IOC Report
548IrCt4hj

loading gif

Files

File Path
Type
Category
Malicious
548IrCt4hj.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x9292e26a, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\548IrCt4hj.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\548IrCt4hj.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllCanUnloadNow
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZPLPsNKH\eFntQ.dll"
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllGetClassObject
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllRegisterServer
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\548IrCt4hj.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\548IrCt4hj.dll",#1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://174.138.33.49/Z
unknown
malicious
https://174.138.33.49:7080/F
unknown
malicious
https://174.138.33.49:7080/Only
unknown
malicious
https://174.138.33.49:7080/r
unknown
malicious
https://174.138.33.49:7080/p
unknown
malicious
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://174.138.33.49:7080/
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
https://disneyplus.com/legal.
unknown
http://crl.ver)
unknown
https://www.tiktok.com/legal/report/feedback
unknown
http://help.disneyplus.com.
unknown
https://support.hotspotshield.com/
unknown
https://174.138.33.49/
unknown
There are 6 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
157.230.99.206
unknown
United States
malicious
157.245.111.0
unknown
United States
malicious
54.37.106.167
unknown
France
malicious
188.165.79.151
unknown
France
malicious
202.29.239.162
unknown
Thailand
malicious
174.138.33.49
unknown
United States
malicious
43.129.209.178
unknown
Japan
malicious
103.41.204.169
unknown
Indonesia
malicious
5.253.30.17
unknown
Latvia
malicious
85.214.67.203
unknown
Germany
malicious
103.56.149.105
unknown
Indonesia
malicious
83.229.80.93
unknown
United Kingdom
malicious
85.25.120.45
unknown
Germany
malicious
198.199.70.22
unknown
United States
malicious
37.187.114.15
unknown
France
malicious
93.104.209.107
unknown
Germany
malicious
175.126.176.79
unknown
Korea Republic of
malicious
139.196.72.155
unknown
China
malicious
128.199.242.164
unknown
United Kingdom
malicious
165.232.185.110
unknown
United States
malicious
104.248.225.227
unknown
United States
malicious
178.238.225.252
unknown
Germany
malicious
128.199.217.206
unknown
United Kingdom
malicious
190.145.8.4
unknown
Colombia
malicious
103.224.241.74
unknown
India
malicious
103.71.99.57
unknown
India
malicious
190.107.19.179
unknown
Colombia
malicious
210.57.209.142
unknown
Indonesia
malicious
202.28.34.99
unknown
Thailand
malicious
87.106.97.83
unknown
Germany
malicious
103.254.12.236
unknown
Viet Nam
malicious
103.85.95.4
unknown
Indonesia
malicious
54.37.228.122
unknown
France
malicious
202.134.4.210
unknown
Indonesia
malicious
88.217.172.165
unknown
Germany
malicious
195.77.239.39
unknown
Spain
malicious
78.47.204.80
unknown
Germany
malicious
139.59.80.108
unknown
Singapore
malicious
104.244.79.94
unknown
United States
malicious
37.44.244.177
unknown
Germany
malicious
178.62.112.199
unknown
European Union
malicious
64.227.55.231
unknown
United States
malicious
192.168.2.1
unknown
unknown
127.0.0.1
unknown
unknown
There are 34 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100

Memdumps

Base Address
Regiontype
Protect
Malicious
1E034440000
direct allocation
page execute and read and write
malicious
C20000
direct allocation
page execute and read and write
malicious
1120000
direct allocation
page execute and read and write
malicious
1F33EB00000
direct allocation
page execute and read and write
malicious
24B1000
direct allocation
page execute read
malicious
1F33EC51000
direct allocation
page execute read
malicious
1E034471000
direct allocation
page execute read
malicious
1151000
direct allocation
page execute read
malicious
AEB000
heap
page read and write
malicious
