IOC Report
LYDI9MoZyu.js

loading gif

Files

File Path
Type
Category
Malicious
LYDI9MoZyu.js
ASCII text, with very long lines (64506)
initial sample
malicious
C:\Users\user\AppData\Roaming\lugnisxncf.txt
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\ProgramData\Oracle\Java\.oracle_jre_usage\b5820291038aa69c.timestamp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\hsperfdata_user\4524
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\83aa4cc77f591dfc2374580bbd95f6ba_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\LYDI9MoZyu.js"
malicious
C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
"C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\lugnisxncf.txt"
malicious
C:\Windows\SysWOW64\icacls.exe
C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://wshsoft.company/jv/jrex.zip
unknown
malicious
http://crl.xrampsecurity.com/XGCA.crl
unknown
https://repo1.maven.org/maven2/net/java/dev/jna/jna-platform/5.5.0/jna-platform-5.5.0.jar
unknown
http://crl.chambersign.org/chambersroot.crl0
unknown
https://github.com
unknown
https://repository.luxtrust.lu0
unknown
http://bugreport.sun.com/bugreport/
unknown
http://cps.chambersign.org/cps/chambersroot.html0
unknown
http://java.oracle.com/
unknown
http://null.oracle.com/
unknown
http://www.chambersign.org1
unknown
http://repository.swisssign.com/0
unknown
https://repo1.maven.org/maven2/net/java/dev/jna/jna/5.5.0/jna-5.5.0.jar
unknown
http://policy.camerfirma.com
unknown
https://ocsp.quovadisoffshore.com
unknown
https://repo1.maven.org/maven2/org/xerial/sqlite-jdbc/3.14.2.1/sqlite-jdbc-3.14.2.1.jar
unknown
http://crl.securetrust.com/STCA.crl0
unknown
http://www.quovadisglobal.com/cps
unknown
http://cps.chambersign.org/cps/chambersroot.html
unknown
https://repo1.maven.org/ma
unknown
http://crl.securetrust.com/STCA.crl
unknown
https://repo1.maven.org
unknown
https://repository.luxtrust.lu
unknown
http://www.quovadisglobal.com/cps0
unknown
http://crl.xrampsecurity.com/XGCA.crl0
unknown
http://www.quovadis.bm
unknown
http://www.quovadis.bm0
unknown
https://ocsp.quovadisoffshore.com0
unknown
http://www.allatori.com
unknown
http://crl.chambersign.org/chambersroot.crl
unknown
http://repository.swisssign.com/
unknown
http://www.chambersign.org
unknown
https://github.com/kristian/system-hook/releases/download/3.5/system-hook-3.5.jar
unknown
http://policy.camerfirma.com0
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
github.com
140.82.121.3
dualstack.sonatype.map.fastly.net
199.232.196.209
15.164.165.52.in-addr.arpa
unknown
repo1.maven.org
unknown

IPs

IP
Domain
Country
Malicious
140.82.121.3
github.com
United States
199.232.196.209
dualstack.sonatype.map.fastly.net
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted

Memdumps

Base Address
Regiontype
Protect
Malicious
21CF9470000
heap
page read and write
malicious
A195000
trusted library allocation
page read and write
malicious
A169000
trusted library allocation
page read and write
malicious
A163000
trusted library allocation
page read and write
malicious
21CF6833000
heap
page read and write
156C5000
heap
page read and write
A750000
trusted library allocation
page read and write
21CF88EF000
heap
page read and write
A650000
trusted library allocation
page read and write
A7B3000
trusted library allocation
page read and write
1582B000
heap
page read and write
2B66000
trusted library allocation
page execute and read and write
5037000
trusted library allocation
page read and write
21CF894E000
heap
page read and write
1549E000
unkown
page read and write
32BE000
stack
page read and write
15895000
heap
page read and write
1450000
trusted library allocation
page read and write
50AE000
trusted library allocation
page read and write
157AB000
heap
page read and write
15787000
heap
page read and write
A6A7000
trusted library allocation
page read and write
A2C0000
trusted library allocation
page read and write
4ED5000
trusted library allocation
page read and write
73D32FE000
stack
page read and write
1273000
heap
page read and write
15716000
heap
page read and write
21CF8B04000
heap
page read and write
15895000
heap
page read and write
513E000
trusted library allocation
page read and write
15C89000
unkown
page read and write
B9D000
stack
page read and write
4E33000
trusted library allocation
page read and write
2B23000
trusted library allocation
page execute and read and write
A562000
trusted library allocation
page read and write
21CF8A1B000
heap
page read and write
21CF88FD000
heap
page read and write
BF0000
heap
page read and write
21CF86D1000
heap
page read and write
21CF6835000
