IOC Report
9818t9ks1s

loading gif

Files

File Path
Type
Category
Malicious
9818t9ks1s.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x31ef495f, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\9818t9ks1s.dll
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\9818t9ks1s.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\9818t9ks1s.dll,DllRegisterServer
malicious
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Bvqee\qeggfkimakwygr.che"
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\9818t9ks1s.dll,DllUnregisterServerr
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\9818t9ks1s.dll"
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\9818t9ks1s.dll",#1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://70.36.102.35/v
unknown
malicious
https://70.36.102.35/gVsYreJaRCTZGAqrRgMzhhpqBeNQdF
unknown
malicious
https://70.36.102.35/
unknown
malicious
https://70.36.102.35/gVsYreJaRCTZGAqrRgMzhhpqBeNQdT
unknown
malicious
https://70.36.102.35/gVsYreJaRCTZGAqrRgMzhhpqBeNQd
unknown
malicious
http://schemas.xmlsoap.org/ws/2004/
unknown
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
https://disneyplus.com/legal.
unknown
http://crl.ver)
unknown
https://www.tiktok.com/legal/report/feedback
unknown
http://schemas.dmtf.o
unknown
https://92.240.254.110:8080/gECMlLDhVoiKFtzKjjRUPjlZHZhhxfpHLqiKeXIlMdFcRqaPxeg
unknown
https://92.240.254.110/6.102.35/gVsYreJaRCTZGAqrRgMzhhpqBeNQd
unknown
https://92.240.254.110/
unknown
http://help.disneyplus.com.
unknown
http://schemas.xmlsoap.org/ws/2004/09/enumeratio
unknown
https://support.hotspotshield.com/
unknown
There are 10 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
217.182.25.250
unknown
France
malicious
151.106.112.196
unknown
Germany
malicious
79.172.212.216
unknown
Hungary
malicious
110.232.117.186
unknown
Australia
malicious
51.254.140.238
unknown
France
malicious
195.201.151.129
unknown
Germany
malicious
206.188.212.92
unknown
United States
malicious
45.118.115.99
unknown
Indonesia
malicious
209.126.98.206
unknown
United States
malicious
1.234.21.73
unknown
Korea Republic of
malicious
176.56.128.118
unknown
Switzerland
malicious
45.118.135.203
unknown
Japan
malicious
167.99.115.35
unknown
United States
malicious
185.8.212.130
unknown
Uzbekistan
malicious
197.242.150.244
unknown
South Africa
malicious
51.91.76.89
unknown
France
malicious
45.176.232.124
unknown
Colombia
malicious
178.79.147.66
unknown
United Kingdom
malicious
31.24.158.56
unknown
Spain
malicious
50.30.40.196
unknown
United States
malicious
164.68.99.3
unknown
Germany
malicious
189.126.111.200
unknown
Brazil
malicious
146.59.226.45
unknown
Norway
malicious
158.69.222.101
unknown
Canada
malicious
196.218.30.83
unknown
Egypt
malicious
159.65.88.10
unknown
United States
malicious
101.50.0.91
unknown
Indonesia
malicious
195.154.133.20
unknown
France
malicious
185.157.82.211
unknown
Poland
malicious
70.36.102.35
unknown
United States
malicious
103.43.46.182
unknown
Indonesia
malicious
212.237.17.99
unknown
Italy
malicious
212.24.98.99
unknown
Lithuania
malicious
138.185.72.26
unknown
Brazil
malicious
216.158.226.206
unknown
United States
malicious
103.75.201.2
unknown
Thailand
malicious
51.91.7.5
unknown
France
malicious
5.9.116.246
unknown
Germany
malicious
188.44.20.25
unknown
Macedonia
malicious
153.126.146.25
unknown
Japan
malicious
72.15.201.15
unknown
United States
malicious
209.250.246.206
unknown
European Union
malicious
82.165.152.127
unknown
Germany
malicious
107.182.225.142
unknown
United States
malicious
50.116.54.215
unknown
United States
malicious
46.55.222.11
unknown
Bulgaria
malicious
173.212.193.249
unknown
Germany
malicious
176.104.106.96
unknown
Serbia
malicious
192.99.251.50
unknown
Canada
malicious
45.142.114.231
unknown
Germany
malicious
1.234.2.232
unknown
Korea Republic of
malicious
203.114.109.124
unknown
Thailand
malicious
119.193.124.41
unknown
Korea Republic of
malicious
129.232.188.93
unknown
South Africa
malicious
159.8.59.82
unknown
United States
malicious
92.240.254.110
unknown
Slovakia (SLOVAK Republic)
malicious
192.168.2.1
unknown
unknown
127.0.0.1
unknown
unknown
There are 48 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100

Memdumps

Base Address
Regiontype
Protect
Malicious
49E1000
direct allocation
page execute read
malicious
49F1000
direct allocation
page execute read
malicious
49B0000
direct allocation
page execute and read and write
malicious
4290000
direct allocation
page execute and read and write
malicious
4C70000
direct allocation
page execute and read and write
malicious
42C1000
direct allocation
page execute read
malicious
4D71000
direct allocation
page execute read
malicious
3110000
direct allocation
page execute and read and write
malicious
2554B9AB000
heap
page read and write
3174000
heap
page read and write
2554AE29000
heap
page read and write
17A00FC0000
heap
page read and write
3174000
heap
page read and write
2554AE49000
heap
page read and write
1958088B000
heap
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
4E81000
heap
page read and write
2243AB13000
heap
page read and write
17A00FE0000
heap
page read and write
337E000
stack
page read and write
2243AA3D000
heap
page read and write
81E000
stack
page read and write
2554AE4B000
heap
