IOC Report
U2ORGDN0Qn

loading gif

Files

File Path
Type
Category
Malicious
U2ORGDN0Qn.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x4b058f10, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 61712 bytes, 1 file
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\U2ORGDN0Qn.dll"
malicious
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\U2ORGDN0Qn.dll
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\U2ORGDN0Qn.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\U2ORGDN0Qn.dll,DllRegisterServer
malicious
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Snlvvhp\smhidzyomn.elm"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\U2ORGDN0Qn.dll",#1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
http://crl.ver)
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://www.tiktok.com/legal/report/feedback
unknown
http://help.disneyplus.com.
unknown
https://support.hotspotshield.com/
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
https://disneyplus.com/legal.
unknown

Domains

Name
IP
Malicious
c-0001.c-msedge.net
13.107.4.50

IPs

IP
Domain
Country
Malicious
217.182.25.250
unknown
France
malicious
156.2.3.0
unknown
United States
malicious
70.36.102.35
unknown
United States
malicious
88.147.177.0
unknown
Russian Federation
malicious
144.42.93.111
unknown
United States
malicious
161.94.3.0
unknown
Japan
malicious
192.168.2.7
unknown
unknown
malicious
224.148.177.0
unknown
Reserved
malicious
45.99.0.0
unknown
Egypt
malicious
40.67.176.0
unknown
United States
malicious
120.146.177.0
unknown
Australia
malicious
168.226.179.0
unknown
Argentina
malicious
222.2.3.0
unknown
Japan
malicious
72.3.180.0
unknown
United States
malicious
48.2.180.0
unknown
United States
malicious
168.148.177.0
unknown
United States
malicious
126.194.0.0
unknown
Japan
malicious
120.254.179.0
unknown
China
malicious
1.255.0.0
unknown
Korea Republic of
malicious
65.83.89.67
unknown
United States
malicious
207.2.3.0
unknown
United States
malicious
219.2.3.0
unknown
Japan
malicious
51.91.76.89
unknown
France
malicious
120.5.180.0
unknown
China
malicious
120.198.184.0
unknown
China
malicious
128.191.135.0
unknown
United States
malicious
72.67.111.110
unknown
United States
malicious
196.2.3.0
unknown
Mauritius
malicious
232.254.179.0
unknown
Reserved
malicious
119.193.124.41
unknown
Korea Republic of
malicious
92.240.254.110
unknown
Slovakia (SLOVAK Republic)
malicious
127.0.0.1
unknown
unknown
There are 22 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\TaskStore
Schedule Scan
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\State
BlockUntilTimeStatus
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\Configuration
refreshAfter
There are 2 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4DD1000
direct allocation
page execute read
malicious
760000
direct allocation
page execute and read and write
malicious
4E10000
direct allocation
page execute and read and write
malicious
4680000
direct allocation
page execute and read and write
malicious
46B1000
direct allocation
page execute read
malicious
C71000
direct allocation
page execute read
malicious
34F1000
direct allocation
page execute read
malicious
4E41000
direct allocation
page execute read
malicious
4DA0000
direct allocation
page execute and read and write
malicious
34C0000
direct allocation
page execute and read and write
malicious
26ACE202000
heap
page read and write
1A0382F2000
heap
page read and write
39E75FE000
stack
page read and write
4F62000
trusted library allocation
page read and write
26ACDD96000
heap
page read and write
16DDB602000
heap
page read and write
2836B260000
trusted library allocation
page read and write
26ACE202000
heap
page read and write
26325480000
heap
page read and write
16DDAB80000
trusted library allocation
page read and write
E272F79000
stack
page read and write
A74000
heap
page read and write
16DDB725000
heap
page read and write
254DEEAC000
heap
page read and write
2EDC000
stack
page read and write
26ACDDD5000
heap
page read and write
538E000
stack
page read and write
CDE000
stack
page read and write
EF89BFE000
stack
page read and write
26ACDAA0000
remote allocation
page read and write
20E233D0000
trusted library allocation
page read and write
A74000
heap
page read and write
5006000
trusted library allocation
page read and write
AE33000
trusted library allocation
page read and write
4711000
heap
page read and write
3499000
heap
page read and write
254DEE80000
heap
page read and write
75F000
stack
page read and write
4F00000
heap
page read and write
25568224000
heap
page read and write
4711000
heap
page read and write
26ACDD90000
heap
page read and write
A74000
heap
page read and write
9735BFF000
stack
page read and write
EF89AFB000
stack
page read and write
26ACDD94000
heap
page read and write
D4D000
stack
page read and write
4FB8000
trusted library allocation
page read and write
7A0000
remote allocation
page read and write
4EA0000
remote allocation
page read and write
A74000
heap
page read and write
B10A37F000
stack
page read and write
23E09002000
heap
page read and write
10001000
unkown
page execute read
26ACE202000
heap
page read and write
B3C000
heap
