IOC Report
auExrOTnvB

loading gif

Files

File Path
Type
Category
Malicious
auExrOTnvB.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xee4b08f8, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\auExrOTnvB.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\auExrOTnvB.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\auExrOTnvB.dll,DllRegisterServer
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\auExrOTnvB.dll,DllUnregisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PlUoNfxsJl\nlEiWRnuQfGg.dll"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\auExrOTnvB.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\auExrOTnvB.dll",#1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://23.239.0.12/m
unknown
malicious
https://23.239.0.12/
23.239.0.12
malicious
https://23.239.0.12/h
unknown
malicious
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
http://crl.ver)
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://www.tiktok.com/legal/report/feedback
unknown
http://help.disneyplus.com.
unknown
https://support.hotspotshield.com/
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
https://disneyplus.com/legal.
unknown
There are 2 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
23.239.0.12
unknown
United States
malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\TaskStore
Schedule Scan
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\State
BlockUntilTimeStatus
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\Configuration
refreshAfter
There are 2 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
237001B0000
direct allocation
page execute and read and write
malicious
2135E670000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
E70000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
580000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
2A846313000
heap
page read and write
2FDD4D08000
heap
page read and write
E60000
direct allocation
page execute and read and write
225A242E000
heap
page read and write
1E811586000
heap
page read and write
18002E000
direct allocation
page read and write
7FF8CB7F2000
unkown
page readonly
225A2624000
trusted library allocation
page read and write
75270FC000
stack
page read and write
1E810C49000
heap
page read and write
19616B13000
heap
page read and write
F30000
heap
page read and write
1D96C5D7000
heap
page read and write
FFAD47E000
stack
page read and write
1AD4E278000
heap
page read and write
24C82100000
heap
page read and write
F03000
heap
page read and write
BE9AE7A000
stack
page read and write
225A2502000
heap
page read and write
19617A19000
heap
page read and write
2259CE00000
heap
page read and write
19616A5F000
heap
page read and write
1B2D9CA0000
heap
page read and write
1E074300000
heap
page read and write
1E81157E000
heap
page read and write
EE5000
heap
page read and write
1D96C5D5000
heap
page read and write
24C8205E000
heap
page read and write
2259D600000
heap
page read and write
2532CDA9000
heap
page read and write
B89B37F000
stack
page read and write
19617B02000
heap
page read and write
FFAD5FC000
stack
page read and write
2532CDA0000
heap
page read and write
1D60000
heap
page readonly
2259CEFE000
heap
page read and write
1E81159B000
heap
page read and write
2259DDE0000
trusted library allocation
page read and write
B89B17B000
stack
page read and write
1D96C513000
heap
page read and write
2532CD70000
trusted library allocation
page read and write
BE9B17C000
stack
page read and write
1DF30D30000
heap
page read and write
2532DB20000
heap
page readonly
7FF8CB7F6000
unkown
page read and write
23701C70000
heap
page read and write
180000000
direct allocation
page read and write
2135E640000
heap
page read and write
2259CE29000
heap
page read and write
5786CFB000
stack
page read and write
1AD4E1A0000
trusted library allocation
page read and write
1E810A10000
heap
page read and write
1E810C4C000
heap
page read and write
BC0000
remote allocation
page read and write
EA0000
heap
page read and write
1DF30CC5000
heap
page read and write
AC5137E000
stack
page read and write
1E810C4E000
heap
page read and write
2259D5D0000
trusted library section
page readonly
AC98277000
stack
page read and write
5CA5D8F000
stack
page read and write
225A26F0000
trusted library allocation
page read and write
1E810D08000
heap
page read and write
