IOC Report
HLZwUhcJ28.exe

loading gif

Files

File Path
Type
Category
Malicious
HLZwUhcJ28.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay\Qt5GuiVBox.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay\Qt5SqlVBox.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay\Security-Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay\VBoxClient-x86.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay\VBoxProxyStub-x86.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay\cygwin1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay\libiconv-2.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay\libidn2-0.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay\libintl-8.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay\qsqlite.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay\liblibimhex.dll.a
current ar archive
dropped
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay\liblibpl.dll.a
current ar archive
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\HLZwUhcJ28.exe
"C:\Users\user\Desktop\HLZwUhcJ28.exe"
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay.exe
"C:\Users\user\AppData\Local\Temp\RarSFX0\Imperial_Delay.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
malicious

URLs

Name
IP
Malicious
wrigglesight.sbs
malicious
heroicmint.sbs
malicious
ferrycheatyk.sbs
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
deepymouthi.sbs
malicious
sidercotay.sbs
malicious
https://villagedguy.cyou/api
104.21.32.196
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://player.vimeo.com
unknown
https://duckduckgo.com/ac/?q=
unknown
https://villagedguy.cyou/apibu0
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
https://github.com/golang/protobuf/issues/1609):
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalContent.js?v=UuGFpt56D9L4&l=
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=engli
unknown
https://github.com/zitadel/zitadel/blob/new-eventstore/cmd/zitadel/startup.yaml.
unknown
https://community.cloudflare.steamstatic.com/public/javascript/promo/stickers.js?v=GfA42_x2_aub&
unknown
https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpE
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://villagedguy.cyou/apibu
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://villagedguy.cyou:443/api
unknown
https://villagedguy.cyou/
unknown
https://www.gnu.org/gethelp/
unknown
https://s.ytimg.com;
unknown
https://community.cloudflare.steamstatic.com/public/javascript/webui/clientcom.js?v=I6RUPT-G-voT&amp
unknown
https://steam.tv/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67&
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.gnu.org/software/libidn/#libidn2
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://community.cloudflare.steamstatic.com/public/css/promo/summer2017/stickers.css?v=bZKSp7oNwVPK
unknown
https://community.cloudflare.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&amp
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1&
unknown
https://sketchfab.com
unknown
https://www.ecosia.org/newtab/
unknown
https://lv.queniujq.cn
unknown
http://www.color.org)
unknown
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.youtube.com/
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://villagedguy.cyou/api~Vl
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://support.microsof
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://gnu.org/licenses/gpl.html
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
https://www.gnu.org/software/libidn/#libidn2Libidn2General
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://store.steampowered.com/;
unknown
https://community.cloudflare.steamstatic.com/public/javascript/profile.js?v=KkhJqW2NGKiM&l=engli
unknown
https://store.steampowered.com/about/
unknown
https://community.cloudflare.steamstatic.com/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC&
unknown
https://villagedguy.cyou/api0
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://www.gnu.org/gethelp/exebatcmdcom
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=ljhW-PbGuX
unknown
https://recaptcha.net/recaptcha/;
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=bOP7RorZq4_W&l=englis
unknown
https://medal.tv
unknown
https://api.zitadel.ch/assets/v1/avatar-32432jkh4kj32
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0&amp
unknown
https://villagedguy.cyou/apiO
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=xYs7
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://villagedguy.cyou/apiob
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://www.virtualbox.org/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
villagedguy.cyou
104.21.32.196
malicious
wrigglesight.sbs
unknown
malicious
ferrycheatyk.sbs
unknown
malicious
deepymouthi.sbs
unknown
malicious
monstourtu.sbs
unknown
malicious
captaitwik.sbs
unknown
