IOC Report
nZNmWqwnpr

loading gif

Files

File Path
Type
Category
Malicious
nZNmWqwnpr.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x0770f373, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_nZN_5c40899ed0f0541acc9ab16798f8d17fcf421773_56ac50ec_074e79e0\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_nZN_5c40899ed0f0541acc9ab16798f8d17fcf421773_56ac50ec_0d7e7db9\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER64B3.tmp.dmp
Mini DuMP crash report, 15 streams, Mon May 23 05:36:50 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER658D.tmp.dmp
Mini DuMP crash report, 15 streams, Mon May 23 05:36:51 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6996.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6A70.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6BC9.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6D02.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\nZNmWqwnpr.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,AddIn_FileTime
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,AddIn_SystemTime
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PDQmdReNwGSs\ZxyxzMoIe.dll"
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,DllRegisterServer
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7080 -s 336
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7088 -s 328
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://165.22.73.229/
unknown
malicious
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
http://crl.ver)
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://www.tiktok.com/legal/report/feedback
unknown
https://165.22.73.229:8080/tem
unknown
http://help.disneyplus.com.
unknown
https://support.hotspotshield.com/
unknown
https://165.22.73.229:8080/
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
https://disneyplus.com/legal.
unknown
There are 2 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
165.22.73.229
unknown
United States
malicious
192.168.2.1
unknown
unknown
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsPeFile
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018C005C62C4D85
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018C005C62C4D85
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100
There are 23 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
180001000
direct allocation
page execute read
malicious
1E59C5C0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
1E59C5C0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
13E99710000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
13E99710000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
12D0000
direct allocation
page execute and read and write
malicious
B70000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
13E99710000
direct allocation
page execute and read and write
malicious
1E59C5C0000
direct allocation
page execute and read and write
malicious
2823F820000
heap
page read and write
24A18051000
heap
page read and write
736527B000
stack
page read and write
C6B697E000
stack
page read and write
24A13770000
trusted library allocation
page read and write
2823BD90000
heap
page read and write
24A18000000
heap
page read and write
1E59C5B0000
direct allocation
page execute and read and write
22E15D5A000
heap
page read and write
2075E066000
heap
page read and write
2217F620000
heap
page read and write
1E59DE70000
heap
page read and write
1E59C460000
heap
page read and write
24A17EE0000
trusted library allocation
page read and write
2075EB98000
heap
page read and write
2217F68F000
heap
page read and write
24A18102000
heap
page read and write
2075EB83000
heap
page read and write
22E15D42000
heap
page read and write
7FFA53290000
unkown
page readonly
22E14000000
trusted library allocation
page read and write
265A87F000
stack
page read and write
24A17ED0000
trusted library allocation
page read and write
22E15D72000
heap
page read and write
1E82C457000
heap
page read and write
2075E102000
heap
page read and write
6EE32FF000
stack
page read and write
22E10D3E000
heap
page read and write
7FFA53291000
unkown
page execute read
24A13000000
heap
page read and write
1566F590000
heap
page read and write
1E82C428000
heap
page read and write
24A17EE0000
remote allocation
page read and write
C64427F000
stack
