IOC Report
UC2DFXQIBiE2kQ.dll

loading gif

Files

File Path
Type
Category
Malicious
UC2DFXQIBiE2kQ.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,ACeujVZMknFDjv
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,AHuDGMflBfPryOEYjuTfbzJdEM
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\IUvcffQnjRFArsrM\JZgYREHBQT.dll"
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,ATjQPkInxPUGuUu
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\IUvcffQnjRFArsrM\JZgYREHBQT.dll
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\ZamKJmwegN\JeCOx.dll"
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll",#1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://172.105.115.71:8080/
unknown
https://112.105.115.71:8080/
unknown
https://172.105.115.71:8080/lskyxdliqorbrr/wjoazpr/kccttvfhu/
unknown
https://172.105.115.71:8080/lskyxdliqorbrr/wjoazpr/kccttvfhu/dll
unknown

Domains

Name
IP
Malicious
windowsupdatebg.s.llnwi.net
41.63.96.128

IPs

IP
Domain
Country
Malicious
172.105.115.71
unknown
United States
malicious
188.165.79.151
unknown
France
malicious
196.44.98.190
unknown
Ghana
malicious
174.138.33.49
unknown
United States
malicious
36.67.23.59
unknown
Indonesia
malicious
103.41.204.169
unknown
Indonesia
malicious
85.214.67.203
unknown
Germany
malicious
83.229.80.93
unknown
United Kingdom
malicious
198.199.70.22
unknown
United States
malicious
93.104.209.107
unknown
Germany
malicious
186.250.48.5
unknown
Brazil
malicious
209.239.112.82
unknown
United States
malicious
175.126.176.79
unknown
Korea Republic of
malicious
128.199.242.164
unknown
United Kingdom
malicious
178.238.225.252
unknown
Germany
malicious
46.101.98.60
unknown
Netherlands
malicious
190.145.8.4
unknown
Colombia
malicious
82.98.180.154
unknown
Spain
malicious
103.71.99.57
unknown
India
malicious
87.106.97.83
unknown
Germany
malicious
103.254.12.236
unknown
Viet Nam
malicious
103.85.95.4
unknown
Indonesia
malicious
202.134.4.210
unknown
Indonesia
malicious
165.22.254.236
unknown
United States
malicious
78.47.204.80
unknown
Germany
malicious
118.98.72.86
unknown
Indonesia
malicious
139.59.80.108
unknown
Singapore
malicious
104.244.79.94
unknown
United States
malicious
37.44.244.177
unknown
Germany
malicious
51.75.33.122
unknown
France
malicious
160.16.143.191
unknown
Japan
malicious
103.56.149.105
unknown
Indonesia
malicious
85.25.120.45
unknown
Germany
malicious
139.196.72.155
unknown
China
malicious
115.178.55.22
unknown
Indonesia
malicious
103.126.216.86
unknown
Bangladesh
malicious
128.199.217.206
unknown
United Kingdom
malicious
114.79.130.68
unknown
India
malicious
103.224.241.74
unknown
India
malicious
210.57.209.142
unknown
Indonesia
malicious
202.28.34.99
unknown
Thailand
malicious
80.211.107.116
unknown
Italy
malicious
54.37.228.122
unknown
France
malicious
218.38.121.17
unknown
Korea Republic of
malicious
185.148.169.10
unknown
Germany
malicious
195.77.239.39
unknown
Spain
malicious
178.62.112.199
unknown
European Union
malicious
62.171.178.147
unknown
United Kingdom
malicious
64.227.55.231
unknown
United States
malicious
There are 39 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
JZgYREHBQT.dll
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2E41000
direct allocation
page execute read
malicious
C41000
direct allocation
page execute read
malicious
1540000
direct allocation
page execute and read and write
malicious
1D676C81000
direct allocation
page execute read
malicious
1FB00100000
direct allocation
page execute and read and write
malicious
1FB00141000
direct allocation
page execute read
malicious
960000
direct allocation
page execute and read and write
malicious
1CC2A6A1000
direct allocation
page execute read
malicious
1D676B30000
direct allocation
page execute and read and write
malicious
970000
direct allocation
page execute and read and write
malicious
B41000
direct allocation
page execute read
malicious
1CC28BE0000
direct allocation
page execute and read and write
malicious
1E988A13000
heap
page read and write
F0F4F7E000
stack
page read and write
1AE8AC1F000
heap
page read and write
13A1000
heap
page read and write
F40000
heap
page read and write
1394000
heap
page read and write
29133A13000
heap
page read and write
66A59FF000
stack
page read and write
2D9D000
