IOC Report
aOHLlvfakv.dll

loading gif

Files

File Path
Type
Category
Malicious
aOHLlvfakv.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 62582 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\aOHLlvfakv.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\aOHLlvfakv.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\aOHLlvfakv.dll,DllRegisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\HRYKmuIti\sEzrCiJYDniwfP.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\LwITFj\lcEQL.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\YDgQnzosNBGOURNE\pquwSRMRvDBcLA.dll"
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\aOHLlvfakv.dll,__CPPdebugHook
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\aOHLlvfakv.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\aOHLlvfakv.dll",#1

URLs

Name
IP
Malicious
https://164.90.222.65/pescnrsqtrnp/icjmpjlu/
164.90.222.65
malicious
https://164.68.99.3:8080/pescnrsqtrnp/icjmpjlu/0
unknown
https://164.68.99.3:8080/pescnrsqtrnp/icjmpjlu/p
unknown
https://186.194.240.217:443/pescnrsqtrnp/icjmpjlu/
unknown
https://139.59.126.41/0/
unknown
https://164.68.99.3:8080/wW
unknown
https://95.217.221.146:8080/pescnrsqtrnp/icjmpjlu/
unknown
https://66.228.32.31:7080/
unknown
https://66.228.32.31:7080/pescnrsqtrnp/icjmpjlu/
unknown
https://139.59.126.41/
unknown
https://139.59.126.41/pescnrsqtrnp/icjmpjlu/
unknown
https://164.68.99.3:8080/
unknown
https://167.172.199.165:8080/D
unknown
https://91.121.146.47:8080/pescnrsqtrnp/icjmpjlu/
unknown
https://91.121.146.47:8080/pescnrsqtrnp/icjmpjlu/d
unknown
https://95.217.221.146:8080/pescnrsqtrnp/icjmpjlu//CW
unknown
https://167.172.199.165:8080/pescnrsqtrnp/icjmpjlu/
unknown
https://139.59.126.41/jlu/_E
unknown
https://95.217.221.146:8080/
unknown
https://164.68.99.3:8080/pescnrsqtrnp/icjmpjlu/L
unknown
https://66.228.32.31:7080/#Ws
unknown
https://164.68.99.3:8080/pescnrsqtrnp/icjmpjlu/
unknown
https://186.194.240.217/3WC
unknown
https://91.121.146.47:8080/
unknown
There are 14 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
110.232.117.186
unknown
Australia
malicious
103.132.242.26
unknown
India
malicious
104.168.155.143
unknown
United States
malicious
79.137.35.198
unknown
France
malicious
115.68.227.76
unknown
Korea Republic of
malicious
163.44.196.120
unknown
Singapore
malicious
206.189.28.199
unknown
United States
malicious
107.170.39.149
unknown
United States
malicious
66.228.32.31
unknown
United States
malicious
185.4.135.165
unknown
Greece
malicious
197.242.150.244
unknown
South Africa
malicious
183.111.227.137
unknown
Korea Republic of
malicious
45.176.232.124
unknown
Colombia
malicious
169.57.156.166
unknown
United States
malicious
164.68.99.3
unknown
Germany
malicious
139.59.126.41
unknown
Singapore
malicious
167.172.253.162
unknown
United States
malicious
167.172.199.165
unknown
United States
malicious
202.129.205.3
unknown
Thailand
malicious
147.139.166.154
unknown
United States
malicious
153.92.5.27
unknown
Germany
malicious
159.65.88.10
unknown
United States
malicious
172.105.226.75
unknown
United States
malicious
101.50.0.91
unknown
Indonesia
malicious
164.90.222.65
unknown
United States
malicious
213.239.212.5
unknown
Germany
malicious
5.135.159.50
unknown
France
malicious
186.194.240.217
unknown
Brazil
malicious
119.59.103.152
unknown
Thailand
malicious
159.89.202.34
unknown
United States
malicious
91.121.146.47
unknown
France
malicious
160.16.142.56
unknown
Japan
malicious
201.94.166.162
unknown
Brazil
malicious
91.207.28.33
unknown
Kyrgyzstan
malicious
103.75.201.2
unknown
Thailand
malicious
103.43.75.120
unknown
Japan
malicious
188.44.20.25
unknown
Macedonia
malicious
45.235.8.30
unknown
Brazil
malicious
153.126.146.25
unknown
Japan
malicious
72.15.201.15
unknown
United States
malicious
187.63.160.88
unknown
Brazil
malicious
173.212.193.249
unknown
Germany
malicious
