IOC Report
auExrOTnvB.dll

loading gif

Files

File Path
Type
Category
Malicious
auExrOTnvB.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x1b5904bc, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\auExrOTnvB.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\auExrOTnvB.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\auExrOTnvB.dll,DllRegisterServer
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\auExrOTnvB.dll,DllUnregisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ScjWhFiaOACVkfkp\NbnBEvmCoIR.dll"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PlUoNfxsJl\nlEiWRnuQfGg.dll"
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\auExrOTnvB.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\auExrOTnvB.dll",#1
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://23.239.0.12/ges
unknown
malicious
https://23.239.0.12/.
unknown
malicious
https://23.239.0.12/
23.239.0.12
malicious
https://23.239.0.12/m
unknown
malicious
https://23.239.0.12/h
unknown
malicious
https://dev.ditu.live.com/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
unknown
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
unknown
https://t0.tiles.ditu.live.com/tiles/gen
unknown
https://dev.virtualearth.net/REST/v1/Routes/Walking
unknown
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
unknown
https://dev.ditu.live.com/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?entry=
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
https://www.tiktok.com/legal/report
unknown
https://ecn.dev.virtualearth.net/mapcontrol/roadshield.ashx?bucket=
unknown
http://www.bingmapsportal.com
unknown
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
unknown
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
unknown
https://dev.ditu.live.com/REST/v1/Transit/Stops/
unknown
https://dev.virtualearth.net/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Transit/Stops/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
unknown
http://crl.ver)
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
unknown
https://www.tiktok.com/legal/report/feedback
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
unknown
https://%s.xboxlive.com
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://dev.virtualearth.net/mapcontrol/logging.ashx
unknown
https://support.hotspotshield.com/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.t
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
https://disneyplus.com/legal.
unknown
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
unknown
https://activity.windows.com
unknown
https://dev.ditu.live.com/REST/v1/Locations
unknown
http://help.disneyplus.com.
unknown
https://%s.dnet.xboxlive.com
unknown
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
There are 46 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
23.239.0.12
unknown
United States
malicious
192.168.2.1
unknown
unknown
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
MonthID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\TaskStore
Schedule Scan
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\State
BlockUntilTimeStatus
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\Configuration
refreshAfter
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
26ED90D0000
direct allocation
page execute and read and write
malicious
2ACE68D0000
direct allocation
page execute and read and write
malicious
21F0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
D00000
direct allocation
page execute and read and write
malicious
1D4C2302000
heap
page read and write
2740D21A000
heap
page read and write
1D672590000
remote allocation
page read and write
70D38FE000
stack
page read and write
1DC60C43000
heap
page read and write
1AB33D34000
heap
page read and write
373E07A000
stack
page read and write
1D672500000
trusted library allocation
page read and write
1D67263E000
heap
page read and write
2740CDAE000
heap
page read and write
213B5265000
heap
page read and write
1F108660000
trusted library allocation
page read and write
373E1FE000
stack
page read and write
1D672520000
trusted library allocation
page read and write
21B11600000
heap
page read and write
883000
heap
page read and write
60F407B000
stack
page read and write
1AB33D2E000
heap
page read and write
2740CD00000
heap
page read and write
C7739FF000
stack
page read and write
70D36FB000
stack
page read and write
1D66CEBB000
heap
page read and write
20EEBFB0000
heap
page read and write
18002E000
direct allocation
page read and write
1CF54700000
heap
page read and write
1F107F00000
heap
page read and write
26D259E0000
trusted library allocation
page read and write
20EEBEB6000
heap
page read and write
1D66CE29000
heap
page read and write
B3B000
heap
page read and write
18002E000
direct allocation
page read and write
1D672310000
trusted library allocation
page read and write
