IOC Report
lc4KFeS296

loading gif

Files

File Path
Type
Category
Malicious
lc4KFeS296.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xc128353e, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\lc4KFeS296.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\lc4KFeS296.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\lc4KFeS296.dll,DllRegisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\LJYuxyMqHk\HxAOzCvVHW.dll"
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\lc4KFeS296.dll,DllUnregisterServer
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\lc4KFeS296.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\lc4KFeS296.dll",#1
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://23.239.0.12/;
unknown
malicious
https://23.239.0.12/
23.239.0.12
malicious
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
unknown
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
unknown
https://dev.ditu.live.com/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
unknown
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
unknown
https://dev.ditu.live.com/REST/v1/Transit/Stops/
unknown
https://t0.tiles.ditu.live.com/tiles/gen
unknown
https://dev.virtualearth.net/REST/v1/Routes/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Routes/Walking
unknown
http://crl.ver)
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
unknown
https://www.tiktok.com/legal/report/feedback
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
unknown
https://activity.windows.comt
unknown
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
unknown
https://%s.xboxlive.com
unknown
https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://dev.virtualearth.net/mapcontrol/logging.ashx
unknown
https://support.hotspotshield.com/
unknown
https://dev.ditu.live.com/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
unknown
https://dynamic.t
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
https://disneyplus.com/legal.
unknown
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
unknown
https://activity.windows.com
unknown
http://www.bingmapsportal.com
unknown
https://dev.ditu.live.com/REST/v1/Locations
unknown
http://help.disneyplus.com.
unknown
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://%s.dnet.xboxlive.com
unknown
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
There are 38 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
23.239.0.12
unknown
United States
malicious
192.168.2.1
unknown
unknown
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
MonthID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 2 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
180001000
direct allocation
page execute read
malicious
2BB141A0000
direct allocation
page execute and read and write
malicious
2473DCB0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
13E0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
2750000
direct allocation
page execute and read and write
malicious
F2D000
heap
page read and write
1FF5C0AB000
heap
page read and write
174A5000000
heap
page read and write
174A5113000
heap
page read and write
2491C847000
heap
page read and write
2810000
heap
page read and write
13B0000
heap
page read and write
2491C855000
heap
page read and write
1FF5BDD1000
trusted library allocation
page read and write
174A5013000
heap
page read and write
1FF5BEE0000
trusted library allocation
page read and write
1FF5BE80000
trusted library allocation
page read and write
14D93C3C000
heap
page read and write
2491D1A8000
heap
page read and write
2491C8ED000
heap
page read and write
EAF000
heap
page read and write
8CBA0F9000
stack
page read and write
261CDBB000
stack
page read and write
B55177E000
stack
page read and write
65707C000
stack
page read and write
B55167F000
stack
page read and write
1410000
heap
page readonly
268E7C3D000
heap
page read and write
450ED7C000
stack
page read and write
EF4000
heap
page read and write
A10000
heap
page read and write
24F85000000
