IOC Report
xhOJLzQSe7

loading gif

Files

File Path
Type
Category
Malicious
xhOJLzQSe7.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xc5b2aade, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\xhOJLzQSe7.dll
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\xhOJLzQSe7.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\xhOJLzQSe7.dll,DllRegisterServer
malicious
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Smcoeugpjqpltwaq\padmvjcc.wwg"
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\xhOJLzQSe7.dll"
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\xhOJLzQSe7.dll",#1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://51.91.76.89:8080/wILlkzMrsIIqrWuKTJoVXizoHkadIszFHcIlGojhnBcDobePKzyquq
unknown
malicious
https://70.36.102.35/
unknown
malicious
https://70.36.102.35/lKdeDesHKlwQRuBQoJMtzzkSkkKhWjwq
unknown
malicious
https://70.36.102.35/lKdeDesHKlwQRuBQoJMtzzkSkkKhWjw
unknown
malicious
https://51.91.76.89:8080/wILlkzMrsIIqrWuKTJoVXizoHkadIszFHcIlGojhnBcDobePKzyquq9
unknown
malicious
https://51.91.76.89/
unknown
malicious
https://70.36.102.35/Default
unknown
malicious
https://92.240.254.110:8080/i
unknown
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://92.240.254.110:8080/OozwNWoXrNLqNNtlQCBStrfsHlZQDyVVCeVUrhuzIDQnbSNZedOwyJtV6
unknown
https://119.193.124.41:7080/yNzUEhYRmfobVpbnIjDAnFfZFoBrGzwALuEiEPb
unknown
https://119.193.124.41:7080/yNzUEhYRmfobVpbnIjDAnFfZFoBrGzwALuEiEPb1T
unknown
https://92.240.254.110/t
unknown
http://crl.ver)
unknown
https://www.tiktok.com/legal/report/feedback
unknown
https://119.193.124.41:7080/yNzUEhYRmfobVpbnIjDAnFfZFoBrGzwALuEiEPb#T
unknown
https://217.182.25.250:8080/wyXUykQBFXLgUDhBPADNipDGWMKugALsfbonBqKseR
unknown
https://support.hotspotshield.com/
unknown
https://92.240.254.110:8080/
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://217.182.25.250:8080/wyXUykQBFXLgUDhBPADNipDGWMKugALsfbonBqKseR9
unknown
https://92.240.254.110:8080/OozwNWoXrNLqNNtlQCBStrfsHlZQDyVVCeVUrhuzIDQnbSNZedOwyJtV
unknown
https://217.182.25.250/6
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
https://disneyplus.com/legal.
unknown
https://119.193.124.41/
unknown
https://217.182.25.250/
unknown
https://92.240.254.110/
unknown
http://help.disneyplus.com.
unknown
https://119.193.124.41:7080/yNzUEhYRmfobVpbnIjDAnFfZFoBrGzwALuEiEPbV
unknown
There are 21 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
217.182.25.250
unknown
France
malicious
70.36.102.35
unknown
United States
malicious
120.4.0.0
unknown
China
malicious
200.220.252.2
unknown
Brazil
malicious
192.168.2.5
unknown
unknown
malicious
168.18.251.2
unknown
United States
malicious
48.13.251.2
unknown
United States
malicious
120.16.251.2
unknown
Australia
malicious
23.181.2.0
unknown
Reserved
malicious
192.153.248.2
unknown
United States
malicious
252.180.2.0
unknown
Reserved
malicious
128.63.180.0
unknown
United States
malicious
1.255.0.0
unknown
Korea Republic of
malicious
136.31.0.0
unknown
United States
malicious
10.181.2.0
unknown
unknown
malicious
32.17.251.2
unknown
United States
malicious
65.83.89.67
unknown
United States
malicious
64.56.248.2
unknown
Canada
malicious
224.18.251.2
unknown
Reserved
malicious
96.15.251.2
unknown
United States
malicious
51.91.76.89
unknown
France
malicious
212.253.246.49
unknown
Turkey
malicious
171.213.29.176
unknown
China
malicious
248.153.248.2
unknown
Reserved
malicious
14.181.2.0
unknown
Viet Nam
malicious
144.42.251.111
unknown
United States
malicious
72.67.111.110
unknown
United States
malicious
26.189.253.2
unknown
United States
malicious
96.234.0.0
unknown
United States
malicious
119.193.124.41
unknown
Korea Republic of
malicious
92.240.254.110
unknown
Slovakia (SLOVAK Republic)
malicious
176.200.250.2
unknown
Italy
malicious
192.168.2.1
unknown
unknown
17.181.2.0
unknown
United States
127.0.0.1
unknown
unknown
There are 25 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100

Memdumps

Base Address
Regiontype
Protect
Malicious
2F01000
direct allocation
page execute read
malicious
43F1000
direct allocation
page execute read
malicious
C01000
direct allocation
page execute read
