IOC Report
PPz346dmz6.exe

loading gif

Files

File Path
Type
Category
Malicious
PPz346dmz6.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PPz346dmz6.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\Server.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java update.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Dllhost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Dllhost.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Java update.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Server.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PPz346dmz6.exe
"C:\Users\user\Desktop\PPz346dmz6.exe"
malicious
C:\Windows\Dllhost.exe
"C:\Windows\Dllhost.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /sc minute /mo 1 /tn Server /tr C:\Users\user\AppData\Local\Temp/Server.exe
malicious
C:\Users\user\AppData\Local\Temp\Server.exe
C:\Users\user\AppData\Local\Temp/Server.exe
malicious
C:\Windows\Dllhost.exe
"C:\Windows\Dllhost.exe" ..
malicious
C:\Windows\Dllhost.exe
"C:\Windows\Dllhost.exe" ..
malicious
C:\Windows\Dllhost.exe
"C:\Windows\Dllhost.exe" ..
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java update.exe
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java update.exe"
malicious
C:\Users\user\AppData\Local\Temp\Server.exe
C:\Users\user\AppData\Local\Temp/Server.exe
malicious
C:\Users\user\AppData\Local\Temp\Server.exe
C:\Users\user\AppData\Local\Temp/Server.exe
malicious
C:\Users\user\AppData\Local\Temp\Server.exe
C:\Users\user\AppData\Local\Temp/Server.exe
malicious
C:\Users\user\AppData\Local\Temp\Server.exe
C:\Users\user\AppData\Local\Temp/Server.exe
malicious
C:\Windows\System32\dllhost.exe
C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

Domains

Name
IP
Malicious
rentals-guests.gl.at.ply.gg
147.185.221.22
malicious

IPs

IP
Domain
Country
Malicious
147.185.221.22
rentals-guests.gl.at.ply.gg
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Windows Update
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Windows Update

Memdumps

Base Address
Regiontype
Protect
Malicious
BF2000
unkown
page readonly
malicious
2F5E000
trusted library allocation
page read and write
malicious
14D0000
trusted library allocation
page read and write
567E000
stack
page read and write
DD9000
heap
page read and write
3711000
trusted library allocation
page read and write
13DF000
stack
page read and write
2C60000
trusted library allocation
page read and write
142E000
heap
page read and write
112E000
stack
page read and write
4CAB000
trusted library allocation
page read and write
EEF000
stack
page read and write
C99000
heap
page read and write
CB7000
trusted library allocation
page execute and read and write
32A9000
trusted library allocation
page read and write
58FC000
stack
page read and write
10F0000
heap
page read and write
55A0000
heap
page read and write
5189000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
1571000
heap
page read and write
535E000
stack
page read and write
4F65000
trusted library allocation
page read and write
2FAF000
stack
page read and write
5776000
trusted library allocation
page read and write
390000
heap
page read and write
2C70000
trusted library allocation
page read and write
C6E000
stack
page read and write
7F310000
trusted library allocation
page execute and read and write
52EC000
stack
page read and write
A0F000
stack
page read and write
4B50000
trusted library allocation
page read and write
27A7000
trusted library allocation
page read and write
126B000
stack
page read and write
BD0000
heap
page read and write
BF0000
unkown
page readonly
1580000
heap
page read and write
2FFE000
trusted library allocation
page read and write
55D8000
stack
page read and write
A90000
trusted library allocation
page execute and read and write
5D0E000
stack
page read and write
27CB000
trusted library allocation
page read and write
5385000
trusted library allocation
page read and write
15B0000
heap
page read and write
4E10000
heap
page read and write
4B9C000
stack
page read and write
5040000
trusted library allocation
page read and write
11CB000
heap
page read and write
57D6000
trusted library allocation
page read and write
10E0000
heap
page read and write
4F14000
trusted library allocation
page read and write
DE7000
heap
page read and write
1054000
trusted library allocation
page read and write
F10000
trusted library allocation
page read and write
C77000
heap
page read and write
543E000
stack
page read and write
99F000
stack
page read and write
509000
stack
page read and write
542E000
stack
page read and write
4DDE000
trusted library allocation
page read and write
