IOC Report

loading gif

Files

File Path
Type
Category
Malicious
AcqQhfewOu.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 61414 bytes, 1 file
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Users\user\AppData\Local\Packages\ActiveSync\LocalState\DiagOutputDir\SyncVerbose.etl
data
dropped
C:\Users\user\AppData\Local\Packages\ActiveSync\LocalState\DiagOutputDir\UnistackCircular.etl
data
dropped
C:\Users\user\AppData\Local\Packages\ActiveSync\LocalState\DiagOutputDir\UnistackCritical.etl
data
dropped
C:\Users\user\AppData\Local\packages\ActiveSync\LocalState\DiagOutputDir\SyncVerbose.etl.0001 (copy)
data
dropped
C:\Users\user\AppData\Local\packages\ActiveSync\LocalState\DiagOutputDir\UnistackCircular.etl.0001 (copy)
data
dropped
C:\Users\user\AppData\Local\packages\ActiveSync\LocalState\DiagOutputDir\UnistackCritical.etl.0001.. (copy)
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
modified
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\Logs\dosvc.20220129_053218_548.etl
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\AcqQhfewOu.dll"
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\AcqQhfewOu.dll",#1
malicious
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\AcqQhfewOu.dll
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\AcqQhfewOu.dll",#1
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\AcqQhfewOu.dll,DllRegisterServer
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k unistacksvcgroup
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\AcqQhfewOu.dll",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\AcqQhfewOu.dll",DllRegisterServer
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\AcqQhfewOu.dll",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Djsmmwcmcuia\eckzpotkamhct.nvm",ZQiLpZWuzZq
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Djsmmwcmcuia\eckzpotkamhct.nvm",DllRegisterServer
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 11 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
unknown
https://dev.ditu.live.com/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
unknown
https://dev.ditu.live.com/REST/v1/Transit/Stops/
unknown
https://t0.tiles.ditu.live.com/tiles/gen
unknown
https://dev.virtualearth.net/REST/v1/Routes/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Routes/Walking
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
unknown
https://139.196.72.155:8080/LxOwbxJjLlDuDmZNIqWlDEqayMdNGeerv
unknown
https://139.196.72.155/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
unknown
https://74.207.230.120:8080/ENixzmJjDXif3
unknown
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
unknown
https://%s.xboxlive.com
unknown
https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://74.207.230.120/
unknown
https://dev.virtualearth.net/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
unknown
https://139.196.72.155:8080/LxOwbxJjLlDuDmZNIqWlDEqayMdNGeervd
unknown
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
unknown
https://dynamic.t
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
unknown
http://logo.verisi
unknown
https://139.196.72.155/Sa
unknown
https://74.207.230.120:8080/ENixzmJjDXif
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
unknown
https://activity.windows.com
unknown
http://www.bingmapsportal.com
unknown
https://dev.ditu.live.com/REST/v1/Locations
unknown
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://%s.dnet.xboxlive.com
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
There are 31 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
207.148.81.119
unknown
United States
malicious
104.131.62.48
unknown
United States
malicious
198.199.98.78
unknown
United States
malicious
194.9.172.107
unknown
unknown
malicious
59.148.253.194
unknown
Hong Kong
malicious
74.207.230.120
unknown
United States
malicious
103.41.204.169
unknown
Indonesia
malicious
85.214.67.203
unknown
Germany
malicious
191.252.103.16
unknown
Brazil
malicious
168.197.250.14
unknown
Argentina
malicious
185.148.168.15
unknown
Germany
malicious
66.42.57.149
unknown
United States
malicious
139.196.72.155
unknown
China
malicious
217.182.143.207
unknown
France
malicious
203.153.216.46
unknown
Indonesia
malicious
159.69.237.188
unknown
Germany
malicious
116.124.128.206
unknown
Korea Republic of
malicious
37.59.209.141
unknown
France
malicious
78.46.73.125
unknown
Germany
malicious
210.57.209.142
unknown
Indonesia
malicious
185.148.168.220
unknown
Germany
malicious
54.37.228.122
unknown
France
malicious
185.168.130.138
unknown
Ukraine
malicious
190.90.233.66
unknown
Colombia
malicious
142.4.219.173
unknown
Canada
malicious
54.38.242.185
unknown
France
malicious
195.154.146.35
unknown
France
malicious