2740D202000
heap
page read and write
2740CDA9000
heap
page read and write
26D25A71000
heap
page read and write
AC5AAFD000
stack
page read and write
70D39FC000
stack
page read and write
1B21AC5C000
heap
page read and write
7BFB8FB000
stack
page read and write
BA0000
heap
page read and write
2740CD9A000
heap
page read and write
1B21AA90000
heap
page read and write
2740D203000
heap
page read and write
1DC5FC2E000
heap
page read and write
2A5F000
stack
page read and write
A74000
stack
page read and write
1CF5463C000
heap
page read and write
1D2A877000
stack
page read and write
1AB33CF0000
heap
page read and write
811A53E000
stack
page read and write
7FFC67212000
unkown
page readonly
1B21AD02000
heap
page read and write
2740CD8C000
heap
page read and write
811AAFF000
stack
page read and write
2740CD60000
heap
page read and write
1F108029000
heap
page read and write
2740C400000
heap
page read and write
2740CD7E000
heap
page read and write
1CF54C02000
trusted library allocation
page read and write
7FFC67219000
unkown
page readonly
2ACE699C000
heap
page read and write
1D672590000
remote allocation
page read and write
2740CD1D000
heap
page read and write
1D2AA7D000
stack
page read and write
2740CDCF000
heap
page read and write
2740C44E000
heap
page read and write
1DC5FC95000
heap
page read and write
93BA47C000
stack
page read and write
213B5A02000
trusted library allocation
page read and write
1DC5FCCB000
heap
page read and write
1F108802000
trusted library allocation
page read and write
26ED8FD0000
heap
page read and write
9C26A77000
stack
page read and write
B10000
heap
page readonly
2ACE6910000
heap
page readonly
1D672438000
trusted library allocation
page read and write
9C268FB000
stack
page read and write
C77367B000
stack
page read and write
1F656CB0000
heap
page read and write
7FFC671C1000
unkown
page execute read
1DC60C00000
heap
page read and write
7BFC17C000
stack
page read and write
1DC60C1D000
heap
page read and write
2700000
heap
page read and write
1C94ABA0000
heap
page read and write
883000
heap
page read and write
1C94A980000
trusted library allocation
page read and write
1D672890000
trusted library allocation
page read and write
2ACE000
stack
page read and write
811A87E000
stack
page read and write
C773AFF000
stack
page read and write
2240000
trusted library allocation
page read and write
1F656D1D000
heap
page read and write
1D6726F0000
heap
page read and write
1D8AA6DF000
heap
page read and write
1CF5464C000
heap
page read and write
26D25A4F000
heap
page read and write
2740CAD0000
remote allocation
page read and write
2BCB000
stack
page read and write
26ED8F80000
heap
page read and write
1D66CE13000
heap
page read and write
1C82CF13000
heap
page read and write
1AB33D37000
heap
page read and write
1CF54390000
heap
page read and write
20EEC7E1000
heap
page read and write
2740C413000
heap
page read and write
CFAECFC000
stack
page read and write
1D4C2A02000
trusted library allocation
page read and write
1D66CF02000
heap
page read and write
21B1166A000
heap
page read and write
7FFC67216000
unkown
page read and write
2740CD7D000
heap
page read and write
1CF54650000
heap
page read and write
20EEBE11000
heap
page read and write
811A4BA000
stack
page read and write
9C26C7E000
stack
page read and write
26ED901D000
heap
page read and write
26D25A54000
heap
page read and write
26D25880000
heap
page read and write
1DC60C02000
heap
page read and write
1D66CF16000
heap
page read and write
1AB33D40000
heap
page read and write
20EEBEB6000
heap
page read and write
26D25A4B000
heap
page read and write
20EEC470000
remote allocation
page read and write
53B317F000
stack
page read and write
2740CD9F000
heap
page read and write
1DC60280000
trusted library allocation
page read and write
1D672570000
trusted library allocation
page read and write
213B5213000
heap
page read and write
20EEBDD0000
heap
page read and write
7FFC671C1000
unkown
page execute read
20EEBEBF000
heap
page read and write
1D8AA6E3000
heap
page read and write
2ACE6830000
heap
page read and write
4F1092C000
stack
page read and write
2740D200000
heap
page read and write
1DC5FC37000
heap
page read and write
9C267FB000
stack
page read and write
20EEBE35000
heap
page read and write
CFAEB7E000
stack
page read and write
1DC5FD95000
heap
page read and write
1AB33C60000
heap
page read and write
D0EF67E000
stack
page read and write
1D4C222A000
heap
page read and write
1D8AA6C9000
heap
page read and write
1D66DDE0000
trusted library allocation
page read and write
26ED9005000
heap
page read and write
1D4C2271000
heap
page read and write
28FD5540000
heap
page read and write
1DC60500000
heap
page read and write
811A8FB000
stack
page read and write
53B30F9000
stack
page read and write
1D66CE78000
heap
page read and write
1D66D759000
heap
page read and write
1AB37950000
heap
page read and write