93D000
trusted library allocation
page execute and read and write
8F9000
stack
page read and write
5830000
trusted library allocation
page read and write
956000
heap
page read and write
5354000
trusted library allocation
page read and write
4CA6000
trusted library allocation
page read and write
1420000
heap
page read and write
2F01000
trusted library allocation
page read and write
4F45000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
EE7000
trusted library allocation
page execute and read and write
55A0000
heap
page read and write
4DF1000
trusted library allocation
page read and write
542C000
stack
page read and write
4EAC000
stack
page read and write
2AEE000
trusted library allocation
page read and write
3290000
heap
page read and write
13D0000
heap
page read and write
5090000
trusted library allocation
page read and write
691E000
stack
page read and write
4BF0000
trusted library allocation
page read and write
24E1000
trusted library allocation
page read and write
42A1000
trusted library allocation
page read and write
2781000
trusted library allocation
page read and write
4E81000
trusted library allocation
page read and write
5E3A000
stack
page read and write
4F70000
trusted library allocation
page read and write
2E50000
trusted library allocation
page execute and read and write
4BEC000
stack
page read and write
C90000
trusted library allocation
page read and write
13CE000
stack
page read and write
3F55000
trusted library allocation
page read and write
9DE000
stack
page read and write
4A89000
trusted library allocation
page read and write
5A7C000
stack
page read and write
2AA0000
trusted library allocation
page read and write
1374000
trusted library allocation
page read and write
4F2C000
stack
page read and write
C83000
trusted library allocation
page execute and read and write
2E40000
trusted library allocation
page read and write
A70000
heap
page read and write
55BB000
trusted library allocation
page read and write
905000
heap
page read and write
940000
trusted library allocation
page read and write
4DD6000
trusted library allocation
page read and write
4CC1000
trusted library allocation
page read and write
6C5000
heap
page read and write
30D000
stack
page read and write
C70000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
972000
trusted library allocation
page read and write
14E3000
trusted library allocation
page execute and read and write
144A000
heap
page read and write
507C000
stack
page read and write
5000000
heap
page read and write
5CE000
stack
page read and write
B50000
heap
page read and write
5E0000
heap
page read and write
135F000
stack
page read and write
2917000
trusted library allocation
page execute and read and write
C60000
trusted library allocation
page read and write
2641000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
54CE000
stack
page read and write
531E000
stack
page read and write
115C000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
14CF000
stack
page read and write
4CA4000
trusted library allocation
page read and write
5C0E000
stack
page read and write
6A0000
heap
page read and write
EB4000
trusted library allocation
page read and write
1373000
trusted library allocation
page execute and read and write
57C0000
trusted library allocation
page read and write
5180000
trusted library allocation
page read and write
653E000
stack
page read and write
2930000
heap
page read and write
14F4000
trusted library allocation
page read and write
93F000
stack
page read and write
2FF8000
trusted library allocation
page read and write
57F0000
heap
page execute and read and write
5A0E000
stack
page read and write
2F4E000
stack
page read and write
5ADF000
stack
page read and write
572E000
stack
page read and write
11C5000
heap
page read and write
A91000
heap
page read and write
575E000
stack
page read and write
3A41000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
2A79000
trusted library allocation
page read and write
151B000
trusted library allocation
page execute and read and write
4F8C000
stack
page read and write
1454000
heap
page read and write
A78000
heap
page read and write
2DF0000
heap
page execute and read and write
9E0000
heap
page read and write
9A8000
heap
page read and write
1380000
trusted library allocation
page read and write
47DE000
stack
page read and write
10B0000
trusted library allocation
page read and write
522F000
stack
page read and write
2700000
heap
page execute and read and write
4F0C000
stack
page read and write
5890000
heap
page read and write
57D0000
heap
page execute and read and write
6FB000
heap
page read and write
6F8000
heap
page read and write
