IOC Report
gdazhx1EIP.dll

loading gif

Files

File Path
Type
Category
Malicious
gdazhx1EIP.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\gdazhx1EIP.dll"
malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\gdazhx1EIP.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\gdazhx1EIP.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\gdazhx1EIP.dll,DllRegisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AEDSEwQF\PBid.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\SwzTtIAmqdPBna\Ntrjg.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\GQmyGle\ScmiHVadtyVtThN.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NTIufvJuRVPL\QYaWGzhqdb.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\AEDSEwQF\PBid.dll
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\Zyymwn\eKUKMW.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\RSNLKxhQH\IhDzTlHldHNg.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\VGdnyYmEzk\YPrp.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\XeFlcoVt\wPzeOKW.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\MtAvdtxCDyblyei\mPrhkfVupthqSBxp.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\RSNLKxhQH\IhDzTlHldHNg.dll
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\EHrtIMNuOOnxGF\cDTWQXzuCIj.dll"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\gdazhx1EIP.dll",#1
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://172.105.115.71:8080/mcxnkbajti/
unknown
https://172.105.115.71:8080/s.dll
unknown
https://172.105.115.71:8080/
unknown
https://112.105.115.71:8080/
unknown
https://172.105.115.71:8080/lsug/nhhwenwy/qahixm/
unknown

IPs

IP
Domain
Country
Malicious
172.105.115.71
unknown
United States
malicious
188.165.79.151
unknown
France
malicious
196.44.98.190
unknown
Ghana
malicious
174.138.33.49
unknown
United States
malicious
36.67.23.59
unknown
Indonesia
malicious
103.41.204.169
unknown
Indonesia
malicious
85.214.67.203
unknown
Germany
malicious
83.229.80.93
unknown
United Kingdom
malicious
198.199.70.22
unknown
United States
malicious
93.104.209.107
unknown
Germany
malicious
186.250.48.5
unknown
Brazil
malicious
209.239.112.82
unknown
United States
malicious
175.126.176.79
unknown
Korea Republic of
malicious
128.199.242.164
unknown
United Kingdom
malicious
178.238.225.252
unknown
Germany
malicious
46.101.98.60
unknown
Netherlands
malicious
190.145.8.4
unknown
Colombia
malicious
82.98.180.154
unknown
Spain
malicious
103.71.99.57
unknown
India
malicious
87.106.97.83
unknown
Germany
malicious
103.254.12.236
unknown
Viet Nam
malicious
103.85.95.4
unknown
Indonesia
malicious
202.134.4.210
unknown
Indonesia
malicious
165.22.254.236
unknown
United States
malicious
78.47.204.80
unknown
Germany
malicious
118.98.72.86
unknown
Indonesia
malicious
139.59.80.108
unknown
Singapore
malicious
104.244.79.94
unknown
United States
malicious
37.44.244.177
unknown
Germany
malicious
51.75.33.122
unknown
France
malicious
160.16.143.191
unknown
Japan
malicious
103.56.149.105
unknown
Indonesia
malicious
85.25.120.45
unknown
Germany
malicious
139.196.72.155
unknown
China
malicious
115.178.55.22
unknown
Indonesia
malicious
103.126.216.86
unknown
Bangladesh
malicious
128.199.217.206
unknown
United Kingdom
malicious
114.79.130.68
unknown
India
malicious
103.224.241.74
unknown
India
malicious
210.57.209.142
unknown
Indonesia
malicious
202.28.34.99
unknown
Thailand
malicious
80.211.107.116
unknown
Italy
malicious
54.37.228.122
unknown
France
malicious
218.38.121.17
unknown
Korea Republic of
malicious
185.148.169.10
unknown
Germany
malicious
195.77.239.39
unknown
Spain
malicious
178.62.112.199
unknown
European Union
malicious
62.171.178.147
unknown
United Kingdom
malicious
64.227.55.231
unknown
United States
malicious
There are 39 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
PBid.dll
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
IhDzTlHldHNg.dll
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1E1DA4C0000
direct allocation
page execute and read and write
malicious
EF0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
1B000100000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
AD0000
direct allocation
page execute and read and write
malicious
9C0000
direct allocation
page execute and read and write
malicious
25817DF0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