20D64040000
heap
page read and write
1F33EB30000
heap
page readonly
740437B000
stack
page read and write
5763D77000
stack
page read and write
17EF4181000
heap
page read and write
20ADC7B3000
heap
page read and write
15F2D57B000
heap
page read and write
25FAEAB0000
heap
page read and write
E48A97E000
stack
page read and write
15F2CC71000
heap
page read and write
2582EC70000
heap
page read and write
18008C000
unkown
page readonly
21816E26000
heap
page read and write
18894A9D000
heap
page read and write
15F2D402000
heap
page read and write
1E034195000
heap
page read and write
21816BD0000
heap
page read and write
1E0343E0000
heap
page read and write
15F2CC51000
heap
page read and write
15F2D576000
heap
page read and write
15F2D585000
heap
page read and write
1D31E950000
trusted library allocation
page read and write
C75000
heap
page read and write
1D31EA56000
heap
page read and write
5763C7F000
stack
page read and write
2582E9BC000
heap
page read and write
BEEEE7B000
stack
page read and write
2582E9DB000
heap
page read and write
1800B5000
unkown
page readonly
4E0AB5E000
stack
page read and write
15F2D598000
heap
page read and write
18894A47000
heap
page read and write
15F2CCE5000
heap
page read and write
18893456000
heap
page read and write
1E650229000
heap
page read and write
2EA6BFF000
stack
page read and write
15F2CCE8000
heap
page read and write
15F2CCF8000
heap
page read and write
18894A00000
heap
page read and write
1D31EB13000
heap
page read and write
17EF4110000
heap
page read and write
E48A59B000
stack
page read and write
21816D70000
heap
page read and write
15F2D57E000
heap
page read and write
2890000
heap
page read and write
C405AFE000
stack
page read and write
29EE2506000
heap
page read and write
29EE24F9000
heap
page read and write
188934EC000
heap
page read and write
20D6427E000
heap
page read and write
29EE5920000
heap
page read and write
15F2D599000
heap
page read and write
21816E09000
heap
page read and write
18893400000
heap
page read and write
15F2CC00000
heap
page read and write
1E650266000
heap
page read and write
2582E935000
heap
page read and write
180000000
unkown
page readonly
1E650269000
heap
page read and write
2880000
remote allocation
page read and write
1889342A000
heap
page read and write
2582F090000
remote allocation
page read and write
15F2D59A000
heap
page read and write
233737DB000
heap
page read and write
18000A000
unkown
page execute read
740407C000
stack
page read and write
15F2CC53000
heap
page read and write
1E034190000
heap
page read and write
20D6426E000
heap
page read and write
29EE2710000
heap
page read and write
15F2D3F0000
remote allocation
page read and write
15F2D586000
heap
page read and write
2EA74FB000
stack
page read and write
29EE2502000
heap
page read and write
E80000
trusted library allocation
page read and write
18893F13000
heap
page read and write
15F2D5BB000
heap
page read and write
15F2CBE0000
trusted library allocation
page read and write
2582E91D000
heap
page read and write
15F2D5A8000
heap
page read and write
18008C000
unkown
page readonly
15F2D577000
heap
page read and write
1800BB000
unkown
page readonly
18894B02000
heap
page read and write
188934B9000
heap
page read and write
25FAEC4B000
heap
page read and write
18893F18000
heap
page read and write
17EF4170000
heap
page read and write
4E0B077000
stack
page read and write
2ABA8FE000
stack
page read and write
15F2D57D000
heap
page read and write
15F2D584000
heap
page read and write
1800BB000
unkown
page readonly
C50000
heap
page readonly
15F2D581000
heap
page read and write
20D64300000
heap
page read and write
15F2CC50000
heap
page read and write
15F2D51B000
heap
page read and write
15F2D582000
heap
page read and write
18894A9A000
heap
page read and write
1E65025A000
heap
page read and write
15F2D581000
heap
page read and write
5763E7E000
stack
page read and write
15F2CCB0000
heap
page read and write
17EF41B2000
heap
