IOC Report
S0Uj3iEhau

loading gif

Files

File Path
Type
Category
Malicious
S0Uj3iEhau.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_S0U_624f1bf42cf3970c0bbbc2316f5a353e1dba16_e01ee71e_0afa0dae\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2B3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER409.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER65C.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREE20.tmp.dmp
Mini DuMP crash report, 15 streams, Sat May 14 12:14:58 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF620.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\S0Uj3iEhau.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\S0Uj3iEhau.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\S0Uj3iEhau.dll,DllRegisterServer
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\S0Uj3iEhau.dll,DllUnregisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\LBQDVFLViUyJtRNx\yIKZtRHMJ.dll"
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\S0Uj3iEhau.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\S0Uj3iEhau.dll",#1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -pss -s 468 -p 7136 -ip 7136
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7136 -s 352
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://23.239.0.12/S
unknown
malicious
https://23.239.0.12/
23.239.0.12
malicious
https://23.239.0.12/G
unknown
malicious
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
http://crl.ver)
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://www.tiktok.com/legal/report/feedback
unknown
http://help.disneyplus.com.
unknown
https://support.hotspotshield.com/
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
https://disneyplus.com/legal.
unknown
There are 2 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
23.239.0.12
unknown
United States
malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsPeFile
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
001840064172BCE4
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
180001000
direct allocation
page execute read
malicious
2200000
direct allocation
page execute and read and write
malicious
1B259EF0000
direct allocation
page execute and read and write
malicious
1CB19B40000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
19190A20000
direct allocation
page execute and read and write
malicious
BD0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
1B259EF0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
1B259EF0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
7FFF30829000
unkown
page readonly
1E455419000
heap
page read and write
228F0350000
heap
page read and write
1B258540000
heap
page read and write
1E7C6E0D000
unkown
page read and write
14F78D80000
trusted library allocation
page read and write
B0A000
heap
page read and write
23FF7588000
heap
page read and write
B869BFF000
stack
page read and write
1E454F8B000
heap
page read and write
228F046D000
heap
page read and write
8DD2476000
stack
page read and write
A4A99FF000
stack
page read and write
6E106FB000
stack
page read and write
A70000
heap
page read and write
1E9E8862000
heap
page read and write
1E9E8850000
heap
page read and write
7FFF307D1000
unkown
page execute read
1E454F9E000
heap
page read and write
1E454FBC000
heap
page read and write
1E454F9E000
heap
page read and write
14F78F02000
heap
page read and write
1E9E8780000
heap
page read and write
1E7C6E13000
unkown
page read and write
1E454F8C000
heap
page read and write
228F0450000
heap
page read and write
1E454F86000
heap
page read and write
1E454F8F000
heap
page read and write
7FFF30826000
unkown
page read and write
1E9E8710000
heap
page read and write
14DB127F000
heap
page read and write
1E454FBB000
heap
page read and write
A8C38FE000
stack
page read and write
1E9E89F0000
trusted library allocation
page read and write
228F0360000
heap
page read and write
14F78C80000
heap
page read and write
1D9381D5000
heap
page read and write
1E454FB1000
heap
page read and write
8DD257F000
stack
page read and write
1E454FCC000
heap
page read and write
1B25A190000
heap
page read and write
1AB84E4E000
heap
page read and write
1B25858B000
heap
page read and write
1E454F9C000
heap
page read and write
1D938202000
heap
page read and write
180000000
direct allocation
page read and write
14F78F00000
heap
page read and write
1E454FC2000
heap
page read and write
1E454420000
heap
page read and write
18002E000
direct allocation
page read and write
14F78E13000
heap
page read and write
1B25A040000
remote allocation
page read and write
