IOC Report
DVycy79WuR.js

loading gif

Files

File Path
Type
Category
Malicious
DVycy79WuR.js
ASCII text, with very long lines (7887), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\mkl[1].js
Unicode text, UTF-16, little-endian text, with very long lines (28148), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\DNQUBU.js
Unicode text, UTF-16, little-endian text, with very long lines (28148), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tqxse.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DVycy79WuR.js"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\DNQUBU.js"
malicious
C:\Users\user\AppData\Local\Temp\tqxse.exe
"C:\Users\user\AppData\Local\Temp\tqxse.exe"
malicious

URLs

Name
IP
Malicious
http://192.210.215.11/zoom/mkl.js
192.210.215.11
malicious
http://c.pki.goog/wr2/GSyT1N4PBrg.crl0
unknown
http://crl.pki.goog/gsr1/gsr1.crl0;
unknown
http://o.pki.goog/wr20%
unknown
http://pki.goog/gsr1/gsr1.crt02
unknown
https://account.dyn.com/
unknown
http://192.210.215.11/zoom/mkl.jsd(
unknown
http://smtp.gmail.com
unknown
http://i.pki.goog/wr2.crt0
unknown
http://c.pki.goog/r/r1.crl0
unknown
http://i.pki.goog/r1.crt0
unknown
http://ocsp.pki.goo
unknown
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
smtp.gmail.com
142.251.173.109

IPs

IP
Domain
Country
Malicious
192.210.215.11
unknown
United States
malicious
142.251.173.109
smtp.gmail.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted

Memdumps

Base Address
Regiontype
Protect
Malicious
18312751000
heap
page read and write
malicious
1830F63C000
heap
page read and write
malicious
18312682000
heap
page read and write
malicious
702000
unkown
page readonly
malicious
18311677000
heap
page read and write
1C245CA6000
heap
page read and write
18311552000
heap
page read and write
1C245F8E000
heap
page read and write
5D4A000
heap
page read and write
18313DD3000
heap
page read and write
1830F6A2000
heap
page read and write
18312A8A000
heap
page read and write
18311558000
heap
page read and write
1C247B6E000
heap
page read and write
661B000
stack
page read and write
183127B5000
heap
page read and write
1831160A000
heap
page read and write
1C247B07000
heap
page read and write
18311C39000
heap
page read and write
651B000
stack
page read and write
18312970000
heap
page read and write
1830F62C000
heap
page read and write
2B9D000
trusted library allocation
page read and write
1C2492B4000
heap
page read and write
18311509000
heap
page read and write
5160000
trusted library allocation
page read and write
1C245CA6000
heap
page read and write
1C245CEC000
heap
page read and write
1830F60A000
heap
page read and write
18312919000
heap
page read and write
1C247AD7000
heap
page read and write
1C247FF8000
heap
page read and write
18312BB2000
heap
page read and write
1C247B05000
heap
page read and write
538E000
stack
page read and write
54415FF000
stack
page read and write
1831158C000
heap
page read and write
18313E50000
heap
page read and write
1830F6AB000
heap
page read and write
1830F590000
heap
page read and write
18313DA6000
heap
page read and write
1830F630000
heap
page read and write
1C247B7A000
heap
page read and write
18314443000
heap
page read and write
18312BE1000
heap
page read and write
1C245F8C000
heap
page read and write
5D20000
trusted library allocation
page read and write
18311537000
heap
page read and write
1C248720000
heap
page read and write
1C249431000
heap
page read and write
1C247B25000
heap
page read and write
3A92000
trusted library allocation
page read and write
183116D9000
heap
page read and write
18312750000
heap
page read and write
18312722000
heap
page read and write
18312952000
heap
page read and write
1830F693000
heap
page read and write
183127D9000
heap
page read and write
BA8000
heap
page read and write
1831158C000
heap
page read and write
18311616000
heap
page read and write
18311616000
heap
page read and write
183115BE000
heap
page read and write
1C247F20000
heap
page read and write
183116BB000
heap
page read and write
1C245CBF000
heap
page read and write
1831154B000
heap
page read and write
1C247AC5000
heap
page read and write
B80000
heap
page read and write
1830F603000
heap
page read and write
1C24937A000
heap
page read and write
18312C03000
heap
page read and write
183126EB000
heap
page read and write
1830F637000
heap
page read and write
1830F6A8000
heap
page read and write
1C247ACA000
heap
page read and write
18313DDC000
heap
page read and write
18312774000
heap
page read and write
18312841000
heap
page read and write
18311551000
heap
page read and write
18311558000
heap
page read and write
18312C05000
heap
page read and write
18313129000
heap
page read and write
6960000
trusted library allocation
page execute and read and write
1830F63F000
heap
page read and write
1C248005000
heap
page read and write
18313D53000
heap
page read and write
1830F62C000
heap
page read and write
1C247B05000
heap
page read and write
18312AF2000
heap
page read and write
183115E2000
heap
page read and write
18312AF2000
heap
page read and write
1831273C000
heap
page read and write
1831294E000
heap
page read and write
18312BB2000
heap
page read and write
1830F65F000
heap
page read and write
183117E0000
heap
page read and write
18311613000
heap
page read and write
7F420000
trusted library allocation
page execute and read and write
18313D41000
heap
page read and write
18312775000
heap