page read and write
1E59C610000
heap
page read and write
2075F000000
heap
page read and write
2217F68F000
heap
page read and write
31DB000
stack
page read and write
265A5BF000
stack
page read and write
1566F688000
heap
page read and write
24A180A3000
heap
page read and write
32DD000
stack
page read and write
1566F613000
heap
page read and write
73B0277000
stack
page read and write
22CE464B000
heap
page read and write
1811F63C000
heap
page read and write
24A1263F000
heap
page read and write
2DAF000
stack
page read and write
1811F708000
heap
page read and write
2217F600000
heap
page read and write
B8C689B000
stack
page read and write
2823BDC9000
heap
page read and write
2823BDD2000
heap
page read and write
13E99860000
remote allocation
page read and write
2823BD20000
heap
page read and write
E10000
heap
page read and write
2075EB16000
heap
page read and write
7FFA532B2000
unkown
page readonly
7FFA532B2000
unkown
page readonly
F53295B000
stack
page read and write
6EE33FF000
stack
page read and write
24A13118000
heap
page read and write
2823BDC9000
heap
page read and write
18002E000
direct allocation
page readonly
2075E064000
heap
page read and write
3A3D8FE000
stack
page read and write
2075E0C1000
heap
page read and write
2075DFA0000
trusted library allocation
page read and write
7FFA53290000
unkown
page readonly
2075EB96000
heap
page read and write
1E82CC02000
trusted library allocation
page read and write
2075E0AB000
heap
page read and write
1811F700000
heap
page read and write
1811F648000
heap
page read and write
2217F687000
heap
page read and write
22E15D59000
heap
page read and write
736577F000
stack
page read and write
D8325FE000
stack
page read and write
2217F8C0000
trusted library allocation
page read and write
22CE4613000
heap
page read and write
7FFA53290000
unkown
page readonly
4330FB000
stack
page read and write
22E10CE5000
heap
page read and write
24A18062000
heap
page read and write
22E10D28000
heap
page read and write
1811F613000
heap
page read and write
2075EB7A000
heap
page read and write
1566F661000
heap
page read and write
2075F002000
heap
page read and write
2075EB83000
heap
page read and write
2823EF13000
heap
page read and write
24A18100000
heap
page read and write
2217F8B9000
heap
page read and write
D83217E000
stack
page read and write
D8320FE000
stack
page read and write
29FC000
stack
page read and write
73AFE7C000
stack
page read and write
1566F702000
heap
page read and write
2075DF70000
heap
page read and write
24A1802F000
heap
page read and write
13E99700000
direct allocation
page execute and read and write
1E59C300000
unkown
page read and write
13E994C0000
heap
page read and write
24A17E70000
trusted library allocation
page read and write
6EE2E7E000
stack
page read and write
24A18088000
heap
page read and write
2075EB7D000
heap
page read and write
7FFA532BB000
unkown
page read and write
2217F8B0000
heap
page read and write
139C000
heap
page read and write
2075EB96000
heap
page read and write
2075F002000
heap
page read and write
24A180F1000
heap
page read and write
2075EBA5000
heap
page read and write
3A3D879000
stack
page read and write
24A17E50000
trusted library allocation
page read and write
2823EF10000
heap
page read and write
2075E059000
heap
page read and write
24A12714000
heap
page read and write
139C000
heap
page read and write
22E10D20000
heap
page read and write
22CE45F0000
trusted library allocation
page read and write
1E59C440000
heap
page read and write
2075EB87000
heap
page read and write
22E15D62000
heap
page read and write
2075E8D0000
remote allocation
page read and write
2075EB75000
heap
page read and write
13E9B150000
heap
page read and write
7FFA532BF000
unkown
page readonly
2075EB7D000
heap
page read and write
2075EB61000
heap
page read and write
2075EB76000
heap
page read and write
1566F700000
heap
page read and write
13E99875000
heap
page read and write
24A12692000
heap
page read and write
1811F64D000
heap
page read and write
1E82C500000
heap
page read and write
2075E05C000
heap
page read and write
265A53C000
stack
page read and write
2075EB1F000
heap
page read and write
22E10D66000
heap
page read and write
22E15D41000
heap
page read and write
13E99508000
heap
page read and write
24A180EE000
heap
page read and write
22CE464F000
heap