82.223.21.224
unknown
Spain
malicious
95.217.221.146
unknown
Germany
malicious
149.56.131.28
unknown
Canada
malicious
182.162.143.56
unknown
Korea Republic of
malicious
1.234.2.232
unknown
Korea Republic of
malicious
129.232.188.93
unknown
South Africa
malicious
94.23.45.86
unknown
France
malicious
There are 39 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
1370000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
25255CD0000
direct allocation
page execute and read and write
malicious
98B000
heap
page read and write
malicious
2410000
direct allocation
page execute and read and write
malicious
1B91A160000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
1EFF4C33000
heap
page read and write
208A989B000
heap
page read and write
1FE63300000
heap
page read and write
2C97000
heap
page read and write
1EFF8370000
heap
page read and write
15717E8D000
heap
page read and write
2CB5000
heap
page read and write
2C9C000
heap
page read and write
2450000
trusted library allocation
page read and write
15717F18000
heap
page read and write
2EC8000
heap
page read and write
482000
unkown
page readonly
A65000
heap
page read and write
2500000
heap
page read and write
2400000
direct allocation
page execute and read and write
A63000
heap
page read and write
A28000
heap
page read and write
F1A7DFE000
stack
page read and write
A05000
heap
page read and write
1360000
direct allocation
page execute and read and write
15718871000
heap
page read and write
9DB000
heap
page read and write
18002A000
direct allocation
page readonly
3EFF7F000
stack
page read and write
2A8C000
stack
page read and write
A63000
heap
page read and write
8A80FE000
stack
page read and write
18002B000
direct allocation
page read and write
29B0045D000
heap
page read and write
A1A000
heap
page read and write
1420000
heap
page read and write
2C30000
heap
page read and write
1FE6328D000
heap
page read and write
637ACFC000
stack
page read and write
9C8000
heap
page read and write
9D7000
heap
page read and write
29B00478000
heap
page read and write
1454000
heap
page read and write
1FE6329E000
heap
page read and write
15717EF0000
heap
page read and write
2BBE000
stack
page read and write
2F20000
heap
page read and write
1EFF4AD0000
heap
page read and write
9CC000
heap
page read and write
2075F002000
heap
page read and write
A05000
heap
page read and write
482000
unkown
page readonly
455000
unkown
page read and write
1C62B510000
heap
page read and write
400000
unkown
page readonly
18002B000
direct allocation
page read and write
2075F102000
heap
page read and write
44F000
unkown
page write copy
25254510000
direct allocation
page execute and read and write
25254525000
heap
page read and write
1B918610000
heap
page read and write
29455EA2000
heap
page read and write
2CA0000
heap
page read and write
208A9813000
heap
page read and write
15718704000
heap
page read and write
18002A000
direct allocation
page readonly
637ADFF000
stack
page read and write
15718756000
heap
page read and write
2C90000
heap
page read and write
2C90000
heap
page read and write
A1A000
heap
page read and write
9EA000
heap
page read and write
2E10000
heap
page read and write
1477000
heap
page read and write
9E5000
heap
page read and write
25254420000
heap
page read and write
9C4000
heap
page read and write
2CA0000
heap
page read and write
32139F7000
stack
page read and write
9FF000
heap
page read and write
1EFF4C24000
heap
page read and write
208A9913000
heap
page read and write
60AE8FF000
stack
page read and write
2440000
heap
page readonly
208AA202000
heap
page read and write
6437A7B000
stack
page read and write
1B918764000
heap
page read and write
8A817E000
stack
page read and write
1FE632A0000
heap
page read and write
2C62000
heap
page read and write
2CCC000
heap
page read and write
15718781000
heap
page read and write
2C97000
heap
page read and write
459000
unkown
page read and write