1060000
trusted library allocation
page read and write
10DE000
stack
page read and write
2DF3000
trusted library allocation
page execute and read and write
CBB000
trusted library allocation
page execute and read and write
9D8000
stack
page read and write
15FD000
stack
page read and write
1150000
heap
page read and write
61F0000
trusted library allocation
page execute and read and write
46BD000
stack
page read and write
4B60000
trusted library allocation
page read and write
566E000
stack
page read and write
1860000
heap
page read and write
28F4000
trusted library allocation
page read and write
1053000
trusted library allocation
page execute and read and write
8E0000
heap
page read and write
5356000
trusted library allocation
page read and write
681E000
stack
page read and write
115A000
heap
page read and write
4DEA000
trusted library allocation
page read and write
60F4000
heap
page read and write
28E0000
trusted library allocation
page read and write
532C000
stack
page read and write
A70000
heap
page read and write
2630000
heap
page execute and read and write
FE0000
heap
page read and write
581C000
trusted library allocation
page read and write
4DE2000
trusted library allocation
page read and write
2900000
heap
page execute and read and write
AC0000
trusted library allocation
page read and write
AA5000
heap
page read and write
B6B000
stack
page read and write
4EC0000
trusted library allocation
page read and write
4FFE000
stack
page read and write
ACD000
heap
page read and write
4F34000
trusted library allocation
page read and write
2DB000
stack
page read and write
5820000
trusted library allocation
page read and write
562F000
stack
page read and write
97B000
trusted library allocation
page execute and read and write
FF0000
heap
page read and write
103E000
stack
page read and write
60E8000
heap
page read and write
2A3E000
stack
page read and write
F30000
heap
page read and write
557C000
trusted library allocation
page read and write
28A0000
heap
page read and write
5080000
heap
page execute and read and write
2E00000
trusted library allocation
page read and write
960000
trusted library allocation
page read and write
AF8000
stack
page read and write
10E0000
heap
page read and write
4B7E000
stack
page read and write
934000
trusted library allocation
page read and write
57F3000
trusted library allocation
page read and write
26E0000
trusted library allocation
page execute and read and write
552C000
stack
page read and write
50AC000
stack
page read and write
5B7E000
stack
page read and write
135F000
stack
page read and write
521E000
stack
page read and write
5440000
trusted library allocation
page read and write
34E1000
trusted library allocation
page read and write
5840000
trusted library allocation
page read and write
3F51000
trusted library allocation
page read and write
53CE000
stack
page read and write
5146000
trusted library allocation
page read and write
3FF1000
trusted library allocation
page read and write
51E0000
heap
page execute and read and write
65B000
stack
page read and write
8D0000
heap
page read and write
4F3B000
trusted library allocation
page read and write
28E3000
trusted library allocation
page execute and read and write
14E4000
trusted library allocation
page read and write
B70000
heap
page read and write
59DE000
stack
page read and write
261E000
stack
page read and write
181F000
stack
page read and write
299E000
stack
page read and write
705000
heap
page read and write
5579000
trusted library allocation
page read and write
94D000
trusted library allocation
page execute and read and write
1168000
heap
page read and write
5780000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page read and write
27AF000
trusted library allocation
page read and write
14E0000
trusted library allocation
page read and write
2C9E000
trusted library allocation
page read and write
24EE000
trusted library allocation
page read and write
4F2E000
trusted library allocation
page read and write
DB0000
heap
page read and write
1100000
trusted library allocation
page execute and read and write
1185000
heap
page read and write
4E2E000
stack
page read and write
FA0000
heap
page read and write
5569000
stack
page read and write
1139000
stack
page read and write
28F9000
trusted library allocation
page read and write
4BFC000
trusted library allocation
page read and write
117B000
heap
page read and write
A5F000
heap
page read and write
B87000
heap
page read and write
4B40000
trusted library allocation
page read and write
51AC000
stack
page read and write
AA0000
heap
page read and write
F23000
trusted library allocation
page execute and read and write
