IOC Report

loading gif

Files

File Path
Type
Category
Malicious
GULPPYUMBy.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 61414 bytes, 1 file
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\GULPPYUMBy.dll"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\GULPPYUMBy.dll",#1
malicious
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\GULPPYUMBy.dll
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\GULPPYUMBy.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\GULPPYUMBy.dll,DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\GULPPYUMBy.dll",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\GULPPYUMBy.dll",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\GULPPYUMBy.dll",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Cpfkhipfqaawt\mtkslow.ijp",ARGENi
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Cpfkhipfqaawt\mtkslow.ijp",DllRegisterServer
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://www.tiktok.com/legal/report
unknown
https://www.tiktok.com/legal/report/feedback
unknown
http://ctldl.windowsupdaZ
unknown
http://help.disneyplus.com.
unknown
https://disneyplus.com/legal.
unknown

IPs

IP
Domain
Country
Malicious
207.148.81.119
unknown
United States
malicious
104.131.62.48
unknown
United States
malicious
198.199.98.78
unknown
United States
malicious
194.9.172.107
unknown
unknown
malicious
59.148.253.194
unknown
Hong Kong
malicious
74.207.230.120
unknown
United States
malicious
103.41.204.169
unknown
Indonesia
malicious
85.214.67.203
unknown
Germany
malicious
191.252.103.16
unknown
Brazil
malicious
168.197.250.14
unknown
Argentina
malicious
185.148.168.15
unknown
Germany
malicious
66.42.57.149
unknown
United States
malicious
139.196.72.155
unknown
China
malicious
217.182.143.207
unknown
France
malicious
203.153.216.46
unknown
Indonesia
malicious
159.69.237.188
unknown
Germany
malicious
116.124.128.206
unknown
Korea Republic of
malicious
37.59.209.141
unknown
France
malicious
78.46.73.125
unknown
Germany
malicious
210.57.209.142
unknown
Indonesia
malicious
185.148.168.220
unknown
Germany
malicious
54.37.228.122
unknown
France
malicious
185.168.130.138
unknown
Ukraine
malicious
190.90.233.66
unknown
Colombia
malicious
142.4.219.173
unknown
Canada
malicious
54.38.242.185
unknown
France
malicious
195.154.146.35
unknown
France
malicious
195.77.239.39
unknown
Spain
malicious
78.47.204.80
unknown
Germany
malicious
118.98.72.86
unknown
Indonesia
malicious
37.44.244.177
unknown
Germany
malicious
62.171.178.147
unknown
United Kingdom
malicious
128.199.192.135
unknown
United Kingdom
malicious
There are 23 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4800000
trusted library allocation
page execute and read and write
malicious
4BD1000
trusted library allocation
page execute read
malicious
4E61000
trusted library allocation
page execute read
malicious
5CF1000
trusted library allocation
page execute read
malicious
55F0000
trusted library allocation
page execute and read and write
malicious
4A11000
trusted library allocation
page execute read
malicious
3100000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
3131000
trusted library allocation
page execute read
malicious
5A81000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
5C40000
trusted library allocation
page execute and read and write
malicious
4CF0000
trusted library allocation
page execute and read and write
malicious
E30000
trusted library allocation
page execute and read and write
malicious
5A50000
trusted library allocation
page execute and read and write
malicious
3670000
trusted library allocation
page execute and read and write
malicious
690000
trusted library allocation
page execute and read and write
malicious
4F90000
trusted library allocation
page execute and read and write
malicious
4D21000
trusted library allocation
page execute read
malicious
3621000
trusted library allocation
page execute read
malicious
5CC0000
trusted library allocation
page execute and read and write
malicious
3361000
trusted library allocation
page execute read
malicious
5960000
trusted library allocation
page execute and read and write
malicious
BC0000
trusted library allocation
page execute and read and write
malicious
D61000
trusted library allocation
page execute read
malicious
D61000
trusted library allocation
page execute read
malicious
751000
trusted library allocation
page execute read
malicious
4A40000
trusted library allocation
page execute and read and write
malicious
4B71000
trusted library allocation
page execute read
malicious
5991000
trusted library allocation
page execute read
malicious
5650000
trusted library allocation
page execute and read and write
malicious
4B70000
trusted library allocation
page execute and read and write
malicious
