Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
yj81rxDZIp.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
MPEG-4 LOAS
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x48378a27, page size 16384, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\yj81rxDZIp.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\yj81rxDZIp.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\yj81rxDZIp.dll,DllRegisterServer
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\yj81rxDZIp.dll,DllUnregisterServer
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\KZsiDdn\sdxQuTDjzsbvXJ.dll"
|
||
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\yj81rxDZIp.dll"
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\yj81rxDZIp.dll",#1
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://150.95.66.124:8080/
|
unknown
|
||
https://23.239.0.12/x
|
unknown
|
||
https://23.239.0.12/?
|
unknown
|
||
https://23.239.0.12/=
|
unknown
|
||
https://23.239.0.12/
|
23.239.0.12
|
||
https://www.disneyplus.com/legal/your-california-privacy-rights
|
unknown
|
||
https://www.disneyplus.com/legal/privacy-policy
|
unknown
|
||
https://150.95.66.124/
|
unknown
|
||
https://www.hotspotshield.com/terms/
|
unknown
|
||
https://www.pango.co/privacy
|
unknown
|
||
https://disneyplus.com/legal.
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://www.tiktok.com/legal/report/feedback
|
unknown
|
||
http://help.disneyplus.com.
|
unknown
|
||
https://support.hotspotshield.com/
|
unknown
|
There are 5 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
23.239.0.12
|
unknown
|
United States
|
||
150.95.66.124
|
unknown
|
Singapore
|
||
192.168.2.1
|
unknown
|
unknown
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
180001000
|
direct allocation
|
page execute read
|
||
1A2C05E0000
|
direct allocation
|
page execute and read and write
|
||
CE0000
|
direct allocation
|
page execute and read and write
|
||
B80000
|
direct allocation
|
page execute and read and write
|
||
12A08A10000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
7FFA53242000
|
unkown
|
page readonly
|
||
23559DBC000
|
heap
|
page read and write
|
||
2CCF000
|
stack
|
page read and write
|
||
1A2C0391000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
2282D652000
|
heap
|
page read and write
|
||
B6799FF000
|
stack
|
page read and write
|
||
23559D9B000
|
heap
|
page read and write
|
||
2355A1B0000
|
remote allocation
|
page read and write
|
||
2282D5C0000
|
trusted library allocation
|
page read and write
|
||
9B8000
|
heap
|
page read and write
|
||
579A2FF000
|
stack
|
page read and write
|
||
23E0C900000
|
heap
|
page read and write
|
||
1D1C5A50000
|
heap
|
page read and write
|
||
22828600000
|
heap
|
page read and write
|
||
7FFA531F1000
|
unkown
|
page execute read
|
||
23559D9B000
|
heap
|
page read and write
|
||
12A07074000
|
heap
|
page read and write
|
||
1B7842C3000
|
heap
|
page read and write
|
||
23559D21000
|
heap
|
page read and write
|
||
22827E29000
|
heap
|
page read and write
|
||
D55000
|
heap
|
page read and write
|
||
23559D65000
|
heap
|
page read and write
|
||
22827F07000
|
heap
|
page read and write
|
||
1D1C5C7F000
|
heap
|
page read and write
|
||
281E000
|
stack
|
page read and write
|
||
983037F000
|
stack
|
page read and write
|
||
26D1E75000
|
stack
|
page read and write
|
||
2282D300000
|
trusted library allocation
|
page read and write
|
||
23E0C85D000
|
heap
|
page read and write
|
||
2A572A4E000
|
heap
|
page read and write
|
||
23559D65000
|
heap
|
page read and write
|
||
1D1C5B80000
|
heap
|
page read and write
|
||
23E0C84E000
|
heap
|
page read and write
|
||
2282D4C4000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
direct allocation
|
page execute and read and write
|
||
22828E50000
|
trusted library allocation
|
page read and write
|
||
23559D7F000
|
heap
|
page read and write
|
||
9185CFE000
|
stack
|
page read and write
|
||