225A2730000
remote allocation
page read and write
19616BAA000
heap
page read and write
2532CDB0000
trusted library allocation
page read and write
1D96C5DA000
heap
page read and write
7FF8CB7F9000
unkown
page readonly
18002F000
direct allocation
page readonly
180000000
direct allocation
page read and write
FA2000
heap
page read and write
19617A00000
heap
page read and write
1E810C4A000
heap
page read and write
2A8460E0000
heap
page read and write
1D96C5C4000
heap
page read and write
2F2D000
stack
page read and write
17873750000
heap
page read and write
A12BCE000
stack
page read and write
2532DB30000
trusted library allocation
page read and write
31EF677000
stack
page read and write
1DF30DBF000
heap
page read and write
19616A37000
heap
page read and write
B95000
stack
page read and write
24C82052000
heap
page read and write
1E56B3B0000
heap
page read and write
1E07403C000
heap
page read and write
1E810CAA000
heap
page read and write
19617202000
heap
page read and write
1E81159A000
heap
page read and write
2A846213000
heap
page read and write
7FF8CB7F6000
unkown
page read and write
2FDD4C02000
heap
page read and write
1E810D13000
heap
page read and write
1E811588000
heap
page read and write
2259CE92000
heap
page read and write
2B64000
heap
page read and write
B287EFF000
stack
page read and write
FFAD67E000
stack
page read and write
1DF30DAE000
heap
page read and write
19616AB4000
heap
page read and write
225A23D0000
trusted library allocation
page read and write
1D96C5CB000
heap
page read and write
2FDD4C4B000
heap
page read and write
2FDD4C7B000
heap
page read and write
407927E000
stack
page read and write
1E810B80000
trusted library allocation
page read and write
225A260E000
trusted library allocation
page read and write
45B000
heap
page read and write
1AD4E313000
heap
page read and write
2259CE3D000
heap
page read and write
2FDD4C80000
heap
page read and write
19616A00000
heap
page read and write
4EE000
heap
page read and write
2532CB17000
heap
page read and write
AC514FB000
stack
page read and write
312F000
stack
page read and write
2B30000
remote allocation
page read and write
225A2502000
heap
page read and write
1AD4E213000
heap
page read and write
407907C000
stack
page read and write
B95A57F000
stack
page read and write
1E81154C000
heap
page read and write
2259CD30000
trusted library allocation
page read and write
A12B4B000
stack
page read and write
225A2600000
trusted library allocation
page read and write
1DF30DAE000
heap
page read and write
225A24EC000
heap
page read and write
B2886F9000
stack
page read and write
1AD4E202000
heap
page read and write
B89AD5A000
stack
page read and write
1AD4EC02000
trusted library allocation
page read and write
31EFDFF000
stack
page read and write
2940000
trusted library allocation
page read and write
225A2456000
heap
page read and write
1FB0000
heap
page read and write
1E074056000
heap
page read and write
18002E000
direct allocation
page read and write
1B2D9CA5000
heap
page read and write
491000
heap
page read and write
F9F000
heap
page read and write
2FDD4AB0000
heap
page read and write
1D96C460000
heap
page read and write
752717F000
stack
page read and write
2FDD5402000
trusted library allocation
page read and write
450000
heap
page read and write
1E811A03000
heap
page read and write
225A2700000
trusted library allocation
page read and write
7FF8CB7A0000
unkown
page readonly
A12EFE000
stack
page read and write
31EFF7A000
stack
page read and write
196167D0000
heap
page read and write
1E811A19000
heap
page read and write
1E56B5E0000
heap
page read and write
400000
heap
page read and write
1D96C5D5000
heap
page read and write
1E8115BF000
heap
page read and write
1E0742A3000
heap
page read and write
2259D758000
heap
page read and write
FFAD4FE000
stack
page read and write
2532CD90000
trusted library allocation
page read and write
2259CEBC000
heap
page read and write
1D96C810000
heap
page read and write
24C8208F000
heap
page read and write
2940000
trusted library allocation
page read and write
18002D000
direct allocation
page readonly
D5000
stack
page read and write
1E811A21000
heap
page read and write
18002F000
direct allocation
page readonly
2259D702000
heap
page read and write
19616AF9000
heap
page read and write
7FF8CB7F9000
unkown
page readonly
1E074026000
heap