4A7E000
stack
page read and write
14F4000
trusted library allocation
page read and write
2A9E000
stack
page read and write
14F0000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
1360000
trusted library allocation
page read and write
4E9E000
stack
page read and write
4F16000
trusted library allocation
page read and write
2AD0000
heap
page execute and read and write
5570000
trusted library allocation
page read and write
C91000
heap
page read and write
541F000
stack
page read and write
1510000
trusted library allocation
page read and write
14D0000
trusted library allocation
page read and write
157E000
stack
page read and write
1517000
trusted library allocation
page execute and read and write
25DE000
stack
page read and write
4F31000
trusted library allocation
page read and write
2AEA000
trusted library allocation
page read and write
78B000
stack
page read and write
5360000
trusted library allocation
page read and write
53ED000
stack
page read and write
2FE0000
heap
page read and write
5099000
trusted library allocation
page read and write
B80000
heap
page read and write
2910000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
2C4E000
stack
page read and write
930000
trusted library allocation
page read and write
2765000
trusted library allocation
page read and write
C50000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
8BE000
stack
page read and write
1160000
heap
page read and write
2930000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
1193000
heap
page read and write
141E000
stack
page read and write
50EE000
stack
page read and write
2EFE000
stack
page read and write
4FEE000
stack
page read and write
CB5000
heap
page read and write
4B40000
trusted library allocation
page read and write
116F000
heap
page read and write
27EF000
trusted library allocation
page read and write
5ADE000
stack
page read and write
27C1000
trusted library allocation
page read and write
576E000
stack
page read and write
196F000
stack
page read and write
2FB0000
heap
page read and write
640000
heap
page read and write
577B000
trusted library allocation
page read and write
1590000
trusted library allocation
page execute and read and write
4D10000
heap
page read and write
4A90000
trusted library allocation
page read and write
FC0000
heap
page read and write
D8E000
stack
page read and write
57A5000
trusted library allocation
page read and write
BA1000
heap
page read and write
3F59000
trusted library allocation
page read and write
977000
trusted library allocation
page execute and read and write
4DEE000
trusted library allocation
page read and write
4FDC000
stack
page read and write
67DC000
stack
page read and write
4A99000
trusted library allocation
page read and write
759000
stack
page read and write
EAE000
stack
page read and write
2BFF000
stack
page read and write
1260000
heap
page read and write
1040000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
3A45000
trusted library allocation
page read and write
5210000
heap
page execute and read and write
990000
trusted library allocation
page read and write
153E000
stack
page read and write
1130000
heap
page read and write
52EE000
stack
page read and write
5570000
trusted library allocation
page read and write
920000
trusted library allocation
page read and write
4CD5000
trusted library allocation
page read and write
AD0000
heap
page read and write
3C0000
heap
page read and write
3A51000
trusted library allocation
page read and write
CA0000
heap
page read and write
4DF6000
trusted library allocation
page read and write
151B000
trusted library allocation
page execute and read and write
1196000
heap
page read and write
1490000
heap
page read and write
61E0000
trusted library allocation
page read and write
BB6000
heap
page read and write
4E20000
trusted library allocation
page read and write
8CE000
stack
page read and write
490E000
stack
page read and write
14AB000
heap
page read and write
526E000
stack
page read and write
550E000
stack
page read and write
57D0000
trusted library allocation
page read and write
5302000
trusted library allocation
page read and write
2C25000
trusted library allocation
page read and write
57D4000
trusted library allocation
page read and write
E30000
heap
page read and write
1183000
heap
page read and write
1207000
heap
page read and write
1380000
heap
page read and write
321E000
stack
page read and write
4CCC000
stack
page read and write
5150000
trusted library allocation
page read and write
BA9000
heap
page read and write
1097000
trusted library allocation
page execute and read and write
1970000
heap
page read and write
1250000
heap
