IOC Report
Ru97gvh8ir.dll

loading gif

Files

File Path
Type
Category
Malicious
Ru97gvh8ir.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x7d998954, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\Ru97gvh8ir.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\Ru97gvh8ir.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\Ru97gvh8ir.dll,DllRegisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\QHTOcg\FaLIWfXNGlbK.dll"
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\Ru97gvh8ir.dll,DllUnregisterServer
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\CYwMLUBpfJVi\miBCQZcqs.dll"
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\Ru97gvh8ir.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Ru97gvh8ir.dll",#1
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 11 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://23.239.0.12/?T
unknown
malicious
https://23.239.0.12/yT
unknown
malicious
https://23.239.0.12/7
unknown
malicious
https://23.239.0.12/;
unknown
malicious
https://23.239.0.12/
23.239.0.12
malicious
https://23.239.0.12/efaultL
unknown
malicious
https://23.239.0.12/m9
unknown
malicious
https://23.239.0.12/i9
unknown
malicious
https://dev.ditu.live.com/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
unknown
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
unknown
https://t0.tiles.ditu.live.com/tiles/gen
unknown
https://dev.virtualearth.net/REST/v1/Routes/Walking
unknown
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
unknown
https://dev.ditu.live.com/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
http://www.bingmapsportal.com
unknown
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
unknown
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
unknown
https://dev.ditu.live.com/REST/v1/Transit/Stops/
unknown
https://dev.virtualearth.net/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
unknown
http://crl.ver)
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
unknown
https://www.tiktok.com/legal/report/feedback
unknown
https://activity.windows.comr
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
unknown
https://%s.xboxlive.com
unknown
https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://dev.virtualearth.net/mapcontrol/logging.ashx
unknown
https://support.hotspotshield.com/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
https://dynamic.t
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
https://disneyplus.com/legal.
unknown
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
unknown
https://activity.windows.com
unknown
https://dev.ditu.live.com/REST/v1/Locations
unknown
http://help.disneyplus.com.
unknown
https://%s.dnet.xboxlive.com
unknown
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
https://www.tiktok.
unknown
There are 48 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
23.239.0.12
unknown
United States
malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
MonthID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\TaskStore
Schedule Scan
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\State
BlockUntilTimeStatus
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\Configuration
refreshAfter
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
DB0000
direct allocation
page execute and read and write
malicious
19B71C10000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
17947080000
direct allocation
page execute and read and write
malicious
E70000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
28DDC4C0000
heap
page read and write
292E000
stack
page read and write
1DEA77A000
stack
page read and write
1FA39DF3000
heap
page read and write
19B70324000
heap
page read and write
25B6CBB9000
heap
page read and write
747D7F7000
stack
page read and write
1277C013000
heap
page read and write
1D642720000
heap
page read and write
A757178000
stack
page read and write
226EE3F0000
trusted library allocation
page read and write
16DC4E75000
heap
page read and write
2860000
heap
page read and write
270A5002000
heap
page read and write
25B6CB8B000
heap
page read and write
1FA39C40000
heap
page read and write
204EF613000
heap
page read and write
28905ADB000
heap
page read and write
226EE502000
heap
page read and write
270A48F9000
heap
page read and write
270A48EB000
heap
page read and write
151B4C00000
trusted library allocation
page read and write
28905B01000
heap
page read and write
270A5602000
heap
page read and write
E2079FE000
stack
page read and write
25B6CBA9000
heap
page read and write
16DC4E79000
heap
page read and write
226EE3C0000
heap
page read and write
1D643800000
heap
page read and write
18002F000
direct allocation
page readonly
3AF557F000
stack
page read and write