B0A000
heap
page read and write
14037F8000
stack
page read and write
14DB1C02000
trusted library allocation
page read and write
1E454613000
heap
page read and write
1B25A040000
remote allocation
page read and write
1E454F7F000
heap
page read and write
1E454F93000
heap
page read and write
1E454FAE000
heap
page read and write
1E45463C000
heap
page read and write
1D938211000
heap
page read and write
1D9381D0000
heap
page read and write
1E454F7A000
heap
page read and write
1B25A004000
heap
page read and write
14030FE000
stack
page read and write
1E454F78000
heap
page read and write
1CB18240000
heap
page read and write
228F0429000
heap
page read and write
228F0513000
heap
page read and write
1E9E9600000
trusted library allocation
page read and write
B0A000
heap
page read and write
7FFF307D0000
unkown
page readonly
14032F7000
stack
page read and write
7FFF307D0000
unkown
page readonly
1E454F7C000
heap
page read and write
1E454FCC000
heap
page read and write
19190731000
heap
page read and write
228F03C0000
heap
page read and write
1B2584F5000
heap
page read and write
1E7C6F00000
trusted library allocation
page read and write
1B2584C0000
heap
page read and write
1E7C6F02000
trusted library allocation
page read and write
1E9E8B10000
trusted library allocation
page read and write
18002E000
direct allocation
page read and write
1B25A004000
heap
page read and write
6E1047F000
stack
page read and write
1E454F9E000
heap
page read and write
191921F0000
heap
page read and write
228F043C000
heap
page read and write
1E454F76000
heap
page read and write
2610000
remote allocation
page read and write
228F0500000
heap
page read and write
14DB1300000
heap
page read and write
B5B000
heap
page read and write
AFC000
heap
page read and write
180000000
direct allocation
page read and write
1E454F94000
heap
page read and write
191906C0000
heap
page read and write
A4A9DFE000
stack
page read and write
1E454F9F000
heap
page read and write
1B258450000
unkown
page read and write
9AD27F000
stack
page read and write
1E4546F7000
heap
page read and write
A4A9C7F000
stack
page read and write
1D938225000
heap
page read and write
1E454F86000
heap
page read and write
1AB84E56000
heap
page read and write
1AB84F00000
heap
page read and write
1E455402000
heap
page read and write
8DD2476000
stack
page read and write
1E454FC3000
heap
page read and write
1B2584F0000
heap
page read and write
1E455422000
heap
page read and write
1E454F7B000
heap
page read and write
1E454F9E000
heap
page read and write
18002D000
direct allocation
page readonly
1AB84E8B000
heap
page read and write
1E454F93000
heap
page read and write
1E454F8A000
heap
page read and write
228F046A000
heap
page read and write
1E454F0D000
heap
page read and write
1AB84CC0000
heap
page read and write
1AB84F08000
heap
page read and write
1E9E8825000
heap
page read and write
C1181EC000
stack
page read and write
2DEA4FF000
stack
page read and write
28BF000
stack
page read and write
19190752000
heap
page read and write
5E0000
heap
page read and write
2B6E000
stack
page read and write
23DFFE000
stack
page read and write
1E454F8C000
heap
page read and write
19192070000
heap
page readonly
1E454F9E000
heap
page read and write
BE0000
heap
page read and write
1B25A190000
heap
page read and write
1E454FA9000
heap
page read and write
1E454FAC000
heap
page read and write
1E454629000
heap
page read and write
1AB84E73000
heap
page read and write
972000
heap
page read and write
C1184FE000
stack
page read and write
1AB84C60000
heap
page read and write
1E454F9E000
heap
page read and write
1E454FAC000
heap
page read and write
1E7C6E02000
unkown
page read and write
1CB18525000
heap
page read and write
B28000
heap
page read and write
1E455402000
heap
page read and write
1E7C7100000
heap
page read and write
7FFF30822000
unkown
page readonly
1E454681000
heap
page read and write
18002E000
direct allocation
page read and write
1E9E8875000
heap
page read and write
7FFF30829000
unkown
page readonly
1E454665000
heap
page read and write
AFC000
heap
page read and write
1B258500000
heap
page read and write
1E7C7002000
heap
page read and write
1E454F86000
heap
page read and write
1E454F87000
heap
page read and write
1E454FA0000
heap
page read and write
B90000
direct allocation
page execute and read and write
A4A9D7E000
stack
page read and write
1E454F9E000
heap
page read and write
1E454F84000
heap
page read and write
1B2584F0000
heap
page read and write
8DD257F000
stack
page read and write
7FFF30829000
unkown
page readonly
1E454F78000
heap
page read and write
