IOC Report
PvaOeKqrBs

loading gif

Files

File Path
Type
Category
Malicious
PvaOeKqrBs.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x79d04c26, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\PvaOeKqrBs.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\PvaOeKqrBs.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\PvaOeKqrBs.dll,DllRegisterServer
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\PvaOeKqrBs.dll,DllUnregisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\YRMNUhHMATANP\Chucqcozulnvx.dll"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\PvaOeKqrBs.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\PvaOeKqrBs.dll",#1
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 11 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://23.239.0.12/y
unknown
malicious
https://23.239.0.12/U
unknown
malicious
https://23.239.0.12/
23.239.0.12
malicious
https://dev.ditu.live.com/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
unknown
https://t0.tiles.ditu.live.com/tiles/gen
unknown
https://dev.virtualearth.net/REST/v1/Routes/Walking
unknown
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
unknown
http://schemas.microft8
unknown
https://dev.ditu.live.com/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
http://www.bingmapsportal.com
unknown
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
unknown
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
unknown
https://dev.ditu.live.com/REST/v1/Transit/Stops/
unknown
https://dev.virtualearth.net/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
unknown
http://crl.ver)
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
unknown
https://www.tiktok.com/legal/report/feedback
unknown
https://activity.windows.comr
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
unknown
http://universalstore.streaming.mediaservices.windows
unknown
https://%s.xboxlive.com
unknown
https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://dev.virtualearth.net/mapcontrol/logging.ashx
unknown
https://support.hotspotshield.com/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.t
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
https://disneyplus.com/legal.
unknown
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
unknown
https://activity.windows.com
unknown
https://dev.ditu.live.com/REST/v1/Locations
unknown
http://help.disneyplus.com.
unknown
https://%s.dnet.xboxlive.com
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
There are 40 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
23.239.0.12
unknown
United States
malicious
192.168.2.1
unknown
unknown
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
MonthID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\TaskStore
Schedule Scan
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\State
BlockUntilTimeStatus
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\Configuration
refreshAfter
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2740000
direct allocation
page execute and read and write
malicious
183B38F0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
22FCAD50000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
2350000
direct allocation
page execute and read and write
malicious
1AECC530000
heap
page read and write
1F852C4E000
heap
page read and write
227E9023000
heap
page read and write
259FEAF8000
heap
page read and write
E2FF87E000
stack
page read and write
259FE8B0000
remote allocation
page read and write
23964C60000
heap
page read and write
259F9273000
heap
page read and write
259F9229000
heap
page read and write
1AECC65B000
heap
page read and write
259F928F000
heap
page read and write
22C9AFE000
stack
page read and write
23DFF037000
heap
page read and write
23DFF029000
heap
page read and write
7FFC67219000
unkown
page readonly
22C97DE000
stack
page read and write
22FCAC0B000
heap
page read and write
7FFC671C0000
unkown
page readonly
227E8B1C000
heap
page read and write
E2FF77B000
stack
page read and write
259F9090000
heap
page read and write
1F852C56000
heap
page read and write
27E12C00000
heap
page read and write
BE7A97E000
stack
page read and write
17BFB9C0000
heap
page read and write
B04000
heap
page read and write
259F9A15000
heap
page read and write
18A34925000
heap
page read and write
1A926FE000
stack
page read and write
259FE890000
trusted library allocation
page read and write
22C9B7B000
stack
page read and write
227E8B72000
heap
page read and write
1A9238B000
stack
page read and write
1C0E1645000
heap
page read and write
183B396F000
heap
page read and write
1F23104F000
heap
page read and write
17BFC1C0000
remote allocation
page read and write
259FEA4B000
heap
page read and write
1F231013000
heap
page read and write
2E6F977000
stack
page read and write
22FCACE0000
heap
page read and write
227E8B75000
heap
page read and write
259F9307000
heap
page read and write
