IOC Report
uVPWqAOMKn

loading gif

Files

File Path
Type
Category
Malicious
uVPWqAOMKn.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage user DataBase, version 0x620, checksum 0xe72d5b73, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 61712 bytes, 1 file
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\uVPWqAOMKn.dll"
malicious
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\uVPWqAOMKn.dll
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\uVPWqAOMKn.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\uVPWqAOMKn.dll,DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\uVPWqAOMKn.dll,DllUnregisterServerrrrrrrrrrr
malicious
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Elutq\fjqpvuhrz.fqb"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\uVPWqAOMKn.dll",#1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://189.232.46.161/
unknown
malicious
https://189.232.46.161/oDKcMsHRRxcdTZdqBLENpsfwBpdNwUtCDsdjXOHPdhyxmepd
unknown
malicious
https://216.120.236.62:8080/AriEwZcvJsYjzutuViEY9
unknown
malicious
https://51.91.76.89/4R
unknown
malicious
https://51.91.76.89:8080/SErPxnMnZMWCWtStc
unknown
malicious
https://189.232.46.161/oDKcMsHRRxcdTZdqBLENpsfwBpdNwUtCDsdjXOHPdhyxmepdV
unknown
malicious
https://216.120.236.62/o
unknown
malicious
https://216.120.236.62/
unknown
malicious
https://51.91.76.89/
unknown
malicious
https://189.232.46.161/=R
unknown
malicious
https://216.120.236.62:8080/AriEwZcvJsYjzutuViEY
unknown
malicious
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://217.182.25.250:8080/BsbzREwLaKqFTTaeHjvPeVlDdCnzQYZNllXagZhyDivNlMzaFBSuCmbSampUWW2
unknown
https://119.193.124.41:7080/VpoQHFAbXxwVXMvalFtvpYGPvlzHFATxmfdXXXqPyAmJeXjvroVHBlPfYCuMPkB
unknown
http://crl.ver)
unknown
https://217.182.25.250:8080/BsbzREwLaKqFTTaeHjvPeVlDdCnzQYZNllXagZhyDivNlMzaFBSuCmbSampUWW
unknown
https://www.tiktok.com/legal/report/feedback
unknown
https://217.182.25.250/1.76.89:8080/pdNwUtCDsdjXOHPdhyxmepd
unknown
https://support.hotspotshield.com/
unknown
https://217.182.25.250/eVlDdCnzQYZNllXagZhyDivNlMzaFBSuCmbSampUWW
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://51.91.76.89:80:8080/
unknown
https://119.193.124.41:7080/VpoQHFAbXxwVXMvalFtvpYGPvlzHFATxmfdXXXqPyAmJeXjvroVHBlPfYCuMPkBo
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
https://disneyplus.com/legal.
unknown
https://119.193.124.41:7080/VpoQHFAbXxwVXMvalFtvpYGPvlzHFATxmfdXXXqPyAmJeXjvroVHBlPfYCuMPkB&
unknown
https://119.193.124.41/
unknown
https://217.182.25.250/
unknown
http://ctldl.windowsupda
unknown
http://help.disneyplus.com.
