IOC Report
axltools.exe

loading gif

Files

File Path
Type
Category
Malicious
axltools.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\pdk-user\06d5b1ac5da862cdbb0b3ac695f3453c\LibXML.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\pdk-user\1abd50a1c2ab4a3ff0345cde2d55afba\Socket.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\pdk-user\27ea229280968204d59354ee0a6341a7\DES.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\pdk-user\500883b23a63199dc2829fdbc8348f21\POSIX.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\pdk-user\53072790dde17440c4012890afb43815\Storable.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\pdk-user\596571347931e8153c5521d6812d9e81\HiRes.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\pdk-user\5ffaccc40de6d509ec33dff1fea9026c\Expat.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\pdk-user\72c787717c09ab77d76b10d4ff014126\Encode.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\pdk-user\79e6d4a9f909690faec53f6e463896e8\IO.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\pdk-user\a9f68920f6ea43580143946a0633ee0a\Util.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\pdk-user\acbada12c63ba66ffc285eb2359b75e8\encoding.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\pdk-user\b3ae4e9cf03fb0d5a98dfc18ef69a34b\Fcntl.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\pdk-user\ba85e8995e0035a5652e7d02ad624f50\re.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\pdk-user\c81ac6c36772666ca1e702e01dde5e9b\SSLeay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\pdk-user\d2bcc46d29a882b1323ba2455a4cf8f1\perl516.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\pdk-user\d39c15784bafcd23e55c5a0271f988ac\MD5.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\pdk-user\de07dcca160c9bd3b1faa05ac3c78ea8\Dumper.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\pdk-user\f16e1f679da123c81245279f1a139748\Parser.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\pdk-user\f522a0e96a8361deca2c563f29dc9a24\Base64.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\axltools.exe
"C:\Users\user\Desktop\axltools.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://x.x.x.x:8080/ccmpd/login.do
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://nils.toedtmann.net/pub/subjectAltName.txt
unknown
http://schemas.cisco.com/ast/soap/
unknown
https://developer.cisco.com/web/sxml/forums/-//message_boards/view_message/1173717
unknown
http://www.cisco.com/AXL/API/$axl_version
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://www.openssl.org/docs/apps/ciphers.html#CIPHER_STRINGS
unknown
http://www.msftncsi.com/ncsi.txt
unknown
http://www.openssl.org/support/faq.html
unknown
http://www.modssl.org/docs/2.8/ssl_faq.html#ToC24
unknown
https://developer.cisco.com/site/axl/documents/axl-developer-guide-v11-5/#115changes
unknown
http://schemas.cisco.com/ast/soap/encodedTypes
unknown
http://www.openssl.org/support/faq.html....................
unknown
http://rt.cpan.org/Ticket/Display.html?id=39550
unknown
http://www.suck.com/
unknown
https://discdungeon.cdw.com/apps/dbtables/cucm_14.0.1/type_data/typeproduct.txt
unknown
http://www.ActiveState.com(
unknown
https://rt.cpan.org/Ticket/Display.html?id=58024
unknown
http://www.tldp.org/HOWTO/SSL-Certificates-HOWTO/
unknown
http://github.com/madsen/HTML-Tree
unknown
http://relaxng.org/ns/structure/1.0
unknown
http://schemas.cisco.com/ast/soap/action/#RisPort#SelectCmDevice
unknown
http://www.cisco.com/en/US/docs/voice_ip_comm/cucm/devguide/8_6_1/axlmatrix.html
unknown
http://www.ActiveState.com
unknown
http://www.cisco.com/AXL/API/
unknown
http://www.perl.com/
unknown
http://www.perl.org/
unknown
There are 18 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
72E6000
heap
page read and write
19F3000
heap
page read and write
1E0000
heap
page read and write
6040000
heap
page read and write
1AD0000
heap
page read and write
635E000
heap
page read and write
40F000
unkown
page read and write
6680000
heap
page read and write
62DB000
heap
page read and write
61B0000
heap
page read and write
605F000
heap
page read and write
5E39000
heap
page read and write
610E000
heap
page read and write
697F000
heap
page read and write
65B2000
heap
page read and write
1A0E000
heap
page read and write
6112000
heap
page read and write
62FA000
heap
