IOC Report
yj81rxDZIp

loading gif

Files

File Path
Type
Category
Malicious
yj81rxDZIp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x48378a27, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\yj81rxDZIp.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\yj81rxDZIp.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\yj81rxDZIp.dll,DllRegisterServer
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\yj81rxDZIp.dll,DllUnregisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\KZsiDdn\sdxQuTDjzsbvXJ.dll"
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\yj81rxDZIp.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\yj81rxDZIp.dll",#1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://150.95.66.124:8080/
unknown
malicious
https://23.239.0.12/x
unknown
malicious
https://23.239.0.12/?
unknown
malicious
https://23.239.0.12/=
unknown
malicious
https://23.239.0.12/
23.239.0.12
malicious
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://150.95.66.124/
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
https://disneyplus.com/legal.
unknown
http://crl.ver)
unknown
https://www.tiktok.com/legal/report/feedback
unknown
http://help.disneyplus.com.
unknown
https://support.hotspotshield.com/
unknown
There are 5 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
23.239.0.12
unknown
United States
malicious
150.95.66.124
unknown
Singapore
malicious
192.168.2.1
unknown
unknown
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100

Memdumps

Base Address
Regiontype
Protect
Malicious
180001000
direct allocation
page execute read
malicious
1A2C05E0000
direct allocation
page execute and read and write
malicious
CE0000
direct allocation
page execute and read and write
malicious
B80000
direct allocation
page execute and read and write
malicious
12A08A10000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
7FFA53242000
unkown
page readonly
23559DBC000
heap
page read and write
2CCF000
stack
page read and write
1A2C0391000
heap
page read and write
A4E000
heap
page read and write
2282D652000
heap
page read and write
B6799FF000
stack
page read and write
23559D9B000
heap
page read and write
2355A1B0000
remote allocation
page read and write
2282D5C0000
trusted library allocation
page read and write
9B8000
heap
page read and write
579A2FF000
stack
page read and write
23E0C900000
heap
page read and write
1D1C5A50000
heap
page read and write
22828600000
heap
page read and write
7FFA531F1000
unkown
page execute read
23559D9B000
heap
page read and write
12A07074000
heap
page read and write
1B7842C3000
heap
page read and write
23559D21000
heap
page read and write
22827E29000
heap
page read and write
D55000
heap
page read and write
23559D65000
heap
page read and write
22827F07000
heap
page read and write
1D1C5C7F000
heap
page read and write
281E000
stack
page read and write
983037F000
stack
page read and write
26D1E75000
stack
page read and write
2282D300000
trusted library allocation
page read and write
23E0C85D000
heap
page read and write
2A572A4E000
heap
page read and write
23559D65000
heap
page read and write
1D1C5B80000
heap
page read and write
23E0C84E000
heap
page read and write
2282D4C4000
trusted library allocation
page read and write
CD0000
direct allocation
page execute and read and write
22828E50000
trusted library allocation
page read and write
23559D7F000
heap
page read and write
9185CFE000
stack
page read and write
14CFAA20000
trusted library allocation
page read and write
1EE6DB60000
heap
page read and write
1EE6DD00000
heap
page read and write
23559DB0000
heap
page read and write
1EE6DB70000
heap
page read and write
1EE6DC4A000
heap
page read and write
14CF9D05000
heap
page read and write
67C907B000
stack
page read and write
2282D6F6000
heap
page read and write
67C917B000
stack
page read and write
23559DAC000
heap
page read and write
BB0DC7C000
stack
page read and write
2600000
heap
page read and write
16B76650000
heap
page read and write
23559D66000
heap
page read and write
5799E7E000
stack
page read and write
26D217B000
stack
page read and write
579A4FF000
stack
page read and write
2282D930000
trusted library allocation
page read and write
2282D800000
remote allocation
page read and write
22828704000
heap
page read and write
3112DBC000
stack
page read and write
2355A218000
heap
page read and write
23559D66000
heap
page read and write
1B7842D2000
heap
page read and write
579A0FE000
stack
page read and write