32F0000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
49A1000
trusted library allocation
page execute read
malicious
4961000
trusted library allocation
page execute read
malicious
4831000
trusted library allocation
page execute read
malicious
5C71000
trusted library allocation
page execute read
malicious
5621000
trusted library allocation
page execute read
malicious
E21000
trusted library allocation
page execute read
malicious
49E0000
trusted library allocation
page execute and read and write
malicious
5490000
trusted library allocation
page execute and read and write
malicious
4D30000
trusted library allocation
page execute and read and write
malicious
4FC1000
trusted library allocation
page execute read
malicious
5781000
trusted library allocation
page execute read
malicious
4D01000
trusted library allocation
page execute read
malicious
890000
trusted library allocation
page execute and read and write
malicious
4BA0000
trusted library allocation
page execute and read and write
malicious
5840000
trusted library allocation
page execute and read and write
malicious
54C1000
trusted library allocation
page execute read
malicious
4301000
trusted library allocation
page execute read
malicious
4BA1000
trusted library allocation
page execute read
malicious
35F0000
trusted library allocation
page execute and read and write
malicious
4790000
trusted library allocation
page execute and read and write
malicious
CA0000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
42D0000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
4CD0000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
10001000
unkown
page execute read
malicious
5871000
trusted library allocation
page execute read
malicious
51D1000
trusted library allocation
page execute read
malicious
1D4C1850000
heap
page read and write
A25000
heap
page read and write
CD0000
remote allocation
page read and write
10046000
unkown
page readonly
4B70000
trusted library allocation
page read and write
1EE39402000
unkown
page read and write
5AA5000
trusted library allocation
page read and write
1CF63A5B000
unkown
page read and write
1EE3957D000
unkown
page read and write
B42000
heap
page read and write
2FBA277000
stack
page read and write
553C27E000
stack
page read and write
1EE38C4E000
unkown
page read and write
54E5000
trusted library allocation
page read and write
3354000
heap
page read and write
48B0000
trusted library allocation
page read and write
1EE38C88000
unkown
page read and write
2923598B000
heap
page read and write
3354000
heap
page read and write
52D1000
heap
page read and write
BD0000
heap
page read and write
3354000
heap
page read and write
3354000
heap
page read and write
1EE39585000
unkown
page read and write
46BE000
stack
page read and write
5B3F000
trusted library allocation
page read and write
8DA000
heap
page read and write
2F20000
heap
page read and write
5C96000
trusted library allocation
page read and write
4C0E000
stack
page read and write
34C6000
heap
page read and write
5A0E000
stack
page read and write
292359AE000
heap
page read and write
775000
trusted library allocation
page read and write
350000
remote allocation
page read and write
1EE39564000
unkown
page read and write
355C000
heap
page read and write
280000
heap
page read and write
3556000
heap
page read and write
1EE38C29000
unkown
page read and write
730000
heap
page read and write
2D00000
heap
page read and write
3130000
trusted library allocation
page read and write
3354000
heap
page read and write
49A0000
trusted library allocation
page read and write
52D3000
heap
page read and write
E40000
heap
page read and write
10000000
unkown
page readonly
5BAA000
trusted library allocation
page read and write
1CF63A00000
unkown
page read and write
1EE38CAF000
unkown
page read and write
3354000
heap
page read and write
2ED0000
heap
page read and write
10000000
unkown
page readonly
5B4C000
trusted library allocation
page read and write
CAB000
stack
page read and write
5D16000
trusted library allocation
page read and write
3354000
heap
page read and write
3FB000
stack
page read and write
553C87E000
stack
page read and write
1ED91849000
unkown
page read and write
1005A000
unkown
page readonly
10053000
unkown
page read and write
10057000
unkown
page read and write
1D4C1A5C000
unkown
page read and write
1EE38C13000
unkown
page read and write
2116A002000
unkown
page read and write
5AC1000
trusted library allocation
page read and write
1EE39580000
unkown
page read and write
3470000
heap
page read and write
2D10000
heap
page read and write
292359C1000
heap
page read and write
C42D77F000
stack
page read and write
34E9000
heap
page read and write
5D47000
trusted library allocation
page read and write
4830000
trusted library allocation
page read and write
1CF63A80000
unkown