26ED8DD0000
heap
page read and write
2740CD8E000
heap
page read and write
1D672550000
trusted library allocation
page read and write
2740CD8D000
heap
page read and write
2740CD77000
heap
page read and write
AC5A97E000
stack
page read and write
1F108059000
heap
page read and write
7FFC67212000
unkown
page readonly
1DC5FC62000
heap
page read and write
373E4FD000
stack
page read and write
1C94ABE9000
heap
page read and write
1D4C224F000
heap
page read and write
2740CDD3000
heap
page read and write
2740C454000
heap
page read and write
1DC60C54000
heap
page read and write
1D672474000
trusted library allocation
page read and write
2240000
trusted library allocation
page read and write
1C82CEE1000
heap
page read and write
1CF54713000
heap
page read and write
2740CDB1000
heap
page read and write
1D672590000
trusted library allocation
page read and write
26D25A66000
heap
page read and write
1D4C2313000
heap
page read and write
2740CD9B000
heap
page read and write
20EEBE66000
heap
page read and write
18002D000
direct allocation
page readonly
20EEC470000
remote allocation
page read and write
2740CD84000
heap
page read and write
2740CD84000
heap
page read and write
25F3AFB000
stack
page read and write
1D6726FA000
heap
page read and write
7FFC671C0000
unkown
page readonly
26D26202000
trusted library allocation
page read and write
1D4C223C000
heap
page read and write
1D2A97F000
stack
page read and write
2740CD87000
heap
page read and write
53B307C000
stack
page read and write
E25000
heap
page read and write
9C2697E000
stack
page read and write
2740C4CA000
heap
page read and write
1B21AC59000
heap
page read and write
2740CD7D000
heap
page read and write
1D6726A2000
heap
page read and write
1D8AA6A6000
heap
page read and write
594000
stack
page read and write
2740D202000
heap
page read and write
2ACE83C4000
heap
page read and write
1D8AA6D6000
heap
page read and write
AA0000
heap
page read and write
2740CDA0000
heap
page read and write
1AB37150000
trusted library allocation
page read and write
1C94AE00000
heap
page read and write
1D4C225E000
heap
page read and write
60F427F000
stack
page read and write
1D66CEFD000
heap
page read and write
60D927B000
stack
page read and write
1B21AC3C000
heap
page read and write
213B5200000
heap
page read and write
921000
heap
page read and write
8D9000
heap
page read and write
1D6726F6000
heap
page read and write
1D4C2308000
heap
page read and write
21B11626000
heap
page read and write
1DC5FDE1000
heap
page read and write
1C94AB50000
trusted library allocation
page read and write
1DC5FC00000
heap
page read and write
26ED9200000
heap
page read and write
2740CDB0000
heap
page read and write
26ED901D000
heap
page read and write
8CB000
heap
page read and write
AC5ABF9000
stack
page read and write
A80000
heap
page read and write
1DC5FDB8000
heap
page read and write
2740CAD0000
remote allocation
page read and write
213B5180000
heap
page read and write
1B21AC8A000
heap
page read and write
285C000
stack
page read and write
1D66CE8A000
heap
page read and write
1D672702000
heap
page read and write
22A4000
heap
page read and write
1F656C40000
heap
page read and write
1DC5FC98000
heap
page read and write
1D8AA490000
heap
page read and write
2740CD71000
heap
page read and write
2740CD60000
heap
page read and write
1D672430000
trusted library allocation
page read and write
1D672692000
heap
page read and write
1B21AC00000
heap
page read and write
1D8AA6C9000
heap
page read and write
4E0000
heap
page read and write
26D25A55000
heap
page read and write
1D66CF07000
heap
page read and write
70D31FD000
stack
page read and write
1DC5FC91000
heap
page read and write
26D25A4A000
heap
page read and write
1D4C2213000
heap
page read and write
7FFC671C1000
unkown
page execute read
18002E000
direct allocation
page read and write
1C82CDB0000
trusted library allocation
page read and write
1C94AB40000
trusted library allocation
page read and write
2740D202000
heap
page read and write
1D2A77B000
stack
page read and write
1DC5FB20000
heap
page read and write
1AB33D4E000
heap
page read and write
2740C429000
heap
page read and write
1C94AAD0000
heap
page read and write
26D25A7B000
heap
page read and write
7FFC671C0000
unkown
page readonly
1CF54677000
heap
page read and write
213B5224000
heap
page read and write
18002F000
direct allocation
page readonly
93B9FEB000
stack
page read and write
C773B7C000
stack
page read and write
AC5A9FE000
stack
page read and write
CFAE796000
stack
page read and write
8B3000
heap
page read and write
2740CD7D000
heap
page read and write
1D8AA69B000
heap
page read and write
2ACE6850000
heap
page read and write
9C2667E000
stack
page read and write
1D4C2282000
heap
page read and write
21B11613000
heap
page read and write
213B5259000
heap
page read and write
7FFC67216000
unkown
page read and write
2740CD82000
heap
page read and write