page read and write
5721C79000
stack
page read and write
AC513FE000
stack
page read and write
1E81159A000
heap
page read and write
19617A54000
heap
page read and write
1E074038000
heap
page read and write
A12E7E000
stack
page read and write
570000
direct allocation
page execute and read and write
237000E0000
heap
page read and write
31EF47B000
stack
page read and write
2FDD4C00000
heap
page read and write
196173D8000
heap
page read and write
2259CBD0000
heap
page read and write
2259CEA0000
heap
page read and write
1DF30DA6000
heap
page read and write
AC97FFB000
stack
page read and write
2A84623C000
heap
page read and write
196167E0000
heap
page read and write
19616A5C000
heap
page read and write
1E81159C000
heap
page read and write
1E810C4D000
heap
page read and write
19617A0C000
heap
page read and write
1E077340000
trusted library allocation
page read and write
4B2000
heap
page read and write
2259D718000
heap
page read and write
19616ADE000
heap
page read and write
B95A5FE000
stack
page read and write
30AE000
stack
page read and write
2259CBC0000
heap
page read and write
F4F000
heap
page read and write
1AD4E240000
heap
page read and write
1E8115D1000
heap
page read and write
1E56B410000
heap
page read and write
1E81158C000
heap
page read and write
2532CB85000
heap
page read and write
2A84625C000
heap
page read and write
225A24D7000
heap
page read and write
178737D0000
heap
page read and write
1E56B600000
heap
page read and write
2259D5C0000
trusted library section
page readonly
7FF8CB7F6000
unkown
page read and write
1E810CAB000
heap
page read and write
1E811594000
heap
page read and write
225A24F9000
heap
page read and write
AC9837F000
stack
page read and write
31EFCFE000
stack
page read and write
2259D713000
heap
page read and write
24C8205A000
heap
page read and write
1E56B41E000
heap
page read and write
1DF30DA7000
heap
page read and write
2B1E000
stack
page read and write
1E811586000
heap
page read and write
1D96C515000
heap
page read and write
BB677EA000
stack
page read and write
180000000
direct allocation
page read and write
B2885F8000
stack
page read and write
2A846200000
heap
page read and write
2FDD4D13000
heap
page read and write
2532CB10000
heap
page read and write
2135E47D000
heap
page read and write
1E81157E000
heap
page read and write
1DF30DAE000
heap
page read and write
2259CE13000
heap
page read and write
1E07404D000
heap
page read and write
2A84625A000
heap
page read and write
407937F000
stack
page read and write
19616A29000
heap
page read and write
19616AC8000
heap
page read and write
B287F7E000
stack
page read and write
1DF30CC0000
heap
page read and write
225A2240000
trusted library allocation
page read and write
E40000
heap
page read and write
2259E223000
trusted library allocation
page read and write
2135E400000
heap
page read and write
5721AFE000
stack
page read and write
BE9B078000
stack
page read and write
225A2414000
heap
page read and write
19616A4A000
heap
page read and write
19616A69000
heap
page read and write
2135FF04000
heap
page read and write
1D96C511000
heap
page read and write
1AD4E25B000
heap
page read and write
1E07401E000
heap
page read and write
2259E220000
trusted library allocation
page read and write
2259E230000
trusted library allocation
page read and write
1E811588000
heap
page read and write
5786DFB000
stack
page read and write
2A846300000
heap
page read and write
B288178000
stack
page read and write
19616A13000
heap
page read and write
F03000
heap
page read and write
2259D5F0000
trusted library section
page readonly
2259CE6F000
heap
page read and write
225A22C0000
trusted library allocation
page read and write
1DF30CB0000
heap
page read and write
1B2D9CD0000
heap
page read and write
7526BF9000
stack
page read and write
1AD4E302000
heap
page read and write
19616AB7000
heap
page read and write
1E810CBF000
heap
page read and write
1E811588000
heap
page read and write
225A24EE000
heap
page read and write
31EFE7E000
stack
page read and write
F5B000
heap
page read and write
24C82062000
heap
page read and write
1E0742A0000
heap
page read and write
225A23E0000
trusted library allocation
page read and write
1E811A03000
heap
page read and write
7FF8CB7A1000
unkown
page execute read
EC8000
heap
page read and write
1D96C56D000
heap
page read and write
1E074029000
heap
page read and write