page read and write
15F2D58B000
heap
page read and write
1F33EAF0000
direct allocation
page execute and read and write
C40531B000
stack
page read and write
29EE2715000
heap
page read and write
2582F400000
heap
page read and write
15F2D574000
heap
page read and write
1D31EA3C000
heap
page read and write
15F2D583000
heap
page read and write
18893507000
heap
page read and write
C405BFF000
stack
page read and write
E9B000
heap
page read and write
1E650200000
heap
page read and write
2582E9BC000
heap
page read and write
15F2D58B000
heap
page read and write
7404477000
stack
page read and write
21816DF7000
heap
page read and write
1CF60190000
heap
page read and write
B4B000
heap
page read and write
18898E50000
trusted library allocation
page read and write
2EA71FA000
stack
page read and write
1CF601F8000
heap
page read and write
F72F67E000
stack
page read and write
1185000
heap
page read and write
2582E9BA000
heap
page read and write
28EF000
stack
page read and write
F72F77F000
stack
page read and write
233737D0000
heap
page read and write
5885C7C000
stack
page read and write
15F2D5B0000
heap
page read and write
25FAEC4D000
heap
page read and write
15F2D5A2000
heap
page read and write
2E43AFB000
stack
page read and write
1E035E20000
heap
page read and write
180000000
unkown
page readonly
15F2D589000
heap
page read and write
117F000
direct allocation
page readonly
15F2D586000
heap
page read and write
21816E1E000
heap
page read and write
2880000
remote allocation
page read and write
2820000
trusted library allocation
page read and write
188934AD000
heap
page read and write
15F2CC3C000
heap
page read and write
15F2D3F0000
remote allocation
page read and write
2ABA87D000
stack
page read and write
1C2E8820000
trusted library allocation
page read and write
18894A54000
heap
page read and write
2EA78FD000
stack
page read and write
15F2D59B000
heap
page read and write
17EF419F000
heap
page read and write
25FAED08000
heap
page read and write
15F2D5A8000
heap
page read and write
20D64A02000
trusted library allocation
page read and write
1E650268000
heap
page read and write
1CF60480000
heap
page read and write
18898D2E000
trusted library allocation
page read and write
15F2D581000
heap
page read and write
18898E30000
trusted library allocation
page read and write
1C2E84C0000
trusted library allocation
page read and write
2181A7F0000
heap
page read and write
17EF41A1000
heap
page read and write
2582E9DD000
heap
page read and write
18893DF0000
trusted library allocation
page read and write
B21000
heap
page read and write
2582E953000
heap
page read and write
F72F3FB000
stack
page read and write
15F2DA44000
heap
page read and write
18894AD7000
heap
page read and write
15F2D589000
heap
page read and write
188934BB000
heap
page read and write
18898DF0000
trusted library allocation
page read and write
1E65025C000
heap
page read and write
2582F401000
heap
page read and write
2582E926000
heap
page read and write
18898E60000
trusted library allocation
page read and write
29EE40C0000
heap
page read and write
2582E979000
heap
page read and write
2582E9BA000
heap
page read and write
2582E979000
heap
page read and write
2EA73FA000
stack
page read and write
1E650A02000
trusted library allocation
page read and write
64EF2F9000
stack
page read and write
1F33ED20000
heap
page read and write
15F2D586000
heap
page read and write
1778DCC000
stack
page read and write
2582E8F0000
heap
page read and write
23373690000
heap
page read and write
1150000
direct allocation
page read and write
2EA7AFE000
stack
page read and write
2ABA58C000
stack
page read and write
588578F000
stack
page read and write
15F2D598000
heap
page read and write
88D0000
heap
page read and write
21816E03000
heap
page read and write
15F2D585000
heap
page read and write
28B8000
heap
page read and write
1C2E8420000
heap
page read and write
18893E15000
heap
page read and write
18894A47000
heap
page read and write
