IOC Report
MIpuuSiSZ4

loading gif

Files

File Path
Type
Category
Malicious
MIpuuSiSZ4.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x9bd413be, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_MIp_773949b15a9dc27bfcd3f791ccbc8dda8da3511_ceeedb37_116bd172\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_MIp_aa8bb9fdf8d32e2840ca8df43968d536d04b9a9_ceeedb37_1a1fcd1c\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER940B.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Jul 22 20:58:11 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9FD2.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Jul 22 20:58:12 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB4E2.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB764.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB89A.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBB5A.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBE49.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC0F8.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC28F.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC6A7.tmp.txt
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 61712 bytes, 1 file
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll"
malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\MIpuuSiSZ4.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AddStroke
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AddWordsToWordList
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AdviseInkChange
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\FmCnbLJkOlaRytmc\QMbXoKRooU.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\YbTPHZsAWIZFUi\eAeQcUPg.dll"
malicious
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll",#1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -pss -s 484 -p 6160 -ip 6160
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -pss -s 516 -p 3896 -ip 3896
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6160 -s 336
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 3896 -s 328
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://174.138.33.49/7
unknown
malicious
https://174.138.33.49:7080/temy
unknown
malicious
https://174.138.33.49:7080/Numv
unknown
malicious
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
https://174.138.33.49:7080/
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
https://disneyplus.com/legal.
unknown
http://crl.ver)
unknown
https://www.tiktok.com/legal/report/feedback
unknown
http://help.disneyplus.com.
unknown
https://support.hotspotshield.com/
unknown
https://174.138.33.49/
unknown
There are 5 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
32.7.0.0
unknown
United States
malicious
174.138.33.49
unknown
United States
malicious
128.7.0.0
unknown
Germany
malicious
192.168.2.7
unknown
unknown
malicious
20.7.0.0
unknown
United States
malicious
108.7.0.0
unknown
United States
malicious
80.7.0.0
unknown
United Kingdom
malicious
92.7.0.0
unknown
United Kingdom
malicious
244.6.0.0
unknown
Reserved
malicious
240.69.242.0
unknown
Reserved
malicious
184.6.0.0
unknown
United States
malicious
192.6.0.0
unknown
United States
malicious
112.7.0.0
unknown
China
malicious
64.6.0.0
unknown
United States
malicious
214.112.3.0
unknown
United States
malicious
4.7.0.0
unknown
United States
malicious
76.7.0.0
unknown
United States
malicious
96.7.0.0
unknown
United States
malicious
240.6.0.0
unknown
Reserved
malicious
243.112.3.0
unknown
Reserved
malicious
200.6.0.0
unknown
Ecuador
malicious
241.112.3.0
unknown
Reserved
malicious
124.7.0.0
unknown
India
malicious
16.7.0.0
unknown
United States
malicious
36.7.0.0
unknown
China
malicious
244.26.0.0
unknown
Reserved
malicious
192.168.2.1
unknown
unknown
127.0.0.1
unknown
unknown
There are 18 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsPeFile
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
00180008F3870B0F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
00180008F3870B0F
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100
There are 24 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1A6C0911000
direct allocation
page execute read
malicious
16A80010000
direct allocation
page execute and read and write
malicious
1411000
direct allocation
page execute read
malicious
1000000
direct allocation
page execute and read and write
malicious
1A6C0911000
direct allocation
page execute read
malicious
21313901000
direct allocation
page execute read
malicious
16A80071000
direct allocation
page execute read
malicious
2861000
direct allocation
page execute read
malicious
1A6C08B0000
direct allocation
page execute and read and write
malicious
1942A671000
direct allocation
page execute read
malicious
21313901000
direct allocation
page execute read
malicious
