IOC Report
2V7zjcga5L

loading gif

Files

File Path
Type
Category
Malicious
2V7zjcga5L.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x61b17e72, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\2V7zjcga5L.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\2V7zjcga5L.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\2V7zjcga5L.dll,DllRegisterServer
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\2V7zjcga5L.dll,DllUnregisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\FkTRnOPTdzmty\VedtYV.dll"
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\2V7zjcga5L.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\2V7zjcga5L.dll",#1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://23.239.0.12/
23.239.0.12
malicious
https://23.239.0.12/q
unknown
malicious
https://23.239.0.12/G
unknown
malicious
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
http://crl.ver)
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://www.tiktok.com/legal/report/feedback
unknown
http://help.disneyplus.com.
unknown
https://support.hotspotshield.com/
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
https://disneyplus.com/legal.
unknown
There are 2 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
23.239.0.12
unknown
United States
malicious
192.168.2.1
unknown
unknown
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100

Memdumps

Base Address
Regiontype
Protect
Malicious
22D1DC20000
direct allocation
page execute and read and write
malicious
209F7680000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
640000
direct allocation
page execute and read and write
malicious
24A0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
BB4000
heap
page read and write
5DF000
heap
page read and write
2661A700000
heap
page read and write
2404E37F000
heap
page read and write
23BD0E54000
heap
page read and write
23BD0E2A000
heap
page read and write
2661F200000
heap
page read and write
7FFA53216000
unkown
page read and write
2661F288000
heap
page read and write
90526F7000
stack
page read and write
19141108000
heap
page read and write
2404E383000
heap
page read and write
2404D813000
heap
page read and write
2404E383000
heap
page read and write
237CE271000
heap
page read and write
2404E397000
heap
page read and write
2404E373000
heap
page read and write
2661F620000
trusted library allocation
page read and write
22D1C290000
direct allocation
page execute and read and write
22D1C2B8000
heap
page read and write
7FFA531C0000
unkown
page readonly
2404E379000
heap
page read and write
24D0000
heap
page readonly
2661F5B0000
trusted library allocation
page read and write
2404E37F000
heap
page read and write
2404E397000
heap
page read and write
2404E396000
heap
page read and write
2404D6E0000
heap
page read and write
2661F2FF000
heap
page read and write
70927D000
stack
page read and write
19BDFFFC000
heap
page read and write
A46A8FE000
stack
page read and write
23BD0E49000
heap
page read and write
2B9D000
stack
page read and write
209F74F8000
heap
page read and write
2661F500000
trusted library allocation
page read and write
CE97E7E000
stack
page read and write
2404E398000
heap
page read and write
2404E37F000
heap
page read and write
2404E39A000
heap
page read and write
23BD0E82000
heap
page read and write
24342290000
heap
page read and write
209F7705000
heap
page read and write
2404E39A000
heap
page read and write
19BDFDB0000
trusted library allocation
page read and write
7F0000
remote allocation
page read and write
2404D8D7000
heap
page read and write
FC39C7B000
stack
page read and write
2661F640000
remote allocation
page read and write
19141086000
heap
page read and write
23BD0F00000
heap
page read and write
2404E3DB000
heap
page read and write
26619C13000
heap
page read and write
2D2F000
stack
page read and write
872B32B000
stack
page read and write
2404D84D000
heap
page read and write
23FDAB90000
trusted library allocation
page read and write
18002E000
direct allocation
page read and write
209F7610000
heap
page read and write
2040000
heap
page read and write
520000
heap
page readonly
2661F521000
trusted library allocation
page read and write
7FFA531C0000
unkown
page readonly
1A74CE2D000
heap
page read and write
22D1DC80000
heap
page read and write
1EB8EF40000
trusted library allocation
page read and write
24342481000
heap
page read and write
23FDAC57000
heap
page read and write
2404D800000
heap
page read and write
19140FF0000
trusted library allocation
page read and write
2404E3BA000
heap
page read and write
26619C58000
heap
page read and write
2404E37F000
heap
page read and write
B70000
heap
page read and write
2CB0000