heap
page read and write
1FF5BDB0000
trusted library allocation
page read and write
2D5F000
stack
page read and write
19267C2D000
heap
page read and write
16C0000
heap
page read and write
1FF5C0EF000
heap
page read and write
1FF5C220000
trusted library allocation
page read and write
2491D19E000
heap
page read and write
F45000
heap
page read and write
E30000
heap
page read and write
1130000
heap
page read and write
2491D603000
heap
page read and write
1FF56902000
heap
page read and write
EAF000
heap
page read and write
1322C800000
heap
page read and write
9DDED3E000
stack
page read and write
1B785A9C000
heap
page read and write
2491C913000
heap
page read and write
2491D1AC000
heap
page read and write
242E6402000
trusted library allocation
page read and write
14D93C76000
heap
page read and write
268E7C4E000
heap
page read and write
2F30000
remote allocation
page read and write
EA2000
heap
page read and write
656F7B000
stack
page read and write
268E7C40000
heap
page read and write
18002F000
direct allocation
page readonly
2BB14330000
heap
page read and write
D9083B5000
stack
page read and write
8CBA17F000
stack
page read and write
1CB266A6000
heap
page read and write
2E6E000
stack
page read and write
261D2FA000
stack
page read and write
1CB26690000
heap
page read and write
2491D175000
heap
page read and write
F80A479000
stack
page read and write
30254FE000
stack
page read and write
242E5F02000
heap
page read and write
2491D178000
heap
page read and write
A46418E000
stack
page read and write
1F9E4BFB000
heap
page read and write
1FF57102000
heap
page read and write
2473DBA6000
heap
page read and write
14D93C60000
heap
page read and write
1F9E4C16000
heap
page read and write
F8099CF000
stack
page read and write
2491D181000
heap
page read and write
2473DB7F000
heap
page read and write
1B785870000
trusted library allocation
page read and write
24F8505A000
heap
page read and write
1B7859A0000
heap
page read and write
BC257FF000
stack
page read and write
AF0000
remote allocation
page read and write
1B785C29000
heap
page read and write
8CB9DAE000
stack
page read and write
EA2000
heap
page read and write
2491C8FC000
heap
page read and write
16C5000
heap
page read and write
1B785A58000
heap
page read and write
1B785C30000
trusted library allocation
page read and write
2491D1A9000
heap
page read and write
2491C8E7000
heap
page read and write
9DDF57F000
stack
page read and write
2473DB6E000
heap
page read and write
2491C916000
heap
page read and write
24F85029000
heap
page read and write
2491D175000
heap
page read and write
1555CB60000
heap
page read and write
7FFC67216000
unkown
page read and write
1FF57113000
heap
page read and write
2491D17C000
heap
page read and write
148F000
heap
page read and write
B5517FC000
stack
page read and write
268E7C2F000
heap
page read and write
2522F202000
trusted library allocation
page read and write
9DDF377000
stack
page read and write
2491D602000
heap
page read and write
6F479FB000
stack
page read and write
2491C84D000
heap
page read and write
174A503C000
heap
page read and write
242E5F08000
heap
page read and write
1322C7D0000
remote allocation
page read and write
1322C902000
heap
page read and write
6567F9000
stack
page read and write
450E8FC000
stack
page read and write
9DDEDBE000
stack
page read and write
1FF5C0E8000
heap
page read and write
2491C848000
heap
page read and write
1FF56888000
heap
page read and write
2BB141D0000
heap
page readonly
2491D171000
heap
page read and write
2491D197000
heap
page read and write
1FF5BEF0000
trusted library allocation
page read and write
1FF56813000
heap
page read and write
10F0000
heap
page read and write
1555D532000
heap
page read and write
1FF5BF10000
remote allocation
page read and write
7FFC67216000
unkown
page read and write
ED9000
heap
page read and write
6569FE000
stack
page read and write
7FFC67219000
unkown
page readonly
1FF5C0A1000
heap
page read and write
268E7C5A000
heap
page read and write
302507E000
