IOC Report
VertusinstruccionesFedEX_66521.zip

loading gif

Files

File Path
Type
Category
Malicious
VertusinstruccionesFedEX_66521.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
initial sample
malicious
C:\Users\user\AppData\Local\2510
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qnegbpwh.sso.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rtdl1adf.kfq.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Temp1_VertusinstruccionesFedEX_66521.zip\VertusinstruccionesFedEX_NHJzl5uIzstD.cmd" "
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo %PCzmjQH8jota% "
malicious
C:\Windows\System32\cmd.exe
cmd.exe /c powershell.exe -exec bypass -nop -win 1 -
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -exec bypass -nop -win 1 -
malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
C:\Windows\System32\notepad.exe
"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\AppData\Local\Temp\Temp1_VertusinstruccionesFedEX_66521.zip\-

URLs

Name
IP
Malicious
http://45.79.204.129/contadores/TnZYN.php?iWY=EiwIZKlgmDJwbFobKM167awreInvomxL806TXsZdJznxUFO
45.79.204.129
malicious
http://ipinfo.io/json
34.117.59.81
https://mozilla.org0
unknown

Domains

Name
IP
Malicious
ipinfo.io
34.117.59.81

IPs

IP
Domain
Country
Malicious
45.79.204.129
unknown
United States
malicious
34.117.59.81
ipinfo.io
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\abgrcnq.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWindowsOnlyEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fPasteOriginalEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fReverse
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWrapAround
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fMatchCase
There are 29 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
20EC11DC000
heap
page read and write
20EC1149000
heap
page read and write
20EC10FF000
heap
page read and write
20EC11AD000
heap
page read and write
21DA3D81000
heap
page read and write
20EC11A3000
heap
page read and write
21DA3D6D000
heap
page read and write
21DA3D9A000
heap
page read and write
21DA3D5B000
heap
page read and write
20EC11C1000
heap
page read and write
20EC11C6000
heap
page read and write
20EC10EA000
heap
page read and write
20EC11C5000
heap
page read and write
21DA3D83000
heap
page read and write
1D936EE0000
trusted library allocation
page read and write
1D9355B0000
heap
page read and write
21DA3D52000
heap
page read and write
20EC11E0000
heap
page read and write
21DA3E52000
heap
page read and write
20EC11C1000
heap
page read and write
21DA3DB0000
heap
page read and write
21DA1D63000
heap
page read and write
21DA3D88000
heap
page read and write
20EC11CD000
heap
page read and write
20EC5D40000
heap
page readonly
20EC10E1000
heap
page read and write
21DA3EA4000
heap
page read and write
21DA3D7D000
heap
page read and write
964770E000
stack
page read and write
21DA1D7A000
heap
page read and write
21DA6546000
heap
page read and write
21DA3D93000
heap
page read and write
21DA3DA2000
heap
page read and write
20EC11E0000
heap
page read and write
21DA1D70000
heap
page read and write
20EC3902000
heap
page read and write
21DA3E51000
heap
page read and write
20EC1094000
heap
page read and write
20EBF16E000
heap
page read and write
20EC0BEE000
heap
page read and write
21DA3D60000
heap
page read and write
21DA1D48000
heap
page read and write
21DA3DAB000
heap
page read and write
21DA3E88000
heap
page read and write
20EC10D9000
heap
page read and write
20EBF173000
heap
page read and write
21DA3D9D000
heap
page read and write
21DA3D55000
heap
page read and write
20EC11C1000
heap
page read and write
20EC1190000
heap
page read and write
21DA3D93000
heap
page read and write
20EC11B8000
heap
page read and write
20EC11C6000
heap
page read and write
21DA3EEC000
heap
page read and write
20EC0A43000
heap
page read and write
21DA3EB7000
heap
page read and write