malicious
snailyeductyi.sbs
unknown
malicious
heroicmint.sbs
unknown
malicious
sidercotay.sbs
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious
104.21.32.196
villagedguy.cyou
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
A8E0000
direct allocation
page read and write
malicious
1EE86CD0000
heap
page read and write
504B000
trusted library allocation
page read and write
1C0000
heap
page read and write
1968000
unkown
page write copy
507E000
trusted library allocation
page read and write
5052000
trusted library allocation
page read and write
2D44000
heap
page read and write
A33F000
stack
page read and write
4810000
heap
page read and write
1EE82D13000
heap
page read and write
2D31000
heap
page read and write
5040000
trusted library allocation
page read and write
2D16000
heap
page read and write
1EE83000000
heap
page read and write
5F0000
heap
page read and write
2D31000
heap
page read and write
A886000
direct allocation
page read and write
2C58000
heap
page read and write
2D1F000
heap
page read and write
7FF70ECD1000
unkown
page execute read
2C50000
heap
page read and write
2C7E000
heap
page read and write
50D4000
trusted library allocation
page read and write
2D49000
heap
page read and write
5034000
trusted library allocation
page read and write
5FE000
heap
page read and write
2D3C000
heap
page read and write
1EE82DB7000
heap
page read and write
13C000
stack
page read and write
503E000
trusted library allocation
page read and write
5144000
trusted library allocation
page read and write
505F000
trusted library allocation
page read and write
2D2C000
heap
page read and write
508F000
trusted library allocation
page read and write
503A000
trusted library allocation
page read and write
2D2C000
heap
page read and write
1BF0000
heap
page read and write
2D2C000
heap
page read and write
A68C000
direct allocation
page read and write
1EE82CE0000
heap
page read and write
A340000
direct allocation
page read and write
507B000
trusted library allocation
page read and write
503F000
trusted library allocation
page read and write
A690000
direct allocation
page read and write
2D28000
heap
page read and write
505A000
trusted library allocation
page read and write
2D44000
heap
page read and write
5043000
trusted library allocation
page read and write
5089000
trusted library allocation
page read and write
5043000
trusted library allocation
page read and write
1166000
unkown
page readonly
2D19000
heap
page read and write
2D48000
heap
page read and write
5052000
trusted library allocation
page read and write
507B000
trusted library allocation
page read and write
19D1000
unkown
page read and write
2D4E000
heap
page read and write
507C000
trusted library allocation
page read and write
505A000
trusted library allocation
page read and write
1EE82F51000
trusted library allocation
page read and write
2D2C000
heap
page read and write
5051000
trusted library allocation
page read and write
5043000
trusted library allocation
page read and write
2D2C000
heap
page read and write
2D0F000
heap
page read and write
A6AC000
direct allocation
page read and write
5084000
trusted library allocation
page read and write
196A000
unkown
page read and write
2D3D000
heap
page read and write
5083000
trusted library allocation
page read and write
2D4C000
heap
page read and write
2D3C000
heap
page read and write
1EE82D4B000
heap
page read and write
2D31000
heap
page read and write
5054000
trusted library allocation
page read and write
7FF70ED3C000
unkown
page readonly
13F3000
unkown
page readonly
19F1000
unkown
page read and write
2CFE000
heap
page read and write
A44D000
direct allocation
page read and write
2D49000
heap
page read and write
1BE0000
direct allocation
page read and write
5052000
trusted library allocation
page read and write
2D0F000
heap
page read and write
1C20000
direct allocation
page read and write
A53A000
direct allocation
page read and write
50A4000
trusted library allocation
page read and write
2D47000
heap
page read and write
2CF9000
heap
page read and write
7FF70ED3C000
unkown
page readonly
1EE82D2A000
heap
page read and write
2D29000
heap
page read and write
1968000
unkown
page write copy
2D31000
heap
page read and write
2CBC000
heap
page read and write
2D1E000
heap
page read and write
2D44000
heap
page read and write
4800000
remote allocation
page read and write
504B000
trusted library allocation
page read and write
507B000
trusted library allocation
page read and write
503F000
trusted library allocation
page read and write
1A7C000
direct allocation
page read and write
84D83FE000
stack
page read and write
506D000
trusted library allocation
page read and write
2D2B000
heap
page read and write
A484000
direct allocation
page read and write
2CAD000
heap
page read and write
509A000
trusted library allocation
page read and write
2D49000
heap
page read and write
A5FA000
direct allocation