stack
page read and write
242E5B90000
heap
page read and write
816E1FB000
stack
page read and write
6562FC000
stack
page read and write
1322C83D000
heap
page read and write
1CB269F0000
heap
page read and write
450EA7B000
stack
page read and write
2491D180000
heap
page read and write
1B785A9C000
heap
page read and write
1CB266D6000
heap
page read and write
BC2537E000
stack
page read and write
2491D1B9000
heap
page read and write
F809C7E000
stack
page read and write
18002E000
direct allocation
page read and write
2491D181000
heap
page read and write
1FF5C03E000
heap
page read and write
2491D17D000
heap
page read and write
143B000
heap
page read and write
174A5028000
heap
page read and write
1322D002000
trusted library allocation
page read and write
7FFC671C0000
unkown
page readonly
242E5F13000
heap
page read and write
2491C902000
heap
page read and write
268E7C13000
heap
page read and write
14D93D08000
heap
page read and write
1FF56873000
heap
page read and write
2BB12850000
heap
page read and write
A4647F7000
stack
page read and write
180000000
direct allocation
page read and write
1555D330000
trusted library allocation
page read and write
1474000
heap
page read and write
450E5FC000
stack
page read and write
2491C8C8000
heap
page read and write
174A5075000
heap
page read and write
2491D1A8000
heap
page read and write
B5516FF000
stack
page read and write
1CB266D6000
heap
page read and write
2491D171000
heap
page read and write
1FF5BED0000
trusted library allocation
page read and write
816E9FE000
stack
page read and write
1FF5C0ED000
heap
page read and write
268E7C2D000
heap
page read and write
EBE000
heap
page read and write
6568FA000
stack
page read and write
2491D1AC000
heap
page read and write
2491D19F000
heap
page read and write
331F000
stack
page read and write
1F9E7E90000
trusted library allocation
page read and write
6F476FB000
stack
page read and write
A68F6B000
stack
page read and write
D90877E000
stack
page read and write
2491C851000
heap
page read and write
242E5E4D000
heap
page read and write
18002D000
direct allocation
page readonly
2491D178000
heap
page read and write
1FF57159000
heap
page read and write
180000000
direct allocation
page read and write
2814000
heap
page read and write
18002E000
direct allocation
page read and write
1350000
heap
page read and write
2491C829000
heap
page read and write
2BB12889000
heap
page read and write
2491D17C000
heap
page read and write
2491D602000
heap
page read and write
1FF56907000
heap
page read and write
2522EB13000
heap
page read and write
2522EB00000
heap
page read and write
F80000
heap
page read and write
2491C908000
heap
page read and write
2E1F000
stack
page read and write
2C5E000
stack
page read and write
2491D1B1000
heap
page read and write
1CB266D6000
heap
page read and write
E509FCE000
stack
page read and write
1555CBD0000
heap
page read and write
1F9E4C00000
heap
page read and write
2491D175000
heap
page read and write
1B785A94000
heap
page read and write
2D5B000
stack
page read and write
1FF568AB000
heap
page read and write
2522EA5E000
heap
page read and write
2491D195000
heap
page read and write
450E77E000
stack
page read and write
1F9E8690000
heap
page read and write
1F9E4C16000
heap
page read and write
2F30000
remote allocation
page read and write
1F9E4D75000
heap
page read and write
2522E8D0000
heap
page read and write
1CB266B7000
heap
page read and write
2491C8B6000
heap
page read and write
268E7C3B000
heap
page read and write
24F84DB0000
heap
page read and write
1F9E4B90000
heap
page read and write
2491C86F000
heap
page read and write
2BB12880000
heap
page read and write
E68000
heap
page read and write
2491D600000
heap
page read and write
1555CC13000
heap
page read and write
2473DBC1000
heap
page read and write
2BB128BD000
heap
page read and write
1F9E4B70000
heap
page read and write
2491D602000
heap
page read and write
2BB128B1000
heap
page read and write
2491D178000
heap
page read and write
1CB269F5000
heap