20EC11F0000
heap
page read and write
21DA3F14000
heap
page read and write
21DA8D90000
trusted library allocation
page read and write
21DA3D71000
heap
page read and write
21DA3DAF000
heap
page read and write
20EC11C4000
heap
page read and write
21DA3DAB000
heap
page read and write
21DA3D81000
heap
page read and write
21DA3D62000
heap
page read and write
21DA3D8B000
heap
page read and write
21DA1D6B000
heap
page read and write
20EC11B5000
heap
page read and write
20EC11F0000
heap
page read and write
20EC11CA000
heap
page read and write
20EC1137000
heap
page read and write
1FDFCFE000
stack
page read and write
20EC11CB000
heap
page read and write
20EC11D8000
heap
page read and write
21DA1D6A000
heap
page read and write
20EBF162000
heap
page read and write
964778E000
stack
page read and write
21DA3E70000
heap
page read and write
21DA653C000
heap
page read and write
4BB49AE000
stack
page read and write
1D936F00000
heap
page read and write
21DA3D8D000
heap
page read and write
20EC390A000
heap
page read and write
1FDFBFE000
stack
page read and write
21DA1C90000
heap
page read and write
20EC38ED000
heap
page read and write
1D93556C000
heap
page read and write
21DA3D49000
heap
page read and write
21DA3DAA000
heap
page read and write
21DA6531000
heap
page read and write
21DA3E3E000
heap
page read and write
21DA3D97000
heap
page read and write
20EC11D8000
heap
page read and write
21DA3DA5000
heap
page read and write
21DA3D63000
heap
page read and write
20EC1113000
heap
page read and write
1D935430000
heap
page read and write
20EC113C000
heap
page read and write
21DA3EB6000
heap
page read and write
21DA3D8D000
heap
page read and write
20EC3904000
heap
page read and write
21DA3D8D000
heap
page read and write
21DA3D8F000
heap
page read and write
21DA3D92000
heap
page read and write
21DA3E30000
heap
page read and write
20EC11AD000
heap
page read and write
20EC11F5000
heap
page read and write
21DA1D5B000
heap
page read and write
21DA3D71000
heap
page read and write
21DA1D48000
heap
page read and write
20EC1195000
heap
page read and write
21DA3D83000
heap
page read and write
21DA3DAC000
heap
page read and write
20EC10F1000
heap
page read and write
20EC1177000
heap
page read and write
21DA1D7A000
heap
page read and write
21DA3D8F000
heap
page read and write
21DA3D40000
heap
page read and write
1FDF7E9000
stack
page read and write
21DA3EB4000
heap
page read and write
20EC11CA000
heap
page read and write
20EC10AE000
heap
page read and write
21DA3EB0000
heap
page read and write
20EC10E0000
heap
page read and write
20EC11D4000
heap
page read and write
21DA3F21000
heap
page read and write
1FDFC7F000
stack
page read and write
21DA37C0000
heap
page read and write
21DA3D6E000
heap
page read and write
21DA3F03000
heap
page read and write
20EC11D8000
heap
page read and write
4BB4CFF000
stack
page read and write
21DA3D96000
heap
page read and write
20EC11A9000
heap
page read and write
20EC11CA000
heap
page read and write
20EC119A000
heap
page read and write
20EBF13D000
heap
page read and write
21DA3E67000
heap
page read and write
21DA3EFA000
heap
page read and write
21DA654C000
heap
page read and write
21DA1D72000
heap
page read and write
21DA3D89000
heap
page read and write
21DA3E69000
heap
page read and write
20EC1190000
heap
page read and write
21DA3D9E000
heap
page read and write
21DA3D6C000
heap
page read and write
21DA3D75000
heap
page read and write
21DA3D71000
heap
page read and write
21DA3D81000
heap
page read and write
20EC38C7000
heap
page read and write
20EC38F9000
heap
page read and write
20EC38F1000
heap
page read and write
21DA3650000
heap
page read and write
21DA3E3D000
heap
page read and write
20EC11B1000
heap
page read and write
21DA3D83000
heap
page read and write
21DA1D51000
heap
page read and write
20EC11F0000
heap
page read and write
21DA3E81000
heap
page read and write
20EC11DC000
heap
page read and write