227E8B89000
heap
page read and write
227E8B6F000
heap
page read and write
800FE7F000
stack
page read and write
22FCABB0000
heap
page read and write
2480000
remote allocation
page read and write
18A34696000
heap
page read and write
23DFF95E000
heap
page read and write
1617B808000
heap
page read and write
227E9002000
heap
page read and write
800FDFB000
stack
page read and write
259FEAFC000
heap
page read and write
18CE1A00000
heap
page read and write
800FF7F000
stack
page read and write
227E8B76000
heap
page read and write
18CE1B08000
heap
page read and write
AA0000
heap
page readonly
1AECC641000
heap
page read and write
227E8B8A000
heap
page read and write
259FEB00000
heap
page read and write
17BFBC13000
heap
page read and write
20753CCC000
heap
page read and write
259FEAFC000
heap
page read and write
22FCAC11000
heap
page read and write
9A2CA7F000
stack
page read and write
227E8BBA000
heap
page read and write
259F9B18000
heap
page read and write
1F231102000
heap
page read and write
227E8B7A000
heap
page read and write
2BE1F290000
trusted library allocation
page read and write
D8627B000
stack
page read and write
1617B7D0000
heap
page read and write
227E8B7A000
heap
page read and write
1AECC613000
heap
page read and write
16668F13000
heap
page read and write
259F90F0000
heap
page read and write
BE7A5B6000
stack
page read and write
18CE1B00000
heap
page read and write
2BE1F32A000
heap
page read and write
1C0E1702000
heap
page read and write
227E8B89000
heap
page read and write
227E9004000
heap
page read and write
1AECCE02000
trusted library allocation
page read and write
7FFC67212000
unkown
page readonly
B2B000
heap
page read and write
183B38E0000
direct allocation
page execute and read and write
1F852A00000
heap
page read and write
1C0E1669000
heap
page read and write
1617B8EC000
heap
page read and write
23DFF936000
heap
page read and write
28AF000
stack
page read and write
227E8229000
heap
page read and write
259FE774000
trusted library allocation
page read and write
259FE770000
trusted library allocation
page read and write
259FE630000
trusted library allocation
page read and write
A1AB5F9000
stack
page read and write
1AECC713000
heap
page read and write
259F9B04000
heap
page read and write
1617C160000
heap
page read and write
227E8B9D000
heap
page read and write
95982FC000
stack
page read and write
1F23103C000
heap
page read and write
7FFC67212000
unkown
page readonly
E2FF67F000
stack
page read and write
183B3B15000
heap
page read and write
227E8B9F000
heap
page read and write
227E8B74000
heap
page read and write
259FEA83000
heap
page read and write
18CE1A51000
heap
page read and write
259FE780000
trusted library allocation
page read and write
23E0011B000
heap
page read and write
1D5F1C58000
heap
page read and write
227E82AB000
heap
page read and write
1C0E1644000
heap
page read and write
2C9E000
stack
page read and write
1617B845000
heap
page read and write
259FE840000
trusted library allocation
page read and write
22C9BFD000
stack
page read and write
1617B86B000
heap
page read and write
227E824D000
heap
page read and write
227E8249000
heap
page read and write
2BE20020000
heap
page readonly
B2B000
heap
page read and write
18A346A4000
heap
page read and write
259F9A02000
heap
page read and write
18A34694000
heap
page read and write
259F9253000
heap
page read and write
C7187C000
stack
page read and write
259FE8A0000
trusted library allocation
page read and write
23E00102000
heap
page read and write
227E9004000
heap
page read and write
C71CF7000
stack
page read and write
183B38C0000
heap
page read and write
FF704FE000
stack
page read and write
20753B80000
heap
page read and write
BE7AA7F000
stack
page read and write
7FFC67212000
unkown
page readonly
16668E02000
heap
page read and write
1F855DA0000
heap
page read and write
2E3B000
stack
page read and write
1D5F1C8F000
heap
page read and write
23964CFB000
heap
page read and write
16668E40000
heap
page read and write
1617B853000
heap
page read and write
227E8B95000
heap
page read and write
8983AFF000
stack
page read and write
7FFC67219000
unkown
page readonly
23E00006000
heap
page read and write
227E9004000
heap
page read and write
1617B8EE000
heap
page read and write
183B3B10000
heap
page read and write
2820000
heap
page read and write
21F0A7B000
stack
page read and write
1617C163000
heap
page read and write
227E8B6F000
heap
page read and write
1617B960000
remote allocation
page read and write
20F464E0000
heap
page read and write
17BFBC40000
heap
page read and write
1F852C33000
heap
page read and write
23DFF03C000
heap
page read and write
17BFBC02000
heap
page read and write
259FEA3E000
heap
page read and write
23DFF088000
heap
page read and write
227E82EB000
heap
page read and write
23DFF07B000
heap
page read and write
227E8BC7000
heap
page read and write
16668E79000
heap
page read and write
BE0000
heap