14CFAA20000
|
trusted library allocation
|
page read and write
|
||
1EE6DB60000
|
heap
|
page read and write
|
||
1EE6DD00000
|
heap
|
page read and write
|
||
23559DB0000
|
heap
|
page read and write
|
||
1EE6DB70000
|
heap
|
page read and write
|
||
1EE6DC4A000
|
heap
|
page read and write
|
||
14CF9D05000
|
heap
|
page read and write
|
||
67C907B000
|
stack
|
page read and write
|
||
2282D6F6000
|
heap
|
page read and write
|
||
67C917B000
|
stack
|
page read and write
|
||
23559DAC000
|
heap
|
page read and write
|
||
BB0DC7C000
|
stack
|
page read and write
|
||
2600000
|
heap
|
page read and write
|
||
16B76650000
|
heap
|
page read and write
|
||
23559D66000
|
heap
|
page read and write
|
||
5799E7E000
|
stack
|
page read and write
|
||
26D217B000
|
stack
|
page read and write
|
||
579A4FF000
|
stack
|
page read and write
|
||
2282D930000
|
trusted library allocation
|
page read and write
|
||
2282D800000
|
remote allocation
|
page read and write
|
||
22828704000
|
heap
|
page read and write
|
||
3112DBC000
|
stack
|
page read and write
|
||
2355A218000
|
heap
|
page read and write
|
||
23559D66000
|
heap
|
page read and write
|
||
1B7842D2000
|
heap
|
page read and write
|
||
579A0FE000
|
stack
|
page read and write
|
||
D10000
|
heap
|
page readonly
|
||
1D1C5C8F000
|
heap
|
page read and write
|
||
23559DD4000
|
heap
|
page read and write
|
||
23559D82000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
2282D6B4000
|
heap
|
page read and write
|
||
1EE6DC13000
|
heap
|
page read and write
|
||
A97000
|
heap
|
page read and write
|
||
23559D87000
|
heap
|
page read and write
|
||
1B7842BE000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
23559D66000
|
heap
|
page read and write
|
||
2282D570000
|
trusted library allocation
|
page read and write
|
||
7FFA53246000
|
unkown
|
page read and write
|
||
BA82F9000
|
stack
|
page read and write
|
||
1EE6DC00000
|
heap
|
page read and write
|
||
22827E58000
|
heap
|
page read and write
|
||
1F8C5070000
|
heap
|
page read and write
|
||
5AA82FE000
|
stack
|
page read and write
|
||
2355A202000
|
heap
|
page read and write
|
||
12A07008000
|
heap
|
page read and write
|
||
23559DA1000
|
heap
|
page read and write
|
||
2C4E000
|
stack
|
page read and write
|
||
23559D18000
|
heap
|
page read and write
|
||
23559D65000
|
heap
|
page read and write
|
||
7FFA53242000
|
unkown
|
page readonly
|
||
16B766C0000
|
heap
|
page read and write
|
||
2604000
|
heap
|
page read and write
|
||
1B784280000
|
heap
|
page read and write
|
||
22827C90000
|
heap
|
page read and write
|
||
235594C7000
|
heap
|
page read and write
|
||
16B76902000
|
heap
|
page read and write
|
||
235594B5000
|
heap
|
page read and write
|
||
1B7842B7000
|
heap
|
page read and write
|
||
2282D6FC000
|
heap
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
235594AC000
|
heap
|
page read and write
|
||
5799BCD000
|
stack
|
page read and write
|
||
2A572A88000
|
heap
|
page read and write
|
||
7FFA53242000
|
unkown
|
page readonly
|
||
23E0C82A000
|
heap
|
page read and write
|
||
1EE6E470000
|
trusted library allocation
|
page read and write
|
||
1B784200000
|
heap
|
page read and write
|
||
2A572B13000
|
heap
|
page read and write
|
||
1D1C5C20000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
14CF9D0D000
|
heap
|
page read and write
|
||
23559D9F000
|
heap
|
page read and write
|
||
BB0DFFF000
|
stack
|
page read and write
|
||
2355A222000
|
heap
|
page read and write
|
||
BA8179000
|
stack
|
page read and write
|
||
22828759000
|
heap
|
page read and write
|
||
23E0C770000
|
trusted library allocation
|
page read and write
|
||
983047E000
|
stack
|
page read and write
|
||
23559D70000
|
heap
|
page read and write
|
||
23559D68000
|
heap
|
page read and write
|
||
12A06F60000
|
heap
|
page read and write
|
||
1B7842E5000
|
heap
|
page read and write
|
||
23559D9B000
|
heap
|
page read and write
|
||
A7C000
|
heap
|