157180A0000
trusted library allocation
page read and write
C45000
heap
page read and write
15717F28000
heap
page read and write
64378F7000
stack
page read and write
1350000
direct allocation
page read and write
A05000
heap
page read and write
B50000
heap
page read and write
9D7000
heap
page read and write
2D4D000
stack
page read and write
29B0044D000
heap
page read and write
9CC000
heap
page read and write
2C8C000
heap
page read and write
29B00458000
heap
page read and write
208A987E000
heap
page read and write
15718863000
heap
page read and write
F2DBEF8000
stack
page read and write
15717E8D000
heap
page read and write
208A9902000
heap
page read and write
29B00447000
heap
page read and write
15718706000
heap
page read and write
29B0045E000
heap
page read and write
5400000
trusted library allocation
page read and write
1B9186D5000
heap
page read and write
29455EAC000
heap
page read and write
2CF5000
heap
page read and write
2C57000
heap
page read and write
29455DE0000
unclassified section
page readonly
2C9B000
heap
page read and write
25255E40000
trusted library allocation
page read and write
180000000
direct allocation
page read and write
476000
unkown
page readonly
208A98AC000
heap
page read and write
2ECE000
heap
page read and write
23F0000
direct allocation
page read and write
1EFF4C0B000
heap
page read and write
180000000
direct allocation
page read and write
15717F18000
heap
page read and write
157187B7000
heap
page read and write
2480000
remote allocation
page read and write
2CF6000
heap
page read and write
29455F02000
heap
page read and write
2C38000
heap
page read and write
180000000
direct allocation
page read and write
2B0B000
stack
page read and write
9DB000
heap
page read and write
15717EA9000
heap
page read and write
1FE63269000
heap
page read and write
29B00444000
heap
page read and write
1FE63170000
trusted library allocation
page read and write
452000
unkown
page read and write
15718732000
heap
page read and write
9EC000
heap
page read and write
1437000
heap
page read and write
29B00464000
heap
page read and write
29B0042B000
heap
page read and write
1C62B4A0000
heap
page read and write
208A9900000
heap
page read and write
F1A797E000
stack
page read and write
F2DB91C000
stack
page read and write
482000
unkown
page readonly
44E000
unkown
page read and write
1B918950000
heap
page read and write
29455E91000
heap
page read and write
2ECE000
heap
page read and write
1454000
heap
page read and write
1B91A1C0000
trusted library allocation
page read and write
2075F06F000
heap
page read and write
2E11000
heap
page read and write
400000
unkown
page readonly
980000
heap
page read and write
15718030000
heap
page read and write
3690000
heap
page read and write
29B0044F000
heap
page read and write
15717E58000
heap
page read and write
29455E13000
heap
page read and write
1EFF4C00000
heap
page read and write
A14000
heap
page read and write
A0F000
heap
page read and write
9EC000
heap
page read and write
2ECE000
heap
page read and write
1448000
heap
page read and write
29B0045B000
heap
page read and write
3EFCFE000
stack
page read and write
60AE5FE000
stack
page read and write
2669EA78000
heap
page read and write
9E5000
heap
page read and write
208A9840000
heap
page read and write
A63000
heap
page read and write
2C91C7E000
stack
page read and write
456000
unkown
page write copy
208A987E000
heap
page read and write
9E5000
heap
page read and write
A14000
heap
page read and write
2075ED70000
heap
page read and write
A08000
heap
page read and write
F1A787B000
stack
page read and write
1EFF4EDB000
heap
page read and write
456000
unkown
page write copy
1EFF4DD0000
heap
page read and write
A1A000
heap
page read and write
1FE63000000
heap
page read and write
1EFF4ED0000
heap
page read and write
9D1000
heap
page read and write
15718726000
heap
page read and write
64379FF000
stack
page read and write