page read and write
1830F697000
heap
page read and write
1830F690000
heap
page read and write
DAE000
stack
page read and write
18314491000
heap
page read and write
183127AD000
heap
page read and write
1830F684000
heap
page read and write
1C247B96000
heap
page read and write
1C247B30000
heap
page read and write
19458F4000
stack
page read and write
1830F62D000
heap
page read and write
183126EC000
heap
page read and write
183115F3000
heap
page read and write
1C247FF8000
heap
page read and write
1C247ABD000
heap
page read and write
1C245C39000
heap
page read and write
18312C02000
heap
page read and write
F4D000
trusted library allocation
page execute and read and write
18312948000
heap
page read and write
1C247B29000
heap
page read and write
1831158C000
heap
page read and write
18312941000
heap
page read and write
5176000
trusted library allocation
page read and write
700000
unkown
page readonly
1830F690000
heap
page read and write
18313ED8000
heap
page read and write
BD7000
heap
page read and write
18312CD2000
heap
page read and write
18313D76000
heap
page read and write
691D000
stack
page read and write
18311616000
heap
page read and write
18313DC9000
heap
page read and write
6920000
heap
page read and write
183114E4000
heap
page read and write
7A52000
heap
page read and write
18312A8A000
heap
page read and write
183126B6000
heap
page read and write
1831158C000
heap
page read and write
1830F6AE000
heap
page read and write
1C245BB0000
heap
page read and write
1C247AED000
heap
page read and write
18312A52000
heap
page read and write
1C247C80000
heap
page read and write
18311540000
heap
page read and write
1C245CF0000
heap
page read and write
18311697000
heap
page read and write
1945FFF000
stack
page read and write
1C247B97000
heap
page read and write
1C245F89000
heap
page read and write
18312651000
heap
page read and write
B60000
heap
page read and write
18312CFA000
heap
page read and write
18311659000
heap
page read and write
61D0000
heap
page read and write
18311541000
heap
page read and write
18312947000
heap
page read and write
1831274A000
heap
page read and write
183129D0000
heap
page read and write
1C249230000
heap
page read and write
18311616000
heap
page read and write
18314470000
heap
page read and write
1831145D000
heap
page read and write
1C247B81000
heap
page read and write
18313F22000
heap
page read and write
18313D52000
heap
page read and write
18314426000
heap
page read and write
183115A3000
heap
page read and write
1830F690000
heap
page read and write
1C247AC7000
heap
page read and write
5D40000
heap
page read and write
1C249338000
heap
page read and write
183126DB000
heap
page read and write
18312CFA000
heap
page read and write
1C249445000
heap
page read and write
1831158C000
heap
page read and write
1C247F5E000
heap
page read and write
1C247B8A000
heap
page read and write
18312CD2000
heap
page read and write
1C247AC8000
heap
page read and write
1C245C6E000
heap
page read and write
18312BD3000
heap
page read and write
183128F8000
heap
page read and write
18311536000
heap
page read and write
1C248821000
heap
page read and write
18313EDA000
heap
page read and write
18312BCE000
heap
page read and write
1C247AB2000
heap
page read and write
67DE000
stack
page read and write
740000
unkown
page readonly
1C245C3A000
heap
page read and write
61A6000
heap
page read and write
1830F614000
heap
page read and write
1C247B6C000
heap
page read and write
18311558000
heap
page read and write
4BAD000
stack
page read and write
2AFF000
trusted library allocation
page read and write
18314BDE000
heap
page read and write
183126A5000
heap
page read and write
1830F677000
heap
page read and write
18311574000
heap
page read and write
1C247B07000
heap
page read and write
1831294B000
heap
page read and write
18313010000
heap
page read and write
DEE000
stack
page read and write
1831172E000
heap
page read and write
1C247AFE000
heap
page read and write
2B5B000
trusted library allocation
page read and write
18312BE1000
heap
page read and write
18312AB3000
heap
page read and write
18312651000
heap
page read and write
1C247AEC000
heap
page read and write
18313E94000
heap
page read and write
1831160B000
heap
page read and write
1830F5EF000
heap
page read and write
18311470000
heap
page read and write
1C245BA0000
heap
page read and write
1830F685000
heap
page read and write
183127B5000
heap
page read and write
1831158C000
heap
page read and write
183115D3000
heap
page read and write
54CE000
stack
page read and write
1830F6A0000
heap
page read and write
1C247B28000
heap
page read and write
1830F667000
heap
page read and write
1C245CC1000
heap
page read and write
18312669000
heap
page read and write
4F02000
trusted library allocation
page read and write
1830F631000
heap
page read and write
4EF4000
trusted library allocation
page read and write
18313DC8000
heap
page read and write
1C247ABB000
heap
page read and write
1831160E000
heap
page read and write
18312951000
heap
page read and write
183114CD000
heap
page read and write
1C245CFA000
heap
page read and write
F20000
trusted library allocation
page read and write
18312B81000
heap
page read and write
183115E9000
heap
page read and write
183115F3000
heap
page read and write
1830F6A0000
heap
page read and write
F67000
trusted library allocation
page execute and read and write
1C247B30000
heap
page read and write
1C2492F6000
heap
page read and write
