IOC Report
UiFttnkl2R.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\UiFttnkl2R.dll,mydllmain
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\UiFttnkl2R.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/zetaq.txt
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/zetaq.txt
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Windows\System32\shimgvw.dll,ImageView_Fullscreen https://rammenale.com/for2/zetaq.txt
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\UiFttnkl2R.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\UiFttnkl2R.dll",#1

URLs

Name
IP
Malicious
https://rammenale.com/for2/zetaq.txtZ
unknown
malicious
https://rammenale.com/for2/zetaq.txtV
unknown
malicious
https://rammenale.com/for2/zetaq/ts/
unknown
malicious
https://rammenale.com/for2/zetaq.txt
131.153.206.231
malicious
https://rammenale.com/for2/zetaq.txtC:
unknown
malicious
https://rammenale.com/for2/zetaq.txtL
unknown
malicious
https://rammenale.com/for2/zetaq.txtK
unknown
malicious
https://rammenale.com/for2/zetaq.txtsC:
unknown
malicious
https://rammenale.com/for2/zetaq.txtG
unknown
malicious
https://rammenale.com/for2/zetaq.txtP$
unknown
malicious
https://rammenale.com/for2/zetaq.txtE
unknown
malicious
https://rammenale.com/for2/zetaq.txtD
unknown
malicious
https://rammenale.com/for2/zetaq.txtz
unknown
malicious
https://rammenale.com/for2/zetaq.txtw
unknown
malicious
https://rammenale.com/for2/zetaq.txtv
unknown
malicious
https://rammenale.com/for2/zetaq.txtt
unknown
malicious
https://rammenale.com/for2/zetaq.txt6634-1002
unknown
malicious
https://rammenale.com/for2/zetaq.txtr
unknown
malicious
https://rammenale.com/for2/zetaq
unknown
malicious
https://rammenale.com/for2/zetaq.txtn
unknown
malicious
https://rammenale.com/for2/zetaq.txtl
unknown
malicious
https://rammenale.com/for2/zetaq.txtk
unknown
malicious
https://rammenale.com/for2/zetaq.txtent-1002
unknown
malicious
https://rammenale.com/for2/zetaq.txtg
unknown
malicious
https://rammenale.com/for2/zetaq.txtc
unknown
malicious
https://rammenale.com/for2/zetaq.txtI%
unknown
malicious
https://rammenale.com/for2/zetaq.txtxt
unknown
malicious
https://rammenale.com/
unknown
malicious
https://rammenale.com/for2/zetaq.txtPf
unknown
malicious
https://rammenale.com/for2/zetaq.txt4U
unknown
malicious
https://rammenale.com/for2/zetaq.txt50
unknown
malicious
https://rammenale.com/for2/zetaq.txtentndowsINetCookies;
unknown
malicious
https://rammenale.com/for2/zetaq.txt~
unknown
malicious
https://rammenale.com/for2/zetaq.txtentu
unknown
malicious
https://rammenale.com/for2/zetaq.txt8
unknown
malicious
https://rammenale.com/for2/zetaq.txt4Y
unknown
malicious
https://rammenale.com/for2/zetaq.txt6
unknown
malicious
https://rammenale.com/for2/zetaq.txt4
unknown
malicious
https://rammenale.com/for2/zetaq.txtes
unknown
malicious
https://rammenale.com/for2/zetaq.txt.
unknown
malicious
https://rammenale.com/for2/zetaq.txt4m
unknown
malicious
https://rammenale.com/for2/zetaq.txtent
unknown
malicious
https://rammenale.com/for2/zetaq.txt&
unknown
malicious
https://rammenale.com/for2/zetaq.txt#
unknown
malicious
https://rammenale.com/for2/zetaq.txt4er
unknown
malicious
https://rammenale.com/for2/zetaq.txt4q
unknown
malicious
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://rammenale.com/u
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
https://rammenale.com/YSTEM32
unknown
http://microsoft.co
unknown
http://www.microsoft.