page read and write
2D1C000
heap
page read and write
5044000
trusted library allocation
page read and write
19C6000
unkown
page write copy
5031000
trusted library allocation
page read and write
2AE7000
heap
page read and write
2D45000
heap
page read and write
2D45000
heap
page read and write
2D2C000
heap
page read and write
507E000
trusted library allocation
page read and write
A42C000
direct allocation
page read and write
2CF3000
heap
page read and write
A5F2000
direct allocation
page read and write
84D7EFE000
stack
page read and write
2D44000
heap
page read and write
5043000
trusted library allocation
page read and write
1EE82D4B000
heap
page read and write
2D44000
heap
page read and write
84D7BCB000
stack
page read and write
506C000
trusted library allocation
page read and write
1EE82ED0000
heap
page read and write
5092000
trusted library allocation
page read and write
1EE82D4B000
heap
page read and write
2D0B000
heap
page read and write
5052000
trusted library allocation
page read and write
2D0F000
heap
page read and write
5063000
trusted library allocation
page read and write
2D0B000
heap
page read and write
5040000
trusted library allocation
page read and write
5063000
trusted library allocation
page read and write
5069000
trusted library allocation
page read and write
1EE82CC0000
heap
page read and write
2D31000
heap
page read and write
5040000
trusted library allocation
page read and write
2A6FF000
stack
page read and write
2D3C000
heap
page read and write
2D0F000
heap
page read and write
7FF70ED0B000
unkown
page readonly
1EE82DB8000
heap
page read and write
2D0A000
heap
page read and write
1A70000
direct allocation
page read and write
50A3000
trusted library allocation
page read and write
2D29000
heap
page read and write
504A000
trusted library allocation
page read and write
2D4E000
heap
page read and write
5063000
trusted library allocation
page read and write
505C000
trusted library allocation
page read and write
A57E000
direct allocation
page read and write
A67E000
direct allocation
page read and write
520D000
trusted library allocation
page read and write
1EE82D5C000
heap
page read and write
45C000
remote allocation
page execute and read and write
507C000
trusted library allocation
page read and write
5063000
trusted library allocation
page read and write
5052000
trusted library allocation
page read and write
2D3C000
heap
page read and write
1EE82D58000
heap
page read and write
2D0A000
heap
page read and write
5053000
trusted library allocation
page read and write
508A000
trusted library allocation
page read and write
506C000
trusted library allocation
page read and write
526E000
stack
page read and write
2D4E000
heap
page read and write
521D000
trusted library allocation
page read and write
507D000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
5052000
trusted library allocation
page read and write
A52C000
direct allocation
page read and write
196E000
unkown
page write copy
5044000
trusted library allocation
page read and write
2CFE000
heap
page read and write
2D0F000
heap
page read and write
A570000
direct allocation
page read and write
1B5000
heap
page read and write
2D2B000
heap
page read and write
A66E000
direct allocation
page read and write
5052000
trusted library allocation
page read and write
2D0F000
heap
page read and write
A68E000
direct allocation
page read and write
A5BE000
direct allocation
page read and write
507B000
trusted library allocation
page read and write
2D1D000
heap
page read and write
508C000
trusted library allocation
page read and write
1C0E000
direct allocation
page read and write
5043000
trusted library allocation
page read and write
503A000
trusted library allocation
page read and write
A347000
direct allocation
page read and write
2D4C000
heap
page read and write
19FB000
unkown
page write copy
5079000
trusted library allocation
page read and write
5090000
trusted library allocation
page read and write
19F8000
unkown
page read and write
7FF70ECD0000
unkown
page readonly
5063000
trusted library allocation
page read and write
19C2000
unkown
page write copy
2D3C000
heap
page read and write
5078000
trusted library allocation
page read and write
1EE82D4B000
heap
page read and write
4F4F000
stack
page read and write
A5CC000
direct allocation
page read and write
A632000
direct allocation
page read and write
4800000
remote allocation
page read and write
2D44000
heap
page read and write
2CFE000
heap
page read and write
2D2C000
heap
page read and write
508E000
trusted library allocation
page read and write
A6AA000
direct allocation
page read and write
5043000
trusted library allocation
page read and write
2D4E000
heap
page read and write
507E000
trusted library allocation
page read and write
A482000
direct allocation
page read and write
A50E000
direct allocation
page read and write
5073000
trusted library allocation