1D937411000
heap
page read and write
20EC11E8000
heap
page read and write
21DA3D9A000
heap
page read and write
21DA3E70000
heap
page read and write
21DA3E8F000
heap
page read and write
21DA3D97000
heap
page read and write
21DA3EA6000
heap
page read and write
21DA3D8A000
heap
page read and write
21DA3E9B000
heap
page read and write
20EC38B0000
heap
page read and write
20EC11CA000
heap
page read and write
21DA3D8D000
heap
page read and write
20EC11E4000
heap
page read and write
20EC10D9000
heap
page read and write
20EC10EA000
heap
page read and write
21DA3D7D000
heap
page read and write
21DA1D87000
heap
page read and write
21DA3D71000
heap
page read and write
20EBF14D000
heap
page read and write
20EC11CB000
heap
page read and write
1D937510000
heap
page read and write
21DA3EA5000
heap
page read and write
20EC38E3000
heap
page read and write
21DA3DB3000
heap
page read and write
20EC11E8000
heap
page read and write
21DA3F2E000
heap
page read and write
21DA3D81000
heap
page read and write
21DA3D52000
heap
page read and write
20EC38C0000
heap
page read and write
21DA3D57000
heap
page read and write
20EC114E000
heap
page read and write
20EC11A4000
heap
page read and write
21DA3EEF000
heap
page read and write
20EBF148000
heap
page read and write
21DA37CE000
heap
page read and write
21DA3D8F000
heap
page read and write
20EC11C6000
heap
page read and write
21DA3D30000
heap
page read and write
21DA3EAE000
heap
page read and write
21DA1D7C000
heap
page read and write
1D9355EA000
heap
page read and write
21DA3940000
heap
page read and write
9647A7E000
stack
page read and write
21DA3E78000
heap
page read and write
21DA3D89000
heap
page read and write
20EC11C1000
heap
page read and write
21DA3D76000
heap
page read and write
20EC10B8000
heap
page read and write
20EC38F3000
heap
page read and write
21DA3D93000
heap
page read and write
20EC10BA000
heap
page read and write
21DA3D75000
heap
page read and write
20EBF12A000
heap
page read and write
21DA3D9E000
heap
page read and write
20EC0A40000
heap
page read and write
20EC11C1000
heap
page read and write
21DA3D81000
heap
page read and write
20EC11CB000
heap
page read and write
21DA3D9E000
heap
page read and write
1FDFB7E000
stack
page read and write
21DA3E62000
heap
page read and write
20EC110E000
heap
page read and write
21DA3EB2000
heap
page read and write
20EC11DC000
heap
page read and write
21DA1D61000
heap
page read and write
20EC5920000
heap
page read and write
21DA3D8B000
heap
page read and write
21DA3D5F000
heap
page read and write
21DA1DAE000
heap
page read and write
20EC38F5000
heap
page read and write
21DA3D97000
heap
page read and write
20EC10C3000
heap
page read and write
20EC11CA000
heap
page read and write
20EC11E8000
heap
page read and write
EF8EEBC000
stack
page read and write
21DA3D6D000
heap
page read and write
21DA653A000
heap
page read and write
20EBF157000
heap
page read and write
21DA3DAB000
heap
page read and write
20EC1149000
heap
page read and write
21DA3D8B000
heap
page read and write
21DA3D81000
heap
page read and write
21DA1D6D000
heap
page read and write
20EC11B8000
heap
page read and write
21DA3D79000
heap
page read and write
1D9374B2000
heap
page read and write
21DA3D64000
heap
page read and write
20EBF14A000
heap
page read and write
20EC1170000
heap
page read and write
21DA3F01000
heap
page read and write
20EC3911000
heap
page read and write
21DA1CB0000
heap
page read and write
21DA3EB4000
heap
page read and write
20EC11C1000
heap
page read and write
20EBF162000
heap
page read and write
20EC5E40000
heap
page read and write
20EC11BD000
heap
page read and write
21DA3D7D000
heap
page read and write
20EC390A000
heap
page read and write
20EC11B8000
heap
page read and write
20EC1111000
heap
page read and write
21DA3F08000
heap
page read and write
21DA3DAB000
heap
page read and write
21DA3D40000
heap
page read and write
21DA3D9A000