page read and write
227E8B9F000
heap
page read and write
18002D000
direct allocation
page readonly
710000
remote allocation
page read and write
4E2477F000
stack
page read and write
17BFC1C0000
remote allocation
page read and write
1F852C2E000
heap
page read and write
2E6F1BB000
stack
page read and write
183B3920000
heap
page readonly
259FE820000
trusted library allocation
page read and write
1617B863000
heap
page read and write
227E8140000
heap
page read and write
20753C65000
heap
page read and write
227E8BD2000
heap
page read and write
9A2C4BC000
stack
page read and write
A1AB1FB000
stack
page read and write
18002E000
direct allocation
page read and write
2E6F5FB000
stack
page read and write
1C0E1647000
heap
page read and write
227E8280000
heap
page read and write
23DFF077000
heap
page read and write
23DFF0F1000
heap
page read and write
1617B845000
heap
page read and write
FFB000
heap
page read and write
1C0E166B000
heap
page read and write
1F852C2A000
heap
page read and write
227E8B52000
heap
page read and write
227E9004000
heap
page read and write
A00000
heap
page read and write
E2FEF4B000
stack
page read and write
16668E64000
heap
page read and write
1AECC670000
heap
page read and write
9A2CE7D000
stack
page read and write
20753CE1000
heap
page read and write
23DFF06A000
heap
page read and write
22FCAC11000
heap
page read and write
AF3000
heap
page read and write
20753CBB000
heap
page read and write
DBF1FF000
stack
page read and write
4E23FFC000
stack
page read and write
23DFF1B8000
heap
page read and write
1F231108000
heap
page read and write
1F231071000
heap
page read and write
259FEA1C000
heap
page read and write
259FE794000
trusted library allocation
page read and write
B2B000
heap
page read and write
227E8BA4000
heap
page read and write
1C0E1646000
heap
page read and write
1C0E1649000
heap
page read and write
18CE1A46000
heap
page read and write
183B3AC4000
heap
page read and write
2480000
remote allocation
page read and write
227E8B86000
heap
page read and write
227E8B99000
heap
page read and write
18CE1A70000
heap
page read and write
C718FE000
stack
page read and write
227E8BB4000
heap
page read and write
21F15FF000
stack
page read and write
E2FF97B000
stack
page read and write
20753B20000
heap
page read and write
17BFBC5C000
heap
page read and write
2E6F47E000
stack
page read and write
259F99C1000
trusted library allocation
page read and write
227E8B9A000
heap
page read and write
18A34686000
heap
page read and write
227E8253000
heap
page read and write
1617B88F000
heap
page read and write
A1AB6FC000
stack
page read and write
1C0E1664000
heap
page read and write
259F9256000
heap
page read and write
23DFF0CD000
heap
page read and write
A83027F000
stack
page read and write
259F929A000
heap
page read and write
7FFC67216000
unkown
page read and write
AB0000
heap
page read and write
7FFC67219000
unkown
page readonly
1A9267E000
stack
page read and write
259F9B00000
heap
page read and write
259FA5F0000
trusted library allocation
page read and write
B7D000
heap
page read and write
1F231029000
heap
page read and write
1617B853000
heap
page read and write
227E8B90000
heap
page read and write
1617B9B0000
heap
page read and write
1617B960000
remote allocation
page read and write
227E8A02000
heap
page read and write
259FA060000
trusted library allocation
page read and write
1D5F1AA0000
heap
page read and write
1F231602000
trusted library allocation
page read and write
227E8B72000
heap
page read and write
2770000
heap
page readonly
2BE1F310000
heap
page read and write
2710000
heap
page read and write
227E8B75000
heap
page read and write
1617B8D3000
heap
page read and write
8983CFE000
stack
page read and write
259FE771000
trusted library allocation
page read and write
227E8B10000
heap
page read and write
E6DE8F9000
stack
page read and write
1D5F1C62000
heap
page read and write
227E8B99000
heap
page read and write
9A2CF7F000
stack
page read and write
183B3937000
heap
page read and write
16668E55000
heap
page read and write
95985F7000
stack
page read and write
1C0E1640000
heap
page read and write
2390000
trusted library allocation
page read and write
23E00054000
heap
page read and write
7FFC67219000
unkown
page readonly
1C0E1631000
heap
page read and write
2BE20010000
trusted library allocation
page read and write
259F9302000
heap
page read and write
1F852B80000
heap
page read and write
1D5F1C70000
heap
page read and write
227E8B86000
heap
page read and write
1F852C18000
heap
page read and write
227E9005000
heap
page read and write
16669402000
trusted library allocation
page read and write
1617B8D1000
heap
page read and write
227E8BA3000
heap
page read and write
2E6FA7E000
stack
page read and write
1075000
heap
page read and write
259F9A00000
heap
page read and write
2E6F4FE000
stack
page read and write
23DFF073000
heap
page read and write
23DFF113000
heap
page read and write
