IOC Report
8082-svc-x86.exe

loading gif

Files

File Path
Type
Category
Malicious
8082-svc-x86.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\servicereg.log
ASCII text, with CRLF line terminators
modified
C:\servicestart.log
ASCII text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\8082-svc-x86.exe
C:\Users\user\Desktop\8082-svc-x86.exe
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\System32\rundll32.exe
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c sc create CfsHz binpath= "C:\Users\user\Desktop\8082-svc-x86.exe" >> C:\servicereg.log 2>&1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\sc.exe
sc create CfsHz binpath= "C:\Users\user\Desktop\8082-svc-x86.exe"
C:\Windows\SysWOW64\cmd.exe
cmd /c sc start CfsHz >> C:\servicestart.log 2>&1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\sc.exe
sc start CfsHz
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://20.104.209.69:8082/broadcast
20.104.209.69
malicious
20.104.209.69
malicious
http://20.104.209.69:8082/1/events/com.amazon.csm.csa.prod
20.104.209.69
malicious
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
unknown
https://dev.ditu.live.com/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
unknown
https://www.amazon.com
unknown
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
unknown
https://t0.tiles.ditu.live.com/tiles/gen
unknown
https://d22u79neyj432a.cloudfront.net/bfc50dfa-8e10-44b5-ae59-ac26bfc71489/54857e6d-c060-4b3c-914a-8
unknown
https://dev.virtualearth.net/REST/v1/Routes/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Routes/Walking
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
unknown
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
unknown
https://%s.xboxlive.com
unknown
https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://dev.virtualearth.net/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
unknown
https://dynamic.t
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
unknown
https://activity.windows.com
unknown
http://www.bingmapsportal.com
unknown
https://dev.ditu.live.com/REST/v1/Locations
unknown
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://%s.dnet.xboxlive.com
unknown
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
There are 30 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
20.104.209.69
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
MonthID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator\Scheduler
UsoCrmScan
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator
USODiagnostics

