IOC Report
S0Uj3iEhau.dll

loading gif

Files

File Path
Type
Category
Malicious
S0Uj3iEhau.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x429db59e, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
modified
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_S0U_624f1bf42cf3970c0bbbc2316f5a353e1dba16_e01ee71e_0afa0dae\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2B3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER409.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER65C.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREE20.tmp.dmp
Mini DuMP crash report, 15 streams, Sat May 14 12:14:58 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF620.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\S0Uj3iEhau.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\S0Uj3iEhau.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\S0Uj3iEhau.dll,DllRegisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\VXqCbDaRw\xzHyqHbxqD.dll"
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\S0Uj3iEhau.dll,DllUnregisterServer
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k unistacksvcgroup
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\LBQDVFLViUyJtRNx\yIKZtRHMJ.dll"
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\S0Uj3iEhau.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\S0Uj3iEhau.dll",#1
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -pss -s 468 -p 7136 -ip 7136
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7136 -s 352
There are 15 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://23.239.0.12/r
unknown
malicious
https://23.239.0.12/s
unknown
malicious
https://23.239.0.12/7
unknown
malicious
https://23.239.0.12/
23.239.0.12
malicious
https://23.239.0.12/S
unknown
malicious
https://23.239.0.12/G
unknown
malicious
https://dev.ditu.live.com/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
unknown
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
unknown
https://t0.tiles.ditu.live.com/tiles/gen
unknown
https://dev.virtualearth.net/REST/v1/Routes/Walking
unknown
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
unknown
https://dev.ditu.live.com/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
http://schemas.xmlsoap.org/ws/2004/09/enumera
unknown
http://www.bingmapsportal.comsv
unknown
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
unknown
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
unknown
https://dev.ditu.live.com/REST/v1/Transit/Stops/
unknown
https://dev.virtualearth.net/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
unknown
http://crl.ver)
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
unknown
https://www.tiktok.com/legal/report/feedback
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
unknown
https://%s.xboxlive.com
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://dev.virtualearth.net/mapcontrol/logging.ashx
unknown
https://support.hotspotshield.com/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.t
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
https://disneyplus.com/legal.
unknown
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
unknown
https://activity.windows.com
unknown
https://dev.ditu.live.com/REST/v1/Locations
unknown
http://help.disneyplus.com.
unknown
https://%s.dnet.xboxlive.com
unknown
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
There are 43 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
23.239.0.12
unknown
United States
malicious
127.0.0.1
unknown
unknown
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
MonthID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsPeFile
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
001840064172BCE4
There are 24 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
20F0000
direct allocation
page execute and read and write
malicious
14E0000
direct allocation
page execute and read and write
malicious
115AEE20000
direct allocation
page execute and read and write
malicious
230416A0000
direct allocation
page execute and read and write
malicious
3CC187E000
stack
page read and write
1C855C00000
heap
page read and write
1F2DC0D8000
heap
page read and write
1C7DC5F0000
trusted library allocation
page read and write
ADF817E000
stack
page read and write
1C7D6C3D000
heap
page read and write
1C856402000
trusted library allocation
page read and write
1C7D6C58000
heap
page read and write
1EF47D72000
heap
page read and write
1C7DC63E000
heap
page read and write
38518FE000
