IOC Report
q3oUuJIXkc.exe

loading gif

Files

File Path
Type
Category
Malicious
q3oUuJIXkc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cred64[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\c33e9ad058e5d3\cred64.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\853321935212
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
dropped
\Device\ConDrv
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\q3oUuJIXkc.exe
C:\Users\user\Desktop\q3oUuJIXkc.exe
malicious
C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe
"C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe" /F
malicious
C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe
C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\c33e9ad058e5d3\cred64.dll, Main
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "user:N"&&CACLS "gntuud.exe" /P "user:R" /E&&echo Y|CACLS "..\03bd543fce" /P "user:N"&&CACLS "..\03bd543fce" /P "user:R" /E&&Exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Windows\SysWOW64\cacls.exe
CACLS "gntuud.exe" /P "user:N"
C:\Windows\SysWOW64\cacls.exe
CACLS "gntuud.exe" /P "user:R" /E
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Windows\SysWOW64\cacls.exe
CACLS "..\03bd543fce" /P "user:N"
C:\Windows\SysWOW64\cacls.exe
CACLS "..\03bd543fce" /P "user:R" /E
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
85.209.135.109/jg94cVd30f/index.php
malicious
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
http://85.209.135.109/jg94cVd30f/index.phpj
unknown
https://sectigo.com/CPS0
unknown
http://85.209.135.109/jg94cVd30f/index.php
unknown
http://ocsp.sectigo.com0
unknown
http://85.209.135.109/jg94cVd30f/index.phpF
unknown
http://85.209.135.109/jg94cVd30f/index.php?scr=1
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
http://85.209.135.109/jg94cVd30f/index.phpb
unknown
http://85.209.135.109/jg94cVd30f/index.php58e5d3
unknown
http://85.209.135.109/jg94cVd30f/index.phpd3
unknown
http://85.209.135.109/jg94cVd30f/index.phpz
unknown
http://85.209.135.109/jg94cVd30f/index.phpv
unknown
http://85.209.135.109/jg94cVd30f/index.phpR
unknown
http://85.209.135.109/jg94cVd30f/index.php0
unknown
There are 6 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
85.209.135.109
unknown
Germany
malicious
192.168.2.4
unknown
unknown
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Startup
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
71000
unkown
page execute read
malicious
1281000
unkown
page execute read
malicious
EAD000
heap
page read and write
malicious
34D0000
trusted library allocation
page read and write
CD4000
heap
page read and write
857000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
CB7000
heap
page read and write
11C4000
heap
page read and write
52E5000
trusted library allocation
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
794000
heap
page read and write
C01000
heap
page read and write
52E0000
trusted library allocation
page read and write
1EFF000
stack
page read and write
1ED92A38000
heap
page read and write
CD4000
heap
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
CD4000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
EEA000
heap
page read and write
CD4000
heap
page read and write
FF0000
heap
page read and write
C01000
heap
page read and write
9F0000
heap
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
51D1000
trusted library allocation
page read and write
C01000
heap
page read and write
2D00000
heap
page read and write
740000
trusted library allocation
page read and write
33A1000
heap
page read and write
3346000
heap
page read and write
11C4000
heap
page read and write
12AF000
unkown
page readonly
33A1000
heap
page read and write
CD4000
heap
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
374F000
stack
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
D90000
heap
page read and write
11C4000
heap
page read and write
52E2000
trusted library allocation
page read and write
D8F000
stack
page read and write
C01000
heap
page read and write
453A000
heap
page read and write
1ED92C10000
trusted library allocation
page read and write
4930000
trusted library allocation
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
857000
heap
page read and write
138E000
heap
page read and write
CD4000
heap
page read and write
C01000
heap
page read and write
324E000
stack
page read and write
11C4000
heap
page read and write
D3A000
heap
page read and write
CD4000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
F3E000
stack
page read and write
33A1000
heap
page read and write
52E1000
trusted library allocation
page read and write
388F000
stack
page read and write
AF98079000
stack
page read and write
CD4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
11C4000
heap
page read and write
11C5000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
11C4000
heap
page read and write
4ACA000
heap
page read and write
334E000
stack
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
11C4000
heap
page read and write
790000
heap
page read and write
11C4000
heap
page read and write
107F000
stack
page read and write
C01000
heap
page read and write
BE0000
trusted library allocation
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
F20000
heap
page read and write
C01000
heap
page read and write
4A80000
heap
page read and write
F7E000
stack
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
2EC0000
heap
page read and write
4B10000
heap
page read and write
51D1000
trusted library allocation
page read and write
857000
heap
page read and write
378E000
stack
page read and write
33A1000
heap
page read and write
63A000
stack
page read and write
11C4000
heap
page read and write
C01000
heap
page read and write
CD4000
heap
page read and write
431A000
heap
page read and write
1170000
trusted library allocation
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
379F000
stack
page read and write
52E0000
trusted library allocation
page read and write
9CB000
stack
page read and write
11C4000