page read and write
2554B97F000
heap
page read and write
3174000
heap
page read and write
195860FD000
heap
page read and write
C0E000
stack
page read and write
19586200000
trusted library allocation
page read and write
3174000
heap
page read and write
4CA0000
heap
page read and write
1D624970000
trusted library allocation
page read and write
2554B700000
remote allocation
page read and write
2554B9A5000
heap
page read and write
42EAD7F000
stack
page read and write
4E81000
heap
page read and write
D5837AC000
stack
page read and write
2BEE000
stack
page read and write
30C0000
trusted library allocation
page read and write
3219000
heap
page read and write
2554BE18000
heap
page read and write
2554AEEB000
heap
page read and write
19585EF0000
trusted library allocation
page read and write
2554B983000
heap
page read and write
2515F413000
heap
page read and write
533E000
stack
page read and write
4310000
heap
page read and write
3174000
heap
page read and write
2F0A000
heap
page read and write
2554AE4A000
heap
page read and write
DE518FF000
unkown
page read and write
2515F47F000
heap
page read and write
17A01066000
heap
page read and write
330E000
stack
page read and write
2554B973000
heap
page read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
3174000
heap
page read and write
2554B97D000
heap
page read and write
2243AA28000
heap
page read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
2554B992000
heap
page read and write
2515F43C000
heap
page read and write
31AE000
stack
page read and write
4E81000
heap
page read and write
2554B991000
heap
page read and write
4A90000
heap
page read and write
2F47000
heap
page read and write
3347000
heap
page read and write
1D6257D0000
trusted library allocation
page read and write
38B04FE000
stack
page read and write
42EAAFB000
stack
page read and write
3174000
heap
page read and write
19580892000
heap
page read and write
19580902000
heap
page read and write
516C000
stack
page read and write
1D624A79000
heap
page read and write
4E81000
heap
page read and write
2515F508000
heap
page read and write
3175000
heap
page read and write
4E8C000
trusted library allocation
page read and write
1EAC6045000
heap
page read and write
1EAC606F000
heap
page read and write
63C000
stack
page read and write
2515F400000
heap
page read and write
1D624A4D000
heap
page read and write
2C398850000
heap
page read and write
BB42FB000
stack
page read and write
17A01085000
heap
page read and write
3174000
heap
page read and write
1D624A46000
heap
page read and write
4E70000
heap
page read and write
4E81000
heap
page read and write
1EAC5EE0000
heap
page read and write
4A02000
direct allocation
page read and write
4E81000
heap
page read and write
2554AD40000
heap
page read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
3174000
heap
page read and write
1D624CE0000
trusted library allocation
page read and write
2C39887B000
heap
page read and write
2554B9A0000
heap
page read and write
19581104000
heap
page read and write
3174000
heap
page read and write
8AC000
heap
page read and write
2554B977000
heap
page read and write
DE512FF000
stack
page read and write
85811AC000
stack
page read and write
19586220000
remote allocation
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
B4F000
stack
page read and write
3338000
heap
page read and write
4D70000
direct allocation
page read and write
10001000
unkown
page execute read
1009A000
unkown
page readonly
2554B97E000
heap
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
1958083D000
heap
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
2554B700000
remote allocation
page read and write
485E000
stack
page read and write
2554B96E000
heap
page read and write
3174000
heap
page read and write
2CD0000
heap
page read and write
BB3AEB000
stack
page read and write
1EAC603C000
heap
page read and write
3174000
heap
page read and write
19585D20000
trusted library allocation
page read and write
7A0000
heap
page read and write
2554B98C000
heap
page read and write
50AE000
stack
page read and write
3174000
heap
page read and write
2C398908000
heap
page read and write
19580878000
heap
page read and write
2C398FC0000
trusted library allocation
page read and write
2554BE02000
heap
page read and write
19580826000
heap
page read and write
17A01335000
heap
page read and write
4A13000
direct allocation
page read and write
1D624A00000
heap
page read and write
3174000
heap
page read and write
2554B96E000
heap
page read and write
31F9000
heap
page read and write
1958609F000
heap
page read and write
3174000
heap
page read and write
4E81000
heap
page read and write
DE513FC000
stack
page read and write
3204000
heap
page read and write
2554B97E000
heap
page read and write
4E81000
heap
page read and write
B90000
heap
page read and write
2F71000
heap
page read and write
3174000
heap
page read and write
2C398813000
heap
page read and write
17A00F60000
heap
page read and write
195860F4000
heap
page read and write
4E81000
heap
page read and write
31F5000
heap
page read and write
4E81000
heap
page read and write
48AF000
stack
page read and write
3174000
heap
page read and write
2515F240000
heap
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
2554B9A5000
heap
page read and write
3174000
heap
page read and write
B50000