18002D000
direct allocation
page readonly
26ED900D000
heap
page read and write
1DC60C0A000
heap
page read and write
2740C4B5000
heap
page read and write
1D66CD70000
heap
page read and write
D52EFFF000
stack
page read and write
811A9FC000
stack
page read and write
1D66D615000
heap
page read and write
26ED9000000
heap
page read and write
28FD5545000
heap
page read and write
26D25A43000
heap
page read and write
1DC5FC87000
heap
page read and write
1F10805C000
heap
page read and write
1D66CEAE000
heap
page read and write
1DC5FC60000
heap
page read and write
1F108102000
heap
page read and write
21B11450000
heap
page read and write
1D4C2200000
heap
page read and write
1F108690000
remote allocation
page read and write
26D25A30000
heap
page read and write
1D66CE00000
heap
page read and write
2740CD89000
heap
page read and write
20EEBE15000
heap
page read and write
2740CD8C000
heap
page read and write
1AB33D19000
heap
page read and write
908000
heap
page read and write
2740CD77000
heap
page read and write
1C82CC40000
heap
page read and write
B7C000
heap
page read and write
2740CD1F000
heap
page read and write
1B21AD13000
heap
page read and write
1D8AA6CB000
heap
page read and write
1C94ABF0000
heap
page read and write
D0EF47A000
stack
page read and write
1D4C2300000
heap
page read and write
2740CD66000
heap
page read and write
1D67243E000
trusted library allocation
page read and write
1D8AA6CB000
heap
page read and write
1D8AA6CB000
heap
page read and write
20EEBE21000
heap
page read and write
18002F000
direct allocation
page readonly
7BFC27E000
stack
page read and write
88D000
heap
page read and write
20EEBE15000
heap
page read and write
70D357C000
stack
page read and write
2740D202000
heap
page read and write
1F107EA0000
heap
page read and write
1CF54681000
heap
page read and write
BA5000
heap
page read and write
2740C250000
heap
page read and write
2740CC02000
heap
page read and write
15C1BEA0000
heap
page read and write
2740CD29000
heap
page read and write
26CC000
stack
page read and write
1C82CEBD000
heap
page read and write
1D6726D9000
heap
page read and write
1B21AC7E000
heap
page read and write
1D8AA5E0000
heap
page read and write
21B11702000
heap
page read and write
93BA77E000
stack
page read and write
15C1BE30000
heap
page read and write
88D000
heap
page read and write
180000000
direct allocation
page read and write
1DC60D1B000
heap
page read and write
2740CD63000
heap
page read and write
25F3BFB000
stack
page read and write
2740C4F7000
heap
page read and write
7FFC67219000
unkown
page readonly
2740CD84000
heap
page read and write
26D25A80000
heap
page read and write
8CB000
heap
page read and write
9C266FE000
stack
page read and write
9EFE9AE000
stack
page read and write
1DC605F0000
heap
page read and write
70D35FE000
stack
page read and write
2740CD77000
heap
page read and write
1F107E90000
heap
page read and write
2740C43C000
heap
page read and write
4F10D7F000
stack
page read and write
922000
heap
page read and write
1AB33F5B000
heap
page read and write
20EEBE21000
heap
page read and write
18002D000
direct allocation
page readonly
1C82D602000
heap
page read and write
15C1BF0E000
heap
page read and write
2ACE697E000
heap
page read and write
1DC6052F000
heap
page read and write
1B21AD00000
heap
page read and write
8B0000
heap
page read and write
B8F000
heap
page read and write
1C82CEC5000
heap
page read and write
21B1165A000
heap
page read and write
9C26D77000
stack
page read and write
CFAEC7E000
stack
page read and write
26D258E0000
heap
page read and write
9C263FB000
stack
page read and write
373E6FF000
stack
page read and write
800000
heap
page read and write
1D672430000
trusted library allocation
page read and write
1AB33D33000
heap
page read and write
2740CD80000
heap
page read and write
213B5240000
heap
page read and write
2740CD77000
heap
page read and write
26D25A42000
heap
page read and write
1DC5FCCD000
heap
page read and write
1DC60402000
heap
page read and write
845EC7F000
stack
page read and write
28FD51F0000
heap
page read and write
20EEBDA0000
heap
page read and write
26D25A51000
heap
page read and write
2740CD8C000
heap
page read and write
53B2DDF000
stack
page read and write
2330000
remote allocation
page read and write
1B21AB90000
trusted library allocation
page read and write
1D672600000
heap
page read and write
1CF543A0000
heap
page read and write
1D672320000
trusted library allocation
page read and write
1D6726FF000
heap
page read and write
1AB35900000
heap
page read and write
93BA6FD000
stack
page read and write
213B5110000
heap
page read and write
1C82CECE000
heap
page read and write
60F3F7E000
stack
page read and write
1D672540000
trusted library allocation
page read and write
2740CD62000
heap
page read and write
373E7FE000
stack
page read and write
26D25A76000
heap
page read and write
20EEBE3D000