page read and write
|
||
1EE6DBD0000
|
heap
|
page read and write
|
||
23559D9B000
|
heap
|
page read and write
|
||
1A2C0160000
|
heap
|
page read and write
|
||
14CFAC60000
|
trusted library allocation
|
page read and write
|
||
23E0C889000
|
heap
|
page read and write
|
||
2355A222000
|
heap
|
page read and write
|
||
67C91FE000
|
stack
|
page read and write
|
||
2282D4A8000
|
trusted library allocation
|
page read and write
|
||
23559D9B000
|
heap
|
page read and write
|
||
14CF9F29000
|
heap
|
page read and write
|
||
64E79BB000
|
stack
|
page read and write
|
||
5AA8878000
|
stack
|
page read and write
|
||
22827D00000
|
heap
|
page read and write
|
||
16B76913000
|
heap
|
page read and write
|
||
1EE6DC29000
|
heap
|
page read and write
|
||
2282D5D0000
|
trusted library allocation
|
page read and write
|
||
23559D9B000
|
heap
|
page read and write
|
||
22827E7A000
|
heap
|
page read and write
|
||
235594EB000
|
heap
|
page read and write
|
||
23559D95000
|
heap
|
page read and write
|
||
7FFA531F1000
|
unkown
|
page execute read
|
||
14CF9D2C000
|
heap
|
page read and write
|
||
2A572A00000
|
heap
|
page read and write
|
||
23E0C85D000
|
heap
|
page read and write
|
||
7FFA53246000
|
unkown
|
page read and write
|
||
16B7686A000
|
heap
|
page read and write
|
||
BB0DF7B000
|
stack
|
page read and write
|
||
2282D649000
|
heap
|
page read and write
|
||
12A07260000
|
heap
|
page read and write
|
||
16B767C0000
|
trusted library allocation
|
page read and write
|
||
1D1C5C74000
|
heap
|
page read and write
|
||
23E0C670000
|
heap
|
page read and write
|
||
1F8C50AD000
|
heap
|
page read and write
|
||
A7C000
|
heap
|
page read and write
|
||
2A572A48000
|
heap
|
page read and write
|
||
A7C000
|
heap
|
page read and write
|
||
14CFAC50000
|
trusted library allocation
|
page read and write
|
||
14CF9D1C000
|
heap
|
page read and write
|
||
2282D600000
|
heap
|
page read and write
|
||
9185AFE000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
16B76800000
|
heap
|
page read and write
|
||
23559D71000
|
heap
|
page read and write
|
||
2282D4E4000
|
trusted library allocation
|
page read and write
|
||
235594E9000
|
heap
|
page read and write
|
||
23559D92000
|
heap
|
page read and write
|
||
9F2000
|
heap
|
page read and write
|
||
23559D65000
|
heap
|
page read and write
|
||
2355944B000
|
heap
|
page read and write
|
||
23559DB7000
|
heap
|
page read and write
|
||
1A2C0392000
|
heap
|
page read and write
|
||
14CFAC30000
|
trusted library allocation
|
page read and write
|
||
12A07265000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
22827E56000
|
heap
|
page read and write
|
||
2A572A6A000
|
heap
|
page read and write
|
||
1A2C0350000
|
heap
|
page read and write
|
||
BA7D3B000
|
stack
|
page read and write
|
||
28C4000
|
heap
|
page read and write
|
||
579A3FD000
|
stack
|
page read and write
|
||
23E0C87E000
|
heap
|
page read and write
|
||
16B76875000
|
heap
|
page read and write
|
||
1F8C50A0000
|
heap
|
page read and write
|
||
579A1F7000
|
stack
|
page read and write
|
||
23559447000
|
heap
|
page read and write
|
||
1EE6DC7C000
|
heap
|
page read and write
|
||
2282D380000
|
trusted library allocation
|
page read and write
|
||
23559502000
|
heap
|
page read and write
|
||
22827EAF000
|
heap
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
A4B000
|
heap
|
page read and write
|
||
2A572B02000
|
heap
|
page read and write
|
||
2355944D000
|
heap
|
page read and write
|
||
2A4E000
|
stack
|
page read and write
|
||
7FFA531F0000
|
unkown
|
page readonly
|
||
2A572A13000
|
heap
|
page read and write
|
||
1A2C0310000
|
heap
|
page read and write
|
||
235594C0000
|
heap
|
page read and write
|
||
2355946F000
|
heap
|
page read and write
|
||
12A08A80000
|
heap
|
page read and write
|
||
1A2C0620000
|
heap
|
page read and write
|
||
64E81FB000
|
stack
|
page read and write
|
||
23559D9F000
|
heap
|
page read and write
|
||