Memdumps

Base Address
Regiontype
Protect
Malicious
10C6000
direct allocation
page read and write
malicious
B40000
remote allocation
page execute read
malicious
1150000
trusted library allocation
page read and write
malicious
110D000
heap
page read and write
89E000
stack
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
3FB8000
trusted library allocation
page read and write
110B000
heap
page read and write
A4B137E000
stack
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
AFFC0FF000
stack
page read and write
110B000
heap
page read and write
1C7C01B0000
remote allocation
page read and write
110B000
heap
page read and write
1FA2D067000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
9F748DC000
stack
page read and write
110D000
heap
page read and write
FE8000
heap
page read and write
27921626000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
F4E000
stack
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
26A55650000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
2792164D000
heap
page read and write
FF6000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
1FA2CF80000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
1FA2CF70000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
1FA2DB39000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
80E000
stack
page read and write
110B000
heap
page read and write
267F0510000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
279214F0000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
27C70402000
trusted library allocation
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
D4F000
stack
page read and write
66A000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
26A557C0000
trusted library allocation
page read and write
110B000
heap
page read and write
27922002000
trusted library allocation
page read and write
110D000
heap
page read and write
31BD000
stack
page read and write
110D000
heap
page read and write
1FA2D000000
heap
page read and write
A4B15FE000
stack
page read and write
E14D47E000
stack
page read and write
AFFC3FE000
stack
page read and write
110D000
heap
page read and write
446000
unkown
page readonly
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
A60000
heap
page read and write
1C7C01B0000
remote allocation
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
A3F000
stack
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
61CD8C000
stack
page read and write
110D000
heap
page read and write
27C6FC6C000
heap
page read and write
1FA2D0CC000
heap
page read and write
110D000
heap
page read and write
1002000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
2792163C000
heap
page read and write
110B000
heap
page read and write
3DA0000
trusted library allocation
page read and write
E14D37E000
stack
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
27921656000
heap
page read and write
2D60000
heap
page read and write
110D000
heap
page read and write
3849000
trusted library allocation
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
2792162D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
61DA7E000
stack
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
27C6FA70000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
BE4287F000
stack
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
267F1002000
trusted library allocation
page read and write
9D000
stack
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
2792167B000
heap
page read and write
110D000
heap
page read and write
3DCB000
trusted library allocation
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
1C7BFA75000
heap
page read and write
27C6FC43000
heap
page read and write
30000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
27921580000
trusted library allocation
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
3873000
trusted library allocation
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
400000
unkown
page readonly
110B000
heap
page read and write
2C60000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
27C6FC43000
heap
page read and write
110D000
heap
page read and write
1FA2D880000
trusted library allocation
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
10A0000
direct allocation
page execute read
27C6FC00000
heap
page read and write
110D000
heap
page read and write
27C6FAE0000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
EF5000
heap
page read and write
2792167E000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
2792165F000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
1C7BF9E0000
trusted library allocation
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
403000
unkown
page write copy
110B000
heap
page read and write
110D000
heap
page read and write
FAA000
heap
page read and write
27921664000
heap
page read and write
1FA2CFE0000
heap
page read and write
110D000
heap
page read and write
3DF5000
trusted library allocation
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
A4B177E000
stack
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
1C7BFB02000
heap
page read and write
3DEF000
trusted library allocation
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
26A55660000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
7E0000
trusted library allocation
page read and write
27C6FA80000
heap
page read and write
110B000
heap
page read and write
E14D67F000
stack
page read and write
26A55813000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
E14CE8C000
stack
page read and write
26A55886000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
27C6FC3C000
heap
page read and write
673000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
27921668000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
27921640000
heap
page read and write
110B000
heap
page read and write
1FA2D102000
heap
page read and write
27921648000
heap
page read and write
73C000
stack
page read and write
110B000
heap
page read and write
26A55865000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
FC3000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
AFFC4FF000
stack
page read and write
110D000
heap
page read and write
2792167A000
heap
page read and write
26A556C0000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
267F0520000
heap
page read and write
110B000
heap
page read and write
27921657000
heap
page read and write
110B000
heap
page read and write
980000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
61D5FC000
stack
page read and write
B60000
trusted library allocation
page read and write
2792163A000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
267F0580000
heap
page read and write
110B000
heap
page read and write
690000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
267F0700000
heap
page read and write
A4B157D000
stack
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
69D000
stack
page read and write
110B000
heap
page read and write
9F750FE000
stack
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
3D1C000
stack
page read and write
110D000
heap
page read and write
E14CF8E000
stack
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
267F0659000
heap
page read and write
BE41FDB000
stack
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
17E000
stack
page read and write
670000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
267F0664000
heap
page read and write
267F0600000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
10D9000
direct allocation
page read and write
403000
unkown
page write copy
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
3DF3000
trusted library allocation
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
1C7BFA29000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
BE424FE000
stack
page read and write
AFFC1FF000
stack
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
BB0000
trusted library allocation
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
61D87E000
stack
page read and write
110D000
heap
page read and write
3F0000
heap
page read and write
110D000
heap
page read and write
26A55913000
heap
page read and write
26A55888000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
2792166A000
heap
page read and write
110D000
heap
page read and write
BE425FB000
stack
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
267F0602000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
27C6FC52000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
267F0679000
heap
page read and write
110B000
heap
page read and write
B09000
stack
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
26A55902000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
1C7BFA3D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
27921677000
heap
page read and write
448000
unkown
page write copy
110B000
heap
page read and write
27C6FD00000
heap
page read and write
110B000
heap
page read and write
3DCF000
trusted library allocation
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
327E000
stack
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
3DF9000