heap
page read and write
2740CD77000
heap
page read and write
1C94B900000
trusted library allocation
page read and write
1CF54629000
heap
page read and write
1D8AA6A6000
heap
page read and write
2740CD65000
heap
page read and write
1DC5FAC0000
heap
page read and write
2740C4E8000
heap
page read and write
1F108040000
heap
page read and write
26D25A3E000
heap
page read and write
2740CDA8000
heap
page read and write
2740CD84000
heap
page read and write
D0EE9F7000
stack
page read and write
1D66D713000
heap
page read and write
26D25A7D000
heap
page read and write
E20000
heap
page read and write
26ED8FFB000
heap
page read and write
1D8AA6B4000
heap
page read and write
1D66E283000
trusted library allocation
page read and write
15C1C275000
heap
page read and write
180000000
direct allocation
page read and write
26ED8FB0000
heap
page readonly
1C94ABF0000
heap
page read and write
28FD51D0000
heap
page read and write
845E936000
stack
page read and write
1D66D700000
heap
page read and write
2740C471000
heap
page read and write
D52F07E000
stack
page read and write
1DC5FCB1000
heap
page read and write
1F108000000
heap
page read and write
1AB33F50000
heap
page read and write
1AB33D3A000
heap
page read and write
1C94A970000
heap
page read and write
848000
heap
page read and write
1DC5FC52000
heap
page read and write
1DC5FDFD000
heap
page read and write
26ED900D000
heap
page read and write
213B5120000
heap
page read and write
2740CD94000
heap
page read and write
20EEC7E0000
heap
page read and write
AE0000
heap
page read and write
1D8AA6BA000
heap
page read and write
295B000
stack
page read and write
26ED9230000
heap
page read and write
7FFC67212000
unkown
page readonly
20EEBDD9000
heap
page read and write
2740C2B0000
heap
page read and write
2740CD7D000
heap
page read and write
213B526C000
heap
page read and write
2220000
heap
page readonly
26D25A79000
heap
page read and write
213B525B000
heap
page read and write
845ECFE000
stack
page read and write
2740CDC1000
heap
page read and write
21E0000
direct allocation
page execute and read and write
1D8AA6C4000
heap
page read and write
1D8AA890000
heap
page read and write
2740C44D000
heap
page read and write
27DE000
stack
page read and write
1B21AC64000
heap
page read and write
2740CD7D000
heap
page read and write
D0EF17D000
stack
page read and write
26D25A85000
heap
page read and write
D0EECFE000
stack
page read and write
70D317B000
stack
page read and write
2740CD62000
heap
page read and write
1D2A57E000
stack
page read and write
8D9000
heap
page read and write
373E8FE000
stack
page read and write
60F3A7B000
stack
page read and write
CFAEBFE000
stack
page read and write
15C1C270000
heap
page read and write
1F108013000
heap
page read and write
1DC5FC83000
heap
page read and write
1D66CEFD000
heap
page read and write
1D672560000
trusted library allocation
page read and write
2740CDAB000
heap
page read and write
2B4F000
stack
page read and write
180000000
direct allocation
page read and write
2740CD8E000
heap
page read and write
1D8AA69D000
heap
page read and write
7FFC671C1000
unkown
page execute read
1D66D600000
heap
page read and write
1D67262E000
heap
page read and write
1DC5FC43000
heap
page read and write
373DE7B000
stack
page read and write
20EEBE65000
heap
page read and write
1D672580000
trusted library allocation
page read and write
1C94ABA8000
heap
page read and write
1C94AE09000
heap
page read and write
1D66D602000
heap
page read and write
213B5302000
heap
page read and write
9C26B78000
stack
page read and write
1D672702000
heap
page read and write
20EEBFB5000
heap
page read and write
20EEBD30000
heap
page read and write
21B1167B000
heap
page read and write
15C1BF00000
heap
page read and write
2740CD84000
heap
page read and write
1DC5FCA2000
heap
page read and write
2740C451000
heap
page read and write
9EFEDFF000
stack
page read and write
1AB33D10000
heap
page read and write
1D672460000
trusted library allocation
page read and write
2740CD81000
heap
page read and write
1D672689000
heap
page read and write
7FFC671C0000
unkown
page readonly
2740CD8D000
heap
page read and write
AC5A8FF000
stack
page read and write
2740CAD0000
remote allocation
page read and write
1AB33D4E000
heap
page read and write
9EFEFFE000
stack
page read and write
2740C44A000
heap
page read and write
1D67264B000
heap
page read and write
28DE000
stack
page read and write
2ACE6948000
heap
page read and write
1D672451000
trusted library allocation
page read and write
9C26EFB000
stack
page read and write
2740C502000
heap
page read and write
1C82CE29000
heap
page read and write
7FFC671C0000
unkown
page readonly
93BA37E000
stack
page read and write
1DC60513000
heap
page read and write
D0EEAFD000
stack
page read and write
C773EFF000
stack
page read and write
20EEBE56000
heap
page read and write
1F108057000
heap
page read and write
1AB33F55000