151AF852000
heap
page read and write
270A4891000
heap
page read and write
E7B000
heap
page read and write
226EE45D000
heap
page read and write
270A4710000
heap
page read and write
C94000
heap
page read and write
E2075CA000
stack
page read and write
226EE462000
heap
page read and write
270A5602000
heap
page read and write
25B6CBA9000
heap
page read and write
747D8F7000
stack
page read and write
151B508A000
heap
page read and write
22D2FD70000
heap
page read and write
23A28932000
heap
page read and write
25B6CBB6000
heap
page read and write
1C259FF0000
heap
page read and write
FF0F0F7000
stack
page read and write
226EE486000
heap
page read and write
25F32FE000
stack
page read and write
270A517B000
heap
page read and write
226EE466000
heap
page read and write
278F000
stack
page read and write
7FFC67212000
unkown
page readonly
1FA3A0A5000
heap
page read and write
25B6CB01000
heap
page read and write
1D6428C2000
heap
page read and write
270A5190000
heap
page read and write
1FA3D113000
heap
page read and write
1FA39DEA000
heap
page read and write
1D6428A3000
heap
page read and write
7FFC671C1000
unkown
page execute read
22D2FE00000
heap
page read and write
23A28029000
heap
page read and write
28DDC613000
heap
page read and write
23A2806E000
heap
page read and write
1D643808000
heap
page read and write
28905CB0000
heap
page read and write
270A4867000
heap
page read and write
747D67B000
stack
page read and write
270A4916000
heap
page read and write
19B71C60000
heap
page read and write
226EE42E000
heap
page read and write
151B5102000
heap
page read and write
226EE46F000
heap
page read and write
226EE432000
heap
page read and write
28DDC676000
heap
page read and write
1D642896000
heap
page read and write
180000000
direct allocation
page read and write
1D643002000
heap
page read and write
17947050000
heap
page read and write
12CB1FF000
stack
page read and write
270A518C000
heap
page read and write
1D642846000
heap
page read and write
151AF8A5000
heap
page read and write
17946DA0000
heap
page read and write
151AF6D0000
heap
page read and write
7FFC67219000
unkown
page readonly
FECD6FB000
stack
page read and write
9F0000
remote allocation
page read and write
270A5602000
heap
page read and write
151B0118000
heap
page read and write
17947100000
heap
page read and write
A7570FF000
stack
page read and write
1FA39DF7000
heap
page read and write
23A28113000
heap
page read and write
23A27F80000
trusted library allocation
page read and write
226EE46D000
heap
page read and write
3AF52FB000
stack
page read and write
296E000
stack
page read and write
270A51A2000
heap
page read and write
E40000
heap
page read and write
950000
heap
page read and write
151B50F1000
heap
page read and write
16DC4EFA000
heap
page read and write
270A5190000
heap
page read and write
25B6CBB1000
heap
page read and write
151B4E70000
trusted library allocation
page read and write
180000000
direct allocation
page read and write
204EF600000
heap
page read and write
1D643802000
heap
page read and write
270A51AC000
heap
page read and write
270A485F000
heap
page read and write
1FA39DF3000
heap
page read and write
204EF602000
heap
page read and write
C238DFF000
stack
page read and write
180000000
direct allocation
page read and write
28905AF6000
heap
page read and write
25B6C980000
heap
page read and write
22D2FE28000
heap
page read and write
226EE425000
heap
page read and write
19B70330000
heap
page readonly
16627682000
heap
page read and write
4B2C47F000
stack
page read and write
151B4EE0000
trusted library allocation
page read and write
270A51B4000
heap
page read and write
151B4DC1000
trusted library allocation
page read and write
1D642800000
heap
page read and write
270A5182000
heap
page read and write
1D64391B000
heap
page read and write
FF0F1FE000
stack
page read and write
270A515F000
heap
page read and write
16DC59B0000
trusted library allocation
page read and write
25B6CAF4000
heap
page read and write
747D47B000
stack
page read and write
17946F70000
heap
page read and write
1D64381D000
heap
page read and write
747DD7B000
stack
page read and write
4B2BB3F000
stack
page read and write
1D642813000
heap
page read and write
25B6D43A000
heap
page read and write
23A28068000
heap
page read and write
270A51AC000
heap
page read and write
17946F38000
heap
page read and write
AAF6D0B000
stack
page read and write
226EE458000
heap
page read and write
16DC4EFB000
heap
page read and write
151AF890000
heap
page read and write
270A4869000
heap
page read and write
16DC4E60000
trusted library allocation
page read and write
22D2FF02000
heap
page read and write
17947105000
heap
page read and write
16DC5C20000
trusted library allocation
page read and write