trusted library allocation
page read and write
2243AA6D000
heap
page read and write
2554AE47000
heap
page read and write
3174000
heap
page read and write
2DB0000
heap
page read and write
42EA87E000
stack
page read and write
3174000
heap
page read and write
2C3986B0000
heap
page read and write
2554B988000
heap
page read and write
4F80000
trusted library allocation
page read and write
38B03FB000
stack
page read and write
17A0106F000
heap
page read and write
4E81000
heap
page read and write
2554B98B000
heap
page read and write
10001000
unkown
page execute read
2554B9A2000
heap
page read and write
2554B9A5000
heap
page read and write
BB3EF7000
stack
page read and write
1EAC6000000
heap
page read and write
4E81000
heap
page read and write
10001000
unkown
page execute read
2A40000
heap
page read and write
42C0000
direct allocation
page read and write
3174000
heap
page read and write
4E81000
heap
page read and write
2C399002000
trusted library allocation
page read and write
2554B998000
heap
page read and write
3174000
heap
page read and write
2554B999000
heap
page read and write
2B70000
heap
page read and write
2554AEE8000
heap
page read and write
3175000
heap
page read and write
3174000
heap
page read and write
3338000
heap
page read and write
790000
trusted library allocation
page read and write
3174000
heap
page read and write
315A000
heap
page read and write
3174000
heap
page read and write
2CD5000
heap
page read and write
1958602D000
heap
page read and write
B00000
heap
page read and write
4E81000
heap
page read and write
19580720000
heap
page read and write
19580914000
heap
page read and write
3174000
heap
page read and write
2554BE02000
heap
page read and write
2554B987000
heap
page read and write
1D624C30000
trusted library allocation
page read and write
1D625A70000
trusted library allocation
page read and write
19581113000
heap
page read and write
17A01083000
heap
page read and write
2554B914000
heap
page read and write
2554B97F000
heap
page read and write
3150000
heap
page read and write
303C000
stack
page read and write
4E81000
heap
page read and write
10000000
unkown
page readonly
3174000
heap
page read and write
2554B97E000
heap
page read and write
42F0000
heap
page read and write
195860D7000
heap
page read and write
3204000
heap
page read and write
2554B989000
heap
page read and write
1EAC604E000
heap
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
2554B981000
heap
page read and write
4A12000
direct allocation
page read and write
19580907000
heap
page read and write
3174000
heap
page read and write
4E81000
heap
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
2AE8000
stack
page read and write
4EDD000
stack
page read and write
3174000
heap
page read and write
19580925000
heap
page read and write
D58407F000
stack
page read and write
195860F6000
heap
page read and write
85A000
heap
page read and write
2554B9A5000
heap
page read and write
4A70000
trusted library allocation
page read and write
2243AA23000
heap
page read and write
195808AF000
heap
page read and write
4E81000
heap
page read and write
2243AA56000
heap
page read and write
2515F45D000
heap
page read and write
1004B000
unkown
page read and write
4E81000
heap
page read and write
3174000
heap
page read and write
85816FF000
stack
page read and write
2C398902000
heap
page read and write
2554AE54000
heap
page read and write
19585F90000
trusted library allocation
page read and write
2554BE1A000
heap
page read and write
47AE000
stack
page read and write
3174000
heap
page read and write
4E81000
heap
page read and write
486E000
stack
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
3306000
heap
page read and write
2554B97B000
heap
page read and write
307F000
stack
page read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
2554B999000
heap
page read and write
3174000
heap
page read and write
30BE000
stack
page read and write
2C398800000
heap
page read and write
17A01062000
heap
page read and write
3174000
heap
page read and write
DE5187F000
stack
page read and write
19580876000
heap
page read and write
19586102000
heap
page read and write
2554B9A0000
heap
page read and write
2515FC02000
trusted library allocation
page read and write
4E81000
heap
page read and write
5540000
remote allocation
page read and write
2515F230000
heap
page read and write
BB3FFB000
stack
page read and write
3174000
heap
page read and write
3175000
heap
page read and write
89E000
heap
page read and write
19585FE0000
trusted library allocation
page read and write
31FD000
heap
page read and write
38AFEFC000
stack
page read and write
2515F451000
heap
page read and write
2554AEE3000
heap
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
1D625A20000
trusted library allocation
page read and write
2554B983000
heap
page read and write
2554B981000
heap
page read and write
2554B96E000
heap
page read and write
3210000
heap
page read and write
4A40000
heap
page read and write
567327F000
stack
page read and write
2243AB00000
heap
page read and write
2554B97D000
heap
page read and write
3174000
heap
page read and write
31F1000
heap
page read and write
2243AA02000
heap
page read and write
3174000
heap
page read and write
3440000
heap
page read and write
2554B9B3000
heap
page read and write
2554AEA8000
heap