D10000
heap
page readonly
1D1C5C8F000
heap
page read and write
23559DD4000
heap
page read and write
23559D82000
heap
page read and write
18002E000
direct allocation
page read and write
2282D6B4000
heap
page read and write
1EE6DC13000
heap
page read and write
A97000
heap
page read and write
23559D87000
heap
page read and write
1B7842BE000
heap
page read and write
180000000
direct allocation
page read and write
23559D66000
heap
page read and write
2282D570000
trusted library allocation
page read and write
7FFA53246000
unkown
page read and write
BA82F9000
stack
page read and write
1EE6DC00000
heap
page read and write
22827E58000
heap
page read and write
1F8C5070000
heap
page read and write
5AA82FE000
stack
page read and write
2355A202000
heap
page read and write
12A07008000
heap
page read and write
23559DA1000
heap
page read and write
2C4E000
stack
page read and write
23559D18000
heap
page read and write
23559D65000
heap
page read and write
7FFA53242000
unkown
page readonly
16B766C0000
heap
page read and write
2604000
heap
page read and write
1B784280000
heap
page read and write
22827C90000
heap
page read and write
235594C7000
heap
page read and write
16B76902000
heap
page read and write
235594B5000
heap
page read and write
1B7842B7000
heap
page read and write
2282D6FC000
heap
page read and write
A41000
heap
page read and write
235594AC000
heap
page read and write
5799BCD000
stack
page read and write
2A572A88000
heap
page read and write
7FFA53242000
unkown
page readonly
23E0C82A000
heap
page read and write
1EE6E470000
trusted library allocation
page read and write
1B784200000
heap
page read and write
2A572B13000
heap
page read and write
1D1C5C20000
heap
page read and write
8F0000
heap
page read and write
14CF9D0D000
heap
page read and write
23559D9F000
heap
page read and write
BB0DFFF000
stack
page read and write
2355A222000
heap
page read and write
BA8179000
stack
page read and write
22828759000
heap
page read and write
23E0C770000
trusted library allocation
page read and write
983047E000
stack
page read and write
23559D70000
heap
page read and write
23559D68000
heap
page read and write
12A06F60000
heap
page read and write
1B7842E5000
heap
page read and write
23559D9B000
heap
page read and write
A7C000
heap
page read and write
1EE6DBD0000
heap
page read and write
23559D9B000
heap
page read and write
1A2C0160000
heap
page read and write
14CFAC60000
trusted library allocation
page read and write
23E0C889000
heap
page read and write
2355A222000
heap
page read and write
67C91FE000
stack
page read and write
2282D4A8000
trusted library allocation
page read and write
23559D9B000
heap
page read and write
14CF9F29000
heap
page read and write
64E79BB000
stack
page read and write
5AA8878000
stack
page read and write
22827D00000
heap
page read and write
16B76913000
heap
page read and write
1EE6DC29000
heap
page read and write
2282D5D0000
trusted library allocation
page read and write
23559D9B000
heap
page read and write
22827E7A000
heap
page read and write
235594EB000
heap
page read and write
23559D95000
heap
page read and write
7FFA531F1000
unkown
page execute read
14CF9D2C000
heap
page read and write
2A572A00000
heap
page read and write
23E0C85D000
heap
page read and write
7FFA53246000
unkown
page read and write
16B7686A000
heap
page read and write
BB0DF7B000
stack
page read and write
2282D649000
heap
page read and write
12A07260000
heap
page read and write
16B767C0000
trusted library allocation
page read and write
1D1C5C74000
heap
page read and write
23E0C670000
heap
page read and write
1F8C50AD000
heap
page read and write
A7C000
heap
page read and write
2A572A48000
heap
page read and write
A7C000
heap
page read and write
14CFAC50000
trusted library allocation
page read and write
14CF9D1C000
heap
page read and write
2282D600000
heap
page read and write
9185AFE000
stack
page read and write
180000000
direct allocation
page read and write
16B76800000
heap
page read and write
23559D71000
heap
page read and write
2282D4E4000
trusted library allocation
page read and write
235594E9000
heap
page read and write
23559D92000
heap
page read and write
9F2000
heap
page read and write
23559D65000
heap
page read and write
2355944B000
heap
page read and write
23559DB7000
heap
page read and write
1A2C0392000
heap
page read and write
14CFAC30000
trusted library allocation
page read and write
12A07265000
heap
page read and write
18002F000
direct allocation