page read and write
B10A277000
stack
page read and write
4E50000
heap
page read and write
25568200000
heap
page read and write
26ACDD6C000
heap
page read and write
26ACDD26000
heap
page read and write
16DDB70E000
heap
page read and write
4C2E000
stack
page read and write
26ACDD86000
heap
page read and write
2504A8D7000
heap
page read and write
B18000
heap
page read and write
2204DE10000
heap
page read and write
DE4027F000
stack
page read and write
263251E0000
heap
page read and write
1A0382EB000
heap
page read and write
4711000
heap
page read and write
10001000
unkown
page execute read
20E2342A000
heap
page read and write
502C000
trusted library allocation
page read and write
255681B0000
heap
page read and write
16DDAC8D000
heap
page read and write
26ACDDC8000
heap
page read and write
4711000
heap
page read and write
10071000
unkown
page readonly
26325500000
heap
page read and write
4F9A000
trusted library allocation
page read and write
A74000
heap
page read and write
10090000
unkown
page readonly
4EA0000
remote allocation
page read and write
20E23330000
heap
page read and write
4FA5000
trusted library allocation
page read and write
EF8A17A000
stack
page read and write
A74000
heap
page read and write
16DDAC3E000
heap
page read and write
220538A2000
heap
page read and write
B5E000
heap
page read and write
4FA5000
trusted library allocation
page read and write
2504AB10000
remote allocation
page read and write
4711000
heap
page read and write
BAE000
heap
page read and write
A74000
heap
page read and write
1A03830F000
heap
page read and write
26ACD270000
heap
page read and write
28EB278000
stack
page read and write
EF8A07D000
stack
page read and write
16DDAC83000
heap
page read and write
A74000
heap
page read and write
4EFF000
stack
page read and write
D5280F7000
stack
page read and write
16DDABD0000
trusted library allocation
page read and write
1A0382E0000
heap
page read and write
2504A8C1000
heap
page read and write
4810000
trusted library allocation
page read and write
2204E08D000
heap
page read and write
16DDBE56000
heap
page read and write
EF89C7F000
stack
page read and write
2504A8C5000
heap
page read and write
B55000
heap
page read and write
39E6F4F000
stack
page read and write
25568213000
heap
page read and write
4F10000
heap
page read and write
26325468000
heap
page read and write
16DDADBF000
heap
page read and write
A1B597F000
stack
page read and write
2204E999000
heap
page read and write
A75000
heap
page read and write
26ACD24C000
heap
page read and write
4FF5000
trusted library allocation
page read and write
2204E815000
heap
page read and write
2204DFF0000
trusted library allocation
page read and write
16DDAC82000
heap
page read and write
26ACDDA3000
heap
page read and write
4711000
heap
page read and write
B70D3FE000
stack
page read and write
1A03830F000
heap
page read and write
10090000
unkown
page readonly
16DDAB50000
heap
page read and write
25568255000
heap
page read and write
26ACDDA7000
heap
page read and write
A74000
heap
page read and write
1A0381C0000
heap
page read and write
22053760000
trusted library allocation
page read and write
10001000
unkown
page execute read
26ACE200000
heap
page read and write
39E78FA000
stack
page read and write
4F03000
heap
page read and write
26ACD2AC000
heap
page read and write
26ACDAA0000
remote allocation
page read and write
2836B150000
heap
page read and write
2504A903000
heap
page read and write
20E23500000
heap
page read and write
BAE000
heap
page read and write
DE3FFFE000
stack
page read and write
26ACD24D000
heap
page read and write
16DDBE02000
heap
page read and write
23E09028000
heap
page read and write
A74000
heap
page read and write
2204EB01000
trusted library allocation
page read and write
26ACD252000
heap
page read and write
2D90000
trusted library allocation
page read and write
2205362E000
trusted library allocation
page read and write
E272B9B000
stack
page read and write
35AE000
stack
page read and write
4F9C2FE000
stack
page read and write
26ACDD78000
heap
page read and write
25568140000
heap
page read and write
20E23413000
heap
page read and write
4710000
heap
page read and write
16DDAC13000
heap
page read and write
28EB0FF000
stack
page read and write
10044000
unkown
page read and write
26ACD24F000
heap
page read and write
A74000
heap
page read and write
A74000
heap
page read and write
25D51800000
heap
page read and write
4F9A000
trusted library allocation
page read and write
A74000
heap
page read and write
2836B2D3000
heap
page read and write
973551E000
stack
page read and write
4DF2000
direct allocation
page read and write
2836B4F0000
trusted library allocation
page read and write
254DEDD0000
heap
page read and write
20E2344F000
heap
page read and write
2FFC000
stack
page read and write
4D9F000
stack
page read and write
16DDB764000
heap
page read and write
10090000
unkown
page readonly
2F50000
trusted library allocation
page read and write
4711000
heap
page read and write
26ACDDA7000
heap
page read and write
7F0C97B000
stack
page read and write
C70000
direct allocation
page read and write
26ACD2E9000
heap
page read and write
16DDACD9000
heap
page read and write
26ACDC02000
heap
page read and write
32A2000