1C247AD8000
heap
page read and write
1C245C50000
heap
page read and write
18312920000
heap
page read and write
1C247B5B000
heap
page read and write
54413FF000
stack
page read and write
18311592000
heap
page read and write
18313EFA000
heap
page read and write
1831158C000
heap
page read and write
2AF8000
trusted library allocation
page read and write
183126A6000
heap
page read and write
1831274E000
heap
page read and write
1831291D000
heap
page read and write
1C247ACF000
heap
page read and write
18312798000
heap
page read and write
1830F61D000
heap
page read and write
183126A4000
heap
page read and write
2ADB000
trusted library allocation
page read and write
1830F6AC000
heap
page read and write
18314143000
heap
page read and write
1830F693000
heap
page read and write
2A6D000
trusted library allocation
page read and write
183127B6000
heap
page read and write
18313EB7000
heap
page read and write
4EF0000
trusted library allocation
page read and write
1831296D000
heap
page read and write
1830F63C000
heap
page read and write
18313E0D000
heap
page read and write
18311691000
heap
page read and write
1830F5D8000
heap
page read and write
18311484000
heap
page read and write
1C247AD2000
heap
page read and write
629E000
stack
page read and write
18312678000
heap
page read and write
1830F626000
heap
page read and write
1C2491BD000
heap
page read and write
1830F697000
heap
page read and write
1C247AC2000
heap
page read and write
18311541000
heap
page read and write
18312799000
heap
page read and write
18311541000
heap
page read and write
FB0000
trusted library allocation
page read and write
1831158C000
heap
page read and write
1C247AC8000
heap
page read and write
18311545000
heap
page read and write
1830F658000
heap
page read and write
F6B000
trusted library allocation
page execute and read and write
18312AF3000
heap
page read and write
1C245CBF000
heap
page read and write
18312889000
heap
page read and write
18311561000
heap
page read and write
1C247B80000
heap
page read and write
1C245CE7000
heap
page read and write
18311605000
heap
page read and write
18312723000
heap
page read and write
1831291D000
heap
page read and write
18312955000
heap
page read and write
6950000
heap
page read and write
183126EB000
heap
page read and write
1C248620000
heap
page read and write
1831153A000
heap
page read and write
1C245C37000
heap
page read and write
18311557000
heap
page read and write
18312A01000
heap
page read and write
4EFE000
trusted library allocation
page read and write
18311616000
heap
page read and write
18313EFE000
heap
page read and write
183127BB000
heap
page read and write
18312661000
heap
page read and write
183128D5000
heap
page read and write
1C249446000
heap
page read and write
19463FE000
stack
page read and write
1830F685000
heap
page read and write
18312BCE000
heap
page read and write
18312BCF000
heap
page read and write
19459FE000
stack
page read and write
18313E91000
heap
page read and write
1C247B8C000
heap
page read and write
1830F631000
heap
page read and write
18312BED000
heap
page read and write
18313DD4000
heap
page read and write
1C249138000
heap
page read and write
C51000
heap
page read and write
18311555000
heap
page read and write
1C247AD7000
heap
page read and write
183114A8000
heap
page read and write
18311692000
heap
page read and write
1831158C000
heap
page read and write
18311431000
heap
page read and write
5FC0000
trusted library allocation
page read and write
1830F61E000
heap
page read and write
18312BB2000
heap
page read and write
1C245CFE000
heap
page read and write
18312B34000
heap
page read and write
2A7A000
trusted library allocation
page read and write
1C245C9F000
heap
page read and write
1830F660000
heap
page read and write
1830F68A000
heap
page read and write
18311C35000
heap
page read and write
183116A7000
heap
page read and write
1831160E000
heap
page read and write
1831160E000
heap
page read and write
2AD7000
trusted library allocation
page read and write
1830F64D000
heap
page read and write
18311616000
heap
page read and write
F40000
trusted library allocation
page read and write
1831153C000
heap
page read and write
1831157D000
heap
page read and write
1C249031000
heap
page read and write
18312CFA000
heap
page read and write
1C24801C000
heap
page read and write
3A62000
trusted library allocation
page read and write
4F1D000
trusted library allocation
page read and write
1831154D000
heap
page read and write
1C247B6C000
heap
page read and write
18313DA6000
heap
page read and write
1C2492B4000
heap
page read and write
183115AD000
heap
page read and write
54410FE000
stack
page read and write
18311705000
heap
page read and write
18311549000
heap
page read and write
7A60000
heap
page read and write
18311605000
heap
page read and write
18311616000
heap
page read and write
1831281F000
heap
page read and write
18313EEC000
heap
page read and write
1C247B07000
heap
page read and write
1830F603000
heap
page read and write
18312C86000
heap
page read and write
639E000
stack
page read and write
1831172E000
heap
page read and write
2ACC000
trusted library allocation
page read and write
1830F680000
heap
page read and write
18312C86000
heap
page read and write
1C247B07000
heap
page read and write
1C247B72000
heap
page read and write
18311616000
heap
page read and write
5ECE000
unkown
page read and write
183115A8000
heap
page read and write
18311602000
heap