page readonly
22827E56000
heap
page read and write
2A572A6A000
heap
page read and write
1A2C0350000
heap
page read and write
BA7D3B000
stack
page read and write
28C4000
heap
page read and write
579A3FD000
stack
page read and write
23E0C87E000
heap
page read and write
16B76875000
heap
page read and write
1F8C50A0000
heap
page read and write
579A1F7000
stack
page read and write
23559447000
heap
page read and write
1EE6DC7C000
heap
page read and write
2282D380000
trusted library allocation
page read and write
23559502000
heap
page read and write
22827EAF000
heap
page read and write
A41000
heap
page read and write
A4B000
heap
page read and write
2A572B02000
heap
page read and write
2355944D000
heap
page read and write
2A4E000
stack
page read and write
7FFA531F0000
unkown
page readonly
2A572A13000
heap
page read and write
1A2C0310000
heap
page read and write
235594C0000
heap
page read and write
2355946F000
heap
page read and write
12A08A80000
heap
page read and write
1A2C0620000
heap
page read and write
64E81FB000
stack
page read and write
23559D9F000
heap
page read and write
1B7842A8000
heap
page read and write
A07000
heap
page read and write
23559DBC000
heap
page read and write
22828700000
heap
page read and write
A4E000
heap
page read and write
1A2C0625000
heap
page read and write
5AA827E000
stack
page read and write
9185C7F000
stack
page read and write
2355A202000
heap
page read and write
14CF9CC9000
heap
page read and write
BA827F000
stack
page read and write
1EE6DC8D000
heap
page read and write
67C8EFE000
stack
page read and write
23559D87000
heap
page read and write
1B7842BA000
heap
page read and write
1A2C0340000
heap
page readonly
5AA8677000
stack
page read and write
22828713000
heap
page read and write
16B76822000
heap
page read and write
2355A218000
heap
page read and write
18002D000
direct allocation
page readonly
14CF9BB0000
trusted library allocation
page read and write
1EE6DC4F000
heap
page read and write
16B76813000
heap
page read and write
1D1C5C66000
heap
page read and write
A07000
heap
page read and write
23559D00000
heap
page read and write
258E000
stack
page read and write
2282D6F0000
heap
page read and write
BB0E0F7000
stack
page read and write
180000000
direct allocation
page read and write
1EE6E602000
trusted library allocation
page read and write
31133FB000
stack
page read and write
1B7842BA000
heap
page read and write
23E0C870000
heap
page read and write
5AA857A000
stack
page read and write
12A071D0000
heap
page read and write
22827E00000
heap
page read and write
2282D4C0000
trusted library allocation
page read and write
64E7DF7000
stack
page read and write
2355948A000
heap
page read and write
C80000
heap
page read and write
235594AB000
heap
page read and write
1B785E20000
heap
page read and write
23E0C600000
heap
page read and write
23E0C813000
heap
page read and write
22827E13000
heap
page read and write
5AA7FEB000
stack
page read and write
2282D600000
trusted library allocation
page read and write
1EE6DD08000
heap
page read and write
67C8E7B000
stack
page read and write
23E0C84B000
heap
page read and write
2355A1B0000
remote allocation
page read and write
23559451000
heap
page read and write
A7C000
heap
page read and write
23559D82000
heap
page read and write
14CF9D1D000
heap
page read and write
14CF9D26000
heap
page read and write
64E80FE000
stack
page read and write
12A07051000
heap
page read and write
23559D8C000
heap
page read and write
23559DB0000
heap
page read and write
12A07230000
direct allocation
page execute and read and write
26D207E000
stack
page read and write
2282D69C000
heap
page read and write
23559DD4000
heap
page read and write
2D3E000
heap
page read and write
22827F02000
heap
page read and write
23559D66000
heap
page read and write
12A08AF0000
heap
page read and write
A7C000
heap
page read and write
23559D66000
heap
page read and write
BB0DCFD000
stack
page read and write
2282D390000
trusted library allocation
page read and write
2282D63C000
heap
page read and write
23559D9B000
heap
page read and write
23559DD4000
heap
page read and write
23559D89000
heap
page read and write
23559D61000
heap
page read and write
14CF9D0D000
heap
page read and write
28C0000
heap
page read and write
2282D610000
heap
page read and write
2A572A02000
heap
page read and write
23559450000
heap
page read and write
1B784285000
heap
page read and write
B67987B000
stack
page read and write
2282D310000
trusted library allocation