page read and write
180000000
direct allocation
page read and write
2491D1A9000
heap
page read and write
2491C6F0000
heap
page read and write
1B785860000
heap
page read and write
7FFC67219000
unkown
page readonly
242E5E00000
heap
page read and write
2522EA13000
heap
page read and write
D9086FE000
stack
page read and write
1FF5C0AE000
heap
page read and write
1FF5BDB0000
trusted library allocation
page read and write
1CB266A1000
heap
page read and write
24F85076000
heap
page read and write
268E7C7F000
heap
page read and write
2491D178000
heap
page read and write
2F30000
remote allocation
page read and write
268E7C62000
heap
page read and write
1B786570000
trusted library allocation
page read and write
450E1EC000
stack
page read and write
9DDECBB000
stack
page read and write
268E7C61000
heap
page read and write
1F9E4D70000
heap
page read and write
A693FC000
stack
page read and write
1FF5BF10000
trusted library allocation
page read and write
2491D195000
heap
page read and write
2473DB30000
heap
page read and write
174A4EA0000
heap
page read and write
1F9E4BD8000
heap
page read and write
1FF56886000
heap
page read and write
268E7C58000
heap
page read and write
1FF5683D000
heap
page read and write
2491C7F0000
remote allocation
page read and write
1FF5BC20000
trusted library allocation
page read and write
2522EB02000
heap
page read and write
14D93D00000
heap
page read and write
1FF5BDD4000
trusted library allocation
page read and write
268E7C64000
heap
page read and write
E60000
heap
page read and write
24F85040000
heap
page read and write
F80A1FB000
stack
page read and write
1FF567F3000
trusted library allocation
page read and write
1FF5C0F7000
heap
page read and write
268E7B10000
heap
page read and write
2491D19B000
heap
page read and write
2491D11C000
heap
page read and write
1CB266CE000
heap
page read and write
2CDC000
stack
page read and write
1F9E4BEA000
heap
page read and write
A6947E000
stack
page read and write
1B7867C0000
heap
page readonly
1FF5BCA0000
trusted library allocation
page read and write
2BB14190000
direct allocation
page execute and read and write
1CB266C0000
heap
page read and write
14D93C00000
heap
page read and write
2491C8B2000
heap
page read and write
174A5002000
heap
page read and write
1FF5C0FE000
heap
page read and write
7FFC671C0000
unkown
page readonly
1FF5C02B000
heap
page read and write
A696FE000
stack
page read and write
2491C813000
heap
page read and write
2473DB92000
heap
page read and write
1F9E4A30000
heap
page read and write
2491D17C000
heap
page read and write
1FF5BDD0000
trusted library allocation
page read and write
2491D1CC000
heap
page read and write
1FF56FF0000
trusted library allocation
page read and write
F80A37F000
unkown
page read and write
14D93C29000
heap
page read and write
2491D602000
heap
page read and write
242E5DD0000
trusted library allocation
page read and write
268E7C63000
heap
page read and write
268E7C29000
heap
page read and write
2522EA29000
heap
page read and write
1FF5BF10000
remote allocation
page read and write
14D93C74000
heap
page read and write
816E7FE000
stack
page read and write
268E7AA0000
heap
page read and write
242E5C00000
heap
page read and write
1555CC88000
heap
page read and write
2522EA3C000
heap
page read and write
450E9FD000
stack
page read and write
24F8507C000
heap
page read and write
242E5E55000
heap
page read and write
1CB26620000
heap
page read and write
1555CC6A000
heap
page read and write
1CB2669B000
heap
page read and write
1CB266C0000
heap
page read and write
1CB266B4000
heap
page read and write
268E7C68000
heap
page read and write
1F9E7E80000
heap
page read and write
261D1FE000
stack
page read and write
2491D199000
heap
page read and write
1FF5C09C000
heap
page read and write
14D93D02000
heap
page read and write
268E7C7C000
heap
page read and write
1FF5C0FA000
heap
page read and write
1322C640000
heap
page read and write
2491D19B000
heap
page read and write
2491D175000
heap
page read and write
2491C8A5000