page read and write
84D84FB000
stack
page read and write
A684000
direct allocation
page read and write
19FC000
unkown
page readonly
2D3C000
heap
page read and write
2D0F000
heap
page read and write
7FF70ED1D000
unkown
page write copy
7FF70ECD1000
unkown
page execute read
A51E000
direct allocation
page read and write
2D16000
heap
page read and write
2D45000
heap
page read and write
1EE82D4E000
heap
page read and write
1A65000
unkown
page readonly
2A50000
heap
page read and write
5043000
trusted library allocation
page read and write
5063000
trusted library allocation
page read and write
A604000
direct allocation
page read and write
2CFE000
heap
page read and write
495C000
stack
page read and write
5072000
trusted library allocation
page read and write
A45E000
direct allocation
page read and write
5036000
trusted library allocation
page read and write
2D1E000
heap
page read and write
507C000
trusted library allocation
page read and write
1A65000
unkown
page readonly
5195000
trusted library allocation
page read and write
5063000
trusted library allocation
page read and write
50A4000
trusted library allocation
page read and write
A524000
direct allocation
page read and write
A8E0000
direct allocation
page read and write
2AE0000
heap
page read and write
503F000
trusted library allocation
page read and write
2A7FF000
stack
page read and write
A35D000
direct allocation
page read and write
A664000
direct allocation
page read and write
2D0D000
heap
page read and write
2D0C000
heap
page read and write
7FF70ED40000
unkown
page readonly
503C000
trusted library allocation
page read and write
5079000
trusted library allocation
page read and write
2D2B000
heap
page read and write
2D1C000
heap
page read and write
5063000
trusted library allocation
page read and write
A400000
direct allocation
page read and write
4DEE000
stack
page read and write
2D31000
heap
page read and write
A544000
direct allocation
page read and write
5077000
trusted library allocation
page read and write
2D33000
heap
page read and write
505D000
trusted library allocation
page read and write
505A000
trusted library allocation
page read and write
1A0000
heap
page read and write
5063000
trusted library allocation
page read and write
1C42000
direct allocation
page read and write
A5C8000
direct allocation
page read and write
2D31000
heap
page read and write
2D0F000
heap
page read and write
2D4B000
heap
page read and write
52AD000
trusted library allocation
page read and write
4FAE000
stack
page read and write
1EE82D2E000
heap
page read and write
2BE0000
heap
page read and write
1EE82D1D000
heap
page read and write
2C3D000
stack
page read and write
503F000
trusted library allocation
page read and write
507A000
trusted library allocation
page read and write
1EE82CF8000
heap
page read and write
504A000
trusted library allocation
page read and write
5052000
trusted library allocation
page read and write
A668000
direct allocation
page read and write
1EE82CF8000
heap
page read and write
A7D8000
direct allocation
page read and write
508C000
trusted library allocation
page read and write
2D0B000
heap
page read and write
5060000
trusted library allocation
page read and write
507C000
trusted library allocation
page read and write
A472000
direct allocation
page read and write
5097000
trusted library allocation
page read and write
2A9E000
stack
page read and write
2D0F000
heap
page read and write
A6B0000
direct allocation
page read and write
5052000
trusted library allocation
page read and write
1EE82D46000
heap
page read and write
1970000
unkown
page write copy
1C08000
direct allocation
page read and write
2D31000
heap
page read and write
A504000
direct allocation
page read and write
2D3C000
heap
page read and write
2D4E000
heap
page read and write
A977000
direct allocation
page read and write
507A000
trusted library allocation
page read and write
507E000
trusted library allocation
page read and write
1973000
unkown
page read and write
A4E4000
direct allocation
page read and write
A682000
direct allocation
page read and write
7FF70ECD0000
unkown
page readonly
505C000
trusted library allocation
page read and write
50A1000
trusted library allocation
page read and write
2E4F000
stack
page read and write
5040000
trusted library allocation
page read and write
2D3C000
heap
page read and write
505A000
trusted library allocation
page read and write
504B000
trusted library allocation
page read and write
1EE82D16000
heap
page read and write
2BC0000
heap
page read and write
5052000
trusted library allocation
page read and write
5000000
heap
page read and write
A65E000
direct allocation
page read and write
1EE83005000
heap
page read and write
507B000
trusted library allocation
page read and write
2D0F000
heap
page read and write
2D48000
heap
page read and write
2D45000
heap
page read and write
1EE864D0000