heap
page read and write
20E23502000
heap
page read and write
D527FF9000
stack
page read and write
2504A89D000
heap
page read and write
1A038302000
heap
page read and write
4F9C3FB000
stack
page read and write
2204E900000
heap
page read and write
20E23513000
heap
page read and write
4F63000
trusted library allocation
page read and write
A74000
heap
page read and write
1004B000
unkown
page readonly
B92000
heap
page read and write
20E23340000
heap
page read and write
20E23508000
heap
page read and write
26ACDD76000
heap
page read and write
4EC0000
heap
page read and write
A74000
heap
page read and write
26ACDD5E000
heap
page read and write
7F0000
heap
page read and write
26ACDDA6000
heap
page read and write
25568302000
heap
page read and write
343A000
heap
page read and write
4F40000
trusted library allocation
page read and write
26ACE202000
heap
page read and write
EF89EFE000
stack
page read and write
26325464000
heap
page read and write
22054000000
heap
page read and write
20E233A0000
heap
page read and write
3513000
direct allocation
page read and write
254DEDF0000
heap
page read and write
973549C000
stack
page read and write
A74000
heap
page read and write
25568300000
heap
page read and write
2836B291000
heap
page read and write
26ACDD94000
heap
page read and write
3430000
heap
page read and write
2836B1E0000
heap
page read and write
2504A8D1000
heap
page read and write
A74000
heap
page read and write
4FB1000
trusted library allocation
page read and write
4570000
heap
page read and write
B92000
heap
page read and write
2504A8F1000
heap
page read and write
2204EFE0000
trusted library allocation
page read and write
16DDAC54000
heap
page read and write
1B0000
trusted library allocation
page read and write
534E000
stack
page read and write
26325466000
heap
page read and write
2504A966000
heap
page read and write
83D000
heap
page read and write
25568150000
heap
page read and write
23E09113000
heap
page read and write
4703000
heap
page read and write
4DF3000
direct allocation
page read and write
5660000
trusted library allocation
page read and write
555C000
stack
page read and write
254DF125000
heap
page read and write
60E000
stack
page read and write
B9D000
heap
page read and write
D527D7E000
stack
page read and write
2504A96B000
heap
page read and write
25D51760000
heap
page read and write
4700000
heap
page read and write
16DDAAF0000
heap
page read and write
26ACDD88000
heap
page read and write
22053856000
heap
page read and write
488F000
stack
page read and write
26ACD254000
heap
page read and write
26ACDD87000
heap
page read and write
26ACDD90000
heap
page read and write
B109EFF000
stack
page read and write
22053900000
heap
page read and write
471A000
trusted library allocation
page read and write
2204E041000
heap
page read and write
4EBD000
stack
page read and write
4E0E000
stack
page read and write
A74000
heap
page read and write
A74000
heap
page read and write
26ACDD86000
heap
page read and write
26ACDDBB000
heap
page read and write
26ACDD8A000
heap
page read and write
DE3FE7A000
stack
page read and write
A74000
heap
page read and write
4FA3000
trusted library allocation
page read and write
2836B2CC000
heap
page read and write
7FB000
heap
page read and write
4F9A000
trusted library allocation
page read and write
33B0000
heap
page read and write
10090000
unkown
page readonly
4711000
heap
page read and write
A74000
heap
page read and write
7B0000
heap
page read and write
1007F000
unkown
page readonly
A74000
heap
page read and write
1007F000
unkown
page readonly
2632545F000
heap
page read and write
3520000
heap
page read and write
26325429000
heap
page read and write
EF898FB000
stack
page read and write
502C000
trusted library allocation
page read and write
4E40000
direct allocation
page read and write
26ACD2FC000
heap
page read and write
4573000
heap
page read and write
26ACDDA5000
heap
page read and write
A74000
heap
page read and write
25D51660000
heap
page read and write
26325480000
heap
page read and write
1A0382F7000
heap
page read and write
22053770000
trusted library allocation
page read and write
A74000
heap
page read and write
2504A8B5000
heap
page read and write
16DDACE1000
heap
page read and write
2204E076000
heap
page read and write
A74000
heap
page read and write
26ACD25B000
heap
page read and write
343E000
stack
page read and write
26325250000
heap
page read and write
4F8F000
trusted library allocation
page read and write
2632546A000
heap
page read and write
1A038306000
heap
page read and write
26ACD257000
heap
page read and write
26ACDD96000
heap
page read and write
4FA5000
trusted library allocation
page read and write
26325C02000
trusted library allocation
page read and write
16DDB7D8000
heap
page read and write
2632546B000
heap
page read and write
B109E7B000
stack
page read and write
26ACD2D4000
heap
page read and write
16DDBF00000
heap
page read and write
26ACD258000
heap
page read and write
16DDAC45000
heap
page read and write
22053887000
heap
page read and write
52CF000
stack
page read and write
2504A903000
heap
page read and write
2FCE000
stack
page read and write
26ACDD89000
heap
page read and write
25568286000
heap
page read and write