heap
page read and write
360000
heap
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
4240000
heap
page read and write
F27000
heap
page read and write
CD0000
heap
page read and write
DDF000
stack
page read and write
51D1000
trusted library allocation
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C5000
heap
page read and write
169D000
unkown
page execute read
9E0000
trusted library allocation
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
DC0000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
1ED92CC0000
trusted library allocation
page read and write
11C4000
heap
page read and write
1280000
unkown
page readonly
11C4000
heap
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
BF0000
trusted library allocation
page read and write
CD4000
heap
page read and write
CE0000
trusted library allocation
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
CD6000
heap
page read and write
11C4000
heap
page read and write
11C5000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C0000
heap
page read and write
33A1000
heap
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
169D000
unkown
page execute read
11C4000
heap
page read and write
11C4000
heap
page read and write
52E3000
trusted library allocation
page read and write
11C4000
heap
page read and write
5140000
heap
page read and write
11C5000
heap
page read and write
CD4000
heap
page read and write
33A1000
heap
page read and write
1ED92D70000
heap
page read and write
51D1000
trusted library allocation
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
9AE000
stack
page read and write
33A1000
heap
page read and write
11C5000
heap
page read and write
CD4000
heap
page read and write
4A8A000
heap
page read and write
11C4000
heap
page read and write
794000
heap
page read and write
1ED92C80000
trusted library allocation
page read and write
794000
heap
page read and write
841000
heap
page read and write
11C4000
heap
page read and write
10D0000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
C01000
heap
page read and write
FBE000
stack
page read and write
4B20000
heap
page read and write
11C4000
heap
page read and write
C01000
heap
page read and write
CD4000
heap
page read and write
51D1000
trusted library allocation
page read and write
11C4000
heap
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
360F000
stack
page read and write
C01000
heap
page read and write
4B2A000
heap
page read and write
FF0000
trusted library allocation
page read and write
AF9817E000
stack
page read and write
11C4000
heap
page read and write
C01000
heap
page read and write
33A1000
heap
page read and write
39CC000
stack
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
D6A000
heap
page read and write
FF6000
heap
page read and write
51D1000
trusted library allocation
page read and write
11C4000
heap
page read and write
11C5000
heap
page read and write
EBE000
heap
page read and write
11C4000
heap
page read and write
C01000
heap
page read and write
51D1000
trusted library allocation
page read and write
11C4000
heap
page read and write
105E000
stack
page read and write
CD4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
F0E000
stack
page read and write
D76000
heap
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
11C4000
heap
page read and write
E0A000
heap
page read and write
1ED92CD0000
heap
page readonly
51D1000
trusted library allocation
page read and write
33A1000
heap
page read and write
51D1000
trusted library allocation
page read and write
51D1000
trusted library allocation
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
4B8B000
trusted library allocation
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
11C5000
heap
page read and write
11C4000
heap
page read and write
48D000
unkown
page execute read
33A1000
heap
page read and write
9F0000
trusted library allocation
page read and write
C01000
heap
page read and write
9DE000
stack
page read and write
CD4000
heap
page read and write
11C4000
heap
page read and write
9F000
unkown
page readonly
3820000
heap
page read and write
51D1000
trusted library allocation
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
1ED92D80000
trusted library allocation
page read and write
C01000
heap
page read and write
1160000
heap
page read and write
33A1000
heap
page read and write
33A1000
heap
page read and write
CB0000
heap
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
B3D000
stack
page read and write
8FD000
stack
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
424A000
heap
page read and write
1ED92A7D000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
9EF000
stack
page read and write
BF0000
heap
page read and write
11C5000
heap
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
C01000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
9A0000
trusted library allocation
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
11C4000
heap
page read and write
D9A000
heap
page read and write
CD4000
heap
page read and write
820000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
EFE000
stack
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
F5C000
stack
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
11C5000
heap
page read and write
4310000
heap
page read and write
CD4000
heap
page read and write
11C4000
heap
page read and write
48D000
unkown
page execute read
11C5000
heap
page read and write
41D0000
heap
page read and write
11C4000
heap
page read and write
1ED92940000
heap
page read and write
C00000
heap
page read and write
858000
heap
page read and write
CD4000
heap
page read and write
A9000
unkown
page read and write
493F000
trusted library allocation
page read and write
3831000
heap
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
33A1000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
48D000
unkown
page execute read
C01000
heap
page read and write
70000
unkown
page readonly
858000
heap
page read and write
11C5000
heap
page read and write
CD4000
heap
page read and write
4240000