21313760000
direct allocation
page execute and read and write
malicious
195C58D1000
direct allocation
page execute read
malicious
1A6C08B0000
direct allocation
page execute and read and write
malicious
13B0000
direct allocation
page execute and read and write
malicious
1A6C0911000
direct allocation
page execute read
malicious
1A6C08B0000
direct allocation
page execute and read and write
malicious
21313901000
direct allocation
page execute read
malicious
195C5870000
direct allocation
page execute and read and write
malicious
21313760000
direct allocation
page execute and read and write
malicious
E78000
heap
page read and write
malicious
21313760000
direct allocation
page execute and read and write
malicious
1942A5D0000
direct allocation
page execute and read and write
malicious
3048000
heap
page read and write
E587BFB000
stack
page read and write
3875DBF000
stack
page read and write
147607A0000
heap
page read and write
138F000
heap
page read and write
19428CAA000
heap
page read and write
19428C60000
heap
page read and write
FA0000
heap
page read and write
180001000
unkown
page execute read
213137C0000
heap
page readonly
1476078E000
heap
page read and write
1475FD02000
heap
page read and write
18005D000
unkown
page readonly
300D000
heap
page read and write
21313900000
direct allocation
page read and write
1476078E000
heap
page read and write
227B6000000
heap
page read and write
1800D5000
unkown
page readonly
1475FCF3000
heap
page read and write
14760781000
heap
page read and write
1060000
heap
page readonly
23C76800000
heap
page read and write
1A6BEE40000
unkown
page read and write
10B0000
heap
page read and write
227AF800000
heap
page read and write
14760770000
heap
page read and write
74FF6FE000
stack
page read and write
22D5FF7C000
heap
page read and write
147607A5000
heap
page read and write
227B5063000
heap
page read and write
1942A660000
heap
page read and write
2AAFBB90000
heap
page read and write
1260000
heap
page readonly
97D61FF000
stack
page read and write
21313A00000
heap
page read and write
14760787000
heap
page read and write
97D56CB000
stack
page read and write
195CB7D0000
heap
page read and write
4AF47C000
stack
page read and write
F08000
heap
page read and write
2972C3DB000
heap
page read and write
1942A665000
heap
page read and write
1A6BEEB0000
heap
page read and write
22D5FD20000
trusted library allocation
page read and write
17771A50000
heap
page read and write
1476079A000
heap
page read and write
2972C3E2000
heap
page read and write
1476078C000
heap
page read and write
227B0823000
trusted library allocation
page read and write
180000000
unkown
page readonly
21313808000
heap
page read and write
B20000
remote allocation
page read and write
F75C77B000
stack
page read and write
328F000
stack
page read and write
A5B9D7F000
stack
page read and write
EE3000
heap
page read and write
213151B8000
heap
page read and write
302C000
heap
page read and write
F71636E000
stack
page read and write
29BB000
stack
page read and write
E5876DB000
stack
page read and write
180000000
unkown
page readonly
227B4F74000
trusted library allocation
page read and write
1762A7B000
stack
page read and write
1475FCAB000
heap
page read and write
1A6BEEB0000
heap
page read and write
180073000
unkown
page readonly
2972C402000
heap
page read and write
14760786000
heap
page read and write
2B73AC81000
heap
page read and write
303F000
heap
page read and write
147607C0000
heap
page read and write
3875CBC000
stack
page read and write
2972C3B0000
heap
page read and write
29822E00000
unkown
page read and write
2F1E000
stack
page read and write
16A85F68000
heap
page read and write
1A6BF270000
heap
page read and write
227B5290000
remote allocation
page read and write
213136E0000
heap
page read and write
97D617F000
stack
page read and write
288F000
direct allocation
page readonly
1A6C0970000
heap
page readonly
17630FF000
stack
page read and write
2C50000
heap
page read and write
1762EF7000
stack
page read and write
2131392F000
direct allocation
page readonly
147607A0000
heap
page read and write
3196000
heap
page read and write
180000000
unkown
page readonly
23C76913000
heap
page read and write
1476078C000
heap
page read and write
18005D000
unkown
page readonly
1476078D000
heap
page read and write
2F40000
remote allocation
page read and write
180001000
unkown
page execute read
213135A0000
heap
page read and write
1A6C0A80000
heap
page read and write
3043000
heap
page read and write
2AAFBE63000
heap
page read and write
180073000
unkown
page readonly
143E000
direct allocation
page read and write
227B4DA0000
trusted library allocation
page read and write
F0F000
heap
page read and write
F52000
heap
page read and write
29822E0D000
unkown
page read and write
4AF4FF000
stack
page read and write
16AD7DD7000