remote allocation
page read and write
23BD0F08000
heap
page read and write
2404E397000
heap
page read and write
2404E802000
heap
page read and write
FC3AAFE000
stack
page read and write
2661F2A3000
heap
page read and write
209F7670000
direct allocation
page execute and read and write
24342402000
heap
page read and write
1A74CD60000
heap
page read and write
19BDFF80000
trusted library allocation
page read and write
19BE0220000
trusted library allocation
page read and write
2404E373000
heap
page read and write
26619C3F000
heap
page read and write
180000000
direct allocation
page read and write
2661A718000
heap
page read and write
BE0000
heap
page read and write
237CE262000
heap
page read and write
22D1C2F8000
heap
page read and write
2661F600000
trusted library allocation
page read and write
15ADD7B000
stack
page read and write
A46A87F000
stack
page read and write
2404E802000
heap
page read and write
1EB8F048000
heap
page read and write
2404E821000
heap
page read and write
15ADE77000
stack
page read and write
2404E397000
heap
page read and write
250F000
stack
page read and write
2661F610000
trusted library allocation
page read and write
1C1350C3000
heap
page read and write
24342500000
heap
page read and write
1A74CFC0000
heap
page read and write
2D827FE000
stack
page read and write
1914107C000
heap
page read and write
1C1350B0000
heap
page read and write
2404E397000
heap
page read and write
1EB8F04F000
heap
page read and write
2404E397000
heap
page read and write
1EB8F029000
heap
page read and write
2C9F000
stack
page read and write
2404D740000
heap
page read and write
C3D000
heap
page read and write
1A74CDF0000
heap
page read and write
2404E374000
heap
page read and write
1B0000
heap
page read and write
18002D000
direct allocation
page readonly
2404E397000
heap
page read and write
745000
heap
page read and write
209F753E000
heap
page read and write
7FFA53219000
unkown
page readonly
FC39E77000
stack
page read and write
2661F22D000
heap
page read and write
26619CFE000
heap
page read and write
209F7546000
heap
page read and write
2661F262000
heap
page read and write
2661F770000
trusted library allocation
page read and write
237CE180000
heap
page read and write
BDD000
heap
page read and write
23FDAC29000
heap
page read and write
209F754F000
heap
page read and write
1EB8F108000
heap
page read and write
FC25DF8000
stack
page read and write
237CE1E0000
heap
page read and write
90527FF000
stack
page read and write
2661F5B0000
trusted library allocation
page read and write
26619CA0000
heap
page read and write
2630000
trusted library allocation
page read and write
2404D908000
heap
page read and write
19141113000
heap
page read and write
209F9080000
heap
page read and write
19141058000
heap
page read and write
2D826FF000
stack
page read and write
26619D02000
heap
page read and write
2404E371000
heap
page read and write
709379000
stack
page read and write
2661F2FC000
heap
page read and write
2404E802000
heap
page read and write
2404E3A3000
heap
page read and write
1EB8EDE0000
heap
page read and write
209F75F0000
heap
page read and write
2404D8C4000
heap
page read and write
22D1DD20000
heap
page read and write
1A74CE06000
heap
page read and write
22D1C311000
heap
page read and write
2404D871000
heap
page read and write
7FFA531C1000
unkown
page execute read
2CB0000
remote allocation
page read and write
19BDFF70000
trusted library allocation
page read and write
26619C75000
heap
page read and write
19141013000
heap
page read and write
24342440000
heap
page read and write
26619D25000
heap
page read and write
23BD0E3C000
heap
page read and write
2404E31A000
heap
page read and write
5B9B3F9000
stack
page read and write
2404E399000
heap
page read and write
C0B000
heap
page read and write
2404E377000
heap
page read and write
26619BE1000
trusted library allocation
page read and write
15ADF7E000
stack
page read and write
18002F000
direct allocation
page readonly
872BA7F000
stack
page read and write
2404E802000
heap
page read and write
88D40FB000
stack
page read and write
5B9B4FF000
stack
page read and write
872BC7F000
stack
page read and write
2404D829000
heap
page read and write
2404E81A000
heap
page read and write
2404E387000
heap
page read and write
18002F000
direct allocation
page readonly
A46A59E000
stack
page read and write
19BDFDA0000
heap
page read and write
23FDAA30000
heap
page read and write
2404E397000
heap
page read and write
24342413000
heap
page read and write
34C19CD000
stack
page read and write
2404D7E0000
remote allocation
page read and write
2661A759000
heap
page read and write
19BDFFB0000
heap
page read and write