page read and write
D8326FA000
stack
page read and write
1390000
heap
page read and write
F60000
heap
page read and write
2075EB50000
heap
page read and write
24A126A8000
heap
page read and write
22E127D0000
heap
page read and write
2075EB83000
heap
page read and write
22E15D72000
heap
page read and write
2B0B000
stack
page read and write
2075E04C000
heap
page read and write
24A17EA0000
trusted library allocation
page read and write
1E59DE30000
heap
page read and write
22E10D42000
heap
page read and write
2075E0F7000
heap
page read and write
2823BD95000
heap
page read and write
13E994C0000
heap
page read and write
13E99450000
heap
page read and write
2823BDBE000
heap
page read and write
24A126FB000
heap
page read and write
2075E0DF000
heap
page read and write
2075E058000
heap
page read and write
7365CFC000
stack
page read and write
22E15B20000
heap
page read and write
1E59C4A8000
heap
page read and write
22CE44F0000
heap
page read and write
2075F002000
heap
page read and write
2217FE70000
trusted library allocation
page read and write
432E7F000
stack
page read and write
24A17E90000
trusted library allocation
page read and write
24A17C70000
trusted library allocation
page read and write
24A13159000
heap
page read and write
2075E021000
heap
page read and write
2075E05D000
heap
page read and write
22CE4E02000
trusted library allocation
page read and write
1566F633000
heap
page read and write
F80000
heap
page read and write
24A12E80000
trusted library allocation
page read and write
24A126FB000
heap
page read and write
2075E081000
heap
page read and write
BA0000
heap
page readonly
1E82C513000
heap
page read and write
1566FE90000
trusted library allocation
page read and write
18002E000
direct allocation
page readonly
24A17EE0000
remote allocation
page read and write
D83207C000
stack
page read and write
1E59C4A0000
heap
page read and write
2C90000
remote allocation
page read and write
2075F002000
heap
page read and write
1E59C5B0000
direct allocation
page execute and read and write
24A17EC0000
trusted library allocation
page read and write
13E994E0000
heap
page read and write
2075E0B4000
heap
page read and write
6EE2FFF000
stack
page read and write
1566F65E000
heap
page read and write
2075EB76000
heap
page read and write
24A17D80000
trusted library allocation
page read and write
1811F64C000
heap
page read and write
1566F652000
heap
page read and write
1390000
heap
page read and write
22E15D47000
heap
page read and write
2217F7A0000
trusted library allocation
page read and write
24A13158000
heap
page read and write
1E59C5F0000
heap
page readonly
15C5000
heap
page read and write
7FFA532BB000
unkown
page read and write
1811F3A0000
heap
page read and write
22E13FF3000
heap
page read and write
1E82C43C000
heap
page read and write
18002E000
direct allocation
page readonly
2075E013000
heap
page read and write
1341000
heap
page read and write
2823BBC0000
heap
page read and write
2075EB87000
heap
page read and write
13E994E0000
heap
page read and write
736597B000
stack
page read and write
7FFA532BB000
unkown
page read and write
2075E029000
heap
page read and write
24A12FF3000
trusted library allocation
page read and write
B40000
heap
page read and write
15C0000
heap
page read and write
2075EBB4000
heap
page read and write
13E99860000
remote allocation
page read and write
7FFA53291000
unkown
page execute read
2075EB94000
heap
page read and write
1590000
trusted library allocation
page read and write
7FFA532BB000
unkown
page read and write
24A18104000
heap
page read and write
2823BDB0000
heap
page read and write
1811F702000
heap
page read and write
18002E000
direct allocation
page readonly
13E99740000
heap
page readonly
F50000
remote allocation
page read and write
1E59C4A0000
heap
page read and write
24A12702000
heap
page read and write
1E59DE70000
heap
page read and write
1E59C460000
heap
page read and write
13E99740000
heap
page readonly
13E1000
heap
page read and write
2075E8D0000
remote allocation
page read and write
B8C691E000
stack
page read and write
1E59DE00000
remote allocation
page read and write
1811F600000
heap
page read and write
1E59C615000
heap
page read and write
1341000
heap
page read and write
325E000
stack
page read and write
24A12FF0000
trusted library allocation
page read and write