stack
page read and write
1EF47DD0000
heap
page read and write
205C1290000
heap
page read and write
865000
heap
page read and write
35B0000
heap
page read and write
205C1150000
heap
page read and write
133D000
heap
page read and write
1510000
heap
page readonly
1EF47D92000
heap
page read and write
1C7DC702000
heap
page read and write
FFD5BFF000
stack
page read and write
915AEFB000
stack
page read and write
1C7DC6F4000
heap
page read and write
1C855A10000
heap
page read and write
1EF47D4D000
heap
page read and write
1C855C64000
heap
page read and write
115AEC31000
heap
page read and write
FA4F5FE000
stack
page read and write
2303FC10000
heap
page read and write
1C7D7700000
heap
page read and write
1C855B80000
trusted library allocation
page read and write
2211AC13000
heap
page read and write
1C7DC6A1000
heap
page read and write
1C7D6D07000
heap
page read and write
1C7D6CA6000
heap
page read and write
1C855C13000
heap
page read and write
205C12F9000
heap
page read and write
205C130A000
heap
page read and write
1EF47D78000
heap
page read and write
1EF47DA6000
heap
page read and write
1C855A80000
heap
page read and write
347E000
stack
page read and write
1C7D7702000
heap
page read and write
297F963B000
heap
page read and write
8FDD37E000
stack
page read and write
1540000
heap
page read and write
21D4A102000
heap
page read and write
18002F000
direct allocation
page readonly
18002D000
direct allocation
page readonly
1EF47316000
heap
page read and write
21DA9370000
heap
page read and write
297F9686000
heap
page read and write
1C7D6D02000
heap
page read and write
2936265C000
heap
page read and write
2211ABD0000
remote allocation
page read and write
1EF47D78000
heap
page read and write
29362613000
heap
page read and write
205C1306000
heap
page read and write
2F20000
heap
page read and write
1EF47D7D000
heap
page read and write
115AEBD0000
heap
page read and write
2303FDFC000
heap
page read and write
244F1F00000
heap
page read and write
21DA93A1000
heap
page read and write
18002F000
direct allocation
page readonly
180000000
direct allocation
page read and write
FFD579E000
stack
page read and write
FFD5AF9000
stack
page read and write
1C7DC4F0000
remote allocation
page read and write
49551FD000
stack
page read and write
FA4FB7D000
stack
page read and write
1EF47D81000
heap
page read and write
21DA93F5000
heap
page read and write
1545000
heap
page read and write
297F9641000
heap
page read and write
7FFFEFB50000
unkown
page readonly
1C7DC4F0000
remote allocation
page read and write
1C7D81E3000
trusted library allocation
page read and write
13D4000
heap
page read and write
1C855C28000
heap
page read and write
3CC197A000
stack
page read and write
6191AC5000
stack
page read and write
244F1E00000
heap
page read and write
1C7D7713000
heap
page read and write
E87CFE000
stack
page read and write
1C855C61000
heap
page read and write
1C7D81E0000
trusted library allocation
page read and write
1EF47DA6000
heap
page read and write
297F963C000
heap
page read and write
1EF47D74000
heap
page read and write
2B25D318000
heap
page read and write
1C7DC3B4000
trusted library allocation
page read and write
29362E02000
trusted library allocation
page read and write
1EF4724F000
heap
page read and write
1F2DC0C1000
heap
page read and write
1C7DC620000
heap
page read and write
1EF472D7000
heap
page read and write
1F2DC070000
heap
page read and write
486277B000
stack
page read and write
21D4A000000
heap
page read and write
1EF47D78000
heap
page read and write
115AEC00000
heap
page read and write
1C7DC4A0000
trusted library allocation
page read and write
1C7DC700000
heap
page read and write
2936268D000
heap
page read and write
FA4F1BB000
stack
page read and write
1EF47D8B000
heap
page read and write
2211ABA0000
trusted library allocation
page read and write
74E3677000
stack
page read and write
7FFFEFBA9000
unkown
page readonly
43333FD000
stack
page read and write
1F2DC0D5000
heap
page read and write
297F9410000
heap
page read and write
297F9677000
heap
page read and write
1C7D6B80000
heap
page read and write
1C7DC5D0000
trusted library allocation
page read and write
2B25D23D000
heap
page read and write
23070513000
heap
page read and write
1EF47D82000
heap
page read and write
1EF47B40000
remote allocation
page read and write
1C7D6CAA000
heap
page read and write
205C12DB000
heap
page read and write
1C7D6B90000
heap
page read and write
7FFFEFBA6000
unkown
page read and write
205C1302000
heap
page read and write