1B7842A8000
|
heap
|
page read and write
|
||
A07000
|
heap
|
page read and write
|
||
23559DBC000
|
heap
|
page read and write
|
||
22828700000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
1A2C0625000
|
heap
|
page read and write
|
||
5AA827E000
|
stack
|
page read and write
|
||
9185C7F000
|
stack
|
page read and write
|
||
2355A202000
|
heap
|
page read and write
|
||
14CF9CC9000
|
heap
|
page read and write
|
||
BA827F000
|
stack
|
page read and write
|
||
1EE6DC8D000
|
heap
|
page read and write
|
||
67C8EFE000
|
stack
|
page read and write
|
||
23559D87000
|
heap
|
page read and write
|
||
1B7842BA000
|
heap
|
page read and write
|
||
1A2C0340000
|
heap
|
page readonly
|
||
5AA8677000
|
stack
|
page read and write
|
||
22828713000
|
heap
|
page read and write
|
||
16B76822000
|
heap
|
page read and write
|
||
2355A218000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
14CF9BB0000
|
trusted library allocation
|
page read and write
|
||
1EE6DC4F000
|
heap
|
page read and write
|
||
16B76813000
|
heap
|
page read and write
|
||
1D1C5C66000
|
heap
|
page read and write
|
||
A07000
|
heap
|
page read and write
|
||
23559D00000
|
heap
|
page read and write
|
||
258E000
|
stack
|
page read and write
|
||
2282D6F0000
|
heap
|
page read and write
|
||
BB0E0F7000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1EE6E602000
|
trusted library allocation
|
page read and write
|
||
31133FB000
|
stack
|
page read and write
|
||
1B7842BA000
|
heap
|
page read and write
|
||
23E0C870000
|
heap
|
page read and write
|
||
5AA857A000
|
stack
|
page read and write
|
||
12A071D0000
|
heap
|
page read and write
|
||
22827E00000
|
heap
|
page read and write
|
||
2282D4C0000
|
trusted library allocation
|
page read and write
|
||
64E7DF7000
|
stack
|
page read and write
|
||
2355948A000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
235594AB000
|
heap
|
page read and write
|
||
1B785E20000
|
heap
|
page read and write
|
||
23E0C600000
|
heap
|
page read and write
|
||
23E0C813000
|
heap
|
page read and write
|
||
22827E13000
|
heap
|
page read and write
|
||
5AA7FEB000
|
stack
|
page read and write
|
||
2282D600000
|
trusted library allocation
|
page read and write
|
||
1EE6DD08000
|
heap
|
page read and write
|
||
67C8E7B000
|
stack
|
page read and write
|
||
23E0C84B000
|
heap
|
page read and write
|
||
2355A1B0000
|
remote allocation
|
page read and write
|
||
23559451000
|
heap
|
page read and write
|
||
A7C000
|
heap
|
page read and write
|
||
23559D82000
|
heap
|
page read and write
|
||
14CF9D1D000
|
heap
|
page read and write
|
||
14CF9D26000
|
heap
|
page read and write
|
||
64E80FE000
|
stack
|
page read and write
|
||
12A07051000
|
heap
|
page read and write
|
||
23559D8C000
|
heap
|
page read and write
|
||
23559DB0000
|
heap
|
page read and write
|
||
12A07230000
|
direct allocation
|
page execute and read and write
|
||
26D207E000
|
stack
|
page read and write
|
||
2282D69C000
|
heap
|
page read and write
|
||
23559DD4000
|
heap
|
page read and write
|
||
2D3E000
|
heap
|
page read and write
|
||
22827F02000
|
heap
|
page read and write
|
||
23559D66000
|
heap
|
page read and write
|
||
12A08AF0000
|
heap
|
page read and write
|
||
A7C000
|
heap
|
page read and write
|
||
23559D66000
|
heap
|
page read and write
|
||
BB0DCFD000
|
stack
|
page read and write
|
||
2282D390000
|
trusted library allocation
|
page read and write
|
||
2282D63C000
|
heap
|
page read and write
|
||
23559D9B000
|
heap
|
page read and write
|
||
23559DD4000
|
heap
|
page read and write
|
||
23559D89000
|
heap
|
page read and write
|
||
23559D61000
|
heap
|
page read and write
|
||
14CF9D0D000
|
heap
|
page read and write
|
||
28C0000
|
heap
|
page read and write
|
||
2282D610000
|
heap
|
page read and write
|
||
2A572A02000
|
heap
|
page read and write
|
||
23559450000
|
heap
|
page read and write
|
||
1B784285000
|
heap
|
page read and write
|
||
B67987B000