2075EB87000
heap
page read and write
73B047F000
stack
page read and write
2A8F000
stack
page read and write
24A18103000
heap
page read and write
C6B677B000
stack
page read and write
1E82C2B0000
heap
page read and write
2075F002000
heap
page read and write
99AB97E000
stack
page read and write
2217F7BA000
trusted library allocation
page read and write
7FFA532B2000
unkown
page readonly
D83277E000
unkown
page read and write
2823BDC6000
heap
page read and write
1566F663000
heap
page read and write
24A13102000
heap
page read and write
1811F67A000
heap
page read and write
2075E081000
heap
page read and write
24A17D88000
trusted library allocation
page read and write
1E59C440000
heap
page read and write
180000000
direct allocation
page read and write
D8323FE000
stack
page read and write
1E82C3B0000
trusted library allocation
page read and write
1370000
heap
page read and write
1E59C460000
heap
page read and write
24A17DA4000
trusted library allocation
page read and write
1566F600000
heap
page read and write
1E59C300000
heap
page read and write
2075EB94000
heap
page read and write
24A1269D000
heap
page read and write
1E59C615000
heap
page read and write
1E59DE30000
heap
page read and write
E15000
heap
page read and write
133A000
heap
page read and write
F50000
remote allocation
page read and write
1811F713000
heap
page read and write
7FFA53290000
unkown
page readonly
2075EBD7000
heap
page read and write
C644379000
stack
page read and write
BD5000
heap
page read and write
13C4000
heap
page read and write
1E59C5B0000
direct allocation
page execute and read and write
24A12675000
heap
page read and write
1811F629000
heap
page read and write
265A53C000
stack
page read and write
265A87F000
stack
page read and write
2823BDB9000
heap
page read and write
22E10CE0000
heap
page read and write
2217F860000
trusted library allocation
page read and write
2823BD00000
heap
page read and write
265A53C000
stack
page read and write
2217F870000
trusted library allocation
page read and write
1E59C4A8000
heap
page read and write
2075EBB0000
heap
page read and write
1E82C413000
heap
page read and write
22E10D39000
heap
page read and write
2823F020000
trusted library allocation
page read and write
24A180FA000
heap
page read and write
2075E000000
heap
page read and write
C64447C000
stack
page read and write
2075EB94000
heap
page read and write
1566F5F0000
heap
page read and write
7C5000
stack
page read and write
2823BDD2000
heap
page read and write
22CE4629000
heap
page read and write
2217F4D0000
trusted library allocation
page read and write
22CE468A000
heap
page read and write
C6443FE000
stack
page read and write
2075E0EA000
heap
page read and write
13E99870000
heap
page read and write
2075E0EB000
heap
page read and write
24A17EB0000
trusted library allocation
page read and write
13E9B150000
heap
page read and write
22E15D72000
heap
page read and write
2217F648000
heap
page read and write
22E10D5D000
heap
page read and write
AF0000
heap
page read and write
24A13BF0000
trusted library allocation
page read and write
1566F63C000
heap
page read and write
24A12670000
heap
page read and write
13E9B1A0000
heap
page read and write
265A5BF000
stack
page read and write
24A12580000
heap
page read and write
18002E000
direct allocation
page readonly
13E99508000
heap
page read and write
24A17BF0000
trusted library allocation
page read and write
1811F688000
heap
page read and write
22CE4651000
heap
page read and write
2075EBA2000
heap
page read and write
22E10D42000
heap
page read and write
3A3D67B000
stack
page read and write
1E59C5F0000
heap
page readonly
7FFA532BF000
unkown
page readonly
FE0000
heap
page readonly
13E99870000
heap
page read and write
99AB87C000
stack
page read and write
18002F000
direct allocation
page read and write
2075EB96000
heap
page read and write
24A12600000
heap
page read and write
24A18022000
heap
page read and write
22E10D4C000
heap
page read and write
2075EB81000
heap
page read and write
180000000
direct allocation
page read and write
2E10000
heap
page read and write
2075E054000
heap
page read and write
24A12689000
heap
page read and write
13E99450000
unkown
page read and write
22E10D36000
heap
page read and write
22CE4702000
heap
page read and write
13E9B1A0000
heap
page read and write