unknown
http://en.wikipedia
unknown
https://rammenale.com/Data
unknown
http://www.carterandcone.coml
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://rammenale.com/fo10280/zet2
unknown
https://rammenale.com/8EEF8FF4BF719EAB539B52
unknown
https://rammenale.com/for2/zetaqtxt
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.fontbureau.com/designers8
unknown
https://rammenale.com/for2/zetaqonts/c
unknown
https://rammenale.com/for2/zetaq/a
unknown
There are 72 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
rammenale.com
131.153.206.231
malicious

IPs

IP
Domain
Country
Malicious
131.153.206.231
rammenale.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4BBC000
trusted library allocation
page read and write
B7C000
stack
page read and write
4EAA000
heap
page read and write
4BD7000
trusted library allocation
page read and write
4BBC000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
2B2A000
heap
page read and write
50AD000
trusted library allocation
page read and write
32C0000
heap
page read and write
2FA0000
heap
page read and write
50AC000
trusted library allocation
page read and write
6240000
trusted library allocation
page read and write
5DD2000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
2B24000
heap
page read and write
8972000
heap
page read and write
4BD7000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
2B26000
heap
page read and write
4B6D000
stack
page read and write
50C6000
trusted library allocation
page read and write
4F1D000
stack
page read and write
4B2B000
stack
page read and write
61B0000
trusted library allocation
page read and write
301F000
heap
page read and write
2AFC000
heap
page read and write
3058000
heap
page read and write
2DF0000
heap
page read and write
300B000
heap
page read and write
50A3000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
1130000
heap
page read and write
32BF000
stack
page read and write
4950000
heap
page read and write
4BAC000
trusted library allocation
page read and write
4BD7000
trusted library allocation
page read and write
2B18000
heap
page read and write
4BD7000
trusted library allocation
page read and write
50A8000
trusted library allocation
page read and write
4CA0000
heap
page read and write
327E000
stack
page read and write
2B41000
heap
page read and write
4BC5000
trusted library allocation
page read and write
25F0000
heap
page read and write
4BAD000
trusted library allocation
page read and write
2BD6000
heap
page read and write
50AC000
trusted library allocation
page read and write
4BAC000
trusted library allocation
page read and write
50A4000
trusted library allocation
page read and write
4BE6000
trusted library allocation
page read and write
4B80000
trusted library allocation
page read and write
4BAD000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
50B5000
trusted library allocation
page read and write
4BD7000
trusted library allocation
page read and write
8CCE000
stack
page read and write
50C6000
trusted library allocation
page read and write
4BBC000
trusted library allocation
page read and write
4BD7000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
4BD7000
trusted library allocation
page read and write
8815000
heap
page read and write
4BD7000
trusted library allocation
page read and write
4BBC000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page read and write
50AC000
trusted library allocation
page read and write
27B7000
stack
page read and write
50A1000
trusted library allocation
page read and write
50CA000
trusted library allocation
page read and write
44D0000
heap
page read and write
50C6000
trusted library allocation
page read and write
2B83000
heap
page read and write
4BAD000
trusted library allocation
page read and write
4BCD000
trusted library allocation
page read and write
306C000
stack
page read and write
2BE2000
heap
page read and write
8BA5000
heap
page read and write
4BBC000
trusted library allocation
page read and write
4BBC000
trusted library allocation
page read and write
4BBC000
trusted library allocation
page read and write
4BD7000
trusted library allocation
page read and write
4BBC000
trusted library allocation
page read and write
305B000
heap
page read and write
50BE000
trusted library allocation
page read and write
4BD7000
trusted library allocation
page read and write
8B0E000
stack
page read and write
309C000
heap
page read and write
4BAC000
trusted library allocation
page read and write
50C7000
trusted library allocation
page read and write
6CDF1000
unkown
page execute read
3044000
heap
page read and write
4BBC000
trusted library allocation
page read and write
8B34000
heap
page read and write
4BD7000
trusted library allocation
page read and write
3002000