page read and write
2554AE4E000
heap
page read and write
3174000
heap
page read and write
1D624A5A000
heap
page read and write
4E81000
heap
page read and write
3174000
heap
page read and write
BB497A000
stack
page read and write
C38000
stack
page read and write
32AA000
heap
page read and write
19581D20000
trusted library allocation
page read and write
4E81000
heap
page read and write
2554BE02000
heap
page read and write
17A01065000
heap
page read and write
3174000
heap
page read and write
17A0106F000
heap
page read and write
2554AE51000
heap
page read and write
2554B9AC000
heap
page read and write
1D6249D0000
heap
page read and write
3174000
heap
page read and write
AA06000
trusted library allocation
page read and write
2554AEB3000
heap
page read and write
2554AF16000
heap
page read and write
3174000
heap
page read and write
3175000
heap
page read and write
2554B986000
heap
page read and write
4E81000
heap
page read and write
2554B96E000
heap
page read and write
2554B96E000
heap
page read and write
2C398849000
heap
page read and write
2243AA13000
heap
page read and write
334B000
heap
page read and write
32E6000
heap
page read and write
3397000
heap
page read and write
6440000
heap
page read and write
32F9000
heap
page read and write
3174000
heap
page read and write
19585F00000
trusted library allocation
page read and write
111D000
stack
page read and write
850000
heap
page read and write
3174000
heap
page read and write
4E81000
heap
page read and write
19581002000
heap
page read and write
1958089F000
heap
page read and write
3174000
heap
page read and write
1D624A4F000
heap
page read and write
2554AE70000
heap
page read and write
DE5127F000
stack
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
4E81000
heap
page read and write
3B0000
heap
page read and write
504E000
stack
page read and write
19585EE4000
trusted library allocation
page read and write
2554B96E000
heap
page read and write
19585EC0000
trusted library allocation
page read and write
2C398855000
heap
page read and write
1D624BD0000
heap
page read and write
2515F460000
heap
page read and write
2554B9A2000
heap
page read and write
1004B000
unkown
page read and write
4CA3000
heap
page read and write
3174000
heap
page read and write
55E0000
trusted library allocation
page read and write
43E0000
heap
page read and write
4E81000
heap
page read and write
2515F500000
heap
page read and write
42EAC77000
stack
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
2554B979000
heap
page read and write
3174000
heap
page read and write
4F6F000
stack
page read and write
2554B987000
heap
page read and write
3347000
heap
page read and write
2554B9AA000
heap
page read and write
3080000
remote allocation
page read and write
2554AF08000
heap
page read and write
1D625A10000
trusted library allocation
page read and write
DE50FDB000
stack
page read and write
2554B9D3000
heap
page read and write
3174000
heap
page read and write
4E80000
heap
page read and write
2C39884D000
heap
page read and write
55DF000
stack
page read and write
4DA0000
trusted library allocation
page read and write
1EAC5F70000
trusted library allocation
page read and write
2243A9D0000
heap
page read and write
17A01080000
heap
page read and write
4E81000
heap
page read and write
19585F04000
trusted library allocation
page read and write
3174000
heap
page read and write
1EAC604B000
heap
page read and write
3201000
heap
page read and write
3175000
heap
page read and write
2554B96E000
heap
page read and write
4E81000
heap
page read and write
31F5000
heap
page read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
3174000
heap
page read and write
1958086E000
heap
page read and write
19580873000
heap
page read and write
4B00000
heap
page read and write
3174000
heap
page read and write
2C398885000
heap
page read and write
3174000
heap
page read and write
4860000
trusted library allocation
page read and write
2554B9BB000
heap
page read and write
3174000
heap
page read and write
2C398871000
heap
page read and write
3174000
heap
page read and write
2554B981000
heap
page read and write
2554B9A5000
heap
page read and write
19586220000
remote allocation
page read and write
4E81000
heap
page read and write
19580902000
heap
page read and write
3174000
heap
page read and write
2554AD30000
heap
page read and write
4E81000
heap
page read and write
3174000
heap
page read and write
17A01064000
heap
page read and write
1D624CC0000
trusted library allocation
page read and write
2515F424000
heap
page read and write
2C398847000
heap
page read and write
2554B97E000
heap
page read and write
1EAC6108000
heap
page read and write
195860FD000
heap
page read and write
43F1000
trusted library allocation
page read and write
3207000
heap
page read and write
4E81000
heap
page read and write
2554B91D000
heap
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
2515F47F000
heap
page read and write
10051000
unkown
page readonly
2554AE4D000
heap
page read and write
31F9000
heap
page read and write
3174000
heap
page read and write
2554B99A000
heap
page read and write
4E81000
heap
page read and write
195860EF000
heap
page read and write
2243AB02000
heap
page read and write
D583BFB000
stack
page read and write
2554BE00000
heap
page read and write
4E81000
heap