heap
page read and write
17771A02000
heap
page read and write
1800D5000
unkown
page readonly
2AAFBF08000
heap
page read and write
195C5980000
heap
page read and write
14760781000
heap
page read and write
1475FC5C000
heap
page read and write
14760C44000
heap
page read and write
1A6BEF10000
heap
page read and write
2131B116000
heap
page read and write
3056000
heap
page read and write
139D000
heap
page read and write
2AAFBE64000
heap
page read and write
227B0215000
heap
page read and write
22D5FF7C000
heap
page read and write
2F40000
remote allocation
page read and write
E58807A000
stack
page read and write
227B5080000
trusted library allocation
page read and write
227B5200000
trusted library allocation
page read and write
3197000
heap
page read and write
B20000
remote allocation
page read and write
227B4F51000
trusted library allocation
page read and write
1A6BEF1E000
heap
page read and write
F08000
heap
page read and write
1A6C0910000
direct allocation
page read and write
1475FC49000
heap
page read and write
195C3FD8000
heap
page read and write
29822CB0000
heap
page read and write
143F000
direct allocation
page readonly
2B73AD02000
heap
page read and write
2D0E000
stack
page read and write
14760798000
heap
page read and write
1395000
heap
page read and write
EDB000
heap
page read and write
E716FC000
stack
page read and write
2DAF17F000
stack
page read and write
1762DFB000
stack
page read and write
18005D000
unkown
page readonly
EB2000
heap
page read and write
1476078C000
heap
page read and write
180070000
unkown
page read and write
22D60DB0000
heap
page readonly
227B4F54000
trusted library allocation
page read and write
A5B9A7B000
stack
page read and write
1A6C08A0000
direct allocation
page execute and read and write
F75CB7F000
stack
page read and write
2AAFBE5F000
heap
page read and write
1762B7D000
stack
page read and write
227AF790000
heap
page read and write
227AF890000
heap
page read and write
13A5000
heap
page read and write
14760C19000
heap
page read and write
14760793000
heap
page read and write
2AAFBE60000
heap
page read and write
303F000
heap
page read and write
22D5FF00000
trusted library allocation
page read and write
74FF7FE000
stack
page read and write
1762CFE000
stack
page read and write
2972C40E000
heap
page read and write
227B509B000
heap
page read and write
213137C0000
heap
page readonly
14760781000
heap
page read and write
1A6BEF18000
heap
page read and write
29822E69000
heap
page read and write
14760786000
heap
page read and write
29822E13000
unkown
page read and write
288D000
direct allocation
page readonly
227B4E20000
trusted library allocation
page read and write
1475FCD0000
heap
page read and write
29823113000
heap
page read and write
2131392D000
direct allocation
page readonly
2972C402000
heap
page read and write
13A5000
heap
page read and write
227AF88B000
heap
page read and write
227AF829000
heap
page read and write
227B50F8000
heap
page read and write
304B000
heap
page read and write
97D637A000
stack
page read and write
2AAFBE5C000
heap
page read and write
21313A00000
heap
page read and write
E71B7F000
stack
page read and write
18005D000
unkown
page readonly
195C3F90000
direct allocation
page execute and read and write
3875DBF000
stack
page read and write
23C76878000
heap
page read and write
227B5020000
heap
page read and write
12BB000
heap
page read and write
177721A0000
trusted library allocation
page read and write
F7167FC000
stack
page read and write
1476079A000
heap
page read and write
2B73AC5F000
heap
page read and write
194305D3000
heap
page read and write
1A6BF275000
heap
page read and write
17771B13000
heap
page read and write
16A80000000
direct allocation
page execute and read and write
14760778000
heap
page read and write
227AF877000
heap
page read and write
180070000
unkown
page read and write
3056000
heap
page read and write
17771A55000
heap
page read and write
21313900000
direct allocation
page read and write
21313A05000
heap
page read and write
14760C02000
heap
page read and write
227B4F30000
trusted library allocation
page read and write
1308000
heap
page read and write
E71977000
stack
page read and write
1476079C000
heap
page read and write
3875D3F000
stack
page read and write
F52000
heap
page read and write
12B0000
heap
page read and write
16AD80A0000
heap
page read and write
14760788000
heap
page read and write
14760C02000
heap
page read and write
2B73AAD0000
heap
page read and write
2AAFBBA0000
heap
page read and write
1A6BF270000
heap
page read and write
F75C1CB000
stack
page read and write
227B4F70000
trusted library allocation
page read and write
31DF000
heap
page read and write
2B73AD08000
heap
page read and write
2131380E000
heap
page read and write
1476073F000
heap
page read and write
1A6C093F000
direct allocation