page read and write
1C245CE7000
heap
page read and write
1831272B000
heap
page read and write
18312CFA000
heap
page read and write
183115B9000
heap
page read and write
18312BB2000
heap
page read and write
183143D1000
heap
page read and write
19465FB000
stack
page read and write
1831160F000
heap
page read and write
1C249072000
heap
page read and write
18311541000
heap
page read and write
18311528000
heap
page read and write
1831292F000
heap
page read and write
1C249338000
heap
page read and write
1831158C000
heap
page read and write
2ADF000
trusted library allocation
page read and write
18312867000
heap
page read and write
183115E7000
heap
page read and write
1831172E000
heap
page read and write
1C247C15000
heap
page read and write
1830F64D000
heap
page read and write
7A50000
heap
page read and write
18313EC8000
heap
page read and write
1831274E000
heap
page read and write
18313E89000
heap
page read and write
1C247ABA000
heap
page read and write
1830F67E000
heap
page read and write
1831270D000
heap
page read and write
1C247B8C000
heap
page read and write
183116A5000
heap
page read and write
665E000
stack
page read and write
1C24917A000
heap
page read and write
1C247F98000
heap
page read and write
1830F60C000
heap
page read and write
1830F693000
heap
page read and write
18312682000
heap
page read and write
18311605000
heap
page read and write
18313DA6000
heap
page read and write
1C247B8A000
heap
page read and write
1C249273000
heap
page read and write
18311616000
heap
page read and write
18313DCB000
heap
page read and write
1830F5DF000
heap
page read and write
18311485000
heap
page read and write
183115AB000
heap
page read and write
4FFE000
stack
page read and write
183114E4000
heap
page read and write
F34000
trusted library allocation
page read and write
49D8000
trusted library allocation
page read and write
1C247B8C000
heap
page read and write
B40000
heap
page read and write
18311534000
heap
page read and write
18312BE3000
heap
page read and write
1C247B80000
heap
page read and write
2ABB000
trusted library allocation
page read and write
1830F622000
heap
page read and write
18311561000
heap
page read and write
1830F6AE000
heap
page read and write
1C247B07000
heap
page read and write
1C247FDB000
heap
page read and write
18313E93000
heap
page read and write
1830F960000
heap
page read and write
5D10000
trusted library allocation
page read and write
1830F617000
heap
page read and write
18312751000
heap
page read and write
1C245CE8000
heap
page read and write
18312C46000
heap
page read and write
29CF000
stack
page read and write
183126A5000
heap
page read and write
1830F696000
heap
page read and write
1C245CBF000
heap
page read and write
1830F96C000
heap
page read and write
1831172E000
heap
page read and write
1C247B6C000
heap
page read and write
18312A52000
heap
page read and write
18313DCB000
heap
page read and write
2B08000
trusted library allocation
page read and write
18313E94000
heap
page read and write
1830F780000
heap
page read and write
18313D94000
heap
page read and write
183126B8000
heap
page read and write
18312BB2000
heap
page read and write
183126FE000
heap
page read and write
2AAF000
trusted library allocation
page read and write
18313D85000
heap
page read and write
18311616000
heap
page read and write
2A38000
trusted library allocation
page read and write
18312CFA000
heap
page read and write
18312955000
heap
page read and write
1C2492F7000
heap
page read and write
1831158C000
heap
page read and write
183115F8000
heap
page read and write
5170000
trusted library allocation
page read and write
18311558000
heap
page read and write
1830F61A000
heap
page read and write
1C247F99000
heap
page read and write
183126DA000
heap
page read and write
183128B4000
heap
page read and write
1830F637000
heap
page read and write
1831172E000
heap
page read and write
183127B5000
heap
page read and write
1831172E000
heap
page read and write
1C247ABF000
heap
page read and write
5ED0000
heap
page read and write
183116A7000
heap
page read and write
183115A5000
heap
page read and write
5166000
trusted library allocation
page read and write
1C249443000
heap
page read and write
5FB0000
trusted library allocation
page execute and read and write
1C245F8B000
heap
page read and write
1C247AD0000
heap
page read and write
5E8D000
unkown
page read and write
1C247670000
heap
page read and write
183127A4000
heap
page read and write
681E000
stack
page read and write
F30000
trusted library allocation
page read and write
1831274E000
heap
page read and write
18312042000
heap
page read and write
1831274E000
heap
page read and write
18312950000
heap
page read and write
4F9C000
stack
page read and write
18313E94000
heap
page read and write
1830F5EF000
heap
page read and write
18312682000
heap
page read and write
4EFB000
trusted library allocation
page read and write
183127B5000
heap
page read and write
18312978000
heap
page read and write
183128F7000
heap
page read and write
503E000
stack
page read and write
54414FF000
stack
page read and write
1C2493BC000
heap
page read and write
18311558000
heap
page read and write
18312682000
heap
page read and write
1830F5DF000
heap
page read and write
FE7000
heap
page read and write
1C2490B5000
heap
page read and write
1C247F77000
heap
page read and write
1C249272000
heap
page read and write
18311556000
heap
page read and write
1C245CAD000
heap