heap
page read and write
21DA1D45000
heap
page read and write
21DA3EB7000
heap
page read and write
21DA3D62000
heap
page read and write
20EC1104000
heap
page read and write
20EC11CB000
heap
page read and write
1D9355E1000
heap
page read and write
20EBF14F000
heap
page read and write
21DA3D4C000
heap
page read and write
20EC38FC000
heap
page read and write
2E9724C5000
heap
page read and write
21DA3D7D000
heap
page read and write
21DA3D4E000
heap
page read and write
20EC3900000
heap
page read and write
20EC38D9000
heap
page read and write
7DF42AEA1000
trusted library allocation
page execute read
20EC119E000
heap
page read and write
21DA6556000
heap
page read and write
21DA3D6D000
heap
page read and write
21DA3D69000
heap
page read and write
20EC11B8000
heap
page read and write
20EC38C3000
heap
page read and write
20EC1137000
heap
page read and write
21DA3DAD000
heap
page read and write
20EC3911000
heap
page read and write
20EBF030000
heap
page read and write
21DA3D9F000
heap
page read and write
4BB492E000
stack
page read and write
20EC11E4000
heap
page read and write
21DA3D69000
heap
page read and write
21DA3D5F000
heap
page read and write
20EC10CA000
heap
page read and write
20EC11D2000
heap
page read and write
21DA3F26000
heap
page read and write
20EC11E8000
heap
page read and write
21DA3D9B000
heap
page read and write
20EC11BC000
heap
page read and write
21DA3F27000
heap
page read and write
20EC11C7000
heap
page read and write
21DA3D91000
heap
page read and write
21DA3D89000
heap
page read and write
21DA3D81000
heap
page read and write
21DA3D96000
heap
page read and write
20EC11D2000
heap
page read and write
1D935570000
heap
page read and write
21DA1D7B000
heap
page read and write
2E972548000
heap
page read and write
20EBF13D000
heap
page read and write
21DA3D6A000
heap
page read and write
21DA3D89000
heap
page read and write
20EC11B7000
heap
page read and write
20EC11DC000
heap
page read and write
21DA3D70000
heap
page read and write
20EC1109000
heap
page read and write
20EC5D30000
trusted library allocation
page read and write
21DA3D44000
heap
page read and write
21DA3F03000
heap
page read and write
20EBF144000
heap
page read and write
20EBF153000
heap
page read and write
1D938EC0000
trusted library allocation
page read and write
20EC11DC000
heap
page read and write
21DA1D29000
heap
page read and write
21DA3D7D000
heap
page read and write
21DA1D81000
heap
page read and write
21DA1D6C000
heap
page read and write
2E973EB0000
heap
page read and write
20EC10C1000
heap
page read and write
21DA6543000
heap
page read and write
21DA3D9F000
heap
page read and write
21DA3D89000
heap
page read and write
21DA3EA6000
heap
page read and write
20EC11A4000
heap
page read and write
21DA3D88000
heap
page read and write
21DA3D66000
heap
page read and write
20EC11E8000
heap
page read and write
21DA3D8D000
heap
page read and write
20EC1080000
heap
page read and write
20EC11BC000
heap
page read and write
21DA1D63000
heap
page read and write
20EBF155000
heap
page read and write
20EC11EC000
heap
page read and write
21DA1D7E000
heap
page read and write
20EC3904000
heap
page read and write
20EC11EC000
heap
page read and write
21DA3D7C000
heap
page read and write
20EC11B3000
heap
page read and write
21DA3D50000
heap
page read and write
2E972552000
heap
page read and write
21DA3D83000
heap
page read and write
1D937427000
heap
page read and write
21DA3D50000
heap
page read and write
20EBF12B000
heap
page read and write
20EBF137000
heap
page read and write
21DA3D8B000
heap
page read and write
20EC1198000
heap
page read and write
21DA1D5A000
heap
page read and write
20EBF120000
heap
page read and write
20EC10FF000
heap
page read and write
20EBF147000
heap
page read and write
20EBF165000
heap
page read and write
21DA3D89000
heap
page read and write
1D935607000
heap
page read and write
21DA3D81000
heap
page read and write