page readonly
2A6A000
heap
page read and write
22D60DA0000
trusted library allocation
page read and write
16A8009F000
direct allocation
page readonly
6534BBF000
stack
page read and write
1A6C0910000
direct allocation
page read and write
227B0200000
heap
page read and write
23C76700000
heap
page read and write
320E000
stack
page read and write
180000000
unkown
page readonly
16AD7CB0000
heap
page read and write
1476074F000
heap
page read and write
22D5FF37000
heap
page read and write
227AF720000
heap
page read and write
227AF874000
heap
page read and write
304B000
heap
page read and write
1800D5000
unkown
page readonly
14760778000
heap
page read and write
1800D5000
unkown
page readonly
3171000
heap
page read and write
2B73AB70000
trusted library allocation
page read and write
2D20000
heap
page read and write
147607DB000
heap
page read and write
1A6BEE40000
heap
page read and write
3057000
heap
page read and write
1475FC5B000
heap
page read and write
F69000
stack
page read and write
2972C41A000
heap
page read and write
16A8009D000
direct allocation
page readonly
2972C3F4000
heap
page read and write
1475FC39000
heap
page read and write
F71667F000
stack
page read and write
2972C3FE000
heap
page read and write
2DAF07C000
stack
page read and write
180070000
unkown
page read and write
14760793000
heap
page read and write
14760713000
heap
page read and write
21313980000
remote allocation
page read and write
14760C02000
heap
page read and write
227B5270000
trusted library allocation
page read and write
2B73B602000
trusted library allocation
page read and write
1476079A000
heap
page read and write
19428C30000
trusted library allocation
page read and write
1475FC27000
heap
page read and write
180000000
unkown
page readonly
1475FD16000
heap
page read and write
31BF000
heap
page read and write
227B4F3E000
trusted library allocation
page read and write
195C3FA0000
heap
page read and write
2131380E000
heap
page read and write
E713FE000
stack
page read and write
2E1D000
stack
page read and write
1475FC00000
heap
page read and write
2AAFBF13000
heap
page read and write
195C3F20000
heap
page read and write
2F40000
remote allocation
page read and write
1475FCC5000
heap
page read and write
180073000
unkown
page readonly
2A3C000
stack
page read and write
19428C68000
heap
page read and write
1475FCB5000
heap
page read and write
227B50FA000
heap
page read and write
29823102000
heap
page read and write
195C58FD000
direct allocation
page readonly
1476079A000
heap
page read and write
195C5872000
heap
page read and write
F75CA7D000
stack
page read and write
21313700000
heap
page read and write
14760793000
heap
page read and write
EC4000
stack
page read and write
227AF8FB000
heap
page read and write
17772202000
trusted library allocation
page read and write
3056000
heap
page read and write
3170000
heap
page read and write
2B73AD00000
heap
page read and write
16AD7DD0000
heap
page read and write
2972C41F000
heap
page read and write
1475FC29000
heap
page read and write
F7162EA000
stack
page read and write
21313A05000
heap
page read and write
227B5250000
trusted library allocation
page read and write
2972C40E000
heap
page read and write
14760C20000
heap
page read and write
97D5FFF000
stack
page read and write
3053000
heap
page read and write
1A6C0970000
heap
page readonly
22D60B70000
trusted library allocation
page read and write
21313A05000
heap
page read and write
2972C5A0000
heap
page read and write
31BF000
heap
page read and write
1A6C0A80000
heap
page read and write
180070000
unkown
page read and write
A5B9B7C000
stack
page read and write
227B50F6000
heap
page read and write
21313750000
direct allocation
page execute and read and write
23C76802000
heap
page read and write
22D5FEA9000
heap
page read and write
1A6BF275000
heap
page read and write
2AAFBE67000
heap
page read and write
1475FD08000
heap
page read and write
1320000
heap
page read and write
1070000
trusted library allocation
page read and write
330B000
stack
page read and write
1475FC38000
heap
page read and write
180073000
unkown
page readonly
E587E7F000
stack
page read and write
2B73AC80000
heap
page read and write
14760788000
heap
page read and write
18005D000
unkown
page readonly
14A5000
heap
page read and write
227B4F30000
trusted library allocation
page read and write
22D60030000
trusted library allocation
page read and write
F51000
heap
page read and write
3043000
heap
page read and write
2131392D000
direct allocation
page readonly
1476079E000
heap
page read and write
1475FC13000
heap
page read and write
A5B952B000
stack
page read and write
213136E0000
heap
page read and write
1800D5000
unkown
page readonly
2131392F000
direct allocation
page readonly
E587F7C000
stack
page read and write
4AF57F000
stack
page read and write