page read and write
1C249231000
heap
page read and write
1831160A000
heap
page read and write
19461FB000
stack
page read and write
18312C86000
heap
page read and write
1C2490F6000
heap
page read and write
1C245C9F000
heap
page read and write
1831182C000
heap
page read and write
18311538000
heap
page read and write
18311470000
heap
page read and write
1C249030000
heap
page read and write
F0E000
stack
page read and write
18313D77000
heap
page read and write
2B04000
trusted library allocation
page read and write
183127BB000
heap
page read and write
7D9000
stack
page read and write
1830F6A3000
heap
page read and write
183115BE000
heap
page read and write
1C247AE2000
heap
page read and write
19462FF000
stack
page read and write
2ACF000
trusted library allocation
page read and write
1831172E000
heap
page read and write
F5A000
trusted library allocation
page execute and read and write
18311565000
heap
page read and write
18313D41000
heap
page read and write
1830F62F000
heap
page read and write
1831446F000
heap
page read and write
18312841000
heap
page read and write
1945DFE000
stack
page read and write
18312951000
heap
page read and write
1831274E000
heap
page read and write
18312959000
heap
page read and write
1C2490F6000
heap
page read and write
18312999000
heap
page read and write
18311558000
heap
page read and write
1C245C38000
heap
page read and write
1C247B7A000
heap
page read and write
FD0000
heap
page read and write
183126D9000
heap
page read and write
1C247B32000
heap
page read and write
18311574000
heap
page read and write
183129E1000
heap
page read and write
18312BD8000
heap
page read and write
2AB3000
trusted library allocation
page read and write
183127BB000
heap
page read and write
1C247FB7000
heap
page read and write
F62000
trusted library allocation
page read and write
18311455000
heap
page read and write
183115A8000
heap
page read and write
18311539000
heap
page read and write
18314470000
heap
page read and write
183114AD000
heap
page read and write
1831144D000
heap
page read and write
1C248520000
heap
page read and write
5044000
heap
page read and write
18312CD2000
heap
page read and write
4F0E000
trusted library allocation
page read and write
1C247B07000
heap
page read and write
1830F96D000
heap
page read and write
54416FE000
stack
page read and write
1C247B39000
heap
page read and write
18311616000
heap
page read and write
1830F613000
heap
page read and write
18312BCE000
heap
page read and write
1830F690000
heap
page read and write
10EE000
stack
page read and write
183115CD000
heap
page read and write
18311535000
heap
page read and write
1830F6A0000
heap
page read and write
1830F7A0000
heap
page read and write
18311558000
heap
page read and write
183127BB000
heap
page read and write
1831271F000
heap
page read and write
54411FE000
stack
page read and write
1C24917A000
heap
page read and write
1830F65A000
heap
page read and write
183114FC000
heap
page read and write
39D1000
trusted library allocation
page read and write
1C247AEB000
heap
page read and write
18313E93000
heap
page read and write
B45000
heap
page read and write
18312A73000
heap
page read and write
18311760000
heap
page read and write
1C247FB6000
heap
page read and write
1830F6A1000
heap
page read and write
5FA0000
trusted library allocation
page read and write
1830F609000
heap
page read and write
1C245C6E000
heap
page read and write
18312941000
heap
page read and write
BAE000
heap
page read and write
1830F671000
heap
page read and write
18311575000
heap
page read and write
18311692000
heap
page read and write
183127AA000
heap
page read and write
18312CD2000
heap
page read and write
1831291D000
heap
page read and write
18312763000
heap
page read and write
18311780000
heap
page read and write
18310F80000
heap
page read and write
4F11000
trusted library allocation
page read and write
1830F62F000
heap
page read and write
1C249441000
heap
page read and write
183116D0000
heap
page read and write
5050000
heap
page read and write
18313E72000
heap
page read and write
183115A8000
heap
page read and write
18312A8A000
heap
page read and write
183127B5000
heap
page read and write
1830F697000
heap
page read and write
1830F965000
heap
page read and write
18311530000
heap
page read and write
1C247F80000
heap
page read and write
1C247CE0000
heap
page read and write
18312CCF000
heap
page read and write
18312948000
heap
page read and write
669E000
stack
page read and write
1830F62F000
heap
page read and write
1C247AE1000
heap
page read and write
1C247B07000
heap
page read and write
1831147C000
heap
page read and write
1C247C10000
heap
page read and write
18312BD2000
heap
page read and write
18313DCF000
heap
page read and write
18311435000
heap
page read and write
1831156F000
heap
page read and write
1C247B28000
heap
page read and write
1830F630000
heap
page read and write
183116E8000
heap
page read and write
18312B8C000
heap
page read and write
18312990000
heap
page read and write
1831267A000
heap
page read and write
18311450000
heap
page read and write
1945EFE000
stack
page read and write
1C248820000
heap
page read and write
1830F638000
heap
page read and write
183127B7000
heap
page read and write
18313DCA000
heap
page read and write
18312751000
heap
page read and write
1C245CE7000
heap
page read and write
18313937000
heap
page read and write
1C247B02000
heap
page read and write
18312D15000
heap
page read and write