page read and write
2554AED6000
heap
page read and write
2C39883C000
heap
page read and write
3174000
heap
page read and write
2554B97E000
heap
page read and write
195860E9000
heap
page read and write
47EE000
stack
page read and write
3338000
heap
page read and write
19586310000
trusted library allocation
page read and write
8A1000
heap
page read and write
4E81000
heap
page read and write
2554B96E000
heap
page read and write
2554B9A5000
heap
page read and write
2554BE02000
heap
page read and write
10001000
unkown
page execute read
4E81000
heap
page read and write
3174000
heap
page read and write
2554B992000
heap
page read and write
3219000
heap
page read and write
18CF279000
stack
page read and write
5672BDE000
stack
page read and write
1EAC607D000
heap
page read and write
2554BE21000
heap
page read and write
3174000
heap
page read and write
2554B9BB000
heap
page read and write
3174000
heap
page read and write
4E81000
heap
page read and write
4C00000
heap
page read and write
2554AEBE000
heap
page read and write
50EF000
stack
page read and write
3120000
heap
page read and write
4E81000
heap
page read and write
2554B900000
heap
page read and write
2554B9A5000
heap
page read and write
3174000
heap
page read and write
2554AE13000
heap
page read and write
3174000
heap
page read and write
4E81000
heap
page read and write
3174000
heap
page read and write
3338000
heap
page read and write
4E81000
heap
page read and write
1D624A07000
heap
page read and write
1EAC6100000
heap
page read and write
19586020000
trusted library allocation
page read and write
2243AA00000
heap
page read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
2554B97D000
heap
page read and write
3174000
heap
page read and write
2554B9A5000
heap
page read and write
2243A960000
heap
page read and write
2AAC000
stack
page read and write
31FD000
heap
page read and write
F60000
heap
page read and write
331E000
heap
page read and write
3174000
heap
page read and write
2C39889B000
heap
page read and write
4E9C000
stack
page read and write
3210000
heap
page read and write
4D92000
direct allocation
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
5270000
trusted library allocation
page read and write
BB40FA000
stack
page read and write
3174000
heap
page read and write
32F9000
heap
page read and write
3306000
heap
page read and write
4E81000
heap
page read and write
19586350000
trusted library allocation
page read and write
32F9000
heap
page read and write
5672F7B000
stack
page read and write
2554B99A000
heap
page read and write
1958082A000
heap
page read and write
50F0000
trusted library allocation
page read and write
BB41FE000
stack
page read and write
4E81000
heap
page read and write
3174000
heap
page read and write
1D624C40000
trusted library allocation
page read and write
1EAC5ED0000
heap
page read and write
19585EE0000
trusted library allocation
page read and write
1958604C000
heap
page read and write
567337F000
stack
page read and write
1EAC6102000
heap
page read and write
2554B9A5000
heap
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
2554B991000
heap
page read and write
2554B96E000
heap
page read and write
2DEB000
stack
page read and write
4E81000
heap
page read and write
31FD000
heap
page read and write
10051000
unkown
page readonly
1958608B000
heap
page read and write
2554B981000
heap
page read and write
3174000
heap
page read and write
DE51677000
stack
page read and write
339A000
heap
page read and write
10051000
unkown
page readonly
19581118000
heap
page read and write
3174000
heap
page read and write
42EAF7E000
stack
page read and write
3193000
heap
page read and write
2554AEC5000
heap
page read and write
BB47FF000
stack
page read and write
2515F2A0000
heap
page read and write
32A0000
heap
page read and write
3306000
heap
page read and write
2554B991000
heap
page read and write
1004B000
unkown
page read and write
19580800000
heap
page read and write
2C398829000
heap
page read and write
3174000
heap
page read and write
19580813000
heap
page read and write
4E81000
heap
page read and write
2554B9B1000
heap
page read and write
4E81000
heap
page read and write
543E000
stack
page read and write
2554B9B7000
heap
page read and write
19585ECE000
trusted library allocation
page read and write
1D624CD5000
heap
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
D583E77000
stack
page read and write
2554B973000
heap
page read and write
10000000
unkown
page readonly
3174000
heap
page read and write
4FAD000
stack
page read and write
31B8000
heap
page read and write
3214000
heap
page read and write
3174000
heap
page read and write
5672E7F000
stack
page read and write
2554B973000
heap
page read and write
2554B981000
heap
page read and write
1003C000
unkown
page readonly
2554B973000
heap
page read and write
2515F481000
heap
page read and write
3174000
heap
page read and write
2554B988000
heap
page read and write
2554AEA9000
heap
page read and write
2554B991000
heap
page read and write
2554B987000
heap
page read and write
19586000000
heap
page read and write
2554B999000
heap
page read and write
2515F3A0000
trusted library allocation
page read and write
547F000
stack
page read and write
2554B96E000
heap
page read and write
4F8E000
stack
page read and write
1003C000
unkown
page readonly