|
stack
|
page read and write
|
||
2282D310000
|
trusted library allocation
|
page read and write
|
||
14CFAC40000
|
heap
|
page readonly
|
||
12A07000000
|
heap
|
page read and write
|
||
2282D4A0000
|
trusted library allocation
|
page read and write
|
||
2355A202000
|
heap
|
page read and write
|
||
23559D65000
|
heap
|
page read and write
|
||
5AA8AF8000
|
stack
|
page read and write
|
||
14CF9D29000
|
heap
|
page read and write
|
||
23E0C880000
|
heap
|
page read and write
|
||
64E82FB000
|
stack
|
page read and write
|
||
22828718000
|
heap
|
page read and write
|
||
23E0C849000
|
heap
|
page read and write
|
||
BA81F9000
|
stack
|
page read and write
|
||
23559400000
|
heap
|
page read and write
|
||
16B76856000
|
heap
|
page read and write
|
||
228292F0000
|
trusted library allocation
|
page read and write
|
||
22827F02000
|
heap
|
page read and write
|
||
23559DC6000
|
heap
|
page read and write
|
||
1EE6DD02000
|
heap
|
page read and write
|
||
22827EFF000
|
heap
|
page read and write
|
||
23559429000
|
heap
|
page read and write
|
||
5A912FD000
|
stack
|
page read and write
|
||
1B7842BF000
|
heap
|
page read and write
|
||
23559D9B000
|
heap
|
page read and write
|
||
1B7842DE000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
5AA877E000
|
stack
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
23559D9F000
|
heap
|
page read and write
|
||
235594E6000
|
heap
|
page read and write
|
||
22827EAF000
|
heap
|
page read and write
|
||
7FFA53249000
|
unkown
|
page readonly
|
||
228292F3000
|
trusted library allocation
|
page read and write
|
||
14CF9D26000
|
heap
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
1B7842C3000
|
heap
|
page read and write
|
||
1B784190000
|
heap
|
page read and write
|
||
2A573202000
|
trusted library allocation
|
page read and write
|
||
23559D9B000
|
heap
|
page read and write
|
||
23559D84000
|
heap
|
page read and write
|
||
14CF9CC0000
|
heap
|
page read and write
|
||
1B7842CD000
|
heap
|
page read and write
|
||
5799B4B000
|
stack
|
page read and write
|
||
5AA89F9000
|
stack
|
page read and write
|
||
934000
|
stack
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
12A06FD0000
|
heap
|
page read and write
|
||
EAF000
|
stack
|
page read and write
|
||
1EE6DC86000
|
heap
|
page read and write
|
||
14CF9F25000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
23E0C610000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
67C94FD000
|
stack
|
page read and write
|
||
2A5728C0000
|
heap
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
26D1F7F000
|
stack
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
14CF9CD1000
|
heap
|
page read and write
|
||
7FFA53249000
|
unkown
|
page readonly
|
||
2282D6FA000
|
heap
|
page read and write
|
||
2282D4AE000
|
trusted library allocation
|
page read and write
|
||
14CF9BA0000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
23559D6B000
|
heap
|
page read and write
|
||
2282D698000
|
heap
|
page read and write
|
||
BB0DD7F000
|
stack
|
page read and write
|
||
23559D79000
|
heap
|
page read and write
|
||
1B7842CD000
|
heap
|
page read and write
|
||
1A2C0381000
|
heap
|
page read and write
|
||
F75000
|
heap
|
page read and write
|
||
F3F000
|
stack
|
page read and write
|
||
2282D6D8000
|
heap
|
page read and write
|
||
1A2C0330000
|
direct allocation
|
page execute and read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
23E0C83C000
|
heap
|
page read and write
|
||
1B7842A0000
|
heap
|
page read and write
|
||
23559508000
|
heap
|
page read and write
|
||
22827CA0000
|
heap
|
page read and write
|
||
235592A0000
|
heap
|
page read and write
|
||
64E7EFA000
|
stack
|
page read and write
|
||
22827E7C000
|
heap
|
page read and write
|
||
1A2C02A0000
|
heap
|
page read and write
|
||
31132FB000
|
stack
|
page read and write
|
||
BB0E2FC000
|
stack
|
page read and write
|
||
2A572A8D000
|
heap
|
page read and write
|
||