malicious
3250000
direct allocation
page execute and read and write
malicious
C10000
direct allocation
page execute and read and write
malicious
BB0000
direct allocation
page execute and read and write
malicious
2E00000
direct allocation
page execute and read and write
malicious
3281000
direct allocation
page execute read
malicious
4963000
heap
page read and write
2DE3000
heap
page read and write
1DEE5D08000
heap
page read and write
20F4DB02000
heap
page read and write
20F4E373000
heap
page read and write
4961000
heap
page read and write
B00000
heap
page read and write
257CD000000
heap
page read and write
10090000
unkown
page readonly
1007F000
unkown
page readonly
7688377000
stack
page read and write
A44C000
trusted library allocation
page read and write
150BEF08000
heap
page read and write
20F4E393000
heap
page read and write
20F4DA00000
heap
page read and write
2FAA000
heap
page read and write
2E34000
heap
page read and write
257CCC14000
heap
page read and write
20F4E321000
heap
page read and write
322F000
stack
page read and write
10036000
unkown
page readonly
257C7C00000
heap
page read and write
20F4DA50000
heap
page read and write
2FAB000
heap
page read and write
1D25C7F000
stack
page read and write
20F4DAB1000
heap
page read and write
28D5C5B0000
trusted library allocation
page read and write
2E34000
heap
page read and write
5160000
trusted library allocation
page read and write
20F4E370000
heap
page read and write
257C7D18000
heap
page read and write
1007F000
unkown
page readonly
2278F260000
heap
page read and write
ACA0DF7000
stack
page read and write
8FA000
heap
page read and write
10082000
unkown
page readonly
257CCB70000
remote allocation
page read and write
1DEE5C13000
heap
page read and write
2E34000
heap
page read and write
2E34000
heap
page read and write
257CCC51000
heap
page read and write
2E34000
heap
page read and write
21471D02000
heap
page read and write
257C74A8000
heap
page read and write
257CCC00000
heap
page read and write
2E34000
heap
page read and write
50DE000
stack
page read and write
2E35000
heap
page read and write
20F4E373000
heap
page read and write
20F4D820000
heap
page read and write
20F4E38C000
heap
page read and write
768817F000
stack
page read and write
2278F2A1000
heap
page read and write
2F88000
heap
page read and write
10001000
unkown
page execute read
257CCB30000
trusted library allocation
page read and write
2FC7000
heap
page read and write
8BE000
stack
page read and write
485E000
stack
page read and write
51456F8000
stack
page read and write
2F3A000
heap
page read and write
257CCCFB000
heap
page read and write
948000
heap
page read and write
28D5C3FB000
heap
page read and write
2E34000
heap
page read and write
2E34000
heap
page read and write
4961000
heap
page read and write
830000
heap
page read and write
1D25D7B000
stack
page read and write
2278F5F0000
heap
page read and write
21471C4B000
heap
page read and write
150BEE25000
heap
page read and write
C9E000
stack
page read and write
44EE000
trusted library allocation
page read and write
BAF000
stack
page read and write
2E34000
heap
page read and write
2E34000
heap
page read and write
150BED60000
heap
page read and write
20F4E394000
heap
page read and write
48DC000
stack
page read and write
257CCB50000
trusted library allocation
page read and write
1DEE5C46000
heap
page read and write
ACA079C000
stack
page read and write
4B5C000
stack
page read and write
257C7200000
heap
page read and write
257C7493000
heap
page read and write
21471C82000
heap
page read and write
150BF802000
trusted library allocation
page read and write
257C7440000
heap
page read and write
8A0000
heap
page read and write
ACA0BFB000
stack
page read and write
150BEE13000
heap
page read and write
10001000
unkown
page execute read
31EE000
stack
page read and write
2E0000
heap
page read and write
4B1E000
stack
page read and write
4598000
trusted library allocation
page read and write
2E34000
heap
page read and write
28D5D380000
trusted library allocation
page read and write
2D8A000
stack
page read and write
4961000
heap
page read and write
20F4E802000
heap
page read and write
2F75000
heap