29455E3B000
heap
page read and write
2669EB02000
heap
page read and write
1FE64C02000
trusted library allocation
page read and write
3213AFF000
stack
page read and write
142B000
heap
page read and write
1140000
heap
page read and write
208A988F000
heap
page read and write
1FE631B0000
trusted library allocation
page read and write
2E57000
heap
page read and write
25254500000
direct allocation
page read and write
459000
unkown
page read and write
29B0046B000
heap
page read and write
15717E49000
heap
page read and write
9CC000
heap
page read and write
A87DD7D000
stack
page read and write
1C62B5D0000
heap
page read and write
A14000
heap
page read and write
15717E79000
heap
page read and write
2C91AFF000
stack
page read and write
29455E28000
heap
page read and write
2525436D000
heap
page read and write
208A988A000
heap
page read and write
3213B7B000
stack
page read and write
A63000
heap
page read and write
13B0000
trusted library allocation
page read and write
CE0000
heap
page read and write
15718701000
heap
page read and write
1FE63287000
heap
page read and write
3213A7E000
stack
page read and write
29B00350000
trusted library allocation
page read and write
144C000
heap
page read and write
18002A000
direct allocation
page readonly
15717F21000
heap
page read and write
A1A000
heap
page read and write
1571871D000
heap
page read and write
8C0000
heap
page read and write
2C5E000
heap
page read and write
44E000
unkown
page read and write
15718702000
heap
page read and write
15718766000
heap
page read and write
9D7000
heap
page read and write
15717F0E000
heap
page read and write
2075EDE0000
heap
page read and write
A05000
heap
page read and write
3EF9DB000
stack
page read and write
29B00494000
heap
page read and write
9CC000
heap
page read and write
29B00478000
heap
page read and write
A87DDFF000
stack
page read and write
208A988D000
heap
page read and write
60AE2FE000
stack
page read and write
2075F000000
heap
page read and write
29B00460000
heap
page read and write
15718707000
heap
page read and write
2075F02A000
heap
page read and write
1B91871B000
heap
page read and write
1FE632A2000
heap
page read and write
208AA215000
heap
page read and write
3EFDFF000
stack
page read and write
64376FE000
stack
page read and write
15718150000
heap
page read and write
2CA0000
heap
page read and write
1B9186D0000
heap
page read and write
208A988A000
heap
page read and write
3E4047E000
stack
page read and write
1458000
heap
page read and write
29B0046D000
heap
page read and write
2C3F000
stack
page read and write
29B0044B000
heap
page read and write
2CA0000
heap
page read and write
2C4E000
stack
page read and write
44E000
unkown
page read and write
144C000
heap
page read and write
A0C000
heap
page read and write
29455E50000
heap
page read and write
2669EA40000
heap
page read and write
9EC000
heap
page read and write
2850000
heap
page read and write
A1A000
heap
page read and write
1477000
heap
page read and write
29B00469000
heap
page read and write
2669EA66000
heap
page read and write
380E000
stack
page read and write
2CF5000
heap
page read and write
15717F03000
heap
page read and write
1EFF4C2E000
heap
page read and write
2CA0000
heap
page read and write
2669F402000
heap
page read and write
1458000
heap
page read and write
8A807E000
stack
page read and write
9E9000
heap
page read and write
1455000
heap
page read and write
9EC000
heap
page read and write
9B0000
heap
page read and write
15718775000
heap
page read and write
A0B000
heap
page read and write
643767C000
stack
page read and write
A63000
heap
page read and write
1571875A000
heap
page read and write
29B00452000
heap
page read and write
2EA1000
heap
page read and write
1EFF8363000
heap
page read and write
1B918710000
heap
page read and write
2669EA3B000
heap
page read and write
29B002F0000
unclassified section
page readonly
A14000
heap
page read and write