2836B2D2000
heap
page read and write
2DA0000
heap
page read and write
2204E959000
heap
page read and write
4711000
heap
page read and write
22053660000
trusted library allocation
page read and write
16DDBE00000
heap
page read and write
22053902000
heap
page read and write
16DDACD1000
heap
page read and write
7A0000
remote allocation
page read and write
9735AF7000
stack
page read and write
4C4B000
stack
page read and write
10000000
unkown
page readonly
23E09013000
heap
page read and write
2204DF90000
trusted library section
page read and write
4FA0000
trusted library allocation
page read and write
790000
heap
page read and write
4711000
heap
page read and write
1007F000
unkown
page readonly
16DDBE02000
heap
page read and write
A74000
heap
page read and write
23E09100000
heap
page read and write
2204E06C000
heap
page read and write
A74000
heap
page read and write
4EB0000
heap
page read and write
808000
heap
page read and write
22053641000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
1A038305000
heap
page read and write
16DDACAE000
heap
page read and write
33C3000
heap
page read and write
39E797F000
stack
page read and write
2FB0000
heap
page read and write
EF897FA000
stack
page read and write
10000000
unkown
page readonly
2EAC000
stack
page read and write
7E0000
trusted library allocation
page read and write
A74000
heap
page read and write
53DC000
stack
page read and write
33B5000
heap
page read and write
4711000
heap
page read and write
16DDAC88000
heap
page read and write
2F80000
trusted library allocation
page read and write
26ACD2B5000
heap
page read and write
10044000
unkown
page read and write
A74000
heap
page read and write
2204DE80000
heap
page read and write
10044000
unkown
page read and write
B70D37B000
stack
page read and write
2556824F000
heap
page read and write
2836B4E0000
heap
page readonly
A74000
heap
page read and write
D5282FF000
stack
page read and write
2F18000
stack
page read and write
4E03000
heap
page read and write
1A038560000
heap
page read and write
20E2343C000
heap
page read and write
10082000
unkown
page readonly
551E000
stack
page read and write
A74000
heap
page read and write
2204F480000
trusted library allocation
page read and write
2204E098000
heap
page read and write
2204F0F0000
trusted library section
page readonly
A1B59FE000
stack
page read and write
5107000
trusted library allocation
page read and write
33FE000
stack
page read and write
16DDAC29000
heap
page read and write
A74000
heap
page read and write
4D0D000
stack
page read and write
B55000
heap
page read and write
26ACDAA0000
remote allocation
page read and write
DE3FF7E000
stack
page read and write
26ACDD94000
heap
page read and write
26ACDD96000
heap
page read and write
16DDAC6A000
heap
page read and write
4711000
heap
page read and write
512F000
trusted library allocation
page read and write
D5281F7000
stack
page read and write
46B0000
direct allocation
page read and write
4F9A000
trusted library allocation
page read and write
3239000
stack
page read and write
B09000
heap
page read and write
26ACD0D0000
heap
page read and write
2504A8F1000
heap
page read and write
A74000
heap
page read and write
23E0906F000
heap
page read and write
4FA0000
trusted library allocation
page read and write
2204E0F8000
heap
page read and write
35B7000
heap
page read and write
A74000
heap
page read and write
26ACE202000
heap
page read and write
4711000
heap
page read and write
10044000
unkown
page read and write
10071000
unkown
page readonly
B91000
heap
page read and write
A74000
heap
page read and write
4711000
heap
page read and write
28EB37C000
stack
page read and write
20E2346F000
heap
page read and write
4711000
heap
page read and write
22053780000
remote allocation
page read and write
23E08FC0000
heap
page read and write
34B4000
heap
page read and write
1007F000
unkown
page readonly
A74000
heap
page read and write
22053650000
trusted library allocation
page read and write
10048000
unkown
page read and write
323A000
heap
page read and write
D527CFE000
stack
page read and write
7F0CA7E000
stack
page read and write
16DDADED000
heap
page read and write
20E23488000
heap
page read and write
2204DFF3000
trusted library allocation
page read and write
549E000
stack
page read and write
39E73F9000
stack
page read and write
2504AB60000
heap
page read and write
28EB1FF000
stack
page read and write
2836B560000
trusted library allocation
page read and write
26ACD259000
heap
page read and write
A74000
heap
page read and write
26ACDD75000
heap
page read and write
26ACDDCB000
heap
page read and write
28EB17F000
stack
page read and write
B5E000
heap
page read and write
26ACD23C000
heap
page read and write
16DDAC86000
heap
page read and write
22053730000
trusted library allocation
page read and write
10082000
unkown
page readonly
26ACD2F7000
heap
page read and write
2504B2C1000
heap
page read and write
255681E0000
trusted library allocation
page read and write
34A1000
heap
page read and write
4FA3000
trusted library allocation
page read and write
10036000
unkown
page readonly
3530000
trusted library allocation
page read and write
26ACDD9D000
heap
page read and write
25D51805000
heap
page read and write