page read and write
6022000
heap
page read and write
5E25000
heap
page read and write
5E67000
heap
page read and write
5E2B000
heap
page read and write
6734000
heap
page read and write
5F70000
heap
page read and write
7442000
unkown
page read and write
6ABB000
heap
page read and write
66A1000
heap
page read and write
6722000
heap
page read and write
7449000
unkown
page read and write
5EEA000
heap
page read and write
5FBF000
heap
page read and write
73EE000
heap
page read and write
608A000
heap
page read and write
74D7000
heap
page read and write
6616000
heap
page read and write
60A6000
heap
page read and write
62E3000
heap
page read and write
6439000
heap
page read and write
70A0000
trusted library allocation
page read and write
657D000
heap
page read and write
656D000
heap
page read and write
67AE000
heap
page read and write
638E000
heap
page read and write
65FC000
heap
page read and write
5F80000
heap
page read and write
61D6000
heap
page read and write
81DB000
heap
page read and write
6077000
heap
page read and write
623F000
heap
page read and write
622E000
heap
page read and write
604C000
heap
page read and write
61CE000
heap
page read and write
604A000
heap
page read and write
6349000
heap
page read and write
5F80000
heap
page read and write
733A000
heap
page read and write
1A0B000
heap
page read and write
1ACF000
heap
page read and write
6121000
heap
page read and write
5E6F000
heap
page read and write
6586000
heap
page read and write
6314000
heap
page read and write
6366000
heap
page read and write
66A4000
heap
page read and write
69DE000
heap
page read and write
605F000
heap
page read and write
19BE000
stack
page read and write
6101000
heap
page read and write
6093000
heap
page read and write
6AAE000
heap
page read and write
1A22000
heap
page read and write
3BEF000
stack
page read and write
1F0000
heap
page read and write
6C96000
heap
page read and write
5FB8000
heap
page read and write
5EEA000
heap
page read and write
67FE000
heap
page read and write
619C000
heap
page read and write
5E3B000
heap
page read and write
69A7000
heap
page read and write
69A7000
heap
page read and write
1AD9000
heap
page read and write
6522000
heap
page read and write
6579000
heap
page read and write
6931000
heap
page read and write
5E56000
heap
page read and write
605E000
heap
page read and write
6979000
heap
page read and write
1AEA000
heap
page read and write
676D000
heap
page read and write
699B000
heap
page read and write
6120000
heap
page read and write
6121000
heap
page read and write
6587000
heap
page read and write
72D6000
heap
page read and write
7283000
heap
page read and write
6093000
heap
page read and write
636A000
heap
page read and write
62C1000
heap
page read and write
6906000
heap
page read and write
687B000
heap
page read and write
606B000
heap
page read and write
5FD0000
heap
page read and write
69F4000
heap
page read and write
6022000
heap
page read and write
61CE000
heap
page read and write
630F000
heap
page read and write
5FD6000
heap
page read and write
681D000
heap
page read and write
1AEE000
heap
page read and write
643F000
heap
page read and write
68E6000
heap
page read and write
62A2000
heap
page read and write
1A2C000
heap
page read and write
638E000
heap
page read and write
5FD7000
heap
page read and write
67DE000
heap
page read and write
1A12000
heap
page read and write
687B000
heap
page read and write
5F43000
heap
page read and write
60A6000
heap
page read and write
74AD000
heap
page read and write
19FA000
heap
page read and write
6024000
heap
page read and write
61E4000
heap
page read and write
620C000
heap
page read and write
69F6000
heap
page read and write
193C000
stack
page read and write
100000
heap
page read and write
5FD7000
heap
page read and write
6A19000
heap
page read and write
66A4000
heap
page read and write
6995000
heap
page read and write
6313000
heap
page read and write
5E6A000
heap
page read and write
5E44000
heap
page read and write
1A1D000
heap
page read and write
410000
unkown
page readonly
6308000
heap
page read and write
5F89000
heap
page read and write
400000
unkown
page readonly
6439000
heap
page read and write
1AE0000
heap
page read and write
62F3000
heap
page read and write
5FD1000
heap
page read and write
6F0B000
heap
page read and write
19D0000
heap
page read and write
72F7000
heap