17A01081000
heap
page read and write
3347000
heap
page read and write
3174000
heap
page read and write
2B90000
heap
page read and write
4E81000
heap
page read and write
18CF2FF000
stack
page read and write
2C39884B000
heap
page read and write
3174000
heap
page read and write
31D0000
heap
page read and write
4F2E000
stack
page read and write
19586010000
trusted library allocation
page read and write
18CF0FF000
stack
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
2554B700000
remote allocation
page read and write
2554B994000
heap
page read and write
2243AA63000
heap
page read and write
3338000
heap
page read and write
19586062000
heap
page read and write
331E000
heap
page read and write
4A40000
heap
page read and write
3174000
heap
page read and write
19585FB0000
trusted library allocation
page read and write
3290000
trusted library allocation
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
648F000
stack
page read and write
6444000
heap
page read and write
3174000
heap
page read and write
303E000
stack
page read and write
3347000
heap
page read and write
54CE000
stack
page read and write
42EA8FE000
stack
page read and write
8581679000
stack
page read and write
1D624A4D000
heap
page read and write
3174000
heap
page read and write
1EAC6029000
heap
page read and write
4E81000
heap
page read and write
2C398913000
heap
page read and write
2C398900000
heap
page read and write
4E81000
heap
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
7A5000
heap
page read and write
D583D7E000
stack
page read and write
3174000
heap
page read and write
4E81000
heap
page read and write
33A0000
trusted library allocation
page read and write
3174000
heap
page read and write
3210000
heap
page read and write
2554ADD0000
trusted library allocation
page read and write
4E81000
heap
page read and write
2554AEEB000
heap
page read and write
19585EE1000
trusted library allocation
page read and write
2554B98F000
heap
page read and write
A34F000
trusted library allocation
page read and write
3174000
heap
page read and write
4E81000
heap
page read and write
3347000
heap
page read and write
2554B9A4000
heap
page read and write
19586220000
remote allocation
page read and write
2515F464000
heap
page read and write
3174000
heap
page read and write
2515F513000
heap
page read and write
3174000
heap
page read and write
1160000
trusted library allocation
page read and write
67A000
stack
page read and write
49E0000
direct allocation
page read and write
2554B985000
heap
page read and write
3174000
heap
page read and write
2554B98F000
heap
page read and write
2F87000
heap
page read and write
195808FC000
heap
page read and write
565F000
trusted library allocation
page read and write
4E81000
heap
page read and write
10000000
unkown
page readonly
1D624A4D000
heap
page read and write
3174000
heap
page read and write
1D624CA0000
trusted library allocation
page read and write
17A01056000
heap
page read and write
19585F90000
trusted library allocation
page read and write
2554B981000
heap
page read and write
2554B961000
heap
page read and write
BFC000
stack
page read and write
ADEA000
trusted library allocation
page read and write
2554AE3C000
heap
page read and write
52FC000
stack
page read and write
3174000
heap
page read and write
2554B9A0000
heap
page read and write
17A01056000
heap
page read and write
3174000
heap
page read and write
19585DA0000
trusted library allocation
page read and write
2554B971000
heap
page read and write
2554BE18000
heap
page read and write
3174000
heap
page read and write
4E81000
heap
page read and write
1003C000
unkown
page readonly
32F9000
heap
page read and write
4D93000
direct allocation
page read and write
3174000
heap
page read and write
1EAC6050000
heap
page read and write
3174000
heap
page read and write
2554B9A6000
heap
page read and write
4E81000
heap
page read and write
2554AE00000
heap
page read and write
1EAC6055000
heap
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
D583A7D000
stack
page read and write
38B05FB000
stack
page read and write
2554B9A5000
heap
page read and write
2554B98B000
heap
page read and write
38B06FE000
stack
page read and write
4E81000
heap
page read and write
5540000
remote allocation
page read and write
17A01330000
heap
page read and write
4E1F000
stack
page read and write
10051000
unkown
page readonly
3174000
heap
page read and write
3174000
heap
page read and write
4A60000
heap
page read and write
2F66000
heap
page read and write
10000000
unkown
page readonly
19585FD0000
trusted library allocation
page read and write
4E81000
heap
page read and write
3174000
heap
page read and write
1EAC6A02000
trusted library allocation
page read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
512D000
stack
page read and write
42E2000
direct allocation
page read and write
2B50000
trusted library allocation
page read and write
19581100000
heap
page read and write
1EAC6013000
heap
page read and write
31FA000
heap
page read and write
2554B981000
heap
page read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
C4F000
stack
page read and write
195860FA000
heap
page read and write
2554AF13000
heap
page read and write
3174000
heap
page read and write
2C3986C0000
heap
page read and write
476E000
stack
page read and write
42EAE7C000