1E454F58000
heap
page read and write
2610000
remote allocation
page read and write
1E9E8A50000
trusted library allocation
page read and write
228F03F0000
trusted library allocation
page read and write
7FFF30822000
unkown
page readonly
1E454F9E000
heap
page read and write
228F048D000
heap
page read and write
1E454F72000
heap
page read and write
228F0E02000
trusted library allocation
page read and write
6E104FF000
stack
page read and write
14DB1308000
heap
page read and write
180000000
direct allocation
page read and write
1B258580000
heap
page read and write
1E9E87A0000
heap
page read and write
1E4545F0000
remote allocation
page read and write
1B25858B000
heap
page read and write
23DA7B000
stack
page read and write
1E9E8720000
trusted library allocation
page read and write
6F4000
stack
page read and write
4F0000
heap
page read and write
1E454F9E000
heap
page read and write
1E454F8C000
heap
page read and write
B8697FA000
stack
page read and write
A8C34CD000
stack
page read and write
1E454716000
heap
page read and write
14DB1313000
heap
page read and write
1E7C6E00000
unkown
page read and write
1B258560000
direct allocation
page execute and read and write
14DB1253000
heap
page read and write
27BE000
stack
page read and write
1B258570000
heap
page readonly
1402DFB000
stack
page read and write
1E455402000
heap
page read and write
19190690000
heap
page read and write
1E454F77000
heap
page read and write
1D9381F7000
heap
page read and write
14F78E00000
heap
page read and write
1E455403000
heap
page read and write
9AC9FB000
stack
page read and write
191906B0000
direct allocation
page execute and read and write
1E9E8AA0000
heap
page readonly
A98000
heap
page read and write
1E4546D7000
heap
page read and write
1AB84E4C000
heap
page read and write
1CB18290000
heap
page read and write
1E454F9E000
heap
page read and write
14DB124D000
heap
page read and write
1E454F5C000
heap
page read and write
86F8279000
stack
page read and write
1E454F9E000
heap
page read and write
1B25A000000
heap
page read and write
9AD37E000
stack
page read and write
18002F000
direct allocation
page readonly
1E454FD8000
heap
page read and write
180000000
direct allocation
page read and write
1E4546B3000
heap
page read and write
1E4545F0000
remote allocation
page read and write
1E9E8B00000
heap
page read and write
86F81F9000
stack
page read and write
2A6B000
stack
page read and write
1E454F00000
heap
page read and write
238F000
stack
page read and write
228F0402000
heap
page read and write
1AB84E70000
heap
page read and write
7FFF30826000
unkown
page read and write
7FFF307D1000
unkown
page execute read
1E45466B000
heap
page read and write
14033F7000
stack
page read and write
1E454F9E000
heap
page read and write
AE5000
heap
page read and write
1E454713000
heap
page read and write
18002F000
direct allocation
page readonly
1D93820F000
heap
page read and write
1E454F9E000
heap
page read and write
180000000
direct allocation
page read and write
1E454F9F000
heap
page read and write
1E454FB0000
heap
page read and write
23E0FF000
stack
page read and write
1B258570000
heap
page readonly
C85000
heap
page read and write
1D938220000
heap
page read and write
1D93820F000
heap
page read and write
18002F000
direct allocation
page readonly
2C6F000
stack
page read and write
1E454F9E000
heap
page read and write
1E454F9E000
heap
page read and write
1AB85602000
trusted library allocation
page read and write
1E455418000
heap
page read and write
1D9381F7000
heap
page read and write
1D9381E0000
heap
page read and write
23DDFB000
stack
page read and write
6E105FC000
stack
page read and write
B869C7F000
stack
page read and write
1E454F8C000
heap
page read and write
A00000
heap
page read and write
1E454FB3000
heap
page read and write
1E454F50000
heap
page read and write
720000
remote allocation
page read and write
18002D000
direct allocation
page readonly
14DB1229000
heap
page read and write
1E9E8AC0000
trusted library allocation
page read and write
1E7C6E66000
heap
page read and write
228F0413000
heap
page read and write
9AD17D000
stack
page read and write
1B258580000
heap
page read and write
C11847E000
stack
page read and write
6E101D6000
stack
page read and write
1E454F80000
heap
page read and write
7FFF307D1000
unkown
page execute read
1E454FBE000
heap
page read and write
1E454F7E000
heap
page read and write
B28000
heap
page read and write
1E455402000
heap
page read and write
191905B0000
heap
page read and write
2300000
heap
page read and write
1E454F8B000
heap
page read and write
1B258540000
heap