heap
page read and write
24F85113000
heap
page read and write
9DDF1FB000
stack
page read and write
18002E000
direct allocation
page read and write
6F478FE000
stack
page read and write
816E5FF000
stack
page read and write
450EE7F000
stack
page read and write
2491C7F0000
remote allocation
page read and write
268E7C65000
heap
page read and write
A46447E000
stack
page read and write
A6967D000
stack
page read and write
2522EA8A000
heap
page read and write
1CB26600000
heap
page read and write
1FF5C000000
heap
page read and write
F809EF7000
stack
page read and write
1370000
heap
page read and write
268E8270000
trusted library allocation
page read and write
2491D16F000
heap
page read and write
268E7C46000
heap
page read and write
24F85069000
heap
page read and write
7FFC671C1000
unkown
page execute read
242E5F00000
heap
page read and write
2473DC90000
direct allocation
page execute and read and write
1B785C25000
heap
page read and write
A4649FF000
stack
page read and write
AC5000
stack
page read and write
1555D500000
heap
page read and write
268E7C32000
heap
page read and write
1FF568F8000
heap
page read and write
1FF566F0000
heap
page read and write
D9087FE000
stack
page read and write
14D93B80000
heap
page read and write
268E7C5C000
heap
page read and write
1FF5BDF4000
trusted library allocation
page read and write
7FFC671C1000
unkown
page execute read
1275000
stack
page read and write
1FF5C200000
trusted library allocation
page read and write
2BB14334000
heap
page read and write
1322C854000
heap
page read and write
E00000
heap
page read and write
1FF5BDE0000
trusted library allocation
page read and write
7FFC671C1000
unkown
page execute read
7FFC67212000
unkown
page readonly
2522EA27000
heap
page read and write
18002D000
direct allocation
page readonly
1F9E4BF2000
heap
page read and write
2491D17C000
heap
page read and write
2522EA00000
heap
page read and write
2491D17D000
heap
page read and write
268E7D02000
heap
page read and write
242E5E8B000
heap
page read and write
268E7C49000
heap
page read and write
14D94402000
trusted library allocation
page read and write
2522EA64000
heap
page read and write
242E5E3C000
heap
page read and write
2491D175000
heap
page read and write
1FF5688D000
heap
page read and write
1FF57000000
heap
page read and write
268E7C44000
heap
page read and write
1B785A40000
trusted library allocation
page read and write
2FC0000
heap
page read and write
1FF5BF00000
trusted library allocation
page read and write
F80A2FA000
stack
page read and write
174A507F000
heap
page read and write
2491D182000
heap
page read and write
B55187E000
stack
page read and write
2491D1BF000
heap
page read and write
6566F7000
stack
page read and write
2473DD25000
heap
page read and write
1F9E4BEA000
heap
page read and write
1F9E4BED000
heap
page read and write
1B7867E0000
trusted library allocation
page read and write
1555CD13000
heap
page read and write
2473DB8D000
heap
page read and write
261D179000
stack
page read and write
2491D123000
heap
page read and write
2522EA02000
heap
page read and write
F2D000
heap
page read and write
65727F000
stack
page read and write
2473DCA4000
heap
page read and write
602F3AD000
stack
page read and write
2491D176000
heap
page read and write
1CB266B2000
heap
page read and write
3024D6B000
stack
page read and write
EFB000
heap
page read and write
1FF56914000
heap
page read and write
EBE000
heap
page read and write
2491D197000
heap
page read and write
1FF5BDBE000
trusted library allocation
page read and write
2491D1C9000
heap
page read and write
2491D621000
heap
page read and write
2491D17C000
heap
page read and write
1F9E4BE6000
heap
page read and write
1FF566E0000
heap
page read and write
2473D9C0000
heap
page read and write
14D93C13000
heap
page read and write
816EAFF000
stack
page read and write
24F84DC0000
heap
page read and write
1CB266A6000
heap
page read and write
7FFC67216000
unkown
page read and write
2491D1A8000
heap
page read and write
268E7C78000