195.77.239.39
unknown
Spain
malicious
78.47.204.80
unknown
Germany
malicious
118.98.72.86
unknown
Indonesia
malicious
37.44.244.177
unknown
Germany
malicious
62.171.178.147
unknown
United Kingdom
malicious
128.199.192.135
unknown
United Kingdom
malicious
192.168.2.1
unknown
unknown
There are 24 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
MonthID

Memdumps

Base Address
Regiontype
Protect
Malicious
5540000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
4FD0000
trusted library allocation
page execute and read and write
malicious
3481000
trusted library allocation
page execute read
malicious
31F0000
trusted library allocation
page execute and read and write
malicious
4E41000
trusted library allocation
page execute read
malicious
4CA1000
trusted library allocation
page execute read
malicious
4F70000
trusted library allocation
page execute and read and write
malicious
4731000
trusted library allocation
page execute read
malicious
5201000
trusted library allocation
page execute read
malicious
5261000
trusted library allocation
page execute read
malicious
55A0000
trusted library allocation
page execute and read and write
malicious
4FA1000
trusted library allocation
page execute read
malicious
53E0000
trusted library allocation
page execute and read and write
malicious
4910000
trusted library allocation
page execute and read and write
malicious
5101000
trusted library allocation
page execute read
malicious
51D0000
trusted library allocation
page execute and read and write
malicious
5411000
trusted library allocation
page execute read
malicious
4700000
trusted library allocation
page execute and read and write
malicious
4830000
trusted library allocation
page execute and read and write
malicious
4D11000
trusted library allocation
page execute read
malicious
5571000
trusted library allocation
page execute read
malicious
56D1000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
4EE0000
trusted library allocation
page execute and read and write
malicious
BD0000
trusted library allocation
page execute and read and write
malicious
50D0000
trusted library allocation
page execute and read and write
malicious
4DF0000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
5800000
trusted library allocation
page execute and read and write
malicious
4730000
trusted library allocation
page execute and read and write
malicious
4AA1000
trusted library allocation
page execute read
malicious
4E21000
trusted library allocation
page execute read
malicious
4A70000
trusted library allocation
page execute and read and write
malicious
5230000
trusted library allocation
page execute and read and write
malicious
5261000
trusted library allocation
page execute read
malicious
4D50000
trusted library allocation
page execute and read and write
malicious
47F1000
trusted library allocation
page execute read
malicious
4D81000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
4CC0000
trusted library allocation
page execute and read and write
malicious
27A1000
trusted library allocation
page execute read
malicious
52C0000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
4C70000
trusted library allocation
page execute and read and write
malicious
5230000
trusted library allocation
page execute and read and write
malicious
4F11000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
10001000
unkown
page execute read
malicious
2770000
trusted library allocation
page execute and read and write
malicious
4C01000
trusted library allocation
page execute read
malicious
4CE0000
trusted library allocation
page execute and read and write
malicious
4941000
trusted library allocation
page execute read
malicious
4E10000
trusted library allocation
page execute and read and write
malicious
F01000
trusted library allocation
page execute read
malicious
5101000
trusted library allocation
page execute read
malicious
5831000
trusted library allocation
page execute read
malicious
29A1000
trusted library allocation
page execute read
malicious
4AD0000
trusted library allocation
page execute and read and write
malicious
28B0000
trusted library allocation
page execute and read and write
malicious
52F1000
trusted library allocation
page execute read
malicious
4861000
trusted library allocation
page execute read
malicious
4CF1000
trusted library allocation
page execute read
malicious
2D30000
heap
page read and write
ABE000
stack
page read and write
23A12C13000
unkown
page read and write
1E2502CC000
unkown
page read and write
3021000
heap
page read and write
27DA000
heap
page read and write
4770000
heap
page read and write
4770000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
2440000
heap
page read and write
5260000
trusted library allocation