page read and write
14CFAC40000
heap
page readonly
12A07000000
heap
page read and write
2282D4A0000
trusted library allocation
page read and write
2355A202000
heap
page read and write
23559D65000
heap
page read and write
5AA8AF8000
stack
page read and write
14CF9D29000
heap
page read and write
23E0C880000
heap
page read and write
64E82FB000
stack
page read and write
22828718000
heap
page read and write
23E0C849000
heap
page read and write
BA81F9000
stack
page read and write
23559400000
heap
page read and write
16B76856000
heap
page read and write
228292F0000
trusted library allocation
page read and write
22827F02000
heap
page read and write
23559DC6000
heap
page read and write
1EE6DD02000
heap
page read and write
22827EFF000
heap
page read and write
23559429000
heap
page read and write
5A912FD000
stack
page read and write
1B7842BF000
heap
page read and write
23559D9B000
heap
page read and write
1B7842DE000
heap
page read and write
D30000
heap
page read and write
5AA877E000
stack
page read and write
18002F000
direct allocation
page readonly
23559D9F000
heap
page read and write
235594E6000
heap
page read and write
22827EAF000
heap
page read and write
7FFA53249000
unkown
page readonly
228292F3000
trusted library allocation
page read and write
14CF9D26000
heap
page read and write
A41000
heap
page read and write
1B7842C3000
heap
page read and write
1B784190000
heap
page read and write
2A573202000
trusted library allocation
page read and write
23559D9B000
heap
page read and write
23559D84000
heap
page read and write
14CF9CC0000
heap
page read and write
1B7842CD000
heap
page read and write
5799B4B000
stack
page read and write
5AA89F9000
stack
page read and write
934000
stack
page read and write
A21000
heap
page read and write
12A06FD0000
heap
page read and write
EAF000
stack
page read and write
1EE6DC86000
heap
page read and write
14CF9F25000
heap
page read and write
18002E000
direct allocation
page read and write
18002D000
direct allocation
page readonly
23E0C610000
heap
page read and write
CE0000
heap
page read and write
67C94FD000
stack
page read and write
2A5728C0000
heap
page read and write
EB0000
heap
page read and write
26D1F7F000
stack
page read and write
910000
heap
page read and write
14CF9CD1000
heap
page read and write
7FFA53249000
unkown
page readonly
2282D6FA000
heap
page read and write
2282D4AE000
trusted library allocation
page read and write
14CF9BA0000
heap
page read and write
960000
heap
page read and write
23559D6B000
heap
page read and write
2282D698000
heap
page read and write
BB0DD7F000
stack
page read and write
23559D79000
heap
page read and write
1B7842CD000
heap
page read and write
1A2C0381000
heap
page read and write
F75000
heap
page read and write
F3F000
stack
page read and write
2282D6D8000
heap
page read and write
1A2C0330000
direct allocation
page execute and read and write
18002D000
direct allocation
page readonly
23E0C83C000
heap
page read and write
1B7842A0000
heap
page read and write
23559508000
heap
page read and write
22827CA0000
heap
page read and write
235592A0000
heap
page read and write
64E7EFA000
stack
page read and write
22827E7C000
heap
page read and write
1A2C02A0000
heap
page read and write
31132FB000
stack
page read and write
BB0E2FC000
stack
page read and write
2A572A8D000
heap
page read and write
1B787650000
trusted library allocation
page read and write
1D1C5C7F000
heap
page read and write
2355944E000
heap
page read and write
12A08AF4000
heap
page read and write
2282D5E0000
trusted library allocation
page read and write
8B5000
stack
page read and write
22827EA0000
heap
page read and write
2282D4D0000
trusted library allocation
page read and write
22827E77000
heap
page read and write
23559D89000
heap
page read and write
7FFA531F1000
unkown
page execute read
9F2000
heap
page read and write
23559DA6000
heap
page read and write
990000
heap
page read and write
1D1C5C93000
heap
page read and write
228292D1000
trusted library allocation
page read and write
2355A202000
heap
page read and write
23E0C853000
heap
page read and write
2A572A53000
heap
page read and write
228285A0000
trusted library allocation
page read and write
2ACB000
stack
page read and write
7FFA53246000
unkown
page read and write
23559DD4000
heap
page read and write
1B7842C9000
heap
page read and write
A1E000
heap
page read and write
2C8F000
stack
page read and write
14CF9D2C000
heap
page read and write
CE5000
heap