1EF47302000
heap
page read and write
297F963A000
heap
page read and write
1C7D6D02000
heap
page read and write
297F9646000
heap
page read and write
1EF47D17000
heap
page read and write
1C7DC3C0000
trusted library allocation
page read and write
297F9632000
heap
page read and write
115AEE10000
direct allocation
page execute and read and write
1EF47D74000
heap
page read and write
297F9649000
heap
page read and write
2240000
heap
page read and write
230702D0000
heap
page read and write
AE40AF7000
stack
page read and write
21D4A03E000
heap
page read and write
FFD571B000
stack
page read and write
1EF47DA5000
heap
page read and write
1C855A20000
heap
page read and write
1EF47DA4000
heap
page read and write
1D5AB2AD000
heap
page read and write
205C1326000
heap
page read and write
1EF47DBC000
heap
page read and write
1C7D7759000
heap
page read and write
2303FDEF000
heap
page read and write
21DA93DD000
heap
page read and write
1EF47DA2000
heap
page read and write
1EF47D95000
heap
page read and write
29362667000
heap
page read and write
3E0000
heap
page read and write
7C5000
heap
page read and write
1C855C8A000
heap
page read and write
2B25EC70000
trusted library allocation
page read and write
21A4000
heap
page read and write
115B0990000
heap
page read and write
4332C7C000
stack
page read and write
1EF47D7B000
heap
page read and write
21D4A900000
heap
page read and write
FFD5B79000
stack
page read and write
1EF47D7D000
heap
page read and write
1C7D6C8B000
heap
page read and write
297F967D000
heap
page read and write
205C1302000
heap
page read and write
2D80000
heap
page read and write
1EF47D7A000
heap
page read and write
27A75A48000
heap
page read and write
1C7DC3C0000
trusted library allocation
page read and write
E87D7E000
stack
page read and write
1F2DC0D5000
heap
page read and write
1C7DC6EE000
heap
page read and write
244F1E02000
heap
page read and write
1C855D13000
heap
page read and write
1EF47DAC000
heap
page read and write
29362490000
heap
page read and write
1372000
heap
page read and write
1EF47213000
heap
page read and write
297F9665000
heap
page read and write
7FFFEFBA2000
unkown
page readonly
23070400000
heap
page read and write
3851A7F000
stack
page read and write
2B25D259000
heap
page read and write
8C7000
heap
page read and write
23041670000
heap
page read and write
13A0000
heap
page read and write
297F9702000
heap
page read and write
244F1E64000
heap
page read and write
7FFFEFBA6000
unkown
page read and write
244F2802000
trusted library allocation
page read and write
2303FDA8000
heap
page read and write
1C7D7602000
heap
page read and write
297F9613000
heap
page read and write
3CC167E000
stack
page read and write
21D49F20000
trusted library allocation
page read and write
FA4F97F000
stack
page read and write
13D2000
heap
page read and write
1C7D6CAF000
heap
page read and write
1EF47D74000
heap
page read and write
27A75A3C000
heap
page read and write
ADF837E000
stack
page read and write
2303FDEE000
heap
page read and write
27A75880000
heap
page read and write
2E8F000
stack
page read and write
7FFFEFBA6000
unkown
page read and write
244F1E28000
heap
page read and write
29362666000
heap
page read and write
1C855D08000
heap
page read and write
244F1F02000
heap
page read and write
23070413000
heap
page read and write
21D4A0B9000
heap
page read and write
297F9662000
heap
page read and write
2E10000
trusted library allocation
page read and write
486257E000
stack
page read and write
1EF47258000
heap
page read and write
2211AC26000
heap
page read and write
2211AB00000
heap
page read and write
2303FD70000
heap
page read and write
2B25ECB0000
trusted library allocation
page read and write
278F000
stack
page read and write
23070402000
heap
page read and write
1EF47DA5000
heap
page read and write
1C7DC3B0000
trusted library allocation
page read and write
205C12FF000
heap
page read and write
74E397E000
stack
page read and write
244F1D60000
heap
page read and write
29362713000
heap
page read and write
115AEE50000
heap
page readonly
244F1E57000
heap
page read and write
297F9680000
heap
page read and write
FA4FA7C000
stack
page read and write
2B25D274000
heap
page read and write
2211ABD0000
remote allocation
page read and write
1EF47D9C000
heap
page read and write
21DAA150000
trusted library allocation
page read and write
8C9000
heap
page read and write
1EF47180000
heap
page read and write
1C855C5A000
heap
page read and write
1EF472F8000
heap
page read and write
180000000
direct allocation