page read and write
1E454F9F000
heap
page read and write
1E9E8850000
heap
page read and write
1B258500000
heap
page read and write
BE5000
heap
page read and write
228F0449000
heap
page read and write
1D938180000
heap
page read and write
1D938204000
heap
page read and write
228F0502000
heap
page read and write
23DEF7000
stack
page read and write
1E454FAE000
heap
page read and write
BC0000
heap
page read and write
1919071E000
heap
page read and write
1AB84C50000
heap
page read and write
1B2584C0000
heap
page read and write
1E454FA2000
heap
page read and write
C1186FB000
stack
page read and write
C1187F7000
stack
page read and write
B0A000
heap
page read and write
14DB128D000
heap
page read and write
1E9E8807000
heap
page read and write
1E45465E000
heap
page read and write
7FFF30826000
unkown
page read and write
C1185FC000
stack
page read and write
7FFF307D0000
unkown
page readonly
7FFF30829000
unkown
page readonly
1E455402000
heap
page read and write
1E454F9E000
heap
page read and write
23DAFE000
stack
page read and write
1E454F9E000
heap
page read and write
14DB1200000
heap
page read and write
1E454F9E000
heap
page read and write
1E454E02000
heap
page read and write
B25000
heap
page read and write
1E454F86000
heap
page read and write
1B258570000
heap
page readonly
1E454F9E000
heap
page read and write
1B258580000
heap
page read and write
1E455400000
heap
page read and write
2DEA3FE000
stack
page read and write
23FF7595000
heap
page read and write
1E454F84000
heap
page read and write
1919074C000
heap
page read and write
1E454661000
heap
page read and write
1CB18298000
heap
page read and write
B5B000
heap
page read and write
1D938206000
heap
page read and write
1AB84E52000
heap
page read and write
1AB84E27000
heap
page read and write
24B0000
trusted library allocation
page read and write
1E454F78000
heap
page read and write
1E45465C000
heap
page read and write
2DEA1FB000
stack
page read and write
BA0000
heap
page readonly
9ACC7F000
stack
page read and write
1E455402000
heap
page read and write
1E454F9E000
heap
page read and write
1E454F19000
heap
page read and write
B1F000
heap
page read and write
1D938211000
heap
page read and write
1E454F9E000
heap
page read and write
1E454F9E000
heap
page read and write
1E454F7A000
heap
page read and write
19190A50000
heap
page read and write
1E7C6E37000
heap
page read and write
1E9E8848000
heap
page read and write
8DD24FF000
stack
page read and write
7FFF30829000
unkown
page readonly
2C70000
heap
page read and write
1E455402000
heap
page read and write
18002D000
direct allocation
page readonly
14F78E3D000
heap
page read and write
1E454F70000
heap
page read and write
1E454F9E000
heap
page read and write
14DB1202000
heap
page read and write
1B25A000000
heap
page read and write
C11897E000
stack
page read and write
24B0000
trusted library allocation
page read and write
A4A9E7B000
stack
page read and write
18002D000
direct allocation
page readonly
1D938160000
heap
page read and write
A90000
heap
page read and write
720000
remote allocation
page read and write
1E454708000
heap
page read and write
1D938211000
heap
page read and write
1E454F9D000
heap
page read and write
1E9E8AB0000
trusted library allocation
page read and write
1CB182E3000
heap
page read and write
1E45466A000
heap
page read and write
18002D000
direct allocation
page readonly
1919070D000
heap
page read and write
1E454F9E000
heap
page read and write
18002E000
direct allocation
page read and write
7FFF30822000
unkown
page readonly
1B258450000
heap
page read and write
86F8379000
stack
page read and write
283E000
stack
page read and write
1E454F9E000
heap
page read and write
29EE000
stack
page read and write
14F78E28000
heap
page read and write
1E454F8B000
heap
page read and write
918000
heap
page read and write
8D0000
heap
page read and write
14DB1170000
heap
page read and write
1E454F9E000
heap
page read and write
7FFF30822000
unkown
page readonly
7FFF30826000
unkown
page read and write
1B258500000
heap
page read and write
1E454F86000
heap
page read and write
1CB182EC000
heap
page read and write
1E454F7B000
heap
page read and write
7FFF30826000
unkown
page read and write
A20000
heap
page read and write
14036FF000
unkown
page read and write
14F79602000
trusted library allocation
page read and write
18002F000
direct allocation
page readonly
23FF7580000
heap
page read and write
1B258540000
heap
page read and write
1E9E8800000
heap
page read and write
1E7C6F15000
trusted library allocation
page read and write
1CB18260000
direct allocation