stack
page read and write
2554B998000
heap
page read and write
3174000
heap
page read and write
2554BE02000
heap
page read and write
1D624CD9000
heap
page read and write
6490000
trusted library allocation
page read and write
4E81000
heap
page read and write
1EAC6113000
heap
page read and write
42E3000
direct allocation
page read and write
2554B9BD000
heap
page read and write
1540000
heap
page read and write
19587000000
heap
page read and write
2554B998000
heap
page read and write
4E81000
heap
page read and write
3174000
heap
page read and write
19585D30000
trusted library allocation
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
4E81000
heap
page read and write
4E5F000
stack
page read and write
85815FE000
stack
page read and write
1EAC6002000
heap
page read and write
4E81000
heap
page read and write
1EAC608A000
heap
page read and write
2554B9B3000
heap
page read and write
3174000
heap
page read and write
19586100000
heap
page read and write
19585DB0000
trusted library allocation
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
17A01051000
heap
page read and write
550B000
stack
page read and write
2554B999000
heap
page read and write
19585FF0000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page read and write
3174000
heap
page read and write
2554B950000
heap
page read and write
19581D10000
trusted library allocation
page read and write
4E81000
heap
page read and write
3174000
heap
page read and write
2554B9A2000
heap
page read and write
47DE000
stack
page read and write
3174000
heap
page read and write
2B97000
heap
page read and write
2554B981000
heap
page read and write
3174000
heap
page read and write
4E81000
heap
page read and write
3338000
heap
page read and write
42EAB7F000
stack
page read and write
2554B9A6000
heap
page read and write
3174000
heap
page read and write
42EA5CB000
stack
page read and write
2243A970000
heap
page read and write
3174000
heap
page read and write
2554AF02000
heap
page read and write
2243B270000
trusted library allocation
page read and write
4E81000
heap
page read and write
FCD000
stack
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
559E000
stack
page read and write
42EA9FC000
stack
page read and write
3174000
heap
page read and write
2554B974000
heap
page read and write
2DE0000
heap
page read and write
17A01040000
heap
page read and write
19586102000
heap
page read and write
2554B9CF000
heap
page read and write
2554B982000
heap
page read and write
2554B993000
heap
page read and write
2554B9AC000
heap
page read and write
3174000
heap
page read and write
1009A000
unkown
page readonly
4B1A000
trusted library allocation
page read and write
4E5D000
stack
page read and write
4E81000
heap
page read and write
3174000
heap
page read and write
195806C0000
heap
page read and write
4E81000
heap
page read and write
3306000
heap
page read and write
2554B981000
heap
page read and write
3174000
heap
page read and write
3447000
heap
page read and write
195808FC000
heap
page read and write
2515F502000
heap
page read and write
3174000
heap
page read and write
2515F48B000
heap
page read and write
3352000
heap
page read and write
2554B98B000
heap
page read and write
3174000
heap
page read and write
2554B993000
heap
page read and write
3174000
heap
page read and write
18CF1F8000
stack
page read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
2554BE02000
heap
page read and write
14E0000
heap
page read and write
195808A5000
heap
page read and write
5600000
trusted library allocation
page read and write
3174000
heap
page read and write
19580FC0000
trusted library allocation
page read and write
4E1D000
stack
page read and write
3174000
heap
page read and write
AA78000
trusted library allocation
page read and write
2515F467000
heap
page read and write
2554BE1A000
heap
page read and write
2554BE21000
heap
page read and write
17A0106F000
heap
page read and write
19580856000
heap
page read and write
19581015000
heap
page read and write
3174000
heap
page read and write
19585EF0000
trusted library allocation
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
2554B802000
heap
page read and write
DE51778000
stack
page read and write
2554B991000
heap
page read and write
2554B981000
heap
page read and write
4E81000
heap
page read and write
48E0000
heap
page read and write
19586020000
heap
page read and write
2554B985000
heap
page read and write
2515F463000
heap
page read and write
4A03000
direct allocation
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
2554BE44000
heap
page read and write
3174000
heap
page read and write
2554B9A5000
heap
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
4E81000
heap
page read and write
5540000
heap
page read and write
2554B97D000
heap
page read and write
2554B989000
heap
page read and write
18CF17E000
stack
page read and write
2554B981000
heap
page read and write
2CC0000
trusted library allocation
page read and write
830000
heap
page read and write
30FF000
stack
page read and write
1D624960000
heap
page read and write
3174000
heap
page read and write
500E000
stack
page read and write
2554AE89000
heap
page read and write
18CF07A000
stack
page read and write
2554B97E000
heap
page read and write
4E81000
heap
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
2554B977000