trusted library allocation
page read and write
196F000
unkown
page read and write
2D48000
heap
page read and write
503F000
trusted library allocation
page read and write
A576000
direct allocation
page read and write
1EE82D2E000
heap
page read and write
5095000
trusted library allocation
page read and write
A6C4000
direct allocation
page read and write
5036000
trusted library allocation
page read and write
19FB000
unkown
page write copy
A4E2000
direct allocation
page read and write
A646000
direct allocation
page read and write
5066000
trusted library allocation
page read and write
19C0000
unkown
page write copy
2D45000
heap
page read and write
5063000
trusted library allocation
page read and write
2D3C000
heap
page read and write
515D000
trusted library allocation
page read and write
2D3C000
heap
page read and write
2D1F000
heap
page read and write
1EE84C20000
heap
page read and write
19C1000
unkown
page read and write
5071000
trusted library allocation
page read and write
5061000
trusted library allocation
page read and write
5063000
trusted library allocation
page read and write
2D28000
heap
page read and write
5039000
trusted library allocation
page read and write
981000
unkown
page execute read
50CE000
trusted library allocation
page read and write
A4E0000
direct allocation
page read and write
507E000
trusted library allocation
page read and write
2D4E000
heap
page read and write
2D44000
heap
page read and write
2ADE000
stack
page read and write
505A000
trusted library allocation
page read and write
505A000
trusted library allocation
page read and write
2D4E000
heap
page read and write
5175000
trusted library allocation
page read and write
A52E000
direct allocation
page read and write
2D0A000
heap
page read and write
A566000
direct allocation
page read and write
A626000
direct allocation
page read and write
1EE82DB3000
heap
page read and write
2D29000
heap
page read and write
2D48000
heap
page read and write
47ED000
stack
page read and write
5051000
trusted library allocation
page read and write
5040000
trusted library allocation
page read and write
A568000
direct allocation
page read and write
2D4B000
heap
page read and write
505A000
trusted library allocation
page read and write
507D000
trusted library allocation
page read and write
1166000
unkown
page readonly
A644000
direct allocation
page read and write
505B000
trusted library allocation
page read and write
2D4E000
heap
page read and write
507C000
trusted library allocation
page read and write
A8F0000
direct allocation
page read and write
2D0B000
heap
page read and write
4CED000
stack
page read and write
5053000
trusted library allocation
page read and write
5043000
trusted library allocation
page read and write
A624000
direct allocation
page read and write
A438000
direct allocation
page read and write
A488000
direct allocation
page read and write
A442000
direct allocation
page read and write
86E000
stack
page read and write
1EE84D60000
heap
page read and write
2D0F000
heap
page read and write
84D7BD6000
stack
page read and write
2D31000
heap
page read and write
2D4B000
heap
page read and write
509D000
trusted library allocation
page read and write
970000
direct allocation
page read and write
5031000
trusted library allocation
page read and write
A67C000
direct allocation
page read and write
A514000
direct allocation
page read and write
A454000
direct allocation
page read and write
A5CA000
direct allocation
page read and write
1EE82EB0000
heap
page read and write
51E5000
trusted library allocation
page read and write
1EE82D31000
heap
page read and write
2D26000
heap
page read and write
2CFE000
heap
page read and write
2D44000
heap
page read and write
A550000
direct allocation
page read and write
A69C000
direct allocation
page read and write
2D3C000
heap
page read and write
2C9A000
heap
page read and write
2D0F000
heap
page read and write
5053000
trusted library allocation
page read and write
19FC000
unkown
page readonly
5047000
trusted library allocation
page read and write
A345000
direct allocation
page read and write
50CC000
trusted library allocation
page read and write
503A000
trusted library allocation
page read and write
505A000
trusted library allocation
page read and write
4FD000
stack
page read and write
1EE82D2E000
heap
page read and write
2D2C000
heap
page read and write
5031000
trusted library allocation
page read and write
84D82FE000
stack
page read and write
A592000
direct allocation
page read and write
1A78000
direct allocation
page read and write
2D0B000
heap
page read and write
A878000
direct allocation
page read and write
2D29000
heap
page read and write
2D4C000
heap
page read and write
2D44000
heap
page read and write
A5EF000
direct allocation
page read and write
503F000
trusted library allocation
page read and write
2C93000
heap
page read and write
1EE82DB4000
heap
page read and write