heap
page read and write
2FF3000
heap
page read and write
328E000
stack
page read and write
4AAE000
stack
page read and write
50CA000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
50C7000
trusted library allocation
page read and write
4BD7000
trusted library allocation
page read and write
50A8000
trusted library allocation
page read and write
4BAD000
trusted library allocation
page read and write
50A7000
trusted library allocation
page read and write
4BAD000
trusted library allocation
page read and write
3110000
heap
page read and write
50BD000
trusted library allocation
page read and write
4C6B000
stack
page read and write
50BE000
trusted library allocation
page read and write
50AC000
trusted library allocation
page read and write
50C7000
trusted library allocation
page read and write
2AC3000
heap
page read and write
50C6000
trusted library allocation
page read and write
8B31000
heap
page read and write
50BD000
trusted library allocation
page read and write
50AC000
trusted library allocation
page read and write
4BB3000
trusted library allocation
page read and write
8876000
heap
page read and write
4BCD000
trusted library allocation
page read and write
4BAC000
trusted library allocation
page read and write
50B5000
trusted library allocation
page read and write
8D60000
remote allocation
page read and write
8D1E000
stack
page read and write
50A6000
trusted library allocation
page read and write
4BBC000
trusted library allocation
page read and write
2B2C000
heap
page read and write
4BAC000
trusted library allocation
page read and write
F3E000
stack
page read and write
8D9E000
stack
page read and write
50C6000
trusted library allocation
page read and write
2E76000
heap
page read and write
2ACC000
heap
page read and write
4BD7000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
2C77000
stack
page read and write
50C6000
trusted library allocation
page read and write
501C000
stack
page read and write
50A0000
trusted library allocation
page read and write
3092000
heap
page read and write
4CAC000
stack
page read and write
4BAC000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
4BEE000
stack
page read and write
6CE15000
unkown
page readonly
2B73000
heap
page read and write
4BBC000
trusted library allocation
page read and write
5199000
heap
page read and write
2C1B000
heap
page read and write
50C7000
trusted library allocation
page read and write
2B96000
heap
page read and write
EFC000
stack
page read and write
881C000
heap
page read and write
4BBC000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
4BE1000
trusted library allocation
page read and write
50AC000
trusted library allocation
page read and write
6CDF1000
unkown
page execute read
88B8000
heap
page read and write
4BB0000
trusted library allocation
page read and write
4BBC000
trusted library allocation
page read and write
50AD000
trusted library allocation
page read and write
4EDC000
stack
page read and write
25E0000
heap
page read and write
50AC000
trusted library allocation
page read and write
8C4E000
stack
page read and write
898A000
heap
page read and write
4BBC000
trusted library allocation
page read and write
4A2E000
stack
page read and write
8B8D000
stack
page read and write
50C7000
trusted library allocation
page read and write
5190000
heap
page read and write
50C6000
trusted library allocation
page read and write
6CDF1000
unkown
page execute read
2CD0000
heap
page read and write
332E000
stack
page read and write
2BBB000
heap
page read and write
508A000
heap
page read and write
6CE13000
unkown
page read and write
4BD7000
trusted library allocation
page read and write
2577000
stack
page read and write
2ADE000
heap
page read and write
50C6000
trusted library allocation
page read and write
4BBC000
trusted library allocation
page read and write
6CDF0000
unkown
page readonly
2DF5000
heap
page read and write
303D000
heap
page read and write
3076000
heap
page read and write
4AEF000
stack
page read and write
50C6000
trusted library allocation
page read and write
4BBC000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
4BBC000
trusted library allocation
page read and write
2B99000
heap
page read and write
50AC000
trusted library allocation
page read and write
4EC1000
heap
page read and write
8B76000
heap
page read and write
4DC0000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
2AB8000
heap
page read and write
50A3000
trusted library allocation
page read and write
4BBC000
trusted library allocation
page read and write
4E5E000
stack
page read and write
50A6000
trusted library allocation
page read and write
89BD000
heap
page read and write
4D50000
heap
page read and write
315E000
stack
page read and write
6CE13000
unkown
