IOC Report
Xp7X1Yf3CM

loading gif

Files

File Path
Type
Category
Malicious
Xp7X1Yf3CM.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xd3505601, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\Xp7X1Yf3CM.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\Xp7X1Yf3CM.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\Xp7X1Yf3CM.dll,DllRegisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\KWKbQi\AfskRqPguzooU.dll"
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\Xp7X1Yf3CM.dll,DllUnregisterServer
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\Xp7X1Yf3CM.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Xp7X1Yf3CM.dll",#1
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://23.239.0.12/efault3
unknown
malicious
https://23.239.0.12/g
unknown
malicious
https://23.239.0.12/Q
unknown
malicious
https://23.239.0.12//
unknown
malicious
https://23.239.0.12/
23.239.0.12
malicious
https://dev.ditu.live.com/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
unknown
https://t0.tiles.ditu.live.com/tiles/gen
unknown
https://dev.virtualearth.net/REST/v1/Routes/Walking
unknown
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
unknown
https://dev.ditu.live.com/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
http://www.bingmapsportal.com
unknown
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
unknown
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
unknown
https://dev.ditu.live.com/REST/v1/Transit/Stops/
unknown
https://dev.virtualearth.net/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
unknown
http://crl.ver)
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
unknown
https://www.tiktok.com/legal/report/feedback
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
unknown
https://%s.xboxlive.com
unknown
https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://dev.virtualearth.net/mapcontrol/logging.ashx
unknown
https://support.hotspotshield.com/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.t
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
https://disneyplus.com/legal.
unknown
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
unknown
https://activity.windows.com
unknown
https://dev.ditu.live.com/REST/v1/Locations
unknown
http://help.disneyplus.com.
unknown
https://%s.dnet.xboxlive.com
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
There are 39 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
23.239.0.12
unknown
United States
malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
MonthID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\TaskStore
Schedule Scan
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\State
BlockUntilTimeStatus
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\Configuration
refreshAfter
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
1EAA8F30000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
20D0000
direct allocation
page execute and read and write
malicious
24D00000000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
4E0000
direct allocation
page execute and read and write
malicious
1CF4FE60000
trusted library allocation
page read and write
1E713862000
heap
page read and write
1F549100000
heap
page read and write
1F0576BB000
heap
page read and write
1C289960000
heap
page read and write
22C232BD000
heap
page read and write
2A478D20000
heap
page read and write
2BAA0E80000
heap
page read and write
2A479030000
trusted library allocation
page read and write
1CF4A68A000
heap
page read and write
2A01EF7B000
heap
page read and write
1803DC41000
heap
page read and write
2323A602000
heap
page read and write
2594BA70000
heap
page read and write
3506E7D000
stack
page read and write
2594BA3C000
heap
page read and write
1F057600000
heap
page read and write
17583271000
heap
page read and write
2153F9C0000
heap
page read and write
1E71385F000
heap
page read and write
7FFC67212000
unkown
page readonly
17583BA2000
heap
page read and write
2A479020000
heap
page read and write
17583B8C000
heap
page read and write
17583B1D000
heap
page read and write
7FFC67216000
unkown
page read and write
DC0C8FD000
stack
page read and write
1803DC66000
heap
page read and write
2A01EFFC000
heap
page read and write
1803DC49000
heap
page read and write
2594BA24000
heap
page read and write
2323A65C000
heap
page read and write
2A01F7F2000
heap
page read and write
2153FC7B000
heap
page read and write
17583B7D000
heap
page read and write
17EA3350000
heap
page read and write
22C232C2000
heap
page read and write
17583B83000
heap
page read and write
1C289950000
heap
page read and write
1CF4FC1F000
heap
page read and write
560000
heap
page read and write
1C289B02000
heap
page read and write
1F548A3C000
heap
page read and write
1E0000
heap
page read and write
4FFC7B000
stack
page read and write
B3F52FB000
stack
page read and write
17583B8C000
heap
page read and write
1803DC6D000
heap
page read and write
1803DC7E000
heap
page read and write
2A01EF41000
heap
page read and write
1CF4A63C000
heap
page read and write
B3F4EFE000
stack
page read and write
1033BFE000
stack
page read and write
5D1000
heap
page read and write
22C232BD000
heap
page read and write
1803DC7A000
heap
page read and write
175832EB000
heap