401000
unkown
page execute read
2C11000
heap
page read and write
476000
unkown
page readonly
2075F041000
heap
page read and write
1B9186E0000
direct allocation
page read and write
2CCF000
stack
page read and write
637AEFF000
stack
page read and write
64377FE000
stack
page read and write
25254320000
heap
page read and write
400000
unkown
page readonly
321353C000
stack
page read and write
455000
unkown
page read and write
29B00487000
heap
page read and write
453000
unkown
page write copy
A87D7FD000
stack
page read and write
15717D70000
heap
page read and write
25255E40000
trusted library allocation
page read and write
15717DD0000
heap
page read and write
2CEE000
heap
page read and write
29B004A8000
heap
page read and write
D9B000
stack
page read and write
29B00413000
heap
page read and write
29B00493000
heap
page read and write
60AE7FC000
stack
page read and write
401000
unkown
page execute read
3E404FF000
stack
page read and write
18002B000
direct allocation
page read and write
A05000
heap
page read and write
1FE62F90000
heap
page read and write
A05000
heap
page read and write
2C914DB000
stack
page read and write
8A7D7A000
stack
page read and write
18002B000
direct allocation
page read and write
2C919FE000
stack
page read and write
9FF000
heap
page read and write
1C62B5DD000
heap
page read and write
1FE63317000
heap
page read and write
15718797000
heap
page read and write
9D5000
heap
page read and write
29455E56000
heap
page read and write
89B000
stack
page read and write
1454000
heap
page read and write
2C10000
heap
page read and write
2F23000
heap
page read and write
452000
unkown
page read and write
4A0000
heap
page read and write
18002A000
direct allocation
page readonly
15717F2E000
heap
page read and write
29B0046A000
heap
page read and write
A1A000
heap
page read and write
114B000
heap
page read and write
16C5000
heap
page read and write
2C8C000
heap
page read and write
208A9886000
heap
page read and write
208A989B000
heap
page read and write
A14000
heap
page read and write
29456802000
trusted library allocation
page read and write
10D0000
heap
page read and write
1EFF6C00000
heap
page read and write
2CAD000
heap
page read and write
F1A78FE000
stack
page read and write
29455E75000
heap
page read and write
2669F400000
heap
page read and write
2075EF80000
trusted library allocation
page read and write
9D7000
heap
page read and write
A1A000
heap
page read and write
208A9AF0000
heap
page read and write
1EFF8360000
heap
page read and write
456000
unkown
page write copy
452000
unkown
page read and write
2669ECE0000
unclassified section
page readonly
29B00400000
heap
page read and write
A14000
heap
page read and write
18002C000
direct allocation
page readonly
A05000
heap
page read and write
F1A7BFF000
stack
page read and write
A14000
heap
page read and write
29B00451000
heap
page read and write
15718717000
heap
page read and write
60AEAFB000
stack
page read and write
1EFF4ED5000
heap
page read and write
2CBE000
heap
page read and write
16C0000
heap
page read and write
29B00470000
heap
page read and write
1B918700000
heap
page readonly
A1A000
heap
page read and write
208A9800000
heap
page read and write
29455E9E000
heap
page read and write
160D000
stack
page read and write
476000
unkown
page readonly
A14000
heap
page read and write
60AEBFE000
stack
page read and write
A05000
heap
page read and write
9D7000
heap
page read and write
452000
unkown
page read and write
29B00462000
heap
page read and write
2CA0000
heap
page read and write
1B9188E0000
heap
page read and write
26CA000
stack
page read and write
2460000
trusted library allocation
page read and write
2C91BFB000
stack
page read and write
2B8F000
stack
page read and write
208A9898000
heap
page read and write
A14000
heap
page read and write
1FE63241000
heap
page read and write
15717EA1000
heap
page read and write
15717E40000
heap
page read and write