18893413000
heap
page read and write
18893DF3000
trusted library allocation
page read and write
1800B1000
unkown
page read and write
21816E0D000
heap
page read and write
1F33EC7F000
direct allocation
page readonly
15F2CCCD000
heap
page read and write
15F2CCE9000
heap
page read and write
5763BFB000
stack
page read and write
64EF479000
stack
page read and write
15F2D51D000
heap
page read and write
15F2D574000
heap
page read and write
20D64250000
heap
page read and write
E90000
heap
page read and write
1D31EA4D000
heap
page read and write
18894AF8000
heap
page read and write
29EE2511000
heap
page read and write
188934B8000
heap
page read and write
2582E90A000
heap
page read and write
7C0000
remote allocation
page read and write
1E650257000
heap
page read and write
20D64308000
heap
page read and write
18898D40000
trusted library allocation
page read and write
1CF60485000
heap
page read and write
C4059F7000
stack
page read and write
603F27A000
stack
page read and write
21819FE0000
heap
page read and write
15F2D58C000
heap
page read and write
20ADC550000
heap
page read and write
1C2E9310000
trusted library allocation
page read and write
18894C00000
trusted library allocation
page read and write
21816E09000
heap
page read and write
1CF601F0000
heap
page read and write
20D641B0000
trusted library allocation
page read and write
15F2CD16000
heap
page read and write
1C2E8750000
trusted library allocation
page read and write
18898E80000
remote allocation
page read and write
17EF41B0000
heap
page read and write
21816DFA000
heap
page read and write
18898DF0000
trusted library allocation
page read and write
15F2D58A000
heap
page read and write
15F2D5A9000
heap
page read and write
18894A65000
heap
page read and write
21816E04000
heap
page read and write
1889349C000
heap
page read and write
15F2DA20000
heap
page read and write
18898D28000
trusted library allocation
page read and write
BEEE9EA000
stack
page read and write
1C2E84B0000
trusted library allocation
page read and write
180088000
unkown
page execute read
1889347F000
heap
page read and write
25FAED00000
heap
page read and write
15F2DA02000
heap
page read and write
20ADC7AD000
heap
page read and write
20D640B0000
heap
page read and write
1D31EB02000
heap
page read and write
1D31EB00000
heap
page read and write
5885A7E000
stack
page read and write
15F2D5A2000
heap
page read and write
21816DFE000
heap
page read and write
15F2D57B000
heap
page read and write
281E000
stack
page read and write
4E0AADC000
stack
page read and write
25FAEC00000
heap
page read and write
2E43CFB000
stack
page read and write
15F2D5A9000
heap
page read and write
15F2D5A9000
heap
page read and write
15F2D597000
heap
page read and write
15F2CA80000
heap
page read and write
15F2D59B000
heap
page read and write
1D31EA63000
heap
page read and write
20D64313000
heap
page read and write
1C2E8740000
heap
page readonly
18898F70000
trusted library allocation
page read and write
2860000
heap
page read and write
15F2DA02000
heap
page read and write
21816E04000
heap
page read and write
25FAEA50000
heap
page read and write
180007000
unkown
page execute read
29EE24E0000
heap
page read and write
F34000
heap
page read and write
C10000
direct allocation
page execute and read and write
1E6500A0000
heap
page read and write
B0002CC000
stack
page read and write
20D6423C000
heap
page read and write
17EF41B4000
heap
page read and write
2ABA97E000
stack
page read and write
15F2D54C000
heap
page read and write
15F2D572000
heap
page read and write
15F2D57C000
heap
page read and write
29EE24E8000
heap
page read and write
15F2DA19000
heap
page read and write
15F2CC29000
heap
page read and write
EBE000
heap
page read and write
29EE6130000
heap
page read and write
1F33EAA0000
heap
page read and write
1C2E8730000
trusted library allocation
page read and write
F72F6FF000
stack
page read and write
1C2E87B0000
trusted library allocation
page read and write