1EE82CE8000
heap
page read and write
5047000
trusted library allocation
page read and write
5040000
trusted library allocation
page read and write
5052000
trusted library allocation
page read and write
5053000
trusted library allocation
page read and write
7FF70ED0B000
unkown
page readonly
536F000
stack
page read and write
A506000
direct allocation
page read and write
485D000
stack
page read and write
2D29000
heap
page read and write
400000
remote allocation
page execute and read and write
1EE82DB8000
heap
page read and write
1EE82DB1000
heap
page read and write
5053000
trusted library allocation
page read and write
5052000
trusted library allocation
page read and write
A73A000
direct allocation
page read and write
2A5FF000
stack
page read and write
2D4C000
heap
page read and write
13F3000
unkown
page readonly
4E4E000
stack
page read and write
5063000
trusted library allocation
page read and write
5053000
trusted library allocation
page read and write
2D0F000
heap
page read and write
5131000
heap
page read and write
2D10000
heap
page read and write
2A4FF000
stack
page read and write
A888000
direct allocation
page read and write
A5D0000
direct allocation
page read and write
4800000
remote allocation
page read and write
2CBA000
heap
page read and write
1EE82FB0000
heap
page read and write
5095000
trusted library allocation
page read and write
5073000
trusted library allocation
page read and write
5066000
trusted library allocation
page read and write
1EE86CD2000
heap
page read and write
2D0B000
heap
page read and write
2D19000
heap
page read and write
4FEF000
stack
page read and write
2AE6000
heap
page read and write
980000
unkown
page readonly
5052000
trusted library allocation
page read and write
2CFE000
heap
page read and write
5063000
trusted library allocation
page read and write
82E000
stack
page read and write
1EE82F6A000
trusted library allocation
page read and write
981000
unkown
page execute read
A6C6000
direct allocation
page read and write
507E000
trusted library allocation
page read and write
1AFD000
stack
page read and write
1EE82D16000
heap
page read and write
5082000
trusted library allocation
page read and write
1EE82CD0000
heap
page readonly
2D02000
heap
page read and write
27AB000
stack
page read and write
5052000
trusted library allocation
page read and write
5063000
trusted library allocation
page read and write
5040000
trusted library allocation
page read and write
A692000
direct allocation
page read and write
2D4B000
heap
page read and write
5051000
trusted library allocation
page read and write
504F000
trusted library allocation
page read and write
7FF70ED3F000
unkown
page write copy
503A000
trusted library allocation
page read and write
506D000
trusted library allocation
page read and write
1AB0000
direct allocation
page read and write
2D12000
heap
page read and write
5047000
trusted library allocation
page read and write
2D49000
heap
page read and write
1EE82D2E000
heap
page read and write
2D3C000
heap
page read and write
5FA000
heap
page read and write
5040000
trusted library allocation
page read and write
A638000
direct allocation
page read and write
507C000
trusted library allocation
page read and write
2D0A000
heap
page read and write
504A000
trusted library allocation
page read and write
2D44000
heap
page read and write
5092000
trusted library allocation
page read and write
2D2C000
heap
page read and write
1EE82D2A000
heap
page read and write
A508000
direct allocation
page read and write
2D13000
heap
page read and write
5043000
trusted library allocation
page read and write
508F000
trusted library allocation
page read and write
A51A000
direct allocation
page read and write
5130000
heap
page read and write
5052000
trusted library allocation
page read and write
980000
unkown
page readonly
2D3C000
heap
page read and write
A888000
direct allocation
page read and write
A680000
direct allocation
page read and write
2D3C000
heap
page read and write
2D44000
heap
page read and write
A56A000
direct allocation
page read and write
A42E000
direct allocation
page read and write
A694000
direct allocation
page read and write
2D2C000
heap
page read and write
5061000
trusted library allocation
page read and write
513E000
trusted library allocation
page read and write
1EE84C24000
heap
page read and write
A66C000
direct allocation
page read and write
5043000
trusted library allocation
page read and write
2D12000
heap
page read and write
505B000
trusted library allocation
page read and write
A5B6000
direct allocation
page read and write
5063000
trusted library allocation
page read and write
505E000
trusted library allocation
page read and write
27EB000
stack
page read and write
5051000
trusted library allocation
page read and write
2D4C000
heap
page read and write
50AE000
trusted library allocation
page read and write
5089000
trusted library allocation