heap
page read and write
4E81000
heap
page read and write
2554BE02000
heap
page read and write
2C398720000
heap
page read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
D583AFE000
stack
page read and write
537F000
stack
page read and write
4E81000
heap
page read and write
31C0000
heap
page read and write
1D624CD0000
heap
page read and write
4E81000
heap
page read and write
4E81000
heap
page read and write
2554B973000
heap
page read and write
4E81000
heap
page read and write
893000
heap
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
3175000
heap
page read and write
3174000
heap
page read and write
195806B0000
heap
page read and write
3174000
heap
page read and write
2B75000
heap
page read and write
3174000
heap
page read and write
D583CFB000
stack
page read and write
8581779000
stack
page read and write
195860F8000
heap
page read and write
3174000
heap
page read and write
2554B98B000
heap
page read and write
2554AEF9000
heap
page read and write
5673177000
stack
page read and write
482E000
stack
page read and write
154B000
heap
page read and write
1009A000
unkown
page readonly
D58417E000
stack
page read and write
31FE000
heap
page read and write
2554B980000
heap
page read and write
4E81000
heap
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
3352000
heap
page read and write
4E81000
heap
page read and write
3174000
heap
page read and write
2243B402000
trusted library allocation
page read and write
19581102000
heap
page read and write
3174000
heap
page read and write
3390000
heap
page read and write
3175000
heap
page read and write
2554B96E000
heap
page read and write
DE5147E000
stack
page read and write
3174000
heap
page read and write
4E81000
heap
page read and write
2554ADA0000
heap
page read and write
5672B5B000
stack
page read and write
1D624A11000
heap
page read and write
2FA2000
heap
page read and write
4C30000
trusted library allocation
page read and write
2554B9C6000
heap
page read and write
4E81000
heap
page read and write
49F0000
direct allocation
page read and write
4FEC000
stack
page read and write
2554B97D000
heap
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
2554B97D000
heap
page read and write
3174000
heap
page read and write
1004B000
unkown
page read and write
19585EC0000
trusted library allocation
page read and write
307B000
stack
page read and write
31DA000
heap
page read and write
3080000
remote allocation
page read and write
3174000
heap
page read and write
4FCE000
stack
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
31FD000
heap
page read and write
2554BE02000
heap
page read and write
3080000
remote allocation
page read and write
567307B000
stack
page read and write
2554B97E000
heap
page read and write
19586090000
heap
page read and write
BB4B7F000
stack
page read and write
2554AE53000
heap
page read and write
3174000
heap
page read and write
1958605F000
heap
page read and write
4E81000
heap
page read and write
2DAA000
stack
page read and write
2554B96E000
heap
page read and write
1D625A00000
heap
page readonly
1009A000
unkown
page readonly
2D40000
heap
page read and write
3174000
heap
page read and write
2554B9AA000
heap
page read and write
4E81000
heap
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
3170000
heap
page read and write
3174000
heap
page read and write
4E81000
heap
page read and write
2554B985000
heap
page read and write
4E81000
heap
page read and write
5540000
remote allocation
page read and write
BB467C000
stack
page read and write
3174000
heap
page read and write
19581000000
heap
page read and write
48E3000
heap
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
19585F90000
trusted library allocation
page read and write
19581870000
trusted library allocation
page read and write
2554B973000
heap
page read and write
DE519F8000
stack
page read and write
1958603F000
heap
page read and write
2554B981000
heap
page read and write
1D624A4D000
heap
page read and write
2554B98B000
heap
page read and write
2554AE56000
heap
page read and write
3130000
trusted library allocation
page read and write
D583F7C000
stack
page read and write
4E81000
heap
page read and write
3380000
trusted library allocation
page read and write
2554B9A5000
heap
page read and write
4E81000
heap
page read and write
31F9000
heap
page read and write
2554B990000
heap
page read and write
19581D13000
trusted library allocation
page read and write
331E000
heap
page read and write
4DDE000
stack
page read and write
331E000
heap
page read and write
4AA8000
trusted library allocation
page read and write
1EAC5F40000
heap
page read and write
2554B9A5000
heap
page read and write
2F00000
heap
page read and write
2554B985000
heap
page read and write
2554B97E000
heap
page read and write
DE51577000
stack
page read and write
3174000
heap
page read and write
2554B9BD000
heap
page read and write
18CF37C000
stack
page read and write
19585EC8000
trusted library allocation
page read and write
195860E7000
heap
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
2554B981000
heap
page read and write
2554B998000
heap
page read and write
481E000
stack
page read and write
2554AE48000
heap
page read and write
19581118000
heap
page read and write
1003C000
unkown
page readonly
There are 1048 hidden memdumps, click here to show them.