heap
page read and write
1B21AA30000
heap
page read and write
1D66CE6E000
heap
page read and write
70D37F7000
stack
page read and write
2740CD62000
heap
page read and write
28FD50A0000
heap
page read and write
1AB33D30000
heap
page read and write
1C94AB60000
trusted library allocation
page read and write
7FFC67212000
unkown
page readonly
60F417A000
stack
page read and write
1C94AAB0000
heap
page read and write
20EEBE35000
heap
page read and write
2ACE698E000
heap
page read and write
20EEBE21000
heap
page read and write
1D6726B6000
heap
page read and write
CFAEA7E000
stack
page read and write
21B11E02000
trusted library allocation
page read and write
1DC60D13000
heap
page read and write
20EEBE35000
heap
page read and write
26D25A6F000
heap
page read and write
1D66CE58000
heap
page read and write
28FD529E000
heap
page read and write
26EDAB90000
heap
page read and write
2740CD8C000
heap
page read and write
908000
heap
page read and write
28FD5296000
heap
page read and write
1CF54600000
heap
page read and write
D0EF37A000
stack
page read and write
2740CD81000
heap
page read and write
26D25B02000
heap
page read and write
2704000
heap
page read and write
2ACE6700000
heap
page read and write
2740C4D7000
heap
page read and write
1D8AA6D6000
heap
page read and write
1D66D718000
heap
page read and write
AC5A87B000
stack
page read and write
1D672870000
trusted library allocation
page read and write
9EFEC7E000
stack
page read and write
780000
heap
page read and write
2740CDA8000
heap
page read and write
18002D000
direct allocation
page readonly
1D8AA6A1000
heap
page read and write
1D6726DF000
heap
page read and write
1AB33D2A000
heap
page read and write
2740C4C3000
heap
page read and write
2740CD8C000
heap
page read and write
26D25A13000
heap
page read and write
1D8AA6C9000
heap
page read and write
1CF54613000
heap
page read and write
1D8AA6D6000
heap
page read and write
2ACE6705000
heap
page read and write
1D66D704000
heap
page read and write
1DC5FC4E000
heap
page read and write
60F3C7F000
stack
page read and write
1AB33D33000
heap
page read and write
1CF54702000
heap
page read and write
26D25A53000
heap
page read and write
20EEBE56000
heap
page read and write
896000
heap
page read and write
28FD5290000
heap
page read and write
2740CD98000
heap
page read and write
1D672620000
heap
page read and write
1C82D700000
heap
page read and write
20EEBE5F000
heap
page read and write
1C94ADE0000
trusted library allocation
page read and write
26ED901D000
heap
page read and write
2740CD84000
heap
page read and write
60D937F000
stack
page read and write
1D4C2100000
heap
page read and write
2740C513000
heap
page read and write
1C82CCB0000
heap
page read and write
26D25A2E000
heap
page read and write
1CF545D0000
trusted library allocation
page read and write
1C82CE7E000
heap
page read and write
2740CD84000
heap
page read and write
1D66CE75000
heap
page read and write
18002F000
direct allocation
page readonly
26D25A4E000
heap
page read and write
AC5AA79000
stack
page read and write
7FFC67216000
unkown
page read and write
21B11700000
heap
page read and write
22A0000
heap
page read and write
D52EF7F000
stack
page read and write
1D66CE9D000
heap
page read and write
2740CD8C000
heap
page read and write
26D25A77000
heap
page read and write
1DC5FC67000
heap
page read and write
811AA7E000
stack
page read and write
21B11460000
heap
page read and write
C773DFD000
stack
page read and write
5C0000
remote allocation
page read and write
25F34EB000
stack
page read and write
9EFEEFF000
stack
page read and write
1D8AA6C4000
heap
page read and write
1DC5FD13000
heap
page read and write
1AB37040000
heap
page read and write
D0EE5FB000
stack
page read and write
26D25A00000
heap
page read and write
213B5313000
heap
page read and write
1DC60D00000
heap
page read and write
2740CD8D000
heap
page read and write
2ACE6940000
heap
page read and write
1C94ABF0000
heap
page read and write
1C82D732000
heap
page read and write
264F000
stack
page read and write
180000000
direct allocation
page read and write
1D672290000
trusted library allocation
page read and write
C7740FE000
stack
page read and write
D0EEDFB000
stack
page read and write
CFAEAFF000
stack
page read and write
213B51B0000
trusted library allocation
page read and write
1C82CE13000
heap
page read and write
1DC602D0000
trusted library allocation
page read and write
2740C3B0000
trusted library allocation
page read and write
1D66CE73000
heap
page read and write
4F10E7F000
stack
page read and write
2740C4E9000
heap
page read and write
1DC5FCAB000
heap
page read and write
2ACE6992000
heap
page read and write
26ED8FD8000
heap
page read and write
2740CD8C000
heap
page read and write
BB7000
heap
page read and write
B30000
heap
page read and write
60D93FD000
stack
page read and write
2740CD7D000
heap
page read and write
7FFC67216000