page read and write
22829300000
trusted library allocation
page read and write
23559D66000
heap
page read and write
279E000
stack
page read and write
235594E1000
heap
page read and write
23559DCD000
heap
page read and write
2282D5B0000
trusted library allocation
page read and write
23559D93000
heap
page read and write
7FFA531F1000
unkown
page execute read
23E0C902000
heap
page read and write
1D1C5C76000
heap
page read and write
C30000
trusted library allocation
page read and write
16B77002000
trusted library allocation
page read and write
14CFACB0000
trusted library allocation
page read and write
26D1EFF000
stack
page read and write
16B76900000
heap
page read and write
BB0E1FE000
stack
page read and write
23E0C800000
heap
page read and write
2A5729C0000
trusted library allocation
page read and write
23559D16000
heap
page read and write
8E0000
remote allocation
page read and write
23559D6D000
heap
page read and write
2A572A4C000
heap
page read and write
9185D7C000
stack
page read and write
22827F14000
heap
page read and write
23559D9B000
heap
page read and write
23559449000
heap
page read and write
9830276000
stack
page read and write
2A572860000
heap
page read and write
2282D6AA000
heap
page read and write
22827E92000
heap
page read and write
26D20FF000
stack
page read and write
23559482000
heap
page read and write
A41000
heap
page read and write
C30000
trusted library allocation
page read and write
31134FE000
stack
page read and write
2282D570000
trusted library allocation
page read and write
2282D65F000
heap
page read and write
2BCF000
stack
page read and write
23559DA2000
heap
page read and write
23559D82000
heap
page read and write
67C92F7000
stack
page read and write
1D1C5C66000
heap
page read and write
2355A1B0000
remote allocation
page read and write
A94000
heap
page read and write
22827EAB000
heap
page read and write
2282D4E0000
trusted library allocation
page read and write
2A572B00000
heap
page read and write
1EE6DC4D000
heap
page read and write
23559D82000
heap
page read and write
2282D4C1000
trusted library allocation
page read and write
67C93FF000
stack
page read and write
16B76802000
heap
page read and write
23559DAD000
heap
page read and write
235592B0000
heap
page read and write
990000
heap
page readonly
579A07B000
stack
page read and write
23559D82000
heap
page read and write
22828602000
heap
page read and write
23E0D002000
trusted library allocation
page read and write
23559D89000
heap
page read and write
A07000
heap
page read and write
1B787640000
heap
page read and write
5AA847E000
stack
page read and write
2282D800000
remote allocation
page read and write
23559453000
heap
page read and write
9B0000
heap
page read and write
23E0C913000
heap
page read and write
9185B7E000
stack
page read and write
23559DB1000
heap
page read and write
18002F000
direct allocation
page readonly
1F8C50B3000
heap
page read and write
23559DBE000
heap
page read and write
9F2000
heap
page read and write
23559D82000
heap
page read and write
23559448000
heap
page read and write
A1E000
heap
page read and write
1A2C0358000
heap
page read and write
1D1C5BA0000
heap
page read and write
22827E8E000
heap
page read and write
23559D84000
heap
page read and write
2A572850000
heap
page read and write
23559D86000
heap
page read and write
23559D86000
heap
page read and write
23559BB0000
trusted library allocation
page read and write
23559D9B000
heap
page read and write
1A2C1E20000
heap
page read and write
16B76828000
heap
page read and write
D3B000
heap
page read and write
A21000
heap
page read and write
7FFA53249000
unkown
page readonly
5AA88FF000
unkown
page read and write
2282D8F0000
trusted library allocation
page read and write
23559D66000
heap
page read and write
A1F000
heap
page read and write
23559D65000
heap
page read and write
2A572A7E000
heap
page read and write
1D1C5C8E000
heap
page read and write
23E0C847000
heap
page read and write
23559D7F000
heap
page read and write
23559310000
heap
page read and write
9185BF8000
stack
page read and write
2282D4D0000
trusted library allocation
page read and write
235594D4000
heap
page read and write
18002E000
direct allocation
page read and write
F70000
heap
page read and write
14CF9C30000
heap
page read and write
12A0705D000
heap
page read and write
16B76660000
heap
page read and write
14CF9C10000
heap
page read and write
1EE6DC3C000
heap
page read and write
1D1C5C61000
heap
page read and write
7FFA53246000