heap
page read and write
2ADB000
stack
page read and write
485E1FC000
stack
page read and write
226449D1000
heap
page read and write
1E9887F0000
heap
page read and write
F0F4BFC000
stack
page read and write
1378000
heap
page read and write
137D000
heap
page read and write
34FD9FB000
stack
page read and write
FD0000
remote allocation
page read and write
13DE000
heap
page read and write
2DEB000
heap
page read and write
1D676CAD000
direct allocation
page readonly
1AE8AC00000
heap
page read and write
CF34A7E000
stack
page read and write
29BE000
stack
page read and write
270989A0000
trusted library allocation
page read and write
900000
heap
page read and write
7D21A7A000
stack
page read and write
270980A0000
heap
page read and write
F0F48FB000
stack
page read and write
1398000
heap
page read and write
29133A2A000
heap
page read and write
1AE8AC2E000
heap
page read and write
33AD000
stack
page read and write
B80000
heap
page read and write
14B632D000
stack
page read and write
34FD30B000
stack
page read and write
27098200000
heap
page read and write
27720060000
trusted library allocation
page read and write
180001000
unkown
page execute read
119E000
stack
page read and write
1D676BEB000
heap
page read and write
1CC28C3B000
heap
page read and write
2DEB000
heap
page read and write
1341000
heap
page read and write
2E6B000
direct allocation
page readonly
22643E69000
heap
page read and write
22643DC0000
heap
page read and write
22644943000
heap
page read and write
2E6C000
direct allocation
page read and write
FD0000
remote allocation
page read and write
F25000
heap
page read and write
1FB00170000
heap
page readonly
1378000
heap
page read and write
1AE8AC29000
heap
page read and write
291339F0000
heap
page read and write
22644A00000
heap
page read and write
32B0000
trusted library allocation
page read and write
13BA000
heap
page read and write
29133ABE000
heap
page read and write
CE3E3FB000
stack
page read and write
2771CCC8000
heap
page read and write
380E000
heap
page read and write
2E01000
heap
page read and write
2D40000
heap
page read and write
A6B000
heap
page read and write
27098202000
heap
page read and write
2771CCBD000
heap
page read and write
F33000
heap
page read and write
180001000
unkown
page execute read
1CC28C60000
heap
page read and write
22643E93000
heap
page read and write
201F2B15000
heap
page read and write
2440000
heap
page read and write
6BE10FF000
stack
page read and write
34FD77A000
stack
page read and write
155A7B60000
trusted library allocation
page read and write
1CC2A8F0000
heap
page read and write
134B000
heap
page read and write
29133A45000
heap
page read and write
1E988A47000
heap
page read and write
9C8000
heap
page read and write
243E000
stack
page read and write
F0F4A7E000
stack
page read and write
1D678520000
heap
page read and write
9B0000
heap
page read and write
34FC000
stack
page read and write
25C6000
stack
page read and write
1E988A46000
heap
page read and write
485DD0C000
stack
page read and write
13FB000
heap
page read and write
29133A8A000
heap
page read and write
1E988A83000
heap
page read and write
A48000
heap
page read and write
1CC28B70000
heap
page read and write
22644954000
heap
page read and write
1AE8AB80000
heap
page read and write
22644922000
heap
page read and write
1D676B9F000
heap
page read and write
27098277000
heap
page read and write
1FB7CFF0000
heap
page read and write
C70000
trusted library allocation
page read and write
33D0000
remote allocation
page read and write
2771CDD0000
heap
page read and write
1E988A2E000
heap
page read and write
22643E3C000
heap
page read and write
1367000
heap
page read and write
E9A000
stack
page read and write
180001000
unkown
page execute read
B70000
trusted library allocation
page read and write
13E0000
heap
page read and write
1595000
heap
page read and write
1D676B88000
heap
page read and write
13CC000
heap
page read and write
1AE8AC13000
heap
page read and write
1CC28C89000
heap
page read and write
8F0000
heap
page read and write
2771CCD1000
heap
page read and write
1D676B70000
heap
page readonly
9C0000
heap
page read and write
13DE000
heap
page read and write
9F2000
heap
page read and write
9DD000
heap
page read and write
201F2B00000
heap
page read and write
1CC28C9B000
heap