page read and write
2A01EF90000
heap
page read and write
1CF4FC11000
heap
page read and write
4800FA000
stack
page read and write
17583B9C000
heap
page read and write
5D3000
heap
page read and write
17583BCC000
heap
page read and write
1803DAD0000
heap
page read and write
2594BA00000
heap
page read and write
2323A600000
heap
page read and write
183A3C5B000
heap
page read and write
1803DD02000
heap
page read and write
17583B74000
heap
page read and write
1682A648000
heap
page read and write
63D000
heap
page read and write
17584002000
heap
page read and write
17583BBB000
heap
page read and write
1F057510000
heap
page read and write
183A3D02000
heap
page read and write
1803DC54000
heap
page read and write
183A3C00000
heap
page read and write
17583B8D000
heap
page read and write
FA409DC000
stack
page read and write
1F548A37000
heap
page read and write
4FF7F7000
stack
page read and write
17583B15000
heap
page read and write
2A01EF43000
heap
page read and write
1F549802000
heap
page read and write
175830E0000
heap
page read and write
1EAA8FF0000
heap
page read and write
2A01EFD0000
heap
page read and write
17583B7A000
heap
page read and write
4FFB7E000
stack
page read and write
1F548AAF000
heap
page read and write
17EA346D000
heap
page read and write
1CF4A6AB000
heap
page read and write
22C232C0000
heap
page read and write
1CF4FB90000
trusted library allocation
page read and write
1CF4FCAD000
heap
page read and write
1CF4A613000
heap
page read and write
7FFC671C1000
unkown
page execute read
17583BB6000
heap
page read and write
1E713829000
heap
page read and write
1CF4A69E000
heap
page read and write
1C289A50000
heap
page read and write
17584002000
heap
page read and write
1758323C000
heap
page read and write
1F548A52000
heap
page read and write
1803DC5E000
heap
page read and write
1CF4FFC0000
trusted library allocation
page read and write
1EAA8D8D000
heap
page read and write
2A479BC0000
trusted library allocation
page read and write
18002F000
direct allocation
page readonly
4A98B5C000
stack
page read and write
1CF4FE20000
trusted library allocation
page read and write
17583B79000
heap
page read and write
1F548AE4000
heap
page read and write
1E71383C000
heap
page read and write
FA40E7F000
stack
page read and write
1033EFF000
stack
page read and write
1CF4FEB0000
remote allocation
page read and write
1F549902000
heap
page read and write
1E713860000
heap
page read and write
1CF4FE20000
trusted library allocation
page read and write
183A3C75000
heap
page read and write
17EA3472000
heap
page read and write
1CF4FB50000
trusted library allocation
page read and write
1CF4FA40000
trusted library allocation
page read and write
2153FC00000
heap
page read and write
1F057623000
heap
page read and write
1F548A89000
heap
page read and write
2A479B50000
heap
page readonly
2323A640000
heap
page read and write
A1F997F000
stack
page read and write
1F548A29000
heap
page read and write
17583B79000
heap
page read and write
1CF4FC2B000
heap
page read and write
1682A4F0000
heap
page read and write
9EB8EFF000
stack
page read and write
9EB8C7A000
stack
page read and write
2594BB00000
heap
page read and write
649C77000
stack
page read and write
7FFC67219000
unkown
page readonly
17583B70000
heap
page read and write
1E713902000
heap
page read and write
17583B8D000
heap
page read and write
175831E0000
remote allocation
page read and write
7FFC67216000
unkown
page read and write
175832C5000
heap
page read and write
1F0574B0000
heap
page read and write
175832A2000
heap
page read and write
C5B9E7E000
stack
page read and write
2594BA56000
heap
page read and write
350707F000
stack
page read and write
4E09EE000
stack
page read and write
17583B79000
heap
page read and write
2A01EF43000
heap
page read and write
183A3C13000
heap
page read and write
350687C000
stack
page read and write
175830D0000
heap
page read and write
266E000
stack
page read and write
17583B76000
heap
page read and write
5F8000
heap
page read and write
17583B98000
heap
page read and write
DCEF9FC000
stack
page read and write
1758324B000
heap
page read and write
2A01F803000
heap
page read and write
17583B8C000
heap
page read and write
17583B75000
heap
page read and write
1CF4FA30000
trusted library allocation
page read and write
17583B17000
heap
page read and write
642000
heap
page read and write
17EA3210000
heap
page read and write
1803DC00000
heap
page read and write
1682A550000
heap
page read and write
17583B71000
heap
page read and write
1F548840000
heap
page read and write
1682A64F000
heap
page read and write
1F549113000
heap
page read and write
1CF4A5F0000
trusted library allocation
page read and write
22C232A6000
heap
page read and write
350717E000
stack
page read and write
175832D7000
heap
page read and write
1803DC2C000
heap
page read and write
17583200000
heap
page read and write
4FFA7A000
stack
page read and write
1682A713000
heap
page read and write
17583258000
heap
page read and write
780000
heap
page read and write
17583B74000
heap
page read and write
2A01F470000
remote allocation
page read and write
1F057643000
heap
page read and write
2323A702000
heap
page read and write
233C000
stack
page read and write
180000000
direct allocation
page read and write
4A993FC000
stack