7FFA53291000
unkown
page execute read
2075E05E000
heap
page read and write
22CE4708000
heap
page read and write
6EE2B9E000
stack
page read and write
180030000
direct allocation
page readonly
736567B000
stack
page read and write
22E15D47000
heap
page read and write
3A3D9FC000
stack
page read and write
24A180A1000
heap
page read and write
2217F8B5000
heap
page read and write
1811F66F000
heap
page read and write
2075EB96000
heap
page read and write
7FFA53291000
unkown
page execute read
B60000
direct allocation
page execute and read and write
1E59C4A0000
heap
page read and write
1811F649000
heap
page read and write
6EE2F7B000
stack
page read and write
2075E05A000
heap
page read and write
22100550000
trusted library allocation
page read and write
22E10B40000
heap
page read and write
2823D850000
heap
page read and write
1E82C402000
heap
page read and write
2075E05F000
heap
page read and write
1566F708000
heap
page read and write
7365477000
stack
page read and write
24A17EE0000
remote allocation
page read and write
180000000
direct allocation
page read and write
297E000
stack
page read and write
24A17DC4000
trusted library allocation
page read and write
1E59C610000
heap
page read and write
1E82C240000
heap
page read and write
7FFA53290000
unkown
page readonly
1811F726000
heap
page read and write
24A13015000
heap
page read and write
2075E113000
heap
page read and write
2217F840000
trusted library allocation
page read and write
1CDFAA00000
heap
page read and write
2075E116000
heap
page read and write
24A17D8E000
trusted library allocation
page read and write
24A18210000
trusted library allocation
page read and write
180030000
direct allocation
page readonly
2075E108000
heap
page read and write
2075EB9E000
heap
page read and write
1E59DE00000
remote allocation
page read and write
736587B000
stack
page read and write
1811F647000
heap
page read and write
1300000
heap
page read and write
22CE4480000
heap
page read and write
24A12726000
heap
page read and write
4333FD000
stack
page read and write
1E82C477000
heap
page read and write
180030000
direct allocation
page readonly
1566F713000
heap
page read and write
22E10D3D000
heap
page read and write
2075DF00000
heap
page read and write
2823BDCD000
heap
page read and write
180030000
direct allocation
page readonly
2823BDD8000
heap
page read and write
15670002000
trusted library allocation
page read and write
265A5BF000
stack
page read and write
7FFA532BF000
unkown
page readonly
C6B667B000
stack
page read and write
180000000
direct allocation
page read and write
24A125E0000
heap
page read and write
2217F640000
heap
page read and write
13E99508000
heap
page read and write
13E99700000
direct allocation
page execute and read and write
1CDFAA13000
heap
page read and write
73B017B000
stack
page read and write
7FFA532BF000
unkown
page readonly
24A13002000
heap
page read and write
99AB8FF000
stack
page read and write
22E10C80000
heap
page read and write
13E9B150000
heap
page read and write
13E9B1A0000
heap
page read and write
D2F000
stack
page read and write
7FFA532B2000
unkown
page readonly
1E59C4A8000
heap
page read and write
2075E08A000
heap
page read and write
2075F002000
heap
page read and write
6EE2B1B000
stack
page read and write
2075EB94000
heap
page read and write
2075F002000
heap
page read and write
18002E000
direct allocation
page readonly
180000000
direct allocation
page read and write
2075E067000
heap
page read and write
2075EB7F000
heap
page read and write
18002F000
direct allocation
page read and write
1811FE02000
trusted library allocation
page read and write
24A12570000
heap
page read and write
C643F2A000
stack
page read and write
24A180B6000
heap
page read and write
7FFA532BF000
unkown
page readonly
BBB000
heap
page read and write
432BBB000
stack
page read and write
24A12702000
heap
page read and write
E70000
heap
page read and write
2075E03C000
heap
page read and write
24A13118000
heap
page read and write
2075EBA5000
heap
page read and write
2075EB73000
heap
page read and write
180030000
direct allocation
page readonly
C35000
heap
page read and write
24A18044000
heap
page read and write
2823BD9B000
heap
page read and write
1E82C250000
heap
page read and write
C12000
heap
page read and write
2C90000
remote allocation
page read and write