unknown
There are 21 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
217.182.25.250
unknown
France
malicious
159.65.88.10
unknown
United States
malicious
101.50.0.91
unknown
Indonesia
malicious
195.154.133.20
unknown
France
malicious
185.157.82.211
unknown
Poland
malicious
103.43.46.182
unknown
Indonesia
malicious
151.106.112.196
unknown
Germany
malicious
79.172.212.216
unknown
Hungary
malicious
110.232.117.186
unknown
Australia
malicious
51.254.140.238
unknown
France
malicious
201.94.166.162
unknown
Brazil
malicious
206.188.212.92
unknown
United States
malicious
45.118.115.99
unknown
Indonesia
malicious
216.158.226.206
unknown
United States
malicious
51.91.7.5
unknown
France
malicious
209.126.98.206
unknown
United States
malicious
189.232.46.161
unknown
Mexico
malicious
72.15.201.15
unknown
United States
malicious
209.250.246.206
unknown
European Union
malicious
1.234.21.73
unknown
Korea Republic of
malicious
82.165.152.127
unknown
Germany
malicious
176.56.128.118
unknown
Switzerland
malicious
107.182.225.142
unknown
United States
malicious
45.118.135.203
unknown
Japan
malicious
134.122.66.193
unknown
United States
malicious
167.99.115.35
unknown
United States
malicious
46.55.222.11
unknown
Bulgaria
malicious
173.212.193.249
unknown
Germany
malicious
51.91.76.89
unknown
France
malicious
45.176.232.124
unknown
Colombia
malicious
178.79.147.66
unknown
United Kingdom
malicious
176.104.106.96
unknown
Serbia
malicious
31.24.158.56
unknown
Spain
malicious
50.30.40.196
unknown
United States
malicious
45.142.114.231
unknown
Germany
malicious
189.126.111.200
unknown
Brazil
malicious
1.234.2.232
unknown
Korea Republic of
malicious
203.114.109.124
unknown
Thailand
malicious
167.172.253.162
unknown
United States
malicious
119.193.124.41
unknown
Korea Republic of
malicious
146.59.226.45
unknown
Norway
malicious
129.232.188.93
unknown
South Africa
malicious
196.218.30.83
unknown
Egypt
malicious
216.120.236.62
unknown
United States
malicious
192.168.2.1
unknown
unknown
127.0.0.1
unknown
unknown
There are 36 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100

Memdumps

Base Address
Regiontype
Protect
Malicious
E90000
direct allocation
page execute and read and write
malicious
4171000
direct allocation
page execute read
malicious
10E1000
direct allocation
page execute read
malicious
4140000
direct allocation
page execute and read and write
malicious
520000
direct allocation
page execute and read and write
malicious
4BE0000
direct allocation
page execute and read and write
malicious
4C11000
direct allocation
page execute read
malicious
2FE0000
direct allocation
page execute and read and write
malicious
4AA1000
direct allocation
page execute read
malicious
551000
direct allocation
page execute read
malicious
3011000
direct allocation
page execute read
malicious
3390000
direct allocation
page execute and read and write
malicious
2222F6EF000
heap
page read and write
21B56428000
heap
page read and write
2380000
trusted library allocation
page read and write
2992F7CC000
heap
page read and write
2930D679000
heap
page read and write
5146000
trusted library allocation
page read and write
DC4000
heap
page read and write
FE6A07B000
stack
page read and write
5310000
trusted library allocation
page read and write
9A0000
trusted library allocation
page read and write
DC4000
heap
page read and write
2930DF58000
heap
page read and write
2223018D000
heap
page read and write
1006000
heap
page read and write
29312C45000
heap
page read and write
4961000
heap
page read and write
4CF0000
heap
page read and write
29312B60000
trusted library allocation
page read and write
231B000
stack
page read and write
4B0A9C000
stack
page read and write
26D0000
heap
page read and write
184E10E0000
heap
page read and write
29314000000
heap
page read and write
DA4000
heap
page read and write
4961000
heap
page read and write
29312C30000
heap
page read and write
2930E7A0000
trusted library section
page readonly
DC4000
heap
page read and write
3BFEEF8000
stack
page read and write
FE6A27E000
stack
page read and write
29312F00000
trusted library allocation
page read and write
960000
remote allocation
page read and write
2930E780000
trusted library section
page readonly
DC4000
heap
page read and write
4BD3000
heap
page read and write
16C6AD13000
heap
page read and write
21876002000
trusted library allocation
page read and write
5101000
trusted library allocation
page read and write
21B561B0000
heap
page read and write
2222F64F000
heap
page read and write
3060000
heap
page read and write
21875876000
heap
page read and write
DC4000
heap
page read and write
F9E000
stack
page read and write
29312B80000
trusted library allocation
page read and write
29312C15000
heap