page read and write
A51C000
direct allocation
page read and write
2C6D000
heap
page read and write
5215000
trusted library allocation
page read and write
A700000
direct allocation
page read and write
2D28000
heap
page read and write
509A000
trusted library allocation
page read and write
508C000
trusted library allocation
page read and write
505B000
trusted library allocation
page read and write
2CBA000
heap
page read and write
A554000
direct allocation
page read and write
1EE84D70000
trusted library allocation
page read and write
505A000
trusted library allocation
page read and write
2CBC000
heap
page read and write
A522000
direct allocation
page read and write
507A000
trusted library allocation
page read and write
2D0B000
heap
page read and write
19B4000
unkown
page read and write
5031000
trusted library allocation
page read and write
5066000
trusted library allocation
page read and write
84D7FFE000
stack
page read and write
5043000
trusted library allocation
page read and write
2D1D000
heap
page read and write
A420000
direct allocation
page read and write
84D81FD000
stack
page read and write
2D4B000
heap
page read and write
506C000
trusted library allocation
page read and write
A500000
direct allocation
page read and write
5052000
trusted library allocation
page read and write
2D44000
heap
page read and write
508C000
trusted library allocation
page read and write
A47E000
direct allocation
page read and write
5032000
trusted library allocation
page read and write
505A000
trusted library allocation
page read and write
2D44000
heap
page read and write
1B3D000
stack
page read and write
5038000
trusted library allocation
page read and write
2D45000
heap
page read and write
A602000
direct allocation
page read and write
72E000
stack
page read and write
5069000
trusted library allocation
page read and write
A3BD000
stack
page read and write
5063000
trusted library allocation
page read and write
1B7D000
stack
page read and write
5031000
trusted library allocation
page read and write
7FF70ED1D000
unkown
page read and write
A5AE000
direct allocation
page read and write
2D19000
heap
page read and write
2D2B000
heap
page read and write
50B4000
trusted library allocation
page read and write
5048000
trusted library allocation
page read and write
2D0A000
heap
page read and write
5065000
trusted library allocation
page read and write
504A000
trusted library allocation
page read and write
508A000
trusted library allocation
page read and write
1EE82D56000
heap
page read and write
508C000
trusted library allocation
page read and write
2D3C000
heap
page read and write
1EE82DAF000
heap
page read and write
1EE82D1C000
heap
page read and write
19C8000
unkown
page read and write
503F000
trusted library allocation
page read and write
2D3C000
heap
page read and write
1B0000
heap
page read and write
A520000
direct allocation
page read and write
A5C4000
direct allocation
page read and write
5039000
trusted library allocation
page read and write
2D0D000
heap
page read and write
A5D2000
direct allocation
page read and write
2D0B000
heap
page read and write
5096000
trusted library allocation
page read and write
2D0F000
heap
page read and write
19C3000
unkown
page read and write
96F000
stack
page read and write
2F4F000
stack
page read and write
1C00000
direct allocation
page read and write
2D4B000
heap
page read and write
A650000
direct allocation
page read and write
A69A000
direct allocation
page read and write
2D31000
heap
page read and write
5038000
trusted library allocation
page read and write
5073000
trusted library allocation
page read and write
5043000
trusted library allocation
page read and write
2CBC000
heap
page read and write
1EE82DB8000
heap
page read and write
1EE82D4E000
heap
page read and write
2D4B000
heap
page read and write
5048000
trusted library allocation
page read and write
5043000
trusted library allocation
page read and write
5030000
trusted library allocation
page read and write
508C000
trusted library allocation
page read and write
2CC0000
heap
page read and write
2D0A000
heap
page read and write
5063000
trusted library allocation
page read and write
A977000
direct allocation
page read and write
2D4C000
heap
page read and write
507E000
trusted library allocation
page read and write
5043000
trusted library allocation
page read and write
A5B4000
direct allocation
page read and write
5069000
trusted library allocation
page read and write
7FF70ED26000
unkown
page read and write
A658000
direct allocation
page read and write
1BBD000
stack
page read and write
1EE82D26000
heap
page read and write
2D2C000
heap
page read and write
1974000
unkown
page write copy
1BC0000
heap
page read and write
A69E000
direct allocation
page read and write
2D4E000
heap
page read and write
2D15000
heap
page read and write
There are 659 hidden memdumps, click here to show them.