unkown
page read and write
BB8000
heap
page read and write
213B5202000
heap
page read and write
1D66CE91000
heap
page read and write
2740C48B000
heap
page read and write
1B21AC27000
heap
page read and write
1D4C2090000
heap
page read and write
1C94B940000
trusted library allocation
page read and write
2740CD8F000
heap
page read and write
1AB33D27000
heap
page read and write
2740CDAB000
heap
page read and write
26ED901D000
heap
page read and write
2740C4E4000
heap
page read and write
2740CD84000
heap
page read and write
373E2FC000
stack
page read and write
1C94ADC0000
trusted library allocation
page read and write
BD2000
heap
page read and write
26D25870000
heap
page read and write
2ADF000
stack
page read and write
213B5265000
heap
page read and write
15C1BEC0000
heap
page read and write
7BFB9FE000
stack
page read and write
2740CD80000
heap
page read and write
1D672470000
trusted library allocation
page read and write
1CF54670000
heap
page read and write
1C82CE88000
heap
page read and write
2740CD81000
heap
page read and write
1DC5FCC7000
heap
page read and write
26ED8F30000
heap
page read and write
20EEBEB6000
heap
page read and write
21B11666000
heap
page read and write
2740CD84000
heap
page read and write
21B11602000
heap
page read and write
845ED7E000
stack
page read and write
1D4C20A0000
heap
page read and write
2ACE83C0000
heap
page read and write
1AB33CD0000
heap
page read and write
70D347E000
stack
page read and write
1D66CE3F000
heap
page read and write
2740C516000
heap
page read and write
1DC605D3000
heap
page read and write
C773C7D000
stack
page read and write
1DC5FC7D000
heap
page read and write
2740C4AB000
heap
page read and write
840000
heap
page read and write
2740C4AB000
heap
page read and write
1DC5FC6A000
heap
page read and write
1CF5468F000
heap
page read and write
1DC6050E000
heap
page read and write
1D4C224D000
heap
page read and write
1AB33D33000
heap
page read and write
2740C4E6000
heap
page read and write
93BA87D000
stack
page read and write
2740CDA0000
heap
page read and write
1B21AA20000
heap
page read and write
7FFC67219000
unkown
page readonly
1AB33D2A000
heap
page read and write
1D4C2254000
heap
page read and write
1B21AC02000
heap
page read and write
213B5275000
heap
page read and write
2740D202000
heap
page read and write
2ACE8290000
heap
page read and write
87B000
heap
page read and write
1D4C2249000
heap
page read and write
1CF54708000
heap
page read and write
2740CD87000
heap
page read and write
1D8AA6C4000
heap
page read and write
2740D202000
heap
page read and write
1C94AE05000
heap
page read and write
1C82CE00000
heap
page read and write
1D672450000
trusted library allocation
page read and write
2ACE66F0000
heap
page read and write
1C82CF02000
heap
page read and write
15C1BF28000
heap
page read and write
4F10DFB000
stack
page read and write
2740CDB0000
heap
page read and write
1F108690000
remote allocation
page read and write
1D66D718000
heap
page read and write
21B115C0000
trusted library allocation
page read and write
B00000
direct allocation
page execute and read and write
26D25A69000
heap
page read and write
1B21AD08000
heap
page read and write
26ED9004000
heap
page read and write
1D8AA6DE000
heap
page read and write
1AB37043000
heap
page read and write
20EEBE56000
heap
page read and write
26D25A41000
heap
page read and write
7BFBD7E000
stack
page read and write
2740CD77000
heap
page read and write
2740CD81000
heap
page read and write
1C82CE51000
heap
page read and write
26D25A47000
heap
page read and write
D70000
heap
page read and write
391015D000
stack
page read and write
2740CDAE000
heap
page read and write
811A97C000
stack
page read and write
60F3E7C000
stack
page read and write
1B21B402000
trusted library allocation
page read and write
2740CD87000
heap
page read and write
18002E000
direct allocation
page read and write
C773CFB000
stack
page read and write
1D672661000
heap
page read and write
2740CD62000
heap
page read and write
20EEBFC0000
heap
page read and write
1DC5FC13000
heap
page read and write
1D66D759000
heap
page read and write
26EDAB94000
heap
page read and write
5C0000
remote allocation
page read and write
1DC60559000
heap
page read and write
53B31FF000
stack
page read and write
1D672500000
trusted library allocation
page read and write
25F3CFE000
stack
page read and write
26D25A50000
heap
page read and write
7BFC07E000
stack
page read and write
1D4C225E000
heap
page read and write
1D66D530000
trusted library allocation
page read and write
2740CD91000
heap
page read and write
1D6726F8000
heap
page read and write
1D672454000
trusted library allocation
page read and write
1D8AA6B9000
heap
page read and write
1F108002000
heap
page read and write
7BFBF77000
stack
page read and write
5D0000
heap
page read and write
26ED9000000
heap
page read and write
26D25A6B000
heap
page read and write