page read and write
21B56320000
trusted library allocation
page read and write
4B5E000
stack
page read and write
572000
direct allocation
page read and write
324A000
heap
page read and write
2930D6FE000
heap
page read and write
4961000
heap
page read and write
DC4000
heap
page read and write
22230602000
heap
page read and write
2059AEC0000
heap
page read and write
DC4000
heap
page read and write
32E6000
heap
page read and write
22230199000
heap
page read and write
16C6AC13000
heap
page read and write
4961000
heap
page read and write
C30000
heap
page read and write
222301BC000
heap
page read and write
85837E000
stack
page read and write
2059B113000
heap
page read and write
22230158000
heap
page read and write
4961000
heap
page read and write
514E000
trusted library allocation
page read and write
2D52000
heap
page read and write
DC4000
heap
page read and write
4F5E000
stack
page read and write
28F0000
heap
page read and write
FE6000
heap
page read and write
DC4000
heap
page read and write
21B56500000
heap
page read and write
5060000
remote allocation
page read and write
73BB5FC000
stack
page read and write
3BFE9CC000
stack
page read and write
4961000
heap
page read and write
16C6AC9B000
heap
page read and write
222301AD000
heap
page read and write
222301A4000
heap
page read and write
2FE0000
heap
page read and write
D90000
heap
page read and write
85867B000
stack
page read and write
2930D702000
heap
page read and write
FE69F7F000
stack
page read and write
10058000
unkown
page readonly
503B000
stack
page read and write
2187583C000
heap
page read and write
5D7000
heap
page read and write
4B0B1E000
stack
page read and write
29312C65000
heap
page read and write
22230186000
heap
page read and write
DC4000
heap
page read and write
73BB13F000
stack
page read and write
573000
direct allocation
page read and write
496E000
stack
page read and write
2930DF13000
heap
page read and write
4B80000
heap
page read and write
222301AD000
heap
page read and write
22230644000
heap
page read and write
890000
heap
page read and write
4CAC000
stack
page read and write
ED0000
trusted library allocation
page read and write
29312C3F000
heap
page read and write
513E000
trusted library allocation
page read and write
DC4000
heap
page read and write
4961000
heap
page read and write
26B0000
heap
page read and write
27A3000
heap
page read and write
FE69777000
stack
page read and write
29312F21000
trusted library allocation
page read and write
3BFECFE000
stack
page read and write
5161000
trusted library allocation
page read and write
21875813000
heap
page read and write
100BA000
trusted library allocation
page read and write
299306C0000
trusted library allocation
page read and write
4961000
heap
page read and write
8582FE000
stack
page read and write
2059B05F000
heap
page read and write
29930450000
trusted library allocation
page read and write
2187589F000
heap
page read and write
21B561C0000
heap
page read and write
2930D629000
heap
page read and write
21B56402000
heap
page read and write
B7D9C7E000
stack
page read and write
2059B802000
trusted library allocation
page read and write
100B1000
trusted library allocation
page read and write
10075000
unkown
page readonly
52A0000
trusted library allocation
page read and write
1035000
heap
page read and write
93B000
stack
page read and write
2992F960000
trusted library allocation
page read and write
2059B000000
heap
page read and write
3BFEDFC000
stack
page read and write
184E1142000
heap
page read and write
10075000
unkown
page readonly
299306B0000
heap
page readonly
10000000
unkown
page readonly
DC4000
heap
page read and write
8FC000
stack
page read and write
2222F6C2000
heap
page read and write
2222F6E3000
heap
page read and write
304E000
stack
page read and write
2223018F000
heap
page read and write
2930DE00000
heap
page read and write
3BFF1FF000
stack
page read and write
52A1000
trusted library allocation
page read and write
D70000
heap
page read and write
4961000
heap
page read and write
4CED000
stack
page read and write
21875908000
heap
page read and write
310A000
heap
page read and write
21875900000
heap
page read and write
21B56502000
heap
page read and write
33C7000
heap
page read and write
16C6AC70000
heap
page read and write
DC4000
heap
page read and write
2F60000
trusted library allocation
page read and write
22230602000
heap
page read and write
2930D68B000
heap
page read and write
2222F629000
heap
page read and write
DC4000
heap
page read and write
1006E000
unkown
page read and write
DC4000
heap
page read and write
2930E760000
trusted library section
page readonly
4961000
heap
page read and write
3010000
direct allocation
page read and write
DC4000
heap
page read and write
100B5000
trusted library allocation