270A5100000
heap
page read and write
B8D9FF000
stack
page read and write
3AF51FB000
stack
page read and write
25B6CB8D000
heap
page read and write
151B4DA0000
trusted library allocation
page read and write
25B6CC55000
heap
page read and write
C238CFC000
stack
page read and write
270A4891000
heap
page read and write
4B2C3FA000
stack
page read and write
1D64284E000
heap
page read and write
1FA39DA0000
heap
page read and write
7FFC67219000
unkown
page readonly
25F347F000
stack
page read and write
1DEA979000
stack
page read and write
270A51B3000
heap
page read and write
F0F000
heap
page read and write
1D643902000
heap
page read and write
1D642829000
heap
page read and write
7FFC67212000
unkown
page readonly
29C4000
heap
page read and write
28DDC65A000
heap
page read and write
1277C802000
trusted library allocation
page read and write
270A518C000
heap
page read and write
1FA3A0AB000
heap
page read and write
226EE400000
heap
page read and write
23A28066000
heap
page read and write
270A5184000
heap
page read and write
270A5190000
heap
page read and write
9F0000
remote allocation
page read and write
16627678000
heap
page read and write
C238A7C000
stack
page read and write
151AF8FA000
heap
page read and write
204EF708000
heap
page read and write
204EF629000
heap
page read and write
270A51C4000
heap
page read and write
16627664000
heap
page read and write
1D642868000
heap
page read and write
CE9000
heap
page read and write
204EF702000
heap
page read and write
19B703CB000
heap
page read and write
1277C05C000
heap
page read and write
28DDC702000
heap
page read and write
1D64315E000
heap
page read and write
12CB179000
stack
page read and write
16627629000
heap
page read and write
1277BF90000
remote allocation
page read and write
204EF666000
heap
page read and write
16DC4D90000
heap
page read and write
16DC4EA0000
heap
page readonly
28DDC520000
heap
page read and write
270A51A4000
heap
page read and write
151AF8A7000
heap
page read and write
28905AD0000
heap
page read and write
16627652000
heap
page read and write
7FFC671C1000
unkown
page execute read
270A5176000
heap
page read and write
270A5189000
heap
page read and write
270A48E4000
heap
page read and write
C238FFE000
stack
page read and write
603D9FB000
stack
page read and write
1662765F000
heap
page read and write
226EE464000
heap
page read and write
870BCC6000
stack
page read and write
25F317E000
stack
page read and write
500FDD000
stack
page read and write
226EE42F000
heap
page read and write
D991DFF000
stack
page read and write
27FF000
stack
page read and write
151AF916000
heap
page read and write
270A5189000
heap
page read and write
AAF75FF000
stack
page read and write
151B4ED0000
trusted library allocation
page read and write
151B5088000
heap
page read and write
151B5020000
heap
page read and write
1D643802000
heap
page read and write
1FA3D120000
trusted library allocation
page read and write
28905B13000
heap
page read and write
151AF800000
heap
page read and write
270A511E000
heap
page read and write
FECD87E000
stack
page read and write
25B6CBA9000
heap
page read and write
270A518E000
heap
page read and write
151B4F00000
trusted library allocation
page read and write
22D2FE13000
heap
page read and write
25B6CB20000
heap
page read and write
2EB0000
remote allocation
page read and write
3AF5477000
stack
page read and write
25B6CB4B000
heap
page read and write
151B0159000
heap
page read and write
1D6429B8000
heap
page read and write
12CAD2E000
stack
page read and write
1DE9E7F000
stack
page read and write
25F2CAC000
stack
page read and write
1DE9B9B000
stack
page read and write
A75707E000
stack
page read and write
270A47B0000
trusted library allocation
page read and write
1D64289B000
heap
page read and write
1D642995000
heap
page read and write
151B4EC0000
trusted library allocation
page read and write
23A28102000
heap
page read and write
270A5190000
heap
page read and write
25F357D000
stack
page read and write
BC52D7E000
stack
page read and write
151B50ED000
heap
page read and write
16DC4F12000
heap
page read and write
151B4DC4000
trusted library allocation
page read and write
226EE43E000
heap
page read and write
FECD67E000
stack
page read and write
16DC4F20000
heap
page read and write
C00000
heap
page read and write
25B6CB20000
heap
page read and write
151B5016000
heap
page read and write
151B4DA0000
trusted library allocation
page read and write
7FFC67219000
unkown
page readonly
16DC4F13000
heap
page read and write
12CB279000
stack
page read and write
19B702F0000
heap
page read and write
19B70350000
heap
page read and write
1DE9FF7000
stack
page read and write
FECD77B000
stack
page read and write
C238BFB000
stack
page read and write
270A5178000