page read and write
1AEC000
heap
page read and write
410000
unkown
page readonly
6078000
heap
page read and write
5EF4000
heap
page read and write
5E17000
heap
page read and write
7270000
unkown
page read and write
6034000
heap
page read and write
5F3C000
heap
page read and write
3D69000
heap
page read and write
7441000
heap
page read and write
62E2000
heap
page read and write
6876000
heap
page read and write
5E21000
heap
page read and write
62A2000
heap
page read and write
744A000
heap
page read and write
6111000
heap
page read and write
62DB000
heap
page read and write
62A2000
heap
page read and write
5E29000
heap
page read and write
6ADB000
heap
page read and write
7282000
heap
page read and write
19FC000
heap
page read and write
61CF000
heap
page read and write
60A7000
heap
page read and write
60F2000
heap
page read and write
19F4000
heap
page read and write
60A7000
heap
page read and write
6195000
heap
page read and write
5E53000
heap
page read and write
6587000
heap
page read and write
1A2F000
heap
page read and write
631C000
heap
page read and write
697F000
heap
page read and write
62FF000
heap
page read and write
1A1C000
heap
page read and write
1AA6000
heap
page read and write
6020000
heap
page read and write
5F59000
heap
page read and write
63E7000
heap
page read and write
61B1000
heap
page read and write
69B5000
heap
page read and write
6A9B000
heap
page read and write
61A6000
heap
page read and write
622C000
heap
page read and write
6123000
heap
page read and write
6995000
heap
page read and write
1F7000
heap
page read and write
5F53000
heap
page read and write
6995000
heap
page read and write
73EE000
heap
page read and write
6100000
heap
page read and write
6587000
heap
page read and write
6579000
heap
page read and write
6244000
heap
page read and write
7070000
trusted library allocation
page read and write
69B6000
heap
page read and write
5F3F000
heap
page read and write
699B000
heap
page read and write
5F3C000
heap
page read and write
3D67000
heap
page read and write
643C000
heap
page read and write
1A21000
heap
page read and write
6A9B000
heap
page read and write
62E2000
heap
page read and write
5F51000
heap
page read and write
401000
unkown
page execute read
614C000
heap
page read and write
6995000
heap
page read and write
6242000
heap
page read and write
61A6000
heap
page read and write
67AE000
heap
page read and write
5FD7000
heap
page read and write
5EE9000
heap
page read and write
601E000
heap
page read and write
660B000
heap
page read and write
5E2D000
heap
page read and write
69EB000
heap
page read and write
6ACD000
heap
page read and write
74BF000
unkown
page read and write
5E3F000
heap
page read and write
1AEA000
heap
page read and write
19F9000
heap
page read and write
73FF000
heap
page read and write
1A10000
heap
page read and write
604A000
heap
page read and write
6ABA000
heap
page read and write
5E47000
heap
page read and write
1F5000
heap
page read and write
61CD000
heap
page read and write
6A38000
heap
page read and write
5E44000
heap
page read and write
1AEA000
heap
page read and write
619C000
heap
page read and write
1AF0000
heap
page read and write
61BE000
heap
page read and write
6198000
heap
page read and write
6122000
heap
page read and write
607A000
heap
page read and write
7197000
trusted library allocation
page read and write
6115000
heap
page read and write
5E10000
heap
page read and write
1AEE000
heap
page read and write
5E48000
heap
page read and write
1A9F000
heap
page read and write
6A09000
heap
page read and write
5E37000
heap
page read and write
1AD3000
heap
page read and write
19FC000
heap
page read and write
5E3C000
heap
page read and write
659C000
heap
page read and write
630B000
heap
page read and write
69A7000
heap
page read and write
67FD000
heap
page read and write
73F0000
heap
page read and write
2BEF000
stack
page read and write
610E000
heap
page read and write
72D7000
heap
page read and write
6B90000
heap
page read and write
62DB000
heap
page read and write
3BFC000
heap
page read and write
6B43000
heap
page read and write
683F000
heap
page read and write
5F52000
heap
page read and write
60ED000
heap
page read and write
74AD000
unkown
page read and write
68A5000
heap
page read and write
6592000
heap
page read and write
6879000
heap
page read and write
5E39000
heap
page read and write
72C4000