21DA3D68000
heap
page read and write
20EBF19D000
heap
page read and write
21DA3DA3000
heap
page read and write
20EBF158000
heap
page read and write
21DA3D81000
heap
page read and write
20EC10E4000
heap
page read and write
20EC38CC000
heap
page read and write
21DA8294000
trusted library allocation
page read and write
20EC10AB000
heap
page read and write
21DA3DA8000
heap
page read and write
20EBF15F000
heap
page read and write
21DA3D80000
heap
page read and write
20EC11DC000
heap
page read and write
20EBF0A0000
heap
page read and write
21DA3E94000
heap
page read and write
21DA1D48000
heap
page read and write
21DA3ECA000
heap
page read and write
20EC11EC000
heap
page read and write
21DA3EF1000
heap
page read and write
21DA3ED3000
heap
page read and write
20EBF131000
heap
page read and write
20EC1105000
heap
page read and write
21DA3D71000
heap
page read and write
20EC10A9000
heap
page read and write
20EC0BEE000
heap
page read and write
21DA8DA0000
heap
page readonly
21DA3D92000
heap
page read and write
9647E7B000
stack
page read and write
20EBF177000
heap
page read and write
20EC11A3000
heap
page read and write
21DA3D9B000
heap
page read and write
21DA3D6D000
heap
page read and write
20EC10BF000
heap
page read and write
20EC11A9000
heap
page read and write
21DA3D91000
heap
page read and write
20EC11B4000
heap
page read and write
21DA1D64000
heap
page read and write
21DA3D79000
heap
page read and write
21DA6552000
heap
page read and write
21DA3DA6000
heap
page read and write
1FDFA7E000
stack
page read and write
20EC11D2000
heap
page read and write
21DA3D64000
heap
page read and write
20EC11C2000
heap
page read and write
21DA3DA2000
heap
page read and write
20EC3907000
heap
page read and write
21DA8B30000
heap
page read and write
21DA3DA2000
heap
page read and write
20EC10D2000
heap
page read and write
21DA655E000
heap
page read and write
21DA1DA8000
heap
page read and write
20EBF168000
heap
page read and write
21DA653A000
heap
page read and write
21DA3E78000
heap
page read and write
21DA3E49000
heap
page read and write
1D9375B2000
heap
page read and write
21DA3D7D000
heap
page read and write
1D935560000
heap
page read and write
21DA3D42000
heap
page read and write
21DA3DA7000
heap
page read and write
21DA3D8D000
heap
page read and write
21DA3D7C000
heap
page read and write
20EBF136000
heap
page read and write
20EC11EC000
heap
page read and write
20EBF170000
heap
page read and write
1D937410000
heap
page read and write
20EC11D8000
heap
page read and write
21DA3D88000
heap
page read and write
20EC11B3000
heap
page read and write
21DA8EA0000
heap
page read and write
21DA3D71000
heap
page read and write
20EBF174000
heap
page read and write
21DA3D48000
heap
page read and write
20EBF17C000
heap
page read and write
21DA3D5B000
heap
page read and write
21DA3D8C000
heap
page read and write
21DA3E5C000
heap
page read and write
21DA655E000
heap
page read and write
20EC10EA000
heap
page read and write
21DA3D6A000
heap
page read and write
21DA3E54000
heap
page read and write
20EC1198000
heap
page read and write
20EC10B6000
heap
page read and write
21DA3DA6000
heap
page read and write
21DA3DA6000
heap
page read and write
20EC110D000
heap
page read and write
21DA3EB2000
heap
page read and write
20EC390B000
heap
page read and write
20EBF142000
heap
page read and write
20EC0BE0000
heap
page read and write
21DA3D88000
heap
page read and write
21DA3DA2000
heap
page read and write
21DA3D9B000
heap
page read and write
21DA1D90000
heap
page read and write
20EC11C1000
heap
page read and write
21DA3DA1000
heap
page read and write
21DA3F07000
heap
page read and write
20EC11DC000
heap
page read and write
20EC3BA0000
heap
page read and write
21DA3F0B000
heap
page read and write
20EC11D2000
heap
page read and write
21DA1D82000
heap
page read and write
21DA3D5F000
heap
page read and write
21DA655F000
heap
page read and write