page read and write
539E000
stack
page read and write
1140000
trusted library allocation
page read and write
8DB000
stack
page read and write
F58000
stack
page read and write
EC4000
trusted library allocation
page read and write
1181000
heap
page read and write
51A5000
stack
page read and write
713000
heap
page read and write
3AE5000
trusted library allocation
page read and write
4CBE000
trusted library allocation
page read and write
480E000
stack
page read and write
5A9E000
stack
page read and write
2A4F000
stack
page read and write
1384000
trusted library allocation
page read and write
3240000
heap
page execute and read and write
EF9000
stack
page read and write
A4E000
stack
page read and write
5E8E000
stack
page read and write
700000
heap
page read and write
512E000
stack
page read and write
2FD0000
trusted library allocation
page read and write
570000
heap
page read and write
11E8000
heap
page read and write
1368000
stack
page read and write
A4B000
trusted library allocation
page execute and read and write
4F1B000
trusted library allocation
page read and write
2E2B000
trusted library allocation
page execute and read and write
4F7C000
trusted library allocation
page read and write
943000
trusted library allocation
page read and write
5440000
heap
page read and write
34A000
stack
page read and write
1159000
trusted library allocation
page read and write
650000
heap
page read and write
103B000
stack
page read and write
1480000
heap
page read and write
669E000
stack
page read and write
2490000
heap
page read and write
5580000
trusted library allocation
page execute and read and write
B40000
heap
page read and write
1080000
heap
page read and write
60C0000
heap
page read and write
57DB000
trusted library allocation
page read and write
4FCE000
stack
page read and write
2940000
heap
page read and write
3220000
trusted library allocation
page read and write
5774000
trusted library allocation
page read and write
4E5E000
stack
page read and write
24BE000
stack
page read and write
2A59000
trusted library allocation
page read and write
563C000
stack
page read and write
147E000
stack
page read and write
96A000
trusted library allocation
page execute and read and write
69E000
stack
page read and write
501E000
stack
page read and write
1160000
heap
page read and write
AF8000
stack
page read and write
60D6000
heap
page read and write
19AF000
stack
page read and write
2799000
trusted library allocation
page read and write
3649000
trusted library allocation
page read and write
C40000
heap
page read and write
5161000
trusted library allocation
page read and write
588C000
stack
page read and write
34E5000
trusted library allocation
page read and write
1586000
heap
page read and write
2480000
trusted library allocation
page read and write
BEE000
stack
page read and write
141E000
stack
page read and write
29E9000
trusted library allocation
page read and write
279F000
trusted library allocation
page read and write
2A51000
trusted library allocation
page read and write
587F000
stack
page read and write
515E000
trusted library allocation
page read and write
6D0000
heap
page read and write
3D9000
stack
page read and write
4DD0000
trusted library allocation
page read and write
4119000
trusted library allocation
page read and write
A47000
trusted library allocation
page execute and read and write
265D000
trusted library allocation
page read and write
1110000
trusted library allocation
page read and write
CA6000
heap
page read and write
5635000
stack
page read and write
576E000
stack
page read and write
5A35000
stack
page read and write
55B4000
trusted library allocation
page read and write
5530000
heap
page execute and read and write
12EF000
stack
page read and write
CB0000
heap
page read and write
556C000
stack
page read and write
5371000
trusted library allocation
page read and write
DDF000
stack
page read and write
12B0000
heap
page read and write
4F20000
trusted library allocation
page read and write
577F000
stack
page read and write
4A8C000
trusted library allocation
page read and write
32AE000
trusted library allocation
page read and write
87F000
unkown
page read and write
2E27000
trusted library allocation
page execute and read and write
5D9F000
stack
page read and write
2C00000
heap
page execute and read and write
58D5000
stack
page read and write
2E04000
trusted library allocation
page read and write
83E000
unkown
page read and write
4D19000
trusted library allocation
page read and write
14F0000
trusted library allocation
page read and write
FAF000
stack
page read and write
655E000
stack
page read and write
57AE000
stack
page read and write