95987FF000
stack
page read and write
227E8248000
heap
page read and write
1C0E1641000
heap
page read and write
2BE1F4A0000
heap
page read and write
23964CF0000
heap
page read and write
7FFC671C0000
unkown
page readonly
18CE17A0000
heap
page read and write
1617B9B5000
heap
page read and write
18A3469E000
heap
page read and write
259FE8B0000
remote allocation
page read and write
7F5000
heap
page read and write
22FCC780000
heap
page read and write
227E8B88000
heap
page read and write
22FCAC1F000
heap
page read and write
A1AA97C000
stack
page read and write
1C0E1560000
heap
page read and write
1D5F2402000
trusted library allocation
page read and write
1C0E1661000
heap
page read and write
9A2D07D000
stack
page read and write
259FE8B0000
trusted library allocation
page read and write
1C0E1642000
heap
page read and write
18002D000
direct allocation
page readonly
23E00000000
heap
page read and write
227E8BCE000
heap
page read and write
95986FF000
stack
page read and write
18A34920000
heap
page read and write
A20000
heap
page read and write
1D5F1B00000
heap
page read and write
16668E28000
heap
page read and write
1D5F1C3C000
heap
page read and write
FF703FE000
stack
page read and write
227E8B86000
heap
page read and write
1AECC629000
heap
page read and write
1F855E70000
trusted library allocation
page read and write
259F928A000
heap
page read and write
2CA0000
heap
page read and write
227E8B99000
heap
page read and write
1F856670000
heap
page read and write
18002D000
direct allocation
page readonly
227E82AA000
heap
page read and write
18CE1A53000
heap
page read and write
21F12FF000
stack
page read and write
2BE1F0D0000
trusted library allocation
page read and write
23DFF04C000
heap
page read and write
7FFC67216000
unkown
page read and write
E35000
heap
page read and write
22C9A7E000
stack
page read and write
227E82C7000
heap
page read and write
2BE1F4B0000
trusted library allocation
page read and write
227E8BB3000
heap
page read and write
18CE1810000
heap
page read and write
227E8B9D000
heap
page read and write
2480000
remote allocation
page read and write
227E8B7E000
heap
page read and write
227E8B9D000
heap
page read and write
227E8150000
heap
page read and write
227E82C0000
heap
page read and write
1AECC5A0000
heap
page read and write
1617B8F1000
heap
page read and write
20F464ED000
heap
page read and write
227E8270000
heap
page read and write
22FCABE8000
heap
page read and write
B7D000
heap
page read and write
1C0E1663000
heap
page read and write
23DFF750000
trusted library allocation
page read and write
21F10FD000
stack
page read and write
227E9004000
heap
page read and write
1617B87C000
heap
page read and write
1617B853000
heap
page read and write
227E8B97000
heap
page read and write
23DFF0B6000
heap
page read and write
1C0E1660000
heap
page read and write
17BFBA30000
heap
page read and write
227E82E8000
heap
page read and write
227E8B9D000
heap
page read and write
9A2CCFD000
stack
page read and write
23DFF053000
heap
page read and write
1F852B85000
heap
page read and write
227E81B0000
heap
page read and write
227E8BB5000
heap
page read and write
259FE860000
trusted library allocation
page read and write
1C0E165F000
heap
page read and write
AD4000
stack
page read and write
259F9288000
heap
page read and write
17BFC190000
trusted library allocation
page read and write
27FE000
stack
page read and write
1F852B40000
heap
page read and write
A82FBAE000
stack
page read and write
1F23108B000
heap
page read and write
2BE1F2B0000
trusted library allocation
page read and write
710000
remote allocation
page read and write
E30000
heap
page read and write
227E8B6D000
heap
page read and write
23DFF9D4000
heap
page read and write
227E82E3000
heap
page read and write
95983FB000
stack
page read and write
20753B10000
heap
page read and write
7FFC671C1000
unkown
page execute read
16668E00000
heap
page read and write
259FE640000
trusted library allocation
page read and write
2BE1F30F000
heap
page read and write
7FFC671C1000
unkown
page execute read
E6DEA79000
stack
page read and write
A82FF7E000
stack
page read and write
1D5F1C29000
heap
page read and write
259FE9A0000
trusted library allocation
page read and write
A83007E000
stack
page read and write
227E8200000
heap
page read and write
227E8B76000
heap
page read and write
22C975A000
stack
page read and write
1F231002000
heap
page read and write
1A928FB000
stack
page read and write
2700000
direct allocation
page execute and read and write
22C9D7F000
stack
page read and write
21F0DFE000
stack
page read and write
180000000
direct allocation
page read and write
259FEAE6000
heap
page read and write
DBF07F000
stack
page read and write
8983C7E000
stack
page read and write
259FEAF4000
heap
page read and write
227E8B78000
heap
page read and write
17BFBC00000
heap
page read and write
227E82AE000
heap
page read and write
1C0E15F0000