heap
page read and write
33A1000
heap
page read and write
1ED93870000
trusted library allocation
page read and write
CD4000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
C40000
trusted library allocation
page read and write
51D1000
trusted library allocation
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
70000
unkown
page readonly
4F10000
trusted library allocation
page read and write
33A1000
heap
page read and write
52E3000
trusted library allocation
page read and write
AF98279000
stack
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
3340000
heap
page read and write
10FE000
stack
page read and write
11C5000
heap
page read and write
D0F000
stack
page read and write
11C4000
heap
page read and write
51D1000
trusted library allocation
page read and write
11C4000
heap
page read and write
920000
heap
page read and write
33A1000
heap
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
D30000
heap
page read and write
9D0000
trusted library allocation
page read and write
33A1000
heap
page read and write
13C1000
heap
page read and write
1280000
unkown
page readonly
1ED92CF0000
trusted library allocation
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
51D1000
trusted library allocation
page read and write
11C4000
heap
page read and write
1280000
unkown
page readonly
1ED92D40000
trusted library allocation
page read and write
C01000
heap
page read and write
2D01000
heap
page read and write
1067000
heap
page read and write
4F50000
direct allocation
page read and write
11C4000
heap
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
CD4000
heap
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
890000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
C01000
heap
page read and write
169D000
unkown
page execute read
33A1000
heap
page read and write
8CD000
stack
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
52E6000
trusted library allocation
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
1ED92A7D000
heap
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
CD4000
heap
page read and write
11C4000
heap
page read and write
1ED92A76000
heap
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
11C4000
heap
page read and write
81F000
stack
page read and write
C01000
heap
page read and write
33A1000
heap
page read and write
33A1000
heap
page read and write
1060000
heap
page read and write
D70000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
4F40000
heap
page read and write
2D01000
heap
page read and write
11C5000
heap
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
AF97C8C000
stack
page read and write
4EF0000
heap
page read and write
33A1000
heap
page read and write
11C5000
heap
page read and write
C01000
heap
page read and write
33A1000
heap
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
12DC000
trusted library allocation
page read and write
E30000
heap
page read and write
CD4000
heap
page read and write
33A1000
heap
page read and write
10E1000
heap
page read and write
11C5000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
CD4000
heap
page read and write
364E000
stack
page read and write
12BE000
unkown
page execute read
C01000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
C01000
heap
page read and write
33A1000
heap
page read and write
136A000
heap
page read and write
33A1000
heap
page read and write
33A1000
heap
page read and write
10B0000
trusted library allocation
page read and write
11C4000
heap
page read and write
F30000
heap
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
EBE000
stack
page read and write
AF981F9000
stack
page read and write
11C4000
heap
page read and write
11C5000
heap
page read and write
90C000
stack
page read and write
4AC0000
heap
page read and write
2D01000
heap
page read and write
33A1000
heap
page read and write
4AD0000
heap
page read and write
33A1000
heap
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
33A1000
heap
page read and write
1014000
heap
page read and write
11C4000
heap
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
12E5000
unkown
page read and write
11C4000
heap
page read and write
52E2000
trusted library allocation
page read and write
34CE000
stack
page read and write
10D7000
heap
page read and write
AF980F9000
stack
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
E86000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
1ED92AA0000
heap
page read and write
93C000
stack
page read and write
C01000
heap
page read and write
CD4000
heap
page read and write
11C4000
heap
page read and write
11C5000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
4530000
heap
page read and write
C01000
heap
page read and write
CD4000
heap
page read and write
99E000
stack
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C5000
heap
page read and write
B85000
unkown
page readonly
1D95000
unkown
page readonly
CAE000
stack
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
103E000
stack
page read and write
D4E000
stack
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
C01000
heap
page read and write
CD4000
heap
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
1ED92D79000
heap
page read and write
33A1000
heap
page read and write
C01000
heap
page read and write
175E000
stack
page read and write
B7C000
stack
page read and write
1ED929D0000
heap
page read and write
1D95000
unkown
page readonly
52E9000
trusted library allocation
page read and write
11C4000
heap
page read and write
C30000
trusted library allocation
page read and write
33A1000
heap
page read and write
424A000
heap
page read and write
C60000
heap
page read and write
CD4000
heap
page read and write
41DA000
heap
page read and write
B85000
unkown
page readonly
794000
heap
page read and write
9F7000
heap
page read and write
33A1000
heap
page read and write
EE6000
heap
page read and write
11C4000
heap
page read and write
82A000
heap
page read and write
CD4000
heap
page read and write
98D000
stack
page read and write
1ED92CE0000
trusted library allocation