page read and write
DC4000
heap
page read and write
1EA000
stack
page read and write
4961000
heap
page read and write
8DB667F000
stack
page read and write
4961000
heap
page read and write
21B56453000
heap
page read and write
2222F713000
heap
page read and write
DC4000
heap
page read and write
51BE000
stack
page read and write
5137000
trusted library allocation
page read and write
E4311F9000
stack
page read and write
960000
remote allocation
page read and write
85827B000
stack
page read and write
299A000
stack
page read and write
21875870000
heap
page read and write
2930DF02000
heap
page read and write
51E000
stack
page read and write
29312CF6000
heap
page read and write
73BB57E000
stack
page read and write
2222FEC0000
remote allocation
page read and write
513E000
trusted library allocation
page read and write
52A1000
trusted library allocation
page read and write
DC4000
heap
page read and write
21875902000
heap
page read and write
2223017A000
heap
page read and write
10075000
unkown
page readonly
29930720000
trusted library allocation
page read and write
184E115F000
heap
page read and write
276A000
heap
page read and write
33C0000
heap
page read and write
29930460000
trusted library allocation
page read and write
4192000
direct allocation
page read and write
21875850000
heap
page read and write
CD8000
stack
page read and write
FE69C7B000
stack
page read and write
4B0FFB000
stack
page read and write
22230602000
heap
page read and write
DC4000
heap
page read and write
4961000
heap
page read and write
FFB000
heap
page read and write
2992F8F0000
trusted library allocation
page read and write
3100000
heap
page read and write
492E000
stack
page read and write
513E000
stack
page read and write
4AC3000
direct allocation
page read and write
184E1172000
heap
page read and write
4C33000
direct allocation
page read and write
1034000
heap
page read and write
2F1E000
stack
page read and write
DC4000
heap
page read and write
DC4000
heap
page read and write
184E1090000
heap
page read and write
DC4000
heap
page read and write
2059B108000
heap
page read and write
271F000
stack
page read and write
16C6AB50000
heap
page read and write
DC4000
heap
page read and write
2222F613000
heap
page read and write
4961000
heap
page read and write
2C00000
trusted library allocation
page read and write
E430D7B000
stack
page read and write
5161000
trusted library allocation
page read and write
DC4000
heap
page read and write
21875829000
heap
page read and write
FE6987A000
stack
page read and write
184E1179000
heap
page read and write
218755A0000
heap
page read and write
8DB63FE000
stack
page read and write
16C6AC65000
heap
page read and write
FFB000
heap
page read and write
2930D657000
heap
page read and write
2930D626000
heap
page read and write
29312CA2000
heap
page read and write
73BB479000
stack
page read and write
2930D63D000
heap
page read and write
2992F791000
heap
page read and write
21B56C02000
trusted library allocation
page read and write
2930D4D0000
heap
page read and write
2930E680000
trusted library allocation
page read and write
4AA0000
direct allocation
page read and write
514B000
trusted library allocation
page read and write
4AC2000
direct allocation
page read and write
29312FD0000
remote allocation
page read and write
2930D6BC000
heap
page read and write
4C50000
heap
page read and write
80000
heap
page read and write
29312FB0000
trusted library allocation
page read and write
2059B029000
heap
page read and write
2992F959000
heap
page read and write
5161000
trusted library allocation
page read and write
10075000
unkown
page readonly
3BFF47C000
stack
page read and write
4960000
heap
page read and write
184E1155000
heap
page read and write
DC4000
heap
page read and write
4961000
heap
page read and write
EC000
stack
page read and write
222301A4000
heap
page read and write
21875710000
trusted library allocation
page read and write
16C6AC4D000
heap
page read and write
184E115F000
heap
page read and write
48D0000
heap
page read and write
3BFF2FA000
stack
page read and write
2059B102000
heap
page read and write
413F000
stack
page read and write
5DB000
heap
page read and write
DC4000
heap
page read and write
118E000
stack
page read and write
2992F789000
heap
page read and write
2930D5D0000
trusted library allocation
page read and write
960000
remote allocation
page read and write
4C32000
direct allocation
page read and write
B7D9EFB000
stack
page read and write
FE6997B000
stack
page read and write
184E10B0000
heap
page read and write
1006F000
unkown
page read and write
4961000
heap
page read and write
DCE000
stack
page read and write
21875853000
heap
page read and write
16C6AC50000
heap
page read and write
4CF4000
heap
page read and write