heap
page read and write
270A5196000
heap
page read and write
226EE446000
heap
page read and write
17946F30000
heap
page read and write
D00000
heap
page read and write
23A28087000
heap
page read and write
23A27EF0000
heap
page read and write
19B70320000
heap
page read and write
270A51A3000
heap
page read and write
17947070000
direct allocation
page execute and read and write
F40000
trusted library allocation
page read and write
4B2C1FF000
stack
page read and write
3AF4DFB000
stack
page read and write
16627520000
heap
page read and write
25B6CAC0000
heap
page read and write
C64000
heap
page read and write
179470B0000
heap
page readonly
270A4908000
heap
page read and write
1D643843000
heap
page read and write
12CACAB000
stack
page read and write
204EF713000
heap
page read and write
B8D5C5000
stack
page read and write
25B6CB2D000
heap
page read and write
151B5102000
heap
page read and write
1D643100000
heap
page read and write
151B50DD000
heap
page read and write
226EE469000
heap
page read and write
151B4EB0000
trusted library allocation
page read and write
17946F00000
heap
page read and write
151B4DE0000
trusted library allocation
page read and write
151B0113000
heap
page read and write
18002E000
direct allocation
page read and write
270A517D000
heap
page read and write
270A4829000
heap
page read and write
226EE47D000
heap
page read and write
1D64282E000
heap
page read and write
151B0100000
heap
page read and write
16DC4E70000
heap
page read and write
270A4864000
heap
page read and write
16DC4E20000
trusted library allocation
page read and write
151AFFF3000
trusted library allocation
page read and write
1277BF60000
trusted library allocation
page read and write
270A5176000
heap
page read and write
1FA3D110000
heap
page read and write
270A5174000
heap
page read and write
270A485B000
heap
page read and write
151B0000000
heap
page read and write
151AF83F000
heap
page read and write
16DC4E40000
trusted library allocation
page read and write
151B4C80000
trusted library allocation
page read and write
1D64287D000
heap
page read and write
D03000
heap
page read and write
17946F62000
heap
page read and write
1C259F60000
heap
page read and write
603DC7E000
stack
page read and write
204EF660000
heap
page read and write
23A28044000
heap
page read and write
1FA39DF3000
heap
page read and write
226EE459000
heap
page read and write
C75000
heap
page read and write
28DDC668000
heap
page read and write
25B6CB25000
heap
page read and write
2780000
trusted library allocation
page read and write
1D642710000
heap
page read and write
28905B0F000
heap
page read and write
D80000
heap
page read and write
28DDC4B0000
heap
page read and write
270A517C000
heap
page read and write
25B6CB8B000
heap
page read and write
1D642881000
heap
page read and write
270A5189000
heap
page read and write
280F000
stack
page read and write
22D2FD60000
heap
page read and write
17946F70000
heap
page read and write
1277BED0000
heap
page read and write
204EFE02000
trusted library allocation
page read and write
151B50FD000
heap
page read and write
16627679000
heap
page read and write
CBB000
heap
page read and write
270A515D000
heap
page read and write
AAF74FB000
stack
page read and write
FF0EF7B000
stack
page read and write
B8D97E000
stack
page read and write
270A517A000
heap
page read and write
151B4DC0000
trusted library allocation
page read and write
16DC4C50000
heap
page read and write
16627702000
heap
page read and write
270A4813000
heap
page read and write
DA0000
direct allocation
page execute and read and write
151AF876000
heap
page read and write
AAF72FB000
stack
page read and write
270A517D000
heap
page read and write
226EE465000
heap
page read and write
25B6CC50000
heap
page read and write
FF0ECFE000
stack
page read and write
D991AFE000
stack
page read and write
1FA39DEA000
heap
page read and write
151AF8FA000
heap
page read and write
28DDCC80000
trusted library allocation
page read and write
22D2FE55000
heap
page read and write
16DC5BD0000
trusted library allocation
page read and write
FF0EC7B000
stack
page read and write
28DDC713000
heap
page read and write
25B6CB05000
heap
page read and write
1D64313A000
heap
page read and write
151B50F5000
heap
page read and write
270A485A000
heap
page read and write
204EF64B000
heap
page read and write
603DCFE000
stack
page read and write
4B2C2FF000
stack
page read and write
270A4FA0000
remote allocation
page read and write
25B6CAED000
heap
page read and write
1D6431D8000
heap
page read and write
270A5189000
heap
page read and write
270A517C000
heap
page read and write
23A280BB000
heap
page read and write
226EE477000
heap
page read and write
22D2FE79000
heap
page read and write
226EE429000
heap