4D80000
heap
page read and write
4FA1000
trusted library allocation
page read and write
D5283F8000
stack
page read and write
26ACDD98000
heap
page read and write
1004B000
unkown
page readonly
26ACDD5D000
heap
page read and write
46D2000
direct allocation
page read and write
4F1E000
stack
page read and write
16DDAC36000
heap
page read and write
4FA3000
trusted library allocation
page read and write
EF892CB000
stack
page read and write
2204E056000
heap
page read and write
A74000
heap
page read and write
2204E959000
heap
page read and write
A74000
heap
page read and write
25568308000
heap
page read and write
4711000
heap
page read and write
B18000
heap
page read and write
254DED60000
heap
page read and write
A74000
heap
page read and write
2504A8DA000
heap
page read and write
2836B555000
heap
page read and write
2204E0A9000
heap
page read and write
26ACD25C000
heap
page read and write
254DEE8B000
heap
page read and write
26ACDD91000
heap
page read and write
4EDE000
stack
page read and write
10071000
unkown
page readonly
4711000
heap
page read and write
4FA5000
trusted library allocation
page read and write
34CF000
heap
page read and write
DE400FE000
stack
page read and write
4711000
heap
page read and write
541D000
stack
page read and write
4711000
heap
page read and write
25568313000
heap
page read and write
4711000
heap
page read and write
35B0000
heap
page read and write
28EB2FE000
stack
page read and write
2204F0D0000
trusted library section
page readonly
1A03831E000
heap
page read and write
50E1000
trusted library allocation
page read and write
10048000
unkown
page read and write
23E08F50000
heap
page read and write
2836B280000
heap
page read and write
A74000
heap
page read and write
B10A57F000
stack
page read and write
2204E802000
heap
page read and write
26ACDD22000
heap
page read and write
25568248000
heap
page read and write
528E000
stack
page read and write
4711000
heap
page read and write
2836C050000
trusted library allocation
page read and write
C93000
direct allocation
page read and write
26ACDD26000
heap
page read and write
22053780000
trusted library allocation
page read and write
26ACDD7C000
heap
page read and write
26ACD229000
heap
page read and write
7F0C35C000
stack
page read and write
26ACDDB0000
heap
page read and write
E272FFA000
stack
page read and write
7E0000
heap
page read and write
DE401FF000
stack
page read and write
A74000
heap
page read and write
2556827B000
heap
page read and write
4711000
heap
page read and write
2204F0E0000
trusted library section
page readonly
26ACDD5E000
heap
page read and write
3512000
direct allocation
page read and write
C92000
direct allocation
page read and write
4D90000
trusted library allocation
page read and write
16DDB700000
heap
page read and write
26ACD140000
heap
page read and write
77B000
stack
page read and write
A74000
heap
page read and write
26ACDD50000
heap
page read and write
54DF000
stack
page read and write
26ACE202000
heap
page read and write
220536F0000
trusted library allocation
page read and write
243F000
stack
page read and write
A74000
heap
page read and write
10048000
unkown
page read and write
26ACD250000
heap
page read and write
A74000
heap
page read and write
84B000
heap
page read and write
2504A8F1000
heap
page read and write
7A0000
remote allocation
page read and write
22053620000
trusted library allocation
page read and write
4711000
heap
page read and write
25568C02000
trusted library allocation
page read and write
2510000
heap
page read and write
20E2347D000
heap
page read and write
A74000
heap
page read and write
4FA3000
trusted library allocation
page read and write
26ACDDA7000
heap
page read and write
26ACDD75000
heap
page read and write
4FA0000
trusted library allocation
page read and write
16DDAC51000
heap
page read and write
26ACDD5D000
heap
page read and write
330F000
stack
page read and write
10036000
unkown
page readonly
26ACDDBF000
heap
page read and write
26ACDDA9000
heap
page read and write
26ACE202000
heap
page read and write
10048000
unkown
page read and write
4CCC000
stack
page read and write
22053628000
trusted library allocation
page read and write
BAE000
heap
page read and write
A74000
heap
page read and write
4E10000
trusted library allocation
page read and write
1004B000
unkown
page readonly
D52847F000
unkown
page read and write
2204E029000
heap
page read and write
26ACDD64000
heap
page read and write
97359FB000
stack
page read and write
33DA000
heap
page read and write
4F9C6FE000
stack
page read and write
10082000
unkown
page readonly
A74000
heap
page read and write
26ACD2EA000
heap
page read and write
26ACDD96000
heap
page read and write
2205383E000
heap
page read and write
3210000
trusted library allocation
page read and write
A74000
heap
page read and write
4711000
heap
page read and write
16DDACE5000
heap
page read and write
2556823C000
heap
page read and write
7F0CB7B000
stack
page read and write
4E00000
heap
page read and write
9EF000
stack
page read and write
16DDACCB000
heap
page read and write
34BF000
stack
page read and write
2504A8B5000
heap
page read and write
2FE5000
heap
page read and write
A74000
heap
page read and write
A74000
heap
page read and write