B5A000
heap
page read and write
140B1867000
heap
page read and write
14B0000
heap
page read and write
140B184A000
heap
page read and write
97B6F9B000
stack
page read and write
5E2237F000
stack
page read and write
CA8000
heap
page read and write
B93000
heap
page read and write
1FC4F846000
heap
page read and write
23888620000
heap
page read and write
C13000
heap
page read and write
E95000
heap
page read and write
2710000
heap
page read and write
5E221FF000
stack
page read and write
B8D000
heap
page read and write
25817C60000
heap
page read and write
2A4DC252000
heap
page read and write
1B07DC4E000
heap
page read and write
1B07DC83000
heap
page read and write
B92000
heap
page read and write
2292C853000
heap
page read and write
C65000
heap
page read and write
770000
remote allocation
page read and write
CBF000
heap
page read and write
E90000
heap
page read and write
E9E000
heap
page read and write
556000
heap
page read and write
B5129FC000
stack
page read and write
23888960000
trusted library allocation
page read and write
7FFC12455000
unkown
page readonly
97B74F9000
stack
page read and write
2292C7A0000
trusted library allocation
page read and write
E9A000
heap
page read and write
1FC4F877000
heap
page read and write
C0E000
heap
page read and write
1EE48500000
heap
page read and write
18002D000
direct allocation
page readonly
5E21BFB000
stack
page read and write
7FFC123D1000
unkown
page execute read
2B09AF32000
heap
page read and write
123D07C000
stack
page read and write
1E1DA2DF000
heap
page read and write
1B000160000
trusted library allocation
page read and write
BF6000
heap
page read and write
2B09A687000
heap
page read and write
2A4DC23C000
heap
page read and write
23888700000
heap
page read and write
4FAF000
stack
page read and write
1B6EEE02000
trusted library allocation
page read and write
5E220FF000
stack
page read and write
899FCFE000
stack
page read and write
C00000
heap
page readonly
1EE4847F000
heap
page read and write
28DE000
stack
page read and write
1FC4F851000
heap
page read and write
B93000
heap
page read and write
8BCE2FE000
stack
page read and write
25817C68000
heap
page read and write
1E1DA2F5000
heap
page read and write
1220000
heap
page read and write
2A4DC213000
heap
page read and write
1FC4F840000
heap
page read and write
20749522000
heap
page read and write
14BA000
heap
page read and write
2292C630000
heap
page read and write
1B000140000
heap
page read and write
B77000
heap
page read and write
238889E0000
heap
page read and write
556000
heap
page read and write
C0E000
heap
page read and write
140B17F0000
trusted library allocation
page read and write
2D88000
heap
page read and write
2DF9000
heap
page read and write
14C6000
heap
page read and write
E9E000
heap
page read and write
B68000
heap
page read and write
1B6EE65A000
heap
page read and write
AEC667B000
stack
page read and write
238889F0000
trusted library allocation
page read and write
7FFC1244E000
unkown
page read and write
6140000
trusted library allocation
page read and write
25817C5A000
heap
page read and write
571000
heap
page read and write
1B00002C000
heap
page read and write
C13000
heap
page read and write
F60000
heap
page read and write
7FFC1244E000
unkown
page read and write
E40000
heap
page read and write
238889C0000
trusted library allocation
page read and write
1765000
heap
page read and write
1FC4F863000
heap
page read and write
7FFC12457000
unkown
page readonly
1B6EE613000
heap
page read and write
B8D000
heap
page read and write
14C6000
heap
page read and write
1EE48440000
heap
page read and write
1FC4F865000
heap
page read and write
F40000
heap
page read and write
F50000
trusted library allocation
page read and write
C90000
remote allocation
page read and write
B4E000
heap
page read and write
C13000
heap
page read and write
207489E0000
heap
page read and write
140B1800000
heap
page read and write
1330000
heap
page read and write
2900000
heap
page read and write
B4E000
heap
page read and write
BF6000
heap
page read and write
BBB000
heap
page read and write
B512AFE000
stack
page read and write
B51307F000
stack
page read and write
238886E8000
heap
page read and write
25817C71000
heap
page read and write
1FC4F770000
trusted library allocation
page read and write
20748C6E000
heap
page read and write
CFC000
heap
page read and write
140B1859000
