Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
wgJ5YjI2QO.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
MPEG-4 LOAS
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x5e833448, page size 16384, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\wgJ5YjI2QO.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\wgJ5YjI2QO.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\wgJ5YjI2QO.dll,DllRegisterServer
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\wgJ5YjI2QO.dll,DllUnregisterServer
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\OtCXm\kDbCLHDWWfGFPvP.dll"
|
||
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\wgJ5YjI2QO.dll"
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\wgJ5YjI2QO.dll",#1
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
There are 2 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://23.239.0.12/
|
23.239.0.12
|
||
https://www.disneyplus.com/legal/your-california-privacy-rights
|
unknown
|
||
https://www.disneyplus.com/legal/privacy-policy
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/add
|
unknown
|
||
https://www.hotspotshield.com/terms/
|
unknown
|
||
https://www.pango.co/privacy
|
unknown
|
||
https://disneyplus.com/legal.
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
http://schemas.xmlsoap.org/ws/200
|
unknown
|
||
https://www.tiktok.com/legal/report/feedback
|
unknown
|
||
http://help.disneyplus.com.
|
unknown
|
||
https://support.hotspotshield.com/
|
unknown
|
||
https://displaycatalog.mp.microsoft.c80
|
unknown
|
There are 3 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
23.239.0.12
|
unknown
|
United States
|
||
192.168.2.1
|
unknown
|
unknown
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
CD0000
|
direct allocation
|
page execute and read and write
|
||
16F0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
14421CA0000
|
direct allocation
|
page execute and read and write
|
||
20BBFB80000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
1D30F000000
|
trusted library allocation
|
page read and write
|
||
1D30F288000
|
heap
|
page read and write
|
||
1A96D0B5000
|
heap
|
page read and write
|
||
14421D65000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1D309AAB000
|
heap
|
page read and write
|
||
274D5602000
|
heap
|
page read and write
|
||
AF9B177000
|
stack
|
page read and write
|
||
1D30A302000
|
heap
|
page read and write
|
||
EBFFE7B000
|
stack
|
page read and write
|
||
27AC000
|
stack
|
page read and write
|
||
DCB000
|
heap
|
page read and write
|
||
1D30F29E000
|
heap
|
page read and write
|
||
5096078000
|
stack
|
page read and write
|
||
7FFA53261000
|
unkown
|
page execute read
|
||
14D0000
|
heap
|
page read and write
|
||
2AE98A82000
|
heap
|
page read and write
|
||
2661C054000
|
heap
|
page read and write
|
||
14421A98000
|
heap
|
page read and write
|
||
14421D60000
|
heap
|
page read and write
|
||
2AE98A00000
|
heap
|
page read and write
|
||
1D30A200000
|
heap
|
page read and write
|
||
16361D25000
|
heap
|
page read and write
|
||
1D30EFE8000
|
trusted library allocation
|
page read and write
|
||
14421A20000
|
heap
|
page read and write
|
||
274D57B7000
|
heap
|
page read and write
|
||
20BBFC50000
|
heap
|
page read and write
|
||
AF9B5FA000
|
stack
|
page read and write
|
||
23F88279000
|
heap
|
page read and write
|
||
14421A40000
|
heap
|
page read and write
|
||
16361AC6000
|
heap
|
page read and write
|
||
2661C100000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
19D18082000
|
heap
|
page read and write
|
||
19D18069000
|
heap
|
page read and write
|
||
274D579C000
|
heap
|
page read and write
|
||
16D79B40000
|
heap
|
page read and write
|
||
274D5796000
|
heap
|
page read and write
|
||
19D1B250000
|
heap
|
page read and write
|
||
1D30F470000
|
trusted library allocation
|
page read and write
|
||
14421C60000
|
heap
|
page read and write
|
||