page read and write
22C232B2000
heap
page read and write
649977000
stack
page read and write
2A478D82000
heap
page read and write
190000
heap
page read and write
1F0574A0000
heap
page read and write
17583B00000
heap
page read and write
5A2000
heap
page read and write
2594BA48000
heap
page read and write
1682A708000
heap
page read and write
17583229000
heap
page read and write
1C28A202000
trusted library allocation
page read and write
2153F9D0000
heap
page read and write
1EAA8D48000
heap
page read and write
2A01F470000
remote allocation
page read and write
649D7F000
unkown
page read and write
175831E0000
remote allocation
page read and write
2A01F7E0000
heap
page read and write
2A478D69000
heap
page read and write
7FFC671C0000
unkown
page readonly
1C289A8F000
heap
page read and write
1803DB30000
heap
page read and write
17583B79000
heap
page read and write
17583B75000
heap
page read and write
2594BA55000
heap
page read and write
175832B3000
heap
page read and write
22C23280000
heap
page read and write
17583B76000
heap
page read and write
53349CF000
stack
page read and write
22BE000
stack
page read and write
17583BBD000
heap
page read and write
217E000
stack
page read and write
2594B930000
heap
page read and write
17583B74000
heap
page read and write
64967E000
stack
page read and write
2323A4D0000
heap
page read and write
1803DC6B000
heap
page read and write
820000
heap
page read and write
760000
heap
page read and write
1CF4FC9F000
heap
page read and write
1CF4A6A6000
heap
page read and write
1F548A7C000
heap
page read and write
17583B79000
heap
page read and write
1803DC2D000
heap
page read and write
DCEFAFE000
stack
page read and write
17583B8C000
heap
page read and write
1F548AB4000
heap
page read and write
627000
heap
page read and write
24D7F820000
heap
page read and write
22C23291000
heap
page read and write
17583B72000
heap
page read and write
183A3B80000
heap
page read and write
649E7B000
stack
page read and write
1F057688000
heap
page read and write
C8C96FD000
stack
page read and write
1758324E000
heap
page read and write
1EAA8D8D000
heap
page read and write
1E713881000
heap
page read and write
7FFC671C0000
unkown
page readonly
17EA3440000
heap
page read and write
1CF4FE90000
trusted library allocation
page read and write
2A479025000
heap
page read and write
2153FC68000
heap
page read and write
1803E402000
trusted library allocation
page read and write
17EA3423000
heap
page read and write
7FFC671C0000
unkown
page readonly
2A01EFD2000
heap
page read and write
5334CFC000
stack
page read and write
A1F987F000
stack
page read and write
1F548ABD000
heap
page read and write
1682A702000
heap
page read and write
981A9FF000
stack
page read and write
1E713800000
heap
page read and write
22C230A0000
heap
page read and write
22C23296000
heap
page read and write
17EA66B0000
trusted library allocation
page read and write
1C2899C0000
heap
page read and write
1CF4A68C000
heap
page read and write
1C289B00000
heap
page read and write
1803DC97000
heap
page read and write
AB5000
heap
page read and write
1CF4A702000
heap
page read and write
10337DE000
stack
page read and write
140000
remote allocation
page read and write
1EAA8D30000
direct allocation
page execute and read and write
4E096B000
stack
page read and write
2594BB13000
heap
page read and write
24D00030000
heap
page readonly
4FF39B000
stack
page read and write
3506F7F000
stack
page read and write
1C289B13000
heap
page read and write
1F549141000
heap
page read and write
48037E000
stack
page read and write
2A01EFFC000
heap
page read and write
C5B9FFD000
stack
page read and write
2BAA10AD000
heap
page read and write
2594BA7C000
heap
page read and write
1C289A4D000
heap
page read and write
981A7FB000
stack
page read and write
1E713913000
heap
page read and write
96C20C5000
stack
page read and write
17583BA4000
heap
page read and write
C8C93FB000
stack
page read and write
175832AF000
heap
page read and write
1F548A6A000
heap
page read and write
9EB8DFE000
stack
page read and write
183A3C41000
heap
page read and write
2A479910000
trusted library allocation
page read and write
17583B9A000
heap
page read and write
1C4680EB000
heap
page read and write
17583B8C000
heap
page read and write
243B000
stack
page read and write
22C232C2000
heap
page read and write
183A3C37000
heap
page read and write
1C289A53000
heap
page read and write
96C247E000
stack
page read and write
1F548AC2000
heap
page read and write
1F057F14000
heap
page read and write
1EAA8D8D000
heap
page read and write
2A479B70000
trusted library allocation
page read and write
1758324A000
heap
page read and write
2A478D00000
trusted library allocation
page read and write
17583313000
heap
page read and write
17583B78000
heap
page read and write
2A01EF2E000
heap
page read and write
24D7DFC3000
heap
page read and write
17583B7A000
heap
page read and write
64932C000
stack
page read and write
510000
heap
page readonly
24D7DF37000
heap
page read and write
9EB8F7C000
stack
page read and write
60000
heap
page read and write
1C289A8B000
heap
page read and write
17583302000
heap
page read and write
1CF4A674000
heap
page read and write
17EA3449000
heap
page read and write
1F549843000
heap
page read and write
A1F9777000