heap
page read and write
140B1750000
heap
page read and write
18002B000
direct allocation
page readonly
F50000
trusted library allocation
page read and write
CEB000
heap
page read and write
BBB000
heap
page read and write
25817C68000
heap
page read and write
C12000
heap
page read and write
8BCE1FF000
stack
page read and write
1426000
heap
page read and write
13F0000
heap
page read and write
180000000
direct allocation
page read and write
180000000
direct allocation
page read and write
560000
heap
page read and write
18002D000
direct allocation
page readonly
10B0000
heap
page read and write
25817C0F000
heap
page read and write
2B09AF00000
heap
page read and write
7623D7C000
stack
page read and write
2BCC000
stack
page read and write
14C6000
heap
page read and write
7FFC123D0000
unkown
page readonly
1EE48402000
heap
page read and write
B4E000
heap
page read and write
7FFC123D1000
unkown
page execute read
2A4DC24B000
heap
page read and write
C70000
heap
page read and write
5E2207E000
stack
page read and write
5E5E000
stack
page read and write
B512BFE000
stack
page read and write
1299000
stack
page read and write
B6C000
heap
page read and write
10B5000
heap
page read and write
2292C813000
heap
page read and write
1B07DC1D000
heap
page read and write
25817BA0000
heap
page read and write
1423000
heap
page read and write
54A000
heap
page read and write
1FC4F802000
heap
page read and write
25817E40000
heap
page read and write
1426000
heap
page read and write
899F77B000
stack
page read and write
762395C000
stack
page read and write
2B09A410000
heap
page read and write
4FB0000
trusted library allocation
page read and write
2292C7D0000
remote allocation
page read and write
1E1DBD10000
heap
page read and write
E95000
heap
page read and write
7A5000
heap
page read and write
1E1DA32B000
heap
page read and write
DD5000
heap
page read and write
690000
heap
page read and write
12C0000
remote allocation
page read and write
CD0000
heap
page read and write
C0A000
heap
page read and write
1FC4F84B000
heap
page read and write
1FC4F845000
heap
page read and write
20748C64000
heap
page read and write
1E1DA560000
heap
page read and write
1E1DA500000
heap
page readonly
E8F000
heap
page read and write
13F8000
heap
page read and write
2C5E000
stack
page read and write
1B6EE5E0000
trusted library allocation
page read and write
B75000
heap
page read and write
1E1DA540000
trusted library allocation
page read and write
1FC4F839000
heap
page read and write
54E000
heap
page read and write
573E000
stack
page read and write
B8D000
heap
page read and write
2A40000
trusted library allocation
page read and write
CD9000
heap
page read and write
1E1DA210000
heap
page read and write
25817C49000
heap
page read and write
1018000
heap
page read and write
1B07DC23000
heap
page read and write
20748D13000
heap
page read and write
7FFC12457000
unkown
page readonly
7FFC123D1000
unkown
page execute read
18002D000
direct allocation
page readonly
2636000
heap
page read and write
1B6EE713000
heap
page read and write
556000
heap
page read and write
B6C000
heap
page read and write
18002B000
direct allocation
page readonly
2DD0000
heap
page read and write
25817C49000
heap
page read and write
2292C829000
heap
page read and write
1EE48C02000
trusted library allocation
page read and write
137C000
heap
page read and write
1B00002C000
heap
page read and write
140B184B000
heap
page read and write
258196F0000
trusted library allocation
page read and write
1FC4F842000
heap
page read and write
2580000
heap
page read and write
14E1000
heap
page read and write
8BCD6FB000
stack
page read and write
12FE000
stack
page read and write
2FE9FF9000
stack
page read and write
BF6000
heap
page read and write
1FC4F875000
heap
page read and write
13C0000
heap
page read and write
2E53000
heap
page read and write
141E000
heap
page read and write
1FC4F86F000
heap
page read and write
FD3AA79000
stack
page read and write
18002B000
direct allocation
page readonly
BA3000
heap
page read and write
7FFC123D0000
unkown
page readonly
2A4DCA02000
trusted library allocation
page read and write
1FC4F87E000
heap
page read and write
18002C000
direct allocation
page read and write
8A4D67F000
stack
page read and write
54E000
heap
page read and write
18002C000
direct allocation
page read and write
2D61000
heap
page read and write