183116FC000
heap
page read and write
18311495000
heap
page read and write
18313E91000
heap
page read and write
18313D7B000
heap
page read and write
19460FE000
stack
page read and write
C3A000
heap
page read and write
1830F668000
heap
page read and write
18314426000
heap
page read and write
1C247F54000
heap
page read and write
18311581000
heap
page read and write
5440DD9000
stack
page read and write
1830F68A000
heap
page read and write
1C247AFB000
heap
page read and write
1C247AB0000
heap
page read and write
1C247EE0000
heap
page read and write
1C245CED000
heap
page read and write
18311658000
heap
page read and write
1C247AFD000
heap
page read and write
1830F61E000
heap
page read and write
1830F62C000
heap
page read and write
1831293A000
heap
page read and write
1831265F000
heap
page read and write
183127B6000
heap
page read and write
1C247B30000
heap
page read and write
4F30000
trusted library allocation
page read and write
1C247B4A000
heap
page read and write
1831172E000
heap
page read and write
1831270E000
heap
page read and write
18311616000
heap
page read and write
18311595000
heap
page read and write
1C247B27000
heap
page read and write
18313DA6000
heap
page read and write
18312722000
heap
page read and write
5F80000
trusted library allocation
page read and write
1C247B07000
heap
page read and write
183127B5000
heap
page read and write
1831158F000
heap
page read and write
18313D64000
heap
page read and write
1C24917A000
heap
page read and write
18311433000
heap
page read and write
183116C0000
heap
page read and write
1830F6AC000
heap
page read and write
F80000
trusted library allocation
page read and write
1C2490B4000
heap
page read and write
1C245CC1000
heap
page read and write
18312650000
heap
page read and write
1831158C000
heap
page read and write
183115B5000
heap
page read and write
1C247B07000
heap
page read and write
183115BC000
heap
page read and write
BE4000
heap
page read and write
1830F64D000
heap
page read and write
1C247B05000
heap
page read and write
18312948000
heap
page read and write
FA0000
trusted library allocation
page read and write
1C2492B4000
heap
page read and write
1C247B05000
heap
page read and write
18313F35000
heap
page read and write
1C245CAB000
heap
page read and write
18312CFA000
heap
page read and write
18312744000
heap
page read and write
1831274E000
heap
page read and write
18314148000
heap
page read and write
18313D64000
heap
page read and write
1831274E000
heap
page read and write
1C2493BC000
heap
page read and write
18312C46000
heap
page read and write
1C248110000
heap
page read and write
18312941000
heap
page read and write
1830F69B000
heap
page read and write
1831158C000
heap
page read and write
18311616000
heap
page read and write
18311561000
heap
page read and write
183127C2000
heap
page read and write
1830F617000
heap
page read and write
18312956000
heap
page read and write
183126DA000
heap
page read and write
183114E1000
heap
page read and write
1C245F8E000
heap
page read and write
5180000
heap
page execute and read and write
18312040000
heap
page read and write
1C248621000
heap
page read and write
5FA6000
trusted library allocation
page read and write
1830F6AB000
heap
page read and write
1C2491BC000
heap
page read and write
2AED000
trusted library allocation
page read and write
183127B6000
heap
page read and write
18311616000
heap
page read and write
18313DA6000
heap
page read and write
5D8B000
stack
page read and write
18311565000
heap
page read and write
18312B8C000
heap
page read and write
1831153D000
heap
page read and write
183143D1000
heap
page read and write
18313E2E000
heap
page read and write
18312846000
heap
page read and write
18313E51000
heap
page read and write
1830F691000
heap
page read and write
C1C000
heap
page read and write
18312820000
heap
page read and write
1830F618000
heap
page read and write
1830F68B000
heap
page read and write
183114C9000
heap
page read and write
1C247B80000
heap
page read and write
F90000
trusted library allocation
page execute and read and write
1831160A000
heap
page read and write
183129B1000
heap
page read and write
18312CFA000
heap
page read and write
183115BC000
heap
page read and write
1830F6AC000
heap
page read and write
3A72000
trusted library allocation
page read and write
183116B1000
heap
page read and write
18312849000
heap
page read and write
1C247B85000
heap
page read and write
1831278C000
heap
page read and write
18313F1C000
heap
page read and write
18312B8D000
heap
page read and write
1831267A000
heap
page read and write
18311597000
heap
page read and write
BA0000
heap
page read and write
183127DA000
heap
page read and write
183114E4000
heap
page read and write
18312BB2000
heap
page read and write
1C245CE7000
heap
page read and write
1831393C000
heap
page read and write
1C2490F6000
heap
page read and write
18312CFA000
heap
page read and write
18313EED000
heap
page read and write
1831154E000
heap
page read and write
18312990000
heap
page read and write
18311505000
heap
page read and write
183116ED000
heap
page read and write
1831291D000
heap
page read and write
183127B5000
heap
page read and write
BC8000
heap
page read and write
183128B3000
heap
page read and write
183127B8000
heap
page read and write
1C247B8C000
heap
page read and write
FE0000
heap
page read and write
6160000
heap
page read and write
1831158C000
heap
page read and write
1C2493BC000
heap