stack
page read and write
542A87E000
stack
page read and write
17EA345E000
heap
page read and write
1682A600000
heap
page read and write
7FFC67212000
unkown
page readonly
17EA3485000
heap
page read and write
21E4000
heap
page read and write
17583249000
heap
page read and write
1CF4AF00000
heap
page read and write
17583B9A000
heap
page read and write
24D7E030000
heap
page read and write
2594BA66000
heap
page read and write
9EB8E78000
stack
page read and write
1F548AC3000
heap
page read and write
1CF4AE00000
heap
page read and write
17583B8D000
heap
page read and write
FA40EFE000
stack
page read and write
17583BD3000
heap
page read and write
18002F000
direct allocation
page readonly
18002E000
direct allocation
page read and write
1C289A69000
heap
page read and write
2A01EF1C000
heap
page read and write
627000
heap
page read and write
1CF4FE20000
trusted library allocation
page read and write
1E713813000
heap
page read and write
183A4402000
trusted library allocation
page read and write
DCEF87E000
stack
page read and write
175832FA000
heap
page read and write
2A01EF9C000
heap
page read and write
1F057666000
heap
page read and write
A80000
direct allocation
page execute and read and write
2A01EE90000
heap
page read and write
350737F000
stack
page read and write
981AAFD000
stack
page read and write
24D7DF8D000
heap
page read and write
1F548A4D000
heap
page read and write
1C289A3C000
heap
page read and write
226F000
stack
page read and write
1C289A69000
heap
page read and write
1F548A78000
heap
page read and write
1803DC45000
heap
page read and write
17583B9C000
heap
page read and write
1F548A63000
heap
page read and write
1F548B95000
heap
page read and write
1EAA8C50000
heap
page read and write
17EA3463000
heap
page read and write
2153FC28000
heap
page read and write
1C289A4A000
heap
page read and write
17583BDD000
heap
page read and write
A1F967B000
stack
page read and write
2A479B40000
trusted library allocation
page read and write
22F99F40000
heap
page read and write
1803DC7B000
heap
page read and write
5F8000
heap
page read and write
24D7FA04000
heap
page read and write
B3F4ACC000
stack
page read and write
17583B80000
heap
page read and write
2594BA53000
heap
page read and write
1CF4A678000
heap
page read and write
175832AA000
heap
page read and write
1C4680E0000
heap
page read and write
520000
heap
page read and write
1C289B08000
heap
page read and write
253E000
stack
page read and write
1CF4A6FC000
heap
page read and write
2A479B60000
trusted library allocation
page read and write
63E000
heap
page read and write
18002E000
direct allocation
page read and write
1CF4A66F000
heap
page read and write
175832E4000
heap
page read and write
17583B79000
heap
page read and write
5334C7E000
stack
page read and write
9D83DFB000
stack
page read and write
1682A4E0000
heap
page read and write
1CF4FCFB000
heap
page read and write
1CF4FCF7000
heap
page read and write
1CF4FB80000
trusted library allocation
page read and write
4067DFE000
stack
page read and write
2594C202000
trusted library allocation
page read and write
1F0576E2000
heap
page read and write
2580000
remote allocation
page read and write
21540202000
trusted library allocation
page read and write
1CF4FCF1000
heap
page read and write
17583BDD000
heap
page read and write
1CF4A707000
heap
page read and write
1758325A000
heap
page read and write
22C232C2000
heap
page read and write
1F549800000
heap
page read and write
2A01EF90000
heap
page read and write
B3F51FF000
stack
page read and write
17583B8B000
heap
page read and write
2A01F803000
heap
page read and write
C8C94FD000
stack
page read and write
17583B71000
heap
page read and write
1C468350000
heap
page read and write
17583B9A000
heap
page read and write
17583B8E000
heap
page read and write
17EA346D000
heap
page read and write
18002F000
direct allocation
page readonly
C8C937D000
stack
page read and write
24D7DF00000
heap
page read and write
1C2899F0000
trusted library allocation
page read and write
1F549802000
heap
page read and write
17583B52000
heap
page read and write
17583BC6000
heap
page read and write
18002D000
direct allocation
page readonly
24D7DDD5000
heap
page read and write
17584002000
heap
page read and write
1803DC4B000
heap
page read and write
2A01EFD2000
heap
page read and write
1F548AA6000
heap
page read and write
1C289A88000
heap
page read and write
7FFC67219000
unkown
page readonly
17583B7A000
heap
page read and write
1033A7E000
stack
page read and write
C5B975C000
stack
page read and write
22F99E40000
heap
page read and write
2594BB08000
heap
page read and write
22C232BD000
heap
page read and write
2A01ED30000
heap
page read and write
1E713908000
heap
page read and write
1E71385C000
heap
page read and write
2580000
remote allocation
page read and write
17EA3457000
heap
page read and write
2153FD00000
heap
page read and write
17583B8C000
heap
page read and write
2594BA13000
heap
page read and write
5D2000
heap
page read and write
649A78000
stack
page read and write
1CF4FC0B000
heap
page read and write
185000
heap
page read and write
1E71385A000
heap
page read and write
1CF4FCA0000
trusted library allocation
page read and write
1EAA8F80000
heap
page read and write
1C289A00000
heap
page read and write