page read and write
7AB000
heap
page read and write
3354000
heap
page read and write
52D1000
heap
page read and write
52D1000
heap
page read and write
1CF63A82000
unkown
page read and write
350000
heap
page read and write
1EE38CDD000
unkown
page read and write
3354000
heap
page read and write
553C3FB000
stack
page read and write
3505000
heap
page read and write
1D4C1B08000
unkown
page read and write
5B2D000
trusted library allocation
page read and write
51CE000
stack
page read and write
2FB9E7B000
stack
page read and write
1EE39596000
unkown
page read and write
5AE5000
trusted library allocation
page read and write
10053000
unkown
page read and write
1EE3958E000
unkown
page read and write
3354000
heap
page read and write
1ED91847000
unkown
page read and write
C00000
heap
page read and write
1EE38D02000
unkown
page read and write
CD0000
remote allocation
page read and write
5B4C000
trusted library allocation
page read and write
AC0000
heap
page read and write
5B1D000
trusted library allocation
page read and write
A8E000
stack
page read and write
4855000
trusted library allocation
page read and write
1EE38C48000
unkown
page read and write
1EE395AE000
unkown
page read and write
DB0000
heap
page read and write
B32000
heap
page read and write
4950000
heap
page read and write
10000000
unkown
page readonly
E46000
trusted library allocation
page read and write
10053000
unkown
page read and write
2960000
heap
page read and write
7C5000
heap
page read and write
70E000
stack
page read and write
1EE3957D000
unkown
page read and write
1EE395AD000
unkown
page read and write
1ED91886000
unkown
page read and write
31F1000
heap
page read and write
1EE39598000
unkown
page read and write
2FBA2FE000
stack
page read and write
5C70000
trusted library allocation
page read and write
1EE39585000
unkown
page read and write
1CF63A5F000
unkown
page read and write
1EE395A7000
unkown
page read and write
4FE5000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
29235980000
heap
page read and write
2FBA5FF000
stack
page read and write
3354000
heap
page read and write
4C4E000
stack
page read and write
4B4E000
stack
page read and write
B01000
heap
page read and write
E10000
heap
page read and write
3620000
trusted library allocation
page read and write
2FBA4FF000
stack
page read and write
553C677000
stack
page read and write
3070000
heap
page read and write
499E000
stack
page read and write
1005A000
unkown
page readonly
2F00000
trusted library allocation
page read and write
350B000
heap
page read and write
1EE39A02000
unkown
page read and write
59C0000
remote allocation
page read and write
BF0000
heap
page read and write
3354000
heap
page read and write
10053000
unkown
page read and write
88C000
stack
page read and write
820000
heap
page read and write
2116A03C000
unkown
page read and write
2FA0000
remote allocation
page read and write
E20000
trusted library allocation
page read and write
52E0000
heap
page read and write
5AE4000
trusted library allocation
page read and write
3354000
heap
page read and write
29235991000
heap
page read and write
1EE38D16000
unkown
page read and write
1EE39A02000
unkown
page read and write
3354000
heap
page read and write
4BC6000
trusted library allocation
page read and write
872CEFB000
stack
page read and write
328000
stack
page read and write
776000
trusted library allocation
page read and write
3354000
heap
page read and write
872CF7E000
stack
page read and write
1D4C1A13000
unkown
page read and write
3663000
heap
page read and write
B26000
heap
page read and write
52D1000
heap
page read and write
553C4FB000
stack
page read and write
D86000
trusted library allocation
page read and write
54E6000
trusted library allocation
page read and write
C42D67E000
stack
page read and write
D85000
trusted library allocation
page read and write
5B1D000
trusted library allocation
page read and write
52D1000
heap
page read and write
7BE000
stack
page read and write
491E000
stack
page read and write
1CF63A13000
unkown
page read and write
A2FE000
trusted library allocation
page read and write
99E000
stack
page read and write
10000000
unkown
page readonly
718797E000
stack
page read and write
2EBB000
stack
page read and write
1EE38C3C000
unkown
page read and write
3354000
heap
page read and write
10046000
unkown
page readonly
3354000
heap
page read and write
1EE39596000
unkown
page read and write
E20000
heap
page read and write
29235940000
heap
page read and write
54C0000
trusted library allocation
page read and write
4C8E000
stack
page read and write
1EE39940000
remote allocation
page read and write
B5C000
stack
page read and write
1EE395CD000
unkown
page read and write
1EE39588000
unkown
page read and write
59B6000
trusted library allocation
page read and write
2EC0000
remote allocation