5020000
trusted library allocation
page read and write
27B9000
trusted library allocation
page read and write
F5B000
trusted library allocation
page execute and read and write
2E0C000
stack
page read and write
C9E000
stack
page read and write
4DD4000
trusted library allocation
page read and write
2DE0000
trusted library allocation
page read and write
2791000
trusted library allocation
page read and write
DD2000
heap
page read and write
2940000
trusted library allocation
page execute and read and write
74F000
heap
page read and write
2A8B000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
55B6000
trusted library allocation
page read and write
5166000
stack
page read and write
4A3C000
stack
page read and write
1550000
heap
page read and write
291B000
trusted library allocation
page execute and read and write
14BB000
trusted library allocation
page execute and read and write
FEE000
stack
page read and write
2EAE000
stack
page read and write
4F53000
trusted library allocation
page read and write
FC0000
heap
page execute and read and write
5430000
heap
page read and write
4F79000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
3641000
trusted library allocation
page read and write
3C95000
trusted library allocation
page read and write
118A000
heap
page read and write
1517000
trusted library allocation
page execute and read and write
4DDB000
trusted library allocation
page read and write
A14000
trusted library allocation
page read and write
5DBE000
stack
page read and write
2F51000
trusted library allocation
page read and write
8F0000
heap
page read and write
5060000
heap
page read and write
70A000
heap
page read and write
6102000
heap
page read and write
610C000
heap
page read and write
933000
trusted library allocation
page execute and read and write
12AE000
stack
page read and write
5589000
trusted library allocation
page read and write
3AE9000
trusted library allocation
page read and write
BE0000
heap
page read and write
24C0000
trusted library allocation
page read and write
A24000
trusted library allocation
page read and write
11EC000
heap
page read and write
115E000
heap
page read and write
51EE000
stack
page read and write
52AF000
stack
page read and write
AB0000
trusted library allocation
page read and write
2A4E000
trusted library allocation
page read and write
966000
trusted library allocation
page execute and read and write
1350000
heap
page read and write
14B0000
trusted library allocation
page read and write
5C7E000
stack
page read and write
E5B000
stack
page read and write
5765000
stack
page read and write
1530000
trusted library allocation
page read and write
2C80000
heap
page read and write
C70000
trusted library allocation
page read and write
EEB000
trusted library allocation
page execute and read and write
1390000
heap
page read and write
9AE000
heap
page read and write
CE2000
heap
page read and write
109B000
trusted library allocation
page execute and read and write
AA0000
heap
page execute and read and write
FBE000
stack
page read and write
A20000
trusted library allocation
page read and write
34E9000
trusted library allocation
page read and write
11E4000
heap
page read and write
42A9000
trusted library allocation
page read and write
51CE000
stack
page read and write
2797000
trusted library allocation
page read and write
266E000
stack
page read and write
1420000
heap
page read and write
51A0000
heap
page read and write
C94000
trusted library allocation
page read and write
2C50000
trusted library allocation
page read and write
C84000
trusted library allocation
page read and write
AA3000
heap
page read and write
27FF000
stack
page read and write
5580000
trusted library allocation
page read and write
28E4000
trusted library allocation
page read and write
5BCE000
stack
page read and write
5C9C000
stack
page read and write
1170000
heap
page read and write
EB3000
trusted library allocation
page execute and read and write
6106000
heap
page read and write
A13000
trusted library allocation
page execute and read and write
2A41000
trusted library allocation
page read and write
4E87000
trusted library allocation
page read and write
F10000
trusted library allocation
page execute and read and write
2DE0000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
3F01000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
5340000
heap
page read and write
A98000
heap
page read and write
9D4000
heap
page read and write
3D0000
heap
page read and write
5340000
heap
page read and write
E6F000
stack
page read and write
5E9E000
stack
page read and write
C50000
heap
page read and write
4E40000
trusted library allocation