heap
page read and write
66A4000
heap
page read and write
637F000
heap
page read and write
67FD000
heap
page read and write
6308000
heap
page read and write
6032000
heap
page read and write
608A000
heap
page read and write
6480000
heap
page read and write
5F34000
heap
page read and write
6195000
heap
page read and write
5E25000
heap
page read and write
6722000
heap
page read and write
61CE000
heap
page read and write
68E6000
heap
page read and write
197E000
stack
page read and write
40E000
unkown
page write copy
5FD8000
heap
page read and write
5F6C000
heap
page read and write
663F000
heap
page read and write
6B23000
heap
page read and write
1A3C000
heap
page read and write
65AD000
heap
page read and write
5FCF000
heap
page read and write
6480000
heap
page read and write
63F8000
heap
page read and write
1AFA000
heap
page read and write
6611000
heap
page read and write
6546000
heap
page read and write
6373000
heap
page read and write
5E56000
heap
page read and write
5E3C000
heap
page read and write
5E41000
heap
page read and write
6064000
heap
page read and write
6521000
heap
page read and write
5F34000
heap
page read and write
606B000
heap
page read and write
5F45000
heap
page read and write
69EB000
heap
page read and write
5FBA000
heap
page read and write
401000
unkown
page execute read
657C000
heap
page read and write
6154000
heap
page read and write
608A000
heap
page read and write
6B94000
heap
page read and write
61B1000
heap
page read and write
19F3000
heap
page read and write
6093000
heap
page read and write
6321000
heap
page read and write
6979000
heap
page read and write
5F68000
heap
page read and write
5E2B000
heap
page read and write
607B000
heap
page read and write
7449000
heap
page read and write
6111000
heap
page read and write
5F8C000
heap
page read and write
6680000
heap
page read and write
6093000
heap
page read and write
6B1E000
heap
page read and write
60FD000
heap
page read and write
5E6B000
heap
page read and write
400000
unkown
page readonly
6B1E000
heap
page read and write
660B000
heap
page read and write
631C000
heap
page read and write
725E000
heap
page read and write
6122000
heap
page read and write
606B000
heap
page read and write
5E1C000
heap
page read and write
5E42000
heap
page read and write
635E000
heap
page read and write
607A000
heap
page read and write
65F3000
heap
page read and write
687B000
heap
page read and write
6248000
heap
page read and write
5F53000
heap
page read and write
721D000
heap
page read and write
1AD9000
heap
page read and write
62F3000
heap
page read and write
6549000
heap
page read and write
7157000
trusted library allocation
page read and write
19FF000
heap
page read and write
5E42000
heap
page read and write
610D000
heap
page read and write
5E36000
heap
page read and write
6589000
heap
page read and write
6257000
heap
page read and write
7328000
heap
page read and write
6B85000
heap
page read and write
604A000
heap
page read and write
6735000
heap
page read and write
72C4000
heap
page read and write
699B000
heap
page read and write
63B0000
heap
page read and write
3D6E000
heap
page read and write
1A35000
heap
page read and write
5E39000
heap
page read and write
683F000
heap
page read and write
6195000
heap
page read and write
6722000
heap
page read and write
1ACA000
heap
page read and write
657D000
heap
page read and write
6B87000
heap
page read and write
69B5000
heap
page read and write
5FD1000
heap
page read and write
6A39000
heap
page read and write
5FC3000
heap
page read and write
19F0000
heap
page read and write
6ACC000
heap
page read and write
1A29000
heap
page read and write
1AE6000
heap
page read and write
5F45000
heap
page read and write
6B44000
heap
page read and write
1ACB000
heap
page read and write
5F4B000
heap
page read and write
5E4C000
heap
page read and write
737C000
heap
page read and write
733B000
heap
page read and write
5EEC000
heap
page read and write
66A4000
heap
page read and write
1A0C000
heap
page read and write
71FA000
trusted library allocation
page read and write
6B91000
heap
page read and write
1A10000
heap
page read and write
1AD9000
heap
page read and write
6906000
heap
page read and write
61CE000
heap
page read and write
19F7000
heap
page read and write
63E8000
heap
page read and write
72DC000
heap
page read and write
631C000
heap
page read and write