page execute and read and write
1CB19CD0000
heap
page read and write
252F000
stack
page read and write
1CB181D0000
heap
page read and write
1E7C6BE0000
trusted library allocation
page read and write
19190620000
heap
page read and write
140307E000
stack
page read and write
B869CFC000
stack
page read and write
1E455418000
heap
page read and write
1E4546E9000
heap
page read and write
9ACCFE000
stack
page read and write
1D93820F000
heap
page read and write
1B25858B000
heap
page read and write
8DD24FF000
stack
page read and write
14DB123C000
heap
page read and write
1E9E8842000
heap
page read and write
B1F000
heap
page read and write
1E454681000
heap
page read and write
1E454F9E000
heap
page read and write
1E454F9E000
heap
page read and write
1E454688000
heap
page read and write
1D9381F2000
heap
page read and write
A4A9CFE000
stack
page read and write
1E454F9D000
heap
page read and write
1E454F9E000
heap
page read and write
1AB84E4B000
heap
page read and write
23DB7E000
stack
page read and write
2DE9C9B000
stack
page read and write
B28000
heap
page read and write
1E454FC3000
heap
page read and write
1CB19CD4000
heap
page read and write
9AD077000
stack
page read and write
1E454FC1000
heap
page read and write
86F83FF000
stack
page read and write
1AB84F13000
heap
page read and write
18002F000
direct allocation
page readonly
1E454F91000
heap
page read and write
7FFF30822000
unkown
page readonly
1E9E8B05000
heap
page read and write
1E454F7C000
heap
page read and write
1E454F8B000
heap
page read and write
228F048A000
heap
page read and write
1AB84E3C000
heap
page read and write
1E454F5C000
heap
page read and write
2304000
heap
page read and write
1E9E89E0000
trusted library allocation
page read and write
228F0453000
heap
page read and write
1E454F78000
heap
page read and write
1E454480000
heap
page read and write
228F0508000
heap
page read and write
1E7C6C40000
heap
page read and write
86F7DAC000
stack
page read and write
1B25A190000
heap
page read and write
5A5000
stack
page read and write
1E454F78000
heap
page read and write
1B25A004000
heap
page read and write
8DD2476000
stack
page read and write
7FFF307D0000
unkown
page readonly
1B2584F5000
heap
page read and write
1E454F9D000
heap
page read and write
B5428FD000
stack
page read and write
18002F000
direct allocation
page readonly
228F0400000
heap
page read and write
7FFF30829000
unkown
page readonly
1AB84DC0000
trusted library allocation
page read and write
1B258450000
unkown
page read and write
1E454F97000
heap
page read and write
1E454F78000
heap
page read and write
1CB18270000
heap
page readonly
9ACE7F000
stack
page read and write
7FFF30829000
unkown
page readonly
1D938205000
heap
page read and write
7FFF307D0000
unkown
page readonly
14DB125D000
heap
page read and write
1E454F79000
heap
page read and write
25AC000
stack
page read and write
7FFF307D1000
unkown
page execute read
7FFF30822000
unkown
page readonly
1E454F1F000
heap
page read and write
14DB125D000
heap
page read and write
1E454F7F000
heap
page read and write
1E454F8C000
heap
page read and write
1B25A000000
heap
page read and write
23FF7550000
heap
page read and write
8DD257F000
stack
page read and write
180000000
direct allocation
page read and write
7FFF30826000
unkown
page read and write
1E454654000
heap
page read and write
1E4545F0000
remote allocation
page read and write
AD2000
heap
page read and write
BD0000
direct allocation
page execute and read and write
1D9381EB000
heap
page read and write
1E454F9E000
heap
page read and write
2DEA2FB000
stack
page read and write
228F044B000
heap
page read and write
1E9E8850000
heap
page read and write
14DB11A0000
trusted library allocation
page read and write
1E7C6BD0000
heap
page read and write
19192234000
heap
page read and write
1E454F93000
heap
page read and write
228F044D000
heap
page read and write
1CB181F0000
heap
page read and write
8DD24FF000
stack
page read and write
1E454F9F000
heap
page read and write
19192230000
heap
page read and write
1B2584C0000
heap
page read and write
1E454F91000
heap
page read and write
1E4546E4000
heap
page read and write
1E455402000
heap
page read and write
19190A55000
heap
page read and write
1E4546C8000
heap
page read and write
23DCFE000
stack
page read and write
14DB126F000
heap
page read and write
1AB84E83000
heap
page read and write
1E454F7D000
heap
page read and write
1AB84F02000
heap
page read and write
A8C3BF9000
stack
page read and write
C11887E000
stack
page read and write
1D938100000
heap
page read and write
1E7C7013000
heap
page read and write
1CB19B90000