page read and write
B30000
trusted library allocation
page read and write
6D0000
trusted library allocation
page read and write
10057000
unkown
page read and write
1EE39566000
unkown
page read and write
1ED9187F000
unkown
page read and write
52D1000
heap
page read and write
5B28000
trusted library allocation
page read and write
64E000
stack
page read and write
52D1000
heap
page read and write
553C77E000
stack
page read and write
1D4C1A59000
unkown
page read and write
477F000
stack
page read and write
21169DD0000
heap
page read and write
3354000
heap
page read and write
3190000
heap
page read and write
1D4C1A64000
unkown
page read and write
1ED92002000
unkown
page read and write
1EE38C56000
unkown
page read and write
2C70000
trusted library allocation
page read and write
21169E30000
heap
page read and write
1EE3957D000
unkown
page read and write
3354000
heap
page read and write
1EE39584000
unkown
page read and write
5B2D000
trusted library allocation
page read and write
E2E000
stack
page read and write
1EE39585000
unkown
page read and write
4B90000
heap
page read and write
718767E000
stack
page read and write
3354000
heap
page read and write
C42D8FE000
stack
page read and write
52D1000
heap
page read and write
4FB000
stack
page read and write
3354000
heap
page read and write
936000
heap
page read and write
1EE38CD4000
unkown
page read and write
6C0000
heap
page read and write
5B22000
trusted library allocation
page read and write
583E000
stack
page read and write
5AC0000
trusted library allocation
page read and write
21169DC0000
heap
page read and write
10000000
unkown
page readonly
3354000
heap
page read and write
3354000
heap
page read and write
1EE39598000
unkown
page read and write
52D1000
heap
page read and write
3354000
heap
page read and write
1EE38CEC000
unkown
page read and write
46FF000
stack
page read and write
1EE3957F000
unkown
page read and write
911000
heap
page read and write
4300000
trusted library allocation
page read and write
1EE39500000
unkown
page read and write
3050000
heap
page read and write
872D47E000
stack
page read and write
3354000
heap
page read and write
1D4C1840000
heap
page read and write
5620000
trusted library allocation
page read and write
4D25000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
3350000
heap
page read and write
52D1000
heap
page read and write
920000
heap
page read and write
3354000
heap
page read and write
1EE38CC3000
unkown
page read and write
58B0000
heap
page read and write
3354000
heap
page read and write
1D4C1A5F000
unkown
page read and write
1D4C1A3C000
unkown
page read and write
1EE39584000
unkown
page read and write
2C3A000
stack
page read and write
92A000
heap
page read and write
3556000
heap
page read and write
1EE38BE0000
heap
page read and write
2FB9D7E000
stack
page read and write
4960000
trusted library allocation
page read and write
1CF63A61000
unkown
page read and write
2FCA000
heap
page read and write
1EE38B70000
heap
page read and write
5B1D000
trusted library allocation
page read and write
5A4E000
stack
page read and write
1EE3957D000
unkown
page read and write
3354000
heap
page read and write
3354000
heap
page read and write
3561000
heap
page read and write
A0A337E000
stack
page read and write
3570000
trusted library allocation
page read and write
8D0000
heap
page read and write
4B93000
heap
page read and write
1EE39518000
unkown
page read and write
355C000
heap
page read and write
52D1000
heap
page read and write
10046000
unkown
page readonly
5B1D000
trusted library allocation
page read and write
1EE395AD000
unkown
page read and write
2FE0000
trusted library allocation
page read and write
1EE39588000
unkown
page read and write
1EE3957D000
unkown
page read and write
1EE38B80000
heap
page read and write
1EE39596000
unkown
page read and write
49C6000
trusted library allocation
page read and write
3354000
heap
page read and write
5B85000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
1D4C2202000
unkown
page read and write
4CCC000
stack
page read and write
3354000
heap
page read and write
3385000
trusted library allocation
page read and write
3561000
heap
page read and write
2116A102000
unkown
page read and write
F60000
heap
page read and write
1EE39940000
remote allocation
page read and write
31BA000
heap
page read and write
48DF000
stack
page read and write
1EE39585000
unkown
page read and write
3556000
heap
page read and write
3354000
heap
page read and write
3354000
heap
page read and write
961000
heap
page read and write
1CF63A5A000
unkown
page read and write
A0A377F000
stack
page read and write
30FF000
stack
page read and write
730000
heap
page read and write
1EE39A02000
unkown
page read and write
620000
remote allocation
page read and write
47FE000
stack
page read and write
2116A056000