heap
page read and write
1555CB70000
heap
page read and write
1FF567F0000
trusted library allocation
page read and write
1B785A9C000
heap
page read and write
1FF57118000
heap
page read and write
1FF56750000
heap
page read and write
268E7C6E000
heap
page read and write
24F85087000
heap
page read and write
14D93B90000
heap
page read and write
EFF000
heap
page read and write
174A5660000
trusted library allocation
page read and write
14D93C53000
heap
page read and write
1FF5C04B000
heap
page read and write
2491C750000
heap
page read and write
1555CCC5000
heap
page read and write
1FF56829000
heap
page read and write
1F9E4BF3000
heap
page read and write
24F85102000
heap
page read and write
1FF5BEC0000
trusted library allocation
page read and write
2491D154000
heap
page read and write
2473DB8D000
heap
page read and write
268E7C41000
heap
page read and write
2F1E000
stack
page read and write
1F9E4BFA000
heap
page read and write
19267C20000
heap
page read and write
7FFC671C0000
unkown
page readonly
1322C7D0000
remote allocation
page read and write
7FFC67219000
unkown
page readonly
A692FE000
stack
page read and write
2BB142F0000
heap
page read and write
1322C630000
heap
page read and write
2522EA49000
heap
page read and write
242E5E29000
heap
page read and write
1FF56876000
heap
page read and write
1FF5C0F5000
heap
page read and write
1FF56856000
heap
page read and write
14D93C81000
heap
page read and write
2BB128AB000
heap
page read and write
2491D179000
heap
page read and write
A46457B000
stack
page read and write
242E5E13000
heap
page read and write
2473DC30000
heap
page read and write
F809FF7000
stack
page read and write
1555D402000
heap
page read and write
2491C800000
heap
page read and write
F80994B000
stack
page read and write
18002F000
direct allocation
page readonly
1B785A30000
trusted library allocation
page read and write
174A4E90000
heap
page read and write
1FF5C0D7000
heap
page read and write
268E8402000
trusted library allocation
page read and write
268E7C60000
heap
page read and write
1555CCBB000
heap
page read and write
1B7867B0000
trusted library allocation
page read and write
A4646FE000
stack
page read and write
174A5100000
heap
page read and write
F80A0FE000
stack
page read and write
268E7C6C000
heap
page read and write
E509F4E000
stack
page read and write
174A507F000
heap
page read and write
2491C850000
heap
page read and write
1555CCEA000
heap
page read and write
2491D602000
heap
page read and write
1FF5686C000
heap
page read and write
2BB128CA000
heap
page read and write
1FF57015000
heap
page read and write
7FFC67212000
unkown
page readonly
2491D1A8000
heap
page read and write
2491D181000
heap
page read and write
AF0000
remote allocation
page read and write
2800000
trusted library allocation
page read and write
1FF5C102000
heap
page read and write
1B785A60000
heap
page read and write
24F85013000
heap
page read and write
2BB12710000
heap
page read and write
2473DCA0000
heap
page read and write
18002F000
direct allocation
page readonly
E50000
direct allocation
page execute and read and write
268E7C45000
heap
page read and write
2491D002000
heap
page read and write
816EBFF000
stack
page read and write
7FFC671C1000
unkown
page execute read
2522EA80000
heap
page read and write
2BE0000
trusted library allocation
page read and write
30253F7000
stack
page read and write
242E5E4A000
heap
page read and write
1322C7A0000
trusted library allocation
page read and write
EF4000
heap
page read and write
1FF57002000
heap
page read and write
1FF5C061000
heap
page read and write
2EFF000
stack
page read and write
14D94350000
trusted library allocation
page read and write
242E5E50000
heap
page read and write
2491D175000
heap
page read and write
2473DD20000
heap
page read and write
7FFC67212000
unkown
page readonly
1F9E4BF2000
heap
page read and write
2491C853000
heap
page read and write
174A5102000
heap
page read and write
2522EA53000
heap
page read and write
BC254FE000
stack
page read and write