page read and write
1FB0002C000
heap
page read and write
CF34DFE000
stack
page read and write
32B0000
trusted library allocation
page read and write
180098000
unkown
page read and write
22643E64000
heap
page read and write
1E988A79000
heap
page read and write
485E77C000
stack
page read and write
1E988A49000
heap
page read and write
CF34EFF000
stack
page read and write
485E27E000
stack
page read and write
138E000
heap
page read and write
22643DF0000
trusted library allocation
page read and write
1AE8ABE0000
heap
page read and write
1E989202000
trusted library allocation
page read and write
18004C000
unkown
page readonly
2DF6000
heap
page read and write
13FB000
heap
page read and write
A17000
heap
page read and write
A5A000
heap
page read and write
27720860000
heap
page read and write
1E988B02000
heap
page read and write
13A9000
heap
page read and write
136C000
heap
page read and write
22644A23000
heap
page read and write
22643E43000
heap
page read and write
1FB7CF50000
heap
page read and write
1CC2A5CC000
heap
page read and write
1FB7CFDF000
heap
page read and write
137D000
heap
page read and write
F32000
heap
page read and write
1378000
heap
page read and write
11E0000
heap
page read and write
23AE000
stack
page read and write
6BE107C000
stack
page read and write
12D0000
heap
page read and write
136C000
heap
page read and write
485E4FE000
stack
page read and write
EC0000
remote allocation
page read and write
299C000
stack
page read and write
29133A00000
heap
page read and write
1E988A4E000
heap
page read and write
22643E88000
heap
page read and write
27098283000
heap
page read and write
F0F4D7B000
stack
page read and write
2771E7D0000
heap
page read and write
1367000
heap
page read and write
2771CCC2000
heap
page read and write
A47000
heap
page read and write
22644902000
heap
page read and write
1383000
heap
page read and write
E5DE4FE000
stack
page read and write
233F000
stack
page read and write
2480000
heap
page read and write
34FDDFF000
stack
page read and write
1AE8B602000
trusted library allocation
page read and write
22643E86000
heap
page read and write
1365000
heap
page read and write
2CEE000
stack
page read and write
34FD8FF000
stack
page read and write
1E988A45000
heap
page read and write
1367000
heap
page read and write
2DDF000
heap
page read and write
2771CDCB000
heap
page read and write
E5DE7FF000
stack
page read and write
A29000
heap
page read and write
2771CCD9000
heap
page read and write
CA0000
heap
page read and write
E5DDD7B000
stack
page read and write
1AE8AC3C000
heap
page read and write
1CC2A6A0000
direct allocation
page read and write
1CC2A6CD000
direct allocation
page readonly
2DEF000
heap
page read and write
1CC28B90000
heap
page read and write
1D676980000
heap
page read and write
1D676D75000
heap
page read and write
1AE8AC4A000
heap
page read and write
13A1000
heap
page read and write
2709826B000
heap
page read and write
22643E92000
heap
page read and write
27098100000
heap
page read and write
3691000
heap
page read and write
E5DE3FF000
stack
page read and write
F0F4B7F000
stack
page read and write
155A7C58000
heap
page read and write
135E000
heap
page read and write
1FB7CF70000
heap
page read and write
B6B000
direct allocation
page readonly
F1F000
heap
page read and write
1E988A64000
heap
page read and write
242E000
stack
page read and write
2771CB60000
heap
page read and write
134F000
heap
page read and write
530000
heap
page read and write
155A7D02000
heap
page read and write
1318000
heap
page read and write
2771CCCC000
heap
page read and write
1E9887E0000
heap
page read and write
9F7000
heap
page read and write
201F2A30000
heap
page read and write
22644922000
heap
page read and write
1FB00140000
direct allocation
page read and write
2709823D000
heap
page read and write
226449BC000
heap
page read and write
1FB7D345000
heap
page read and write
1397000
heap
page read and write
155A7C13000
heap
page read and write
990000
direct allocation
page execute and read and write
1FB00390000
heap
page read and write
1D676AE0000
heap
page read and write
540000
heap
page read and write
27098090000
heap
page read and write
B85000
heap
page read and write
1AE8AC44000
heap
page read and write
FAB000
stack
page read and write
27098A02000
trusted library allocation