274D57C3000
|
heap
|
page read and write
|
||
23FF6FF000
|
stack
|
page read and write
|
||
BB5447B000
|
stack
|
page read and write
|
||
1D30F2E9000
|
heap
|
page read and write
|
||
274D5799000
|
heap
|
page read and write
|
||
2AE98B13000
|
heap
|
page read and write
|
||
7FFA53261000
|
unkown
|
page execute read
|
||
8C440F7000
|
stack
|
page read and write
|
||
326F000
|
stack
|
page read and write
|
||
19D182F0000
|
heap
|
page read and write
|
||
356E000
|
stack
|
page read and write
|
||
1D30F020000
|
trusted library allocation
|
page read and write
|
||
274D4E56000
|
heap
|
page read and write
|
||
16361AD1000
|
heap
|
page read and write
|
||
E1D000
|
heap
|
page read and write
|
||
7FFA53261000
|
unkown
|
page execute read
|
||
1D30F024000
|
trusted library allocation
|
page read and write
|
||
1D309AAB000
|
heap
|
page read and write
|
||
1755000
|
heap
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
2661C000000
|
heap
|
page read and write
|
||
1D30A304000
|
heap
|
page read and write
|
||
144236A0000
|
heap
|
page read and write
|
||
274D4E4F000
|
heap
|
page read and write
|
||
1D309A13000
|
heap
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
282E000
|
stack
|
page read and write
|
||
1A96D0D6000
|
heap
|
page read and write
|
||
672517E000
|
stack
|
page read and write
|
||
2AE99280000
|
trusted library allocation
|
page read and write
|
||
934F3FB000
|
stack
|
page read and write
|
||
1D309AF9000
|
heap
|
page read and write
|
||
274D4E3C000
|
heap
|
page read and write
|
||
2661C086000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
274D4E55000
|
heap
|
page read and write
|
||
9B0000
|
direct allocation
|
page execute and read and write
|
||
7FFA532B6000
|
unkown
|
page read and write
|
||
16361A00000
|
trusted library allocation
|
page read and write
|
||
274D578C000
|
heap
|
page read and write
|
||
1D30A313000
|
heap
|
page read and write
|
||
274D4E4A000
|
heap
|
page read and write
|
||
1A96D0FE000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
2AE98A80000
|
heap
|
page read and write
|
||
1D30A300000
|
heap
|
page read and write
|
||
1A96D0FE000
|
heap
|
page read and write
|
||
274D5794000
|
heap
|
page read and write
|
||
7FFA532B6000
|
unkown
|
page read and write
|
||
274D577E000
|
heap
|
page read and write
|
||
BB5437A000
|
stack
|
page read and write
|
||
2AE98A02000
|
heap
|
page read and write
|
||
1D309A9B000
|
heap
|
page read and write
|
||
274D4DD0000
|
remote allocation
|
page read and write
|
||
274D4E8A000
|
heap
|
page read and write
|
||
1D30F0B0000
|
trusted library allocation
|
page read and write
|
||
2AE98B02000
|
heap
|
page read and write
|
||
274D4E53000
|
heap
|
page read and write
|
||
2AE98A80000
|
heap
|
page read and write
|
||
16362940000
|
trusted library allocation
|
page read and write
|
||
905000
|
stack
|
page read and write
|
||
14421C94000
|
heap
|
page read and write
|
||
1D30F110000
|
trusted library allocation
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1D30EFE0000
|
trusted library allocation
|
page read and write
|
||
2661C113000
|
heap
|
page read and write
|
||
AF9AFFB000
|
stack
|
page read and write
|
||
274D4F16000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
23F88313000
|
heap
|
page read and write
|
||
2AE98970000
|
heap
|
page read and write
|
||
23FF67F000
|
stack
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
19D18315000
|
heap
|
page read and write
|
||
2AE98A66000
|
heap
|
page read and write
|
||
274D4EA9000
|
heap
|
page read and write
|
||
274D4E52000
|
heap
|
page read and write
|
||
274D5C02000
|
heap
|
page read and write
|
||
1A96CF50000
|
heap
|
page read and write
|
||
1D30F2F7000
|
heap
|
page read and write
|
||
1D30F140000
|
remote allocation
|
page read and write
|
||
274D5798000
|
heap
|
page read and write
|
||
672527E000
|
stack
|
page read and write
|
||
1D30A359000