heap
page read and write
910000
heap
page read and write
1D93821F000
heap
page read and write
AD2000
heap
page read and write
1E454F79000
heap
page read and write
1E454F7B000
heap
page read and write
1E454669000
heap
page read and write
A4A9976000
stack
page read and write
1B258560000
direct allocation
page execute and read and write
9ACF7B000
stack
page read and write
2610000
remote allocation
page read and write
191906C8000
heap
page read and write
1E9E8B09000
heap
page read and write
1E7C7102000
heap
page read and write
7FFF30822000
unkown
page readonly
14DB1213000
heap
page read and write
1E454F9E000
heap
page read and write
C80000
heap
page read and write
1CB18520000
heap
page read and write
180000000
direct allocation
page read and write
1E454F9B000
heap
page read and write
14034FE000
stack
page read and write
1AB84E00000
heap
page read and write
7FFF307D0000
unkown
page readonly
14F78E02000
heap
page read and write
23FF74E0000
heap
page read and write
B869A7E000
stack
page read and write
86F82FE000
stack
page read and write
14DB1280000
heap
page read and write
1E454F17000
heap
page read and write
1E454FAE000
heap
page read and write
1E4546AA000
heap
page read and write
1E454F61000
heap
page read and write
1E454600000
heap
page read and write
7FFF307D0000
unkown
page readonly
2620000
heap
page read and write
18002F000
direct allocation
page readonly
1E454F8F000
heap
page read and write
1E45465F000
heap
page read and write
19190640000
heap
page read and write
1AB84E29000
heap
page read and write
1E454F89000
heap
page read and write
1E454F9E000
heap
page read and write
1CB182DD000
heap
page read and write
1E454FB4000
heap
page read and write
6E1067E000
stack
page read and write
14DB1100000
heap
page read and write
1E454F9E000
heap
page read and write
1B2584F5000
heap
page read and write
1B2584F0000
heap
page read and write
C118A7F000
stack
page read and write
1D938223000
heap
page read and write
1E454F8C000
heap
page read and write
1E454667000
heap
page read and write
1E454FA3000
heap
page read and write
14F78E5A000
heap
page read and write
6E1057E000
stack
page read and write
14DB1110000
heap
page read and write
1E4546A9000
heap
page read and write
1E4546C2000
heap
page read and write
1E454F9F000
heap
page read and write
B5B000
heap
page read and write
1E9E8A90000
trusted library allocation
page read and write
BC4000
heap
page read and write
18002D000
direct allocation
page readonly
2230000
heap
page readonly
1E454F9E000
heap
page read and write
B869AFE000
stack
page read and write
7FFF30826000
unkown
page read and write
1E454F9E000
heap
page read and write
22BF000
stack
page read and write
14F78C20000
heap
page read and write
1E454663000
heap
page read and write
962000
heap
page read and write
640000
heap
page read and write
14035FA000
stack
page read and write
1E454702000
heap
page read and write
7FFF307D1000
unkown
page execute read
1AB84E8E000
heap
page read and write
1E454580000
trusted library allocation
page read and write
1B258560000
direct allocation
page execute and read and write
AF9000
heap
page read and write
14F78F13000
heap
page read and write
18002D000
direct allocation
page readonly
1E7C6F23000
heap
page read and write
1E454F9E000
heap
page read and write
7FFF307D1000
unkown
page execute read
1CB18090000
heap
page read and write
C118B7E000
stack
page read and write
2BEF000
stack
page read and write
1E454F72000
heap
page read and write
1E455422000
heap
page read and write
14DB1302000
heap
page read and write
1AB84E13000
heap
page read and write
1AB84E4A000
heap
page read and write
1E7C6E1F000
unkown
page read and write
191906FD000
heap
page read and write
140367F000
stack
page read and write
1E7C6E28000
heap
page read and write
7FFF307D1000
unkown
page execute read
1E454F9E000
heap
page read and write
1E454FBC000
heap
page read and write
23F0000
heap
page read and write
293B000
stack
page read and write
1E454FB0000
heap
page read and write
BB0000
heap
page read and write
1E9E9820000
trusted library allocation
page read and write
14F78E75000
heap
page read and write
14F78C10000
heap
page read and write
1E7C7113000
heap
page read and write
1E454F9E000
heap
page read and write
1E454410000
heap
page read and write
1E454F9E000
heap
page read and write
1E454F8B000
heap
page read and write
1E454F78000
heap
page read and write
B869B79000
stack
page read and write
1E454F83000
heap
page read and write
1E454F8F000
heap
page read and write
228F0481000
heap
page read and write
There are 650 hidden memdumps, click here to show them.