1800B5000
unkown
page readonly
29EE2490000
heap
page read and write
5885BFF000
stack
page read and write
588570A000
stack
page read and write
2582E935000
heap
page read and write
29EE24FD000
heap
page read and write
18894AA9000
heap
page read and write
1E650313000
heap
page read and write
21816E27000
heap
page read and write
BEEECFE000
stack
page read and write
15F2D5AA000
heap
page read and write
18894AB0000
heap
page read and write
15F2D57C000
heap
page read and write
15F2CC4D000
heap
page read and write
188933B0000
trusted library allocation
page read and write
15F2DA02000
heap
page read and write
18893F02000
heap
page read and write
21816E0D000
heap
page read and write
18893E00000
heap
page read and write
15F2D572000
heap
page read and write
17EF41A1000
heap
page read and write
20ADC690000
heap
page read and write
2582E953000
heap
page read and write
1E03449D000
direct allocation
page readonly
B75000
heap
page read and write
18894B00000
heap
page read and write
2582EC75000
heap
page read and write
18893F18000
heap
page read and write
15F2D57B000
heap
page read and write
8419000
heap
page read and write
A30000
heap
page read and write
2EA6F78000
stack
page read and write
740467A000
stack
page read and write
15F2D526000
heap
page read and write
24DD000
direct allocation
page readonly
117D000
direct allocation
page readonly
17EF4192000
heap
page read and write
B80000
heap
page read and write
20D64280000
heap
page read and write
1C2E83C0000
trusted library allocation
page read and write
79A000
stack
page read and write
15F2D5BA000
heap
page read and write
25FAEC46000
heap
page read and write
6E0000
heap
page read and write
15F2CD02000
heap
page read and write
C40539E000
stack
page read and write
20D64200000
heap
page read and write
15F2D3F0000
remote allocation
page read and write
15F2D5A1000
heap
page read and write
15F2D59A000
heap
page read and write
18893E02000
heap
page read and write
1D31EA6F000
heap
page read and write
851C000
stack
page read and write
7D0000
heap
page read and write
24DE000
direct allocation
page read and write
17EF4196000
heap
page read and write
BC7000
heap
page read and write
20D64050000
heap
page read and write
18893F04000
heap
page read and write
ED8000
heap
page read and write
20D64213000
heap
page read and write
18898D50000
trusted library allocation
page read and write
2EA70FA000
stack
page read and write
29EE271B000
heap
page read and write
1E650300000
heap
page read and write
740457F000
stack
page read and write
1E6509A0000
trusted library allocation
page read and write
25FAEC29000
heap
page read and write
18894ADE000
heap
page read and write
15F2D598000
heap
page read and write
20D6424B000
heap
page read and write
15F2D585000
heap
page read and write
4E0B378000
stack
page read and write
15F2D57F000
heap
page read and write
1C2E8440000
heap
page read and write
18893498000
heap
page read and write
18893310000
heap
page read and write
64EF279000
stack
page read and write
21816E12000
heap
page read and write
1E65023C000
heap
page read and write
180001000
unkown
page execute read
20D6422A000
heap
page read and write
879F000
stack
page read and write
17EF41AF000
heap
page read and write
25FAED13000
heap
page read and write
1D31EA00000
heap
page read and write
1D31EA28000
heap
page read and write
188934C9000
heap
page read and write
18893488000
heap
page read and write
1C2E852D000
heap
page read and write
21816DB0000
heap
page read and write
25FAEA40000
heap
page read and write
18898D20000
trusted library allocation
page read and write
18898E40000
trusted library allocation
page read and write
15F2CCC4000
heap
page read and write
180007000
unkown
page execute read
15F2D597000
heap
page read and write
15F2D587000
heap
page read and write
21816D7B000
heap
page read and write
2582E922000
heap
page read and write
29EE2502000
heap
page read and write
BEEEDFC000
stack
page read and write
B75000
heap
page read and write