1B787650000
|
trusted library allocation
|
page read and write
|
||
1D1C5C7F000
|
heap
|
page read and write
|
||
2355944E000
|
heap
|
page read and write
|
||
12A08AF4000
|
heap
|
page read and write
|
||
2282D5E0000
|
trusted library allocation
|
page read and write
|
||
8B5000
|
stack
|
page read and write
|
||
22827EA0000
|
heap
|
page read and write
|
||
2282D4D0000
|
trusted library allocation
|
page read and write
|
||
22827E77000
|
heap
|
page read and write
|
||
23559D89000
|
heap
|
page read and write
|
||
7FFA531F1000
|
unkown
|
page execute read
|
||
9F2000
|
heap
|
page read and write
|
||
23559DA6000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
1D1C5C93000
|
heap
|
page read and write
|
||
228292D1000
|
trusted library allocation
|
page read and write
|
||
2355A202000
|
heap
|
page read and write
|
||
23E0C853000
|
heap
|
page read and write
|
||
2A572A53000
|
heap
|
page read and write
|
||
228285A0000
|
trusted library allocation
|
page read and write
|
||
2ACB000
|
stack
|
page read and write
|
||
7FFA53246000
|
unkown
|
page read and write
|
||
23559DD4000
|
heap
|
page read and write
|
||
1B7842C9000
|
heap
|
page read and write
|
||
A1E000
|
heap
|
page read and write
|
||
2C8F000
|
stack
|
page read and write
|
||
14CF9D2C000
|
heap
|
page read and write
|
||
CE5000
|
heap
|
page read and write
|
||
22829300000
|
trusted library allocation
|
page read and write
|
||
23559D66000
|
heap
|
page read and write
|
||
279E000
|
stack
|
page read and write
|
||
235594E1000
|
heap
|
page read and write
|
||
23559DCD000
|
heap
|
page read and write
|
||
2282D5B0000
|
trusted library allocation
|
page read and write
|
||
23559D93000
|
heap
|
page read and write
|
||
7FFA531F1000
|
unkown
|
page execute read
|
||
23E0C902000
|
heap
|
page read and write
|
||
1D1C5C76000
|
heap
|
page read and write
|
||
C30000
|
trusted library allocation
|
page read and write
|
||
16B77002000
|
trusted library allocation
|
page read and write
|
||
14CFACB0000
|
trusted library allocation
|
page read and write
|
||
26D1EFF000
|
stack
|
page read and write
|
||
16B76900000
|
heap
|
page read and write
|
||
BB0E1FE000
|
stack
|
page read and write
|
||
23E0C800000
|
heap
|
page read and write
|
||
2A5729C0000
|
trusted library allocation
|
page read and write
|
||
23559D16000
|
heap
|
page read and write
|
||
8E0000
|
remote allocation
|
page read and write
|
||
23559D6D000
|
heap
|
page read and write
|
||
2A572A4C000
|
heap
|
page read and write
|
||
9185D7C000
|
stack
|
page read and write
|
||
22827F14000
|
heap
|
page read and write
|
||
23559D9B000
|
heap
|
page read and write
|
||
23559449000
|
heap
|
page read and write
|
||
9830276000
|
stack
|
page read and write
|
||
2A572860000
|
heap
|
page read and write
|
||
2282D6AA000
|
heap
|
page read and write
|
||
22827E92000
|
heap
|
page read and write
|
||
26D20FF000
|
stack
|
page read and write
|
||
23559482000
|
heap
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
C30000
|
trusted library allocation
|
page read and write
|
||
31134FE000
|
stack
|
page read and write
|
||
2282D570000
|
trusted library allocation
|
page read and write
|
||
2282D65F000
|
heap
|
page read and write
|
||
2BCF000
|
stack
|
page read and write
|
||
23559DA2000
|
heap
|
page read and write
|
||
23559D82000
|
heap
|
page read and write
|
||
67C92F7000
|
stack
|
page read and write
|
||
1D1C5C66000
|
heap
|
page read and write
|
||
2355A1B0000
|
remote allocation
|
page read and write
|
||
A94000
|
heap
|
page read and write
|
||
22827EAB000
|
heap
|
page read and write
|
||
2282D4E0000
|
trusted library allocation
|
page read and write
|
||
2A572B00000
|
heap
|
page read and write
|
||
1EE6DC4D000
|
heap
|
page read and write
|
||
23559D82000
|
heap
|
page read and write
|
||
2282D4C1000
|
trusted library allocation
|
page read and write
|
||
67C93FF000
|
stack
|
page read and write
|
||
16B76802000
|
heap
|