page read and write
23A12BF0000
unkown
page read and write
EFF000
stack
page read and write
15A0CFA0000
heap
page read and write
23346241000
unkown
page read and write
4AA0000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
2FEA000
heap
page read and write
ABEFF7B000
stack
page read and write
92D897F000
stack
page read and write
4886000
trusted library allocation
page read and write
206CC200000
trusted library allocation
page read and write
24552AB000
stack
page read and write
15A0D313000
unkown
page read and write
1D25C849000
unkown
page read and write
4D30000
heap
page read and write
52B7000
trusted library allocation
page read and write
2A37000
heap
page read and write
46F1000
heap
page read and write
46F1000
heap
page read and write
3052000
heap
page read and write
2814000
heap
page read and write
1E4D3B00000
unkown
page read and write
52B8000
trusted library allocation
page read and write
206CC3B5000
heap
page read and write
2334625B000
unkown
page read and write
34A5000
trusted library allocation
page read and write
F60000
heap
page read and write
10000000
unkown
page readonly
C2554FE000
stack
page read and write
23BC000
stack
page read and write
23A12AF0000
heap
page read and write
4E66000
trusted library allocation
page read and write
1E250213000
unkown
page read and write
4FB3000
trusted library allocation
page read and write
C06B47E000
stack
page read and write
46F1000
heap
page read and write
2730000
trusted library allocation
page read and write
8BC04FB000
stack
page read and write
2DA0000
heap
page read and write
10057000
unkown
page read and write
23A12C02000
unkown
page read and write
4FC6000
trusted library allocation
page read and write
1E250010000
heap
page read and write
1005A000
unkown
page readonly
26B8966D000
unkown
page read and write
ABF067F000
stack
page read and write
2814000
heap
page read and write
2997000
heap
page read and write
2990000
heap
page read and write
92D8A7D000
stack
page read and write
2D4E000
stack
page read and write
1E4D3B13000
unkown
page read and write
4EB0000
heap
page read and write
92D8BFC000
stack
page read and write
2334627A000
unkown
page read and write
15A0D1E0000
unkown
page read and write
539F000
stack
page read and write
2814000
heap
page read and write
4FB1000
trusted library allocation
page read and write
4860000
trusted library allocation
page read and write
26B8967D000
unkown
page read and write
4E50000
trusted library allocation
page read and write
1E4D3A7F000
unkown
page read and write
4BD0000
heap
page read and write
15A0D302000
unkown
page read and write
4FC5000
trusted library allocation
page read and write
10053000
unkown
page read and write
4700000
heap
page read and write
206CC4B5000
heap
page read and write
2A7C000
heap
page read and write
4C00000
trusted library allocation
page read and write
10046000
unkown
page readonly
2814000
heap
page read and write
4FC4000
trusted library allocation
page read and write
1E4D38C0000
heap
page read and write
4CC6000
trusted library allocation
page read and write
26B89646000
unkown
page read and write
26B89657000
unkown
page read and write
4D36000
trusted library allocation
page read and write
4DE0000
heap
page read and write
206CC4B0000
heap
page read and write
10000000
unkown
page readonly
1D25C84B000
unkown
page read and write
1D25C6F0000
heap
page read and write
1E4D3A54000
unkown
page read and write
2D80000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
23346213000
unkown
page read and write
46F1000
heap
page read and write
5285000
trusted library allocation
page read and write
289C000
stack
page read and write
46F1000
heap
page read and write
2455AFF000
stack
page read and write
1E4D3A29000
unkown
page read and write
5260000
trusted library allocation
page read and write
23346229000
unkown
page read and write
15A0D202000
unkown
page read and write
4E00000
heap
page read and write
5200000
trusted library allocation
page read and write
5436000
trusted library allocation
page read and write
2DC0000
heap
page read and write
46F1000
heap
page read and write
46F1000
heap
page read and write
A10000
trusted library allocation
page read and write
4FB1000
trusted library allocation
page read and write
C2557FC000
stack
page read and write
5286000
trusted library allocation
page read and write
4FB1000
trusted library allocation
page read and write
27C5000
trusted library allocation
page read and write
23A12A90000
heap
page read and write
ABF077F000
stack
page read and write
1D25C900000
unkown
page read and write
295C000
stack
page read and write
472E000
stack
page read and write
24AD000
stack
page read and write
1D25C7D0000
remote allocation
page read and write
5290000
trusted library allocation