page read and write
297F9E02000
trusted library allocation
page read and write
1C7DC615000
heap
page read and write
205C12E8000
heap
page read and write
FFD5C79000
stack
page read and write
1EF47D94000
heap
page read and write
115B0804000
heap
page read and write
1C7DC460000
trusted library allocation
page read and write
1EF47D9B000
heap
page read and write
1EF47D78000
heap
page read and write
21DAA0E0000
trusted library allocation
page read and write
115AEDF0000
heap
page read and write
21D4A0CA000
heap
page read and write
1EF48200000
heap
page read and write
E0EE57F000
stack
page read and write
2307043F000
heap
page read and write
1C7DC39E000
trusted library allocation
page read and write
21DA93DB000
heap
page read and write
1EF47D86000
heap
page read and write
180000000
direct allocation
page read and write
A2E232A000
stack
page read and write
6191B4F000
stack
page read and write
3520000
remote allocation
page read and write
2303FDDF000
heap
page read and write
1EF47DB8000
heap
page read and write
FA4FD7C000
stack
page read and write
1C7DC3D0000
trusted library allocation
page read and write
297F9632000
heap
page read and write
1EF472B4000
heap
page read and write
21DA93DB000
heap
page read and write
84B000
heap
page read and write
1C7DC3B1000
trusted library allocation
page read and write
915A88B000
stack
page read and write
297F9671000
heap
page read and write
7FFFEFBA9000
unkown
page readonly
1EF47D82000
heap
page read and write
297F9642000
heap
page read and write
2B25D22A000
heap
page read and write
E0EE27F000
stack
page read and write
1EF47D8D000
heap
page read and write
27A75A50000
heap
page read and write
1C7DC390000
trusted library allocation
page read and write
23070477000
heap
page read and write
1F2DC0B8000
heap
page read and write
486247B000
stack
page read and write
297F9648000
heap
page read and write
AE40DFF000
stack
page read and write
2211AC3D000
heap
page read and write
12A0000
heap
page read and write
1F2DC0D5000
heap
page read and write
205C1302000
heap
page read and write
7FFFEFB50000
unkown
page readonly
8FDD77F000
stack
page read and write
2B25EE02000
trusted library allocation
page read and write
8A3000
heap
page read and write
2B25D1E0000
remote allocation
page read and write
1EF47D88000
heap
page read and write
29362651000
heap
page read and write
1EF472B7000
heap
page read and write
27A75A53000
heap
page read and write
1EF47D74000
heap
page read and write
18002F000
direct allocation
page readonly
8FDD2FE000
stack
page read and write
1EF47D88000
heap
page read and write
2211AC56000
heap
page read and write
2B25D302000
heap
page read and write
1EF472EC000
heap
page read and write
297F962E000
heap
page read and write
1EF47D92000
heap
page read and write
21DA9580000
trusted library allocation
page read and write
1EF47313000
heap
page read and write
21A0000
heap
page read and write
1275000
stack
page read and write
1EF47D8C000
heap
page read and write
1C7DC663000
heap
page read and write
1C855C02000
heap
page read and write
1EF47D8D000
heap
page read and write
297F964A000
heap
page read and write
6191F7E000
stack
page read and write
74E3E7A000
stack
page read and write
7FFFEFBA2000
unkown
page readonly
1C7DC6A3000
heap
page read and write
915ADFB000
stack
page read and write
2F0C000
stack
page read and write
2211AD02000
heap
page read and write
1C7DC460000
trusted library allocation
page read and write
43332FB000
stack
page read and write
1C855C52000
heap
page read and write
27A75A88000
heap
page read and write
1C855C7D000
heap
page read and write
21DA9390000
heap
page read and write
1EF47D83000
heap
page read and write
136F000
heap
page read and write
1C7D6CFD000
heap
page read and write
205C12D5000
heap
page read and write
48627FE000
stack
page read and write
2B25D28D000
heap
page read and write
E87C7F000
stack
page read and write
1EF472C3000
heap
page read and write
27A75B00000
heap
page read and write
1EF47DDC000
heap
page read and write
280B000
stack
page read and write
1C7DC4C0000
trusted library allocation
page read and write
18002E000
direct allocation
page read and write
1EF47DC4000
heap
page read and write
27A75B13000
heap
page read and write
1EF47D84000
heap
page read and write
2B25D249000
heap
page read and write
1280000
heap
page read and write
1EF47DBC000
heap
page read and write
32EC000
stack
page read and write
1EF47DC9000
heap
page read and write
1C7D7600000
heap
page read and write
1C7D6C91000
heap
page read and write