trusted library allocation
page read and write
2BE1F30F000
heap
page read and write
9597F8F000
stack
page read and write
291F000
stack
page read and write
1F852C2F000
heap
page read and write
259F9200000
heap
page read and write
4E2437E000
stack
page read and write
1F231027000
heap
page read and write
1AECC540000
heap
page read and write
227E8308000
heap
page read and write
259F92FB000
heap
page read and write
1C0E164B000
heap
page read and write
1C0E163A000
heap
page read and write
227E8B86000
heap
page read and write
800F9EC000
stack
page read and write
227E8B9F000
heap
page read and write
1F23104B000
heap
page read and write
227E8BB5000
heap
page read and write
183B3930000
heap
page read and write
227E8B8B000
heap
page read and write
227E8BBA000
heap
page read and write
227E824E000
heap
page read and write
1AECC676000
heap
page read and write
227E8256000
heap
page read and write
1C0E1600000
heap
page read and write
23DFEFF0000
heap
page read and write
2BE20040000
trusted library allocation
page read and write
227E8B99000
heap
page read and write
22C9C7C000
stack
page read and write
1A929F7000
stack
page read and write
227E81E0000
trusted library allocation
page read and write
227E8213000
heap
page read and write
1617B960000
remote allocation
page read and write
1C0E1674000
heap
page read and write
22FCABE0000
heap
page read and write
AB8000
heap
page read and write
259FEA54000
heap
page read and write
259F9276000
heap
page read and write
800FEFF000
stack
page read and write
1C0E1602000
heap
page read and write
259F926E000
heap
page read and write
A1AB0FE000
stack
page read and write
259F9B02000
heap
page read and write
2BE1F318000
heap
page read and write
1617B863000
heap
page read and write
630000
heap
page read and write
C7197E000
stack
page read and write
16668E68000
heap
page read and write
E2FF9FE000
stack
page read and write
227E8B9C000
heap
page read and write
1F231113000
heap
page read and write
1617B845000
heap
page read and write
18A34681000
heap
page read and write
DBED36000
stack
page read and write
E6DE9FE000
stack
page read and write
227E82FD000
heap
page read and write
227E8B28000
heap
page read and write
2714000
heap
page read and write
1617B87C000
heap
page read and write
9597E8B000
stack
page read and write
B93000
heap
page read and write
23DFF062000
heap
page read and write
20753C87000
heap
page read and write
2390000
trusted library allocation
page read and write
20754532000
heap
page read and write
259FEB02000
heap
page read and write
1617B857000
heap
page read and write
1F852B60000
heap
page read and write
1AECC702000
heap
page read and write
1F231081000
heap
page read and write
1617B857000
heap
page read and write
21F0C7B000
stack
page read and write
259FE870000
trusted library allocation
page read and write
227E8B75000
heap
page read and write
20F463D0000
heap
page read and write
7FFC67216000
unkown
page read and write
7FFC67212000
unkown
page readonly
1617B800000
heap
page read and write
1C0E1662000
heap
page read and write
227E8B9E000
heap
page read and write
18A34580000
heap
page read and write
1D5F1C66000
heap
page read and write
1F230DB0000
heap
page read and write
2E6FBF8000
stack
page read and write
227E8BAB000
heap
page read and write
18002F000
direct allocation
page readonly
A1AAFFA000
stack
page read and write
1C0E162A000
heap
page read and write
BE7A87F000
stack
page read and write
227E8B7F000
heap
page read and write
2E6FAFF000
unkown
page read and write
18CE1A57000
heap
page read and write
227E8B8E000
heap
page read and write
22FCAE70000
heap
page read and write
1F852C10000
heap
page read and write
1F852C42000
heap
page read and write
259F91F0000
trusted library allocation
page read and write
227E8B4A000
heap
page read and write
A1AAD77000
stack
page read and write
227E89D0000
remote allocation
page read and write
23DFF0A9000
heap
page read and write
B1C000
heap
page read and write
1F852C3D000
heap
page read and write
6E5000
stack
page read and write
1C0E1675000
heap
page read and write
227E824B000
heap
page read and write
23DFF046000
heap
page read and write
E2FF57C000
stack
page read and write
27E12960000
heap
page read and write
259FEAFC000
heap
page read and write
183B398A000
heap
page read and write
227E8B84000
heap
page read and write
2BE1FDE0000
trusted library allocation
page read and write
17BFC202000
trusted library allocation
page read and write
23DFF913000
heap
page read and write
18CE1A29000
heap
page read and write
2BE1F307000
heap
page read and write
4E2447D000
stack
page read and write
B1F000
heap
page read and write
1617C161000
heap
page read and write
18CE19E0000
trusted library allocation
page read and write
1617B8D1000
heap
page read and write
23DFF0AD000
heap
page read and write
16668F02000
heap
page read and write
227E8BA3000
heap
page read and write
18002D000
direct allocation
page readonly