26ACDD9D000
heap
page read and write
2F90000
heap
page read and write
22053490000
trusted library allocation
page read and write
2836B4D0000
trusted library allocation
page read and write
2204E073000
heap
page read and write
26ACD316000
heap
page read and write
B109F7E000
stack
page read and write
22053814000
heap
page read and write
DE4007B000
stack
page read and write
DE4017C000
stack
page read and write
16DDBF02000
heap
page read and write
3310000
heap
page read and write
527E000
stack
page read and write
1007F000
unkown
page readonly
6D0000
heap
page read and write
25D51668000
heap
page read and write
22053740000
trusted library allocation
page read and write
26ACDD26000
heap
page read and write
2504A8B1000
heap
page read and write
16DDAC4C000
heap
page read and write
25D51640000
heap
page read and write
26325488000
heap
page read and write
D00000
heap
page read and write
26ACDD77000
heap
page read and write
16DDAC5E000
heap
page read and write
22053640000
trusted library allocation
page read and write
B70CEAC000
stack
page read and write
EF89E79000
stack
page read and write
26ACD170000
trusted library allocation
page read and write
2836B550000
heap
page read and write
22053480000
trusted library allocation
page read and write
338A000
heap
page read and write
16DDAC7C000
heap
page read and write
A74000
heap
page read and write
A74000
heap
page read and write
2504A870000
heap
page read and write
2204F100000
trusted library section
page readonly
1004B000
unkown
page readonly
4711000
heap
page read and write
16DDAC6D000
heap
page read and write
33D1000
heap
page read and write
A74000
heap
page read and write
26ACDD5D000
heap
page read and write
16DDBE0C000
heap
page read and write
A74000
heap
page read and write
3230000
heap
page read and write
2504A8C1000
heap
page read and write
26ACE244000
heap
page read and write
16DDBE16000
heap
page read and write
1A03830F000
heap
page read and write
1A0381E0000
heap
page read and write
E27307E000
stack
page read and write
A74000
heap
page read and write
3380000
heap
page read and write
26ACDD75000
heap
page read and write
1A0382F7000
heap
page read and write
2504AB10000
remote allocation
page read and write
A74000
heap
page read and write
2204E800000
heap
page read and write
3370000
trusted library allocation
page read and write
E2730F9000
stack
page read and write
22053780000
remote allocation
page read and write
20E23451000
heap
page read and write
973559D000
stack
page read and write
2504A878000
heap
page read and write
ACEE000
trusted library allocation
page read and write
2504A810000
heap
page read and write
AB0000
heap
page read and write
2E40000
heap
page read and write
10001000
unkown
page execute read
84B000
heap
page read and write
25D51510000
heap
page read and write
2205384B000
heap
page read and write
10044000
unkown
page read and write
BAE000
heap
page read and write
2526000
trusted library allocation
page read and write
4F9C5FF000
stack
page read and write
39E76FB000
stack
page read and write
10071000
unkown
page readonly
B10A17C000
stack
page read and write
26ACDD75000
heap
page read and write
26ACDD71000
heap
page read and write
2504A969000
heap
page read and write
4E63000
direct allocation
page read and write
A74000
heap
page read and write
4711000
heap
page read and write
4F20000
trusted library allocation
page read and write
2836B2D2000
heap
page read and write
2504A8B1000
heap
page read and write
16DDBE43000
heap
page read and write
2504AB10000
remote allocation
page read and write
4711000
heap
page read and write
26ACD2E7000
heap
page read and write
A74000
heap
page read and write
2504A8C5000
heap
page read and write
26ACDD19000
heap
page read and write
16DDB738000
heap
page read and write
2E70000
heap
page read and write
2504A7F0000
heap
page read and write
16DDBE14000
heap
page read and write
B55000
heap
page read and write
16DDAD13000
heap
page read and write
4D90000
trusted library allocation
page read and write
A1B555A000
stack
page read and write
2204E113000
heap
page read and write
4600000
trusted library allocation
page read and write
B3A000
heap
page read and write
1A03831F000
heap
page read and write
2504A8DF000
heap
page read and write
2FE0000
heap
page read and write
46D3000
direct allocation
page read and write
A74000
heap
page read and write
4711000
heap
page read and write
2204DE20000
heap
page read and write
A74000
heap
page read and write
512F000
trusted library allocation
page read and write
26ACE202000
heap
page read and write
2DA8000
heap
page read and write
A74000
heap
page read and write
A74000
heap
page read and write
26ACD2C7000
heap
page read and write
4F9C0FD000
stack
page read and write
25568249000
heap
page read and write
2204E102000
heap
page read and write
39E72FC000
stack
page read and write
26ACDD5E000
heap
page read and write
22053510000
trusted library allocation
page read and write
23E09056000
heap
page read and write
4711000
heap
page read and write
4F9A000
trusted library allocation
page read and write
2204F110000
trusted library section
page readonly
2836B250000
trusted library allocation
page read and write
10000000
unkown
page readonly
10082000
unkown