|
heap
|
page read and write
|
||
2661C024000
|
heap
|
page read and write
|
||
16361830000
|
heap
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
1D309A90000
|
heap
|
page read and write
|
||
14421A90000
|
heap
|
page read and write
|
||
1D309B07000
|
heap
|
page read and write
|
||
16362690000
|
trusted library allocation
|
page read and write
|
||
7FFA532B2000
|
unkown
|
page readonly
|
||
672507F000
|
stack
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
AF9B379000
|
stack
|
page read and write
|
||
1D30F0B0000
|
trusted library allocation
|
page read and write
|
||
23F881A0000
|
heap
|
page read and write
|
||
23F88130000
|
heap
|
page read and write
|
||
7FFA532B2000
|
unkown
|
page readonly
|
||
23F8826D000
|
heap
|
page read and write
|
||
1A96D0E6000
|
heap
|
page read and write
|
||
2AE99402000
|
trusted library allocation
|
page read and write
|
||
7FFA532B6000
|
unkown
|
page read and write
|
||
1D30F001000
|
trusted library allocation
|
page read and write
|
||
934F4FF000
|
stack
|
page read and write
|
||
19D1B3E3000
|
heap
|
page read and write
|
||
19D18088000
|
heap
|
page read and write
|
||
274D57C5000
|
heap
|
page read and write
|
||
23F88202000
|
heap
|
page read and write
|
||
1D309A87000
|
heap
|
page read and write
|
||
8C43FFF000
|
stack
|
page read and write
|
||
23F88200000
|
heap
|
page read and write
|
||
1D30EED0000
|
trusted library allocation
|
page read and write
|
||
7FFA532B2000
|
unkown
|
page readonly
|
||
BB5407E000
|
stack
|
page read and write
|
||
23FF7FE000
|
stack
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
AF9B277000
|
stack
|
page read and write
|
||
274D4E00000
|
heap
|
page read and write
|
||
2352A7C000
|
stack
|
page read and write
|
||
274D5796000
|
heap
|
page read and write
|
||
1519000
|
heap
|
page read and write
|
||
16361A80000
|
heap
|
page read and write
|
||
274D4E70000
|
heap
|
page read and write
|
||
7FFA532B9000
|
unkown
|
page readonly
|
||
2661BE40000
|
heap
|
page read and write
|
||
1D30A1E0000
|
trusted library allocation
|
page read and write
|
||
274D5C00000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
274D4F02000
|
heap
|
page read and write
|
||
2DF0000
|
trusted library allocation
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
274D579C000
|
heap
|
page read and write
|
||
1A96D0D1000
|
heap
|
page read and write
|
||
16D79B8D000
|
heap
|
page read and write
|
||
23F88302000
|
heap
|
page read and write
|
||
274D579F000
|
heap
|
page read and write
|
||
16361ADF000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
16361A70000
|
trusted library allocation
|
page read and write
|
||
934EDFB000
|
stack
|
page read and write
|
||
14FA000
|
heap
|
page read and write
|
||
274D4E4B000
|
heap
|
page read and write
|
||
2AE98B00000
|
heap
|
page read and write
|
||
3590000
|
remote allocation
|
page read and write
|
||
1D30A1D0000
|
trusted library allocation
|
page read and write
|
||
BB53ACB000
|
stack
|
page read and write
|
||
16361ACE000
|
heap
|
page read and write
|
||
16D79A00000
|
heap
|
page read and write
|
||
274D577E000
|
heap
|
page read and write
|
||
5095FF9000
|
stack
|
page read and write
|
||
16D79B80000
|
heap
|
page read and write
|
||
274D4EE2000
|
heap
|
page read and write
|
||
23F88300000
|
heap
|
page read and write
|
||
274D5C21000
|
heap
|
page read and write
|
||
274D5710000
|
heap
|
page read and write
|
||
23F88213000
|
heap
|
page read and write
|
||
19D180A1000
|
heap
|
page read and write
|
||
274D4E26000
|
heap
|
page read and write
|
||
16361840000
|
trusted library allocation
|
page read and write
|
||
2661BDE0000
|
heap
|
page read and write
|
||
274D4BA0000
|
heap
|
page read and write
|
||
20BC1554000
|
heap
|
page read and write
|
||
272F000
|
stack
|
page read and write
|
||
EBFFF7B000
|
stack
|
page read and write
|
||
274D5794000
|
heap
|
page read and write