18A346A2000
heap
page read and write
AC2737F000
stack
page read and write
180000000
direct allocation
page read and write
259FEAAA000
heap
page read and write
259F9302000
heap
page read and write
227E82ED000
heap
page read and write
18CE1A4C000
heap
page read and write
1C0E163B000
heap
page read and write
2BE1F30F000
heap
page read and write
D8647E000
stack
page read and write
FF7027A000
stack
page read and write
259F9B58000
heap
page read and write
1C0E1684000
heap
page read and write
27E12C05000
heap
page read and write
9597F0E000
stack
page read and write
23E00100000
heap
page read and write
227E8BA4000
heap
page read and write
23DFF802000
heap
page read and write
259FEA9C000
heap
page read and write
227E8288000
heap
page read and write
18002E000
direct allocation
page read and write
17BFB9D0000
heap
page read and write
227E8BA3000
heap
page read and write
1F231050000
heap
page read and write
7FFC671C0000
unkown
page readonly
9A2C8FB000
stack
page read and write
FF7047F000
stack
page read and write
1617B8D3000
heap
page read and write
1A927FB000
stack
page read and write
22C9CFF000
stack
page read and write
227E8B9B000
heap
page read and write
22FCC784000
heap
page read and write
23E0001D000
heap
page read and write
1A92BFF000
stack
page read and write
227E8B00000
heap
page read and write
20753D13000
heap
page read and write
1C0E167B000
heap
page read and write
2BE1F318000
heap
page read and write
8983A7A000
stack
page read and write
227E824A000
heap
page read and write
23D4000
heap
page read and write
18A34692000
heap
page read and write
1D5F1C50000
heap
page read and write
259F99F0000
trusted library allocation
page read and write
2BE1F2C0000
heap
page read and write
E2FF479000
stack
page read and write
16668BA0000
heap
page read and write
227E8B99000
heap
page read and write
27E12940000
heap
page read and write
1617B863000
heap
page read and write
259FE750000
trusted library allocation
page read and write
1617B866000
heap
page read and write
18A34686000
heap
page read and write
20753CCA000
heap
page read and write
22FCAE75000
heap
page read and write
23DFF1FD000
heap
page read and write
1F852C3D000
heap
page read and write
27E129A0000
heap
page read and write
1AECC679000
heap
page read and write
259FE758000
trusted library allocation
page read and write
27E128E0000
heap
page read and write
BE7A9FE000
stack
page read and write
22FCAD80000
heap
page readonly
B7D000
heap
page read and write
23DFF90F000
heap
page read and write
259FE790000
trusted library allocation
page read and write
259FEA00000
heap
page read and write
23964ED0000
heap
page read and write
227E9000000
heap
page read and write
23DFF0ED000
heap
page read and write
183B3AC0000
heap
page read and write
AC273FE000
stack
page read and write
16668C10000
heap
page read and write
18A34450000
heap
page read and write
18CE1A74000
heap
page read and write
227E823C000
heap
page read and write
259FE75E000
trusted library allocation
page read and write
A82FAAB000
stack
page read and write
23DFF0C8000
heap
page read and write
1C0E166F000
heap
page read and write
1D5F1C62000
heap
page read and write
18CE1A8D000
heap
page read and write
1F230E10000
heap
page read and write
20753C29000
heap
page read and write
E2FF37E000
stack
page read and write
2DBE000
stack
page read and write
183B3870000
heap
page read and write
1D5F1C00000
heap
page read and write
259FEAEE000
heap
page read and write
259F9278000
heap
page read and write
17BFBC29000
heap
page read and write
1AECC600000
heap
page read and write
20753C43000
heap
page read and write
1D5F1C79000
heap
page read and write
D85E7B000
stack
page read and write
259F9B59000
heap
page read and write
227E8254000
heap
page read and write
16668BB0000
heap
page read and write
23E00043000
heap
page read and write
23E00002000
heap
page read and write
259FEB03000
heap
page read and write
2B9F000
stack
page read and write
227E8B84000
heap
page read and write
259F92B9000
heap
page read and write
A83017E000
stack
page read and write
DBEDBF000
stack
page read and write
DBF17E000
stack
page read and write
227E8B40000
heap
page read and write
1617B88F000
heap
page read and write
95984FD000
stack
page read and write
180000000
direct allocation
page read and write
A82FB2E000
stack
page read and write
1617B8EE000
heap
page read and write
16668E13000
heap
page read and write
259F9080000
heap
page read and write
23DFEFA0000
heap
page read and write
A1AA9FF000
stack
page read and write
227E8316000
heap
page read and write
7F0000
heap
page read and write
16668DE0000
trusted library allocation
page read and write
21F13FF000
stack
page read and write
23DFF7A0000
trusted library allocation
page read and write
259FEA61000
heap
page read and write
18A346A4000
heap
page read and write
259F99E3000
trusted library allocation
page read and write
227E89D0000
remote allocation
page read and write