1B21AC52000
heap
page read and write
7BFB97F000
stack
page read and write
26ED8F10000
heap
page read and write
9EFE92C000
stack
page read and write
9EFF0FE000
stack
page read and write
1DC5FAD0000
heap
page read and write
1D6726A0000
heap
page read and write
1D8AA5C0000
heap
page read and write
2740CD64000
heap
page read and write
1AB33D3A000
heap
page read and write
1DC60534000
heap
page read and write
21B1163F000
heap
page read and write
2740CD7D000
heap
page read and write
2740CD8D000
heap
page read and write
9C26DFF000
unkown
page read and write
C773FFC000
stack
page read and write
1DC60C02000
heap
page read and write
20EEBEB6000
heap
page read and write
53B2CDA000
stack
page read and write
26D25A7C000
heap
page read and write
2740C240000
heap
page read and write
1D6722A0000
trusted library allocation
page read and write
2740D221000
heap
page read and write
7BFBE7B000
stack
page read and write
93BA4FE000
stack
page read and write
18002F000
direct allocation
page readonly
1AB33D33000
heap
page read and write
26D25A4C000
heap
page read and write
1D66CF02000
heap
page read and write
1D2A47C000
stack
page read and write
1CF54658000
heap
page read and write
1C94ADD0000
heap
page readonly
2740CD8C000
heap
page read and write
C77387B000
stack
page read and write
21B114C0000
heap
page read and write
2740CD77000
heap
page read and write
2740CD7D000
heap
page read and write
2740D21A000
heap
page read and write
1DC60D02000
heap
page read and write
93BA5FF000
stack
page read and write
2740CD77000
heap
page read and write
373E9FF000
stack
page read and write
2740CD98000
heap
page read and write
D52EBBA000
stack
page read and write
8D9000
heap
page read and write
1DC5FCDD000
heap
page read and write
20EEBE15000
heap
page read and write
26ED8FA0000
direct allocation
page execute and read and write
1DC5FC3C000
heap
page read and write
811A5BE000
stack
page read and write
1C82CC50000
heap
page read and write
2740CD62000
heap
page read and write
7FFC67219000
unkown
page readonly
1F656D10000
heap
page read and write
2740CD62000
heap
page read and write
26D25A40000
heap
page read and write
1D66E290000
trusted library allocation
page read and write
21C0000
heap
page read and write
20EEC470000
remote allocation
page read and write
2330000
remote allocation
page read and write
2740CD84000
heap
page read and write
21B11724000
heap
page read and write
373E5FF000
stack
page read and write
20EEBE11000
heap
page read and write
1D8AA690000
heap
page read and write
2740CD87000
heap
page read and write
2740CD87000
heap
page read and write
1DC5FC2A000
heap
page read and write
26D25A48000
heap
page read and write
1B21AC13000
heap
page read and write
26D25A2F000
heap
page read and write
AC5AB7E000
stack
page read and write
1D66CDD0000
heap
page read and write
2740CD9E000
heap
page read and write
8B3000
heap
page read and write
2740CD8C000
heap
page read and write
2ACE68A0000
heap
page read and write
213B526F000
heap
page read and write
2740CD8C000
heap
page read and write
60D92FF000
stack
page read and write
1D66E280000
trusted library allocation
page read and write
20EEBE38000
heap
page read and write
1C82CE70000
heap
page read and write
1D66CD60000
heap
page read and write
1F108690000
remote allocation
page read and write
26ED9235000
heap
page read and write
1C94AE10000
trusted library allocation
page read and write
2390000
heap
page read and write
845E9BF000
stack
page read and write
DFF000
stack
page read and write
25F39FB000
stack
page read and write
1D672590000
remote allocation
page read and write
15C1BF0B000
heap
page read and write
1D8AA895000
heap
page read and write
60F3D79000
stack
page read and write
1D4C2860000
trusted library allocation
page read and write
20EEBE5E000
heap
page read and write
2740CD80000
heap
page read and write
1C94B6F0000
trusted library allocation
page read and write
26D25A45000
heap
page read and write
2740C508000
heap
page read and write
20EEBE11000
heap
page read and write
26D25A46000
heap
page read and write
2330000
remote allocation
page read and write
1D8AA6E5000
heap
page read and write
908000
heap
page read and write
1B21AC5F000
heap
page read and write
1D4C2276000
heap
page read and write
1CF54655000
heap
page read and write
1CF54400000
heap
page read and write
1D2A4FE000
stack
page read and write
26D25A29000
heap
page read and write
26D25A52000
heap
page read and write
1D672460000
trusted library allocation
page read and write
D0EEBFA000
stack
page read and write
53B2D5E000
stack
page read and write
2ACE68C0000
direct allocation
page execute and read and write
1D672500000
trusted library allocation
page read and write
1DC5FC3A000
heap
page read and write
1D8AA6B3000
heap
page read and write
1D66D702000
heap
page read and write
1DC5FCE2000
heap
page read and write
There are 905 hidden memdumps, click here to show them.