23C7686B000
heap
page read and write
2972C3F7000
heap
page read and write
22D60DC0000
trusted library allocation
page read and write
97D60FF000
stack
page read and write
29823002000
heap
page read and write
16AD7DDB000
heap
page read and write
17771B02000
heap
page read and write
6534B3C000
stack
page read and write
180070000
unkown
page read and write
1A6BEF10000
heap
page read and write
1200000
heap
page read and write
1A6BF270000
heap
page read and write
19428C00000
heap
page read and write
147607A1000
heap
page read and write
180000000
unkown
page readonly
3056000
heap
page read and write
180073000
unkown
page readonly
2972C5F5000
heap
page read and write
14760C03000
heap
page read and write
3056000
heap
page read and write
1800D5000
unkown
page readonly
2131392F000
direct allocation
page readonly
1A6C093D000
direct allocation
page readonly
1A6C0AA0000
remote allocation
page read and write
147604F0000
remote allocation
page read and write
227AF825000
heap
page read and write
2B73AAE0000
heap
page read and write
23C76828000
heap
page read and write
B71D479000
stack
page read and write
FC0000
heap
page read and write
22D5FF7C000
heap
page read and write
14760C02000
heap
page read and write
16A80070000
direct allocation
page read and write
17771A00000
heap
page read and write
2972C412000
heap
page read and write
2131380E000
heap
page read and write
97D667E000
stack
page read and write
17771A3C000
heap
page read and write
180000000
unkown
page readonly
EB2000
heap
page read and write
180000000
unkown
page readonly
22D5FD10000
heap
page read and write
2972C41A000
heap
page read and write
F0F000
heap
page read and write
14760786000
heap
page read and write
304B000
heap
page read and write
227B504C000
heap
page read and write
1A6BEF18000
heap
page read and write
22D5FF74000
heap
page read and write
1A6C08A0000
direct allocation
page execute and read and write
14760786000
heap
page read and write
303C000
heap
page read and write
17771A13000
heap
page read and write
227B503F000
heap
page read and write
180000000
unkown
page readonly
1302000
heap
page read and write
29823000000
heap
page read and write
19428C20000
direct allocation
page execute and read and write
227B0820000
trusted library allocation
page read and write
E5877DE000
stack
page read and write
1A6BF275000
heap
page read and write
1475FCDA000
heap
page read and write
1A6BEEB0000
heap
page read and write
17771B08000
heap
page read and write
227B0DA0000
trusted library allocation
page read and write
14760C00000
heap
page read and write
21313800000
heap
page read and write
180001000
unkown
page execute read
74FF348000
stack
page read and write
195C3FA5000
heap
page read and write
29822CC0000
trusted library allocation
page read and write
2AAFBD00000
trusted library allocation
page read and write
1475FC3C000
heap
page read and write
227AF83D000
heap
page read and write
14760781000
heap
page read and write
227B5290000
remote allocation
page read and write
2AAFBE29000
heap
page read and write
1A6BEF1E000
heap
page read and write
17771A4D000
heap
page read and write
14760602000
heap
page read and write
14760C02000
heap
page read and write
14760793000
heap
page read and write
1476079A000
heap
page read and write
227AF8AC000
heap
page read and write
147607B6000
heap
page read and write
2131392D000
direct allocation
page readonly
E71A78000
stack
page read and write
2B73AC13000
heap
page read and write
E7137E000
stack
page read and write
2972C350000
heap
page read and write
21313980000
remote allocation
page read and write
F75C47F000
stack
page read and write
180070000
unkown
page read and write
23C76900000
heap
page read and write
14760786000
heap
page read and write
2FF2000
heap
page read and write
1A6C093F000
direct allocation
page readonly
14760781000
heap
page read and write
CEAE51D000
stack
page read and write
3060000
heap
page read and write
17771A7E000
heap
page read and write
1476079C000
heap
page read and write
3875DBF000
stack
page read and write
22D5FEA5000
heap
page read and write
F75C4FE000
stack
page read and write
1270000
trusted library allocation
page read and write
213139D0000
heap
page read and write
2AAFBE13000
heap
page read and write
147607B1000
heap
page read and write
227B0313000
heap
page read and write
97D627F000
stack
page read and write
2AAFBF02000
heap
page read and write
2DAF0FF000
stack
page read and write
29822E28000
heap
page read and write
17771A8B000
heap
page read and write
1325000
heap
page read and write
2AAFBE7A000
heap
page read and write
F71677E000
stack
page read and write
17771890000
heap
page read and write
6534BBF000
stack
page read and write
1A6C093D000
direct allocation
page readonly
16A802C0000
heap
page read and write
1800D5000
unkown
page readonly
2B73AC02000