unkown
page read and write
1EE39556000
unkown
page read and write
1EE38C55000
unkown
page read and write
110000
heap
page read and write
C42D3FA000
stack
page read and write
3BC000
stack
page read and write
10053000
unkown
page read and write
DED000
stack
page read and write
1D4C1B00000
unkown
page read and write
10057000
unkown
page read and write
1005A000
unkown
page readonly
3450000
heap
page read and write
A0A387F000
stack
page read and write
4393000
heap
page read and write
4D46000
trusted library allocation
page read and write
292359A5000
heap
page read and write
2D55000
heap
page read and write
1EE3956D000
unkown
page read and write
52D1000
heap
page read and write
52D1000
heap
page read and write
1EE39585000
unkown
page read and write
2116A100000
unkown
page read and write
292357F0000
heap
page read and write
540F000
stack
page read and write
872D77F000
stack
page read and write
1CF63B13000
unkown
page read and write
2FA0000
remote allocation
page read and write
552E000
stack
page read and write
3549000
heap
page read and write
A20000
heap
page read and write
3354000
heap
page read and write
5D21000
trusted library allocation
page read and write
BFF000
stack
page read and write
5AF3000
trusted library allocation
page read and write
1CF63B00000
unkown
page read and write
292359BF000
heap
page read and write
29235920000
heap
page read and write
5B1F000
trusted library allocation
page read and write
350000
remote allocation
page read and write
47BE000
stack
page read and write
A0A2FDF000
stack
page read and write
1CF63A02000
unkown
page read and write
5870000
trusted library allocation
page read and write
495E000
stack
page read and write
10057000
unkown
page read and write
3354000
heap
page read and write
51D0000
trusted library allocation
page read and write
1ED91813000
unkown
page read and write
3354000
heap
page read and write
1ED91913000
unkown
page read and write
1EE3955F000
unkown
page read and write
2FD0000
trusted library allocation
page read and write
4FC0000
trusted library allocation
page read and write
52D1000
heap
page read and write
1EE39A02000
unkown
page read and write
C6D000
stack
page read and write
3561000
heap
page read and write
3354000
heap
page read and write
7187877000
stack
page read and write
499D000
stack
page read and write
1005A000
unkown
page readonly
2FA0000
remote allocation
page read and write
47E3000
heap
page read and write
1EE38C00000
unkown
page read and write
1EE38D13000
unkown
page read and write
2D1A000
heap
page read and write
292359BF000
heap
page read and write
1D4C1A9B000
unkown
page read and write
2FCF000
stack
page read and write
1D4C1A29000
unkown
page read and write
D60000
trusted library allocation
page read and write
C3E000
stack
page read and write
3549000
heap
page read and write
5200000
heap
page read and write
620000
remote allocation
page read and write
292359A6000
heap
page read and write
1D4C1A00000
unkown
page read and write
E45000
trusted library allocation
page read and write
3354000
heap
page read and write
3354000
heap
page read and write
52D1000
heap
page read and write
1ED91800000
unkown
page read and write
52D1000
heap
page read and write
52D1000
heap
page read and write
4953000
heap
page read and write
5AA6000
trusted library allocation
page read and write
3320000
heap
page read and write
3354000
heap
page read and write
52D1000
heap
page read and write
5B2D000
trusted library allocation
page read and write
2EC000
stack
page read and write
595C000
stack
page read and write
5A80000
trusted library allocation
page read and write
1D4C1B02000
unkown
page read and write
2116A013000
unkown
page read and write
4E85000
trusted library allocation
page read and write
4D20000
trusted library allocation
page read and write
4D45000
trusted library allocation
page read and write
1EE38C53000
unkown
page read and write
1EE38CA4000
unkown
page read and write
A0A2EDB000
stack
page read and write
2EC0000
remote allocation
page read and write
1005A000
unkown
page readonly
3646000
trusted library allocation
page read and write
CD0000
remote allocation
page read and write
4986000
trusted library allocation
page read and write
3354000
heap
page read and write
2116A050000
unkown
page read and write
5B74000
trusted library allocation
page read and write
620000
remote allocation
page read and write
718777B000
stack
page read and write
29235AF5000
heap
page read and write
49DC000
stack
page read and write
10053000
unkown
page read and write
5B15000
trusted library allocation
page read and write
10000000
unkown
page readonly
3354000
heap
page read and write
553BFBB000
stack
page read and write
1ED9184B000
unkown
page read and write
872CFFE000
stack
page read and write
5B1F000
trusted library allocation
page read and write
A5E000