1D96C550000
heap
page read and write
1E810A20000
heap
page read and write
B2884FE000
unkown
page read and write
1E07403C000
heap
page read and write
1D96C56D000
heap
page read and write
2259CE8E000
heap
page read and write
2259E201000
trusted library allocation
page read and write
1E811A02000
heap
page read and write
19617330000
heap
page read and write
1E810CC6000
heap
page read and write
225A2621000
trusted library allocation
page read and write
2A1F000
stack
page read and write
1E811A02000
heap
page read and write
225A2600000
trusted library allocation
page read and write
1D96C4F9000
heap
page read and write
1E810C47000
heap
page read and write
225A2504000
heap
page read and write
572174B000
stack
page read and write
2A846258000
heap
page read and write
2135E48D000
heap
page read and write
FFADA7F000
stack
page read and write
1E810A80000
heap
page read and write
225A24F8000
heap
page read and write
2FDD4A40000
heap
page read and write
1E811588000
heap
page read and write
24C82102000
heap
page read and write
225A243F000
heap
page read and write
2370021B000
heap
page read and write
1D96C5D2000
heap
page read and write
196173EF000
heap
page read and write
2135E390000
heap
page read and write
7526CFC000
stack
page read and write
2FDD4C2A000
heap
page read and write
24C82108000
heap
page read and write
23700000000
heap
page read and write
1B2D9D4C000
heap
page read and write
1B2D9D20000
heap
page read and write
24C82085000
heap
page read and write
1E810CDA000
heap
page read and write
1E07430B000
heap
page read and write
2A84627F000
heap
page read and write
24C81FD0000
trusted library allocation
page read and write
7FF8CB7F9000
unkown
page readonly
1E811402000
heap
page read and write
2259D718000
heap
page read and write
1E81150F000
heap
page read and write
B89B2FF000
stack
page read and write
1D96C5D5000
heap
page read and write
1D96C54A000
heap
page read and write
1E811594000
heap
page read and write
2FDD4C3C000
heap
page read and write
7FF8CB7A1000
unkown
page execute read
5786FFF000
stack
page read and write
1E810CE2000
heap
page read and write
237001F7000
heap
page read and write
237E000
stack
page read and write
1E811587000
heap
page read and write
2532CB57000
heap
page read and write
1E811586000
heap
page read and write
2259CC30000
heap
page read and write
2A84625E000
heap
page read and write
1D96C6C0000
remote allocation
page read and write
2532CA80000
heap
page read and write
1E810CEE000
heap
page read and write
7FF8CB7F9000
unkown
page readonly
1E56B700000
heap
page read and write
2A9B000
stack
page read and write
1E81158C000
heap
page read and write
178736E0000
heap
page read and write
19616A8D000
heap
page read and write
237001FB000
heap
page read and write
5CA607E000
stack
page read and write
24C82000000
heap
page read and write
2532CD50000
trusted library allocation
page read and write
1E074032000
heap
page read and write
1AD4E253000
heap
page read and write
2259CE79000
heap
page read and write
1DF30DBE000
heap
page read and write
B89ADDE000
stack
page read and write
AC97EFE000
stack
page read and write
1E074041000
heap
page read and write
225A2610000
trusted library allocation
page read and write
1E811588000
heap
page read and write
1D96C5D2000
heap
page read and write
75266AB000
stack
page read and write
1E073FE0000
heap
page read and write
19616930000
trusted library allocation
page read and write
19617300000
heap
page read and write
5721B79000
stack
page read and write
F4F000
heap
page read and write
1E811A02000
heap
page read and write
1E073F50000
heap
page read and write
24C81E70000
heap
page read and write
1E81159E000
heap
page read and write
2370022E000
heap
page read and write
225A23D0000
trusted library allocation
page read and write
1DF30D80000
heap
page read and write
BB67C7E000
stack
page read and write
1B3395D000
stack
page read and write
24FB000
stack
page read and write
225A24FE000
heap
page read and write
1E073FC0000
heap
page read and write
2259CE74000
heap
page read and write
19616BED000
heap
page read and write
5B5000
heap
page read and write
225A2230000
trusted library allocation
page read and write
AC980FB000
stack
page read and write
5721BFE000
stack
page read and write
1DF30D10000
heap
page read and write
19616A8A000
heap
page read and write
1E07402D000
heap
page read and write
7FF8CB7A1000