page read and write
1DEE5C89000
heap
page read and write
2278F276000
heap
page read and write
932000
heap
page read and write
4961000
heap
page read and write
1A5AC678000
heap
page read and write
2278F2A5000
heap
page read and write
20F4DA51000
heap
page read and write
7687E7B000
stack
page read and write
2278F28E000
heap
page read and write
150BEE3C000
heap
page read and write
2E34000
heap
page read and write
5161000
trusted library allocation
page read and write
2FC7000
heap
page read and write
28D5D360000
trusted library allocation
page read and write
4C60000
trusted library allocation
page read and write
4961000
heap
page read and write
A80000
trusted library allocation
page read and write
20F4E39C000
heap
page read and write
3200000
heap
page read and write
20F4E37B000
heap
page read and write
4961000
heap
page read and write
A10000
heap
page read and write
4450000
heap
page read and write
4FDE000
stack
page read and write
1DEE5C02000
heap
page read and write
2FA8000
heap
page read and write
2278F180000
heap
page read and write
21471A30000
heap
page read and write
970000
heap
page read and write
2CE0000
heap
page read and write
D7DC6BB000
stack
page read and write
257CCD02000
heap
page read and write
940000
remote allocation
page read and write
4920000
heap
page read and write
257C7D18000
heap
page read and write
A4F6000
trusted library allocation
page read and write
257C7C15000
heap
page read and write
257C742A000
heap
page read and write
4961000
heap
page read and write
20F4E394000
heap
page read and write
51EB4FE000
stack
page read and write
150BF670000
trusted library allocation
page read and write
257C7D13000
heap
page read and write
468F000
stack
page read and write
257C7502000
heap
page read and write
257CCC75000
heap
page read and write
28D5D390000
trusted library allocation
page read and write
514577F000
stack
page read and write
3150000
heap
page read and write
257C7507000
heap
page read and write
257C83E0000
trusted library allocation
page read and write
257CCC4A000
heap
page read and write
20F4E39C000
heap
page read and write
2E34000
heap
page read and write
2E34000
heap
page read and write
1DEE5D00000
heap
page read and write
2E34000
heap
page read and write
257CCA1E000
trusted library allocation
page read and write
28D5C3FD000
heap
page read and write
20F4E378000
heap
page read and write
20F4D880000
heap
page read and write
257CCA40000
trusted library allocation
page read and write
5A0000
trusted library allocation
page read and write
C50000
heap
page read and write
4961000
heap
page read and write
2E34000
heap
page read and write
3240000
heap
page read and write
451E000
stack
page read and write
2FA8000
heap
page read and write
2E34000
heap
page read and write
2278F276000
heap
page read and write
2E34000
heap
page read and write
20F4E396000
heap
page read and write
20F4DB08000
heap
page read and write
2F00000
direct allocation
page read and write
2278F286000
heap
page read and write
20F4E373000
heap
page read and write
20F4D810000
heap
page read and write
4961000
heap
page read and write
10000000
unkown
page readonly
20F4E37B000
heap
page read and write
2E34000
heap
page read and write
28D5D130000
trusted library allocation
page read and write
257CC870000
trusted library allocation
page read and write
2E34000
heap
page read and write
1A5AC510000
heap
page read and write
B4F000
stack
page read and write
50C0000
remote allocation
page read and write
257C8870000
trusted library allocation
page read and write
4961000
heap
page read and write
10044000
unkown
page read and write
257CCCF3000
heap
page read and write
5140000
trusted library allocation
page read and write
4C7E000
stack
page read and write
1DEE5C66000
heap
page read and write
2E34000
heap
page read and write
50FE000
stack
page read and write
4953000
heap
page read and write
20F4E370000
heap
page read and write
21471C4D000
heap
page read and write
895000
heap
page read and write
10036000
unkown
page readonly
509C000
stack
page read and write
2E34000
heap
page read and write
2E34000
heap
page read and write
6994C7B000
stack
page read and write
257C7476000
heap
page read and write