page read and write
270A5190000
heap
page read and write
22D30602000
trusted library allocation
page read and write
151B4E70000
trusted library allocation
page read and write
FECD7FC000
stack
page read and write
204EF510000
heap
page read and write
1D6428B0000
heap
page read and write
270A5182000
heap
page read and write
151B4F00000
remote allocation
page read and write
270A4863000
heap
page read and write
FF0EFFE000
stack
page read and write
D9919FF000
stack
page read and write
151B4DAE000
trusted library allocation
page read and write
29AB000
stack
page read and write
16DC4EFF000
heap
page read and write
151AF770000
trusted library allocation
page read and write
BC52DFF000
stack
page read and write
1D6428DC000
heap
page read and write
25F307C000
stack
page read and write
226EE46B000
heap
page read and write
151B503F000
heap
page read and write
23A28000000
heap
page read and write
1277BF90000
remote allocation
page read and write
270A5182000
heap
page read and write
1D64285B000
heap
page read and write
1C25A020000
heap
page read and write
28905A90000
heap
page read and write
270A5178000
heap
page read and write
CBB000
heap
page read and write
270A489B000
heap
page read and write
1DEA3FB000
stack
page read and write
1DEA0FD000
stack
page read and write
1FA39DD8000
heap
page read and write
151B5064000
heap
page read and write
1D6428A9000
heap
page read and write
1662765C000
heap
page read and write
1FA39DD0000
heap
page read and write
270A5602000
heap
page read and write
7FFC671C0000
unkown
page readonly
19B70377000
heap
page read and write
16DC4FB0000
trusted library allocation
page read and write
23A280E1000
heap
page read and write
270A515F000
heap
page read and write
C238EFC000
stack
page read and write
19B70355000
heap
page read and write
E207A7E000
stack
page read and write
29C0000
heap
page read and write
1277C102000
heap
page read and write
16DC4EF7000
heap
page read and write
28DDCE02000
trusted library allocation
page read and write
7FFC67212000
unkown
page readonly
22D2FE3C000
heap
page read and write
1D642889000
heap
page read and write
1277C000000
heap
page read and write
151AF907000
heap
page read and write
747D9FF000
stack
page read and write
AAF73FB000
stack
page read and write
12CB07F000
stack
page read and write
1FA39DF4000
heap
page read and write
1D6427A0000
trusted library allocation
page read and write
270A518C000
heap
page read and write
151B50FB000
heap
page read and write
D99147B000
stack
page read and write
270A51AF000
heap
page read and write
25B6CBE0000
heap
page read and write
1FA3A0A0000
heap
page read and write
226EEC02000
trusted library allocation
page read and write
28905AE6000
heap
page read and write
226EE461000
heap
page read and write
151AF829000
heap
page read and write
870C17F000
stack
page read and write
747DB7F000
unkown
page read and write
151B0102000
heap
page read and write
7FFC671C1000
unkown
page execute read
151B4E70000
trusted library allocation
page read and write
28DDC652000
heap
page read and write
1D6431F1000
heap
page read and write
226EE47B000
heap
page read and write
151B4F00000
remote allocation
page read and write
16DC4EB8000
heap
page read and write
151B4DA8000
trusted library allocation
page read and write
4B2BABC000
stack
page read and write
204EF657000
heap
page read and write
7FFC671C0000
unkown
page readonly
101C7E000
stack
page read and write
270A5189000
heap
page read and write
151B50FD000
heap
page read and write
151AF889000
heap
page read and write
22D2FF13000
heap
page read and write
270A5621000
heap
page read and write
25B6CB4B000
heap
page read and write
4B2BEFB000
stack
page read and write
270A4889000
heap
page read and write
28DDC600000
heap
page read and write
151B4C10000
trusted library allocation
page read and write
226EE442000
heap
page read and write
180000000
direct allocation
page read and write
1F4BD1B0000
heap
page read and write
BC52CFB000
stack
page read and write
16DC4F1C000
heap
page read and write
12CADAF000
stack
page read and write
603E17F000
stack
page read and write
25B6D431000
heap
page read and write
7FFC67216000
unkown
page read and write
18002D000
direct allocation
page readonly
A756DAE000
stack
page read and write
25F33FD000
stack
page read and write
D01000
heap
page read and write
270A5603000
heap
page read and write
1D6429E1000
heap
page read and write
25B6CB28000
heap
page read and write
1277C029000
heap
page read and write
226EE447000
heap
page read and write
D991BFF000
stack
page read and write
226EE360000
heap
page read and write
226EE45A000
heap
page read and write
270A5189000
heap
page read and write
C75000
stack
page read and write
17946EE0000
heap
page read and write
FF0ED7E000
stack