18898E80000
remote allocation
page read and write
296F000
stack
page read and write
15F2D5A9000
heap
page read and write
B00077B000
stack
page read and write
15F2D54A000
heap
page read and write
2582E810000
heap
page read and write
21816DE0000
heap
page read and write
15F2D5D7000
heap
page read and write
15F2D58C000
heap
page read and write
24BB000
heap
page read and write
1F33EB50000
heap
page read and write
15F2D563000
heap
page read and write
15F2DA03000
heap
page read and write
1D31E7F0000
heap
page read and write
2582E979000
heap
page read and write
21816DE8000
heap
page read and write
2972000
heap
page read and write
18893F00000
heap
page read and write
BA9000
heap
page read and write
15F2DA02000
heap
page read and write
2582E8F8000
heap
page read and write
E48A8FE000
stack
page read and write
1E65025E000
heap
page read and write
25FAEC8A000
heap
page read and write
C4058FB000
stack
page read and write
603F3FE000
stack
page read and write
18898C10000
trusted library allocation
page read and write
25FAEC3C000
heap
page read and write
29EE24F6000
heap
page read and write
15F2D5B4000
heap
page read and write
29EE2503000
heap
page read and write
1F33EC50000
direct allocation
page read and write
15F2D570000
heap
page read and write
15F2D500000
heap
page read and write
1800BE000
unkown
page readonly
25FAEC55000
heap
page read and write
1D31F202000
trusted library allocation
page read and write
871E000
stack
page read and write
1C2E852D000
heap
page read and write
15F2D598000
heap
page read and write
15F2D597000
heap
page read and write
869E000
stack
page read and write
15F2DA02000
heap
page read and write
15F2D54F000
heap
page read and write
25FAEC13000
heap
page read and write
2820000
trusted library allocation
page read and write
15F2CCA5000
heap
page read and write
1E03449F000
direct allocation
page readonly
E20000
heap
page read and write
15F2CC4F000
heap
page read and write
17EF4140000
heap
page read and write
18893441000
heap
page read and write
BEEEC7E000
stack
page read and write
188934E0000
heap
page read and write
17EF4145000
heap
page read and write
15F2D59B000
heap
page read and write
15F2D5B0000
heap
page read and write
1C2E8536000
heap
page read and write
5763AFC000
stack
page read and write
18894980000
trusted library allocation
page read and write
23373AB5000
heap
page read and write
20ADC7A0000
heap
page read and write
C40577B000
stack
page read and write
15F2D5AD000
heap
page read and write
17EF419F000
heap
page read and write
15F2D596000
heap
page read and write
21816E0A000
heap
page read and write
20D64256000
heap
page read and write
B21000
heap
page read and write
25FAEC70000
heap
page read and write
15F2CC4B000
heap
page read and write
177907F000
stack
page read and write
15F2CC13000
heap
page read and write
21819FF0000
trusted library allocation
page read and write
18894AEE000
heap
page read and write
25FAF402000
trusted library allocation
page read and write
2ECB000
stack
page read and write
1E65025F000
heap
page read and write
18898D20000
trusted library allocation
page read and write
24DF000
direct allocation
page readonly
18898C00000
trusted library allocation
page read and write
1E650264000
heap
page read and write
AE5000
stack
page read and write
25FAEBB0000
trusted library allocation
page read and write
1C2E852D000
heap
page read and write
18000A000
unkown
page execute read
18898E80000
trusted library allocation
page read and write
29EE5930000
trusted library allocation
page read and write
29EE24FF000
heap
page read and write
1E650261000
heap
page read and write
2E439FB000
stack
page read and write
EFA000
heap
page read and write
1E65027A000
heap
page read and write
1C2E84D0000
trusted library allocation
page read and write
18898D50000
trusted library allocation
page read and write
24E0000
trusted library allocation
page read and write
18898E10000
trusted library allocation
page read and write