page read and write
8AC000
stack
page read and write
1E250229000
unkown
page read and write
26B89667000
unkown
page read and write
4D9D000
stack
page read and write
7B9C27F000
stack
page read and write
4B7E000
stack
page read and write
2FD0000
heap
page read and write
46F1000
heap
page read and write
26B8967A000
unkown
page read and write
46F1000
heap
page read and write
34C0000
heap
page read and write
206CC350000
heap
page read and write
2370000
remote allocation
page read and write
206CCE80000
trusted library allocation
page read and write
2814000
heap
page read and write
43A3000
heap
page read and write
2814000
heap
page read and write
23A12A80000
heap
page read and write
92D81AB000
stack
page read and write
10053000
unkown
page read and write
59570F9000
stack
page read and write
1E250080000
heap
page read and write
49ED000
stack
page read and write
2CD0000
heap
page read and write
33B1000
heap
page read and write
2A30000
heap
page read and write
4BBF000
stack
page read and write
10046000
unkown
page readonly
5856000
trusted library allocation
page read and write
2814000
heap
page read and write
553D000
stack
page read and write
3381000
heap
page read and write
10000000
unkown
page readonly
ABF097F000
stack
page read and write
4CA0000
trusted library allocation
page read and write
2D1A000
stack
page read and write
1E4D4202000
unkown
page read and write
46F1000
heap
page read and write
2814000
heap
page read and write
46F1000
heap
page read and write
2A7C000
heap
page read and write
1D25C872000
unkown
page read and write
4E50000
remote allocation
page read and write
52F0000
trusted library allocation
page read and write
2FCE000
stack
page read and write
1090000
heap
page read and write
55A0000
trusted library allocation
page read and write
4E9E000
stack
page read and write
2900000
remote allocation
page read and write
26B8965C000
unkown
page read and write
4903000
heap
page read and write
26B89638000
unkown
page read and write
3340000
heap
page read and write
3220000
heap
page read and write
5956CDB000
stack
page read and write
27D0000
heap
page read and write
7B9BBCE000
stack
page read and write
1D25C865000
unkown
page read and write
8BBFFCB000
stack
page read and write
46F1000
heap
page read and write
46F0000
heap
page read and write
26B89640000
unkown
page read and write
595717E000
stack
page read and write
C2555FE000
stack
page read and write
2510000
remote allocation
page read and write
4756000
trusted library allocation
page read and write
4AC5000
trusted library allocation
page read and write
4EB3000
heap
page read and write
206CC370000
heap
page read and write
2A76000
heap
page read and write
C06B2FC000
stack
page read and write
A6E000
stack
page read and write
23346277000
unkown
page read and write
230D000
stack
page read and write
92D88FD000
stack
page read and write
4730000
trusted library allocation
page read and write
27C6000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
106F000
stack
page read and write
3037000
heap
page read and write
29EA000
heap
page read and write
ABF007E000
stack
page read and write
5570000
trusted library allocation
page read and write
1E250313000
unkown
page read and write
10046000
unkown
page readonly
26B8966F000
unkown
page read and write
33BF000
stack
page read and write
4FC4000
trusted library allocation
page read and write
2510000
remote allocation
page read and write
4FE5000
trusted library allocation
page read and write
10000000
unkown
page readonly
8BC03FC000
stack
page read and write
56F6000
trusted library allocation
page read and write
4E50000
remote allocation
page read and write
26B89613000
unkown
page read and write
206CC3BD000
heap
page read and write
2814000
heap
page read and write
29C6000
trusted library allocation
page read and write
C06B87D000
stack
page read and write
535E000
stack
page read and write
C06B57E000
stack
page read and write
2EB0000
heap
page read and write
26B89674000
unkown
page read and write
2814000
heap
page read and write
5125000
trusted library allocation
page read and write
15FEE000
trusted library allocation
page read and write
3046000
heap
page read and write
2814000
heap
page read and write
C06BB7F000
stack
page read and write
303C000
stack
page read and write
10DC000
heap
page read and write
4C25000
trusted library allocation
page read and write
1D25C813000
unkown
page read and write
4F2D000
stack
page read and write
7B9BF7E000
stack
page read and write
1E4D3A4D000
unkown
page read and write
3480000
trusted library allocation
page read and write
4FC4000
trusted library allocation
page read and write
ABF057F000
stack
page read and write
23A12D02000
unkown
page read and write
2F80000
remote allocation
page read and write