heap
page read and write
1560F000
unkown
page read and write
21CF89D1000
heap
page read and write
156C5000
heap
page read and write
156D8000
heap
page read and write
4F57000
trusted library allocation
page read and write
21CF6855000
heap
page read and write
4E59000
trusted library allocation
page read and write
15716000
heap
page read and write
4FA6000
trusted library allocation
page read and write
1579C000
heap
page read and write
A533000
trusted library allocation
page read and write
A6AD000
trusted library allocation
page read and write
21CF8A21000
heap
page read and write
21CF89ED000
heap
page read and write
4C00000
trusted library allocation
page read and write
A626000
trusted library allocation
page read and write
4D72000
trusted library allocation
page read and write
4F97000
trusted library allocation
page read and write
21CF89E9000
heap
page read and write
A642000
trusted library allocation
page read and write
21CF88EF000
heap
page read and write
A77A000
trusted library allocation
page read and write
A6DD000
trusted library allocation
page read and write
4D8A000
trusted library allocation
page read and write
A7A2000
trusted library allocation
page read and write
A781000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
10CD000
stack
page read and write
21CF85D1000
heap
page read and write
4AD0000
trusted library allocation
page read and write
15CCD000
stack
page read and write
157D3000
heap
page read and write
5137000
trusted library allocation
page read and write
15757000
heap
page read and write
1564D000
stack
page read and write
4D8E000
trusted library allocation
page read and write
1273000
heap
page read and write
21CF8870000
heap
page read and write
151CE000
unkown
page read and write
514F000
trusted library allocation
page read and write
A791000
trusted library allocation
page read and write
21CF8A34000
heap
page read and write
A7B0000
trusted library allocation
page read and write
14B0000
heap
page read and write
15891000
heap
page read and write
4EBD000
trusted library allocation
page read and write
21CF6833000
heap
page read and write
A6E4000
trusted library allocation
page read and write
1533C000
heap
page read and write
21CF89B1000
heap
page read and write
A2AD000
trusted library allocation
page read and write
A71F000
trusted library allocation
page read and write
1582B000
heap
page read and write
156C5000
heap
page read and write
4F4A000
trusted library allocation
page read and write
A7B9000
trusted library allocation
page read and write
21CF87CB000
heap
page read and write
A67C000
trusted library allocation
page read and write
A68B000
trusted library allocation
page read and write
21CF8A02000
heap
page read and write
1575E000
heap
page read and write
323E000
stack
page read and write
21CF679B000
heap
page read and write
A60C000
trusted library allocation
page read and write
21CF87AA000
heap
page read and write
21CF8952000
heap
page read and write
1579C000
heap
page read and write
150AE000
stack
page read and write
A20B000
trusted library allocation
page read and write
21CF6925000
heap
page read and write
21CF8769000
heap
page read and write
21CF85D1000
heap
page read and write
3760000
heap
page read and write
21CF8B06000
heap
page read and write
21CF8952000
heap
page read and write
A6B3000
trusted library allocation
page read and write
A70B000
trusted library allocation
page read and write
505E000
trusted library allocation
page read and write
5099000
trusted library allocation
page read and write
50F0000
trusted library allocation
page read and write
21CF686E000
heap
page read and write
1513E000
unkown
page read and write
21CF8280000
heap
page read and write
1552D000
stack
page read and write
73D2EF1000
stack
page read and write
4F9E000
trusted library allocation
page read and write
4C84000
trusted library allocation
page read and write
21CF89E8000
heap
page read and write
16460000
trusted library allocation
page read and write
21CF8A03000
heap
page read and write
15812000
heap
page read and write
21CF873D000
heap
page read and write
157F3000
heap
page read and write
21CF87CB000
heap
page read and write
A685000
trusted library allocation
page read and write
1609F000
heap
page read and write
21CF89DC000
heap
page read and write
1506F000
heap
page read and write
156DC000
heap
page read and write
504A000
trusted library allocation
page read and write
A546000
trusted library allocation
page read and write
1677F000
stack
page read and write
21CF8766000
heap
page read and write
A52B000
trusted library allocation
page read and write
157D3000
heap
page read and write
15D18000