stack
page read and write
3354000
heap
page read and write
71874FE000
stack
page read and write
10057000
unkown
page read and write
355C000
heap
page read and write
1EE395A9000
unkown
page read and write
2EC0000
remote allocation
page read and write
4325000
trusted library allocation
page read and write
C42D87F000
stack
page read and write
1ED9184E000
unkown
page read and write
1EE395CC000
unkown
page read and write
A0A2F5E000
stack
page read and write
1EE395A7000
unkown
page read and write
718747E000
stack
page read and write
52D1000
heap
page read and write
1EE39940000
remote allocation
page read and write
7C0000
heap
page read and write
F70000
heap
page read and write
1EE39A02000
unkown
page read and write
C42D7F9000
stack
page read and write
1CF63A8C000
unkown
page read and write
59B5000
trusted library allocation
page read and write
544E000
stack
page read and write
2116A602000
unkown
page read and write
1CF63A3C000
unkown
page read and write
1EE38C58000
unkown
page read and write
3354000
heap
page read and write
3354000
heap
page read and write
2F7B000
stack
page read and write
1EE39587000
unkown
page read and write
1EE395A9000
unkown
page read and write
71871BC000
stack
page read and write
52D0000
heap
page read and write
3354000
heap
page read and write
52D1000
heap
page read and write
10057000
unkown
page read and write
1ED91740000
heap
page read and write
1EE39A02000
unkown
page read and write
2FBA17E000
stack
page read and write
D85000
trusted library allocation
page read and write
3354000
heap
page read and write
1EE395A8000
unkown
page read and write
1ED9186A000
unkown
page read and write
1EE39584000
unkown
page read and write
CD0000
heap
page read and write
3354000
heap
page read and write
3354000
heap
page read and write
1EE395A9000
unkown
page read and write
D90000
heap
page read and write
3354000
heap
page read and write
59C0000
trusted library allocation
page read and write
8C8000
stack
page read and write
57FE000
stack
page read and write
CE0000
trusted library allocation
page read and write
5896000
trusted library allocation
page read and write
307A000
heap
page read and write
1D4C1A54000
unkown
page read and write
1EE39587000
unkown
page read and write
1D4C1A80000
unkown
page read and write
2FB9CFE000
stack
page read and write
4D00000
trusted library allocation
page read and write
1EE395B4000
unkown
page read and write
1CF63A80000
unkown
page read and write
3354000
heap
page read and write
3354000
heap
page read and write
750000
trusted library allocation
page read and write
E3D000
stack
page read and write
1EE38CEB000
unkown
page read and write
3354000
heap
page read and write
3354000
heap
page read and write
1EE39340000
unkown
page read and write
1EE3955C000
unkown
page read and write
2116A083000
unkown
page read and write
1005A000
unkown
page readonly
A57E000
trusted library allocation
page read and write
2F3C000
stack
page read and write
29235AF0000
heap
page read and write
52D1000
heap
page read and write
1EE38C4F000
unkown
page read and write
52D1000
heap
page read and write
10046000
unkown
page readonly
36A7000
heap
page read and write
4A70000
trusted library allocation
page read and write
1ED9187D000
unkown
page read and write
3546000
heap
page read and write
2116A000000
unkown
page read and write
4FE6000
trusted library allocation
page read and write
E23000
heap
page read and write
1EE39585000
unkown
page read and write
3354000
heap
page read and write
7A0000
heap
page read and write
872D577000
stack
page read and write
2116A590000
unkown
page read and write
3354000
heap
page read and write
1ED9188A000
unkown
page read and write
4BA0000
trusted library allocation
page read and write
350B000
heap
page read and write
1EE395B2000
unkown
page read and write
5B2D000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
52D1000
heap
page read and write
292359C2000
heap
page read and write
34E8000
heap
page read and write
1005A000
unkown
page readonly
AEE000
stack
page read and write
4780000
trusted library allocation
page read and write
52D1000
heap
page read and write
3354000
heap
page read and write
1EE38CA5000
unkown
page read and write
1EE38C4B000
unkown
page read and write
1EE39587000
unkown
page read and write
680000
heap
page read and write
4390000
heap
page read and write
5680000
trusted library allocation
page read and write
3354000
heap
page read and write
A6DE000
trusted library allocation
page read and write
10053000
unkown
page read and write
1EE39511000
unkown
page read and write
3354000
heap
page read and write
17C000
stack
page read and write
4BC5000
trusted library allocation
page read and write
3354000
heap
page read and write
2FB0000
heap
page read and write
390000
trusted library allocation
page read and write
2FC0000
heap