D7DCBF9000
stack
page read and write
257CCCFA000
heap
page read and write
ACA0EFF000
stack
page read and write
7688077000
stack
page read and write
8B8000
heap
page read and write
257C8860000
trusted library allocation
page read and write
10000000
unkown
page readonly
1004B000
unkown
page readonly
2E34000
heap
page read and write
4961000
heap
page read and write
48DE000
stack
page read and write
20F4E3BE000
heap
page read and write
2DF0000
trusted library allocation
page read and write
4961000
heap
page read and write
150BEE88000
heap
page read and write
2E34000
heap
page read and write
257CCD02000
heap
page read and write
20F4E378000
heap
page read and write
2E34000
heap
page read and write
2278F200000
heap
page read and write
51457FF000
stack
page read and write
31D0000
trusted library allocation
page read and write
489F000
stack
page read and write
20F4E802000
heap
page read and write
2E34000
heap
page read and write
28D5C398000
heap
page read and write
28D5C5F0000
trusted library allocation
page read and write
2E34000
heap
page read and write
20F4E370000
heap
page read and write
2278F284000
heap
page read and write
3208000
heap
page read and write
20F4E3A9000
heap
page read and write
20F4E802000
heap
page read and write
21471C3C000
heap
page read and write
4961000
heap
page read and write
257CCCEE000
heap
page read and write
2E34000
heap
page read and write
20F4DA4C000
heap
page read and write
150BEE62000
heap
page read and write
4961000
heap
page read and write
20F4E3C6000
heap
page read and write
BF0000
heap
page read and write
257C7370000
trusted library allocation
page read and write
4961000
heap
page read and write
257CCC77000
heap
page read and write
20F4DA85000
heap
page read and write
257C7D00000
heap
page read and write
505E000
stack
page read and write
20F4E398000
heap
page read and write
21471A20000
heap
page read and write
2FD2000
heap
page read and write
28D5C2E0000
trusted library allocation
page read and write
2E30000
heap
page read and write
1DEE5C66000
heap
page read and write
988000
heap
page read and write
2E34000
heap
page read and write
150BEE58000
heap
page read and write
257CCA40000
trusted library allocation
page read and write
10001000
unkown
page execute read
2278F5F5000
heap
page read and write
5B5000
heap
page read and write
257CCA50000
trusted library allocation
page read and write
20F4DA13000
heap
page read and write
20F4DB16000
heap
page read and write
257CCC44000
heap
page read and write
20F4E396000
heap
page read and write
20F4DAAB000
heap
page read and write
257C74FC000
heap
page read and write
2E34000
heap
page read and write
20F4E37D000
heap
page read and write
20F4E300000
heap
page read and write
20F4E319000
heap
page read and write
257CCAE0000
trusted library allocation
page read and write
2E34000
heap
page read and write
1007F000
unkown
page readonly
28D5D370000
heap
page readonly
2278F28E000
heap
page read and write
2E34000
heap
page read and write
1D2607E000
stack
page read and write
20F4E396000
heap
page read and write
2E34000
heap
page read and write
2E34000
heap
page read and write
1A5AC640000
heap
page read and write
2E34000
heap
page read and write
10036000
unkown
page readonly
2278F29D000
heap
page read and write
F959E7B000
stack
page read and write
1D2592C000
stack
page read and write
2E34000
heap
page read and write
1DEE5C4F000
heap
page read and write
2E34000
heap
page read and write
32C0000
heap
page read and write
10071000
unkown
page readonly
514587C000
stack
page read and write
2F88000
heap
page read and write
51EB8FF000
stack
page read and write
4961000
heap
page read and write
10048000
unkown
page read and write
2E34000
heap
page read and write
20F4E38C000
heap
page read and write
257C74A7000
heap
page read and write
257CCC58000
heap
page read and write
20F4DA57000
heap
page read and write
1A5AC702000
heap
page read and write
1DEE5C53000
heap
page read and write
51EB47E000
stack
page read and write
D7DCA79000
stack
page read and write
4FC000
stack
page read and write
7687CFE000
stack
page read and write
1D259AF000
stack
page read and write
8D2000
heap
page read and write
2E34000
heap