unkown
page read and write
166EF000
stack
page read and write
3470000
heap
page read and write
50BC000
trusted library allocation
page read and write
A520000
trusted library allocation
page read and write
21CF877C000
heap
page read and write
505A000
trusted library allocation
page read and write
A6AA000
trusted library allocation
page read and write
21CF89D1000
heap
page read and write
21CF686E000
heap
page read and write
F80000
heap
page read and write
A565000
trusted library allocation
page read and write
21CF8666000
heap
page read and write
A303000
trusted library allocation
page read and write
21CF89DD000
heap
page read and write
1118000
unkown
page read and write
154EE000
unkown
page read and write
A222000
trusted library allocation
page read and write
15716000
heap
page read and write
A2FD000
trusted library allocation
page read and write
332F000
stack
page read and write
A523000
trusted library allocation
page read and write
4F4D000
trusted library allocation
page read and write
21CF6849000
heap
page read and write
21CF8A10000
heap
page read and write
21CF686E000
heap
page read and write
21CF89D2000
heap
page read and write
A315000
trusted library allocation
page read and write
510D000
trusted library allocation
page read and write
21CF85D0000
heap
page read and write
A227000
trusted library allocation
page read and write
A2CD000
trusted library allocation
page read and write
11C8000
heap
page read and write
4C04000
trusted library allocation
page read and write
4D87000
trusted library allocation
page read and write
A63B000
trusted library allocation
page read and write
156CC000
heap
page read and write
1572F000
heap
page read and write
21CF8739000
heap
page read and write
2B74000
trusted library allocation
page execute and read and write
4C08000
trusted library allocation
page read and write
21CF681B000
heap
page read and write
152B8000
heap
page read and write
21CF88E5000
heap
page read and write
21CF8A18000
heap
page read and write
21CF87CE000
heap
page read and write
21CF87AA000
heap
page read and write
5043000
trusted library allocation
page read and write
21CF88E5000
heap
page read and write
21CF876A000
heap
page read and write
B4C000
stack
page read and write
4EDB000
trusted library allocation
page read and write
50C3000
trusted library allocation
page read and write
15B1D000
stack
page read and write
A50E000
trusted library allocation
page read and write
2B0A000
trusted library allocation
page execute and read and write
A657000
trusted library allocation
page read and write
32E0000
heap
page read and write
2B12000
trusted library allocation
page execute and read and write
2B6D000
trusted library allocation
page execute and read and write
156A9000
heap
page read and write
21CF8ED0000
heap
page read and write
21CF9070000
trusted library allocation
page read and write
A591000
trusted library allocation
page read and write
A7C4000
trusted library allocation
page read and write
21CF89F1000
heap
page read and write
21CF8952000
heap
page read and write
21CF67A1000
heap
page read and write
A2B9000
trusted library allocation
page read and write
21CF6856000
heap
page read and write
21CF8A10000
heap
page read and write
1263000
heap
page read and write
A52F000
trusted library allocation
page read and write
A688000
trusted library allocation
page read and write
21CF6841000
heap
page read and write
21CF8952000
heap
page read and write
21CF685D000
heap
page read and write
73D37FD000
stack
page read and write
A7A8000
trusted library allocation
page read and write
21CF6833000
heap
page read and write
15757000
heap
page read and write
A738000
trusted library allocation
page read and write
A724000
trusted library allocation
page read and write
4E2C000
trusted library allocation
page read and write
4CDA000
trusted library allocation
page read and write
16080000
heap
page read and write
21CF87C0000
heap
page read and write
21CF8911000
heap
page read and write
4CB2000
trusted library allocation
page read and write
157E3000
heap
page read and write
A6B0000
trusted library allocation
page read and write
21CF8A13000
heap
page read and write
1263000
heap
page read and write
16098000
heap
page read and write
A788000
trusted library allocation
page read and write
A6A2000
trusted library allocation
page read and write
21CF8D20000
heap
page read and write
21CF8952000
heap
page read and write
5145000
trusted library allocation
page read and write
A765000
trusted library allocation
page read and write
21CF89D2000
heap
page read and write
A7B6000
trusted library allocation
page read and write
1582B000
heap