page read and write
8B10000
heap
page read and write
2A30000
heap
page read and write
4B9A000
trusted library allocation
page read and write
4B6E000
stack
page read and write
50AB000
trusted library allocation
page read and write
50C7000
trusted library allocation
page read and write
2D90000
heap
page read and write
4E89000
heap
page read and write
2AD4000
heap
page read and write
8B98000
heap
page read and write
4BBC000
trusted library allocation
page read and write
2AC6000
heap
page read and write
50C6000
trusted library allocation
page read and write
2B77000
heap
page read and write
62A0000
trusted library allocation
page read and write
4BBC000
trusted library allocation
page read and write
4BAE000
stack
page read and write
50C7000
trusted library allocation
page read and write
8F9F000
stack
page read and write
8F5E000
stack
page read and write
2ABC000
heap
page read and write
4BBC000
trusted library allocation
page read and write
F7E000
stack
page read and write
50C6000
trusted library allocation
page read and write
2A20000
heap
page read and write
BE0000
heap
page read and write
6CE13000
unkown
page read and write
50BD000
trusted library allocation
page read and write
887D000
heap
page read and write
8F20000
remote allocation
page read and write
50A1000
trusted library allocation
page read and write
4620000
heap
page read and write
4BD7000
trusted library allocation
page read and write
49EE000
stack
page read and write
4BAC000
trusted library allocation
page read and write
8ACF000
stack
page read and write
44E0000
heap
page read and write
50A4000
trusted library allocation
page read and write
62C2000
trusted library allocation
page read and write
4BD6000
trusted library allocation
page read and write
2B2F000
heap
page read and write
50AC000
trusted library allocation
page read and write
300F000
heap
page read and write
6CE15000
unkown
page readonly
8F20000
remote allocation
page read and write
4BB2000
trusted library allocation
page read and write
2FFA000
heap
page read and write
2BCC000
heap
page read and write
8B4F000
stack
page read and write
4BD7000
trusted library allocation
page read and write
50B5000
trusted library allocation
page read and write
50A2000
trusted library allocation
page read and write
50BA000
heap
page read and write
2FF6000
heap
page read and write
3064000
heap
page read and write
2D80000
heap
page read and write
8B63000
heap
page read and write
50C6000
trusted library allocation
page read and write
4BBB000
trusted library allocation
page read and write
304A000
heap
page read and write
8CDE000
stack
page read and write
50C7000
trusted library allocation
page read and write
4BC5000
trusted library allocation
page read and write
4BC5000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
4570000
heap
page read and write
4BAD000
trusted library allocation
page read and write
89A3000
heap
page read and write
8863000
heap
page read and write
3019000
heap
page read and write
3062000
heap
page read and write
50C7000
trusted library allocation
page read and write
4BBC000
trusted library allocation
page read and write
492E000
stack
page read and write
2A85000
heap
page read and write
8D0F000
stack
page read and write
2D1B000
stack
page read and write
4DAD000
stack
page read and write
8EDD000
stack
page read and write
4CA9000
heap
page read and write
50C7000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
50AC000
trusted library allocation
page read and write
4BBC000
trusted library allocation
page read and write
4BBC000
trusted library allocation
page read and write
336F000
stack
page read and write
4BD7000
trusted library allocation
page read and write
50C6000
heap
page read and write
50C6000
trusted library allocation
page read and write
50C7000
trusted library allocation
page read and write
4BBC000
trusted library allocation
page read and write
113B000
heap
page read and write
2FAA000
heap
page read and write
4BBC000
trusted library allocation
page read and write
4BBC000
trusted library allocation
page read and write
2AC0000
heap
page read and write
4BD7000
trusted library allocation
page read and write
50AC000
trusted library allocation
page read and write
6CE0B000
unkown
page readonly
2A6A000
heap
page read and write
4BCD000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
50B5000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
4BBC000
trusted library allocation
page read and write
49AE000
stack
page read and write
4BD7000
trusted library allocation
page read and write
89FF000
stack
page read and write
50AC000
trusted library allocation
page read and write
4E80000
heap
page read and write
4BAC000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