7AC000
heap
page read and write
13A0000
heap
page read and write
80000
heap
page read and write
7FFC1244E000
unkown
page read and write
BA3000
heap
page read and write
20748C43000
heap
page read and write
298C000
heap
page read and write
140B1918000
heap
page read and write
7FFC12457000
unkown
page readonly
C4B000
heap
page read and write
20748C2A000
heap
page read and write
1B000300000
heap
page read and write
69D000
stack
page read and write
7623DFE000
stack
page read and write
C0E000
heap
page read and write
140B185B000
heap
page read and write
5E225FD000
stack
page read and write
2B40000
remote allocation
page read and write
E50000
heap
page read and write
1FC4F868000
heap
page read and write
140F000
heap
page read and write
780000
heap
page read and write
2A4DC202000
heap
page read and write
14B5000
heap
page read and write
B00000
heap
page readonly
238885C0000
trusted library allocation
page read and write
1B07DAB0000
heap
page read and write
CB6000
heap
page read and write
20748C6B000
heap
page read and write
899FF7E000
stack
page read and write
20748DE5000
heap
page read and write
7FFC12455000
unkown
page readonly
BA3000
heap
page read and write
986ECFB000
stack
page read and write
1B6EE600000
heap
page read and write
B10000
trusted library allocation
page read and write
8BCDAFB000
stack
page read and write
CC7000
heap
page read and write
207495BD000
heap
page read and write
2636000
heap
page read and write
238885B0000
heap
page read and write
170000
heap
page read and write
CC6000
heap
page read and write
18002B000
direct allocation
page readonly
7A0000
heap
page read and write
C10000
trusted library allocation
page read and write
140B1913000
heap
page read and write
25817E20000
direct allocation
page execute and read and write
B75000
heap
page read and write
2A4DC200000
heap
page read and write
1410000
heap
page read and write
238889E5000
heap
page read and write
2F9F000
stack
page read and write
238886A8000
heap
page read and write
7FFC12408000
unkown
page readonly
1B07DC44000
heap
page read and write
8BCDFFF000
stack
page read and write
1B07DC37000
heap
page read and write
7FFC12457000
unkown
page readonly
EA6000
heap
page read and write
B512D7D000
stack
page read and write
100C000
heap
page read and write
7FFC123D0000
unkown
page readonly
7FFC12408000
unkown
page readonly
B5F000
heap
page read and write
E9E000
heap
page read and write
FCB000
heap
page read and write
140B3370000
remote allocation
page read and write
556000
heap
page read and write
1E1DA2A0000
heap
page read and write
BBB000
heap
page read and write
1B6EE602000
heap
page read and write
2F69000
heap
page read and write
EA6000
heap
page read and write
2B3B000
stack
page read and write
25817C1D000
heap
page read and write
FE0000
heap
page read and write
C12000
heap
page read and write
1B07DC71000
heap
page read and write
23888640000
heap
page read and write
25817C49000
heap
page read and write
FC0000
heap
page read and write
528000
heap
page read and write
2B09A629000
heap
page read and write
23889500000
trusted library allocation
page read and write
18002C000
direct allocation
page read and write
8A4D77E000
stack
page read and write
468E000
stack
page read and write
18002B000
direct allocation
page readonly
BA3000
heap
page read and write
7FFC123D0000
unkown
page readonly
899FBFA000
stack
page read and write
25817CF0000
heap
page read and write
1B6EE629000
heap
page read and write
B77000
heap
page read and write
18002C000
direct allocation
page read and write
25817A40000
heap
page read and write
1426000
heap
page read and write
25817C7A000
heap
page read and write
20748B70000
trusted library allocation
page read and write
B9A000
heap
page read and write
899F97C000
stack
page read and write
1E1DA565000
heap
page read and write
E20000
heap
page read and write
140B1841000
heap
page read and write
C07000
heap
page read and write
1B6EE673000
heap
page read and write
7FFC12452000
unkown
page readonly
B512E7E000
stack
page read and write
140B3370000
remote allocation
page read and write
20749591000
heap
page read and write
2ADE000
stack
page read and write
EFA000
stack
page read and write
7FFC12408000
unkown
page readonly
AEC6C7E000
stack
page read and write
140B1849000
heap
page read and write
7FFC12452000
unkown
page readonly
20749613000
heap
page read and write