4E40000
trusted library allocation
page read and write
5435000
trusted library allocation
page read and write
24557FB000
stack
page read and write
206CC330000
heap
page read and write
5410000
trusted library allocation
page read and write
467F000
stack
page read and write
51CF000
stack
page read and write
310E000
stack
page read and write
2814000
heap
page read and write
4DA6000
trusted library allocation
page read and write
7B9C17E000
stack
page read and write
C06B6FC000
stack
page read and write
29C5000
trusted library allocation
page read and write
1E250B00000
unkown
page read and write
3080000
heap
page read and write
26B89600000
unkown
page read and write
5316000
trusted library allocation
page read and write
24EB000
stack
page read and write
4F51000
trusted library allocation
page read and write
4BCC000
stack
page read and write
4FE5000
trusted library allocation
page read and write
4D35000
trusted library allocation
page read and write
1D25C6E0000
heap
page read and write
92D867F000
stack
page read and write
5100000
trusted library allocation
page read and write
23A12C29000
unkown
page read and write
46F1000
heap
page read and write
26B89675000
unkown
page read and write
4816000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
2AC9000
heap
page read and write
28AA000
heap
page read and write
4FE5000
trusted library allocation
page read and write
2370000
remote allocation
page read and write
206CC3BD000
heap
page read and write
2814000
heap
page read and write
2814000
heap
page read and write
2814000
heap
page read and write
46F1000
heap
page read and write
334A000
heap
page read and write
2814000
heap
page read and write
1E4D3B08000
unkown
page read and write
360E000
stack
page read and write
2814000
heap
page read and write
7B9BB4E000
stack
page read and write
2814000
heap
page read and write
2814000
heap
page read and write
1E4D3A00000
unkown
page read and write
30D0000
trusted library allocation
page read and write
5225000
trusted library allocation
page read and write
23A13280000
remote allocation
page read and write
1005A000
unkown
page readonly
2814000
heap
page read and write
29A0000
trusted library allocation
page read and write
109B000
heap
page read and write
3251000
heap
page read and write
2900000
remote allocation
page read and write
8BC07FC000
stack
page read and write
3066000
heap
page read and write
5855000
trusted library allocation
page read and write
4FE5000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page read and write
4815000
trusted library allocation
page read and write
206CCF00000
trusted library allocation
page read and write
26B89684000
unkown
page read and write
23A12C00000
unkown
page read and write
10090000
trusted library allocation
page read and write
26B8964E000
unkown
page read and write
206CD170000
trusted library allocation
page read and write
15A0D268000
unkown
page read and write
59571F9000
stack
page read and write
49AE000
stack
page read and write
26B89645000
unkown
page read and write
2814000
heap
page read and write
4D10000
trusted library allocation
page read and write
23A12C58000
unkown
page read and write
15A0D213000
unkown
page read and write
10000000
unkown
page readonly
ABF017B000
stack
page read and write
518E000
stack
page read and write
46F1000
heap
page read and write
2A23000
heap
page read and write
4DA5000
trusted library allocation
page read and write
15FEE000
trusted library allocation
page read and write
46F1000
heap
page read and write
26B89663000
unkown
page read and write
2998000
stack
page read and write
10046000
unkown
page readonly
206CC3BD000
heap
page read and write
2630000
heap
page read and write
206CCE90000
trusted library allocation
page read and write
46F1000
heap
page read and write
5285000
trusted library allocation
page read and write
4D30000
heap
page read and write
1D25C902000
unkown
page read and write
26B8962F000
unkown
page read and write
4CC5000
trusted library allocation
page read and write
1E250020000
heap
page read and write
23A13402000
unkown
page read and write
26B89702000
unkown
page read and write
5315000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
328A000
heap
page read and write
2DF5000
heap
page read and write
1D25C85A000
unkown
page read and write
2A76000
heap
page read and write
26B89641000
unkown
page read and write
46F1000
heap
page read and write
501E000
trusted library allocation
page read and write
2814000
heap
page read and write
4680000
trusted library allocation
page read and write
4CF0000
trusted library allocation
page read and write
1E4D3B02000
unkown
page read and write
2A33000
heap
page read and write
5044000
trusted library allocation
page read and write
15A0D802000
unkown