4BD7000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
50AC000
trusted library allocation
page read and write
2B0F000
heap
page read and write
4BCD000
trusted library allocation
page read and write
8B50000
heap
page read and write
50AC000
trusted library allocation
page read and write
50C7000
trusted library allocation
page read and write
50AC000
trusted library allocation
page read and write
62D0000
trusted library allocation
page read and write
89D0000
heap
page read and write
5DB0000
trusted library allocation
page read and write
6110000
trusted library allocation
page read and write
4E9B000
stack
page read and write
4BD7000
trusted library allocation
page read and write
50A2000
trusted library allocation
page read and write
8805000
heap
page read and write
3230000
heap
page read and write
8A8E000
stack
page read and write
2AC8000
heap
page read and write
4BBC000
trusted library allocation
page read and write
142E000
stack
page read and write
2B7C000
heap
page read and write
4BB2000
trusted library allocation
page read and write
3034000
heap
page read and write
4BBC000
trusted library allocation
page read and write
89BE000
stack
page read and write
893E000
stack
page read and write
8950000
heap
page read and write
2C33000
stack
page read and write
4BBC000
trusted library allocation
page read and write
50BE000
trusted library allocation
page read and write
50C7000
trusted library allocation
page read and write
114D000
heap
page read and write
6CDF0000
unkown
page readonly
4BD7000
trusted library allocation
page read and write
6CE0B000
unkown
page readonly
2B5D000
heap
page read and write
50AC000
trusted library allocation
page read and write
2B93000
heap
page read and write
2773000
stack
page read and write
FC0000
heap
page read and write
4BBC000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
4BD7000
trusted library allocation
page read and write
4F5D000
stack
page read and write
2AB4000
heap
page read and write
2A80000
heap
page read and write
4BD7000
trusted library allocation
page read and write
4C80000
trusted library allocation
page read and write
8F20000
remote allocation
page read and write
4BD7000
trusted library allocation
page read and write
8E9C000
stack
page read and write
BF0000
heap
page read and write
50A8000
trusted library allocation
page read and write
2AF9000
heap
page read and write
4BD7000
trusted library allocation
page read and write
29B6000
heap
page read and write
50AC000
trusted library allocation
page read and write
6CE15000
unkown
page readonly
5070000
heap
page read and write
4BD7000
trusted library allocation
page read and write
4BBC000
trusted library allocation
page read and write
2533000
stack
page read and write
5092000
trusted library allocation
page read and write
4BD6000
trusted library allocation
page read and write
2940000
heap
page read and write
496F000
stack
page read and write
4BD7000
trusted library allocation
page read and write
4BD7000
trusted library allocation
page read and write
31F0000
heap
page read and write
50A2000
trusted library allocation
page read and write
8B2B000
heap
page read and write
8BCE000
stack
page read and write
33CA000
heap
page read and write
44E4000
heap
page read and write
50C6000
trusted library allocation
page read and write
4BD7000
trusted library allocation
page read and write
50A1000
trusted library allocation
page read and write
50B5000
trusted library allocation
page read and write
2B8B000
heap
page read and write
89D7000
heap
page read and write
3006000
heap
page read and write
50AC000
trusted library allocation
page read and write
50A1000
trusted library allocation
page read and write
6CDF0000
unkown
page readonly
3016000
heap
page read and write
2B8F000
heap
page read and write
66B2000
trusted library allocation
page read and write
50A3000
trusted library allocation
page read and write
2B20000
heap
page read and write
33C0000
heap
page read and write
8BCF000
heap
page read and write
4BB1000
trusted library allocation
page read and write
2DB0000
heap
page read and write
4BD7000
trusted library allocation
page read and write
4BD6000
trusted library allocation
page read and write
4BBD000
trusted library allocation
page read and write
2945000
heap
page read and write
50B5000
trusted library allocation
page read and write
4BD7000
trusted library allocation
page read and write
50AC000
trusted library allocation
page read and write
50AC000
trusted library allocation
page read and write
8C4E000
stack
page read and write
8C10000
remote allocation
page read and write
4BA4000
trusted library allocation
page read and write
50A1000
trusted library allocation
page read and write
2BE4000
heap
page read and write
2B09000