1E1DA2CE000
heap
page read and write
E53000
heap
page read and write
2FE9DFE000
stack
page read and write
97B737F000
stack
page read and write
1B6EE676000
heap
page read and write
5E2247D000
stack
page read and write
2292C7D0000
remote allocation
page read and write
207495C5000
heap
page read and write
1EE48468000
heap
page read and write
1E1DA280000
heap
page read and write
1E1DBE10000
trusted library allocation
page read and write
7FFC12457000
unkown
page readonly
238886FE000
heap
page read and write
1B07DC10000
heap
page read and write
2292D002000
trusted library allocation
page read and write
FD3A87F000
stack
page read and write
264F000
heap
page read and write
AEC6A7C000
stack
page read and write
1B07DC3C000
heap
page read and write
1B6EE66C000
heap
page read and write
140B185A000
heap
page read and write
7623CF6000
stack
page read and write
2E4E000
stack
page read and write
140B1874000
heap
page read and write
1E1DA4F0000
direct allocation
page execute and read and write
B75000
heap
page read and write
7FFC12452000
unkown
page readonly
97B73F9000
stack
page read and write
2B57000
stack
page read and write
2DA9000
heap
page read and write
FED000
heap
page read and write
7FFC123D1000
unkown
page execute read
2B09A420000
heap
page read and write
2292C6A0000
heap
page read and write
180000000
direct allocation
page read and write
2B09A6CD000
heap
page read and write
298D000
stack
page read and write
B8D000
heap
page read and write
F20000
remote allocation
page read and write
25817C57000
heap
page read and write
180000000
direct allocation
page read and write
EC1000
heap
page read and write
20749623000
heap
page read and write
899FDFF000
stack
page read and write
7FFC1244E000
unkown
page read and write
B88000
heap
page read and write
BF6000
heap
page read and write
1039000
heap
page read and write
5FB0000
heap
page read and write
1B6EE665000
heap
page read and write
E9E000
heap
page read and write
DB0000
trusted library allocation
page read and write
FD3A97E000
stack
page read and write
23889520000
trusted library allocation
page read and write
54E000
heap
page read and write
1375000
heap
page read and write
20748C00000
heap
page read and write
2292C902000
heap
page read and write
23888708000
heap
page read and write
238886A0000
heap
page read and write
20749602000
heap
page read and write
1760000
heap
page read and write
25E0000
heap
page read and write
1FC4F849000
heap
page read and write
264D000
heap
page read and write
AEC6979000
stack
page read and write
1420000
heap
page read and write
160000
remote allocation
page read and write
F20000
remote allocation
page read and write
7FFC12408000
unkown
page readonly
860000
heap
page read and write
8BCDBFD000
stack
page read and write
254E000
stack
page read and write
1EE48300000
heap
page read and write
7FFC12455000
unkown
page readonly
B93000
heap
page read and write
2B09A600000
heap
page read and write
14B5000
heap
page read and write
2628000
heap
page read and write
2DF9000
heap
page read and write
EA6000
heap
page read and write
9B0000
heap
page read and write
142C000
heap
page read and write
18002D000
direct allocation
page readonly
7FFC12455000
unkown
page readonly
1B000000000
heap
page read and write
1415000
heap
page read and write
B8D000
heap
page read and write
2A4DC160000
heap
page read and write
54E000
heap
page read and write
B65000
heap
page read and write
B6E000
heap
page read and write
CA8000
heap
page read and write
25B9000
heap
page read and write
A40000
heap
page read and write
7FFC12452000
unkown
page readonly
B75000
heap
page read and write
256D000
stack
page read and write
2700000
trusted library allocation
page read and write
B5127FC000
stack
page read and write
2E60000
heap
page read and write
1430000
heap
page read and write
2A4DC245000
heap
page read and write
1027000
heap
page read and write
1E1DA2DF000
heap
page read and write
B5E000
heap
page read and write
20749522000
heap
page read and write
100B000
heap
page read and write
2A4DC230000
heap
page read and write
8BCE0FF000
stack
page read and write
2ABC000
stack
page read and write
20748B50000
trusted library allocation
page read and write
CC7000
heap
page read and write
140B3402000
trusted library allocation
page read and write
14C6000
heap
page read and write
B512C7B000
stack
page read and write
20748A50000