heap
page read and write
213135A0000
unkown
page read and write
23C7686A000
heap
page read and write
1A6BEF1E000
heap
page read and write
E717F9000
stack
page read and write
B71D0FC000
stack
page read and write
2FD1000
heap
page read and write
17771A4A000
heap
page read and write
180073000
unkown
page readonly
227B4F60000
trusted library allocation
page read and write
89C8000
heap
page read and write
F75C877000
stack
page read and write
19428CC4000
heap
page read and write
2B73AC29000
heap
page read and write
2972C420000
heap
page read and write
E71CFF000
unkown
page read and write
14760781000
heap
page read and write
19428C9A000
heap
page read and write
17771A70000
heap
page read and write
3875D3F000
stack
page read and write
22D60DD0000
trusted library allocation
page read and write
180073000
unkown
page readonly
97D5E7F000
stack
page read and write
195C58FF000
direct allocation
page readonly
1A6C6808000
heap
page read and write
17771900000
heap
page read and write
F0F000
heap
page read and write
E71C77000
stack
page read and write
6534E7F000
stack
page read and write
97D647A000
stack
page read and write
1476079C000
heap
page read and write
318C000
stack
page read and write
1762AFE000
stack
page read and write
F75C67E000
stack
page read and write
23C76857000
heap
page read and write
29822E3A000
heap
page read and write
180070000
unkown
page read and write
2B73AC80000
heap
page read and write
21313808000
heap
page read and write
227B50FB000
heap
page read and write
310E000
stack
page read and write
18005D000
unkown
page readonly
227B0A30000
trusted library section
page readonly
1378000
heap
page read and write
97D5F7B000
stack
page read and write
1475FCB1000
heap
page read and write
21313750000
direct allocation
page execute and read and write
B71D5F9000
stack
page read and write
303F000
heap
page read and write
1330000
heap
page read and write
21313808000
heap
page read and write
1762C7C000
stack
page read and write
1410000
direct allocation
page read and write
304A000
heap
page read and write
14760788000
heap
page read and write
2972C402000
heap
page read and write
147607A0000
heap
page read and write
1475FC66000
heap
page read and write
14A0000
heap
page read and write
EE3000
heap
page read and write
147607C1000
heap
page read and write
22D5FF30000
heap
page read and write
1942A670000
direct allocation
page read and write
1942A69D000
direct allocation
page readonly
2AAFBE85000
heap
page read and write
23C7683C000
heap
page read and write
23C77202000
trusted library allocation
page read and write
6050000
trusted library allocation
page read and write
2DAF1FE000
stack
page read and write
1942A675000
heap
page read and write
195C3FB0000
heap
page readonly
1A6C0AA0000
remote allocation
page read and write
97D5D7A000
stack
page read and write
21313700000
heap
page read and write
2B73AC3C000
heap
page read and write
1475FC64000
heap
page read and write
23C766F0000
heap
page read and write
3056000
heap
page read and write
16A8000A000
heap
page read and write
23C76760000
heap
page read and write
18005D000
unkown
page readonly
19428CA7000
heap
page read and write
227B0830000
trusted library allocation
page read and write
1475FC54000
heap
page read and write
227AF730000
heap
page read and write
2972C3FE000
heap
page read and write
2972C412000
heap
page read and write
227AF902000
heap
page read and write
EB0000
heap
page read and write
14760781000
heap
page read and write
29822F02000
trusted library allocation
page read and write
227AF857000
heap
page read and write
2C8E000
stack
page read and write
227AF813000
heap
page read and write
F5A000
heap
page read and write
29822E69000
heap
page read and write
14760781000
heap
page read and write
22D5FEA0000
heap
page read and write
227B50DB000
heap
page read and write
2972C5F0000
heap
page read and write
29823100000
heap
page read and write
19428B60000
heap
page read and write
1A6C093D000
direct allocation
page readonly
180001000
unkown
page execute read
2AAFBC00000
heap
page read and write
2972C424000
heap
page read and write
1475FBC0000
trusted library allocation
page read and write
22D5FF10000
trusted library allocation
page read and write
213139D0000
heap
page read and write
23C76813000
heap
page read and write
29823117000
heap
page read and write
1476079A000
heap
page read and write
227AF7C0000
trusted library allocation
page read and write
14760781000
heap
page read and write
309C000
heap
page read and write
147607CF000
heap
page read and write
227AF913000
heap
page read and write
180001000
unkown
page execute read
6534BBF000
stack
page read and write
227AF872000
heap
page read and write
29822E3A000
heap
page read and write
213136E0000
heap
page read and write
1A6BEED0000
heap
page read and write
2B73AC61000
heap