2A478C80000
heap
page read and write
183A3B10000
heap
page read and write
1CF4FB80000
trusted library allocation
page read and write
1CF4A6FC000
heap
page read and write
1F548ACB000
heap
page read and write
1F5487F0000
heap
page read and write
1803DC69000
heap
page read and write
17583B9C000
heap
page read and write
2153FC40000
heap
page read and write
1803DC29000
heap
page read and write
17EA33F0000
heap
page read and write
2240000
trusted library allocation
page read and write
1F548BE1000
heap
page read and write
17583253000
heap
page read and write
17583B71000
heap
page read and write
1CF4ADE3000
trusted library allocation
page read and write
17583BD3000
heap
page read and write
17583B8D000
heap
page read and write
7A509FE000
stack
page read and write
5A2000
heap
page read and write
24D7DF7D000
heap
page read and write
1F548ACE000
heap
page read and write
22C232A7000
heap
page read and write
649CFE000
stack
page read and write
1EAA8D40000
heap
page read and write
4A98BDE000
stack
page read and write
1803DC47000
heap
page read and write
17583B92000
heap
page read and write
1803DC46000
heap
page read and write
17EA6EB0000
heap
page read and write
183A3C29000
heap
page read and write
1E713852000
heap
page read and write
4E0EFF000
stack
page read and write
17583BD5000
heap
page read and write
2323AE02000
trusted library allocation
page read and write
649B7E000
stack
page read and write
2A01EFFC000
heap
page read and write
17583B7F000
heap
page read and write
1E713826000
heap
page read and write
A1F957C000
stack
page read and write
5BB000
heap
page read and write
21540190000
trusted library allocation
page read and write
22C232CA000
heap
page read and write
22C232CA000
heap
page read and write
5334DFF000
stack
page read and write
B3F4FF9000
stack
page read and write
24D7DF30000
heap
page read and write
2A01EF32000
heap
page read and write
183A3C77000
heap
page read and write
22C232B2000
heap
page read and write
2323A4C0000
heap
page read and write
1F5491F0000
heap
page read and write
17583B71000
heap
page read and write
1C289A2A000
heap
page read and write
1803DC2E000
heap
page read and write
17EA345F000
heap
page read and write
17EA3463000
heap
page read and write
2594BB02000
heap
page read and write
17583B8C000
heap
page read and write
542A7FB000
stack
page read and write
1F5491D3000
heap
page read and write
1CF4FCE9000
heap
page read and write
1F057C70000
trusted library allocation
page read and write
1803DC44000
heap
page read and write
1682A647000
heap
page read and write
1F548A3A000
heap
page read and write
2A01EF7B000
heap
page read and write
4067C7B000
stack
page read and write
1EAA8D6A000
heap
page read and write
17583B76000
heap
page read and write
17583A02000
heap
page read and write
649878000
stack
page read and write
1C4680EE000
heap
page read and write
1F549002000
heap
page read and write
1758324C000
heap
page read and write
1CF4AF59000
heap
page read and write
17583B91000
heap
page read and write
C8C95FE000
stack
page read and write
DCEFB7F000
stack
page read and write
175831E0000
remote allocation
page read and write
2BAA10A0000
heap
page read and write
1CF4FB50000
trusted library allocation
page read and write
1CF4FE80000
trusted library allocation
page read and write
17583BCF000
heap
page read and write
1CF4FC15000
heap
page read and write
22C232CC000
heap
page read and write
1CF4FB74000
trusted library allocation
page read and write
7A5097E000
stack
page read and write
1F548FA0000
trusted library allocation
page read and write
1EAA8CE0000
heap
page read and write
17583B94000
heap
page read and write
17583B8E000
heap
page read and write
1CF4FCB0000
trusted library allocation
page read and write
1C4681E0000
heap
page read and write
17583B79000
heap
page read and write
2A478C60000
heap
page read and write
A1F918E000
stack
page read and write
17584002000
heap
page read and write
1803DB60000
trusted library allocation
page read and write
A60000
heap
page read and write
1EAA8F10000
heap
page read and write
1CF4A6A9000
heap
page read and write
C8C927C000
stack
page read and write
2594B940000
heap
page read and write
568000
heap
page read and write
5334945000
stack
page read and write
1033CFE000
stack
page read and write
1EAA8F84000
heap
page read and write
17583B8D000
heap
page read and write
4067D7E000
stack
page read and write
22C2329F000
heap
page read and write
1F548A25000
heap
page read and write
1CF4FE70000
trusted library allocation
page read and write
183A3C02000
heap
page read and write
2323A590000
remote allocation
page read and write
2A01EF70000
heap
page read and write
5EE000
heap
page read and write
17584002000
heap
page read and write
4A98F7C000
stack
page read and write
17583B74000
heap
page read and write
5334E7B000
stack
page read and write
1F5487E0000
heap
page read and write
DCEFA7B000
stack
page read and write
1803DC13000
heap
page read and write
1CF4ADE0000
trusted library allocation
page read and write
2A478D71000
heap
page read and write
17583140000
heap
page read and write
1F549913000
heap
page read and write
2BAA0FC0000
heap
page read and write
17583B71000
heap
page read and write
4D0000
direct allocation
page execute and read and write
2A01EE70000
heap