21DA3D83000
heap
page read and write
20EBF145000
heap
page read and write
21DA3EA6000
heap
page read and write
20EC11F0000
heap
page read and write
21DA3D8F000
heap
page read and write
20EC10E3000
heap
page read and write
21DA3DAF000
heap
page read and write
4BB4E7B000
stack
page read and write
20EC0BEE000
heap
page read and write
21DA3D97000
heap
page read and write
21DA653C000
heap
page read and write
21DA3DAD000
heap
page read and write
21DA3D9B000
heap
page read and write
21DA3D8D000
heap
page read and write
21DA3D9B000
heap
page read and write
21DA1D91000
heap
page read and write
20EC1122000
heap
page read and write
20EC11EC000
heap
page read and write
21DA6548000
heap
page read and write
20EC38C0000
heap
page read and write
21DA1D72000
heap
page read and write
20EC11AA000
heap
page read and write
21DA3D64000
heap
page read and write
21DA3EB0000
heap
page read and write
21DA3D8B000
heap
page read and write
20EBF16D000
heap
page read and write
20EC11F0000
heap
page read and write
21DA3DB3000
heap
page read and write
1D936F73000
heap
page read and write
20EC11F9000
heap
page read and write
21DA3D5F000
heap
page read and write
20EC1095000
heap
page read and write
21DA3D58000
heap
page read and write
21DA37CE000
heap
page read and write
21DA6550000
heap
page read and write
21DA3E88000
heap
page read and write
20EBF0A9000
heap
page read and write
20EC11DC000
heap
page read and write
20EC3902000
heap
page read and write
21DA37CD000
heap
page read and write
2E9724D0000
heap
page read and write
20EC11A3000
heap
page read and write
21DA3D81000
heap
page read and write
21DA3D81000
heap
page read and write
20EC11B3000
heap
page read and write
21DA3EB4000
heap
page read and write
21DA3D8C000
heap
page read and write
21DA3D8B000
heap
page read and write
1D9355B8000
heap
page read and write
20EC11D2000
heap
page read and write
21DA3D89000
heap
page read and write
20EC10A2000
heap
page read and write
20EC11D2000
heap
page read and write
21DA3E91000
heap
page read and write
21DA1D8C000
heap
page read and write
21DA1D75000
heap
page read and write
21DA3E70000
heap
page read and write
20EBF157000
heap
page read and write
20EBF17F000
heap
page read and write
21DA3D9E000
heap
page read and write
20EC1137000
heap
page read and write
21DA3D52000
heap
page read and write
21DA3D74000
heap
page read and write
20EC10FF000
heap
page read and write
20EBF122000
heap
page read and write
9647687000
stack
page read and write
21DA3D80000
heap
page read and write
20EBF080000
heap
page read and write
21DA3E85000
heap
page read and write
20EC1166000
heap
page read and write
20EC11AD000
heap
page read and write
21DA3D89000
heap
page read and write
21DA1D72000
heap
page read and write
21DA3DA7000
heap
page read and write
20EC119D000
heap
page read and write
20EC11EC000
heap
page read and write
21DA3D93000
heap
page read and write
20EC11BC000
heap
page read and write
21DA3E9B000
heap
page read and write
20EC11D2000
heap
page read and write
21DA1D80000
heap
page read and write
20EC11A0000
heap
page read and write
21DA37C5000
heap
page read and write
21DA3D96000
heap
page read and write
21DA1D70000
heap
page read and write
21DA3F2E000
heap
page read and write
20EC11D3000
heap
page read and write
20EC11B5000
heap
page read and write
4BB4DFE000
stack
page read and write
1D936F70000
heap
page read and write
20EC11AE000
heap
page read and write
20EC11C1000
heap
page read and write
20EC10E6000
heap
page read and write
21DA3E7A000
heap
page read and write
21DA655C000
heap
page read and write
21DA1D8E000
heap
page read and write
21DA3D97000
heap
page read and write
21DA3D91000
heap
page read and write
21DA3D92000
heap
page read and write
20EC1144000
heap
page read and write
21DA3EB4000
heap
page read and write
20EC11BD000
heap
page read and write
21DA1D69000
heap
page read and write
21DA3D97000
heap
page read and write
21DA3DA6000