page read and write
|
||
23559DAD000
|
heap
|
page read and write
|
||
235592B0000
|
heap
|
page read and write
|
||
990000
|
heap
|
page readonly
|
||
579A07B000
|
stack
|
page read and write
|
||
23559D82000
|
heap
|
page read and write
|
||
22828602000
|
heap
|
page read and write
|
||
23E0D002000
|
trusted library allocation
|
page read and write
|
||
23559D89000
|
heap
|
page read and write
|
||
A07000
|
heap
|
page read and write
|
||
1B787640000
|
heap
|
page read and write
|
||
5AA847E000
|
stack
|
page read and write
|
||
2282D800000
|
remote allocation
|
page read and write
|
||
23559453000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
23E0C913000
|
heap
|
page read and write
|
||
9185B7E000
|
stack
|
page read and write
|
||
23559DB1000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
1F8C50B3000
|
heap
|
page read and write
|
||
23559DBE000
|
heap
|
page read and write
|
||
9F2000
|
heap
|
page read and write
|
||
23559D82000
|
heap
|
page read and write
|
||
23559448000
|
heap
|
page read and write
|
||
A1E000
|
heap
|
page read and write
|
||
1A2C0358000
|
heap
|
page read and write
|
||
1D1C5BA0000
|
heap
|
page read and write
|
||
22827E8E000
|
heap
|
page read and write
|
||
23559D84000
|
heap
|
page read and write
|
||
2A572850000
|
heap
|
page read and write
|
||
23559D86000
|
heap
|
page read and write
|
||
23559D86000
|
heap
|
page read and write
|
||
23559BB0000
|
trusted library allocation
|
page read and write
|
||
23559D9B000
|
heap
|
page read and write
|
||
1A2C1E20000
|
heap
|
page read and write
|
||
16B76828000
|
heap
|
page read and write
|
||
D3B000
|
heap
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
7FFA53249000
|
unkown
|
page readonly
|
||
5AA88FF000
|
unkown
|
page read and write
|
||
2282D8F0000
|
trusted library allocation
|
page read and write
|
||
23559D66000
|
heap
|
page read and write
|
||
A1F000
|
heap
|
page read and write
|
||
23559D65000
|
heap
|
page read and write
|
||
2A572A7E000
|
heap
|
page read and write
|
||
1D1C5C8E000
|
heap
|
page read and write
|
||
23E0C847000
|
heap
|
page read and write
|
||
23559D7F000
|
heap
|
page read and write
|
||
23559310000
|
heap
|
page read and write
|
||
9185BF8000
|
stack
|
page read and write
|
||
2282D4D0000
|
trusted library allocation
|
page read and write
|
||
235594D4000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
14CF9C30000
|
heap
|
page read and write
|
||
12A0705D000
|
heap
|
page read and write
|
||
16B76660000
|
heap
|
page read and write
|
||
14CF9C10000
|
heap
|
page read and write
|
||
1EE6DC3C000
|
heap
|
page read and write
|
||
1D1C5C61000
|
heap
|
page read and write
|
||
7FFA53246000
|
unkown
|
page read and write
|
||
2282D702000
|
heap
|
page read and write
|
||
2282D570000
|
trusted library allocation
|
page read and write
|
||
B67997E000
|
stack
|
page read and write
|
||
2282D4A0000
|
trusted library allocation
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
CA0000
|
remote allocation
|
page read and write
|
||
23E0C908000
|
heap
|
page read and write
|
||
67C8F7E000
|
stack
|
page read and write
|
||
2A572B08000
|
heap
|
page read and write
|
||
1B787E50000
|
heap
|
page read and write
|
||
1D1C5C7F000
|
heap
|
page read and write
|
||
2282D6DA000
|
heap
|
page read and write
|
||
22827E3F000
|
heap
|
page read and write
|
||
22828759000
|
heap
|
page read and write
|
||
2282D62E000
|
heap
|
page read and write
|
||
2282D6B3000
|
heap
|
page read and write
|
||
1B784220000
|
heap
|
page read and write
|
||
1EE6DC54000
|
heap
|
page read and write
|
||
23559DBB000
|
heap
|
page read and write
|
||
29CC000
|
stack
|
page read and write
|
||
14CF9F20000
|
heap
|
page read and write
|
||
A94000
|
heap
|
page read and write
|
||
8E0000
|
remote allocation
|
page read and write
|
||
7FFA53249000
|
unkown
|
page readonly
|
||
2355A202000
|
heap
|
page read and write
|
||
2355A202000
|
heap
|
page read and write