page read and write
4CD1000
trusted library allocation
page read and write
5129000
trusted library allocation
page read and write
4ECD000
trusted library allocation
page read and write
21CF876F000
heap
page read and write
126A000
heap
page read and write
73D39FB000
stack
page read and write
4F4F000
trusted library allocation
page read and write
21CF89D0000
heap
page read and write
1520D000
stack
page read and write
A612000
trusted library allocation
page read and write
A69C000
trusted library allocation
page read and write
4CE1000
trusted library allocation
page read and write
307D000
stack
page read and write
A57C000
trusted library allocation
page read and write
21CF6710000
heap
page read and write
3120000
heap
page read and write
15A30000
trusted library allocation
page read and write
A30A000
trusted library allocation
page read and write
21CF8872000
heap
page read and write
11C0000
heap
page read and write
4EE7000
trusted library allocation
page read and write
160B8000
heap
page read and write
21CF8D80000
heap
page read and write
21CF8A34000
heap
page read and write
A799000
trusted library allocation
page read and write
50EC000
trusted library allocation
page read and write
A61F000
trusted library allocation
page read and write
503A000
trusted library allocation
page read and write
156D5000
heap
page read and write
A7C2000
trusted library allocation
page read and write
21CF67A2000
heap
page read and write
21CF85D5000
heap
page read and write
2AD0000
trusted library allocation
page execute and read and write
A7C7000
trusted library allocation
page read and write
1569E000
stack
page read and write
15716000
heap
page read and write
1584A000
heap
page read and write
1672E000
stack
page read and write
A7AB000
trusted library allocation
page read and write
21CF8A34000
heap
page read and write
21CF6770000
heap
page read and write
159E0000
trusted library allocation
page read and write
21CF679C000
heap
page read and write
15832000
heap
page read and write
A211000
trusted library allocation
page read and write
21CF6630000
heap
page read and write
4C02000
trusted library allocation
page read and write
21CF866B000
heap
page read and write
1580B000
heap
page read and write
50B5000
trusted library allocation
page read and write
A4F8000
trusted library allocation
page read and write
1273000
heap
page read and write
21CF8769000
heap
page read and write
A51D000
trusted library allocation
page read and write
A582000
trusted library allocation
page read and write
21CF87D0000
heap
page read and write
A68D000
trusted library allocation
page read and write
21CF684F000
heap
page read and write
4D7E000
trusted library allocation
page read and write
A574000
trusted library allocation
page read and write
50CD000
trusted library allocation
page read and write
3489000
heap
page read and write
A7A5000
trusted library allocation
page read and write
1524D000
stack
page read and write
21CF6857000
heap
page read and write
21CF679D000
heap
page read and write
4C8A000
trusted library allocation
page read and write
21CF686E000
heap
page read and write
2AD2000
trusted library allocation
page execute and read and write
A693000
trusted library allocation
page read and write
A2A3000
trusted library allocation
page read and write
165A8000
trusted library allocation
page read and write
1580B000
heap
page read and write
A618000
trusted library allocation
page read and write
15787000
heap
page read and write
21CF877D000
heap
page read and write
160C7000
heap
page read and write
A508000
trusted library allocation
page read and write
14C00000
trusted library allocation
page read and write
15335000
heap
page read and write
A7AD000
trusted library allocation
page read and write
500C000
trusted library allocation
page read and write
A7BC000
trusted library allocation
page read and write
A3B0000
trusted library allocation
page read and write
21CF85D1000
heap
page read and write
21CF8A34000
heap
page read and write
4C1A000
trusted library allocation
page read and write
15757000
heap
page read and write
15349000
heap
page read and write
4E48000
trusted library allocation
page read and write
21CF8A0C000
heap
page read and write
15716000
heap
page read and write
21CF85D6000
heap
page read and write
21CF87CC000
heap
page read and write
21CF89F8000
heap
page read and write
21CF8C70000
heap
page read and write
157D3000
heap
page read and write
1140000
heap
page read and write
1273000
heap
page read and write
1607E000
heap
page read and write
2B1B000
trusted library allocation
page execute and read and write
5092000
trusted library allocation