page read and write
5126000
trusted library allocation
page read and write
4FB1000
trusted library allocation
page read and write
4FC8000
trusted library allocation
page read and write
22A0000
heap
page read and write
4DDC000
stack
page read and write
4D03000
heap
page read and write
2A5A000
heap
page read and write
206CC4B9000
heap
page read and write
2350000
heap
page read and write
10053000
unkown
page read and write
4D16000
trusted library allocation
page read and write
15A0D300000
unkown
page read and write
2FD5000
heap
page read and write
2FE0000
heap
page read and write
4F35000
trusted library allocation
page read and write
2814000
heap
page read and write
4FA0000
trusted library allocation
page read and write
206CC3DB000
heap
page read and write
7B9BACB000
stack
page read and write
C06BA7D000
stack
page read and write
23A13280000
remote allocation
page read and write
48CD000
stack
page read and write
1D25C856000
unkown
page read and write
28DB000
stack
page read and write
46F1000
heap
page read and write
1005A000
unkown
page readonly
1D25C85B000
unkown
page read and write
2814000
heap
page read and write
1005A000
unkown
page readonly
10046000
unkown
page readonly
500D000
trusted library allocation
page read and write
5125000
trusted library allocation
page read and write
2DE3000
heap
page read and write
28A0000
heap
page read and write
4FBF000
trusted library allocation
page read and write
26B89480000
heap
page read and write
547E000
stack
page read and write
2AE0000
heap
page read and write
26B89669000
unkown
page read and write
56D0000
trusted library allocation
page read and write
2D0F000
stack
page read and write
1D25C850000
unkown
page read and write
10053000
unkown
page read and write
23A12C40000
unkown
page read and write
1D25C84A000
unkown
page read and write
2CD0000
trusted library allocation
page read and write
4885000
trusted library allocation
page read and write
10000000
unkown
page readonly
2900000
remote allocation
page read and write
4940000
trusted library allocation
page read and write
4DA3000
heap
page read and write
26B8965F000
unkown
page read and write
321A000
heap
page read and write
206CCEF0000
trusted library allocation
page read and write
2A37000
heap
page read and write
26B89644000
unkown
page read and write
233460D0000
heap
page read and write
1D25C7A0000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
46F1000
heap
page read and write
4C60000
heap
page read and write
ABF037F000
stack
page read and write
29E0000
heap
page read and write
2F80000
remote allocation
page read and write
29EE000
stack
page read and write
206CD1C0000
trusted library allocation
page read and write
23346275000
unkown
page read and write
C2556FC000
stack
page read and write
1D25C780000
unkown
page read and write
46F1000
heap
page read and write
2510000
remote allocation
page read and write
1E250302000
unkown
page read and write
ABF087E000
stack
page read and write
7B9C07E000
stack
page read and write
2814000
heap
page read and write
4D00000
heap
page read and write
206CC377000
heap
page read and write
4E46000
trusted library allocation
page read and write
10057000
unkown
page read and write
4CBE000
stack
page read and write
31F0000
heap
page read and write
5286000
trusted library allocation
page read and write
4E0E000
stack
page read and write
26B89632000
unkown
page read and write
4E45000
trusted library allocation
page read and write
C06B5FC000
stack
page read and write
2814000
heap
page read and write
4FE5000
trusted library allocation
page read and write
2814000
heap
page read and write
206CD150000
heap
page readonly
15A0D010000
heap
page read and write
1E250A02000
unkown
page read and write
2DF0000
heap
page read and write
2F59000
stack
page read and write
46F1000
heap
page read and write
2814000
heap
page read and write
4EDF000
stack
page read and write
29A0000
heap
page read and write
4C7E000
stack
page read and write
4760000
heap
page read and write
4E20000
trusted library allocation
page read and write
15A0D228000
unkown
page read and write
4B00000
trusted library allocation
page read and write
23346170000
unkown
page read and write
2830000
heap
page read and write
10000000
unkown
page readonly
15A0CFB0000
heap
page read and write
10053000
unkown
page read and write
2FC0000
trusted library allocation
page read and write
234B000
stack
page read and write
43A0000
heap
page read and write
2680000
heap
page read and write
46F1000
heap
page read and write
26B89662000
unkown
page read and write
46F1000
heap
page read and write
23A13280000
remote allocation
page read and write
1D25C83E000
unkown
page read and write
2A7C000
heap
page read and write
56F5000
trusted library allocation
page read and write