page read and write
9C5000
stack
page read and write
C2389FE000
stack
page read and write
25B6CAF4000
heap
page read and write
270A4859000
heap
page read and write
2A60000
heap
page read and write
747D57E000
stack
page read and write
CB2000
heap
page read and write
22D2FF00000
heap
page read and write
151B4EF0000
trusted library allocation
page read and write
18002F000
direct allocation
page readonly
25F31FF000
stack
page read and write
28DDC641000
heap
page read and write
18002F000
direct allocation
page readonly
22D2FDD0000
heap
page read and write
1F4BD410000
heap
page read and write
22D2FE64000
heap
page read and write
23A27EE0000
heap
page read and write
1662769B000
heap
page read and write
F55000
heap
page read and write
270A48EA000
heap
page read and write
151AF902000
heap
page read and write
28905AB0000
heap
page read and write
FF0F2FF000
stack
page read and write
EA0000
heap
page readonly
16627713000
heap
page read and write
204EF500000
heap
page read and write
1C259FE0000
heap
page read and write
270A519F000
heap
page read and write
1D6428C9000
heap
page read and write
1FA39DFA000
heap
page read and write
18002D000
direct allocation
page readonly
204EF570000
heap
page read and write
28905AE6000
heap
page read and write
16627580000
heap
page read and write
16627E02000
trusted library allocation
page read and write
23A28023000
heap
page read and write
270A518C000
heap
page read and write
270A5182000
heap
page read and write
119B1BD0000
heap
page read and write
B8D8FF000
stack
page read and write
1D642886000
heap
page read and write
2E2F000
stack
page read and write
151AF874000
heap
page read and write
1F4BD228000
heap
page read and write
226EE445000
heap
page read and write
270A5189000
heap
page read and write
16627659000
heap
page read and write
18002E000
direct allocation
page read and write
28905AE1000
heap
page read and write
C64000
heap
page read and write
270A51B3000
heap
page read and write
16DC4E30000
trusted library allocation
page read and write
204EF67E000
heap
page read and write
270A518E000
heap
page read and write
226EE45F000
heap
page read and write
270A5176000
heap
page read and write
25B6CB01000
heap
page read and write
1F4BD1C5000
heap
page read and write
204EF5A0000
trusted library allocation
page read and write
9C0000
heap
page read and write
28905960000
heap
page read and write
151B504C000
heap
page read and write
16DC4EF7000
heap
page read and write
151B4F00000
remote allocation
page read and write
CBB000
heap
page read and write
270A485E000
heap
page read and write
151AF878000
heap
page read and write
4B2BFFE000
stack
page read and write
270A4860000
heap
page read and write
119B1C8D000
heap
page read and write
CE9000
heap
page read and write
1FA39DEE000
heap
page read and write
1D642770000
heap
page read and write
19B70280000
heap
page read and write
25B6CAC8000
heap
page read and write
270A5186000
heap
page read and write
2EB0000
remote allocation
page read and write
870C1FB000
stack
page read and write
1277C002000
heap
page read and write
151B5000000
heap
page read and write
2EB0000
remote allocation
page read and write
1D643871000
heap
page read and write
16627613000
heap
page read and write
270A5174000
heap
page read and write
270A4855000
heap
page read and write
870BDCF000
stack
page read and write
BC527FC000
stack
page read and write
23A27F50000
heap
page read and write
28EC000
stack
page read and write
19B70140000
heap
page read and write
FECD32E000
stack
page read and write
270A5182000
heap
page read and write
1277BEC0000
heap
page read and write
16DC5BC0000
trusted library allocation
page read and write
12CB0F9000
stack
page read and write
25B6CB8B000
heap
page read and write
151B4C90000
trusted library allocation
page read and write
270A519D000
heap
page read and write
7FFC67216000
unkown
page read and write
270A5189000
heap
page read and write
1FA39DFF000
heap
page read and write
D991CFF000
stack
page read and write
1F4BD1C0000
heap
page read and write
28905B15000
heap
page read and write
270A5194000
heap
page read and write
25B6CBB9000
heap
page read and write
BC52C7E000
stack
page read and write
1DEA2FE000
stack
page read and write
7FFC671C1000
unkown
page execute read
C91000
heap
page read and write
1DEA1FA000
stack
page read and write
28DDC678000
heap
page read and write
270A5120000
heap
page read and write
1662769F000
heap
page read and write
2D8F000
stack
page read and write
226EE476000
heap
page read and write
4B2C0F9000
stack
page read and write
C23877C000
stack
page read and write
DF0000
heap
page read and write
C23834C000
stack
page read and write
16DC4F1F000
heap
page read and write
151AF740000
heap
page read and write
151B0002000
heap