1A74CE22000
heap
page read and write
2404D7E0000
remote allocation
page read and write
2404E391000
heap
page read and write
FC3A8F9000
stack
page read and write
1A74CE16000
heap
page read and write
24342513000
heap
page read and write
2404E379000
heap
page read and write
2404E3A5000
heap
page read and write
54B000
heap
page read and write
2404E373000
heap
page read and write
2404E397000
heap
page read and write
23BD0D80000
trusted library allocation
page read and write
88D41FE000
stack
page read and write
19BDFFB8000
heap
page read and write
26D4000
heap
page read and write
FC25E7E000
unkown
page read and write
2D8277F000
stack
page read and write
7FFA53216000
unkown
page read and write
1A74CE22000
heap
page read and write
19141027000
heap
page read and write
5B9B37E000
stack
page read and write
23FDAA20000
heap
page read and write
19BE0215000
heap
page read and write
872B3AF000
stack
page read and write
2661F1D0000
trusted library allocation
page read and write
23BD0E4B000
heap
page read and write
23FDAC5D000
heap
page read and write
FC25AF7000
stack
page read and write
1EB8F000000
heap
page read and write
26619B40000
heap
page read and write
A46A515000
stack
page read and write
2404E31C000
heap
page read and write
23BD0E13000
heap
page read and write
2404E383000
heap
page read and write
180000000
direct allocation
page read and write
1C1350BD000
heap
page read and write
FC25CFE000
stack
page read and write
19141061000
heap
page read and write
2404E3A6000
heap
page read and write
7FFA53216000
unkown
page read and write
1EB8F087000
heap
page read and write
FC259F7000
stack
page read and write
23FDAD00000
heap
page read and write
90525FB000
stack
page read and write
24342478000
heap
page read and write
1914103C000
heap
page read and write
C01000
heap
page read and write
23FDAC5C000
heap
page read and write
2404E3AD000
heap
page read and write
1EB8F102000
heap
page read and write
1D0000
heap
page read and write
2404D916000
heap
page read and write
2404E3B0000
heap
page read and write
1A74CE34000
heap
page read and write
237CE26C000
heap
page read and write
2661F524000
trusted library allocation
page read and write
90520FB000
stack
page read and write
2404E397000
heap
page read and write
90521FD000
stack
page read and write
2661F2F7000
heap
page read and write
23BD0E4D000
heap
page read and write
2404D8C9000
heap
page read and write
2404D84F000
heap
page read and write
2404E374000
heap
page read and write
2661F5F0000
trusted library allocation
page read and write
237CE18B000
heap
page read and write
19BE0150000
trusted library allocation
page read and write
A46A97E000
stack
page read and write
2D40000
heap
page read and write
19140F50000
heap
page read and write
1F6F000
stack
page read and write
2661F302000
heap
page read and write
2661F520000
trusted library allocation
page read and write
2404E3A3000
heap
page read and write
1A74D125000
heap
page read and write
23BD0E4E000
heap
page read and write
23BD0E55000
heap
page read and write
23FDAC7C000
heap
page read and write
4F0000
heap
page read and write
2404E397000
heap
page read and write
26619C79000
heap
page read and write
2661F2DB000
heap
page read and write
24342428000
heap
page read and write
23FDAD02000
heap
page read and write
5AE000
heap
page read and write
19BDFFC0000
heap
page read and write
2404E378000
heap
page read and write
FC39FFC000
stack
page read and write
2404D855000
heap
page read and write
23BD1802000
trusted library allocation
page read and write
19141055000
heap
page read and write
1A74CE17000
heap
page read and write
7FFA53219000
unkown
page readonly
2404E398000
heap
page read and write
15ADAFE000
stack
page read and write
CE981F7000
stack
page read and write
26619CAF000
heap
page read and write
2661F2B3000
heap
page read and write
209F7650000
heap
page read and write
1A74CE01000
heap
page read and write
FC2577E000
stack
page read and write
22D1C210000
heap
page read and write
2661F508000
trusted library allocation
page read and write
22D1C270000
heap
page read and write
7FFA53212000
unkown
page readonly
18002D000
direct allocation
page readonly
7F0000
remote allocation
page read and write
BB4000
heap
page read and write
24342C02000
trusted library allocation
page read and write
237CE259000
heap
page read and write
2661F524000
trusted library allocation
page read and write
BB0000
heap
page read and write
2D8297B000
stack
page read and write
2404E397000
heap
page read and write
2404E397000
heap
page read and write
5B9B57E000
stack
page read and write
2404D8A5000
heap
page read and write
2404E383000
heap
page read and write
7FFA531C1000
unkown
page execute read