heap
page read and write
302A000
heap
page read and write
2A60000
heap
page read and write
4BD7000
trusted library allocation
page read and write
50A8000
trusted library allocation
page read and write
4D6C000
stack
page read and write
50C6000
trusted library allocation
page read and write
4BD7000
trusted library allocation
page read and write
50A9000
trusted library allocation
page read and write
4BD7000
trusted library allocation
page read and write
5D50000
trusted library allocation
page read and write
50AC000
trusted library allocation
page read and write
2B15000
heap
page read and write
4A6D000
stack
page read and write
29B0000
heap
page read and write
8B4A000
heap
page read and write
898D000
heap
page read and write
4BBC000
trusted library allocation
page read and write
2CDC000
stack
page read and write
4BBC000
trusted library allocation
page read and write
8B1C000
heap
page read and write
50A3000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
4420000
heap
page read and write
50C6000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
4E1E000
stack
page read and write
4AA0000
heap
page read and write
2F80000
heap
page read and write
50AC000
trusted library allocation
page read and write
50AC000
trusted library allocation
page read and write
2BEA000
heap
page read and write
8C10000
remote allocation
page read and write
4BBC000
trusted library allocation
page read and write
2E70000
heap
page read and write
4BD7000
trusted library allocation
page read and write
897F000
stack
page read and write
8D60000
remote allocation
page read and write
2BC6000
heap
page read and write
50C6000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
4624000
heap
page read and write
3013000
heap
page read and write
50AC000
trusted library allocation
page read and write
50B5000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
4E90000
heap
page read and write
4BBC000
trusted library allocation
page read and write
2BFF000
heap
page read and write
4BD7000
trusted library allocation
page read and write
50AC000
trusted library allocation
page read and write
2B87000
heap
page read and write
3020000
heap
page read and write
505D000
stack
page read and write
4BD7000
trusted library allocation
page read and write
8C8F000
stack
page read and write
4BD6000
trusted library allocation
page read and write
8D60000
remote allocation
page read and write
2BED000
heap
page read and write
4BD7000
trusted library allocation
page read and write
8834000
heap
page read and write
4BBC000
trusted library allocation
page read and write
4BD7000
trusted library allocation
page read and write
50C7000
trusted library allocation
page read and write
5170000
trusted library allocation
page read and write
4BBC000
trusted library allocation
page read and write
30AB000
stack
page read and write
6CE0B000
unkown
page readonly
4BD7000
trusted library allocation
page read and write
8C8F000
stack
page read and write
4BBC000
trusted library allocation
page read and write
8C10000
remote allocation
page read and write
4BBC000
trusted library allocation
page read and write
4BBC000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page read and write
8B90000
heap
page read and write
8DDF000
stack
page read and write
50AB000
trusted library allocation
page read and write
5FA0000
trusted library allocation
page read and write
50C7000
trusted library allocation
page read and write
302E000
heap
page read and write
4BBC000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page read and write
884D000
heap
page read and write
132F000
stack
page read and write
4954000
heap
page read and write
2AD0000
heap
page read and write
50AC000
trusted library allocation
page read and write
32D0000
heap
page read and write
4BD6000
trusted library allocation
page read and write
5F90000
trusted library allocation
page read and write
50B5000
trusted library allocation
page read and write
113F000
heap
page read and write
50AD000
trusted library allocation
page read and write
4BD6000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
2BB7000
heap
page read and write
4BD7000
trusted library allocation
page read and write
4BBC000
trusted library allocation
page read and write
4C2E000
stack
page read and write
4BBC000
trusted library allocation
page read and write
304D000
heap
page read and write
3170000
heap
page read and write
4BBC000
trusted library allocation
page read and write
2BD3000
heap
page read and write
4BBC000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
50B5000
trusted library allocation
page read and write
50A4000
trusted library allocation
page read and write
8838000
heap
page read and write
There are 533 hidden memdumps, click here to show them.