2669E960000
heap
page read and write
15717E75000
heap
page read and write
15717E92000
heap
page read and write
3010000
heap
page read and write
9FF000
heap
page read and write
2C37000
heap
page read and write
400000
unkown
page readonly
29B00466000
heap
page read and write
2075F088000
heap
page read and write
482000
unkown
page readonly
60AEC7E000
stack
page read and write
18002C000
direct allocation
page readonly
2E57000
heap
page read and write
B2E000
stack
page read and write
2450000
trusted library allocation
page read and write
9E9000
heap
page read and write
15718766000
heap
page read and write
2ECE000
heap
page read and write
1571870C000
heap
page read and write
1571874F000
heap
page read and write
2669EA93000
heap
page read and write
9E5000
heap
page read and write
15718757000
heap
page read and write
8A81FF000
stack
page read and write
F1A7CFE000
stack
page read and write
2669EA24000
heap
page read and write
2EEE000
stack
page read and write
2C8B000
heap
page read and write
29B00449000
heap
page read and write
2669EB13000
heap
page read and write
FC0000
heap
page read and write
3E4027C000
stack
page read and write
A63000
heap
page read and write
2C97000
heap
page read and write
3E402FF000
stack
page read and write
322E000
stack
page read and write
294565E0000
trusted library allocation
page read and write
A14000
heap
page read and write
2075F013000
heap
page read and write
15717E8D000
heap
page read and write
A08000
heap
page read and write
15717E8D000
heap
page read and write
60AE6FF000
stack
page read and write
2DE7000
stack
page read and write
2075F048000
heap
page read and write
29B00480000
heap
page read and write
1441000
heap
page read and write
2EC8000
heap
page read and write
44F000
unkown
page write copy
1FE63302000
heap
page read and write
13A0000
heap
page readonly
9CC000
heap
page read and write
2503000
heap
page read and write
459000
unkown
page read and write
2E81000
heap
page read and write
2075F05E000
heap
page read and write
1459000
heap
page read and write
29B00459000
heap
page read and write
A87DEFD000
stack
page read and write
A87D38B000
stack
page read and write
A63000
heap
page read and write
1EFF4C1E000
heap
page read and write
453000
unkown
page write copy
2C90000
heap
page read and write
2C8C000
heap
page read and write
2E31000
heap
page read and write
A08000
heap
page read and write
29B00440000
heap
page read and write
C40000
heap
page read and write
643777E000
stack
page read and write
1240000
heap
page read and write
208AA200000
heap
page read and write
9DB000
heap
page read and write
2CA0000
heap
page read and write
9FF000
heap
page read and write
2480000
remote allocation
page read and write
F2DBDF6000
stack
page read and write
31AE000
stack
page read and write
208A982B000
heap
page read and write
1EFF83E0000
trusted library allocation
page read and write
453000
unkown
page write copy
2669EA00000
heap
page read and write
15717F0E000
heap
page read and write
25255E20000
heap
page read and write
15717F25000
heap
page read and write
1B9186F0000
direct allocation
page execute and read and write
2C90000
heap
page read and write
A87DB7D000
stack
page read and write
643797E000
stack
page read and write
B90000
heap
page read and write
C3D000
stack
page read and write
15718764000
heap
page read and write
B9C000
heap
page read and write
A63000
heap
page read and write
1B91A1E0000
heap
page read and write
A1A000
heap
page read and write
2ECE000
heap
page read and write
459000
unkown
page read and write
A14000
heap
page read and write
358E000
stack
page read and write
2E59000
heap
page read and write
25254520000
heap
page read and write
29B0046C000
heap
page read and write
29455E40000
heap
page read and write
29455EA7000
heap
page read and write
3E4037E000
stack
page read and write
9EC000
heap
page read and write
1EFF4C1A000
heap
page read and write
29B001E0000