page read and write
21CF8A13000
heap
page read and write
1579C000
heap
page read and write
4CBC000
trusted library allocation
page read and write
21CF679B000
heap
page read and write
A4D4000
trusted library allocation
page read and write
21CF87CA000
heap
page read and write
21CF6844000
heap
page read and write
A699000
trusted library allocation
page read and write
A2F3000
trusted library allocation
page read and write
21CF85E3000
heap
page read and write
21CF89F2000
heap
page read and write
21CF85D1000
heap
page read and write
15895000
heap
page read and write
21CF684C000
heap
page read and write
514C000
trusted library allocation
page read and write
A6D1000
trusted library allocation
page read and write
21CF8952000
heap
page read and write
21CF89F0000
heap
page read and write
A4FC000
trusted library allocation
page read and write
15716000
heap
page read and write
157AB000
heap
page read and write
507E000
trusted library allocation
page read and write
1669E000
stack
page read and write
21CF6832000
heap
page read and write
21CF685D000
heap
page read and write
50F2000
trusted library allocation
page read and write
21CF6836000
heap
page read and write
21CF873D000
heap
page read and write
50A7000
trusted library allocation
page read and write
1532F000
heap
page read and write
157D3000
heap
page read and write
A705000
trusted library allocation
page read and write
21CF88CD000
heap
page read and write
A542000
trusted library allocation
page read and write
157D3000
heap
page read and write
21CF8777000
heap
page read and write
15727000
heap
page read and write
21CF8B06000
heap
page read and write
500E000
trusted library allocation
page read and write
A649000
trusted library allocation
page read and write
5015000
trusted library allocation
page read and write
160A8000
heap
page read and write
21CF67B3000
heap
page read and write
A150000
trusted library allocation
page read and write
A585000
trusted library allocation
page read and write
21CF8A01000
heap
page read and write
16095000
heap
page read and write
A757000
trusted library allocation
page read and write
150ED000
stack
page read and write
156B4000
heap
page read and write
A204000
trusted library allocation
page read and write
32C0000
heap
page read and write
21CF9570000
heap
page read and write
15325000
heap
page read and write
21CF8A1A000
heap
page read and write
15B69000
unkown
page read and write
A67F000
trusted library allocation
page read and write
21CF88EF000
heap
page read and write
A69F000
trusted library allocation
page read and write
155BD000
stack
page read and write
1579C000
heap
page read and write
A76C000
trusted library allocation
page read and write
A7CA000
trusted library allocation
page read and write
21CF87D1000
heap
page read and write
15C3D000
stack
page read and write
21CF8A2A000
heap
page read and write
A634000
trusted library allocation
page read and write
A682000
trusted library allocation
page read and write
A39A000
trusted library allocation
page read and write
A79C000
trusted library allocation
page read and write
73D34FE000
stack
page read and write
1579C000
heap
page read and write
A56D000
trusted library allocation
page read and write
21CF8870000
heap
page read and write
50DD000
trusted library allocation
page read and write
15891000
heap
page read and write
21CF8A01000
heap
page read and write
21CF8B06000
heap
page read and write
1557D000
unkown
page read and write
50CA000
trusted library allocation
page read and write
30BD000
stack
page read and write
15BF9000
unkown
page read and write
21CF8D60000
heap
page read and write
157CA000
heap
page read and write
3478000
heap
page read and write
21CF8A34000
heap
page read and write
A53B000
trusted library allocation
page read and write
A1FA000
trusted library allocation
page read and write
21CF679A000
heap
page read and write
A794000
trusted library allocation
page read and write
1584A000
heap
page read and write
4EEF000
trusted library allocation
page read and write
156A8000
heap
page read and write
21CF686E000
heap
page read and write
21CF9060000
heap
page read and write
4CC3000
trusted library allocation
page read and write
21CF6730000
heap
page read and write
1579C000
heap
page read and write
73D35FF000
stack
page read and write
A66C000
trusted library allocation
page read and write
21CF8A14000
heap
page read and write
2B0E000
trusted library allocation
page execute and read and write
21CF8A0C000
heap
page read and write
A548000
trusted library allocation
page read and write
21CF8A07000
heap
page read and write
A665000
trusted library allocation
page read and write
A736000