page read and write
1CF4A6AF000
heap
page read and write
2594BA66000
heap
page read and write
5CA000
heap
page read and write
2594BA58000
heap
page read and write
1803DC61000
heap
page read and write
1F549900000
heap
page read and write
1F548A2E000
heap
page read and write
17583B74000
heap
page read and write
1CF4AF02000
heap
page read and write
981A35E000
stack
page read and write
C5B9EFF000
stack
page read and write
FA40F79000
stack
page read and write
625000
heap
page read and write
17583B79000
heap
page read and write
17583B8E000
heap
page read and write
B3F50FA000
stack
page read and write
2594BA57000
heap
page read and write
17583B72000
heap
page read and write
1CF4FB71000
trusted library allocation
page read and write
7A50A7E000
stack
page read and write
175832B1000
heap
page read and write
175832EE000
heap
page read and write
17584000000
heap
page read and write
DCEF5EE000
stack
page read and write
1CF4FC5B000
heap
page read and write
1E71385B000
heap
page read and write
22C23296000
heap
page read and write
17583B79000
heap
page read and write
C5B9C7E000
stack
page read and write
A1F910B000
stack
page read and write
2A479029000
heap
page read and write
22F99E10000
heap
page read and write
22A0000
heap
page read and write
7FFC67212000
unkown
page readonly
22C23245000
heap
page read and write
180000000
direct allocation
page read and write
17583B74000
heap
page read and write
1F548BFD000
heap
page read and write
17583B72000
heap
page read and write
4A98E7E000
stack
page read and write
981A2DB000
stack
page read and write
17583213000
heap
page read and write
3506C7B000
stack
page read and write
17583BD5000
heap
page read and write
17583B8C000
heap
page read and write
1F548BB8000
heap
page read and write
17583B9C000
heap
page read and write
1CF4FE40000
trusted library allocation
page read and write
C8C90FE000
stack
page read and write
22C23240000
heap
page read and write
642000
heap
page read and write
115000
stack
page read and write
17583B9A000
heap
page read and write
2594BA49000
heap
page read and write
6493AE000
stack
page read and write
981A3DF000
stack
page read and write
4E11FC000
stack
page read and write
1F057E02000
heap
page read and write
1803DC3A000
heap
page read and write
7FFC67219000
unkown
page readonly
C5B9BFC000
stack
page read and write
B3F547F000
stack
page read and write
1CF4AF13000
heap
page read and write
2A478D72000
heap
page read and write
2A01F7F5000
heap
page read and write
2594BA50000
heap
page read and write
17EA347E000
heap
page read and write
17583B79000
heap
page read and write
17583B74000
heap
page read and write
1F549871000
heap
page read and write
2A01EFD2000
heap
page read and write
7C0000
heap
page read and write
17583B9A000
heap
page read and write
17EA3370000
heap
page read and write
22C232A4000
heap
page read and write
1CF4A656000
heap
page read and write
2A01F7EE000
heap
page read and write
1F0576CC000
heap
page read and write
17EA3675000
heap
page read and write
17583BA5000
heap
page read and write
17583248000
heap
page read and write
2A01EF9B000
heap
page read and write
1CF4A600000
heap
page read and write
5A2000
heap
page read and write
1F549854000
heap
page read and write
17583BBD000
heap
page read and write
2A478D10000
trusted library allocation
page read and write
2A01EFD0000
heap
page read and write
17EA345A000
heap
page read and write
1682A67E000
heap
page read and write
1EAA9010000
heap
page read and write
1682AE02000
trusted library allocation
page read and write
1F057F00000
heap
page read and write
1CF4FD02000
heap
page read and write
2323A629000
heap
page read and write
1EAA9015000
heap
page read and write
1F057702000
heap
page read and write
1803DC3E000
heap
page read and write
2A01F7F8000
heap
page read and write
26EE000
stack
page read and write
627000
heap
page read and write
22C232CA000
heap
page read and write
17583BC6000
heap
page read and write
27EB000
stack
page read and write
140000
remote allocation
page read and write
1CF4FFA0000
trusted library allocation
page read and write
5F8000
heap
page read and write
1CF4FC1F000
heap
page read and write
1E713E80000
trusted library allocation
page read and write
1803DC2F000
heap
page read and write
1CF4AF18000
heap
page read and write
1803DC42000
heap
page read and write
22C232CD000
heap
page read and write
1C289A71000
heap
page read and write
22F99CE0000
heap
page read and write
175832EE000
heap
page read and write
22C232CA000
heap
page read and write
25FF000
stack
page read and write
2A478D69000
heap
page read and write
1803DC84000
heap
page read and write
B3F53FB000
stack
page read and write
1EAA8CC0000
heap
page read and write
5334D7E000
stack
page read and write
1CF4FC00000
heap
page read and write
2A01EF68000
heap
page read and write
22F99F95000
heap
page read and write
1F548AC0000
heap
page read and write
1803DC31000
heap
page read and write
1F057629000
heap
page read and write
17EA3469000
heap
page read and write
22C232A2000
heap
page read and write
2A01EFFC000
heap
page read and write
7FFC671C0000
unkown
page readonly
1F548A44000
heap
page read and write
2594B9A0000
heap
page read and write
2A01EEE0000
heap
page read and write
17583BBF000
heap
page read and write
2A01EFD0000
heap
page read and write