26B8964A000
unkown
page read and write
10057000
unkown
page read and write
52B8000
trusted library allocation
page read and write
46F1000
heap
page read and write
5100000
trusted library allocation
page read and write
4CDD000
stack
page read and write
23346202000
unkown
page read and write
24558FB000
stack
page read and write
4DA0000
heap
page read and write
490B000
stack
page read and write
F26000
trusted library allocation
page read and write
1E250180000
unkown
page read and write
10046000
unkown
page readonly
840000
heap
page read and write
2DAF000
stack
page read and write
1E4D38B0000
heap
page read and write
C06B77B000
stack
page read and write
2AB3000
heap
page read and write
1005A000
unkown
page readonly
46F1000
heap
page read and write
26B8965E000
unkown
page read and write
3223000
heap
page read and write
1D25C802000
unkown
page read and write
4DCE000
stack
page read and write
4FE5000
trusted library allocation
page read and write
2980000
heap
page read and write
4900000
heap
page read and write
4EAE000
stack
page read and write
4FC4000
trusted library allocation
page read and write
26B8962D000
unkown
page read and write
2814000
heap
page read and write
4E50000
remote allocation
page read and write
4FC4000
trusted library allocation
page read and write
2D60000
heap
page read and write
2620000
remote allocation
page read and write
26B89659000
unkown
page read and write
1D25C800000
unkown
page read and write
2550000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
28E0000
heap
page read and write
1E4D3A3C000
unkown
page read and write
25E0000
heap
page read and write
1D25E402000
unkown
page read and write
46F1000
heap
page read and write
26B8965A000
unkown
page read and write
206CD140000
trusted library allocation
page read and write
1E250200000
unkown
page read and write
C25507C000
stack
page read and write
1D25E270000
trusted library allocation
page read and write
24559FF000
stack
page read and write
1E4D3A70000
unkown
page read and write
8BC06FE000
stack
page read and write
4CAF000
stack
page read and write
4F77000
trusted library allocation
page read and write
438E000
stack
page read and write
46F1000
heap
page read and write
28F0000
heap
page read and write
5957079000
stack
page read and write
26B8963D000
unkown
page read and write
27A0000
trusted library allocation
page read and write
C25527D000
stack
page read and write
2620000
remote allocation
page read and write
10053000
unkown
page read and write
15A0D263000
unkown
page read and write
C2553FF000
stack
page read and write
8BC05F7000
stack
page read and write
26B89629000
unkown
page read and write
4350000
trusted library allocation
page read and write
3210000
heap
page read and write
23346302000
unkown
page read and write
26B895F0000
unkown
page read and write
46F1000
heap
page read and write
26B8967E000
unkown
page read and write
23346140000
heap
page read and write
2ACB000
heap
page read and write
4FC4000
trusted library allocation
page read and write
46F1000
heap
page read and write
23346A02000
unkown
page read and write
2814000
heap
page read and write
2A5A000
heap
page read and write
4E4E000
stack
page read and write
331E000
stack
page read and write
ABEFB7B000
stack
page read and write
C06AEFC000
stack
page read and write
26B89661000
unkown
page read and write
4966000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
1D25C826000
unkown
page read and write
4E8F000
stack
page read and write
10053000
unkown
page read and write
5044000
trusted library allocation
page read and write
2DAA000
heap
page read and write
233460E0000
heap
page read and write
3280000
heap
page read and write
4AC6000
trusted library allocation
page read and write
46F1000
heap
page read and write
5595000
trusted library allocation
page read and write
2A5A000
heap
page read and write
26B89679000
unkown
page read and write
15A0D200000
unkown
page read and write
1E4D3A8B000
unkown
page read and write
2AC9000
heap
page read and write
2814000
heap
page read and write
2814000
heap
page read and write
46F7000
heap
page read and write
46F1000
heap
page read and write
46F1000
heap
page read and write
55D0000
trusted library allocation
page read and write
46F1000
heap
page read and write
4F36000
trusted library allocation
page read and write
4F6C000
stack
page read and write
4F78000
trusted library allocation
page read and write
54BE000
stack
page read and write
32C8000
heap
page read and write
2620000
remote allocation
page read and write
4C26000
trusted library allocation
page read and write
46F1000
heap
page read and write
ABF047D000
stack
page read and write
1D25C750000
heap
page read and write
4FC4000
trusted library allocation
page read and write
F25000