1EF47D86000
heap
page read and write
1C7DC398000
trusted library allocation
page read and write
244F1E79000
heap
page read and write
1C855C5C000
heap
page read and write
E186AFE000
stack
page read and write
23070330000
heap
page read and write
2B25D100000
heap
page read and write
297F966F000
heap
page read and write
1EF47D7A000
heap
page read and write
205C1310000
heap
page read and write
7FFFEFB51000
unkown
page execute read
33EE000
stack
page read and write
115AEC2B000
heap
page read and write
7FFFEFB51000
unkown
page execute read
27A76202000
trusted library allocation
page read and write
1C7DC64B000
heap
page read and write
205C12F6000
heap
page read and write
21DAA0D0000
trusted library allocation
page read and write
1C7DC4B0000
trusted library allocation
page read and write
13A3000
heap
page read and write
43334FE000
stack
page read and write
1EF4727D000
heap
page read and write
2B25D0F0000
heap
page read and write
297F967F000
heap
page read and write
1F2DC0A1000
heap
page read and write
14D0000
direct allocation
page execute and read and write
205C4960000
trusted library allocation
page read and write
244F1D50000
heap
page read and write
2211B602000
trusted library allocation
page read and write
1EF47249000
heap
page read and write
2936265A000
heap
page read and write
21DA9399000
heap
page read and write
1C7D81F0000
trusted library allocation
page read and write
1C7DC6A9000
heap
page read and write
21D4A013000
heap
page read and write
1F2DC0D2000
heap
page read and write
29362629000
heap
page read and write
2B25D25C000
heap
page read and write
115AEC08000
heap
page read and write
1EF47D7D000
heap
page read and write
297F9666000
heap
page read and write
1EF47D86000
heap
page read and write
7FFFEFB51000
unkown
page execute read
1D5AB2A0000
heap
page read and write
29362700000
heap
page read and write
27A75A71000
heap
page read and write
E8798F000
stack
page read and write
43336FE000
stack
page read and write
1F2DC09B000
heap
page read and write
1EF47D74000
heap
page read and write
3CC13DB000
stack
page read and write
1EF47A80000
trusted library allocation
page read and write
1EF47D8B000
heap
page read and write
E0EDCFB000
stack
page read and write
297F9663000
heap
page read and write
895000
heap
page read and write
2936268A000
heap
page read and write
48629FF000
stack
page read and write
1C7DC62E000
heap
page read and write
8FDD677000
stack
page read and write
1EF47286000
heap
page read and write
21DAA390000
trusted library allocation
page read and write
820000
heap
page read and write
27A759E0000
trusted library allocation
page read and write
1C7D6C55000
heap
page read and write
2120000
heap
page readonly
27A75A13000
heap
page read and write
18002E000
direct allocation
page read and write
1D5AB2B3000
heap
page read and write
1EF47D78000
heap
page read and write
29362600000
heap
page read and write
205C1303000
heap
page read and write
1EF47255000
heap
page read and write
1C7D6C00000
heap
page read and write
1C855C5E000
heap
page read and write
1EF47270000
heap
page read and write
21D4A02A000
heap
page read and write
29362656000
heap
page read and write
21D4A802000
heap
page read and write
1EF47B40000
remote allocation
page read and write
115AEC4E000
heap
page read and write
2F24000
heap
page read and write
1EF47D7E000
heap
page read and write
1C7D7615000
heap
page read and write
297F9676000
heap
page read and write
1C7DC6FC000
heap
page read and write
FA4F87F000
stack
page read and write
12E0000
heap
page read and write
AE40CFE000
stack
page read and write
915AFFF000
stack
page read and write
ADF7D1E000
stack
page read and write
297F9664000
heap
page read and write
115AEB40000
heap
page read and write
1F2DC0C1000
heap
page read and write
115B0800000
heap
page read and write
1C855D00000
heap
page read and write
29362662000
heap
page read and write
205C12D0000
heap
page read and write
385167E000
stack
page read and write
13D4000
heap
page read and write
2936263C000
heap
page read and write
8FDD57B000
stack
page read and write
297F9661000
heap
page read and write
3851B7D000
stack
page read and write
297F93B0000
heap
page read and write
1C7DC4D0000
trusted library allocation
page read and write
297F9629000
heap
page read and write
21DAA3C0000
trusted library allocation
page read and write
1EF47D8A000
heap
page read and write
1C7DC6F7000
heap
page read and write
1F2DC010000
heap
page read and write
297F966B000
heap
page read and write
7FFFEFBA2000
unkown
page readonly
2B25D1B0000