|
||
1A2C1CA0000
|
heap
|
page read and write
|
||
12A07210000
|
heap
|
page read and write
|
||
1B78428B000
|
heap
|
page read and write
|
||
22827EA2000
|
heap
|
page read and write
|
||
16B76840000
|
heap
|
page read and write
|
||
2282D6DA000
|
heap
|
page read and write
|
||
64E86FA000
|
stack
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
7FFA531F0000
|
unkown
|
page readonly
|
||
1A2C1E24000
|
heap
|
page read and write
|
||
2355944C000
|
heap
|
page read and write
|
||
1F8C4F30000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
22827EFF000
|
heap
|
page read and write
|
||
22828615000
|
heap
|
page read and write
|
||
22827E72000
|
heap
|
page read and write
|
||
23559D9B000
|
heap
|
page read and write
|
||
22828702000
|
heap
|
page read and write
|
||
7FFA531F0000
|
unkown
|
page readonly
|
||
23559D9B000
|
heap
|
page read and write
|
||
1B787643000
|
heap
|
page read and write
|
||
23559516000
|
heap
|
page read and write
|
||
64E88FE000
|
stack
|
page read and write
|
||
12A0708F000
|
heap
|
page read and write
|
||
7FFA53242000
|
unkown
|
page readonly
|
||
980000
|
direct allocation
|
page execute and read and write
|
||
23559D53000
|
heap
|
page read and write
|
||
235594FA000
|
heap
|
page read and write
|
||
1D1C5C25000
|
heap
|
page read and write
|
||
1EE6DD13000
|
heap
|
page read and write
|
||
98303FE000
|
stack
|
page read and write
|
||
14CF9CB0000
|
trusted library allocation
|
page read and write
|
||
23559DB0000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
1D1C5C75000
|
heap
|
page read and write
|
||
2282D800000
|
remote allocation
|
page read and write
|
||
98302FF000
|
stack
|
page read and write
|
||
7FFA531F0000
|
unkown
|
page readonly
|
||
A22000
|
heap
|
page read and write
|
||
2355A202000
|
heap
|
page read and write
|
||
22827E8C000
|
heap
|
page read and write
|
||
23559513000
|
heap
|
page read and write
|
||
23559413000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
2282D580000
|
trusted library allocation
|
page read and write
|
||
23559D82000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
23559D82000
|
heap
|
page read and write
|
||
B6798FE000
|
stack
|
page read and write
|
||
64E7FFA000
|
stack
|
page read and write
|
||
14CF9F30000
|
trusted library allocation
|
page read and write
|
||
A97000
|
heap
|
page read and write
|
||
1D1C5C50000
|
heap
|
page read and write
|
||
CA0000
|
remote allocation
|
page read and write
|
||
14CF9EE0000
|
trusted library allocation
|
page read and write
|
||
2282D621000
|
heap
|
page read and write
|
||
12A07240000
|
heap
|
page readonly
|
||
26D1FFC000
|
stack
|
page read and write
|
||
1D1C5C72000
|
heap
|
page read and write
|
||
14CF9CA0000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
2282D4E0000
|
trusted library allocation
|
page read and write
|
||
23559DAC000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
2A572A29000
|
heap
|
page read and write
|
||
22827EBD000
|
heap
|
page read and write
|
||
9185A7A000
|
stack
|
page read and write
|
||
23559C02000
|
heap
|
page read and write
|
||
D91000
|
heap
|
page read and write
|
||
2282D5F0000
|
trusted library allocation
|
page read and write
|
||
14CF9D0D000
|
heap
|
page read and write
|
||
2D0B000
|
stack
|
page read and write
|
||
2355943C000
|
heap
|
page read and write
|
||
23559454000
|
heap
|
page read and write
|
||
22828718000
|
heap
|
page read and write
|
||
1A2C037C000
|
heap
|
page read and write
|
||
2355A200000
|
heap
|
page read and write
|
||
23559456000
|
heap
|
page read and write
|
||
2282D6DF000
|
heap
|
page read and write
|
||
2A572A3C000
|
heap
|
page read and write
|
||
1A2C02C0000
|
heap
|
page read and write
|
||
BB0E3FE000
|
stack
|
page read and write
|
||
CA0000
|
remote allocation
|
page read and write
|
||
1EE6DC70000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
There are 630 hidden memdumps, click here to show them.