page read and write
20F4E370000
heap
page read and write
1DEE5C58000
heap
page read and write
1004B000
unkown
page readonly
2E34000
heap
page read and write
28D5C5E0000
heap
page read and write
B07000
heap
page read and write
257C8863000
trusted library allocation
page read and write
28D5C3A0000
heap
page read and write
20F4E371000
heap
page read and write
2F23000
direct allocation
page read and write
28D5C340000
heap
page read and write
20F4E3AE000
heap
page read and write
4460000
trusted library allocation
page read and write
10071000
unkown
page readonly
20F4E394000
heap
page read and write
1A5AC628000
heap
page read and write
257C7413000
heap
page read and write
4961000
heap
page read and write
4961000
heap
page read and write
2E34000
heap
page read and write
20F4DA4E000
heap
page read and write
1DEE5D13000
heap
page read and write
10044000
unkown
page read and write
20F4E37B000
heap
page read and write
28D5C3DE000
heap
page read and write
2278F1E0000
heap
page read and write
840000
trusted library allocation
page read and write
1A5AC600000
heap
page read and write
2278F28E000
heap
page read and write
21471D00000
heap
page read and write
2E34000
heap
page read and write
490000
heap
page read and write
91B000
stack
page read and write
1DEE5B90000
trusted library allocation
page read and write
257CCB40000
trusted library allocation
page read and write
2E34000
heap
page read and write
10082000
unkown
page readonly
20F4E37D000
heap
page read and write
2E34000
heap
page read and write
ACA0FFF000
stack
page read and write
20F4DA53000
heap
page read and write
2E34000
heap
page read and write
20F4E373000
heap
page read and write
4961000
heap
page read and write
20F4E382000
heap
page read and write
2E34000
heap
page read and write
32A2000
direct allocation
page read and write
4961000
heap
page read and write
2F30000
heap
page read and write
3302000
heap
page read and write
2278F2A1000
heap
page read and write
2278F2A1000
heap
page read and write
257CCD02000
heap
page read and write
257C7210000
heap
page read and write
20F4E802000
heap
page read and write
514534A000
stack
page read and write
D7DCAF9000
stack
page read and write
20F4DACA000
heap
page read and write
32A3000
direct allocation
page read and write
2E34000
heap
page read and write
257C74FC000
heap
page read and write
257C7400000
heap
page read and write
4961000
heap
page read and write
257C74AB000
heap
page read and write
20F4E378000
heap
page read and write
51453CE000
stack
page read and write
ABFF000
trusted library allocation
page read and write
2FAA000
heap
page read and write
4412000
direct allocation
page read and write
877000
heap
page read and write
10044000
unkown
page read and write
21471D13000
heap
page read and write
257CCB70000
remote allocation
page read and write
F95997A000
stack
page read and write
10071000
unkown
page readonly
257CCCEB000
heap
page read and write
7688279000
stack
page read and write
10000000
unkown
page readonly
C23000
direct allocation
page read and write
2E34000
heap
page read and write
2E34000
heap
page read and write
257CCCAA000
heap
page read and write
8F0000
heap
page read and write
20F4E3C0000
heap
page read and write
4413000
direct allocation
page read and write
150BEE00000
heap
page read and write
20F4E39C000
heap
page read and write
2DF0000
trusted library allocation
page read and write
28D5C5E9000
heap
page read and write
3580000
heap
page read and write
2278F2A3000
heap
page read and write
4970000
heap
page read and write
51EB7F7000
stack
page read and write
20F4E38D000
heap
page read and write
20F4E802000
heap
page read and write
4730000
heap
page read and write
257CCB20000
trusted library allocation
page read and write
20F4E3A5000
heap
page read and write
515F000
stack
page read and write
4961000
heap
page read and write
1DEE5C29000
heap
page read and write
20F4E370000
heap
page read and write
1D2617F000
stack
page read and write
257CCA10000
trusted library allocation
page read and write
2E34000
heap
page read and write
513F000
stack
page read and write
1CD000
stack
page read and write
35A0000
heap
page read and write
4580000
heap
page read and write