5060000
trusted library allocation
page read and write
1006000
heap
page read and write
73BB1BE000
stack
page read and write
2D10000
heap
page read and write
2222F6B2000
heap
page read and write
2930D68E000
heap
page read and write
DC4000
heap
page read and write
4A4E000
stack
page read and write
2222F6AC000
heap
page read and write
DC4000
heap
page read and write
10001000
unkown
page execute read
DC4000
heap
page read and write
DC4000
heap
page read and write
2222F655000
heap
page read and write
8DB657B000
stack
page read and write
184E113B000
heap
page read and write
2992F880000
heap
page read and write
52B0000
trusted library allocation
page read and write
2930D695000
heap
page read and write
22230602000
heap
page read and write
DC4000
heap
page read and write
2059AE60000
heap
page read and write
2930DF18000
heap
page read and write
51FC000
stack
page read and write
2222F688000
heap
page read and write
2222F600000
heap
page read and write
4B1177000
stack
page read and write
22230197000
heap
page read and write
73BB0BA000
stack
page read and write
DC4000
heap
page read and write
16C6AC46000
heap
page read and write
4961000
heap
page read and write
4C10000
direct allocation
page read and write
222301AF000
heap
page read and write
FE6937C000
stack
page read and write
1003000
heap
page read and write
DC4000
heap
page read and write
184E1177000
heap
page read and write
2222FEC0000
remote allocation
page read and write
10000000
unkown
page readonly
21B5646B000
heap
page read and write
4961000
heap
page read and write
29312B70000
trusted library allocation
page read and write
29312B80000
trusted library allocation
page read and write
E43127E000
stack
page read and write
100B2000
trusted library allocation
page read and write
DC4000
heap
page read and write
299306D0000
trusted library allocation
page read and write
295C000
stack
page read and write
DC4000
heap
page read and write
21875610000
heap
page read and write
16C6ABC0000
heap
page read and write
5DB000
heap
page read and write
222301A4000
heap
page read and write
2930D613000
heap
page read and write
22230620000
heap
page read and write
29312C00000
heap
page read and write
1093000
heap
page read and write
22230602000
heap
page read and write
16C6AB60000
heap
page read and write
4970000
heap
page read and write
FE69A7E000
stack
page read and write
F57000
heap
page read and write
16C6AD08000
heap
page read and write
1115000
heap
page read and write
21875913000
heap
page read and write
50BE000
stack
page read and write
DC4000
heap
page read and write
2992F750000
heap
page read and write
2059AFC0000
trusted library allocation
page read and write
34F0000
heap
page read and write
DC4000
heap
page read and write
1035000
heap
page read and write
10058000
unkown
page readonly
4240000
heap
page read and write
2930E790000
trusted library section
page readonly
1034000
heap
page read and write
222301B0000
heap
page read and write
3142000
heap
page read and write
22230167000
heap
page read and write
222301A6000
heap
page read and write
510F000
trusted library allocation
page read and write
10058000
unkown
page readonly
E431179000
stack
page read and write
DC4000
heap
page read and write
184E10E5000
heap
page read and write
DC4000
heap
page read and write
94F000
stack
page read and write
4FFD000
stack
page read and write
DC4000
heap
page read and write
49AE000
stack
page read and write
2187584D000
heap
page read and write
16C6B602000
trusted library allocation
page read and write
1006E000
unkown
page write copy
11A0000
trusted library allocation
page read and write
2930DE15000
heap
page read and write
2930DE02000
heap
page read and write
4020000
trusted library allocation
page read and write
DC4000
heap
page read and write
3BFF37E000
unkown
page read and write
1600F000
trusted library allocation
page read and write
119F000
stack
page read and write
2222F6F8000
heap
page read and write
16C6AC4A000
heap
page read and write
21B56441000
heap
page read and write
FF3000
heap
page read and write
4BD0000
heap
page read and write
4961000
heap
page read and write
184E0F60000
heap
page read and write
4A9F000
stack
page read and write
10058000
unkown
page readonly
5060000
remote allocation
page read and write
DC4000
heap
page read and write
34F7000
heap
page read and write
2222F64D000
heap
page read and write
184E1154000
heap
page read and write
FAA000
heap
page read and write
4BCE000
stack
page read and write
16C6AC65000
heap
page read and write
2222F500000
heap
page read and write
222301A6000
heap
page read and write
5146000
trusted library allocation
page read and write
10058000
unkown
page readonly
507E000
stack
page read and write
10E0000
direct allocation
page read and write
DC4000
heap