17583316000
heap
page read and write
17EA345A000
heap
page read and write
4FF97A000
stack
page read and write
DCEF97B000
stack
page read and write
1F548A82000
heap
page read and write
2594BA92000
heap
page read and write
22C231F0000
heap
page read and write
2A01EF7B000
heap
page read and write
1CF4FEB0000
remote allocation
page read and write
1CF4B9F0000
trusted library allocation
page read and write
2A478D71000
heap
page read and write
2A01EF90000
heap
page read and write
1CF4FC86000
heap
page read and write
1803DC5F000
heap
page read and write
1F057613000
heap
page read and write
1C467F90000
heap
page read and write
2A478D33000
heap
page read and write
2A01EFD2000
heap
page read and write
24D7FA00000
heap
page read and write
1CF4FC16000
heap
page read and write
24D7DF84000
heap
page read and write
C8C8AFC000
stack
page read and write
1CF4FB70000
trusted library allocation
page read and write
24D001E0000
heap
page read and write
1CF4AF18000
heap
page read and write
1CF4FB90000
trusted library allocation
page read and write
1E7136B0000
heap
page read and write
17583B76000
heap
page read and write
1803DC4D000
heap
page read and write
7FFC671C1000
unkown
page execute read
4A992FE000
stack
page read and write
1033DFF000
stack
page read and write
2A478BF0000
heap
page read and write
1F549169000
heap
page read and write
1CF4FC48000
heap
page read and write
1E71385E000
heap
page read and write
17583254000
heap
page read and write
7A505BA000
stack
page read and write
1C468355000
heap
page read and write
9EB8D7E000
stack
page read and write
2580000
remote allocation
page read and write
642000
heap
page read and write
A90000
heap
page readonly
183A3C67000
heap
page read and write
675000
stack
page read and write
DCEF56A000
stack
page read and write
1F548A13000
heap
page read and write
23BE000
stack
page read and write
3506A7B000
stack
page read and write
24D7DDD0000
heap
page read and write
17EA367B000
heap
page read and write
1D4000
heap
page read and write
5F5000
heap
page read and write
C8C91FF000
stack
page read and write
18002F000
direct allocation
page readonly
96C21CF000
stack
page read and write
22C232C0000
heap
page read and write
17EA3670000
heap
page read and write
17583BBD000
heap
page read and write
1682A580000
trusted library allocation
page read and write
9EB8CFE000
stack
page read and write
22C232BD000
heap
page read and write
9D837AB000
stack
page read and write
96C24FE000
stack
page read and write
22C2328B000
heap
page read and write
1CF4A726000
heap
page read and write
17583BAB000
heap
page read and write
1682A613000
heap
page read and write
540000
trusted library allocation
page read and write
2A478D71000
heap
page read and write
5CA000
heap
page read and write
1E713900000
heap
page read and write
175832CA000
heap
page read and write
1CF4AE15000
heap
page read and write
2A01EEE5000
heap
page read and write
1CF4FD00000
heap
page read and write
4E0E7B000
stack
page read and write
96C214E000
stack
page read and write
22F99E49000
heap
page read and write
1CF4AF04000
heap
page read and write
2153FC64000
heap
page read and write
22C232A1000
heap
page read and write
2323A613000
heap
page read and write
17583BA1000
heap
page read and write
17583BBD000
heap
page read and write
2A01EFFC000
heap
page read and write
180000000
direct allocation
page read and write
1E7136C0000
heap
page read and write
24D7DDC0000
heap
page read and write
1CF4ADF0000
trusted library allocation
page read and write
64977C000
stack
page read and write
1F548AD9000
heap
page read and write
7FFC67219000
unkown
page readonly
2323A590000
remote allocation
page read and write
1EAA8F60000
heap
page readonly
3506B7D000
stack
page read and write
1803DC77000
heap
page read and write
1C289A7B000
heap
page read and write
1CF4A629000
heap
page read and write
17583B76000
heap
page read and write
18002D000
direct allocation
page readonly
2A478CF0000
trusted library allocation
page read and write
1C289A13000
heap
page read and write
2594B9D0000
trusted library allocation
page read and write
1F05766D000
heap
page read and write
7FFC67212000
unkown
page readonly
2153FA30000
heap
page read and write
1C468200000
heap
page read and write
813000
heap
page read and write
1682A602000
heap
page read and write
1682A655000
heap
page read and write
542A77F000
stack
page read and write
7FFC671C1000
unkown
page execute read
22C232C0000
heap
page read and write
24D7DFA9000
heap
page read and write
7FFC671C1000
unkown
page execute read
981A8F7000
stack
page read and write
1CF4A714000
heap
page read and write
17583B89000
heap
page read and write
642000
heap
page read and write
17583B63000
heap
page read and write
4A990FE000
stack
page read and write
2153FC02000
heap
page read and write
17583B8D000
heap
page read and write
17583B76000
heap
page read and write
1682A670000
heap
page read and write
1803DC60000
heap
page read and write
3A0000
heap
page read and write
2323A530000
heap
page read and write
9D83FFE000
stack
page read and write
22C232D1000
heap
page read and write
C8C8EFB000
stack
page read and write
1682A688000
heap
page read and write
1CF4A4F0000
heap
page read and write
17583B71000
heap
page read and write
1CF4AE02000
heap
page read and write