1A5AC700000
heap
page read and write
2F88000
heap
page read and write
20F4E3D7000
heap
page read and write
2E34000
heap
page read and write
10048000
unkown
page read and write
2F92000
heap
page read and write
2E34000
heap
page read and write
7687F78000
stack
page read and write
2FC7000
heap
page read and write
6994D7F000
stack
page read and write
1DEE5A20000
heap
page read and write
20F4E351000
heap
page read and write
4F5E000
stack
page read and write
4961000
heap
page read and write
257C74A6000
heap
page read and write
20F4E803000
heap
page read and write
1A5AC602000
heap
page read and write
4961000
heap
page read and write
257CCA54000
trusted library allocation
page read and write
257CCA18000
trusted library allocation
page read and write
10044000
unkown
page read and write
20F4E3A2000
heap
page read and write
2E34000
heap
page read and write
257CCC4C000
heap
page read and write
4961000
heap
page read and write
2E34000
heap
page read and write
2278F29E000
heap
page read and write
2E34000
heap
page read and write
257CC880000
trusted library allocation
page read and write
1D25F77000
stack
page read and write
F959A7B000
stack
page read and write
150BEDD0000
heap
page read and write
20F4DAC5000
heap
page read and write
4961000
heap
page read and write
F95967A000
stack
page read and write
257C747A000
heap
page read and write
B6E000
stack
page read and write
4BC0000
trusted library allocation
page read and write
10048000
unkown
page read and write
2E34000
heap
page read and write
20F4DAE3000
heap
page read and write
150BEE02000
heap
page read and write
257C7471000
heap
page read and write
4961000
heap
page read and write
2E34000
heap
page read and write
21471C76000
heap
page read and write
257C7270000
heap
page read and write
5B0000
heap
page read and write
20F4E394000
heap
page read and write
20F4E370000
heap
page read and write
501E000
stack
page read and write
2E34000
heap
page read and write
20F4DA55000
heap
page read and write
4E9E000
stack
page read and write
4961000
heap
page read and write
20F4E202000
heap
page read and write
4430000
heap
page read and write
2E34000
heap
page read and write
257CCCFF000
heap
page read and write
2E34000
heap
page read and write
8DC000
stack
page read and write
ACA0CFB000
stack
page read and write
257CCE60000
trusted library allocation
page read and write
28D5C360000
heap
page read and write
28D5C3F3000
heap
page read and write
20F4E802000
heap
page read and write
20F4DA59000
heap
page read and write
21471D08000
heap
page read and write
83A000
heap
page read and write
257CCA31000
trusted library allocation
page read and write
4E5D000
stack
page read and write
28D5D3E0000
trusted library allocation
page read and write
2E34000
heap
page read and write
28D5C5C0000
trusted library allocation
page read and write
257CCC64000
heap
page read and write
AFE000
stack
page read and write
257CCAE0000
trusted library allocation
page read and write
C30000
heap
page read and write
51EB9FD000
stack
page read and write
20F4E38C000
heap
page read and write
C22000
direct allocation
page read and write
257CCEA0000
trusted library allocation
page read and write
F95A07F000
stack
page read and write
230000
trusted library allocation
page read and write
870000
heap
page read and write
257C7502000
heap
page read and write
4961000
heap
page read and write
4961000
heap
page read and write
20F4E370000
heap
page read and write
20F4E3A2000
heap
page read and write
1DEE5C6E000
heap
page read and write
2FD2000
heap
page read and write
28D5C3DE000
heap
page read and write
20F4DAF6000
heap
page read and write
4961000
heap
page read and write
20F4D980000
trusted library allocation
page read and write
20F4E36B000
heap
page read and write
3570000
heap
page read and write
4961000
heap
page read and write
257C7458000
heap
page read and write
28D5C3D6000
heap
page read and write
1A5AC4A0000
heap
page read and write
980000
trusted library allocation
page read and write
20F4E802000
heap
page read and write
6994F7E000
stack
page read and write
43F0000
direct allocation
page read and write
2E34000
heap
page read and write
20F4E397000
heap
page read and write