2661A5E0000
trusted library allocation
page read and write
88D3BEB000
stack
page read and write
872B77B000
stack
page read and write
22D1C1F0000
heap
page read and write
1A74CE14000
heap
page read and write
237CE262000
heap
page read and write
2404E397000
heap
page read and write
19BE0130000
heap
page readonly
26619D07000
heap
page read and write
240E000
stack
page read and write
2661F640000
remote allocation
page read and write
2661A5F0000
trusted library allocation
page read and write
2404D852000
heap
page read and write
15ADB7E000
stack
page read and write
24F0000
trusted library allocation
page read and write
872BB7F000
stack
page read and write
24342400000
heap
page read and write
2661A602000
heap
page read and write
2CB0000
remote allocation
page read and write
175000
stack
page read and write
26619AD0000
heap
page read and write
1A74CE06000
heap
page read and write
740000
heap
page read and write
2661F216000
heap
page read and write
24342300000
heap
page read and write
23FDAC86000
heap
page read and write
258B000
stack
page read and write
BE0000
heap
page read and write
22D1C235000
heap
page read and write
2404D770000
trusted library allocation
page read and write
C0B000
heap
page read and write
7FFA531C0000
unkown
page readonly
2404E383000
heap
page read and write
FC256FF000
stack
page read and write
2404E397000
heap
page read and write
FC258FE000
stack
page read and write
1914105E000
heap
page read and write
2661F2E0000
heap
page read and write
2404E3A3000
heap
page read and write
23FDAC26000
heap
page read and write
7091F9000
stack
page read and write
2661A5D3000
trusted library allocation
page read and write
23FDAA90000
heap
page read and write
E60000
heap
page read and write
2404E397000
heap
page read and write
565000
heap
page read and write
26619B70000
trusted library allocation
page read and write
2404E386000
heap
page read and write
2661F1F0000
trusted library allocation
page read and write
FC3A3FB000
stack
page read and write
2404E388000
heap
page read and write
237D14C0000
heap
page read and write
7FFA53219000
unkown
page readonly
19BE0219000
heap
page read and write
2661A718000
heap
page read and write
872B67F000
stack
page read and write
209F7542000
heap
page read and write
FC25BF9000
stack
page read and write
2661F520000
trusted library allocation
page read and write
2661F730000
trusted library allocation
page read and write
18002F000
direct allocation
page readonly
24342BA0000
trusted library allocation
page read and write
19141029000
heap
page read and write
22D1C2F1000
heap
page read and write
9B4B8FE000
stack
page read and write
26AF000
stack
page read and write
2404E35E000
heap
page read and write
1EB8F04B000
heap
page read and write
2404E36F000
heap
page read and write
23BD0E47000
heap
page read and write
2404E373000
heap
page read and write
1EB8EE40000
heap
page read and write
2404E802000
heap
page read and write
2A9B000
stack
page read and write
209F9084000
heap
page read and write
2404E397000
heap
page read and write
2404E396000
heap
page read and write
23BD0E48000
heap
page read and write
23FDAC3C000
heap
page read and write
23FDAC52000
heap
page read and write
23FDAC00000
heap
page read and write
23BD0E50000
heap
page read and write
237D14C3000
heap
page read and write
2434245A000
heap
page read and write
540000
heap
page read and write
180000000
direct allocation
page read and write
5C5000
heap
page read and write
18002E000
direct allocation
page read and write
2404D858000
heap
page read and write
22D1C230000
heap
page read and write
2404D913000
heap
page read and write
1A74CE35000
heap
page read and write
2404E397000
heap
page read and write
2661F1E0000
trusted library allocation
page read and write
18002D000
direct allocation
page readonly
2404E37F000
heap
page read and write
2404E380000
heap
page read and write
872B977000
stack
page read and write
2404E37F000
heap
page read and write
2404E3A4000
heap
page read and write
22D1DC84000
heap
page read and write
2404E39A000
heap
page read and write
2404E397000
heap
page read and write
2404E394000
heap
page read and write
2D828FF000
stack
page read and write
19BE01A0000
trusted library allocation
page read and write
23BD0E4A000
heap
page read and write
2661F50E000
trusted library allocation
page read and write
26619AE0000
heap
page read and write
209F7700000
heap
page read and write
26619C6F000
heap
page read and write
2661F24B000
heap
page read and write
19BDFFF5000
heap
page read and write
6D0000
heap
page read and write
2661A5D0000
trusted library allocation
page read and write
1EB8F070000
heap
page read and write
23FDAC13000
heap