trusted library allocation
page read and write
A6A4000
trusted library allocation
page read and write
4F7D000
trusted library allocation
page read and write
21CF8A0D000
heap
page read and write
21CF8765000
heap
page read and write
21CF86D0000
heap
page read and write
21CF6831000
heap
page read and write
157D3000
heap
page read and write
A596000
trusted library allocation
page read and write
A55B000
trusted library allocation
page read and write
A749000
trusted library allocation
page read and write
A62D000
trusted library allocation
page read and write
50E5000
trusted library allocation
page read and write
A673000
trusted library allocation
page read and write
21CF87CB000
heap
page read and write
A72B000
trusted library allocation
page read and write
21CF8E50000
heap
page read and write
15895000
heap
page read and write
160DB000
heap
page read and write
A60A000
trusted library allocation
page read and write
4E51000
trusted library allocation
page read and write
4D9B000
trusted library allocation
page read and write
A589000
trusted library allocation
page read and write
A75E000
trusted library allocation
page read and write
4D77000
trusted library allocation
page read and write
E10000
heap
page read and write
21CF88FD000
heap
page read and write
73D30FD000
stack
page read and write
21CF8765000
heap
page read and write
A6F0000
trusted library allocation
page read and write
15250000
heap
page read and write
21CF8787000
heap
page read and write
A604000
trusted library allocation
page read and write
73D2FFE000
stack
page read and write
21CF894E000
heap
page read and write
21CF87AD000
heap
page read and write
BF5000
heap
page read and write
15325000
heap
page read and write
21CF8A34000
heap
page read and write
4C86000
trusted library allocation
page read and write
21CF89FB000
heap
page read and write
21CF8A21000
heap
page read and write
11D5000
heap
page read and write
21CF899A000
heap
page read and write
327E000
stack
page read and write
A6EA000
trusted library allocation
page read and write
21CF8A02000
heap
page read and write
11AD000
stack
page read and write
A696000
trusted library allocation
page read and write
21CF8A21000
heap
page read and write
4E04000
trusted library allocation
page read and write
21CF899A000
heap
page read and write
50F4000
trusted library allocation
page read and write
A733000
trusted library allocation
page read and write
1583B000
heap
page read and write
A555000
trusted library allocation
page read and write
21CF8956000
heap
page read and write
5130000
trusted library allocation
page read and write
21CF88EF000
heap
page read and write
4F84000
trusted library allocation
page read and write
1579C000
heap
page read and write
21CF686E000
heap
page read and write
21CF89F0000
heap
page read and write
21CF6842000
heap
page read and write
A4DA000
trusted library allocation
page read and write
A797000
trusted library allocation
page read and write
A65E000
trusted library allocation
page read and write
A6D7000
trusted library allocation
page read and write
21CF88FD000
heap
page read and write
A3B2000
trusted library allocation
page read and write
16060000
heap
page read and write
21CF89EC000
heap
page read and write
1531D000
heap
page read and write
1263000
heap
page read and write
73D33FF000
stack
page read and write
1517D000
stack
page read and write
A690000
trusted library allocation
page read and write
156A0000
heap
page read and write
15BAD000
stack
page read and write
A517000
trusted library allocation
page read and write
1579C000
heap
page read and write
A2EC000
trusted library allocation
page read and write
73D36FE000
stack
page read and write
160AF000
heap
page read and write
A54C000
trusted library allocation
page read and write
4ED7000
trusted library allocation
page read and write
4D49000
trusted library allocation
page read and write
21CF88FD000
heap
page read and write
A79F000
trusted library allocation
page read and write
4E3A000
trusted library allocation
page read and write
21CF6920000
heap
page read and write
A7BF000
trusted library allocation
page read and write
73D2EF6000
stack
page read and write
156C5000
heap
page read and write
A5FC000
trusted library allocation
page read and write
A39C000
trusted library allocation
page read and write
21CF8A02000
heap
page read and write
1160000
unkown
page read and write
A6F6000
trusted library allocation
page read and write
21CF89FE000
heap
page read and write
16560000
trusted library allocation
page read and write
A773000
trusted library allocation
page read and write
There are 548 hidden memdumps, click here to show them.