page read and write
1ED916D0000
heap
page read and write
2116A08C000
unkown
page read and write
52D1000
heap
page read and write
3354000
heap
page read and write
4326000
trusted library allocation
page read and write
5D15000
trusted library allocation
page read and write
10000000
unkown
page readonly
5190000
trusted library allocation
page read and write
ACA000
heap
page read and write
1EE39573000
unkown
page read and write
30BE000
stack
page read and write
3360000
trusted library allocation
page read and write
1ED9182C000
unkown
page read and write
4BF5000
trusted library allocation
page read and write
3354000
heap
page read and write
C7F000
stack
page read and write
3354000
heap
page read and write
4E50000
trusted library allocation
page read and write
3354000
heap
page read and write
3505000
heap
page read and write
4780000
trusted library allocation
page read and write
3155000
trusted library allocation
page read and write
489E000
stack
page read and write
4620000
trusted library allocation
page read and write
1EE39585000
unkown
page read and write
C90000
heap
page read and write
5C95000
trusted library allocation
page read and write
E0C000
stack
page read and write
77E000
stack
page read and write
3354000
heap
page read and write
4BD0000
trusted library allocation
page read and write
1EE38CBC000
unkown
page read and write
1EE39559000
unkown
page read and write
51F6000
trusted library allocation
page read and write
49C5000
trusted library allocation
page read and write
1E0000
trusted library allocation
page read and write
52D1000
heap
page read and write
3354000
heap
page read and write
29235996000
heap
page read and write
4D60000
trusted library allocation
page read and write
1EE395AE000
unkown
page read and write
5B22000
trusted library allocation
page read and write
1EE395A7000
unkown
page read and write
1ED91770000
unkown
page read and write
10057000
unkown
page read and write
10046000
unkown
page readonly
3354000
heap
page read and write
1CF64202000
unkown
page read and write
1CF63B08000
unkown
page read and write
3565000
heap
page read and write
1EE38C81000
unkown
page read and write
52D1000
heap
page read and write
1EE38C4C000
unkown
page read and write
4BF6000
trusted library allocation
page read and write
3355000
heap
page read and write
5895000
trusted library allocation
page read and write
1EE38D08000
unkown
page read and write
3354000
heap
page read and write
1CF63A66000
unkown
page read and write
B5C000
heap
page read and write
3354000
heap
page read and write
B2F000
stack
page read and write
5645000
trusted library allocation
page read and write
1EE38CE9000
unkown
page read and write
52D1000
heap
page read and write
C10000
heap
page read and write
350000
remote allocation
page read and write
52D1000
heap
page read and write
3354000
heap
page read and write
52D1000
heap
page read and write
4430000
heap
page read and write
3354000
heap
page read and write
553C2FE000
stack
page read and write
1EE3955D000
unkown
page read and write
1EE38C52000
unkown
page read and write
3354000
heap
page read and write
51F5000
trusted library allocation
page read and write
1CF63990000
heap
page read and write
292359AE000
heap
page read and write
1EE38C70000
unkown
page read and write
5B22000
trusted library allocation
page read and write
D86000
trusted library allocation
page read and write
93F000
heap
page read and write
1ED9188F000
unkown
page read and write
4A10000
trusted library allocation
page read and write
740000
trusted library allocation
page read and write
553C57E000
stack
page read and write
52D1000
heap
page read and write
1EE39A00000
unkown
page read and write
80F000
stack
page read and write
3354000
heap
page read and write
E00000
trusted library allocation
page read and write
1ED91802000
unkown
page read and write
4B0E000
stack
page read and write
4E86000
trusted library allocation
page read and write
1D4C19B0000
unkown
page read and write
354A000
heap
page read and write
57A6000
trusted library allocation
page read and write
1EE38C4A000
unkown
page read and write
34C6000
heap
page read and write
4985000
trusted library allocation
page read and write
52D1000
heap
page read and write
3354000
heap
page read and write
2FBA3F9000
stack
page read and write
2116A108000
unkown
page read and write
1ED91829000
unkown
page read and write
3354000
heap
page read and write
10046000
unkown
page readonly
4856000
trusted library allocation
page read and write
1EE39564000
unkown
page read and write
1EE39585000
unkown
page read and write
36A0000
heap
page read and write
5B4C000
trusted library allocation
page read and write
1EE39587000
unkown
page read and write
1EE39587000
unkown
page read and write
548B000
stack
page read and write
3505000
heap
page read and write
52D1000
heap