heap
page read and write
21DA3D7D000
heap
page read and write
21DA6520000
heap
page read and write
20EC11E0000
heap
page read and write
20EC11B1000
heap
page read and write
21DA1D75000
heap
page read and write
20EC11CB000
heap
page read and write
21DA3D8B000
heap
page read and write
20EC11CA000
heap
page read and write
21DA3E89000
heap
page read and write
20EC10A0000
heap
page read and write
20EC38C7000
heap
page read and write
20EC11E8000
heap
page read and write
2E972540000
heap
page read and write
20EC11D8000
heap
page read and write
1D935565000
heap
page read and write
20EC1102000
heap
page read and write
20EC11B5000
heap
page read and write
21DA6530000
heap
page read and write
20EC11CE000
heap
page read and write
21DA3D92000
heap
page read and write
20EC11BD000
heap
page read and write
20EC11AD000
heap
page read and write
1D9396C0000
heap
page read and write
21DA3EAA000
heap
page read and write
21DA3D88000
heap
page read and write
20EC10DB000
heap
page read and write
21DA3EA1000
heap
page read and write
21DA3E8E000
heap
page read and write
20EC11B1000
heap
page read and write
21DA3E95000
heap
page read and write
20EBF142000
heap
page read and write
2E9724C0000
heap
page read and write
20EBF11A000
heap
page read and write
21DA3DAB000
heap
page read and write
21DA1D59000
heap
page read and write
2E972490000
heap
page read and write
21DA3EB7000
heap
page read and write
20EC10CA000
heap
page read and write
20EC10BC000
heap
page read and write
21DA3D88000
heap
page read and write
21DA3D69000
heap
page read and write
21DA3D88000
heap
page read and write
EF8EFBE000
stack
page read and write
21DA3E7F000
heap
page read and write
21DA3D83000
heap
page read and write
20EC11B5000
heap
page read and write
21DA3F14000
heap
page read and write
20EC10BA000
heap
page read and write
20EBF040000
heap
page read and write
20EC11BC000
heap
page read and write
20EC38F1000
heap
page read and write
21DA653A000
heap
page read and write
21DA1D4F000
heap
page read and write
21DA1D68000
heap
page read and write
21DA654C000
heap
page read and write
21DA1E80000
heap
page read and write
21DA3D83000
heap
page read and write
21DA3D75000
heap
page read and write
21DA3943000
heap
page read and write
21DA1D69000
heap
page read and write
20EC113F000
heap
page read and write
20EC38B9000
heap
page read and write
20EC11B8000
heap
page read and write
EF8F27E000
stack
page read and write
21DA3D8D000
heap
page read and write
9647BFD000
stack
page read and write
21DA1D85000
heap
page read and write
21DA3D7E000
heap
page read and write
20EC11C4000
heap
page read and write
21DA3D6D000
heap
page read and write
EF8EF3F000
stack
page read and write
21DA3E47000
heap
page read and write
21DA1D73000
heap
page read and write
21DA3D5A000
heap
page read and write
20EC10D2000
heap
page read and write
20EC1180000
heap
page read and write
21DA3E7F000
heap
page read and write
20EC38E3000
heap
page read and write
20EC11A9000
heap
page read and write
20EC1116000
heap
page read and write
21DA3E84000
heap
page read and write
20EC11D8000
heap
page read and write
21DA3D75000
heap
page read and write
21DA3EEA000
heap
page read and write
21DA3D46000
heap
page read and write
21DA5F30000
trusted library allocation
page read and write
20EC11E4000
heap
page read and write
21DA3D81000
heap
page read and write
21DA6543000
heap
page read and write
21DA3EAE000
heap
page read and write
20EC11AD000
heap
page read and write
21DA3D9B000
heap
page read and write
4BB507B000
stack
page read and write
21DA3E8E000
heap
page read and write
20EC38E4000
heap
page read and write
21DA3E5D000
heap
page read and write
21DA3E88000
heap
page read and write
21DA82B2000
trusted library allocation
page read and write
20EC1137000
heap
page read and write
20EC0BE5000
heap
page read and write
20EC1172000
heap
page read and write
21DA3D9A000
heap
page read and write
20EBF19C000
heap