heap
page read and write
20749600000
heap
page read and write
25817C67000
heap
page read and write
B51239B000
stack
page read and write
B92000
heap
page read and write
238889E9000
heap
page read and write
207489F0000
heap
page read and write
C13000
heap
page read and write
B68000
heap
page read and write
B53000
heap
page read and write
14C6000
heap
page read and write
1FC4F860000
heap
page read and write
25817E45000
heap
page read and write
E70000
heap
page read and write
2B40000
remote allocation
page read and write
C0E000
heap
page read and write
FD3AAFC000
stack
page read and write
B5C000
heap
page read and write
2B40000
remote allocation
page read and write
1426000
heap
page read and write
2A4DC268000
heap
page read and write
2B09A6C5000
heap
page read and write
BA9000
heap
page read and write
25817BF8000
heap
page read and write
25817C49000
heap
page read and write
20749502000
heap
page read and write
2074956F000
heap
page read and write
238886FE000
heap
page read and write
1B6EE63D000
heap
page read and write
558000
heap
page read and write
66E0000
heap
page read and write
CA8000
heap
page read and write
258196F0000
trusted library allocation
page read and write
FD3A5FC000
stack
page read and write
23888704000
heap
page read and write
FEF000
heap
page read and write
CA8000
heap
page read and write
18002D000
direct allocation
page readonly
123D17E000
stack
page read and write
2D60000
heap
page read and write
B88000
heap
page read and write
571000
heap
page read and write
2A4DC110000
heap
page read and write
2292C800000
heap
page read and write
EC1000
heap
page read and write
1FC4F83D000
heap
page read and write
1FC4F883000
heap
page read and write
1FC4F832000
heap
page read and write
1B000130000
direct allocation
page execute and read and write
1E1DA2C0000
heap
page read and write
FD3A9FF000
stack
page read and write
20749402000
heap
page read and write
2B09A6E1000
heap
page read and write
14D0000
heap
page read and write
97B727E000
stack
page read and write
20749554000
heap
page read and write
AEC6B7E000
stack
page read and write
140B3280000
trusted library allocation
page read and write
23889580000
trusted library allocation
page read and write
2B09A613000
heap
page read and write
1EE48400000
heap
page read and write
899FE7F000
stack
page read and write
1490000
heap
page read and write
7FFC123D0000
unkown
page readonly
1E1DA2F0000
heap
page read and write
8A4D0EB000
stack
page read and write
1B000190000
heap
page read and write
E00000
heap
page read and write
12C0000
remote allocation
page read and write
402E000
stack
page read and write
B77000
heap
page read and write
123D27C000
stack
page read and write
FED000
heap
page read and write
1B000160000
trusted library allocation
page read and write
25817C17000
heap
page read and write
2A4DC243000
heap
page read and write
20749627000
heap
page read and write
2DD0000
heap
page read and write
2A4DC100000
heap
page read and write
545000
heap
page read and write
2601000
heap
page read and write
123CE7F000
stack
page read and write
123CD7F000
stack
page read and write
9F0000
direct allocation
page execute and read and write
140B1760000
heap
page read and write
123CF7E000
stack
page read and write
1FC4F902000
heap
page read and write
1FC4F813000
heap
page read and write
1EE48457000
heap
page read and write
141E000
heap
page read and write
20748DB9000
heap
page read and write
2B09A670000
heap
page read and write
8BCDCFE000
stack
page read and write
57B0000
trusted library allocation
page read and write
20749543000
heap
page read and write
1426000
heap
page read and write
10BC000
heap
page read and write
18002C000
direct allocation
page read and write
91B000
stack
page read and write
1EE482F0000
heap
page read and write
2292C83E000
heap
page read and write
EA6000
heap
page read and write
FFB000
heap
page read and write
1441000
heap
page read and write
7FFC123D1000
unkown
page execute read
1FC4F610000
heap
page read and write
7A0000
heap
page read and write
5E222FD000
stack
page read and write
7FFC12452000
unkown
page readonly
986E6FB000
stack
page read and write
238886B0000
heap
page read and write
899F87F000
stack
page read and write
1498000
heap
page read and write
1EE48428000
heap
page read and write
1B07DC56000
heap
page read and write
556000
heap
page read and write
2636000
heap