page read and write
2222F658000
heap
page read and write
DC4000
heap
page read and write
2059B057000
heap
page read and write
4963000
heap
page read and write
10000000
unkown
page readonly
2930D5E0000
trusted library section
page read and write
5146000
trusted library allocation
page read and write
4193000
direct allocation
page read and write
515F000
trusted library allocation
page read and write
4B00000
heap
page read and write
2930E563000
trusted library allocation
page read and write
29312FD0000
remote allocation
page read and write
103D000
heap
page read and write
5174000
trusted library allocation
page read and write
22230180000
heap
page read and write
2059B05C000
heap
page read and write
21875800000
heap
page read and write
4B107E000
stack
page read and write
DC4000
heap
page read and write
29312CE5000
heap
page read and write
2222F654000
heap
page read and write
B7D99FB000
stack
page read and write
2CC5000
heap
page read and write
29312BB0000
trusted library allocation
page read and write
517E000
stack
page read and write
5E4000
heap
page read and write
10001000
unkown
page execute read
2FE5000
heap
page read and write
2930D600000
heap
page read and write
5174000
trusted library allocation
page read and write
4D0000
heap
page read and write
FA0000
heap
page read and write
5101000
trusted library allocation
page read and write
22230165000
heap
page read and write
B7D9FF7000
stack
page read and write
1006E000
unkown
page read and write
2CC0000
heap
page read and write
2930DF18000
heap
page read and write
30FE000
stack
page read and write
184E1146000
heap
page read and write
1094000
heap
page read and write
3240000
heap
page read and write
858577000
stack
page read and write
29312C23000
heap
page read and write
10075000
unkown
page readonly
100B0000
trusted library allocation
page read and write
EC3000
heap
page read and write
184E115F000
heap
page read and write
32AF000
heap
page read and write
D40000
trusted library allocation
page read and write
4B0B9E000
stack
page read and write
4DDD000
stack
page read and write
DC4000
heap
page read and write
E4312F9000
stack
page read and write
DC4000
heap
page read and write
2992F7CC000
heap
page read and write
2930E560000
trusted library allocation
page read and write
2059B065000
heap
page read and write
4CDE000
stack
page read and write
29312F80000
trusted library allocation
page read and write
110E000
stack
page read and write
29312F24000
trusted library allocation
page read and write
3BFF0F7000
stack
page read and write
29312C58000
heap
page read and write
513E000
trusted library allocation
page read and write
222301DC000
heap
page read and write
21B56513000
heap
page read and write
8DB62FB000
stack
page read and write
2222F670000
heap
page read and write
C9C000
stack
page read and write
2930D670000
heap
page read and write
29312F0E000
trusted library allocation
page read and write
2059B002000
heap
page read and write
DC4000
heap
page read and write
51D4000
trusted library allocation
page read and write
10000000
unkown
page readonly
1110000
heap
page read and write
DC4000
heap
page read and write
3BFEFF7000
stack
page read and write
1006E000
unkown
page read and write
2930D470000
heap
page read and write
DC4000
heap
page read and write
4B137F000
stack
page read and write
2222F64B000
heap
page read and write
DC4000
heap
page read and write
22DC000
stack
page read and write
506E000
stack
page read and write
2059B061000
heap
page read and write
8DB5D8B000
stack
page read and write
299306A0000
trusted library allocation
page read and write
DC4000
heap
page read and write
115E000
stack
page read and write
29312F08000
trusted library allocation
page read and write
4961000
heap
page read and write
184E1147000
heap
page read and write
2223019B000
heap
page read and write
3BFEC7E000
stack
page read and write
2222F6DA000
heap
page read and write
29312B70000
trusted library allocation
page read and write
2187584A000
heap
page read and write
2222F6B6000
heap
page read and write
2223011A000
heap
page read and write
B7DA1FF000
stack
page read and write
DC4000
heap
page read and write
2223019C000
heap
page read and write
FE69B7B000
stack
page read and write
4FA0000
heap
page read and write
4961000
heap
page read and write
50AE000
stack
page read and write
2222F716000
heap
page read and write
DC4000
heap
page read and write
2930D713000
heap
page read and write
22230198000
heap
page read and write
16C6AC55000
heap
page read and write
4AE000
stack
page read and write
4E1C000
stack
page read and write
29312BB4000
trusted library allocation
page read and write
21B56220000
heap
page read and write
109E000
stack
page read and write
2223018F000
heap
page read and write
DB0000
heap