page read and write
20EC11E4000
heap
page read and write
20EC11CA000
heap
page read and write
21DA1D64000
heap
page read and write
21DA3F04000
heap
page read and write
21DA1D52000
heap
page read and write
21DA3EFA000
heap
page read and write
21DA3E84000
heap
page read and write
21DA3D79000
heap
page read and write
4BB4C7E000
stack
page read and write
21DA3D79000
heap
page read and write
20EC116D000
heap
page read and write
21DA3EA1000
heap
page read and write
21DA3D97000
heap
page read and write
21DA3D7F000
heap
page read and write
21DA3D9B000
heap
page read and write
20EC11B3000
heap
page read and write
21DA3D88000
heap
page read and write
21DA3D81000
heap
page read and write
21DA3D66000
heap
page read and write
20EC11C5000
heap
page read and write
21DA3D82000
heap
page read and write
20EC10F2000
heap
page read and write
20EC11E1000
heap
page read and write
21DA3D81000
heap
page read and write
20EC114E000
heap
page read and write
21DA3D92000
heap
page read and write
21DA6552000
heap
page read and write
21DA3E60000
heap
page read and write
21DA3D8D000
heap
page read and write
21DA655A000
heap
page read and write
20EC11D3000
heap
page read and write
1FDFAFE000
stack
page read and write
2E9723B0000
heap
page read and write
21DA3D81000
heap
page read and write
21DA3D81000
heap
page read and write
21DA3D7D000
heap
page read and write
21DA3D5F000
heap
page read and write
9647C7B000
stack
page read and write
21DA3D6D000
heap
page read and write
21DA1D4F000
heap
page read and write
20EC38EB000
heap
page read and write
20EC11C1000
heap
page read and write
4BB48A7000
stack
page read and write
21DA3EAA000
heap
page read and write
20EBF15F000
heap
page read and write
21DA3D92000
heap
page read and write
21DA6548000
heap
page read and write
21DA3D8B000
heap
page read and write
21DA1CB9000
heap
page read and write
20EBF15C000
heap
page read and write
20EC11BC000
heap
page read and write
21DA3D9A000
heap
page read and write
21DA1D55000
heap
page read and write
21DA3D92000
heap
page read and write
20EC11CA000
heap
page read and write
21DA3DB7000
heap
page read and write
20EC11B3000
heap
page read and write
21DA3D81000
heap
page read and write
21DA3E7F000
heap
page read and write
20EC32D0000
trusted library allocation
page read and write
4BB4D7D000
stack
page read and write
20EC1144000
heap
page read and write
21DA3D67000
heap
page read and write
21DA3D75000
heap
page read and write
9647B7E000
stack
page read and write
1D935510000
heap
page read and write
21DA1D53000
heap
page read and write
21DA3D9B000
heap
page read and write
21DA3E8E000
heap
page read and write
20EBF16F000
heap
page read and write
21DA3D79000
heap
page read and write
1D93741A000
heap
page read and write
20EC1109000
heap
page read and write
20EC11D3000
heap
page read and write
21DA3D81000
heap
page read and write
20EC11AD000
heap
page read and write
20EC11C1000
heap
page read and write
20EC38F9000
heap
page read and write
9647AFE000
stack
page read and write
20EC11BC000
heap
page read and write
20EC0BED000
heap
page read and write
20EC116B000
heap
page read and write
21DA3D9B000
heap
page read and write
20EBF15D000
heap
page read and write
20EC11E0000
heap
page read and write
20EBF193000
heap
page read and write
20EC11BD000
heap
page read and write
20EC38E3000
heap
page read and write
21DA3DA3000
heap
page read and write
21DA3D81000
heap
page read and write
21DA1D7A000
heap
page read and write
21DA3DA2000
heap
page read and write
21DA3F0D000
heap
page read and write
21DA3E81000
heap
page read and write
20EBF17A000
heap
page read and write
20EC11E4000
heap
page read and write
21DA3DB0000
heap
page read and write
21DA3D9E000
heap
page read and write
20EC11CE000
heap
page read and write
21DA3E7A000
heap
page read and write
20EBF178000
heap
page read and write
20EC11CA000
heap
page read and write
There are 771 hidden memdumps, click here to show them.