unkown
page execute read
19616AE1000
heap
page read and write
23700220000
heap
page read and write
24C81ED0000
heap
page read and write
2135E600000
heap
page read and write
2A846C02000
trusted library allocation
page read and write
237001F0000
heap
page read and write
1E074032000
heap
page read and write
19616A2E000
heap
page read and write
7526EFB000
stack
page read and write
FFAD77B000
stack
page read and write
2259CE24000
heap
page read and write
578679C000
stack
page read and write
B95A9FB000
stack
page read and write
1E810C00000
heap
page read and write
1B2D9D2B000
heap
page read and write
550000
heap
page read and write
178737D8000
heap
page read and write
19616A52000
heap
page read and write
1E074029000
heap
page read and write
225A2710000
trusted library allocation
page read and write
1E811592000
heap
page read and write
178737E5000
heap
page read and write
225A2400000
heap
page read and write
1E8115D5000
heap
page read and write
1E810C13000
heap
page read and write
19616A79000
heap
page read and write
1E811588000
heap
page read and write
225A2608000
trusted library allocation
page read and write
2259CD40000
trusted library section
page read and write
18002F000
direct allocation
page readonly
24C82013000
heap
page read and write
1E810BF0000
remote allocation
page read and write
225A2600000
trusted library allocation
page read and write
1E811500000
heap
page read and write
1D96C480000
heap
page read and write
1E56B705000
heap
page read and write
7FF8CB7A0000
unkown
page readonly
2532CAF0000
heap
page read and write
1E810C3C000
heap
page read and write
1E077B40000
heap
page read and write
1E811594000
heap
page read and write
31EF77A000
stack
page read and write
1E811588000
heap
page read and write
1E56B439000
heap
page read and write
2A8460D0000
heap
page read and write
1D96C5D5000
heap
page read and write
40792FB000
stack
page read and write
2FDD4BB0000
trusted library allocation
page read and write
AC5147F000
stack
page read and write
2259CE76000
heap
page read and write
2259D5E0000
trusted library section
page readonly
1D96C815000
heap
page read and write
7FF8CB7F6000
unkown
page read and write
225A24FA000
heap
page read and write
BE9AEFF000
stack
page read and write
B95ACFF000
stack
page read and write
FA1000
heap
page read and write
18002D000
direct allocation
page readonly
23700160000
heap
page read and write
2532CB5F000
heap
page read and write
31EFBFE000
stack
page read and write
1E074305000
heap
page read and write
AC50F85000
stack
page read and write
2532CB5F000
heap
page read and write
19616BF5000
heap
page read and write
2259D759000
heap
page read and write
24C8203C000
heap
page read and write
1AD4E110000
heap
page read and write
2A846170000
trusted library allocation
page read and write
FFAD1CB000
stack
page read and write
1D96C6F1000
heap
page read and write
2532CDA5000
heap
page read and write
1E81158E000
heap
page read and write
1DF30DA4000
heap
page read and write
2FDD4C53000
heap
page read and write
23FF000
stack
page read and write
23700100000
heap
page read and write
1FB4000
heap
page read and write
2259CEA2000
heap
page read and write
2FDD4C48000
heap
page read and write
19616BFD000
heap
page read and write
5786EFF000
stack
page read and write
5CA617E000
stack
page read and write
B89B0FE000
stack
page read and write
225A24A1000
heap
page read and write
225A2730000
remote allocation
page read and write
BB67B7F000
stack
page read and write
1E810D02000
heap
page read and write
19616AFC000
heap
page read and write
BE9AF7F000
stack
page read and write
1E811A02000
heap
page read and write
2532D8F0000
trusted library allocation
page read and write
2FDD4D02000
heap
page read and write
B95A4FB000
stack
page read and write
1D96C526000
heap
page read and write
1E00000
heap
page read and write
B89B1FD000
stack
page read and write
2135E6C0000
heap
page read and write
1E811A02000
heap
page read and write
1D96C6F0000
heap
page read and write
2A846202000
heap
page read and write
7FF8CB7A1000
unkown
page execute read
1E81159A000
heap
page read and write
19616980000
trusted library allocation
page read and write
31EFC7E000
stack
page read and write
BE9B0FF000
stack
page read and write
2532CD60000
trusted library allocation
page read and write
1E811A02000
heap
page read and write
2135E6C5000
heap
page read and write