page read and write
1C245F85000
heap
page read and write
1C247B30000
heap
page read and write
1C247ADF000
heap
page read and write
6940000
heap
page read and write
18311531000
heap
page read and write
18311552000
heap
page read and write
183127DE000
heap
page read and write
2B99000
trusted library allocation
page read and write
18312B45000
heap
page read and write
1831155D000
heap
page read and write
1831267A000
heap
page read and write
18312B34000
heap
page read and write
18312744000
heap
page read and write
3AB2000
trusted library allocation
page read and write
4F16000
trusted library allocation
page read and write
18312A11000
heap
page read and write
18312710000
heap
page read and write
18313D62000
heap
page read and write
183143D1000
heap
page read and write
1C249440000
heap
page read and write
1830F67C000
heap
page read and write
4F22000
trusted library allocation
page read and write
1830F613000
heap
page read and write
18311458000
heap
page read and write
1C248C27000
heap
page read and write
1C247AE2000
heap
page read and write
1830F691000
heap
page read and write
1C245CE7000
heap
page read and write
5CF0000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
18312CD2000
heap
page read and write
1C247AB5000
heap
page read and write
18312B34000
heap
page read and write
18312A8B000
heap
page read and write
18311616000
heap
page read and write
18311616000
heap
page read and write
183127D9000
heap
page read and write
1C248120000
trusted library allocation
page read and write
1C247D60000
heap
page read and write
F33000
trusted library allocation
page execute and read and write
1830F690000
heap
page read and write
18312042000
heap
page read and write
183127D9000
heap
page read and write
1C249139000
heap
page read and write
3A39000
trusted library allocation
page read and write
1830F60A000
heap
page read and write
18312920000
heap
page read and write
1C245C10000
heap
page read and write
1830F61E000
heap
page read and write
1C247B07000
heap
page read and write
55F0000
trusted library allocation
page read and write
1C245C62000
heap
page read and write
18311431000
heap
page read and write
1830F648000
heap
page read and write
183115BE000
heap
page read and write
1830F5DE000
heap
page read and write
183127B5000
heap
page read and write
18313E0C000
heap
page read and write
1830F690000
heap
page read and write
5040000
heap
page read and write
18312722000
heap
page read and write
18312782000
heap
page read and write
1C249338000
heap
page read and write
1C247AB6000
heap
page read and write
18312D53000
heap
page read and write
E00000
heap
page read and write
18312AA7000
heap
page read and write
18311458000
heap
page read and write
18312681000
heap
page read and write
54419FB000
stack
page read and write
183127BB000
heap
page read and write
1830F60B000
heap
page read and write
1C247B6F000
heap
page read and write
18311582000
heap
page read and write
F50000
trusted library allocation
page read and write
FC0000
heap
page execute and read and write
18313EB7000
heap
page read and write
5BEC000
stack
page read and write
18312D83000
heap
page read and write
4AAC000
stack
page read and write
1C245F8E000
heap
page read and write
1C247B7A000
heap
page read and write
183115B7000
heap
page read and write
183115AF000
heap
page read and write
18311484000
heap
page read and write
1831156D000
heap
page read and write
1C247F80000
heap
page read and write
183114ED000
heap
page read and write
18311685000
heap
page read and write
18311559000
heap
page read and write
1C248920000
heap
page read and write
18311659000
heap
page read and write
1831172E000
heap
page read and write
18311571000
heap
page read and write
1830F6A0000
heap
page read and write
18311605000
heap
page read and write
18312BD2000
heap
page read and write
18312669000
heap
page read and write
1831159A000
heap
page read and write
18312D14000
heap
page read and write
1C245C9F000
heap
page read and write
1C247B80000
heap
page read and write
1C247F77000
heap
page read and write
609E000
stack
page read and write
18311561000
heap
page read and write
1C2493FE000
heap
page read and write
18311431000
heap
page read and write
1C247B07000
heap
page read and write
18313014000
heap
page read and write
183126C8000
heap
page read and write
1830F63C000
heap
page read and write
1831294C000
heap
page read and write
1830F5B0000
heap
page read and write
18312A8A000
heap
page read and write
528C000
stack
page read and write
1C245CF8000
heap
page read and write
1C249072000
heap
page read and write
18311542000
heap
page read and write
18311519000
heap
page read and write
1831267F000
heap
page read and write
39F9000
trusted library allocation
page read and write
18312946000
heap
page read and write
183115C3000
heap
page read and write
1C247AEE000
heap
page read and write
1830F690000
heap
page read and write
548E000
stack
page read and write
29D1000
trusted library allocation
page read and write
18313DDC000
heap
page read and write
18313E93000
heap
page read and write
18311534000
heap
page read and write
18313EC9000
heap
page read and write
5F90000
trusted library allocation
page execute and read and write
183114F9000
heap
page read and write
F56000
trusted library allocation
page execute and read and write
18312CD2000
heap
page read and write
18312BDD000
heap
page read and write
1C247AF3000
heap
page read and write
1C247AE2000
heap
page read and write