page read and write
1914107B000
heap
page read and write
C70000
heap
page read and write
2404E397000
heap
page read and write
1EB8F076000
heap
page read and write
FC3A77E000
stack
page read and write
CE980FB000
stack
page read and write
2404E3A2000
heap
page read and write
237CE249000
heap
page read and write
2520000
heap
page read and write
2044000
heap
page read and write
90524FC000
stack
page read and write
2404E396000
heap
page read and write
CE983FE000
stack
page read and write
23BD0F13000
heap
page read and write
19141100000
heap
page read and write
C08000
heap
page read and write
22D1C2A0000
heap
page readonly
237CE200000
heap
page read and write
23FDAD13000
heap
page read and write
2404E380000
heap
page read and write
23BD0E75000
heap
page read and write
23FDAC5E000
heap
page read and write
9B4B97F000
stack
page read and write
2661F500000
trusted library allocation
page read and write
2404E81A000
heap
page read and write
1EB8F100000
heap
page read and write
23FDAD08000
heap
page read and write
1A74D120000
heap
page read and write
5B9B27A000
stack
page read and write
1EB8F083000
heap
page read and write
26619CFE000
heap
page read and write
237CE25E000
heap
page read and write
2661F1C0000
trusted library allocation
page read and write
C3D000
heap
page read and write
209F74F0000
heap
page read and write
2404E39A000
heap
page read and write
26619D02000
heap
page read and write
2404E397000
heap
page read and write
1A74CE12000
heap
page read and write
7FFA531C0000
unkown
page readonly
88D42FE000
stack
page read and write
15AE07F000
stack
page read and write
19141000000
heap
page read and write
2404E397000
heap
page read and write
5A6000
heap
page read and write
18002F000
direct allocation
page readonly
2D8287E000
stack
page read and write
18002D000
direct allocation
page readonly
2404E300000
heap
page read and write
88D43FB000
stack
page read and write
237CE240000
heap
page read and write
19BE0120000
trusted library allocation
page read and write
FC3A2FC000
stack
page read and write
2404D8F9000
heap
page read and write
2404D7E0000
remote allocation
page read and write
7FFA531C1000
unkown
page execute read
2404E350000
heap
page read and write
CE97BBC000
stack
page read and write
708D9B000
stack
page read and write
19BDFF90000
trusted library allocation
page read and write
19141064000
heap
page read and write
7FFA53212000
unkown
page readonly
CE97EFF000
stack
page read and write
2404E385000
heap
page read and write
243422A0000
heap
page read and write
237CE27D000
heap
page read and write
A46AA7B000
stack
page read and write
A46A9FF000
stack
page read and write
18002E000
direct allocation
page read and write
2404D83C000
heap
page read and write
1A74CE22000
heap
page read and write
2404E380000
heap
page read and write
1C134E80000
heap
page read and write
2661F2A1000
heap
page read and write
2404E383000
heap
page read and write
2661A615000
heap
page read and write
2404E3A7000
heap
page read and write
872B87B000
stack
page read and write
2404D8AC000
heap
page read and write
2661F1F0000
trusted library allocation
page read and write
2404E3A2000
heap
page read and write
2404E397000
heap
page read and write
2404E202000
heap
page read and write
23BD0CF0000
heap
page read and write
209F73A0000
heap
page read and write
26619CBC000
heap
page read and write
2661F1E0000
trusted library allocation
page read and write
24342502000
heap
page read and write
B50000
heap
page read and write
90528FE000
stack
page read and write
19141A02000
trusted library allocation
page read and write
26619C77000
heap
page read and write
2404E36F000
heap
page read and write
19140F60000
heap
page read and write
2661F220000
heap
page read and write
2404E387000
heap
page read and write
9B4B87E000
stack
page read and write
2404D8B3000
heap
page read and write
19BDFFFC000
heap
page read and write
510000
direct allocation
page execute and read and write
19BDFFFE000
heap
page read and write
2661A704000
heap
page read and write
2661F23E000
heap
page read and write
19BE0D10000
trusted library allocation
page read and write
19BE0210000
heap
page read and write
209F76F0000
heap
page read and write
905217E000
stack
page read and write
23FDAC60000
heap
page read and write
2404E3C6000
heap
page read and write
7092FE000
stack
page read and write
23FDB402000
trusted library allocation
page read and write
248C000
stack
page read and write
1A74CE1E000
heap
page read and write
2661A702000
heap
page read and write
C01000
heap
page read and write
2404E391000
heap
page read and write
2404E384000
heap
page read and write
2404D6D0000
heap
page read and write
2661F302000
heap