|
||
3620000
|
heap
|
page read and write
|
||
EB802FF000
|
stack
|
page read and write
|
||
33ED000
|
stack
|
page read and write
|
||
1A96D106000
|
heap
|
page read and write
|
||
1D309A8A000
|
heap
|
page read and write
|
||
1D30F140000
|
trusted library allocation
|
page read and write
|
||
274D4E4C000
|
heap
|
page read and write
|
||
274D57A8000
|
heap
|
page read and write
|
||
274D4E13000
|
heap
|
page read and write
|
||
16361990000
|
heap
|
page read and write
|
||
12D0000
|
remote allocation
|
page read and write
|
||
2AE989E0000
|
heap
|
page read and write
|
||
274D4F08000
|
heap
|
page read and write
|
||
16361A87000
|
heap
|
page read and write
|
||
1D30A1F0000
|
trusted library allocation
|
page read and write
|
||
2352C79000
|
stack
|
page read and write
|
||
AF9AEFE000
|
stack
|
page read and write
|
||
274D4EBF000
|
heap
|
page read and write
|
||
1A96D102000
|
heap
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
2661C108000
|
heap
|
page read and write
|
||
1D30AE70000
|
trusted library allocation
|
page read and write
|
||
934F2FB000
|
stack
|
page read and write
|
||
1D309B02000
|
heap
|
page read and write
|
||
1A96D0E5000
|
heap
|
page read and write
|
||
67252FB000
|
stack
|
page read and write
|
||
274D579D000
|
heap
|
page read and write
|
||
274D4F13000
|
heap
|
page read and write
|
||
1D309A29000
|
heap
|
page read and write
|
||
1A96D104000
|
heap
|
page read and write
|
||
1D30F100000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
remote allocation
|
page read and write
|
||
23FF77E000
|
stack
|
page read and write
|
||
1D309AF9000
|
heap
|
page read and write
|
||
2AE98A60000
|
heap
|
page read and write
|
||
2661C064000
|
heap
|
page read and write
|
||
1A96D0C0000
|
heap
|
page read and write
|
||
1D30A215000
|
heap
|
page read and write
|
||
1D30F010000
|
trusted library allocation
|
page read and write
|
||
274D579E000
|
heap
|
page read and write
|
||
20BBF980000
|
heap
|
page read and write
|
||
1740000
|
trusted library allocation
|
page read and write
|
||
2661C07D000
|
heap
|
page read and write
|
||
EBFFC7B000
|
stack
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
9F0000
|
heap
|
page readonly
|
||
18002E000
|
direct allocation
|
page read and write
|
||
23F88140000
|
heap
|
page read and write
|
||
8C441FD000
|
stack
|
page read and write
|
||
1D309B02000
|
heap
|
page read and write
|
||
274D574E000
|
heap
|
page read and write
|
||
16361970000
|
heap
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
274D579A000
|
heap
|
page read and write
|
||
274D5796000
|
heap
|
page read and write
|
||
934F5FE000
|
stack
|
page read and write
|
||
2894000
|
heap
|
page read and write
|
||
2352CFE000
|
stack
|
page read and write
|
||
1D309A77000
|
heap
|
page read and write
|
||
19D18082000
|
heap
|
page read and write
|
||
20BBF930000
|
heap
|
page read and write
|
||
2661C802000
|
trusted library allocation
|
page read and write
|
||
163628D0000
|
heap
|
page readonly
|
||
12B4000
|
stack
|
page read and write
|
||
7FFA53261000
|
unkown
|
page execute read
|
||
6724DF5000
|
stack
|
page read and write
|
||
7FFA53260000
|
unkown
|
page readonly
|
||
1D30A359000
|
heap
|
page read and write
|
||
274D5C03000
|
heap
|
page read and write
|
||
1D309940000
|
trusted library allocation
|
page read and write
|
||
1D309AA9000
|
heap
|
page read and write
|
||
7FFA532B6000
|
unkown
|
page read and write
|
||
274D4C10000
|
heap
|
page read and write
|
||
E22000
|
heap
|
page read and write
|
||
1A96D1C0000
|
heap
|
page read and write
|
||
1D30EFE0000
|
trusted library allocation
|
page read and write
|
||
2661C05E000
|
heap
|
page read and write
|
||
20BBF910000
|
heap
|
page read and write
|
||
1D30EFEE000
|
trusted library allocation
|
page read and write
|
||
2661BF40000
|
trusted library allocation
|
page read and write
|
||
7FFA53260000
|
unkown