17EF40F0000
heap
page read and write
1E03BD9B000
heap
page read and write
E60000
direct allocation
page execute and read and write
57636CB000
stack
page read and write
25FAEC50000
heap
page read and write
1F33E940000
heap
page read and write
5885B79000
stack
page read and write
15F2D5A8000
heap
page read and write
18898E80000
remote allocation
page read and write
1C2E8819000
heap
page read and write
BA9000
heap
page read and write
23373AB0000
heap
page read and write
1800BE000
unkown
page readonly
18893514000
heap
page read and write
4E0ABDD000
stack
page read and write
21816D30000
heap
page read and write
4E0B4FC000
stack
page read and write
1E650287000
heap
page read and write
18898D64000
trusted library allocation
page read and write
1C2E8525000
heap
page read and write
1C2E83B0000
heap
page read and write
1F3406C3000
heap
page read and write
15F2D598000
heap
page read and write
15F2CCE2000
heap
page read and write
29EE250A000
heap
page read and write
15F2D598000
heap
page read and write
15F2CD08000
heap
page read and write
18894990000
trusted library allocation
page read and write
29EE5923000
heap
page read and write
AE0000
heap
page read and write
15F2D570000
heap
page read and write
29EE24B0000
heap
page read and write
1C2E84E0000
heap
page read and write
4E0B3FF000
unkown
page read and write
15F2CC55000
heap
page read and write
1E034430000
direct allocation
page execute and read and write
15F2CC8A000
heap
page read and write
21819FE3000
heap
page read and write
BB348FD000
stack
page read and write
1C2E8760000
trusted library allocation
page read and write
15F2CC4C000
heap
page read and write
2582E9BC000
heap
page read and write
1E0342C0000
heap
page read and write
15F2CAE0000
heap
page read and write
2E43BFE000
stack
page read and write
1D31EA02000
heap
page read and write
20D6422E000
heap
page read and write
21816E03000
heap
page read and write
C4057FE000
stack
page read and write
15F2D575000
heap
page read and write
4E0B27E000
stack
page read and write
1E034470000
direct allocation
page read and write
15F2DA00000
heap
page read and write
1CF60110000
heap
page read and write
2582F402000
heap
page read and write
15F2CC57000
heap
page read and write
B0006FE000
stack
page read and write
1E0344A0000
heap
page readonly
18898D60000
trusted library allocation
page read and write
64EEE9B000
stack
page read and write
EF7000
heap
page read and write
15F2CA70000
heap
page read and write
C60000
trusted library allocation
page read and write
17EF419F000
heap
page read and write
74040FD000
stack
page read and write
2E4F000
stack
page read and write
24A0000
heap
page read and write
18893485000
heap
page read and write
17EF4194000
heap
page read and write
15F2D5A1000
heap
page read and write
2820000
trusted library allocation
page read and write
1C2E8815000
heap
page read and write
18893320000
heap
page read and write
BEEEEFE000
stack
page read and write
18898D41000
trusted library allocation
page read and write
21816E26000
heap
page read and write
17EF41A1000
heap
page read and write
233738D0000
heap
page read and write
18898D60000
trusted library allocation
page read and write
1D31E7E0000
heap
page read and write
29EE250B000
heap
page read and write
1E650213000
heap
page read and write
1E650090000
heap
page read and write
2E4348C000
stack
page read and write
5885AF8000
stack
page read and write
B75000
heap
page read and write
18894AE5000
heap
page read and write
20D64302000
heap
page read and write
15F2CCBA000
heap
page read and write
C70000
heap
page read and write
1F33EA80000
heap
page read and write
2582F090000
remote allocation
page read and write
C40567E000
stack
page read and write
1E650100000
heap
page read and write
EB5000
heap
page read and write
2EA6B7B000
stack
page read and write
1F33EC7D000
direct allocation
page readonly
15F2D5AA000
heap
page read and write
2582E95C000
heap
page read and write
E00000
heap
page read and write