1E810CF8000
heap
page read and write
2135FF00000
heap
page read and write
2FDD4D00000
heap
page read and write
1E8115AB000
heap
page read and write
7FF8CB7F2000
unkown
page readonly
19616A3C000
heap
page read and write
225A24F2000
heap
page read and write
19617B0A000
heap
page read and write
247E000
stack
page read and write
31F017E000
stack
page read and write
225A26A0000
trusted library allocation
page read and write
23700190000
heap
page readonly
1E811584000
heap
page read and write
1961736E000
heap
page read and write
1D96C6C0000
remote allocation
page read and write
19617B00000
heap
page read and write
F30000
heap
page read and write
24C82063000
heap
page read and write
F5B000
heap
page read and write
237001A5000
heap
page read and write
1E074056000
heap
page read and write
2259CEAF000
heap
page read and write
1AD4E200000
heap
page read and write
1E07402E000
heap
page read and write
AC512FF000
stack
page read and write
213600F0000
heap
page read and write
24C82113000
heap
page read and write
1E810C6C000
heap
page read and write
AC9847F000
stack
page read and write
180000000
direct allocation
page read and write
1E810D16000
heap
page read and write
1E0000
heap
page read and write
FFAD877000
stack
page read and write
1E810C84000
heap
page read and write
AC9817E000
stack
page read and write
1DF30D97000
heap
page read and write
24C82077000
heap
page read and write
2259D5B0000
trusted library section
page readonly
B288377000
stack
page read and write
7526FFB000
stack
page read and write
225A23E0000
trusted library allocation
page read and write
19616A45000
heap
page read and write
1E81159A000
heap
page read and write
1E074018000
heap
page read and write
1D96C513000
heap
page read and write
1E811586000
heap
page read and write
1D96C54D000
heap
page read and write
2135E438000
heap
page read and write
225A24DD000
heap
page read and write
19617A02000
heap
page read and write
23700220000
heap
page read and write
B95ABFF000
stack
page read and write
2B30000
remote allocation
page read and write
EA5000
heap
page read and write
1D96C54A000
heap
page read and write
1D96C5CB000
heap
page read and write
2A846308000
heap
page read and write
1E81159A000
heap
page read and write
19616AD6000
heap
page read and write
31EFA7C000
stack
page read and write
752672F000
stack
page read and write
4D4000
heap
page read and write
1D96C4E0000
heap
page read and write
7FF8CB7A0000
unkown
page readonly
B28807B000
stack
page read and write
2259CF02000
heap
page read and write
18002D000
direct allocation
page readonly
225A244C000
heap
page read and write
2FDD4C6F000
heap
page read and write
2FDD4C13000
heap
page read and write
1AD4E100000
heap
page read and write
1E811A02000
heap
page read and write
2135E430000
heap
page read and write
18002D000
direct allocation
page readonly
2532DB40000
trusted library allocation
page read and write
2A846289000
heap
page read and write
2135E6A0000
heap
page readonly
1E56B418000
heap
page read and write
5CA60FE000
stack
page read and write
302E000
stack
page read and write
2FDD4C4E000
heap
page read and write
EC0000
heap
page read and write
1D96C526000
heap
page read and write
AE0000
heap
page read and write
7FF8CB7F2000
unkown
page readonly
18002E000
direct allocation
page read and write
2259D5A0000
trusted library section
page readonly
225A249F000
heap
page read and write
19616ACB000
heap
page read and write
1DF30DC6000
heap
page read and write
225A2614000
trusted library allocation
page read and write
2532CCE0000
heap
page read and write
1E8115AB000
heap
page read and write
1AD4E228000
heap
page read and write
18002E000
direct allocation
page read and write
1E8F000
stack
page read and write
EB0000
heap
page readonly
B28847F000
stack
page read and write
237001A0000
heap
page read and write
23701B80000
heap
page read and write
1D96C532000
heap
page read and write
2A846259000
heap
page read and write
BC0000
remote allocation
page read and write
1D96C3F0000
heap
page read and write
1E811586000
heap
page read and write
2FDD4C89000
heap
page read and write
24C82067000
heap
page read and write
225A2730000
remote allocation
page read and write
1E810BF0000
remote allocation
page read and write
AC5127F000
stack
page read and write
19617A02000
heap
page read and write
1D96C5CB000
heap
page read and write
2532CA90000