page read and write
17948960000
heap
page read and write
270A4902000
heap
page read and write
1DEAC7E000
stack
page read and write
101D7E000
stack
page read and write
603DE7E000
stack
page read and write
1D6428E3000
heap
page read and write
E60000
direct allocation
page execute and read and write
1D643113000
heap
page read and write
ECF000
heap
page read and write
270A5174000
heap
page read and write
3AF567F000
stack
page read and write
2A64000
heap
page read and write
151B4DD0000
trusted library allocation
page read and write
16DC4DB0000
heap
page read and write
7FFC67216000
unkown
page read and write
CE9000
heap
page read and write
151B4DD0000
trusted library allocation
page read and write
270A5176000
heap
page read and write
22D30530000
trusted library allocation
page read and write
DE0000
heap
page readonly
1D642853000
heap
page read and write
28905AF7000
heap
page read and write
17946F5D000
heap
page read and write
270A5193000
heap
page read and write
2E0B000
stack
page read and write
270A5619000
heap
page read and write
270A5185000
heap
page read and write
151AF8AB000
heap
page read and write
1F4BD3F0000
heap
page read and write
9E0000
heap
page read and write
119B1C80000
heap
page read and write
25B6D0C0000
remote allocation
page read and write
18002D000
direct allocation
page readonly
1FA3A060000
heap
page read and write
C20000
heap
page read and write
16627600000
heap
page read and write
270A5603000
heap
page read and write
151B0C00000
trusted library allocation
page read and write
270A5185000
heap
page read and write
226EE350000
heap
page read and write
270A51A1000
heap
page read and write
22D2FE02000
heap
page read and write
D9918FD000
stack
page read and write
226EE480000
heap
page read and write
1D643133000
heap
page read and write
25B6CB05000
heap
page read and write
270A4FA0000
remote allocation
page read and write
CB7000
heap
page read and write
151AFFF0000
trusted library allocation
page read and write
204EF68B000
heap
page read and write
270A485C000
heap
page read and write
25B6CB8D000
heap
page read and write
910000
heap
page read and write
28DDC602000
heap
page read and write
28A0000
heap
page read and write
1D643854000
heap
page read and write
25B6CAF2000
heap
page read and write
18002F000
direct allocation
page readonly
C28000
heap
page read and write
FECD2AA000
stack
page read and write
E20797E000
stack
page read and write
16DC4C60000
trusted library allocation
page read and write
DF0000
heap
page read and write
1019AB000
stack
page read and write
226EE43B000
heap
page read and write
1FA39DFB000
heap
page read and write
FECD3AE000
stack
page read and write
C238B7C000
stack
page read and write
870C07E000
stack
page read and write
151AF813000
heap
page read and write
270A48E8000
heap
page read and write
D99127C000
stack
page read and write
1277C033000
heap
page read and write
151B50A4000
heap
page read and write
179489D4000
heap
page read and write
1D642913000
heap
page read and write
151B4FE0000
trusted library allocation
page read and write
A756D2A000
stack
page read and write
1277C040000
heap
page read and write
747D6FE000
stack
page read and write
270A5189000
heap
page read and write
270A5189000
heap
page read and write
270A51B5000
heap
page read and write
603E07E000
stack
page read and write
270A4720000
heap
page read and write
28905CB5000
heap
page read and write
1DEAA7A000
stack
page read and write
1D64283D000
heap
page read and write
226EE45B000
heap
page read and write
270A5184000
heap
page read and write
204EF700000
heap
page read and write
E70000
heap
page read and write
270A4FA0000
remote allocation
page read and write
226EE413000
heap
page read and write
25B6D0C0000
remote allocation
page read and write
D9916FD000
stack
page read and write
226EE471000
heap
page read and write
747DC78000
stack
page read and write
747DAFC000
stack
page read and write
226EE463000
heap
page read and write
270A515E000
heap
page read and write
151AF86E000
heap
page read and write
2F2F000
stack
page read and write
28DDC62A000
heap
page read and write
151B5200000
trusted library allocation
page read and write
226EE43C000
heap
page read and write
226EE441000
heap
page read and write
270A519C000
heap
page read and write
151B502D000
heap
page read and write
270A48D7000
heap
page read and write
151B4E90000
trusted library allocation
page read and write
B8D87E000
stack
page read and write
1C25A1F0000
heap
page read and write
1D643913000
heap
page read and write
119B1A90000
heap
page read and write
226EE443000
heap
page read and write
D9915FD000
stack
page read and write
1D6428BF000
heap
page read and write
23A280C5000
heap
page read and write
DF5000
heap
page read and write
270A5176000
heap