28D5C3DE000
heap
page read and write
150BEE7C000
heap
page read and write
1D25E7B000
stack
page read and write
10082000
unkown
page readonly
10001000
unkown
page execute read
2FD2000
heap
page read and write
257CCC30000
heap
page read and write
257CCAE0000
trusted library allocation
page read and write
257CCA10000
trusted library allocation
page read and write
3318000
heap
page read and write
514567E000
stack
page read and write
2E34000
heap
page read and write
2F88000
heap
page read and write
4961000
heap
page read and write
D7DCB7E000
stack
page read and write
28D5C5A0000
trusted library allocation
page read and write
2278F282000
heap
page read and write
ACA0AFE000
stack
page read and write
F95914C000
stack
page read and write
CD000
stack
page read and write
150BEE5E000
heap
page read and write
4A9E000
stack
page read and write
10090000
unkown
page readonly
20F4E37B000
heap
page read and write
A3E000
stack
page read and write
21471C71000
heap
page read and write
3280000
direct allocation
page read and write
4961000
heap
page read and write
20F4E398000
heap
page read and write
4460000
trusted library allocation
page read and write
257CCA34000
trusted library allocation
page read and write
20F4E802000
heap
page read and write
76883FE000
unkown
page read and write
2E34000
heap
page read and write
1DEE5C54000
heap
page read and write
2E34000
heap
page read and write
51EB1CC000
stack
page read and write
4961000
heap
page read and write
4920000
heap
page read and write
2278F271000
heap
page read and write
20F4E37B000
heap
page read and write
2E34000
heap
page read and write
530000
heap
page read and write
257CCB60000
trusted library allocation
page read and write
319E000
stack
page read and write
20F4DA71000
heap
page read and write
20F4DA5A000
heap
page read and write
257C7514000
heap
page read and write
20F4E820000
heap
page read and write
1A5AC622000
heap
page read and write
7687D7E000
stack
page read and write
20F4D9F0000
remote allocation
page read and write
2278F2A1000
heap
page read and write
20F4E396000
heap
page read and write
4820000
trusted library allocation
page read and write
32CA000
heap
page read and write
21471C00000
heap
page read and write
20F4E802000
heap
page read and write
21471C52000
heap
page read and write
20F4E37B000
heap
page read and write
940000
remote allocation
page read and write
4961000
heap
page read and write
F95987F000
stack
page read and write
4C90000
heap
page read and write
ACA0A7E000
stack
page read and write
257C7D02000
heap
page read and write
4E1B000
stack
page read and write
1DEE5D02000
heap
page read and write
ACA10FE000
stack
page read and write
2E34000
heap
page read and write
10082000
unkown
page readonly
2FCD000
heap
page read and write
20F4E371000
heap
page read and write
257CC8F0000
trusted library allocation
page read and write
20F4DA54000
heap
page read and write
1DEE5C3C000
heap
page read and write
257C748C000
heap
page read and write
150BEE5C000
heap
page read and write
4961000
heap
page read and write
C00000
direct allocation
page read and write
257CCB00000
trusted library allocation
page read and write
21471C50000
heap
page read and write
20F4E39D000
heap
page read and write
20F4E844000
heap
page read and write
20F4DAD6000
heap
page read and write
257C7C02000
heap
page read and write
511E000
stack
page read and write
20F4E371000
heap
page read and write
457E000
stack
page read and write
51EB6FB000
stack
page read and write
257CCA50000
trusted library allocation
page read and write
20F4DA4D000
heap
page read and write
2E34000
heap
page read and write
10090000
unkown
page readonly
6994E7B000
stack
page read and write
10048000
unkown
page read and write
1004B000
unkown
page readonly
59C000
stack
page read and write
150BED70000
heap
page read and write
A8CD000
trusted library allocation
page read and write
257CCCFD000
heap
page read and write
20F4E394000
heap
page read and write
F959577000
stack
page read and write
2E34000
heap
page read and write
1DEE5A90000
heap
page read and write
4961000
heap
page read and write
20F4E800000
heap
page read and write
150BEF02000
heap
page read and write
257CCC23000