page read and write
450000
trusted library allocation
page read and write
4F9E000
stack
page read and write
85877F000
stack
page read and write
2223019E000
heap
page read and write
DC4000
heap
page read and write
4961000
heap
page read and write
222301AC000
heap
page read and write
2059B062000
heap
page read and write
222301A6000
heap
page read and write
4290000
heap
page read and write
F50000
heap
page read and write
2222F659000
heap
page read and write
2F5E000
stack
page read and write
DC4000
heap
page read and write
22230602000
heap
page read and write
DC4000
heap
page read and write
3033000
direct allocation
page read and write
2D5C000
heap
page read and write
2930E7B0000
trusted library section
page readonly
4961000
heap
page read and write
4961000
heap
page read and write
DC5000
heap
page read and write
2930D6A1000
heap
page read and write
DC4000
heap
page read and write
B7DA0FF000
stack
page read and write
103D000
heap
page read and write
DC4000
heap
page read and write
4961000
heap
page read and write
F20000
heap
page read and write
16010000
trusted library allocation
page read and write
5146000
trusted library allocation
page read and write
2222F6C9000
heap
page read and write
1006E000
unkown
page read and write
2930DDE1000
trusted library allocation
page read and write
4961000
heap
page read and write
3032000
direct allocation
page read and write
FE69EFF000
stack
page read and write
2222F657000
heap
page read and write
4961000
heap
page read and write
5158000
trusted library allocation
page read and write
29312BE0000
trusted library allocation
page read and write
4961000
heap
page read and write
1600F000
trusted library allocation
page read and write
EC0000
heap
page read and write
22230600000
heap
page read and write
2222F702000
heap
page read and write
27A3000
heap
page read and write
184E1152000
heap
page read and write
184E1130000
heap
page read and write
DA0000
heap
page read and write
FFB000
heap
page read and write
5060000
remote allocation
page read and write
10001000
unkown
page execute read
2059B05E000
heap
page read and write
10000000
unkown
page readonly
1006000
heap
page read and write
58B000
heap
page read and write
184E1156000
heap
page read and write
2A00000
heap
page read and write
22230602000
heap
page read and write
EFE000
stack
page read and write
2930EB00000
trusted library allocation
page read and write
DC4000
heap
page read and write
2223019B000
heap
page read and write
16018000
trusted library allocation
page read and write
84F000
stack
page read and write
22230175000
heap
page read and write
100B1000
trusted library allocation
page read and write
DC4000
heap
page read and write
2992F955000
heap
page read and write
4961000
heap
page read and write
2930DF00000
heap
page read and write
21B5646B000
heap
page read and write
2223019B000
heap
page read and write
2222F560000
heap
page read and write
DC4000
heap
page read and write
DC4000
heap
page read and write
2992F7CC000
heap
page read and write
16C6ABF0000
trusted library allocation
page read and write
29312CFE000
heap
page read and write
16013000
trusted library allocation
page read and write
29312BA0000
trusted library allocation
page read and write
5184000
trusted library allocation
page read and write
222301CA000
heap
page read and write
22230192000
heap
page read and write
2222F590000
trusted library allocation
page read and write
DC4000
heap
page read and write
51AC000
trusted library allocation
page read and write
29312CDE000
heap
page read and write
16C6AC3C000
heap
page read and write
29312F90000
trusted library allocation
page read and write
10001000
unkown
page execute read
2C7E000
stack
page read and write
DC4000
heap
page read and write
222301BB000
heap
page read and write
4961000
heap
page read and write
4D5000
heap
page read and write
2223018F000
heap
page read and write
2223018F000
heap
page read and write
2992F8E0000
trusted library allocation
page read and write
16C6AD00000
heap
page read and write
222301A6000
heap
page read and write
1600E000
trusted library allocation
page read and write
2930E770000
trusted library section
page readonly
2222F63C000
heap
page read and write
114D000
stack
page read and write
DC4000
heap
page read and write
2992F620000
trusted library allocation
page read and write
29312D00000
heap
page read and write
16C6AD02000
heap
page read and write
222301BC000
heap
page read and write
2270000
heap
page read and write
513E000
trusted library allocation
page read and write
16C6AC29000
heap
page read and write
73BB4F9000
stack
page read and write
2059B07E000
heap
page read and write
2930E570000
trusted library allocation
page read and write
D70000
trusted library allocation
page read and write
22230603000
heap