1051000
heap
page read and write
8983BF9000
stack
page read and write
D8617B000
stack
page read and write
18A3469E000
heap
page read and write
1D5F1D13000
heap
page read and write
23DFF900000
heap
page read and write
1C0E15C0000
heap
page read and write
23DFF911000
heap
page read and write
20753C13000
heap
page read and write
2C7E000
stack
page read and write
A1AB8FE000
stack
page read and write
22FCAA70000
heap
page read and write
1F23104C000
heap
page read and write
1D5F1C54000
heap
page read and write
21F0EFB000
stack
page read and write
259FE820000
trusted library allocation
page read and write
1034000
heap
page read and write
18002E000
direct allocation
page read and write
C71DFF000
stack
page read and write
227E8B88000
heap
page read and write
7FFC67216000
unkown
page read and write
18002F000
direct allocation
page readonly
23DFF013000
heap
page read and write
AC2727B000
stack
page read and write
227E8B76000
heap
page read and write
27E129A8000
heap
page read and write
1F852B8B000
heap
page read and write
2A9B000
stack
page read and write
21F14FE000
stack
page read and write
20754500000
heap
page read and write
7FFC671C0000
unkown
page readonly
23DFEF90000
heap
page read and write
259F923D000
heap
page read and write
18A346B6000
heap
page read and write
4E2487D000
stack
page read and write
1F23104A000
heap
page read and write
A1AAEFA000
stack
page read and write
21F11FE000
stack
page read and write
1D5F1D00000
heap
page read and write
A90000
direct allocation
page execute and read and write
B4C000
heap
page read and write
227E8B5C000
heap
page read and write
2BE1F4A9000
heap
page read and write
1F230DA0000
heap
page read and write
D8637B000
stack
page read and write
1D5F1C4D000
heap
page read and write
DBF0FE000
stack
page read and write
20753C00000
heap
page read and write
227E8B74000
heap
page read and write
23DFF060000
heap
page read and write
22FCAD20000
heap
page read and write
1C0E166D000
heap
page read and write
B3F000
heap
page read and write
20753CC4000
heap
page read and write
20753BB0000
trusted library allocation
page read and write
C71BFF000
stack
page read and write
B1F000
heap
page read and write
1F231000000
heap
page read and write
23DFF094000
heap
page read and write
1617B87C000
heap
page read and write
23DFF02E000
heap
page read and write
1A92AFE000
stack
page read and write
1617B690000
heap
page read and write
23DFF099000
heap
page read and write
20753D02000
heap
page read and write
1F852C33000
heap
page read and write
227E8B84000
heap
page read and write
23964C40000
heap
page read and write
23DFF0B1000
heap
page read and write
2BE1F4A5000
heap
page read and write
E00000
heap
page read and write
227E8B74000
heap
page read and write
18A346A2000
heap
page read and write
1C0E167D000
heap
page read and write
23DFF195000
heap
page read and write
7FFC671C1000
unkown
page execute read
1C0E1550000
heap
page read and write
18002E000
direct allocation
page read and write
2BE20090000
trusted library allocation
page read and write
1D5F2260000
trusted library allocation
page read and write
1D5F1C53000
heap
page read and write
227E89D0000
remote allocation
page read and write
A70000
heap
page read and write
259FE750000
trusted library allocation
page read and write
1C0E163D000
heap
page read and write
B4C000
heap
page read and write
B4C000
heap
page read and write
1617B900000
heap
page read and write
23964B00000
heap
page read and write
259FEAE3000
heap
page read and write
23DFF1E1000
heap
page read and write
227E8BD0000
heap
page read and write
22FCAD40000
direct allocation
page execute and read and write
23E00002000
heap
page read and write
18A34695000
heap
page read and write
B3F000
heap
page read and write
227E8B6D000
heap
page read and write
259FE9C0000
trusted library allocation
page read and write
259F99E0000
trusted library allocation
page read and write
2BE1F2C8000
heap
page read and write
227E8BA3000
heap
page read and write
18CE1A3C000
heap
page read and write
23D0000
heap
page read and write
18A346A4000
heap
page read and write
180000000
direct allocation
page read and write
18A345A0000
heap
page read and write
18A346B4000
heap
page read and write
2BE20030000
trusted library allocation
page read and write
1D5F1D08000
heap
page read and write
24D0000
heap
page read and write
227E8B84000
heap
page read and write
259F9213000
heap
page read and write
227E8BBD000
heap
page read and write
259F9314000
heap
page read and write
20F46290000
heap
page read and write
1F230FE0000
trusted library allocation
page read and write
2BE1F0C0000
heap
page read and write
8983D7C000
stack
page read and write
259FEB03000
heap
page read and write
BE7A8FF000
stack
page read and write
AEF000
heap
page read and write
18CE17B0000
heap
page read and write
227E8B88000
heap
page read and write
23DFF04E000
heap
page read and write
1C0E164C000
heap
page read and write