1B7867D0000
trusted library allocation
page read and write
174A5056000
heap
page read and write
2491D18D000
heap
page read and write
EDC000
heap
page read and write
BC255FE000
stack
page read and write
1F9E4BF2000
heap
page read and write
1555CC3D000
heap
page read and write
1FF5C01D000
heap
page read and write
1FF577E0000
trusted library allocation
page read and write
B5513D5000
stack
page read and write
7FFC67216000
unkown
page read and write
1FF57100000
heap
page read and write
EA2000
heap
page read and write
1FF5BF10000
remote allocation
page read and write
E509ECB000
stack
page read and write
1FF5BDE0000
trusted library allocation
page read and write
2491C849000
heap
page read and write
EBE000
heap
page read and write
14D93C74000
heap
page read and write
1FF56899000
heap
page read and write
8CBA27C000
stack
page read and write
816DD8B000
stack
page read and write
2491D197000
heap
page read and write
19267B60000
heap
page read and write
14D93C66000
heap
page read and write
1555CD02000
heap
page read and write
BC256FF000
stack
page read and write
174A5079000
heap
page read and write
1FF5BC90000
trusted library allocation
page read and write
2473DC70000
heap
page read and write
F2D000
heap
page read and write
174A5802000
trusted library allocation
page read and write
2D90000
heap
page read and write
1F9E4D10000
heap
page read and write
339B000
stack
page read and write
2BB129C5000
heap
page read and write
1FF56871000
heap
page read and write
1CB266C0000
heap
page read and write
2491C889000
heap
page read and write
24F84E20000
heap
page read and write
1FF5C00F000
heap
page read and write
2F44000
heap
page read and write
1322C6A0000
heap
page read and write
1FF5C0F4000
heap
page read and write
1F9E4BD0000
heap
page read and write
1555CC00000
heap
page read and write
1B785C20000
heap
page read and write
D90867E000
stack
page read and write
1FF56780000
trusted library allocation
page read and write
2E9E000
stack
page read and write
656AFB000
stack
page read and write
13D0000
direct allocation
page execute and read and write
30255FF000
stack
page read and write
2BB14170000
heap
page read and write
1FF5C0FB000
heap
page read and write
2491C6E0000
heap
page read and write
174A4F00000
heap
page read and write
BD0000
heap
page read and write
816E3FC000
stack
page read and write
2491D18D000
heap
page read and write
2522E930000
heap
page read and write
1CB266B6000
heap
page read and write
1FF5BE80000
trusted library allocation
page read and write
2491C8C1000
heap
page read and write
268E7C76000
heap
page read and write
1555CCCC000
heap
page read and write
1FF5C102000
heap
page read and write
6F477FE000
stack
page read and write
1FF5C0FE000
heap
page read and write
24F84FF0000
trusted library allocation
page read and write
1110000
heap
page readonly
9DDF47C000
stack
page read and write
242E5BA0000
heap
page read and write
19267A20000
heap
page read and write
2491C84C000
heap
page read and write
242E5E70000
heap
page read and write
2491D11A000
heap
page read and write
2491D197000
heap
page read and write
1FF568F8000
heap
page read and write
14D93BF0000
heap
page read and write
1CB266CD000
heap
page read and write
242E5E7E000
heap
page read and write
1135000
heap
page read and write
18002E000
direct allocation
page read and write
2491D1A8000
heap
page read and write
1FF56854000
heap
page read and write
268E7C5F000
heap
page read and write
242E5E2C000
heap
page read and write
3024DEE000
stack
page read and write
A697FD000
stack
page read and write
1322C802000
heap
page read and write
2491D178000
heap
page read and write
24F85002000
heap
page read and write
1322C813000
heap
page read and write
1FF5C0DE000
heap
page read and write
2491D19B000
heap
page read and write
1FF57C20000
trusted library allocation
page read and write
1322C829000
heap
page read and write
1FF57118000
heap
page read and write
6F471FB000
stack
page read and write
2473DB00000
heap
page read and write
1CB266D6000
heap