7104000
trusted library allocation
page read and write
62FA000
heap
page read and write
5F5E000
heap
page read and write
6521000
heap
page read and write
6593000
heap
page read and write
6308000
heap
page read and write
1AD5000
heap
page read and write
74D1000
heap
page read and write
65AE000
heap
page read and write
68E6000
heap
page read and write
6023000
heap
page read and write
1A30000
heap
page read and write
6198000
heap
page read and write
72E6000
heap
page read and write
6A5A000
heap
page read and write
5E22000
heap
page read and write
1AEA000
heap
page read and write
5D91000
heap
page read and write
19F1000
heap
page read and write
725E000
unkown
page read and write
6546000
heap
page read and write
5F3C000
heap
page read and write
6699000
heap
page read and write
5E44000
heap
page read and write
1ADA000
heap
page read and write
5E0B000
heap
page read and write
656D000
heap
page read and write
60A7000
heap
page read and write
73AC000
heap
page read and write
62FA000
heap
page read and write
5F7F000
heap
page read and write
6B85000
heap
page read and write
601E000
heap
page read and write
6A08000
heap
page read and write
638E000
heap
page read and write
6229000
heap
page read and write
60FD000
heap
page read and write
5E12000
heap
page read and write
61AB000
heap
page read and write
1A1C000
heap
page read and write
61C1000
heap
page read and write
9C000
stack
page read and write
656D000
heap
page read and write
5E49000
heap
page read and write
5F90000
heap
page read and write
5FD7000
heap
page read and write
73AD000
heap
page read and write
71F8000
unkown
page read and write
70D0000
trusted library allocation
page read and write
3D60000
heap
page read and write
69EB000
heap
page read and write
5E3C000
heap
page read and write
1A10000
heap
page read and write
70E2000
trusted library allocation
page read and write
5E2B000
heap
page read and write
1A34000
heap
page read and write
1A2A000
heap
page read and write
69B5000
heap
page read and write
3D6B000
heap
page read and write
60A6000
heap
page read and write
65AE000
heap
page read and write
68EE000
heap
page read and write
608A000
heap
page read and write
5F8B000
heap
page read and write
6995000
heap
page read and write
610D000
heap
page read and write
66A7000
heap
page read and write
656D000
heap
page read and write
69A7000
heap
page read and write
40C000
unkown
page readonly
657C000
heap
page read and write
607A000
heap
page read and write
7449000
heap
page read and write
737C000
heap
page read and write
657B000
heap
page read and write
69A7000
heap
page read and write
65F3000
heap
page read and write
6389000
heap
page read and write
5E43000
heap
page read and write
748B000
heap
page read and write
60A6000
heap
page read and write
6579000
heap
page read and write
6734000
heap
page read and write
1A25000
heap
page read and write
6723000
heap
page read and write
1A08000
heap
page read and write
7270000
trusted library allocation
page read and write
5D90000
heap
page read and write
5E30000
heap
page read and write
6439000
heap
page read and write
69B5000
heap
page read and write
73EE000
heap
page read and write
5E12000
heap
page read and write
5E0B000
heap
page read and write
6391000
heap
page read and write
1AE2000
heap
page read and write
608A000
heap
page read and write
638E000
heap
page read and write
1AC9000
heap
page read and write
70E2000
trusted library allocation
page read and write
619F000
heap
page read and write
60FD000
heap
page read and write
61E8000
heap
page read and write
5F69000
heap
page read and write
6734000
heap
page read and write
5FD1000
heap
page read and write
606D000
heap
page read and write
6036000
heap
page read and write
5E26000
heap
page read and write
5FB1000
heap
page read and write
622C000
heap
page read and write
649A000
heap
page read and write
74B0000
heap
page read and write
649B000
heap
page read and write
5E3D000
heap
page read and write
6067000
heap
page read and write
1AA6000
heap
page read and write
1A1B000
heap
page read and write
608A000
heap
page read and write
3D10000
heap
page read and write
70A1000
trusted library allocation
page read and write
5F54000
heap
page read and write
5E42000
heap
page read and write
6765000
heap
page read and write
1AA6000
heap
page read and write
5E3C000
heap
page read and write
65AE000
heap
page read and write