heap
page read and write
29B00485000
heap
page read and write
29B00170000
heap
page read and write
60AE4FB000
stack
page read and write
208A98A0000
heap
page read and write
9DB000
heap
page read and write
1FE63213000
heap
page read and write
29B00472000
heap
page read and write
3E406FF000
stack
page read and write
15717F0E000
heap
page read and write
157187B7000
heap
page read and write
A1A000
heap
page read and write
29B00496000
heap
page read and write
1EFF4C1E000
heap
page read and write
208A97D0000
heap
page read and write
15718700000
heap
page read and write
2669ECF0000
heap
page read and write
2075EF50000
trusted library allocation
page read and write
1FE631E0000
remote allocation
page read and write
15717F18000
heap
page read and write
2C90000
heap
page read and write
A87DC7F000
stack
page read and write
A63000
heap
page read and write
321387E000
stack
page read and write
15717E92000
heap
page read and write
2669EA81000
heap
page read and write
643787D000
stack
page read and write
2C90000
heap
page read and write
9EC000
heap
page read and write
60AE27B000
stack
page read and write
208A9855000
heap
page read and write
1FE63110000
unclassified section
page readonly
32AB000
stack
page read and write
2669EB00000
heap
page read and write
15717E75000
heap
page read and write
F1A7AFE000
stack
page read and write
15717F39000
heap
page read and write
590000
heap
page read and write
2C7D000
heap
page read and write
25254490000
heap
page read and write
29B00461000
heap
page read and write
29455CD0000
heap
page read and write
29B00428000
heap
page read and write
25254389000
heap
page read and write
208A9893000
heap
page read and write
2669EA27000
heap
page read and write
2525432B000
heap
page read and write
A63000
heap
page read and write
293F000
stack
page read and write
1380000
heap
page read and write
44F000
unkown
page write copy
11AF000
heap
page read and write
9DB000
heap
page read and write
9D7000
heap
page read and write
18002C000
direct allocation
page readonly
2C915DF000
stack
page read and write
2CA0000
heap
page read and write
321397B000
stack
page read and write
9EC000
heap
page read and write
1C62B5E8000
heap
page read and write
29B00502000
heap
page read and write
8A7DFE000
stack
page read and write
401000
unkown
page execute read
9C4000
heap
page read and write
29B00437000
heap
page read and write
29456000000
heap
page read and write
9DC000
heap
page read and write
32135BE000
stack
page read and write
29455E8F000
heap
page read and write
15718800000
heap
page read and write
3E4077A000
stack
page read and write
9D7000
heap
page read and write
2E11000
heap
page read and write
9D8000
heap
page read and write
3E40679000
stack
page read and write
25254190000
heap
page read and write
1278000
stack
page read and write
1FE631E0000
remote allocation
page read and write
A63000
heap
page read and write
25255D00000
heap
page readonly
24FE000
stack
page read and write
2669E9D0000
heap
page read and write
15718764000
heap
page read and write
15717F02000
heap
page read and write
29B00457000
heap
page read and write
2A40000
heap
page read and write
9DC000
heap
page read and write
1EFF4B40000
heap
page read and write
2CAB000
heap
page read and write
15717E8F000
heap
page read and write
8D0000
heap
page read and write
2C7D000
heap
page read and write
2C58000
heap
page read and write
208A98A3000
heap
page read and write
2669EA4D000
heap
page read and write
15717F2D000
heap
page read and write
9BB000
heap
page read and write
5E70000
trusted library allocation
page read and write
157187D4000
heap
page read and write
1451000
heap
page read and write
132D000
stack
page read and write
2C9B000
heap
page read and write
5D0000
heap
page read and write
29B00300000
heap
page read and write
15718857000
heap
page read and write
29B00434000
heap
page read and write
29455C70000
heap
page read and write
34A0000
heap