|
page readonly
|
||
274D57FF000
|
heap
|
page read and write
|
||
2AE98980000
|
heap
|
page read and write
|
||
14FE000
|
heap
|
page read and write
|
||
1D30F29C000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
1D30F140000
|
remote allocation
|
page read and write
|
||
AF9B47E000
|
stack
|
page read and write
|
||
1D30A9F0000
|
trusted library allocation
|
page read and write
|
||
1D3097D0000
|
heap
|
page read and write
|
||
274D4EC5000
|
heap
|
page read and write
|
||
7FFA532B9000
|
unkown
|
page readonly
|
||
34EF000
|
stack
|
page read and write
|
||
23F88228000
|
heap
|
page read and write
|
||
19D180A1000
|
heap
|
page read and write
|
||
14F2000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
1D30F2FC000
|
heap
|
page read and write
|
||
1A96D0E4000
|
heap
|
page read and write
|
||
1D30F255000
|
heap
|
page read and write
|
||
2AE98A2A000
|
heap
|
page read and write
|
||
1D30F0B0000
|
trusted library allocation
|
page read and write
|
||
615078D000
|
stack
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
AF9B4FF000
|
unkown
|
page read and write
|
||
274D579F000
|
heap
|
page read and write
|
||
274D5C03000
|
heap
|
page read and write
|
||
14CD000
|
heap
|
page read and write
|
||
8C442FF000
|
stack
|
page read and write
|
||
AF9AE7E000
|
stack
|
page read and write
|
||
D7F000
|
stack
|
page read and write
|
||
19D1831B000
|
heap
|
page read and write
|
||
2AE98A3C000
|
heap
|
page read and write
|
||
274D5794000
|
heap
|
page read and write
|
||
16361A10000
|
trusted library allocation
|
page read and write
|
||
EBFFFFE000
|
stack
|
page read and write
|
||
23F88258000
|
heap
|
page read and write
|
||
274D5C02000
|
heap
|
page read and write
|
||
1D30A318000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
1D30F130000
|
trusted library allocation
|
page read and write
|
||
19D1B3F0000
|
trusted library allocation
|
page read and write
|
||
274D57BE000
|
heap
|
page read and write
|
||
23FF3B6000
|
stack
|
page read and write
|
||
2AE98A8C000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
1D30EEC0000
|
trusted library allocation
|
page read and write
|
||
19D1808C000
|
heap
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
149C000
|
heap
|
page read and write
|
||
274D4EB3000
|
heap
|
page read and write
|
||
7FFA532B9000
|
unkown
|
page readonly
|
||
16361D20000
|
heap
|
page read and write
|
||
2352BFD000
|
stack
|
page read and write
|
||
274D579F000
|
heap
|
page read and write
|
||
67250FE000
|
stack
|
page read and write
|
||
274D578C000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
23F8823E000
|
heap
|
page read and write
|
||
1D30F120000
|
trusted library allocation
|
page read and write
|
||
1468000
|
heap
|
page read and write
|
||
274D4DD0000
|
remote allocation
|
page read and write
|
||
20BBF8A0000
|
heap
|
page read and write
|
||
274D57B7000
|
heap
|
page read and write
|
||
2661C002000
|
heap
|
page read and write
|
||
163628F0000
|
trusted library allocation
|
page read and write
|
||
19D18010000
|
heap
|
page read and write
|
||
1450000
|
direct allocation
|
page execute and read and write
|
||
274D4D10000
|
trusted library allocation
|
page read and write
|
||
2AE98A13000
|
heap
|
page read and write
|
||
19D1807D000
|
heap
|
page read and write
|
||
274D5C02000
|
heap
|
page read and write
|
||
274D4EDA000
|
heap
|
page read and write
|
||
19D18079000
|
heap
|
page read and write
|
||
2661BDD0000
|
heap
|
page read and write
|
||
20BBF9A0000
|
direct allocation
|
page execute and read and write
|
||
1D309B25000
|
heap
|
page read and write
|
||
2661C04A000
|
heap
|
page read and write
|
||
16361D30000
|
trusted library allocation
|
page read and write
|
||
1D30F21F000
|
heap
|
page read and write
|
||
14421CD0000
|
heap
|
page readonly
|
||
1A96D0EE000
|
heap
|
page read and write
|
||
2661C03C000
|
heap
|
page read and write
|
||