page read and write
986EBFB000
stack
page read and write
8A4D87F000
stack
page read and write
180000000
direct allocation
page read and write
1FC4F86C000
heap
page read and write
FD3AB7E000
stack
page read and write
2D5D000
stack
page read and write
14AF000
heap
page read and write
1FC4F847000
heap
page read and write
5EE0000
trusted library allocation
page read and write
2B09A702000
heap
page read and write
20748C8B000
heap
page read and write
1460000
heap
page read and write
AEC687F000
stack
page read and write
CB9000
heap
page read and write
238892D0000
trusted library allocation
page read and write
25817C49000
heap
page read and write
1441000
heap
page read and write
1EE48513000
heap
page read and write
14E1000
heap
page read and write
76239DF000
stack
page read and write
20748C59000
heap
page read and write
140B32B0000
trusted library allocation
page read and write
8A4D1EE000
stack
page read and write
1B07DBF0000
heap
page read and write
2E19000
heap
page read and write
1FC4F830000
heap
page read and write
1B6EE540000
heap
page read and write
13A000
stack
page read and write
B6C000
heap
page read and write
140B1900000
heap
page read and write
238886FE000
heap
page read and write
1200000
heap
page read and write
55C000
heap
page read and write
25817E30000
heap
page readonly
1E1DA315000
heap
page read and write
E78000
heap
page read and write
2A09000
stack
page read and write
1E1DBE90000
heap
page read and write
288E000
stack
page read and write
2292C7D0000
remote allocation
page read and write
DD0000
heap
page read and write
18002B000
direct allocation
page readonly
20748C13000
heap
page read and write
57B0000
heap
page read and write
97B747F000
stack
page read and write
7FFC12408000
unkown
page readonly
5EDF000
stack
page read and write
1B000305000
heap
page read and write
2292C802000
heap
page read and write
B51277F000
stack
page read and write
B512F7D000
stack
page read and write
301B000
stack
page read and write
B5E000
heap
page read and write
7FFC123D0000
unkown
page readonly
8A4D57E000
stack
page read and write
EB0000
heap
page read and write
540000
heap
page read and write
F45000
heap
page read and write
25817C8C000
heap
page read and write
520000
heap
page read and write
7FFC12452000
unkown
page readonly
1B6EE550000
heap
page read and write
CD9000
heap
page read and write
986EDFF000
stack
page read and write
176C000
heap
page read and write
2B09A6BC000
heap
page read and write
8BCDEFD000
stack
page read and write
1426000
heap
page read and write
20748C54000
heap
page read and write
1E1DA2DF000
heap
page read and write
1027000
heap
page read and write
2960000
heap
page read and write
14BE000
heap
page read and write
B65000
heap
page read and write
4F0000
heap
page read and write
8BCE3FE000
stack
page read and write
2B09A6E7000
heap
page read and write
1FC4F670000
heap
page read and write
2FE9EFE000
stack
page read and write
140B1813000
heap
page read and write
263E000
heap
page read and write
2A4DC302000
heap
page read and write
1415000
heap
page read and write
C0E000
heap
page read and write
E20000
heap
page read and write
2570000
heap
page read and write
950000
heap
page read and write
1B07DC71000
heap
page read and write
20748C62000
heap
page read and write
899F9F9000
stack
page read and write
141A000
heap
page read and write
1FC4F87B000
heap
page read and write
123C6DC000
stack
page read and write
20748C89000
heap
page read and write
558000
heap
page read and write
190000
heap
page read and write
1E1DA319000
heap
page read and write
7FFC12457000
unkown
page readonly
1E1DA2C9000
heap
page read and write
B77000
heap
page read and write
140B1902000
heap
page read and write
EA6000
heap
page read and write
7FFC1244E000
unkown
page read and write
BBB000
heap
page read and write
2FE991C000
stack
page read and write
25817C28000
heap
page read and write
7FFC123D1000
unkown
page execute read
1EE48422000
heap
page read and write
D90000
heap
page read and write
1EE48413000
heap
page read and write
1EE48463000
heap
page read and write
750000
heap
page read and write
C13000
heap
page read and write
14CC000
heap
page read and write
770000
remote allocation
page read and write
2B09A642000
heap
page read and write
753000
heap
page read and write
97B72FE000
stack
page read and write
26FB000
stack
page read and write
23889530000
trusted library allocation