heap
page read and write
4961000
heap
page read and write
4453000
heap
page read and write
1004B000
unkown
page readonly
2D4C000
stack
page read and write
10090000
unkown
page readonly
1DEE5C4B000
heap
page read and write
940000
remote allocation
page read and write
2278F26B000
heap
page read and write
1DEE5C00000
heap
page read and write
257C73E1000
trusted library allocation
page read and write
4950000
heap
page read and write
4DDD000
stack
page read and write
1A5AC613000
heap
page read and write
150BEE66000
heap
page read and write
4961000
heap
page read and write
28D5C390000
heap
page read and write
97B000
heap
page read and write
1A5ACE02000
trusted library allocation
page read and write
257CCA30000
trusted library allocation
page read and write
2E34000
heap
page read and write
257CC900000
trusted library allocation
page read and write
20F4D9F0000
remote allocation
page read and write
1DEE5C80000
heap
page read and write
20F4DAE9000
heap
page read and write
20F4DAE6000
heap
page read and write
20F4DA29000
heap
page read and write
4960000
heap
page read and write
1A5AC657000
heap
page read and write
4961000
heap
page read and write
2F22000
direct allocation
page read and write
20F4DAB5000
heap
page read and write
60000
heap
page read and write
20F4E38C000
heap
page read and write
491D000
stack
page read and write
2E34000
heap
page read and write
2E34000
heap
page read and write
20F4E398000
heap
page read and write
257CCB70000
remote allocation
page read and write
2E34000
heap
page read and write
2DE0000
heap
page read and write
4ADE000
stack
page read and write
699472C000
stack
page read and write
257CCCAD000
heap
page read and write
257C7D04000
heap
page read and write
20F4DAE9000
heap
page read and write
21471C13000
heap
page read and write
257CCB70000
trusted library allocation
page read and write
20F4E373000
heap
page read and write
1A5AC4B0000
heap
page read and write
AB3000
heap
page read and write
2E34000
heap
page read and write
496F000
trusted library allocation
page read and write
5DA000
stack
page read and write
150BEF13000
heap
page read and write
20F4DB13000
heap
page read and write
2E34000
heap
page read and write
1007F000
unkown
page readonly
20F4E394000
heap
page read and write
150BEF00000
heap
page read and write
B2F000
stack
page read and write
2E34000
heap
page read and write
1A5AC713000
heap
page read and write
4961000
heap
page read and write
21471A90000
heap
page read and write
257C7D58000
heap
page read and write
150BEE29000
heap
page read and write
1A5ACDB0000
trusted library allocation
page read and write
21471C29000
heap
page read and write
4F9F000
stack
page read and write
21472402000
trusted library allocation
page read and write
A7E000
stack
page read and write
20F4E398000
heap
page read and write
257C74A9000
heap
page read and write
538000
stack
page read and write
10000000
unkown
page readonly
F95977A000
stack
page read and write
2E34000
heap
page read and write
28D5C5E5000
heap
page read and write
3155000
heap
page read and write
1DEE6402000
trusted library allocation
page read and write
50C0000
remote allocation
page read and write
AB0000
heap
page read and write
A15000
heap
page read and write
20F4E378000
heap
page read and write
4961000
heap
page read and write
20F4E3A9000
heap
page read and write
2278F287000
heap
page read and write
20F4D9F0000
remote allocation
page read and write
7687C7B000
stack
page read and write
2FAB000
heap
page read and write
1DEE5A30000
heap
page read and write
313E000
stack
page read and write
491E000
stack
page read and write
10071000
unkown
page readonly
10036000
unkown
page readonly
257CCD04000
heap
page read and write
257C74A0000
heap
page read and write
28D5C2D0000
heap
page read and write
50C0000
remote allocation
page read and write
21471B90000
trusted library allocation
page read and write
257C748A000
heap
page read and write
51EBAFE000
stack
page read and write
20F4DA3C000
heap
page read and write
2E34000
heap
page read and write
20F4E317000
heap
page read and write
4CA1000
trusted library allocation
page read and write
There are 752 hidden memdumps, click here to show them.