
page read and write
18002B000
direct allocation
page readonly
D7C000
heap
page read and write
4C0000
heap
page read and write
1A09345E000
heap
page read and write
51A000
heap
page read and write
506000
heap
page read and write
1A74EE49000
heap
page read and write
51A000
heap
page read and write
7FFC28987000
unkown
page readonly
1FAD3A13000
heap
page read and write
FE5000
heap
page read and write
A97000
heap
page read and write
265FA530000
heap
page read and write
1B0000
heap
page read and write
14387A75000
heap
page read and write
1A2C6DE0000
remote allocation
page read and write
14388354000
heap
page read and write
265FB490000
trusted library allocation
page read and write
1FD02640000
heap
page read and write
A1E907E000
stack
page read and write
51BE000
stack
page read and write
1A74EE7F000
heap
page read and write
1810620C000
heap
page read and write
FD5000
heap
page read and write
181063D0000
trusted library allocation
page read and write
1FD03E3C000
heap
page read and write
1A2C5390000
trusted library allocation
page read and write
839FFFB000
stack
page read and write
AD5000
heap
page read and write
7FFC2897E000
unkown
page read and write
5AF000
heap
page read and write
89F000
heap
page read and write
1FB7E63C000
heap
page read and write
240E000
stack
page read and write
534000
heap
page read and write
AA5000
heap
page read and write
860000
heap
page read and write
7FFC28901000
unkown
page execute read
9BA76FF000
stack
page read and write
1FAD3910000
heap
page read and write
12C8E300000
heap
page read and write
83A067E000
stack
page read and write
1FAD3A00000
heap
page read and write
7FFC28987000
unkown
page readonly
59B0000
trusted library allocation
page read and write
1FAD3AC7000
heap
page read and write
181048C0000
direct allocation
page execute and read and write
1A2C5455000
heap
page read and write
12C8E202000
heap
page read and write
200F000
heap
page read and write
7FFC28938000
unkown
page readonly
FE5000
heap
page read and write
A97000
heap
page read and write
12C8E302000
heap
page read and write
E37000
heap
page read and write
610B70C000
stack
page read and write
83A087F000
stack
page read and write
265FA8F0000
heap
page read and write
2193000
heap
page read and write
76C000
heap
page read and write
189DE677000
heap
page read and write
A1E8E7F000
stack
page read and write
1A74EE65000
heap
page read and write
265FA8F9000
heap
page read and write
1FD025A1000
heap
page read and write
740000
heap
page read and write
1FD02567000
heap
page read and write
20E0000
trusted library allocation
page read and write
40E5D7B000
stack
page read and write
593E000
stack
page read and write
A60000
heap
page read and write
12C8EA02000
trusted library allocation
page read and write
222D1565000
heap
page read and write
EE0000
heap
page read and write
58F000
heap
page read and write
222D13B6000
heap
page read and write
7FFC28982000
unkown
page readonly
D70000
heap
page read and write
5B6000
heap
page read and write
265FB440000
trusted library allocation
page read and write
3E0000
heap
page read and write
1A093A80000
trusted library allocation
page read and write
52D000
heap
page read and write
189DE600000
heap
page read and write
222D13D8000
heap
page read and write
265FB150000
trusted library allocation
page read and write
1A2C542A000
heap
page read and write
54A0000
trusted library allocation
page read and write
1A74ED80000
heap
page read and write
E4702FE000
stack
page read and write
9D0000
heap
page read and write
265FB420000
heap
page readonly
800000
heap
page read and write
1A2C5270000
heap
page read and write
1A74F602000
trusted library allocation
page read and write
AC8000
heap
page read and write
222D13E8000
heap
page read and write
18104840000
heap
page read and write
2670000
trusted library allocation
page read and write
222D2FC0000
heap
page read and write
18104BC0000
heap
page read and write
5A4000
heap
page read and write
18002C000
direct allocation
page read and write
18104BC5000
heap
page read and write
51A000
heap
page read and write
FD5000
heap
page read and write
There are 836 hidden memdumps, click here to show them.