1D309A6E000
|
heap
|
page read and write
|
||
274D57A5000
|
heap
|
page read and write
|
||
16361ACE000
|
heap
|
page read and write
|
||
1D309A8C000
|
heap
|
page read and write
|
||
50960FE000
|
stack
|
page read and write
|
||
2661C102000
|
heap
|
page read and write
|
||
274D576B000
|
heap
|
page read and write
|
||
274D4EAA000
|
heap
|
page read and write
|
||
274D4EF4000
|
heap
|
page read and write
|
||
1D30F004000
|
trusted library allocation
|
page read and write
|
||
3590000
|
remote allocation
|
page read and write
|
||
1A96D0FE000
|
heap
|
page read and write
|
||
3590000
|
remote allocation
|
page read and write
|
||
DE5000
|
heap
|
page read and write
|
||
274D5C02000
|
heap
|
page read and write
|
||
1D309A74000
|
heap
|
page read and write
|
||
2E24000
|
heap
|
page read and write
|
||
274D57AD000
|
heap
|
page read and write
|
||
AF9ABEC000
|
stack
|
page read and write
|
||
274D57B2000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
2352D7A000
|
stack
|
page read and write
|
||
274D5797000
|
heap
|
page read and write
|
||
5095F7F000
|
stack
|
page read and write
|
||
14A2000
|
heap
|
page read and write
|
||
1D3097E0000
|
heap
|
page read and write
|
||
274D4DD0000
|
remote allocation
|
page read and write
|
||
19D1807E000
|
heap
|
page read and write
|
||
1A96D0EE000
|
heap
|
page read and write
|
||
BB5427E000
|
stack
|
page read and write
|
||
274D5794000
|
heap
|
page read and write
|
||
67251FE000
|
stack
|
page read and write
|
||
274D57B7000
|
heap
|
page read and write
|
||
1D30F200000
|
heap
|
page read and write
|
||
360E000
|
stack
|
page read and write
|
||
16D79B93000
|
heap
|
page read and write
|
||
2AE98B08000
|
heap
|
page read and write
|
||
19D17ED0000
|
heap
|
page read and write
|
||
274D5C02000
|
heap
|
page read and write
|
||
20BBF9B0000
|
heap
|
page read and write
|
||
274D4EEB000
|
heap
|
page read and write
|
||
1A96D0FE000
|
heap
|
page read and write
|
||
AF9B6FA000
|
stack
|
page read and write
|
||
1D30F262000
|
heap
|
page read and write
|
||
EB801FF000
|
stack
|
page read and write
|
||
274D5782000
|
heap
|
page read and write
|
||
1D30F430000
|
trusted library allocation
|
page read and write
|
||
19D180A6000
|
heap
|
page read and write
|
||
1D309AA8000
|
heap
|
page read and write
|
||
19D18079000
|
heap
|
page read and write
|
||
14A2000
|
heap
|
page read and write
|
||
1A96D0B0000
|
heap
|
page read and write
|
||
274D4E49000
|
heap
|
page read and write
|
||
1A96D0EE000
|
heap
|
page read and write
|
||
144219B0000
|
heap
|
page read and write
|
||
274D4E4E000
|
heap
|
page read and write
|
||
19D1B3E0000
|
heap
|
page read and write
|
||
1A96D0E2000
|
heap
|
page read and write
|
||
19D18076000
|
heap
|
page read and write
|
||
BB5477F000
|
stack
|
page read and write
|
||
1519000
|
heap
|
page read and write
|
||
1D30F24D000
|
heap
|
page read and write
|
||
20BBF9B8000
|
heap
|
page read and write
|
||
20BC1550000
|
heap
|
page read and write
|
||
2661C06D000
|
heap
|
page read and write
|
||
274D5700000
|
heap
|
page read and write
|
||
163628E0000
|
trusted library allocation
|
page read and write
|
||
19D1808C000
|
heap
|
page read and write
|
||
2661C013000
|
heap
|
page read and write
|
||
1D309A3D000
|
heap
|
page read and write
|
||
274D5C02000
|
heap
|
page read and write
|
||
5C2B72E000
|
stack
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
1200000
|
heap
|
page read and write
|
||
1D309A00000
|
heap
|
page read and write
|
||
1D30A202000
|
heap
|
page read and write
|
||
20BBFA0E000
|
heap
|
page read and write
|
||
16361AD7000
|
heap
|
page read and write
|
||
14421AC2000
|
heap
|
page read and write
|
||
EBFFD7E000
|
stack
|
page read and write
|
||
509617C000
|
stack
|
page read and write
|
||
16361ACE000
|
heap
|
page read and write
|
||
274D5C02000
|
heap
|
page read and write
|
||
EB800F7000
|
stack
|
page read and write