page readonly
B10A47C000
stack
page read and write
2504A6B0000
heap
page read and write
2836B1C0000
heap
page read and write
26ACDDA9000
heap
page read and write
22053780000
remote allocation
page read and write
A74000
heap
page read and write
22053863000
heap
page read and write
26ACD302000
heap
page read and write
4711000
heap
page read and write
A1B58FE000
stack
page read and write
E0000
heap
page read and write
10036000
unkown
page readonly
16DDAB00000
heap
page read and write
4711000
heap
page read and write
2632543C000
heap
page read and write
DE3FEFE000
stack
page read and write
4ED0000
heap
page read and write
AE7A000
trusted library allocation
page read and write
4711000
heap
page read and write
16DDACB7000
heap
page read and write
BAE000
heap
page read and write
4711000
heap
page read and write
64E000
stack
page read and write
22053650000
trusted library allocation
page read and write
39E6ECC000
stack
page read and write
26ACD313000
heap
page read and write
10036000
unkown
page readonly
484E000
stack
page read and write
A74000
heap
page read and write
26ACD200000
heap
page read and write
26ACDD94000
heap
page read and write
26325453000
heap
page read and write
16DDACBD000
heap
page read and write
2504A8D1000
heap
page read and write
10082000
unkown
page readonly
26325508000
heap
page read and write
26ACDD1B000
heap
page read and write
4C6E000
stack
page read and write
4EAE000
stack
page read and write
2204E071000
heap
page read and write
20E23400000
heap
page read and write
1A038304000
heap
page read and write
16DDADFD000
heap
page read and write
10001000
unkown
page execute read
8484000
trusted library allocation
page read and write
A74000
heap
page read and write
4ED5000
trusted library allocation
page read and write
35E0000
heap
page read and write
26325413000
heap
page read and write
4720000
heap
page read and write
B70D2FF000
stack
page read and write
4F41000
trusted library allocation
page read and write
4711000
heap
page read and write
39E74FC000
stack
page read and write
10036000
unkown
page readonly
A74000
heap
page read and write
A74000
heap
page read and write
22053800000
heap
page read and write
2836B559000
heap
page read and write
4711000
heap
page read and write
10071000
unkown
page readonly
295E000
stack
page read and write
B14000
heap
page read and write
7F0C87B000
stack
page read and write
26ACD0E0000
heap
page read and write
23E09000000
heap
page read and write
EF89CFE000
stack
page read and write
EF896F8000
stack
page read and write
34F0000
direct allocation
page read and write
254DF120000
heap
page read and write
26ACDDA9000
heap
page read and write
2205381F000
heap
page read and write
539F000
stack
page read and write
D527C7B000
stack
page read and write
26325350000
trusted library allocation
page read and write
A74000
heap
page read and write
16DDB713000
heap
page read and write
A74000
heap
page read and write
A74000
heap
page read and write
335E000
stack
page read and write
10000000
unkown
page readonly
22053750000
trusted library allocation
page read and write
1004B000
unkown
page readonly
A74000
heap
page read and write
22053500000
trusted library allocation
page read and write
A74000
heap
page read and write
2836B160000
trusted library allocation
page read and write
23E09A02000
trusted library allocation
page read and write
A74000
heap
page read and write
26ACDD97000
heap
page read and write
23E09040000
heap
page read and write
16DDBE19000
heap
page read and write
26ACDD94000
heap
page read and write
3473000
heap
page read and write
9735CFE000
stack
page read and write
4711000
heap
page read and write
14C000
stack
page read and write
4FCE000
trusted library allocation
page read and write
4711000
heap
page read and write
EF899FF000
stack
page read and write
26ACDD00000
heap
page read and write
20E23E02000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
4FA3000
trusted library allocation
page read and write
2204DF80000
trusted library allocation
page read and write
BF0000
trusted library allocation
page read and write
20E23449000
heap
page read and write
26ACDDA7000
heap
page read and write
4711000
heap
page read and write
4E62000
direct allocation
page read and write
2EEA000
stack
page read and write
220538EB000
heap
page read and write
2836C260000
trusted library allocation
page read and write
26ACD255000
heap
page read and write
52BF000
stack
page read and write
2836B270000
trusted library allocation
page read and write
A74000
heap
page read and write
20E2344D000
heap
page read and write
26ACD2E1000
heap
page read and write
20E2344B000
heap
page read and write
A74000
heap
page read and write
4FA3000
trusted library allocation
page read and write
39E77FF000
stack
page read and write
A74000
heap
page read and write
2836B2CB000
heap
page read and write
B3C000
heap
page read and write
2632548E000
heap
page read and write
4711000
heap
page read and write
4F8F000
trusted library allocation
page read and write
A74000
heap
page read and write
B55000
heap
page read and write
26ACDD7A000
heap
page read and write
4E4E000
stack
page read and write
22053620000
trusted library allocation
page read and write
540C000
stack
page read and write