22E15D37000
heap
page read and write
13E99700000
direct allocation
page execute and read and write
1390000
heap
page read and write
180000000
direct allocation
page read and write
C6442FF000
stack
page read and write
2823BDDC000
heap
page read and write
2075EBD7000
heap
page read and write
2075EB94000
heap
page read and write
2075EB94000
heap
page read and write
1CDFA7F0000
heap
page read and write
24A180B4000
heap
page read and write
18002E000
direct allocation
page readonly
2217F790000
trusted library allocation
page read and write
2075EB96000
heap
page read and write
22E15D00000
heap
page read and write
1811F64B000
heap
page read and write
24A12679000
heap
page read and write
2075E062000
heap
page read and write
18002E000
direct allocation
page readonly
2075EBBF000
heap
page read and write
C643FAE000
stack
page read and write
13E2000
heap
page read and write
99AB97E000
stack
page read and write
D8324F7000
stack
page read and write
2217F650000
heap
page read and write
2075EB96000
heap
page read and write
503D30D000
stack
page read and write
3A3D979000
stack
page read and write
2C60000
trusted library allocation
page read and write
13E99500000
heap
page read and write
7FFA53291000
unkown
page execute read
C6B687B000
stack
page read and write
24A17DA0000
trusted library allocation
page read and write
2075EBB5000
heap
page read and write
2217F7B4000
trusted library allocation
page read and write
133D000
heap
page read and write
13E99500000
heap
page read and write
2075EBA2000
heap
page read and write
F532C7E000
stack
page read and write
7FFA53291000
unkown
page execute read
13E99870000
heap
page read and write
2075F020000
heap
page read and write
24A17DB0000
trusted library allocation
page read and write
22E10D48000
heap
page read and write
1E59DE70000
heap
page read and write
DAF000
stack
page read and write
1E82C502000
heap
page read and write
22E15D3E000
heap
page read and write
F2A000
stack
page read and write
73661FE000
stack
page read and write
22E13FF0000
heap
page read and write
22100556000
trusted library allocation
page read and write
24A180F6000
heap
page read and write
99AB87C000
stack
page read and write
2075EB00000
heap
page read and write
7FFA53290000
unkown
page readonly
2217F7B0000
trusted library allocation
page read and write
13E99450000
unkown
page read and write
22CE4602000
heap
page read and write
7FFA53290000
unkown
page readonly
22E14800000
heap
page read and write
24A17DA1000
trusted library allocation
page read and write
6EE31F7000
stack
page read and write
1E59C615000
heap
page read and write
13E99875000
heap
page read and write
2075EB94000
heap
page read and write
22E10CEB000
heap
page read and write
22CE4656000
heap
page read and write
24A17DC0000
trusted library allocation
page read and write
2217F800000
trusted library allocation
page read and write
2075EBA6000
heap
page read and write
B50000
heap
page read and write
73AFEFE000
stack
page read and write
1370000
heap
page read and write
D832878000
stack
page read and write
2075EB75000
heap
page read and write
99AB97E000
stack
page read and write
1370000
heap
page read and write
7FFA532BF000
unkown
page readonly
33DF000
stack
page read and write
2823BDE1000
heap
page read and write
22E15C50000
heap
page read and write
B8C699E000
stack
page read and write
2217F7B6000
trusted library allocation
page read and write
D832378000
stack
page read and write
2075EBB4000
heap
page read and write
7FFA532BB000
unkown
page read and write
24A126AE000
heap
page read and write
34DF000
stack
page read and write
FD0000
direct allocation
page execute and read and write
24A12657000
heap
page read and write
24A17E50000
trusted library allocation
page read and write
1CDFAA0D000
heap
page read and write
22CE463C000
heap
page read and write
432EFF000
stack
page read and write
22E15D62000
heap
page read and write
7FFA532BB000
unkown
page read and write
24A180FC000
heap
page read and write
2075DF10000
heap
page read and write
736557D000
stack
page read and write
3A3D7F9000
stack
page read and write
1CDFA930000
heap
page read and write
1566F580000
heap
page read and write
22E10D51000
heap
page read and write
2075EB96000
heap
page read and write
710000
heap
page read and write
1E59C5F0000
heap
page readonly
24A1269F000
heap
page read and write