page read and write
1383000
heap
page read and write
1FB7CFCB000
heap
page read and write
1E988A61000
heap
page read and write
155A7B90000
remote allocation
page read and write
1CC28C4F000
heap
page read and write
1378000
heap
page read and write
1FB7CFDF000
heap
page read and write
F2D000
heap
page read and write
2ACB000
stack
page read and write
22644900000
heap
page read and write
A29000
heap
page read and write
1CC28C30000
heap
page read and write
22643D50000
heap
page read and write
66A58FC000
stack
page read and write
1E988A40000
heap
page read and write
B6D000
direct allocation
page readonly
1D676BD9000
heap
page read and write
1E988A55000
heap
page read and write
F3C000
heap
page read and write
1E988A30000
heap
page read and write
66A5C7F000
stack
page read and write
22644994000
heap
page read and write
13DE000
heap
page read and write
2771CCD8000
heap
page read and write
134F000
heap
page read and write
226449B0000
heap
page read and write
201F2AA0000
heap
page read and write
1CC28B00000
heap
page read and write
2DBC000
heap
page read and write
CF3471B000
stack
page read and write
F51000
heap
page read and write
2709824B000
heap
page read and write
22644680000
trusted library allocation
page read and write
CA5000
heap
page read and write
E5DE6FE000
stack
page read and write
A29000
heap
page read and write
13E0000
heap
page read and write
1E988A4B000
heap
page read and write
A17000
heap
page read and write
22644A27000
heap
page read and write
E5DE1FF000
stack
page read and write
1FB00130000
direct allocation
page execute and read and write
F00000
heap
page read and write
136C000
heap
page read and write
1E988A4F000
heap
page read and write
23BF000
stack
page read and write
1570000
heap
page readonly
3691000
heap
page read and write
13FB000
heap
page read and write
34FDD7E000
stack
page read and write
F25000
heap
page read and write
1380000
heap
page read and write
22644802000
heap
page read and write
2E0F000
heap
page read and write
35FE000
stack
page read and write
13F7000
heap
page read and write
2709825A000
heap
page read and write
7D2187E000
stack
page read and write
226449C6000
heap
page read and write
A40000
heap
page read and write
22643FE5000
heap
page read and write
13F7000
heap
page read and write
1386000
heap
page read and write
1580000
trusted library allocation
page read and write
2DBA000
heap
page read and write
F08000
heap
page read and write
BE0000
heap
page read and write
B3E000
stack
page read and write
13F5000
heap
page read and write
1407000
heap
page read and write
2E40000
direct allocation
page read and write
137D000
heap
page read and write
27098302000
heap
page read and write
13FE000
heap
page read and write
F36000
heap
page read and write
22643E00000
heap
page read and write
1AE8AC53000
heap
page read and write
1AE8AC02000
heap
page read and write
C6D000
direct allocation
page readonly
22644A02000
heap
page read and write
2AF3000
heap
page read and write
22644A13000
heap
page read and write
180098000
unkown
page read and write
A37000
heap
page read and write
1383000
heap
page read and write
1395000
heap
page read and write
1378000
heap
page read and write
13F7000
heap
page read and write
2AF0000
heap
page read and write
27098313000
heap
page read and write
A6C000
heap
page read and write
7D21B7E000
stack
page read and write
18009B000
unkown
page readonly
2771CCB9000
heap
page read and write
2DEB000
heap
page read and write
2F6B000
stack
page read and write
3600000
heap
page read and write
A07000
heap
page read and write
2E0F000
heap
page read and write
1AE8B480000
trusted library allocation
page read and write
3648000
heap
page read and write
1AE8AC3A000
heap
page read and write
2430000
trusted library allocation
page read and write
3671000
heap
page read and write
18004C000
unkown
page readonly
1378000
heap
page read and write
1FB7D02B000
heap
page read and write
29133A70000
heap
page read and write
1CC28C20000
heap
page read and write
CE3E6FE000
stack
page read and write
1FB7CEE0000
heap
page read and write
A28000
heap
page read and write
29133980000
heap
page read and write
13FB000
heap
page read and write
1CC28C4F000
heap
page read and write
1D676CAB000
direct allocation
page readonly
A25000
heap
page read and write
10D0000
heap