trusted library allocation
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
2D67000
heap
page read and write
110B000
heap
page read and write
ACC000
stack
page read and write
110D000
heap
page read and write
26A55800000
heap
page read and write
1FE000
stack
page read and write
1FA2DB00000
heap
page read and write
110D000
heap
page read and write
27921631000
heap
page read and write
110B000
heap
page read and write
26A55829000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
61D77D000
stack
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
1FA2D070000
heap
page read and write
110D000
heap
page read and write
27C6FC02000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
1C7BFA02000
heap
page read and write
110B000
heap
page read and write
1FA2DA02000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
1105000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
8EF000
stack
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
986000
heap
page read and write
27921702000
heap
page read and write
110D000
heap
page read and write
1C7BF880000
heap
page read and write
110B000
heap
page read and write
27921660000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
9F74EFB000
stack
page read and write
317D000
stack
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
130000
heap
page read and write
110B000
heap
page read and write
FA0000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
64C000
stack
page read and write
267F063C000
heap
page read and write
267F0702000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
26A5583D000
heap
page read and write
E14D57E000
stack
page read and write
110B000
heap
page read and write
EF7000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
1FA2D0C9000
heap
page read and write
42C0000
trusted library allocation
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
10DB000
direct allocation
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
A4B12FC000
stack
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
401000
unkown
page execute read
AFFBCFC000
stack
page read and write
110D000
heap
page read and write
3DEB000
trusted library allocation
page read and write
110B000
heap
page read and write
1C7BFA13000
heap
page read and write
AFFBB7B000
stack
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
A4B107C000
stack
page read and write
110D000
heap
page read and write
279214E0000
heap
page read and write
110D000
heap
page read and write
660000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
27921642000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
27921679000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
F0000
trusted library allocation
page read and write
AFFB77C000
stack
page read and write
E14CF0E000
stack
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
400000
unkown
page readonly
61D37F000
stack
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
3DD3000
trusted library allocation
page read and write
446000
unkown
page readonly
1FA2D013000
heap
page read and write
BE4267E000
stack
page read and write
2D10000
heap
page read and write
27C6FD02000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
41C0000
heap
page read and write
110B000
heap
page read and write
BE42A7F000
stack
page read and write
27921665000
heap
page read and write
1C7BF8E0000
heap
page read and write
110D000
heap
page read and write
26A5586B000
heap
page read and write
1FA2D113000
heap
page read and write
110B000
heap
page read and write
B40000
heap
page read and write
AFFBFFD000
stack
page read and write
2792162E000
heap
page read and write
27C6FC13000
heap
page read and write
BE4277A000
stack
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
3DF1000
trusted library allocation
page read and write
110D000
heap
page read and write
BE423FB000
stack
page read and write
110D000
heap
page read and write
1C7BF870000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
27921659000
heap
page read and write
AFFC2FF000
stack
page read and write
110D000
heap
page read and write
41C1000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
ABF000
stack
page read and write
110B000
heap
page read and write
27921613000
heap
page read and write
110B000
heap
page read and write
27921663000
heap
page read and write
110D000
heap
page read and write
3D9E000
stack
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
9F74DFB000
stack
page read and write
2792165A000
heap
page read and write
110B000
heap
page read and write
1C7C01B0000
remote allocation
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
9F74FFE000
stack
page read and write
1FA2D069000
heap
page read and write
110D000
heap
page read and write
2792166D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
27921629000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
61D1FB000
stack
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
10D2000
direct allocation
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
267F05B0000
trusted library allocation
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
27921641000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
267F0613000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
27921658000
heap
page read and write
110D000
heap
page read and write
267F0668000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
267F0628000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
61D4FC000
stack
page read and write
110D000
heap
page read and write
27921667000
heap
page read and write
110D000
heap
page read and write
26A5585B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
61D97D000
stack
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
27921662000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
1BE000
stack
page read and write
3D5E000
stack
page read and write
27921674000
heap
page read and write
110D000
heap
page read and write
27C6FC5A000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
1FA2D029000
heap
page read and write
61D47E000
stack
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
2792165C000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
267F0713000
heap
page read and write
1C7C0202000
trusted library allocation
page read and write
110D000
heap
page read and write
EF0000
heap
page read and write
2792166B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
A4B16FD000
stack
page read and write
2792162C000
heap
page read and write
1100000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
1FA2DB13000
heap
page read and write
110B000
heap
page read and write
1C7BFA57000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
401000
unkown
page execute read
1106000
heap
page read and write
110B000
heap
page read and write
448000
unkown
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
26A56002000
trusted library allocation
page read and write
1C7BFA00000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
A7E000
stack
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
3DA1000
trusted library allocation
page read and write
110D000
heap
page read and write
AFFBDFF000
stack
page read and write
850000
trusted library allocation
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
6FD000
stack
page read and write
A2F000
stack
page read and write
110B000
heap
page read and write
27921684000
heap
page read and write
27C6FBE0000
trusted library allocation
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
27921600000
heap
page read and write
110B000
heap
page read and write
27921655000
heap
page read and write
1FA2D0BB000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
3DE3000
trusted library allocation
page read and write
84F000
stack
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
61D67B000
stack
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
BE42AFE000
stack
page read and write
3DE7000
trusted library allocation
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
26A55875000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
65D000
stack
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
27C703A0000
trusted library allocation
page read and write
110D000
heap
page read and write
7DE000
stack
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
110D000
heap
page read and write
1FA2D043000
heap
page read and write
2BC0000
heap
page read and write
27C6FC29000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
27921675000
heap
page read and write
27921550000
heap
page read and write
110D000
heap
page read and write
3290000
heap
page read and write
110B000
heap
page read and write
110D000
heap
page read and write
B40000
heap
page read and write
110D000
heap
page read and write
27C6FD13000
heap
page read and write
8A0000
heap
page read and write
110D000
heap
page read and write
110B000
heap
page read and write
1FA2D0E2000
heap
page read and write
110D000
heap
page read and write
27921661000
heap
page read and write
42C0000
trusted library allocation
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
There are 953 hidden memdumps, click here to show them.