trusted library allocation
page read and write
19616A97000
heap
page read and write
2259CF13000
heap
page read and write
AC97E7E000
stack
page read and write
19616AD3000
heap
page read and write
1E81156D000
heap
page read and write
2B30000
remote allocation
page read and write
1E810C46000
heap
page read and write
19616AAC000
heap
page read and write
1E810CB4000
heap
page read and write
1E811590000
heap
page read and write
F2D000
heap
page read and write
1E81159A000
heap
page read and write
2259D602000
heap
page read and write
31EFB7B000
stack
page read and write
19616A80000
heap
page read and write
225A22B0000
trusted library allocation
page read and write
1E811A00000
heap
page read and write
2135E660000
direct allocation
page execute and read and write
2532CB5F000
heap
page read and write
1E811511000
heap
page read and write
1B2D9C20000
heap
page read and write
1E811513000
heap
page read and write
1D96C6C0000
remote allocation
page read and write
1E074220000
heap
page read and write
2FDD4C2C000
heap
page read and write
1D96C532000
heap
page read and write
1E811584000
heap
page read and write
F9F000
heap
page read and write
2FDD4A50000
heap
page read and write
1E81158B000
heap
page read and write
B287E7B000
stack
page read and write
2259D700000
heap
page read and write
2532DB90000
trusted library allocation
page read and write
1D96C516000
heap
page read and write
7526DFE000
stack
page read and write
1E810C79000
heap
page read and write
2990000
heap
page read and write
5CA5D06000
stack
page read and write
31EFD7F000
stack
page read and write
FFAD97E000
stack
page read and write
1B2D9CB0000
heap
page read and write
24C82802000
trusted library allocation
page read and write
5B0000
heap
page read and write
1E810C29000
heap
page read and write
1E811A02000
heap
page read and write
19617333000
heap
page read and write
7FF8CB7A0000
unkown
page readonly
7FF8CB7F2000
unkown
page readonly
19616A63000
heap
page read and write
19616BBF000
heap
page read and write
1AD4E170000
heap
page read and write
20000
heap
page read and write
225A26E0000
trusted library allocation
page read and write
225A2500000
heap
page read and write
B89B07E000
stack
page read and write
225A24AC000
heap
page read and write
2259CE5A000
heap
page read and write
225A2463000
heap
page read and write
1D96C552000
heap
page read and write
2A846140000
heap
page read and write
1DF30D92000
heap
page read and write
1DEF000
stack
page read and write
1F2C000
stack
page read and write
225A2502000
heap
page read and write
BB67BFF000
stack
page read and write
1D96C56D000
heap
page read and write
1DF30DA2000
heap
page read and write
1DF30D8B000
heap
page read and write
19616A86000
heap
page read and write
31EF97E000
stack
page read and write
E00000
heap
page read and write
1E074056000
heap
page read and write
24C81E60000
heap
page read and write
1AD4E300000
heap
page read and write
2B60000
heap
page read and write
1D96C520000
heap
page read and write
18002F000
direct allocation
page readonly
19616830000
heap
page read and write
2259CE8C000
heap
page read and write
EFA000
heap
page read and write
1DF30DC5000
heap
page read and write
24C82029000
heap
page read and write
7526AFF000
stack
page read and write
1E074010000
heap
page read and write
1E811590000
heap
page read and write
2A846302000
heap
page read and write
19617A43000
heap
page read and write
BE9AFFF000
stack
page read and write
23700180000
direct allocation
page execute and read and write
B288277000
stack
page read and write
1D96C50C000
heap
page read and write
1D96C5CB000
heap
page read and write
B89B27C000
stack
page read and write
23701C74000
heap
page read and write
AC97BEB000
stack
page read and write
40793FE000
stack
page read and write
2259D615000
heap
page read and write
B95AAF7000
stack
page read and write
BD0000
heap
page read and write
1E811590000
heap
page read and write
225A2420000
heap
page read and write
19616A95000
heap
page read and write
1E81158B000
heap
page read and write
1E810BF0000
remote allocation
page read and write
2A84625D000
heap
page read and write
1DF30D96000
heap
page read and write
1E8115DB000
heap
page read and write
31EF87A000
stack
page read and write
1E811588000
heap
page read and write
2A846229000
heap
page read and write
There are 725 hidden memdumps, click here to show them.