page read and write
2B73AC00000
heap
page read and write
14760798000
heap
page read and write
227B509F000
heap
page read and write
227B0318000
heap
page read and write
2EEF000
stack
page read and write
E587D7F000
stack
page read and write
1A6BEF18000
heap
page read and write
227B4F60000
trusted library allocation
page read and write
227AF86D000
heap
page read and write
17771A29000
heap
page read and write
227B5260000
trusted library allocation
page read and write
14760784000
heap
page read and write
227B0358000
heap
page read and write
29822F00000
trusted library allocation
page read and write
14760700000
heap
page read and write
1476079A000
heap
page read and write
180073000
unkown
page readonly
2D4F000
stack
page read and write
147607B1000
heap
page read and write
227B0A10000
trusted library section
page readonly
227B4F38000
trusted library allocation
page read and write
B71D4F9000
stack
page read and write
180070000
unkown
page read and write
F5F000
heap
page read and write
2B73AB40000
heap
page read and write
2972C3F2000
heap
page read and write
3056000
heap
page read and write
139D000
heap
page read and write
1475FC5A000
heap
page read and write
2AAFBE4D000
heap
page read and write
1942A69F000
direct allocation
page readonly
180073000
unkown
page readonly
EE3000
heap
page read and write
227B0318000
heap
page read and write
E20000
heap
page read and write
180001000
unkown
page execute read
16A800D0000
heap
page readonly
180001000
unkown
page execute read
3074000
heap
page read and write
2B73AC65000
heap
page read and write
1942ABB0000
heap
page read and write
18005D000
unkown
page readonly
F75C97F000
stack
page read and write
1475FCDA000
heap
page read and write
14760C03000
heap
page read and write
227B0A00000
trusted library section
page readonly
227B50F2000
heap
page read and write
EDB000
heap
page read and write
227B0A50000
trusted library section
page readonly
180070000
unkown
page read and write
14760711000
heap
page read and write
1A6BEED0000
heap
page read and write
14760C02000
heap
page read and write
1475FD13000
heap
page read and write
195C3F40000
heap
page read and write
1A6C08A0000
direct allocation
page execute and read and write
227B4F50000
trusted library allocation
page read and write
1A6BEE40000
unkown
page read and write
18005D000
unkown
page readonly
195C3DE0000
heap
page read and write
180001000
unkown
page execute read
F5F000
heap
page read and write
E70000
heap
page read and write
147607AD000
heap
page read and write
A5B9C7B000
stack
page read and write
227B4E10000
trusted library allocation
page read and write
1080000
trusted library allocation
page read and write
1355000
heap
page read and write
227B5290000
remote allocation
page read and write
1370000
heap
page read and write
2972C423000
heap
page read and write
1A6BEF10000
heap
page read and write
213139D0000
heap
page read and write
14760C02000
heap
page read and write
1318000
heap
page read and write
227B50E1000
heap
page read and write
E00000
heap
page read and write
2AAFBE00000
heap
page read and write
23C7686C000
heap
page read and write
FF0000
direct allocation
page execute and read and write
1475FB30000
heap
page read and write
227B5000000
heap
page read and write
6534E7F000
stack
page read and write
F90000
remote allocation
page read and write
2FD0000
heap
page read and write
195C58D0000
direct allocation
page read and write
74FF9FE000
stack
page read and write
2A50000
heap
page read and write
1475FB20000
heap
page read and write
1476079C000
heap
page read and write
17771B00000
heap
page read and write
227B0300000
heap
page read and write
23C76790000
trusted library allocation
page read and write
FD0000
heap
page read and write
195C3FD0000
heap
page read and write
16AD7DF0000
heap
page read and write
2CCF000
stack
page read and write
22D5FE50000
heap
page read and write
23C76873000
heap
page read and write
6534E7F000
stack
page read and write
1762FFF000
stack
page read and write
1475FCE0000
heap
page read and write
227AF89C000
heap
page read and write
2B73AD13000
heap
page read and write
227B50FC000
heap
page read and write
3875CBC000
stack
page read and write
1A6C0A80000
heap
page read and write
16AD80A5000
heap
page read and write
1080000
trusted library allocation
page read and write
1475FC60000
heap
page read and write
19428C9D000
heap
page read and write
1476079A000
heap
page read and write
1476078E000
heap
page read and write
14760C02000
heap
page read and write
1A6C0910000
direct allocation
page read and write
2B73AC54000
heap
page read and write
2B73AC8B000
heap
page read and write
139D000
heap
page read and write
E58775E000
stack
page read and write
2860000
direct allocation
page read and write
29822E69000
heap
page read and write
147604F0000
remote allocation
page read and write