page read and write
3A55000
trusted library allocation
page read and write
2C98000
trusted library allocation
page read and write
55D1000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
2910000
trusted library allocation
page read and write
53EE000
stack
page read and write
2ACC000
trusted library allocation
page read and write
5EDE000
stack
page read and write
2920000
trusted library allocation
page read and write
535B000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
6DA000
heap
page read and write
28FC000
trusted library allocation
page read and write
5144000
trusted library allocation
page read and write
282C000
trusted library allocation
page read and write
6DE000
heap
page read and write
5ACD000
stack
page read and write
4EE0000
trusted library allocation
page read and write
24DE000
stack
page read and write
5791000
trusted library allocation
page read and write
C40000
heap
page read and write
7F0000
heap
page read and write
6C0000
heap
page read and write
1150000
trusted library allocation
page read and write
12D0000
heap
page read and write
14E3000
trusted library allocation
page execute and read and write
62FE000
stack
page read and write
4FAE000
stack
page read and write
2AE1000
trusted library allocation
page read and write
CD0000
heap
page read and write
14E0000
trusted library allocation
page execute and read and write
57BC000
trusted library allocation
page read and write
10EF000
stack
page read and write
900000
heap
page read and write
57CC000
stack
page read and write
283E000
stack
page read and write
1610000
heap
page read and write
185E000
stack
page read and write
573C000
stack
page read and write
14D0000
trusted library allocation
page read and write
52A5000
stack
page read and write
514B000
trusted library allocation
page read and write
4DFD000
trusted library allocation
page read and write
5D7E000
stack
page read and write
1540000
trusted library allocation
page read and write
556C000
stack
page read and write
2A85000
trusted library allocation
page read and write
CEC000
heap
page read and write
4B20000
heap
page read and write
5780000
trusted library allocation
page read and write
4F36000
trusted library allocation
page read and write
12D5000
heap
page read and write
28F0000
trusted library allocation
page read and write
1550000
heap
page read and write
F87000
stack
page read and write
4CF5000
stack
page read and write
A6F000
heap
page read and write
FF0000
heap
page read and write
24D0000
heap
page read and write
15C9000
heap
page read and write
2711000
trusted library allocation
page read and write
4ED0000
heap
page execute and read and write
23BE000
stack
page read and write
580000
heap
page read and write
4F51000
trusted library allocation
page read and write
2BC8000
trusted library allocation
page read and write
57B9000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
4DA0000
heap
page execute and read and write
659E000
stack
page read and write
552F000
stack
page read and write
134F000
stack
page read and write
C90000
heap
page read and write
4E02000
trusted library allocation
page read and write
2620000
trusted library allocation
page execute and read and write
5F7E000
stack
page read and write
15C2000
heap
page read and write
51AE000
stack
page read and write
14F0000
heap
page read and write
1178000
heap
page read and write
10E0000
heap
page read and write
14E4000
trusted library allocation
page read and write
1558000
heap
page read and write
5E4E000
stack
page read and write
1000000
heap
page read and write
3A59000
trusted library allocation
page read and write
548E000
stack
page read and write
4FA5000
stack
page read and write
7EB000
stack
page read and write
5805000
trusted library allocation
page read and write
55CE000
trusted library allocation
page read and write
57F1000
trusted library allocation
page read and write
4BBD000
stack
page read and write
4D20000
trusted library allocation
page read and write
27C5000
trusted library allocation
page read and write
264F000
trusted library allocation
page read and write
AD5000
heap
page read and write
A60000
trusted library allocation
page read and write
3C99000
trusted library allocation
page read and write
3AE1000
trusted library allocation
page read and write
C70000
heap
page read and write
565E000
stack
page read and write
10FE000
stack
page read and write
E8B000
stack
page read and write
55F0000
trusted library allocation
page read and write
758000
heap
page read and write
509B000
trusted library allocation
page read and write
42A5000
trusted library allocation
page read and write
B3E000
stack
page read and write
55E5000