page read and write
A07000
heap
page read and write
B95000
heap
page read and write
9DC000
heap
page read and write
9D3000
heap
page read and write
2C0B000
stack
page read and write
2C97000
heap
page read and write
2EA1000
heap
page read and write
2C8B000
heap
page read and write
2C91CFE000
stack
page read and write
2E80000
heap
page read and write
1571875A000
heap
page read and write
2C97000
heap
page read and write
1FE63313000
heap
page read and write
1420000
heap
page read and write
16CC000
heap
page read and write
2CA0000
heap
page read and write
1520000
heap
page read and write
1FE63120000
heap
page read and write
29B00467000
heap
page read and write
9E2000
heap
page read and write
9FF000
heap
page read and write
29B00C02000
trusted library allocation
page read and write
29B00453000
heap
page read and write
29455E00000
heap
page read and write
2CAB000
heap
page read and write
208A989F000
heap
page read and write
1FE63200000
heap
page read and write
A1A000
heap
page read and write
9DB000
heap
page read and write
18002C000
direct allocation
page readonly
66EE000
stack
page read and write
29B00446000
heap
page read and write
9FF000
heap
page read and write
2CBC000
heap
page read and write
455000
unkown
page read and write
A0F000
heap
page read and write
A14000
heap
page read and write
2C9C000
heap
page read and write
2075EF00000
heap
page read and write
1FE63275000
heap
page read and write
2075F026000
heap
page read and write
24C0000
heap
page read and write
208AA0E0000
trusted library allocation
page read and write
2669F2E0000
trusted library allocation
page read and write
29B0045A000
heap
page read and write
144C000
heap
page read and write
9C8000
heap
page read and write
2075EEF0000
unclassified section
page readonly
208A9AE0000
unclassified section
page readonly
2D60000
heap
page read and write
2C8C000
heap
page read and write
29B0045C000
heap
page read and write
1477000
heap
page read and write
29B0046F000
heap
page read and write
9FF000
heap
page read and write
1FE63225000
heap
page read and write
2669EA13000
heap
page read and write
1446000
heap
page read and write
A19000
heap
page read and write
2E59000
heap
page read and write
208A9770000
heap
page read and write
2480000
remote allocation
page read and write
15717F18000
heap
page read and write
401000
unkown
page execute read
1B918776000
heap
page read and write
1C62B590000
unclassified section
page readonly
180000000
direct allocation
page read and write
44E000
unkown
page read and write
15717F19000
heap
page read and write
1FE631E0000
remote allocation
page read and write
208A98A4000
heap
page read and write
476000
unkown
page readonly
208A9891000
heap
page read and write
2460000
trusted library allocation
page read and write
9FF000
heap
page read and write
2075F802000
trusted library allocation
page read and write
455000
unkown
page read and write
559000
stack
page read and write
1425000
heap
page read and write
44F000
unkown
page write copy
9D7000
heap
page read and write
9DB000
heap
page read and write
32138FE000
stack
page read and write
15717E94000
heap
page read and write
13B0000
trusted library allocation
page read and write
15717E91000
heap
page read and write
15718720000
heap
page read and write
1454000
heap
page read and write
208A985D000
heap
page read and write
15718155000
heap
page read and write
A87D97D000
stack
page read and write
15718890000
heap
page read and write
9C7000
heap
page read and write
3E4057E000
stack
page read and write
15717F0E000
heap
page read and write
453000
unkown
page write copy
456000
unkown
page write copy
1B91A2E0000
trusted library allocation
page read and write
29455E2B000
heap
page read and write
2C84000
heap
page read and write
2C38000
heap
page read and write
15717F36000
heap
page read and write
2669F415000
heap
page read and write
There are 725 hidden memdumps, click here to show them.