page read and write
5D6E000
trusted library allocation
page read and write
3561000
heap
page read and write
3561000
heap
page read and write
60E000
stack
page read and write
1CF639F0000
heap
page read and write
3660000
heap
page read and write
3354000
heap
page read and write
52D1000
heap
page read and write
4A00000
heap
page read and write
A0A3577000
stack
page read and write
3556000
heap
page read and write
5D20000
trusted library allocation
page read and write
1EE395A9000
unkown
page read and write
1EE3954C000
unkown
page read and write
1EE3958C000
unkown
page read and write
1EE38C51000
unkown
page read and write
4A36000
trusted library allocation
page read and write
B9B000
stack
page read and write
1ED9183C000
unkown
page read and write
59C0000
remote allocation
page read and write
5D6E000
trusted library allocation
page read and write
2CD0000
heap
page read and write
5BAA000
trusted library allocation
page read and write
57A5000
trusted library allocation
page read and write
52D1000
heap
page read and write
2FB9F79000
stack
page read and write
1ED91853000
unkown
page read and write
3354000
heap
page read and write
5B15000
trusted library allocation
page read and write
E43000
heap
page read and write
473E000
stack
page read and write
5B15000
trusted library allocation
page read and write
4D26000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
A9F000
stack
page read and write
1CF63980000
heap
page read and write
A0A347B000
stack
page read and write
1EE38C49000
unkown
page read and write
810000
trusted library allocation
page read and write
3354000
heap
page read and write
52D1000
heap
page read and write
4B95000
trusted library allocation
page read and write
43A0000
trusted library allocation
page read and write
1CF63A29000
unkown
page read and write
1ED916E0000
heap
page read and write
2116A029000
unkown
page read and write
292359AE000
heap
page read and write
47E0000
heap
page read and write
350B000
heap
page read and write
4B96000
trusted library allocation
page read and write
556D000
stack
page read and write
3386000
trusted library allocation
page read and write
52D1000
heap
page read and write
5646000
trusted library allocation
page read and write
52D1000
heap
page read and write
3354000
heap
page read and write
2F8E000
stack
page read and write
59C0000
remote allocation
page read and write
4340000
heap
page read and write
3354000
heap
page read and write
355C000
heap
page read and write
1EE39584000
unkown
page read and write
31B0000
heap
page read and write
4A35000
trusted library allocation
page read and write
1EE395A5000
unkown
page read and write
A9E000
stack
page read and write
52D1000
heap
page read and write
1EE395B1000
unkown
page read and write
2116A113000
unkown
page read and write
3354000
heap
page read and write
1EE38C59000
unkown
page read and write
7ED000
heap
page read and write
1EE395B1000
unkown
page read and write
34B1000
heap
page read and write
1ED91902000
unkown
page read and write
10046000
unkown
page readonly
591D000
stack
page read and write
1EE3957D000
unkown
page read and write
5CF0000
trusted library allocation
page read and write
1ED91908000
unkown
page read and write
AF0000
heap
page read and write
1CF63B02000
unkown
page read and write
1EE38CF6000
unkown
page read and write
D60000
trusted library allocation
page read and write
3070000
heap
page read and write
1EE3955E000
unkown
page read and write
52D1000
heap
page read and write
872D67E000
stack
page read and write
2FB9C7C000
stack
page read and write
5B1D000
trusted library allocation
page read and write
3354000
heap
page read and write
355C000
heap
page read and write
2FBA077000
stack
page read and write
C42D6FF000
stack
page read and write
1ED91900000
unkown
page read and write
3354000
heap
page read and write
1D4C1B13000
unkown
page read and write
A0A367D000
stack
page read and write
1D4C18B0000
heap
page read and write
29CC000
stack
page read and write
1EE39585000
unkown
page read and write
347A000
heap
page read and write
1EE39A63000
unkown
page read and write
3556000
heap
page read and write
3645000
trusted library allocation
page read and write
1EE3956C000
unkown
page read and write
3156000
trusted library allocation
page read and write
1EE3956C000
unkown
page read and write
872D3FB000
stack
page read and write
ADAE000
trusted library allocation
page read and write
1EE395A5000
unkown
page read and write
7187A7F000
stack
page read and write
1EE39558000
unkown
page read and write
2116A060000
unkown
page read and write
5B2D000
trusted library allocation
page read and write
683000
heap
page read and write
2116A066000
unkown
page read and write
1CF64150000
unkown
page read and write
292359BF000
heap
page read and write
There are 861 hidden memdumps, click here to show them.