trusted library allocation
page read and write
31AE000
stack
page read and write
2810000
heap
page read and write
2814000
heap
page read and write
4BC0000
trusted library allocation
page read and write
B4FE000
trusted library allocation
page read and write
4EEE000
stack
page read and write
2AC9000
heap
page read and write
C2559FE000
stack
page read and write
3398000
heap
page read and write
26B8963B000
unkown
page read and write
4D15000
trusted library allocation
page read and write
2C70000
heap
page read and write
2CDC000
stack
page read and write
31EE000
stack
page read and write
28F0000
trusted library allocation
page read and write
4843000
heap
page read and write
3160000
heap
page read and write
1D25C859000
unkown
page read and write
23B0000
trusted library allocation
page read and write
C06B97F000
stack
page read and write
1E4D3A4F000
unkown
page read and write
2F1C000
stack
page read and write
3610000
heap
page read and write
1005A000
unkown
page readonly
15A0D251000
unkown
page read and write
26B894F0000
heap
page read and write
10057000
unkown
page read and write
54FD000
stack
page read and write
26B8966B000
unkown
page read and write
4755000
trusted library allocation
page read and write
15A0D240000
unkown
page read and write
1E4D3A13000
unkown
page read and write
46F1000
heap
page read and write
206CC4C0000
trusted library allocation
page read and write
26B89490000
heap
page read and write
5291000
trusted library allocation
page read and write
2F80000
remote allocation
page read and write
314F000
stack
page read and write
206CC1F0000
heap
page read and write
47F0000
trusted library allocation
page read and write
1E4D3920000
heap
page read and write
46F1000
heap
page read and write
46F1000
heap
page read and write
26B89E02000
unkown
page read and write
26B89642000
unkown
page read and write
1E25026F000
unkown
page read and write
8BC02FE000
stack
page read and write
10057000
unkown
page read and write
4FC8000
trusted library allocation
page read and write
1D25C82A000
unkown
page read and write
10046000
unkown
page readonly
46F1000
heap
page read and write
1D25C7D0000
remote allocation
page read and write
8BC027E000
stack
page read and write
23346313000
unkown
page read and write
307B000
stack
page read and write
482E000
stack
page read and write
23346200000
unkown
page read and write
5000000
trusted library allocation
page read and write
10090000
trusted library allocation
page read and write
4FB1000
trusted library allocation
page read and write
26B89664000
unkown
page read and write
26B89658000
unkown
page read and write
4F88000
trusted library allocation
page read and write
1D25E2B0000
trusted library allocation
page read and write
4840000
heap
page read and write
4965000
trusted library allocation
page read and write
1E4D3A49000
unkown
page read and write
15A0D245000
unkown
page read and write
2A76000
heap
page read and write
2814000
heap
page read and write
34A6000
trusted library allocation
page read and write
4C6E000
stack
page read and write
10057000
unkown
page read and write
9AB000
stack
page read and write
1E250243000
unkown
page read and write
2370000
remote allocation
page read and write
2814000
heap
page read and write
23FB000
stack
page read and write
3150000
trusted library allocation
page read and write
4820000
heap
page read and write
4AEE000
stack
page read and write
1E2502C4000
unkown
page read and write
1E2502BB000
unkown
page read and write
30F0000
heap
page read and write
1D25C913000
unkown
page read and write
1D25C883000
unkown
page read and write
5596000
trusted library allocation
page read and write
326E000
stack
page read and write
32C5000
heap
page read and write
2DE6000
heap
page read and write
1D25C7D0000
remote allocation
page read and write
2580000
heap
page read and write
92D86FC000
stack
page read and write
4D80000
trusted library allocation
page read and write
4B2E000
stack
page read and write
5830000
trusted library allocation
page read and write
46F1000
heap
page read and write
2D7E000
stack
page read and write
5126000
trusted library allocation
page read and write
26B89660000
unkown
page read and write
15A0D279000
unkown
page read and write
1D25C918000
unkown
page read and write
10057000
unkown
page read and write
4710000
heap
page read and write
4FCF000
trusted library allocation
page read and write
206CD160000
trusted library allocation
page read and write
4C70000
trusted library allocation
page read and write
4E65000
trusted library allocation
page read and write
1005A000
unkown
page readonly
1E250287000
unkown
page read and write
26B8967B000
unkown
page read and write
1E4D4080000
unkown
page read and write
There are 771 hidden memdumps, click here to show them.