24A18102000
heap
page read and write
22CE4600000
heap
page read and write
7FFA532B2000
unkown
page readonly
1E59DE30000
heap
page read and write
6EE30FB000
stack
page read and write
7FFA532BF000
unkown
page readonly
13E994E0000
heap
page read and write
1E59C300000
unkown
page read and write
1308000
heap
page read and write
7FFA532BF000
unkown
page readonly
22E10CA0000
heap
page read and write
180030000
direct allocation
page readonly
1811F390000
heap
page read and write
24A17D80000
trusted library allocation
page read and write
22E10D39000
heap
page read and write
22CE4490000
heap
page read and write
1E59C610000
heap
page read and write
2CA0000
heap
page read and write
345B000
stack
page read and write
13E994C0000
heap
page read and write
24A17DB0000
trusted library allocation
page read and write
99AB8FF000
stack
page read and write
22CE4700000
heap
page read and write
13E9950E000
heap
page read and write
2075E0E8000
heap
page read and write
2075E0AA000
heap
page read and write
22E15D05000
heap
page read and write
7FFA532B2000
unkown
page readonly
F5329DD000
stack
page read and write
22E15C70000
heap
page read and write
13E9950E000
heap
page read and write
2075EBA5000
heap
page read and write
13E99500000
heap
page read and write
AD0000
heap
page read and write
2C90000
remote allocation
page read and write
24A12629000
heap
page read and write
2075E0C7000
heap
page read and write
24A13104000
heap
page read and write
13E99740000
heap
page readonly
24A12613000
heap
page read and write
99AB8FF000
stack
page read and write
C6B611B000
stack
page read and write
22E10D65000
heap
page read and write
24A13661000
trusted library allocation
page read and write
C50000
heap
page read and write
34E0000
heap
page read and write
24A13680000
trusted library allocation
page read and write
24A17C60000
trusted library allocation
page read and write
22E10D4C000
heap
page read and write
24A13113000
heap
page read and write
1811F500000
trusted library allocation
page read and write
24A18102000
heap
page read and write
7FFA532BB000
unkown
page read and write
24A126AE000
heap
page read and write
2217F850000
heap
page readonly
7FFA532B2000
unkown
page readonly
24A17FD0000
trusted library allocation
page read and write
7365FFA000
stack
page read and write
1566F629000
heap
page read and write
2075E8D0000
remote allocation
page read and write
1566F660000
heap
page read and write
73B037E000
stack
page read and write
1811F400000
heap
page read and write
2823BDED000
heap
page read and write
7365EFA000
stack
page read and write
99AB87C000
stack
page read and write
1811F602000
heap
page read and write
24A18019000
heap
page read and write
24A1268B000
heap
page read and write
13E9950E000
heap
page read and write
1566F67D000
heap
page read and write
4332FF000
stack
page read and write
1E59C440000
heap
page read and write
2217F4C0000
heap
page read and write
4331F7000
stack
page read and write
1811F64F000
heap
page read and write
22CE4671000
heap
page read and write
7FFA53290000
unkown
page readonly
24A17E50000
trusted library allocation
page read and write
180000000
direct allocation
page read and write
13E99875000
heap
page read and write
22E15D30000
heap
page read and write
7FFA532B2000
unkown
page readonly
2075F002000
heap
page read and write
7FFA532BB000
unkown
page read and write
2823BDCE000
heap
page read and write
2217F68F000
heap
page read and write
24A1268D000
heap
page read and write
7FFA53291000
unkown
page execute read
180000000
direct allocation
page read and write
22CE4713000
heap
page read and write
13C4000
heap
page read and write
73AFF7E000
stack
page read and write
2217F7B2000
trusted library allocation
page read and write
265A87F000
stack
page read and write
1E82C400000
heap
page read and write
24A180FE000
heap
page read and write
7FFA53291000
unkown
page execute read
2075EA02000
heap
page read and write
2823BDDC000
heap
page read and write
24A13100000
heap
page read and write
22CE4680000
heap
page read and write
180030000
direct allocation
page readonly
BB0000
heap
page read and write
2075F003000
heap
page read and write
1566F65C000
heap
page read and write
24A12707000
heap
page read and write
180030000
direct allocation
page readonly
There are 689 hidden memdumps, click here to show them.