trusted library allocation
page read and write
5FDF000
stack
page read and write
5030000
trusted library allocation
page read and write
1462000
heap
page read and write
5810000
trusted library allocation
page read and write
5A50000
heap
page execute and read and write
5819000
trusted library allocation
page read and write
264A000
trusted library allocation
page read and write
2A49000
trusted library allocation
page read and write
5590000
heap
page read and write
B50000
heap
page read and write
7B0000
heap
page read and write
1064000
trusted library allocation
page read and write
2968000
trusted library allocation
page read and write
531B000
stack
page read and write
B60000
heap
page read and write
5E7E000
stack
page read and write
975000
trusted library allocation
page execute and read and write
1197000
heap
page read and write
2768000
trusted library allocation
page read and write
2DDD000
stack
page read and write
4B8D000
stack
page read and write
3FF9000
trusted library allocation
page read and write
4EA0000
heap
page execute and read and write
53AC000
stack
page read and write
28D0000
trusted library allocation
page read and write
3FF5000
trusted library allocation
page read and write
2779000
trusted library allocation
page read and write
4BF0000
heap
page read and write
AB0000
trusted library allocation
page execute and read and write
4BDD000
stack
page read and write
4A8D000
stack
page read and write
1530000
trusted library allocation
page read and write
112E000
stack
page read and write
503C000
stack
page read and write
4D0C000
stack
page read and write
24EA000
trusted library allocation
page read and write
4BF9000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
555F000
stack
page read and write
2FF1000
trusted library allocation
page read and write
F57000
trusted library allocation
page execute and read and write
2A5E000
trusted library allocation
page read and write
50CD000
stack
page read and write
53A0000
heap
page execute and read and write
5430000
trusted library allocation
page read and write
50EE000
stack
page read and write
1485000
heap
page read and write
CA0000
heap
page read and write
2E60000
heap
page execute and read and write
4CBD000
stack
page read and write
58DE000
stack
page read and write
1090000
trusted library allocation
page read and write
262E000
stack
page read and write
4ECE000
stack
page read and write
4E15000
stack
page read and write
522E000
stack
page read and write
5175000
trusted library allocation
page read and write
4A75000
trusted library allocation
page read and write
60C9000
heap
page read and write
5D3C000
stack
page read and write
AD0000
heap
page read and write
FA5000
heap
page read and write
FF5000
heap
page read and write
5E7E000
stack
page read and write
3645000
trusted library allocation
page read and write
2C91000
trusted library allocation
page read and write
3A49000
trusted library allocation
page read and write
3719000
trusted library allocation
page read and write
F34000
trusted library allocation
page read and write
4CE0000
trusted library allocation
page read and write
2A57000
trusted library allocation
page read and write
142A000
heap
page read and write
F24000
trusted library allocation
page read and write
9A0000
heap
page read and write
C2C000
stack
page read and write
5D4E000
stack
page read and write
2DF4000
trusted library allocation
page read and write
54D0000
heap
page read and write
FD0000
trusted library allocation
page execute and read and write
4BAC000
stack
page read and write
3C91000
trusted library allocation
page read and write
C80000
heap
page read and write
328E000
stack
page read and write
2E40000
heap
page execute and read and write
32A1000
trusted library allocation
page read and write
66DC000
stack
page read and write
1168000
heap
page read and write
2950000
heap
page read and write
F20000
trusted library allocation
page read and write
45BE000
stack
page read and write
27BD000
trusted library allocation
page read and write
5590000
trusted library allocation
page read and write
2E20000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
DB8000
heap
page read and write
4E50000
trusted library allocation
page read and write
2AAD000
trusted library allocation
page read and write
149F000
stack
page read and write
F30000
trusted library allocation
page read and write
5D8E000
stack
page read and write
1540000
trusted library allocation
page execute and read and write
DE0000
heap
page read and write
DDE000
stack
page read and write
526E000
stack
page read and write
950000
heap
page read and write
There are 804 hidden memdumps, click here to show them.