page read and write
22230154000
heap
page read and write
4961000
heap
page read and write
2930D675000
heap
page read and write
5100000
trusted library allocation
page read and write
22230100000
heap
page read and write
21B56400000
heap
page read and write
DC4000
heap
page read and write
DC4000
heap
page read and write
22230197000
heap
page read and write
103D000
heap
page read and write
514E000
trusted library allocation
page read and write
4961000
heap
page read and write
2223011D000
heap
page read and write
5CC000
heap
page read and write
DC4000
heap
page read and write
21B56413000
heap
page read and write
22230002000
heap
page read and write
40B0000
heap
page read and write
23FE000
stack
page read and write
2E5C000
stack
page read and write
29312B50000
trusted library allocation
page read and write
2059B100000
heap
page read and write
29312D02000
heap
page read and write
DC4000
heap
page read and write
1103000
direct allocation
page read and write
50EF000
stack
page read and write
2222FEC0000
remote allocation
page read and write
10001000
unkown
page execute read
29312FA0000
trusted library allocation
page read and write
4962000
heap
page read and write
2222F64C000
heap
page read and write
2930D460000
heap
page read and write
184E1171000
heap
page read and write
40FE000
stack
page read and write
DC4000
heap
page read and write
4961000
heap
page read and write
2992F7CE000
heap
page read and write
1070000
heap
page read and write
21875892000
heap
page read and write
51D3000
trusted library allocation
page read and write
4961000
heap
page read and write
29312CB2000
heap
page read and write
4E9E000
stack
page read and write
CE0000
trusted library allocation
page read and write
DC4000
heap
page read and write
49E0000
trusted library allocation
page read and write
5131000
trusted library allocation
page read and write
2760000
heap
page read and write
4961000
heap
page read and write
31C0000
trusted library allocation
page read and write
21875875000
heap
page read and write
22230159000
heap
page read and write
3286000
heap
page read and write
5131000
trusted library allocation
page read and write
4961000
heap
page read and write
550000
direct allocation
page read and write
FE69CFE000
stack
page read and write
DC4000
heap
page read and write
2BE0000
heap
page read and write
4961000
heap
page read and write
218755B0000
heap
page read and write
16C6AC00000
heap
page read and write
2CBF000
stack
page read and write
DC4000
heap
page read and write
29312C4C000
heap
page read and write
4CE0000
heap
page read and write
2E9A000
stack
page read and write
2059AE50000
heap
page read and write
2222F708000
heap
page read and write
32CB000
heap
page read and write
85887C000
stack
page read and write
4BD0000
heap
page read and write
308F000
stack
page read and write
DC4000
heap
page read and write
2930E580000
trusted library allocation
page read and write
49C0000
heap
page read and write
50B0000
trusted library allocation
page read and write
29312CA6000
heap
page read and write
1102000
direct allocation
page read and write
2059B08A000
heap
page read and write
2FC0000
trusted library allocation
page read and write
4A00000
heap
page read and write
4961000
heap
page read and write
DC4000
heap
page read and write
FE69D7F000
stack
page read and write
2222F6ED000
heap
page read and write
2D1A000
heap
page read and write
1110000
trusted library allocation
page read and write
FE69DFE000
stack
page read and write
580000
heap
page read and write
5176000
trusted library allocation
page read and write
21B56477000
heap
page read and write
4E5E000
stack
page read and write
DC4000
heap
page read and write
2059B03C000
heap
page read and write
22230602000
heap
page read and write
DC4000
heap
page read and write
DC0000
heap
page read and write
2930E101000
trusted library allocation
page read and write
22230602000
heap
page read and write
2992F610000
heap
page read and write
29312FD0000
remote allocation
page read and write
FE69E7F000
stack
page read and write
4C00000
heap
page read and write
4170000
direct allocation
page read and write
2992F780000
heap
page read and write
2222F4F0000
heap
page read and write
4961000
heap
page read and write
DC4000
heap
page read and write
B7D9CFE000
stack
page read and write
29312BA0000
trusted library allocation
page read and write
5161000
trusted library allocation
page read and write
2992F950000
heap
page read and write
22230118000
heap
page read and write
2059B013000
heap
page read and write
DFE000
stack
page read and write
DC4000
heap
page read and write
B7D9DFC000
stack
page read and write
16C6AC81000
heap
page read and write
4B127E000
stack
page read and write
There are 779 hidden memdumps, click here to show them.