page read and write
11C4000
heap
page read and write
1ED92A77000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
C01000
heap
page read and write
AE000
unkown
page execute read
DB000
unkown
page execute read
11C4000
heap
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
BE0000
heap
page read and write
CD4000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
95E000
stack
page read and write
C01000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
AD0000
heap
page read and write
FFE000
stack
page read and write
33A1000
heap
page read and write
CD4000
heap
page read and write
11C4000
heap
page read and write
C01000
heap
page read and write
51D1000
trusted library allocation
page read and write
E5D000
stack
page read and write
33A1000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
F7F000
stack
page read and write
CD4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
4B20000
heap
page read and write
11C4000
heap
page read and write
11C5000
heap
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
33A1000
heap
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
4ADA000
heap
page read and write
11C5000
heap
page read and write
33A1000
heap
page read and write
33A1000
heap
page read and write
52E0000
trusted library allocation
page read and write
D90000
heap
page read and write
11C4000
heap
page read and write
1D95000
unkown
page readonly
C01000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
41DA000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
350E000
stack
page read and write
D4E000
stack
page read and write
CD4000
heap
page read and write
33CD000
stack
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
794000
heap
page read and write
12B9000
unkown
page read and write
11C4000
heap
page read and write
794000
heap
page read and write
D00000
heap
page read and write
11C5000
heap
page read and write
51D1000
trusted library allocation
page read and write
11C4000
heap
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
1230000
trusted library allocation
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
51D1000
trusted library allocation
page read and write
C01000
heap
page read and write
4B2A000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
12EB000
unkown
page execute read
CD4000
heap
page read and write
C01000
heap
page read and write
33A1000
heap
page read and write
E00000
heap
page read and write
4F50000
trusted library allocation
page read and write
CD4000
heap
page read and write
C01000
heap
page read and write
E7C000
stack
page read and write
52E4000
trusted library allocation
page read and write
3CC000
stack
page read and write
3831000
heap
page read and write
CD4000
heap
page read and write
CD4000
heap
page read and write
33A1000
heap
page read and write
C01000
heap
page read and write
33A1000
heap
page read and write
11C5000
heap
page read and write
11C4000
heap
page read and write
C01000
heap
page read and write
12CE000
stack
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
1ED92A7E000
heap
page read and write
33A1000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
794000
heap
page read and write
1ED92C20000
trusted library allocation
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
CD4000
heap
page read and write
11C4000
heap
page read and write
C01000
heap
page read and write
1ED92D75000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
1ED92A30000
heap
page read and write
33A1000
heap
page read and write
33A1000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
C01000
heap
page read and write
33A1000
heap
page read and write
DCA000
heap
page read and write
11C4000
heap
page read and write
FEE000
stack
page read and write
33A1000
heap
page read and write
860000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
C01000
heap
page read and write
41D0000
heap
page read and write
3800000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
51D1000
trusted library allocation
page read and write
33A1000
heap
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
7DE000
stack
page read and write
C01000
heap
page read and write
4F45000
heap
page read and write
CD4000
heap
page read and write
1014000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
D5000
unkown
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
C01000
heap
page read and write
11C5000
heap
page read and write
D60000
heap
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
1ED92950000
trusted library allocation
page read and write
CD4000
heap
page read and write
9F0000
trusted library allocation
page read and write
1360000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
3830000
heap
page read and write
FBF000
stack
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
33A1000
heap
page read and write
CD4000
heap
page read and write
52EB000
trusted library allocation
page read and write
52EC000
trusted library allocation
page read and write
114E000
stack
page read and write
3380000
heap
page read and write
1ED92A96000
heap
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
1ED929B0000
heap
page read and write
33A1000
heap
page read and write
33A1000
heap
page read and write
CD4000
heap
page read and write
52E4000
trusted library allocation
page read and write
11C4000
heap
page read and write
11C4000
heap
page read and write
CD4000
heap
page read and write
EC8000
heap
page read and write
F79000
stack
page read and write
33A1000
heap
page read and write
4B1A000
heap
page read and write
CD4000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
38CE000
stack
page read and write
C01000
heap
page read and write
11C4000
heap
page read and write
1ED92A40000
heap
page read and write
CD4000
heap
page read and write
EE5000
heap
page read and write
1010000
heap
page read and write
E37000
heap
page read and write
CD4000
heap
page read and write
33A1000
heap
page read and write
11C4000
heap
page read and write
794000
heap
page read and write
There are 820 hidden memdumps, click here to show them.