227B5090000
trusted library allocation
page read and write
1800D5000
unkown
page readonly
F7163EF000
stack
page read and write
1A6C093F000
direct allocation
page readonly
AFA000
stack
page read and write
288E000
direct allocation
page read and write
2D23000
heap
page read and write
F59000
heap
page read and write
97D5AF8000
stack
page read and write
2FBF000
stack
page read and write
12F2000
heap
page read and write
21313800000
heap
page read and write
227B0202000
heap
page read and write
227B50AA000
heap
page read and write
2972C41A000
heap
page read and write
1240000
direct allocation
page execute and read and write
2AAFBF00000
heap
page read and write
1A6BEED0000
heap
page read and write
1A6C08AA000
heap
page read and write
31BE000
heap
page read and write
2B73AC63000
heap
page read and write
304B000
heap
page read and write
A40000
heap
page read and write
1476079A000
heap
page read and write
16AD7D20000
heap
page read and write
E587CF7000
stack
page read and write
CEAECF9000
stack
page read and write
180001000
unkown
page execute read
22D5FEF0000
trusted library allocation
page read and write
133B000
heap
page read and write
1475FC8B000
heap
page read and write
1475FB90000
heap
page read and write
29822F23000
heap
page read and write
1475FCC9000
heap
page read and write
19428C98000
heap
page read and write
14760793000
heap
page read and write
227B0801000
trusted library allocation
page read and write
13A6000
heap
page read and write
213135A0000
unkown
page read and write
21313750000
direct allocation
page execute and read and write
16AD7D40000
heap
page read and write
2972C3F6000
heap
page read and write
227B0A20000
trusted library section
page readonly
1476078E000
heap
page read and write
3875D3F000
stack
page read and write
227B5015000
heap
page read and write
3875CBC000
stack
page read and write
147607A0000
heap
page read and write
1A6C0970000
heap
page readonly
1250000
heap
page read and write
147607A0000
heap
page read and write
1475FC5F000
heap
page read and write
1270000
trusted library allocation
page read and write
213137C0000
heap
page readonly
13A5000
heap
page read and write
21313900000
direct allocation
page read and write
10B5000
heap
page read and write
74FF8FE000
stack
page read and write
227B0A40000
trusted library section
page readonly
29823013000
heap
page read and write
29822E02000
unkown
page read and write
29823102000
heap
page read and write
21313700000
heap
page read and write
6534B3C000
stack
page read and write
2972C3E7000
heap
page read and write
29822F15000
trusted library allocation
page read and write
22D5FF98000
heap
page read and write
22D5FE70000
heap
page read and write
14760784000
heap
page read and write
97D607E000
stack
page read and write
1070000
trusted library allocation
page read and write
1476079E000
heap
page read and write
CEAE8F9000
stack
page read and write
2AAFBE3C000
heap
page read and write
2972C40E000
heap
page read and write
143D000
direct allocation
page readonly
227B0302000
heap
page read and write
E10000
heap
page read and write
23C76902000
heap
page read and write
303F000
heap
page read and write
14760705000
heap
page read and write
19428C74000
heap
page read and write
3196000
heap
page read and write
1475FC61000
heap
page read and write
14760786000
heap
page read and write
147604F0000
remote allocation
page read and write
22D60E20000
trusted library allocation
page read and write
2972C412000
heap
page read and write
302C000
heap
page read and write
19428C99000
heap
page read and write
227B502E000
heap
page read and write
19428BD0000
heap
page read and write
147607B6000
heap
page read and write
29822D20000
heap
page read and write
21313800000
heap
page read and write
2972C3D0000
heap
page read and write
1475FC63000
heap
page read and write
B71D57E000
stack
page read and write
F90000
remote allocation
page read and write
E7187E000
stack
page read and write
132C000
heap
page read and write
2972C3FE000
heap
page read and write
227B5240000
trusted library allocation
page read and write
1475FC5E000
heap
page read and write
F7166F9000
stack
page read and write
2972C3E7000
heap
page read and write
227B0920000
trusted library allocation
page read and write
2AAFC602000
trusted library allocation
page read and write
19428C30000
trusted library allocation
page read and write
1800D5000
unkown
page readonly
6534B3C000
stack
page read and write
8BAE000
heap
page read and write
177718A0000
heap
page read and write
1476078A000
heap
page read and write
227AF7D0000
trusted library section
page read and write
97D5C7C000
stack
page read and write
E712FB000
stack
page read and write
21313A00000
heap
page read and write
1942A69E000
direct allocation
page read and write
There are 853 hidden memdumps, click here to show them.