trusted library allocation
page read and write
1EF47DDC000
heap
page read and write
1EF47D9B000
heap
page read and write
7FFFEFBA2000
unkown
page readonly
21D4A06E000
heap
page read and write
297F9643000
heap
page read and write
27A75B08000
heap
page read and write
1D5AB270000
heap
page read and write
205C4613000
heap
page read and write
1F2DC2B5000
heap
page read and write
1EF47D00000
heap
page read and write
E0EE37E000
stack
page read and write
E0EE67F000
stack
page read and write
38512AB000
stack
page read and write
222E000
stack
page read and write
1EF47257000
heap
page read and write
48624FE000
stack
page read and write
2B25D202000
heap
page read and write
1F2DC0C1000
heap
page read and write
1EF472AD000
heap
page read and write
AE4097B000
stack
page read and write
48628F7000
stack
page read and write
1EF47308000
heap
page read and write
2B25D213000
heap
page read and write
1EF4723C000
heap
page read and write
7FFFEFBA6000
unkown
page read and write
6191FFB000
stack
page read and write
7FFFEFBA9000
unkown
page readonly
1C7D6BF0000
heap
page read and write
115AEF00000
heap
page read and write
1EF47D74000
heap
page read and write
27A75A56000
heap
page read and write
1EF47D9A000
heap
page read and write
1EF47224000
heap
page read and write
4862AFF000
stack
page read and write
297F963E000
heap
page read and write
205C4610000
heap
page read and write
1398000
heap
page read and write
230417A4000
heap
page read and write
18002E000
direct allocation
page read and write
8E1000
heap
page read and write
38519FD000
stack
page read and write
1C7DC6FA000
heap
page read and write
3520000
remote allocation
page read and write
1EF472A6000
heap
page read and write
27A75A7D000
heap
page read and write
21D49DC0000
heap
page read and write
2211AC02000
heap
page read and write
1EF47254000
heap
page read and write
21DA93DB000
heap
page read and write
3CC17FB000
stack
page read and write
AE406FE000
stack
page read and write
1372000
heap
page read and write
2936265D000
heap
page read and write
1EF4724A000
heap
page read and write
21D49DB0000
heap
page read and write
359F000
stack
page read and write
2B25D25C000
heap
page read and write
244F1F13000
heap
page read and write
1341000
heap
page read and write
21DA9560000
heap
page read and write
27A75B02000
heap
page read and write
1EF47DA6000
heap
page read and write
74E3A7B000
stack
page read and write
FE0000
remote allocation
page read and write
1EF47D7C000
heap
page read and write
29362DA0000
trusted library allocation
page read and write
1C7DC6AC000
heap
page read and write
1EF48202000
heap
page read and write
915B0FE000
stack
page read and write
74E3F7C000
stack
page read and write
1EF47DD2000
heap
page read and write
21DA9300000
heap
page read and write
1EF47D8A000
heap
page read and write
27A75A8F000
heap
page read and write
38517FE000
stack
page read and write
1EF47D83000
heap
page read and write
7C0000
heap
page read and write
13D4000
heap
page read and write
1EF47D95000
heap
page read and write
1F2DC0B3000
heap
page read and write
22CF000
stack
page read and write
2B25D24C000
heap
page read and write
433327D000
stack
page read and write
1C7DC656000
heap
page read and write
21DAA3A0000
heap
page readonly
1341000
heap
page read and write
1EF47D86000
heap
page read and write
1EF47D9F000
heap
page read and write
13D2000
heap
page read and write
18002D000
direct allocation
page readonly
1EF47DBA000
heap
page read and write
21DAA3B0000
trusted library allocation
page read and write
ADF7C9B000
stack
page read and write
1EF47D83000
heap
page read and write
130B000
heap
page read and write
1C7D7718000
heap
page read and write
21DA93D4000
heap
page read and write
1C7D6CA3000
heap
page read and write
1C7DC702000
heap
page read and write
1EF48202000
heap
page read and write
1EF47DAC000
heap
page read and write
1EF47DD2000
heap
page read and write
1EF47B40000
remote allocation
page read and write
1C7DC270000
trusted library allocation
page read and write
297F964F000
heap
page read and write
1EF47DAC000
heap
page read and write
2B25D1E0000
remote allocation
page read and write
1C7DC390000
trusted library allocation
page read and write
244F1E68000
heap
page read and write
E186A7B000
stack
page read and write
1EF47D1F000
heap
page read and write
1C7DC600000
heap
page read and write
E0EE47F000
stack
page read and write
8FDD27C000
stack
page read and write
6191E7E000
stack
page read and write
1C7DC280000
trusted library allocation
page read and write