page read and write
1EB8EDD0000
heap
page read and write
22D1C2B0000
heap
page read and write
1A74CDC0000
heap
page read and write
FC2567C000
stack
page read and write
23FDAC61000
heap
page read and write
237CE268000
heap
page read and write
2404E371000
heap
page read and write
19141002000
heap
page read and write
2480000
heap
page read and write
19140FC0000
heap
page read and write
2404E802000
heap
page read and write
2404E803000
heap
page read and write
7FFA53216000
unkown
page read and write
23FDAC63000
heap
page read and write
26D0000
heap
page read and write
2404D8EC000
heap
page read and write
2404D8B6000
heap
page read and write
2661F28A000
heap
page read and write
1C134FC0000
heap
page read and write
26619C8D000
heap
page read and write
2404E377000
heap
page read and write
2404E3BF000
heap
page read and write
2661F640000
remote allocation
page read and write
26619C29000
heap
page read and write
7FFA53212000
unkown
page readonly
2661ACE0000
trusted library allocation
page read and write
23BD0CE0000
heap
page read and write
237CE185000
heap
page read and write
2404E377000
heap
page read and write
2661A713000
heap
page read and write
23BD0F02000
heap
page read and write
7FFA53219000
unkown
page readonly
26619C93000
heap
page read and write
1EB8F802000
trusted library allocation
page read and write
26619C00000
heap
page read and write
B78000
heap
page read and write
2404E397000
heap
page read and write
2404E800000
heap
page read and write
23BD0E70000
heap
page read and write
1A74CE1E000
heap
page read and write
5B9B2FE000
stack
page read and write
2404D8F7000
heap
page read and write
7FFA53212000
unkown
page readonly
209F76B0000
heap
page readonly
237CE26C000
heap
page read and write
237D1DD0000
heap
page read and write
2404D902000
heap
page read and write
237CE25D000
heap
page read and write
E65000
heap
page read and write
CE982FF000
stack
page read and write
2D82676000
stack
page read and write
237CFDF0000
heap
page read and write
1A74CE1E000
heap
page read and write
19141057000
heap
page read and write
237D15D0000
trusted library allocation
page read and write
19BDFEE0000
heap
page read and write
2404E397000
heap
page read and write
1EB8F03C000
heap
page read and write
237CE259000
heap
page read and write
23BD0E00000
heap
page read and write
2404E3A2000
heap
page read and write
180000000
direct allocation
page read and write
2404E37F000
heap
page read and write
2404D84B000
heap
page read and write
FC3A1FE000
stack
page read and write
2661F1F0000
trusted library allocation
page read and write
5B9B47C000
stack
page read and write
2404E315000
heap
page read and write
2661A600000
heap
page read and write
E50000
direct allocation
page execute and read and write
1A74CE2E000
heap
page read and write
237CE170000
heap
page read and write
2661F5B0000
trusted library allocation
page read and write
2661B160000
trusted library allocation
page read and write
1EB8F013000
heap
page read and write
2404D8E4000
heap
page read and write
2404D889000
heap
page read and write
1EB8F054000
heap
page read and write
237CE256000
heap
page read and write
1914107B000
heap
page read and write
7FFA531C1000
unkown
page execute read
19BE0140000
trusted library allocation
page read and write
FC3A0FA000
stack
page read and write
23BD0E56000
heap
page read and write
2661F2F1000
heap
page read and write
C3D000
heap
page read and write
9B4B5BB000
stack
page read and write
1EB8F113000
heap
page read and write
15ADA7C000
stack
page read and write
23BD0E51000
heap
page read and write
15AE17E000
stack
page read and write
2661A758000
heap
page read and write
22D1C180000
heap
page read and write
A75000
stack
page read and write
23BD0D50000
heap
page read and write
C0B000
heap
page read and write
23BD0E53000
heap
page read and write
2404E386000
heap
page read and write
18002E000
direct allocation
page read and write
19BDFFFC000
heap
page read and write
2404E3CD000
heap
page read and write
2404E37F000
heap
page read and write
1A74CDFB000
heap
page read and write
2404E39C000
heap
page read and write
2404E31B000
heap
page read and write
1FEF000
stack
page read and write
2B1E000
stack
page read and write
2661F5D0000
trusted library allocation
page read and write
2404E39E000
heap
page read and write
19141102000
heap
page read and write
2404E394000
heap
page read and write
C0000
heap
page read and write
2404E397000
heap
page read and write
2404E363000
heap
page read and write
BC5000
heap
page read and write
19BDFF00000
heap
page read and write
2404D849000
heap
page read and write
790000
heap
page read and write
There are 663 hidden memdumps, click here to show them.