unkown
page read and write
2282D702000
heap
page read and write
2282D570000
trusted library allocation
page read and write
B67997E000
stack
page read and write
2282D4A0000
trusted library allocation
page read and write
18002D000
direct allocation
page readonly
CA0000
remote allocation
page read and write
23E0C908000
heap
page read and write
67C8F7E000
stack
page read and write
2A572B08000
heap
page read and write
1B787E50000
heap
page read and write
1D1C5C7F000
heap
page read and write
2282D6DA000
heap
page read and write
22827E3F000
heap
page read and write
22828759000
heap
page read and write
2282D62E000
heap
page read and write
2282D6B3000
heap
page read and write
1B784220000
heap
page read and write
1EE6DC54000
heap
page read and write
23559DBB000
heap
page read and write
29CC000
stack
page read and write
14CF9F20000
heap
page read and write
A94000
heap
page read and write
8E0000
remote allocation
page read and write
7FFA53249000
unkown
page readonly
2355A202000
heap
page read and write
2355A202000
heap
page read and write
1A2C1CA0000
heap
page read and write
12A07210000
heap
page read and write
1B78428B000
heap
page read and write
22827EA2000
heap
page read and write
16B76840000
heap
page read and write
2282D6DA000
heap
page read and write
64E86FA000
stack
page read and write
880000
heap
page read and write
7FFA531F0000
unkown
page readonly
1A2C1E24000
heap
page read and write
2355944C000
heap
page read and write
1F8C4F30000
heap
page read and write
18002F000
direct allocation
page readonly
22827EFF000
heap
page read and write
22828615000
heap
page read and write
22827E72000
heap
page read and write
23559D9B000
heap
page read and write
22828702000
heap
page read and write
7FFA531F0000
unkown
page readonly
23559D9B000
heap
page read and write
1B787643000
heap
page read and write
23559516000
heap
page read and write
64E88FE000
stack
page read and write
12A0708F000
heap
page read and write
7FFA53242000
unkown
page readonly
980000
direct allocation
page execute and read and write
23559D53000
heap
page read and write
235594FA000
heap
page read and write
1D1C5C25000
heap
page read and write
1EE6DD13000
heap
page read and write
98303FE000
stack
page read and write
14CF9CB0000
trusted library allocation
page read and write
23559DB0000
heap
page read and write
970000
heap
page read and write
1D1C5C75000
heap
page read and write
2282D800000
remote allocation
page read and write
98302FF000
stack
page read and write
7FFA531F0000
unkown
page readonly
A22000
heap
page read and write
2355A202000
heap
page read and write
22827E8C000
heap
page read and write
23559513000
heap
page read and write
23559413000
heap
page read and write
9E0000
heap
page read and write
2282D580000
trusted library allocation
page read and write
23559D82000
heap
page read and write
180000000
direct allocation
page read and write
23559D82000
heap
page read and write
B6798FE000
stack
page read and write
64E7FFA000
stack
page read and write
14CF9F30000
trusted library allocation
page read and write
A97000
heap
page read and write
1D1C5C50000
heap
page read and write
CA0000
remote allocation
page read and write
14CF9EE0000
trusted library allocation
page read and write
2282D621000
heap
page read and write
12A07240000
heap
page readonly
26D1FFC000
stack
page read and write
1D1C5C72000
heap
page read and write
14CF9CA0000
trusted library allocation
page read and write
2CD0000
heap
page read and write
2282D4E0000
trusted library allocation
page read and write
23559DAC000
heap
page read and write
18002E000
direct allocation
page read and write
2A572A29000
heap
page read and write
22827EBD000
heap
page read and write
9185A7A000
stack
page read and write
23559C02000
heap
page read and write
D91000
heap
page read and write
2282D5F0000
trusted library allocation
page read and write
14CF9D0D000
heap
page read and write
2D0B000
stack
page read and write
2355943C000
heap
page read and write
23559454000
heap
page read and write
22828718000
heap
page read and write
1A2C037C000
heap
page read and write
2355A200000
heap
page read and write
23559456000
heap
page read and write
2282D6DF000
heap
page read and write
2A572A3C000
heap
page read and write
1A2C02C0000
heap
page read and write
BB0E3FE000
stack
page read and write
CA0000
remote allocation
page read and write
1EE6DC70000
heap
page read and write
800000
heap
page read and write
There are 630 hidden memdumps, click here to show them.