18312868000
heap
page read and write
1830F693000
heap
page read and write
F3D000
trusted library allocation
page execute and read and write
1830F62D000
heap
page read and write
18312783000
heap
page read and write
18312841000
heap
page read and write
1830F692000
heap
page read and write
183114E4000
heap
page read and write
18312B8C000
heap
page read and write
1C245CC1000
heap
page read and write
1C247B8A000
heap
page read and write
1830F614000
heap
page read and write
1945CFE000
stack
page read and write
18314BDB000
heap
page read and write
55CE000
stack
page read and write
18312958000
heap
page read and write
1830F618000
heap
page read and write
1831291D000
heap
page read and write
183114A4000
heap
page read and write
1C247B7B000
heap
page read and write
183116A7000
heap
page read and write
18311529000
heap
page read and write
18311458000
heap
page read and write
18311556000
heap
page read and write
5F70000
trusted library allocation
page execute and read and write
1830F69D000
heap
page read and write
1831154D000
heap
page read and write
1830F697000
heap
page read and write
183143E5000
heap
page read and write
183117D0000
heap
page read and write
61DD000
heap
page read and write
18313E72000
heap
page read and write
2AF2000
trusted library allocation
page read and write
1831160B000
heap
page read and write
18311724000
heap
page read and write
18313E91000
heap
page read and write
18311616000
heap
page read and write
183127A4000
heap
page read and write
18312948000
heap
page read and write
1830F683000
heap
page read and write
1830F5D9000
heap
page read and write
18312B8C000
heap
page read and write
18313DEA000
heap
page read and write
18311558000
heap
page read and write
1831158C000
heap
page read and write
1831172E000
heap
page read and write
1C247AC0000
heap
page read and write
1831158C000
heap
page read and write
183127B5000
heap
page read and write
18311585000
heap
page read and write
1C245D03000
heap
page read and write
1C247B39000
heap
page read and write
183115E5000
heap
page read and write
2B0A000
trusted library allocation
page read and write
1831157F000
heap
page read and write
1830F61C000
heap
page read and write
1830F613000
heap
page read and write
18311692000
heap
page read and write
1831146D000
heap
page read and write
1C247F92000
heap
page read and write
1831172E000
heap
page read and write
18311692000
heap
page read and write
18312661000
heap
page read and write
18312BD6000
heap
page read and write
18314470000
heap
page read and write
1945AFE000
stack
page read and write
18312941000
heap
page read and write
1C247F30000
heap
page read and write
1830F638000
heap
page read and write
28CE000
stack
page read and write
1C247B3B000
heap
page read and write
18313DB9000
heap
page read and write
18312744000
heap
page read and write
18312762000
heap
page read and write
66DE000
stack
page read and write
2AE8000
trusted library allocation
page read and write
18312786000
heap
page read and write
18313E92000
heap
page read and write
BE1000
heap
page read and write
18312760000
heap
page read and write
1830F686000
heap
page read and write
1831159F000
heap
page read and write
183115BB000
heap
page read and write
18311481000
heap
page read and write
F52000
trusted library allocation
page read and write
AF8000
stack
page read and write
18311597000
heap
page read and write
18311499000
heap
page read and write
183115C9000
heap
page read and write
18313DA6000
heap
page read and write
18311450000
heap
page read and write
18312D50000
heap
page read and write
1C24937B000
heap
page read and write
18313DA6000
heap
page read and write
1C247B4C000
heap
page read and write
18312A8A000
heap
page read and write
1830F603000
heap
page read and write
183129DD000
heap
page read and write
18313F34000
heap
page read and write
1831158C000
heap
page read and write
764E000
stack
page read and write
1C245CA6000
heap
page read and write
6B50000
trusted library allocation
page read and write
18311616000
heap
page read and write
18311430000
heap
page read and write
B50000
heap
page read and write
18311556000
heap
page read and write
18311566000
heap
page read and write
18312651000
heap
page read and write
18313D83000
heap
page read and write
18311441000
heap
page read and write
5CED000
stack
page read and write
18311714000
heap
page read and write
1C247B07000
heap
page read and write
18311481000
heap
page read and write
4F40000
trusted library allocation
page read and write
1830F684000
heap
page read and write
2BA5000
trusted library allocation
page read and write
55F4000
trusted library allocation
page read and write
1C245F80000
heap
page read and write
18313D84000
heap
page read and write
605E000
stack
page read and write
1C247AD7000
heap
page read and write
18312D57000
heap
page read and write
183116B6000
heap
page read and write
6180000
heap
page read and write
18311611000
heap
page read and write
1830F5EF000
heap
page read and write
18313F10000
heap
page read and write
1C245BD0000
heap
page read and write
54417FD000
stack
page read and write
1830F69C000
heap
page read and write
18312C8F000
heap
page read and write
1C247AEB000
heap
page read and write
1C247ACA000
heap
page read and write
1C247F5F000
heap
page read and write
183116EE000
heap
page read and write
1831172C000
heap
page read and write
18311558000
heap
page read and write
There are 1071 hidden memdumps, click here to show them.