page read and write
155A7AC0000
heap
page read and write
A59000
heap
page read and write
1FB7CFC0000
heap
page read and write
A36000
heap
page read and write
1D676D70000
heap
page read and write
2771CCC2000
heap
page read and write
1E988850000
heap
page read and write
A48000
heap
page read and write
18009B000
unkown
page readonly
2E6D000
direct allocation
page readonly
1E988A02000
heap
page read and write
2D79000
heap
page read and write
1E988A7A000
heap
page read and write
13F7000
heap
page read and write
1D67854C000
heap
page read and write
1E988A39000
heap
page read and write
1389000
heap
page read and write
1E988A29000
heap
page read and write
27720050000
heap
page read and write
F2D000
heap
page read and write
A17000
heap
page read and write
A3F000
heap
page read and write
ED0000
heap
page read and write
CE3E67E000
stack
page read and write
332C000
stack
page read and write
E5DDEFD000
stack
page read and write
29133990000
heap
page read and write
F0F517E000
stack
page read and write
1CC2A6CB000
direct allocation
page readonly
22643E66000
heap
page read and write
347E000
stack
page read and write
155A7C3D000
heap
page read and write
13F2000
heap
page read and write
9A0000
direct allocation
page execute and read and write
485E5FD000
stack
page read and write
27098229000
heap
page read and write
155A7AD0000
heap
page read and write
C70000
trusted library allocation
page read and write
B6C000
direct allocation
page read and write
2CF0000
heap
page read and write
3648000
heap
page read and write
2DDF000
heap
page read and write
1FB7D340000
heap
page read and write
1FB7CFC7000
heap
page read and write
22643F13000
heap
page read and write
13FB000
heap
page read and write
E5DD92B000
stack
page read and write
B40000
direct allocation
page read and write
201F2B1A000
heap
page read and write
8D144FE000
stack
page read and write
A7D000
heap
page read and write
22643F8E000
heap
page read and write
1AE8AD02000
heap
page read and write
920000
heap
page read and write
1E988A6A000
heap
page read and write
2DFF000
heap
page read and write
34FDC7A000
stack
page read and write
155A7B90000
remote allocation
page read and write
22643E76000
heap
page read and write
E5DE5FF000
stack
page read and write
29134290000
trusted library allocation
page read and write
27098213000
heap
page read and write
1E988A66000
heap
page read and write
A34000
heap
page read and write
2771CCAB000
heap
page read and write
2470000
heap
page read and write
1E988A00000
heap
page read and write
A17000
heap
page read and write
8D1447F000
stack
page read and write
A29000
heap
page read and write
34FDE7E000
stack
page read and write
5EB000
stack
page read and write
18004C000
unkown
page readonly
1D678780000
heap
page read and write
F51000
heap
page read and write
13A0000
heap
page read and write
2A4E000
stack
page read and write
E5DE2FD000
stack
page read and write
7D2167B000
stack
page read and write
13F7000
heap
page read and write
22643E79000
heap
page read and write
66A597E000
stack
page read and write
1357000
heap
page read and write
22643D60000
heap
page read and write
A51000
heap
page read and write
155A7C23000
heap
page read and write
1CC28C89000
heap
page read and write
25F7000
stack
page read and write
1CC28C25000
heap
page read and write
180000000
unkown
page readonly
29133B02000
heap
page read and write
11EC000
heap
page read and write
1FB0016B000
direct allocation
page readonly
3670000
heap
page read and write
2450000
heap
page read and write
22643E29000
heap
page read and write
13FB000
heap
page read and write
A5A000
heap
page read and write
1E988A3D000
heap
page read and write
1430000
heap
page read and write
2771CCB9000
heap
page read and write
1E988A3A000
heap
page read and write
201F2B08000
heap
page read and write
13A9000
heap
page read and write
6BE117E000
stack
page read and write
155A7C00000
heap
page read and write
1E988A62000
heap
page read and write
F36000
heap
page read and write
CF34CFE000
stack
page read and write
1590000
heap
page read and write
1D676B60000
direct allocation
page execute and read and write
C6B000
direct allocation
page readonly
1E988A42000
heap
page read and write
22643E5A000
heap
page read and write
1AE8AB90000
heap
page read and write
3671000
heap
page read and write