page read and write
2491D602000
heap
page read and write
2491C8DA000
heap
page read and write
2491D100000
heap
page read and write
EAF000
heap
page read and write
B5518FC000
stack
page read and write
18002F000
direct allocation
page readonly
A46410B000
stack
page read and write
2522E960000
trusted library allocation
page read and write
1FF56800000
heap
page read and write
30252FE000
stack
page read and write
2491C7F0000
remote allocation
page read and write
F809DFE000
stack
page read and write
1FF57159000
heap
page read and write
268E7C57000
heap
page read and write
450EC7E000
stack
page read and write
1430000
heap
page read and write
2491D166000
heap
page read and write
18002D000
direct allocation
page readonly
2473F690000
heap
page read and write
1FF56902000
heap
page read and write
2491D14D000
heap
page read and write
2BB128CA000
heap
page read and write
8CB9D2A000
stack
page read and write
2491C854000
heap
page read and write
2473DB7F000
heap
page read and write
24F85074000
heap
page read and write
7FFC67212000
unkown
page readonly
268E7C00000
heap
page read and write
1FF5BDB8000
trusted library allocation
page read and write
1FF568A4000
heap
page read and write
268E7C42000
heap
page read and write
2491D1D3000
heap
page read and write
1FF5BEA0000
trusted library allocation
page read and write
2BB12980000
heap
page read and write
2522E8C0000
heap
page read and write
268E7C6A000
heap
page read and write
261D27E000
stack
page read and write
2491C83C000
heap
page read and write
2522EB08000
heap
page read and write
816E8FF000
stack
page read and write
14D93D13000
heap
page read and write
8CBA1FE000
stack
page read and write
1B785ABC000
heap
page read and write
2491D1DA000
heap
page read and write
1B786830000
trusted library allocation
page read and write
F46000
heap
page read and write
2491D197000
heap
page read and write
2491D199000
heap
page read and write
BC2527B000
stack
page read and write
2491D199000
heap
page read and write
268E7AB0000
heap
page read and write
1B785A50000
heap
page read and write
A4648FE000
stack
page read and write
1FF5BDF0000
trusted library allocation
page read and write
2491D193000
heap
page read and write
2491D1A8000
heap
page read and write
EFF000
heap
page read and write
BC252FE000
stack
page read and write
7FFC671C0000
unkown
page readonly
1F9E4D7B000
heap
page read and write
1B786560000
trusted library allocation
page read and write
18002D000
direct allocation
page readonly
2BB128BA000
heap
page read and write
2473DCE0000
heap
page readonly
2BB129C0000
heap
page read and write
24F85602000
trusted library allocation
page read and write
1FF5BE80000
trusted library allocation
page read and write
9DDF27E000
stack
page read and write
2BB128CA000
heap
page read and write
268E7C85000
heap
page read and write
7FFC67219000
unkown
page readonly
816E6FD000
stack
page read and write
1FF5BDF0000
trusted library allocation
page read and write
2491C856000
heap
page read and write
1CB265A0000
heap
page read and write
2491C84A000
heap
page read and write
2FAF000
stack
page read and write
450E87E000
stack
page read and write
180000000
direct allocation
page read and write
8CBA07E000
stack
page read and write
816E2FE000
stack
page read and write
1B7859C0000
heap
page read and write
2491C780000
trusted library allocation
page read and write
2491C8AC000
heap
page read and write
174A5067000
heap
page read and write
450EB7C000
stack
page read and write
A46467B000
stack
page read and write
1F9E7E83000
heap
page read and write
302527B000
stack
page read and write
1555CC29000
heap
page read and write
2473DB37000
heap
page read and write
2F40000
heap
page read and write
1FF57104000
heap
page read and write
1322C7D0000
remote allocation
page read and write
EFF000
heap
page read and write
9DDF67E000
stack
page read and write
268E7C59000
heap
page read and write
2491D602000
heap
page read and write
242E5E02000
heap
page read and write
There are 734 hidden memdumps, click here to show them.