page read and write
20749630000
heap
page read and write
180000000
direct allocation
page read and write
C40000
heap
page read and write
CA8000
heap
page read and write
1B07DC45000
heap
page read and write
1EE48502000
heap
page read and write
AFB000
stack
page read and write
7FFC1244E000
unkown
page read and write
20748D8C000
heap
page read and write
23889510000
heap
page readonly
2B09A713000
heap
page read and write
F65000
heap
page read and write
1FC4F855000
heap
page read and write
14BE000
heap
page read and write
C7A000
stack
page read and write
1B07DC37000
heap
page read and write
7623C7F000
stack
page read and write
FED000
heap
page read and write
20748C43000
heap
page read and write
7FFC12455000
unkown
page readonly
1B6EE702000
heap
page read and write
FD3A8FE000
stack
page read and write
207495AF000
heap
page read and write
1B07DC3F000
heap
page read and write
1E1DBD3C000
heap
page read and write
986EEFE000
stack
page read and write
140B1802000
heap
page read and write
556000
heap
page read and write
F30000
heap
page readonly
970000
heap
page read and write
123CC7F000
stack
page read and write
7623E7E000
stack
page read and write
2B09A480000
heap
page read and write
2DD1000
heap
page read and write
14BE000
heap
page read and write
140B3370000
remote allocation
page read and write
1B07DC37000
heap
page read and write
7F0000
direct allocation
page execute and read and write
25E1000
heap
page read and write
C10000
trusted library allocation
page read and write
2FE9CFF000
stack
page read and write
140B17C0000
heap
page read and write
545000
heap
page read and write
C90000
remote allocation
page read and write
2B09A580000
trusted library allocation
page read and write
1FC4F861000
heap
page read and write
2A4DC190000
trusted library allocation
page read and write
F0F000
stack
page read and write
2628000
heap
page read and write
2636000
heap
page read and write
25817BF0000
heap
page read and write
25817B80000
heap
page read and write
2E50000
heap
page read and write
2A4DC229000
heap
page read and write
1FC4F844000
heap
page read and write
160000
remote allocation
page read and write
B73000
heap
page read and write
2950000
heap
page read and write
238886F9000
heap
page read and write
F20000
direct allocation
page execute and read and write
20749500000
heap
page read and write
25817D1C000
heap
page read and write
1FC50002000
trusted library allocation
page read and write
1EE48390000
trusted library allocation
page read and write
1370000
heap
page read and write
EA6000
heap
page read and write
20748C3C000
heap
page read and write
2B09AE02000
heap
page read and write
1FC4F86D000
heap
page read and write
1FC4F600000
heap
page read and write
140B182A000
heap
page read and write
25817C16000
heap
page read and write
140B32F0000
trusted library allocation
page read and write
D70000
heap
page read and write
1FC4F800000
heap
page read and write
B68000
heap
page read and write
74B000
stack
page read and write
558000
heap
page read and write
7623EFB000
stack
page read and write
B20000
heap
page read and write
CA8000
heap
page read and write
123CAFE000
stack
page read and write
899FAFE000
stack
page read and write
14BE000
heap
page read and write
20748C8F000
heap
page read and write
20748C93000
heap
page read and write
2292C640000
heap
page read and write
14C6000
heap
page read and write
1B6EE5B0000
heap
page read and write
1EE48360000
heap
page read and write
EAC000
heap
page read and write
1B6EE68A000
heap
page read and write
23888950000
trusted library allocation
page read and write
C0E000
heap
page read and write
E8F000
stack
page read and write
7FFC12455000
unkown
page readonly
141E000
heap
page read and write
141E000
heap
page read and write
1E1DA319000
heap
page read and write
8A4D16E000
stack
page read and write
25AC000
heap
page read and write
EEE000
stack
page read and write
2F1E000
stack
page read and write
1FC4F829000
heap
page read and write
899F35B000
stack
page read and write
18002C000
direct allocation
page read and write
2FEA0FE000
stack
page read and write
18002D000
direct allocation
page readonly
B28000
heap
page read and write
B77000
heap
page read and write
7FFC12408000
unkown
page readonly
1EE48479000
heap
page read and write
25819610000
heap
page read and write
There are 818 hidden memdumps, click here to show them.