page read and write
270A4800000
heap
page read and write
151AF88C000
heap
page read and write
1D6428C2000
heap
page read and write
226EE47F000
heap
page read and write
28905B01000
heap
page read and write
1D642861000
heap
page read and write
270A5180000
heap
page read and write
270A512A000
heap
page read and write
270A4866000
heap
page read and write
270A517C000
heap
page read and write
270A51A1000
heap
page read and write
16627708000
heap
page read and write
270A4780000
heap
page read and write
270A4913000
heap
page read and write
16627510000
heap
page read and write
270A483C000
heap
page read and write
18002E000
direct allocation
page read and write
7FFC67216000
unkown
page read and write
7FFC67212000
unkown
page readonly
270A51B2000
heap
page read and write
270A518A000
heap
page read and write
1D6429FD000
heap
page read and write
7FFC671C0000
unkown
page readonly
226EE47C000
heap
page read and write
25B6CBC0000
heap
page read and write
1277BF90000
remote allocation
page read and write
270A5176000
heap
page read and write
270A48C1000
heap
page read and write
A75727C000
stack
page read and write
28905B0E000
heap
page read and write
1C259FE5000
heap
page read and write
25B6D0C0000
remote allocation
page read and write
270A5602000
heap
page read and write
3AF537E000
stack
page read and write
3AF507E000
stack
page read and write
151B4DE4000
trusted library allocation
page read and write
FECD8FF000
stack
page read and write
270A5174000
heap
page read and write
870BD4F000
stack
page read and write
23A28013000
heap
page read and write
16DC4EB0000
heap
page read and write
270A5186000
heap
page read and write
19B70370000
heap
page read and write
270A51D4000
heap
page read and write
18002D000
direct allocation
page readonly
23A280CC000
heap
page read and write
151B0159000
heap
page read and write
23A28802000
heap
page read and write
F50000
heap
page read and write
3AF50FE000
stack
page read and write
23A28900000
heap
page read and write
16DC4EFF000
heap
page read and write
A7571FF000
stack
page read and write
151AF902000
heap
page read and write
1D64310C000
heap
page read and write
7FFC67219000
unkown
page readonly
270A5602000
heap
page read and write
151B0104000
heap
page read and write
270A517A000
heap
page read and write
1D64310E000
heap
page read and write
270A5176000
heap
page read and write
22D2FE77000
heap
page read and write
270A5182000
heap
page read and write
287C000
stack
page read and write
179489D0000
heap
page read and write
603DF7E000
stack
page read and write
1662763C000
heap
page read and write
870C0FE000
stack
page read and write
270A5189000
heap
page read and write
1D6428D4000
heap
page read and write
204EF63C000
heap
page read and write
25B6D430000
heap
page read and write
270A51B5000
heap
page read and write
151B07E0000
trusted library allocation
page read and write
151AF858000
heap
page read and write
270A5600000
heap
page read and write
C2388FE000
stack
page read and write
1D64286A000
heap
page read and write
1D6427F0000
trusted library allocation
page read and write
151AF89C000
heap
page read and write
151B0118000
heap
page read and write
1F4BD220000
heap
page read and write
1FA39D80000
heap
page read and write
28905AF4000
heap
page read and write
270A519B000
heap
page read and write
28905B01000
heap
page read and write
EF5000
heap
page read and write
EF4000
heap
page read and write
1277BF30000
heap
page read and write
1D643900000
heap
page read and write
226EE45E000
heap
page read and write
18002E000
direct allocation
page read and write
270A51B2000
heap
page read and write
25B6CB4B000
heap
page read and write
101CFE000
stack
page read and write
2EAE000
stack
page read and write
151AF8AB000
heap
page read and write
16DC4EF7000
heap
page read and write
270A5190000
heap
page read and write
166275B0000
trusted library allocation
page read and write
747D4FE000
stack
page read and write
16627678000
heap
page read and write
25B6CB8D000
heap
page read and write
19B702A0000
heap
page read and write
25B6CB25000
heap
page read and write
270A5602000
heap
page read and write
1FA3CFE0000
heap
page read and write
270A5182000
heap
page read and write
270A48C8000
heap
page read and write
7FFC671C0000
unkown
page readonly
16627700000
heap
page read and write
16DC4EFF000
heap
page read and write
270A4862000
heap
page read and write
1D642838000
heap
page read and write
CB2000
heap
page read and write
19B70310000
direct allocation
page execute and read and write
151AF6E0000
heap
page read and write
270A5602000
heap
page read and write
151B0015000
heap
page read and write
C94000
heap
page read and write
28905AF2000
heap
page read and write
There are 875 hidden memdumps, click here to show them.