AE409FE000
stack
page read and write
1EF47D88000
heap
page read and write
1F2DC0A6000
heap
page read and write
3CC1D78000
stack
page read and write
2303FC20000
heap
page read and write
1C7DC1F0000
trusted library allocation
page read and write
205C1302000
heap
page read and write
29362500000
heap
page read and write
1C7D6C74000
heap
page read and write
29362665000
heap
page read and write
1C7DC4F0000
trusted library allocation
page read and write
1C7DC3D4000
trusted library allocation
page read and write
297F93A0000
heap
page read and write
18002D000
direct allocation
page readonly
1EF48202000
heap
page read and write
1EF47DD0000
heap
page read and write
2211AC2A000
heap
page read and write
FA4FC7E000
stack
page read and write
1C7DC480000
trusted library allocation
page read and write
ADF827E000
stack
page read and write
27A75A4E000
heap
page read and write
2211AB70000
heap
page read and write
43330FE000
stack
page read and write
2303FC25000
heap
page read and write
21DAA410000
trusted library allocation
page read and write
6191EFF000
stack
page read and write
1F2DC0D5000
heap
page read and write
7D0000
heap
page read and write
1EF47D98000
heap
page read and write
E186B7D000
stack
page read and write
38516FF000
stack
page read and write
1C7D7718000
heap
page read and write
2B25D266000
heap
page read and write
297F9650000
heap
page read and write
270C000
stack
page read and write
205C12E0000
heap
page read and write
2303FD50000
heap
page read and write
115AEC4E000
heap
page read and write
694000
stack
page read and write
1EF47D97000
heap
page read and write
385177C000
stack
page read and write
2211ABD0000
remote allocation
page read and write
293624A0000
heap
page read and write
1C7D6C6F000
heap
page read and write
23041690000
direct allocation
page execute and read and write
1EF47DD0000
heap
page read and write
20E0000
direct allocation
page execute and read and write
23041910000
heap
page read and write
297F966D000
heap
page read and write
1F2DC260000
heap
page read and write
115AEBB0000
heap
page read and write
205C12B0000
heap
page read and write
8C4000
heap
page read and write
205C130B000
heap
page read and write
1C7D7759000
heap
page read and write
486267B000
stack
page read and write
1EF47D78000
heap
page read and write
2307045A000
heap
page read and write
1EF47D72000
heap
page read and write
244F1DF0000
trusted library allocation
page read and write
2303FDA0000
heap
page read and write
74E417E000
stack
page read and write
29362659000
heap
page read and write
27A75870000
heap
page read and write
8FDD87E000
stack
page read and write
18002E000
direct allocation
page read and write
1EF47D94000
heap
page read and write
1EF47D74000
heap
page read and write
23070360000
trusted library allocation
page read and write
1F2DC2B0000
heap
page read and write
1EF47D62000
heap
page read and write
1C7D6CFD000
heap
page read and write
180000000
direct allocation
page read and write
21D49E20000
heap
page read and write
E87886000
stack
page read and write
1F2DC0D9000
heap
page read and write
115AEC4E000
heap
page read and write
E0EDF7C000
stack
page read and write
230417A0000
heap
page read and write
1EF47DB3000
heap
page read and write
21D4A113000
heap
page read and write
3CC1B77000
stack
page read and write
2B25D300000
heap
page read and write
29362702000
heap
page read and write
74E347B000
stack
page read and write
23070E02000
trusted library allocation
page read and write
AE4087B000
stack
page read and write
1F2DC0A6000
heap
page read and write
2B25D1E0000
remote allocation
page read and write
1EF47D8B000
heap
page read and write
E0EE17D000
stack
page read and write
1EF47DA3000
heap
page read and write
FA4F77F000
stack
page read and write
A2E27FE000
stack
page read and write
297F9669000
heap
page read and write
A2E287C000
stack
page read and write
2307045A000
heap
page read and write
21DA93FF000
heap
page read and write
FFD5A7D000
stack
page read and write
1EF47DB5000
heap
page read and write
1EF47170000
heap
page read and write
E8790E000
stack
page read and write
297F962F000
heap
page read and write
297F9645000
heap
page read and write
18002F000
direct allocation
page readonly
2B25D190000
trusted library allocation
page read and write
1C7D6C13000
heap
page read and write
1EF47D19000
heap
page read and write
23070502000
heap
page read and write
1530000
trusted library allocation
page read and write
1F2DC0D3000
heap
page read and write
E0EDE7E000
stack
page read and write
2211AB10000