A74000
heap
page read and write
B18000
heap
page read and write
4711000
heap
page read and write
26ACDD96000
heap
page read and write
2204E013000
heap
page read and write
26ACE202000
heap
page read and write
A74000
heap
page read and write
2836B289000
heap
page read and write
16DDAC94000
heap
page read and write
23E09102000
heap
page read and write
16DDB7F5000
heap
page read and write
A74000
heap
page read and write
B10A07B000
stack
page read and write
4711000
heap
page read and write
EF8A37E000
stack
page read and write
2504A8A1000
heap
page read and write
B3A000
heap
page read and write
4F8F000
trusted library allocation
page read and write
2204E088000
heap
page read and write
A74000
heap
page read and write
A74000
heap
page read and write
4E50000
heap
page read and write
2504B2C0000
heap
page read and write
650000
heap
page read and write
EF89F7E000
stack
page read and write
AF5000
heap
page read and write
26ACE203000
heap
page read and write
1A038090000
heap
page read and write
4CAF000
stack
page read and write
4EA0000
remote allocation
page read and write
26ACDDBB000
heap
page read and write
26ACD308000
heap
page read and write
A74000
heap
page read and write
4D4B000
stack
page read and write
1A038565000
heap
page read and write
2836B500000
trusted library allocation
page read and write
73C000
stack
page read and write
26325462000
heap
page read and write
2205382D000
heap
page read and write
220538F0000
heap
page read and write
26ACDD71000
heap
page read and write
16DDAC61000
heap
page read and write
22053664000
trusted library allocation
page read and write
220538F6000
heap
page read and write
26ACE220000
heap
page read and write
847000
heap
page read and write
4F9C07B000
stack
page read and write
2204E902000
heap
page read and write
4FA000
stack
page read and write
33CE000
heap
page read and write
16DDAC00000
heap
page read and write
4F1C000
trusted library allocation
page read and write
10090000
unkown
page readonly
26ACD2C1000
heap
page read and write
10000000
unkown
page readonly
22053644000
trusted library allocation
page read and write
2504A903000
heap
page read and write
2204F461000
trusted library allocation
page read and write
2204E000000
heap
page read and write
4FCE000
trusted library allocation
page read and write
A74000
heap
page read and write
26ACD213000
heap
page read and write
26ACDDA7000
heap
page read and write
28EB07A000
stack
page read and write
3440000
heap
page read and write
2504A8D7000
heap
page read and write
26ACD28A000
heap
page read and write
16DDADF5000
heap
page read and write
26ACDD73000
heap
page read and write
2204F0C0000
trusted library section
page readonly
2204E09A000
heap
page read and write
26ACD24B000
heap
page read and write
4D83000
heap
page read and write
26ACE202000
heap
page read and write
26ACDD75000
heap
page read and write
3276000
heap
page read and write
16DDBF0A000
heap
page read and write
A74000
heap
page read and write
356F000
stack
page read and write
A74000
heap
page read and write
26ACDD71000
heap
page read and write
535E000
stack
page read and write
263251F0000
heap
page read and write
26ACDD82000
heap
page read and write
B18000
heap
page read and write
26ACDD68000
heap
page read and write
A70000
heap
page read and write
A74000
heap
page read and write
4F9C17E000
stack
page read and write
D527EFE000
stack
page read and write
DE402FF000
stack
page read and write
16DDAC31000
heap
page read and write
655000
heap
page read and write
EF89D7F000
stack
page read and write
4DD0000
direct allocation
page read and write
4711000
heap
page read and write
26ACD302000
heap
page read and write
26ACD2AB000
heap
page read and write
2204E913000
heap
page read and write
26ACDD8A000
heap
page read and write
26ACDD5D000
heap
page read and write
26325502000
heap
page read and write
2504AB65000
heap
page read and write
523F000
stack
page read and write
A678000
trusted library allocation
page read and write
2204E126000
heap
page read and write
26ACDD98000
heap
page read and write
23E08F60000
heap
page read and write
4C0D000
stack
page read and write
A74000
heap
page read and write
23E08FF0000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
2556826E000
heap
page read and write
4711000
heap
page read and write
16DDADAA000
heap
page read and write
26ACDD93000
heap
page read and write
4711000
heap
page read and write
16DDAC9C000
heap
page read and write
10048000
unkown
page read and write
ABA000
heap
page read and write
4FA5000
trusted library allocation
page read and write
B3C000
heap
page read and write
4F9C4F7000
stack
page read and write
4F70000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
26325400000
heap
page read and write
2204E918000
heap
page read and write
50E0000
trusted library allocation
page read and write
4711000
heap
page read and write
26ACDD72000
heap
page read and write
A74000
heap
page read and write
220538D8000
heap
page read and write
26325513000
heap
page read and write
26ACDD76000
heap
page read and write
53CE000
stack
page read and write
B3C000
heap
page read and write
A74000
heap
page read and write
4C8D000
stack
page read and write
There are 996 hidden memdumps, click here to show them.