1A1F000
heap
page read and write
40C000
unkown
page readonly
638A000
heap
page read and write
5FD0000
heap
page read and write
3D43000
heap
page read and write
7105000
trusted library allocation
page read and write
683F000
heap
page read and write
62DB000
heap
page read and write
6261000
heap
page read and write
8105000
heap
page read and write
6B85000
heap
page read and write
5E38000
heap
page read and write
6123000
heap
page read and write
635E000
heap
page read and write
69CE000
heap
page read and write
5FC1000
heap
page read and write
6314000
heap
page read and write
634C000
heap
page read and write
60FA000
heap
page read and write
1A1C000
heap
page read and write
6579000
heap
page read and write
66B1000
heap
page read and write
6123000
heap
page read and write
6144000
heap
page read and write
5E4F000
heap
page read and write
62E2000
heap
page read and write
5F50000
heap
page read and write
6934000
heap
page read and write
7271000
heap
page read and write
66D1000
heap
page read and write
6879000
heap
page read and write
6579000
heap
page read and write
6743000
heap
page read and write
660B000
heap
page read and write
1A26000
heap
page read and write
68E7000
heap
page read and write
7146000
trusted library allocation
page read and write
5F70000
heap
page read and write
6197000
heap
page read and write
5EE9000
heap
page read and write
1A09000
heap
page read and write
5E44000
heap
page read and write
40E000
unkown
page write copy
619C000
heap
page read and write
6121000
heap
page read and write
62F3000
heap
page read and write
6627000
heap
page read and write
635E000
heap
page read and write
1ACF000
heap
page read and write
5E1C000
heap
page read and write
5FCD000
heap
page read and write
6ABA000
heap
page read and write
5E30000
heap
page read and write
66A4000
heap
page read and write
733A000
heap
page read and write
7146000
trusted library allocation
page read and write
631C000
heap
page read and write
5F80000
heap
page read and write
6439000
heap
page read and write
6581000
heap
page read and write
5E42000
heap
page read and write
6DB8000
heap
page read and write
61AD000
heap
page read and write
71A9000
unkown
page read and write
7070000
unkown
page read and write
5E19000
heap
page read and write
6722000
heap
page read and write
608B000
heap
page read and write
62FB000
heap
page read and write
699B000
heap
page read and write
6121000
heap
page read and write
5E2E000
heap
page read and write
6ADB000
heap
page read and write
638D000
heap
page read and write
1AFE000
heap
page read and write
74D1000
unkown
page read and write
62E2000
heap
page read and write
7197000
trusted library allocation
page read and write
69F6000
heap
page read and write
5E44000
heap
page read and write
6A59000
heap
page read and write
60AC000
heap
page read and write
5E4B000
heap
page read and write
61E8000
heap
page read and write
686F000
heap
page read and write
5FC5000
heap
page read and write
5F45000
heap
page read and write
643E000
heap
page read and write
6ABA000
heap
page read and write
5FDD000
heap
page read and write
1A1E000
heap
page read and write
1ADE000
heap
page read and write
660B000
heap
page read and write
5FD7000
heap
page read and write
5FD0000
heap
page read and write
60A6000
heap
page read and write
5F8C000
heap
page read and write
74D4000
heap
page read and write
699B000
heap
page read and write
410000
unkown
page readonly
657A000
heap
page read and write
6111000
heap
page read and write
69B5000
heap
page read and write
5F34000
heap
page read and write
656D000
heap
page read and write
603B000
heap
page read and write
687C000
heap
page read and write
748B000
heap
page read and write
1AD9000
heap
page read and write
551D000
heap
page read and write
6109000
heap
page read and write
721C000
trusted library allocation
page read and write
6093000
heap
page read and write
5E35000
heap
page read and write
5E2B000
heap
page read and write
611F000
heap
page read and write
1A2B000
heap
page read and write
5EEB000
heap
page read and write
6390000
heap
page read and write
6307000
heap
page read and write
6569000
heap
page read and write
619C000
heap
page read and write
60ED000
heap
page read and write
1A32000
heap
page read and write
611D000
heap
page read and write
6A38000
heap
page read and write
There are 650 hidden memdumps, click here to show them.