DA28DFD000
stack
page read and write
2720000
heap
page read and write
259FE8B0000
remote allocation
page read and write
259FE880000
trusted library allocation
page read and write
227E8B75000
heap
page read and write
20753C67000
heap
page read and write
1F231080000
heap
page read and write
299C000
stack
page read and write
2E6F778000
stack
page read and write
18CE1A81000
heap
page read and write
183B3AB0000
heap
page read and write
1D5F1A90000
heap
page read and write
227E82D6000
heap
page read and write
23964ED5000
heap
page read and write
1F852C2A000
heap
page read and write
4E246FD000
stack
page read and write
259FEAFA000
heap
page read and write
1F231100000
heap
page read and write
259FEB02000
heap
page read and write
1C0E1667000
heap
page read and write
2E6F877000
stack
page read and write
1F231052000
heap
page read and write
1AECC5D0000
trusted library allocation
page read and write
227E8302000
heap
page read and write
1D5F1C13000
heap
page read and write
18A346A2000
heap
page read and write
227E8B9E000
heap
page read and write
1F855DA3000
heap
page read and write
1D5F1C4A000
heap
page read and write
227E8BA5000
heap
page read and write
1D5F1D02000
heap
page read and write
1C0E1613000
heap
page read and write
C71EFE000
stack
page read and write
A20000
heap
page read and write
AC272FE000
stack
page read and write
1AECC665000
heap
page read and write
2C1F000
stack
page read and write
259FEB02000
heap
page read and write
227E8BA7000
heap
page read and write
1617B8D3000
heap
page read and write
17BFC1C0000
remote allocation
page read and write
227E8BAE000
heap
page read and write
2BE1F220000
heap
page read and write
183B3850000
heap
page read and write
20754402000
heap
page read and write
18CE1B13000
heap
page read and write
9A2D17E000
stack
page read and write
1617B8D1000
heap
page read and write
2BE1F308000
heap
page read and write
23DFF9F1000
heap
page read and write
1C0E1648000
heap
page read and write
18CE1A13000
heap
page read and write
1617B857000
heap
page read and write
227E8BC4000
heap
page read and write
1617B8EE000
heap
page read and write
C71B7B000
stack
page read and write
B2B000
heap
page read and write
7FFC671C1000
unkown
page execute read
1C0E1655000
heap
page read and write
259FEAD6000
heap
page read and write
22FCC730000
heap
page read and write
9A2CD7B000
stack
page read and write
227E8B88000
heap
page read and write
9A2CBFC000
stack
page read and write
259F92AB000
heap
page read and write
9A2CB7E000
stack
page read and write
227E8B4E000
heap
page read and write
23DFF0E5000
heap
page read and write
2BE1F2A0000
trusted library allocation
page read and write
AF3000
heap
page read and write
259F9B13000
heap
page read and write
227E8313000
heap
page read and write
259F92FB000
heap
page read and write
FF0000
heap
page read and write
227E82B5000
heap
page read and write
2BE1F200000
heap
page read and write
23964CFE000
heap
page read and write
227E8B60000
heap
page read and write
1C0E1630000
heap
page read and write
23DFF000000
heap
page read and write
20753C6E000
heap
page read and write
1C0E1639000
heap
page read and write
DBF27C000
stack
page read and write
2CFC000
stack
page read and write
259FE820000
trusted library allocation
page read and write
1C0E164F000
heap
page read and write
259FA170000
trusted library allocation
page read and write
23DFF05E000
heap
page read and write
227E8247000
heap
page read and write
1617B88F000
heap
page read and write
108F000
heap
page read and write
227E8B50000
heap
page read and write
18CE2002000
trusted library allocation
page read and write
8983B7F000
stack
page read and write
17BFBD02000
heap
page read and write
2E6F67E000
stack
page read and write
2A1E000
stack
page read and write
183B3710000
heap
page read and write
1F852BF0000
heap
page read and write
18A34670000
heap
page read and write
16668F00000
heap
page read and write
227E8251000
heap
page read and write
23E00113000
heap
page read and write
18CE1B02000
heap
page read and write
1D5F1C81000
heap
page read and write
259FEA2A000
heap
page read and write
18002F000
direct allocation
page readonly
E6DE4CB000
stack
page read and write
4E244FE000
stack
page read and write
1C0E167E000
heap
page read and write
227E8BB1000
heap
page read and write
18002F000
direct allocation
page readonly
E6DE97C000
stack
page read and write
1F852C39000
heap
page read and write
227E8BAB000
heap
page read and write
259FE780000
trusted library allocation
page read and write
1AECC602000
heap
page read and write
1F23104D000
heap
page read and write
259F9B18000
heap
page read and write
227E8BA5000
heap
page read and write
259FEA13000
heap
page read and write
227E8B89000
heap
page read and write
1C0E1E02000
trusted library allocation
page read and write
227E8B86000
heap
page read and write
259FEAF6000
heap
page read and write
There are 918 hidden memdumps, click here to show them.