CF34BFE000
stack
page read and write
1D676C80000
direct allocation
page read and write
F0F4E7C000
stack
page read and write
A48000
heap
page read and write
1CC2A6D0000
heap
page readonly
A36000
heap
page read and write
C40000
direct allocation
page read and write
13FB000
heap
page read and write
9B0000
heap
page readonly
22643FB9000
heap
page read and write
1CC28C4F000
heap
page read and write
29133AC5000
heap
page read and write
5CE0000
trusted library allocation
page read and write
155A7C02000
heap
page read and write
22643E13000
heap
page read and write
1397000
heap
page read and write
1D676B9F000
heap
page read and write
A29000
heap
page read and write
7D21979000
stack
page read and write
29134402000
heap
page read and write
F0F44DB000
stack
page read and write
1D676AC0000
heap
page read and write
5FB000
stack
page read and write
1CC28C10000
direct allocation
page execute and read and write
1E988A6C000
heap
page read and write
F2D000
heap
page read and write
A3A000
heap
page read and write
34FDA79000
stack
page read and write
2709825E000
heap
page read and write
1420000
direct allocation
page execute and read and write
2A5E000
stack
page read and write
CF3479E000
stack
page read and write
1E988A4D000
heap
page read and write
1D676BD9000
heap
page read and write
135E000
heap
page read and write
2771CDA0000
heap
page read and write
13E0000
heap
page read and write
FE0000
heap
page read and write
13A1000
heap
page read and write
1D676B9F000
heap
page read and write
11E5000
heap
page read and write
27098289000
heap
page read and write
A2E000
heap
page read and write
2DDF000
heap
page read and write
29133B13000
heap
page read and write
2771CCCC000
heap
page read and write
1FB7CFDF000
heap
page read and write
29133ACF000
heap
page read and write
27720053000
heap
page read and write
2AD0000
heap
page read and write
1E988A5F000
heap
page read and write
485E47D000
stack
page read and write
22644A30000
heap
page read and write
155A7C29000
heap
page read and write
180000000
unkown
page readonly
1E988A7D000
heap
page read and write
A29000
heap
page read and write
1FB00000000
heap
page read and write
8D141DC000
stack
page read and write
34FDB7F000
stack
page read and write
2771CDC5000
heap
page read and write
1FB0016D000
direct allocation
page readonly
27098278000
heap
page read and write
910000
heap
page read and write
33D0000
remote allocation
page read and write
9A0000
heap
page readonly
A48000
heap
page read and write
2F70000
trusted library allocation
page read and write
1E988A69000
heap
page read and write
C6C000
direct allocation
page read and write
1357000
heap
page read and write
1FB7D019000
heap
page read and write
33D0000
remote allocation
page read and write
2771CCDD000
heap
page read and write
1D676B80000
heap
page read and write
155A7B90000
remote allocation
page read and write
F0F507D000
stack
page read and write
155A8602000
trusted library allocation
page read and write
29134500000
heap
page read and write
9BB000
heap
page read and write
1310000
heap
page read and write
22643E56000
heap
page read and write
1FB7D019000
heap
page read and write
2771CCE5000
heap
page read and write
1E988A2D000
heap
page read and write
2264496F000
heap
page read and write
180000000
unkown
page readonly
1CC2A5A0000
heap
page read and write
27098279000
heap
page read and write
2DEB000
heap
page read and write
1E988950000
trusted library allocation
page read and write
EC0000
remote allocation
page read and write
A17000
heap
page read and write
A17000
heap
page read and write
13F7000
heap
page read and write
155A7B30000
heap
page read and write
F2D000
heap
page read and write
1D676BB0000
heap
page read and write
2771CCA0000
heap
page read and write
2771CCBF000
heap
page read and write
22643E8B000
heap
page read and write
2771CDC0000
heap
page read and write
E5DDFFF000
stack
page read and write
18009B000
unkown
page readonly
2771CCBE000
heap
page read and write
180098000
unkown
page read and write
F0F4CFE000
stack
page read and write
EF0000
heap
page read and write
1E988A76000
heap
page read and write
A17000
heap
page read and write
29133A68000
heap
page read and write
F20000
heap
page read and write
2EEC000
stack
page read and write
There are 588 hidden memdumps, click here to show them.