|
||
1D309AA6000
|
heap
|
page read and write
|
||
2AE98A54000
|
heap
|
page read and write
|
||
8C43F7A000
|
stack
|
page read and write
|
||
5C2B6AB000
|
stack
|
page read and write
|
||
274D57B7000
|
heap
|
page read and write
|
||
274D57DA000
|
heap
|
page read and write
|
||
BB53B4F000
|
stack
|
page read and write
|
||
2AE98A5A000
|
heap
|
page read and write
|
||
14421C90000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
1D30F010000
|
trusted library allocation
|
page read and write
|
||
274D579F000
|
heap
|
page read and write
|
||
274D5798000
|
heap
|
page read and write
|
||
19D18310000
|
heap
|
page read and write
|
||
1D309840000
|
heap
|
page read and write
|
||
1A96D080000
|
heap
|
page read and write
|
||
14FE000
|
heap
|
page read and write
|
||
16361D29000
|
heap
|
page read and write
|
||
1D30F240000
|
heap
|
page read and write
|
||
20BC1710000
|
heap
|
page read and write
|
||
14F2000
|
heap
|
page read and write
|
||
23F88C02000
|
trusted library allocation
|
page read and write
|
||
14421C80000
|
direct allocation
|
page execute and read and write
|
||
274D5713000
|
heap
|
page read and write
|
||
7FFA53260000
|
unkown
|
page readonly
|
||
1720000
|
heap
|
page readonly
|
||
1D30F2F0000
|
heap
|
page read and write
|
||
1519000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
14421AD2000
|
heap
|
page read and write
|
||
1D30A1D3000
|
trusted library allocation
|
page read and write
|
||
BB5417A000
|
stack
|
page read and write
|
||
7FFA532B9000
|
unkown
|
page readonly
|
||
19D1809D000
|
heap
|
page read and write
|
||
274D5794000
|
heap
|
page read and write
|
||
14FE000
|
heap
|
page read and write
|
||
2CDB000
|
stack
|
page read and write
|
||
EBFFCFE000
|
stack
|
page read and write
|
||
E45000
|
heap
|
page read and write
|
||
14421ABC000
|
heap
|
page read and write
|
||
7FFA53260000
|
unkown
|
page readonly
|
||
32EB000
|
stack
|
page read and write
|
||
5C2B7AE000
|
stack
|
page read and write
|
||
1D30F0F0000
|
trusted library allocation
|
page read and write
|
||
5095EFF000
|
stack
|
page read and write
|
||
274D4E29000
|
heap
|
page read and write
|
||
274D5788000
|
heap
|
page read and write
|
||
20BBFBB0000
|
heap
|
page readonly
|
||
336E000
|
stack
|
page read and write
|
||
23F881D0000
|
trusted library allocation
|
page read and write
|
||
1095000
|
heap
|
page read and write
|
||
7FFA532B2000
|
unkown
|
page readonly
|
||
274D5C19000
|
heap
|
page read and write
|
||
1A96D0D6000
|
heap
|
page read and write
|
||
1D30F0D0000
|
trusted library allocation
|
page read and write
|
||
2661C06D000
|
heap
|
page read and write
|
||
274D579A000
|
heap
|
page read and write
|
||
BB5497B000
|
stack
|
page read and write
|
||
8C43CFE000
|
stack
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
163628C0000
|
trusted library allocation
|
page read and write
|
||
BB54B7F000
|
stack
|
page read and write
|
||
20BBFC55000
|
heap
|
page read and write
|
||
8C43D7D000
|
stack
|
page read and write
|
||
19D18060000
|
heap
|
page read and write
|
||
AF9B07F000
|
stack
|
page read and write
|
||
274D4BB0000
|
heap
|
page read and write
|
||
1D309A56000
|
heap
|
page read and write
|
||
274D57A8000
|
heap
|
page read and write
|
||
274D57A4000
|
heap
|
page read and write
|
||
274D5C02000
|
heap
|
page read and write
|
||
274D579A000
|
heap
|
page read and write
|
||
1D30F140000
|
remote allocation
|
page read and write
|
||
1D30A318000
|
heap
|
page read and write
|
||
19D18092000
|
heap
|
page read and write
|
||
8C43C7B000
|
stack
|
page read and write
|
||
5095E7A000
|
stack
|
page read and write
|
||
BB53EF7000
|
stack
|
page read and write
|
||
1D30F28E000
|
heap
|
page read and write
|
||
1D30F22C000
|
heap
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
19D18030000
|
heap
|
page read and write
|
There are 536 hidden memdumps, click here to show them.