heap
page read and write
1EF4724D000
heap
page read and write
1398000
heap
page read and write
7FFFEFB50000
unkown
page readonly
1EF47D86000
heap
page read and write
7A0000
heap
page read and write
AE4077E000
stack
page read and write
1EF472E4000
heap
page read and write
297F9631000
heap
page read and write
268E000
stack
page read and write
2B25D313000
heap
page read and write
1EF47D7A000
heap
page read and write
27A75A4C000
heap
page read and write
3CC16FE000
stack
page read and write
1F2DC0B7000
heap
page read and write
F80000
heap
page read and write
23070429000
heap
page read and write
1D5AB200000
heap
page read and write
27A75A49000
heap
page read and write
21DA9315000
heap
page read and write
1EF4724E000
heap
page read and write
2307046B000
heap
page read and write
21D4A087000
heap
page read and write
1C7D6C29000
heap
page read and write
1EF47DB3000
heap
page read and write
3CC1C7E000
stack
page read and write
1C7DC4E0000
trusted library allocation
page read and write
205C12FD000
heap
page read and write
29362708000
heap
page read and write
43335FD000
stack
page read and write
2211AC5C000
heap
page read and write
297F9510000
trusted library allocation
page read and write
21DA9590000
trusted library allocation
page read and write
AE40BFE000
stack
page read and write
18002D000
direct allocation
page readonly
1C7D6C79000
heap
page read and write
A2E26FE000
stack
page read and write
21DA9319000
heap
page read and write
1EF47D78000
heap
page read and write
297F964C000
heap
page read and write
21DAA140000
trusted library allocation
page read and write
3CC1A78000
stack
page read and write
840000
heap
page read and write
13D2000
heap
page read and write
244F1DC0000
heap
page read and write
A2E2778000
stack
page read and write
1C7D6C9E000
heap
page read and write
34FF000
stack
page read and write
4332E7C000
stack
page read and write
1C7D7D40000
trusted library allocation
page read and write
4332FFF000
stack
page read and write
1F2DC0B5000
heap
page read and write
AE4067B000
stack
page read and write
3520000
remote allocation
page read and write
74E377C000
stack
page read and write
7FFFEFBA9000
unkown
page readonly
E0ED8BC000
stack
page read and write
244F1E13000
heap
page read and write
3CC1DFE000
unkown
page read and write
1C855C58000
heap
page read and write
2B25D24C000
heap
page read and write
205C12F9000
heap
page read and write
74E387A000
stack
page read and write
2936265F000
heap
page read and write
1C7DC6E8000
heap
page read and write
297F9647000
heap
page read and write
1EF47252000
heap
page read and write
21D4A932000
heap
page read and write
27A75A2A000
heap
page read and write
6191BCF000
stack
page read and write
2936260B000
heap
page read and write
1C7D7490000
trusted library allocation
page read and write
1C855D02000
heap
page read and write
1EF471E0000
heap
page read and write
230702C0000
heap
page read and write
1F2DC090000
heap
page read and write
433317C000
stack
page read and write
FE0000
remote allocation
page read and write
1300000
heap
page read and write
297F9600000
heap
page read and write
ADF847F000
stack
page read and write
A2E267E000
stack
page read and write
205C2DD0000
heap
page read and write
1C7DC200000
trusted library allocation
page read and write
244F1E3E000
heap
page read and write
2B25D200000
heap
page read and write
1C855C3C000
heap
page read and write
21DA9310000
heap
page read and write
2B25D160000
heap
page read and write
1EF47D99000
heap
page read and write
13A3000
heap
page read and write
2211AC5A000
heap
page read and write
2211AC00000
heap
page read and write
1C7D7704000
heap
page read and write
13A3000
heap
page read and write
7FFFEFB51000
unkown
page execute read
1EF47DD0000
heap
page read and write
ADF7D9E000
stack
page read and write
27A758E0000
heap
page read and write
1EF47200000
heap
page read and write
7FFFEFB50000
unkown
page readonly
1EF47D92000
heap
page read and write
A2E23AE000
stack
page read and write
29362658000
heap
page read and write
1EF47D78000
heap
page read and write
205C2F30000
heap
page read and write
1C7D6D16000
heap
page read and write
230416D0000
heap
page readonly
1EF472C8000
heap
page read and write
1EF4724B000
heap
page read and write
1C7DC460000
trusted library allocation
page read and write
1EF47C02000
heap
page read and write
115AEF05000
heap
page read and write
1C7DC4F0000
remote allocation
page read and write
27A75A00000
heap
page read and write
There are 809 hidden memdumps, click here to show them.