21816DFA000
heap
page read and write
18899000000
heap
page read and write
233738F0000
heap
page read and write
4E0B177000
stack
page read and write
29EE2420000
heap
page read and write
1E650308000
heap
page read and write
21816D10000
heap
page read and write
1E650302000
heap
page read and write
2582E8A0000
heap
page read and write
64EF37E000
stack
page read and write
BEEED7B000
stack
page read and write
57637CE000
stack
page read and write
E48A87E000
stack
page read and write
1180000
heap
page read and write
15F2D582000
heap
page read and write
1E0342E0000
heap
page read and write
576374E000
stack
page read and write
15F2D5BC000
heap
page read and write
1E035E3D000
heap
page read and write
BE0000
heap
page read and write
25FAEC27000
heap
page read and write
2582E9BA000
heap
page read and write
15F2D5AA000
heap
page read and write
1E034180000
heap
page read and write
1800B1000
unkown
page read and write
1F346621000
heap
page read and write
2582F090000
remote allocation
page read and write
18898FB0000
trusted library allocation
page read and write
117E000
direct allocation
page read and write
E70000
heap
page readonly
BEEEF7E000
stack
page read and write
21816D75000
heap
page read and write
25FAEC7F000
heap
page read and write
188934A1000
heap
page read and write
1D31EA25000
heap
page read and write
603F47F000
stack
page read and write
18898E70000
trusted library allocation
page read and write
17EF4186000
heap
page read and write
20D6428A000
heap
page read and write
18894500000
trusted library allocation
page read and write
188934BB000
heap
page read and write
24B0000
direct allocation
page read and write
1C2E8536000
heap
page read and write
25FAED02000
heap
page read and write
4E0AF7E000
stack
page read and write
18898D44000
trusted library allocation
page read and write
17EF4186000
heap
page read and write
2EA72FE000
stack
page read and write
2880000
remote allocation
page read and write
15F2DA03000
heap
page read and write
1E0342E8000
heap
page read and write
1F33ED25000
heap
page read and write
1C2E84E9000
heap
page read and write
29EE2502000
heap
page read and write
1F3406B0000
heap
page read and write
1D31E850000
heap
page read and write
21816E03000
heap
page read and write
15F2D57B000
heap
page read and write
2582E956000
heap
page read and write
2DAC000
stack
page read and write
18894AE7000
heap
page read and write
15F2D57C000
heap
page read and write
7C0000
remote allocation
page read and write
29EE2502000
heap
page read and write
1E65024E000
heap
page read and write
F19000
heap
page read and write
29EE24F9000
heap
page read and write
B4D000
heap
page read and write
18894A43000
heap
page read and write
15F2DA02000
heap
page read and write
180088000
unkown
page execute read
1C2E84F1000
heap
page read and write
18898DF0000
trusted library allocation
page read and write
2D2E000
stack
page read and write
1CF60170000
heap
page read and write
18893502000
heap
page read and write
5763F7F000
stack
page read and write
15F2D593000
heap
page read and write
18894A43000
heap
page read and write
18893380000
heap
page read and write
15F2D583000
heap
page read and write
2582E925000
heap
page read and write
2582F404000
heap
page read and write
15F2CCAC000
heap
page read and write
17EF4090000
heap
page read and write
1D31EA13000
heap
page read and write
15F2CD13000
heap
page read and write
180001000
unkown
page execute read
859B000
stack
page read and write
1C2E8810000
heap
page read and write
B80000
heap
page read and write
15F2DA02000
heap
page read and write
1F33EB58000
heap
page read and write
2582E9DC000
heap
page read and write
2582E880000
heap
page read and write
740417E000
stack
page read and write
17790FF000
stack
page read and write
15F2D598000
heap
page read and write
15F2DA02000
heap
page read and write
17EF4195000
heap
page read and write
15F2D583000
heap
page read and write
There are 701 hidden memdumps, click here to show them.