183A3BB0000
trusted library allocation
page read and write
5D4000
heap
page read and write
22C232C2000
heap
page read and write
1CF4A490000
heap
page read and write
4E10FE000
stack
page read and write
2A01EF00000
heap
page read and write
2A01EFD0000
heap
page read and write
1CF4FEB0000
remote allocation
page read and write
5CA000
heap
page read and write
1803DAC0000
heap
page read and write
2A01EF68000
heap
page read and write
625000
heap
page read and write
4A9907B000
stack
page read and write
17583B5A000
heap
page read and write
1F54981D000
heap
page read and write
2594BA4D000
heap
page read and write
1682A700000
heap
page read and write
17583B9A000
heap
page read and write
1803DC4A000
heap
page read and write
17583B76000
heap
page read and write
175832A9000
heap
page read and write
2A01F470000
remote allocation
page read and write
17583B71000
heap
page read and write
17583BA2000
heap
page read and write
17583256000
heap
page read and write
2323A560000
trusted library allocation
page read and write
1E714002000
trusted library allocation
page read and write
2A01EF47000
heap
page read and write
1F057713000
heap
page read and write
1682A63C000
heap
page read and write
1CF4FC3D000
heap
page read and write
2153FD02000
heap
page read and write
22C232B2000
heap
page read and write
17583308000
heap
page read and write
1F0576CA000
heap
page read and write
103375B000
stack
page read and write
4E0FF7000
stack
page read and write
2153FC55000
heap
page read and write
17583B79000
heap
page read and write
1CF4A702000
heap
page read and write
17583283000
heap
page read and write
1CF4FC11000
heap
page read and write
1803DC4F000
heap
page read and write
22C232C0000
heap
page read and write
1EAA8D6F000
heap
page read and write
1F548FF0000
trusted library allocation
page read and write
7FFC67216000
unkown
page read and write
4A994FF000
stack
page read and write
1CF4A6AF000
heap
page read and write
625000
heap
page read and write
4E0C7E000
stack
page read and write
2153FD24000
heap
page read and write
2A01F7F3000
heap
page read and write
2A01F7EF000
heap
page read and write
7CB000
heap
page read and write
22C232D2000
heap
page read and write
1682A62A000
heap
page read and write
2A478C00000
trusted library allocation
page read and write
DCEF8FE000
stack
page read and write
17583BA1000
heap
page read and write
C5B9AFE000
stack
page read and write
1F548B13000
heap
page read and write
4A991F7000
stack
page read and write
542A32C000
stack
page read and write
2A01EF47000
heap
page read and write
183A3D13000
heap
page read and write
2153FC13000
heap
page read and write
7FFC67216000
unkown
page read and write
1F549108000
heap
page read and write
17583B8A000
heap
page read and write
5EE000
heap
page read and write
1CF4FC0C000
heap
page read and write
17583B9A000
heap
page read and write
17583170000
trusted library allocation
page read and write
150000
heap
page read and write
4801FB000
stack
page read and write
17583B79000
heap
page read and write
17583B79000
heap
page read and write
17583B9C000
heap
page read and write
1CF4A480000
heap
page read and write
1F54991B000
heap
page read and write
24D7F840000
direct allocation
page execute and read and write
2A01EF9B000
heap
page read and write
350727E000
stack
page read and write
1CF4FB94000
trusted library allocation
page read and write
1D0000
heap
page read and write
17583B9B000
heap
page read and write
22C231D0000
heap
page read and write
1E713720000
heap
page read and write
2A01EF6B000
heap
page read and write
1CF4FB58000
trusted library allocation
page read and write
17583B9A000
heap
page read and write
18002D000
direct allocation
page readonly
1F548A61000
heap
page read and write
1CF4AF59000
heap
page read and write
18002E000
direct allocation
page read and write
2A478D27000
heap
page read and write
17584002000
heap
page read and write
1CF4B570000
trusted library allocation
page read and write
180000
heap
page read and write
2323A590000
remote allocation
page read and write
17583BA4000
heap
page read and write
17EA3420000
heap
page read and write
1CF4FB5E000
trusted library allocation
page read and write
180000000
direct allocation
page read and write
2A01EF08000
heap
page read and write
18002E000
direct allocation
page read and write
1682A67D000
heap
page read and write
1F548A00000
heap
page read and write
1CF4B460000
trusted library allocation
page read and write
17583B9C000
heap
page read and write
1CF4FC4A000
heap
page read and write
C8C97FF000
stack
page read and write
9D83CFB000
stack
page read and write
2594BA77000
heap
page read and write
2A01EFD2000
heap
page read and write
18002D000
direct allocation
page readonly
9D83EFB000
stack
page read and write
22C232B2000
heap
page read and write
1F0576C3000
heap
page read and write
4067CFE000
stack
page read and write
183A3B20000
heap
page read and write
1CF4A693000
heap
page read and write
22F99F90000
heap
page read and write
AB0000
heap
page read and write
276F000
stack
page read and write
FA40DF9000
stack
page read and write
A1F947E000
stack
page read and write
2A01EFD0000
heap
page read and write
21E0000
heap
page read and write
17583B8C000
heap
page read and write
There are 998 hidden memdumps, click here to show them.