Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
2V7zjcga5L.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
MPEG-4 LOAS
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x61b17e72, page size 16384, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\2V7zjcga5L.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\2V7zjcga5L.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\2V7zjcga5L.dll,DllRegisterServer
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\2V7zjcga5L.dll,DllUnregisterServer
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\FkTRnOPTdzmty\VedtYV.dll"
|
||
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\2V7zjcga5L.dll"
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\2V7zjcga5L.dll",#1
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://23.239.0.12/
|
23.239.0.12
|
||
https://23.239.0.12/q
|
unknown
|
||
https://23.239.0.12/G
|
unknown
|
||
https://www.disneyplus.com/legal/your-california-privacy-rights
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://www.disneyplus.com/legal/privacy-policy
|
unknown
|
||
https://www.tiktok.com/legal/report/feedback
|
unknown
|
||
http://help.disneyplus.com.
|
unknown
|
||
https://support.hotspotshield.com/
|
unknown
|
||
https://www.hotspotshield.com/terms/
|
unknown
|
||
https://www.pango.co/privacy
|
unknown
|
||
https://disneyplus.com/legal.
|
unknown
|
There are 2 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
23.239.0.12
|
unknown
|
United States
|
||
192.168.2.1
|
unknown
|
unknown
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
22D1DC20000
|
direct allocation
|
page execute and read and write
|
||
209F7680000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
640000
|
direct allocation
|
page execute and read and write
|
||
24A0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
BB4000
|
heap
|
page read and write
|
||
5DF000
|
heap
|
page read and write
|
||
2661A700000
|
heap
|
page read and write
|
||
2404E37F000
|
heap
|
page read and write
|
||
23BD0E54000
|
heap
|
page read and write
|
||
23BD0E2A000
|
heap
|
page read and write
|
||
2661F200000
|
heap
|
page read and write
|
||
7FFA53216000
|
unkown
|
page read and write
|
||
2661F288000
|
heap
|
page read and write
|
||
90526F7000
|
stack
|
page read and write
|
||
19141108000
|
heap
|
page read and write
|
||
2404E383000
|
heap
|
page read and write
|
||
2404D813000
|
heap
|
page read and write
|
||
2404E383000
|
heap
|
page read and write
|
||
237CE271000
|
heap
|
page read and write
|
||
2404E397000
|
heap
|
page read and write
|
||
2404E373000
|
heap
|
page read and write
|
||
2661F620000
|
trusted library allocation
|
page read and write
|
||
22D1C290000
|
direct allocation
|
page execute and read and write
|
||
22D1C2B8000
|
heap
|
page read and write
|
||
7FFA531C0000
|
unkown
|
page readonly
|
||
2404E379000
|
heap
|
page read and write
|
||
24D0000
|
heap
|
page readonly
|
||
2661F5B0000
|
trusted library allocation
|
page read and write
|
||
2404E37F000
|
heap
|
page read and write
|
||
2404E397000
|
heap
|
page read and write
|
||
2404E396000
|
heap
|
page read and write
|
||
2404D6E0000
|
heap
|
page read and write
|
||
2661F2FF000
|
heap
|
page read and write
|
||
70927D000
|
stack
|
page read and write
|
||
19BDFFFC000
|
heap
|
page read and write
|
||
A46A8FE000
|
stack
|
page read and write
|
||
23BD0E49000
|
heap
|
page read and write
|
||
2B9D000
|
stack
|
page read and write
|
||
209F74F8000
|
heap
|
page read and write
|
||
2661F500000
|
trusted library allocation
|
page read and write
|
||
CE97E7E000
|
stack
|
page read and write
|
||
2404E398000
|
heap
|
page read and write
|
||
2404E37F000
|
heap
|
page read and write
|
||
2404E39A000
|
heap
|
page read and write
|
||
23BD0E82000
|
heap
|
page read and write
|
||
24342290000
|
heap
|
page read and write
|
||
209F7705000
|
heap
|
page read and write
|
||
2404E39A000
|
heap
|
page read and write
|
||
19BDFDB0000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
remote allocation
|
page read and write
|
||
2404D8D7000
|
heap
|
page read and write
|
||
FC39C7B000
|
stack
|
page read and write
|
||
2661F640000
|
remote allocation
|
page read and write
|
||
19141086000
|
heap
|
page read and write
|
||
23BD0F00000
|
heap
|
page read and write
|
||
2404E3DB000
|
heap
|
page read and write
|
||
26619C13000
|
heap
|
page read and write
|
||
2D2F000
|
stack
|
page read and write
|
||
872B32B000
|
stack
|
page read and write
|
||
2404D84D000
|
heap
|
page read and write
|
||
23FDAB90000
|
trusted library allocation
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
209F7610000
|
heap
|
page read and write
|
||
2040000
|
heap
|
page read and write
|
||
520000
|
heap
|
page readonly
|
||
2661F521000
|
trusted library allocation
|
page read and write
|
||
7FFA531C0000
|
unkown
|
page readonly
|
||
1A74CE2D000
|
heap
|
page read and write
|
||
22D1DC80000
|
heap
|
page read and write
|
||
1EB8EF40000
|
trusted library allocation
|
page read and write
|
||
24342481000
|
heap
|
page read and write
|
||
23FDAC57000
|
heap
|
page read and write
|
||
2404D800000
|
heap
|
page read and write
|
||
19140FF0000
|
trusted library allocation
|
page read and write
|
||
2404E3BA000
|
heap
|
page read and write
|
||
26619C58000
|
heap
|
page read and write
|
||
2404E37F000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
2CB0000
|
remote allocation
|
page read and write
|
||
23BD0F08000
|
heap
|
page read and write
|
||
2404E397000
|
heap
|
page read and write
|
||
2404E802000
|
heap
|
page read and write
|
||
FC3AAFE000
|
stack
|
page read and write
|
||
2661F2A3000
|
heap
|
page read and write
|
||
209F7670000
|
direct allocation
|
page execute and read and write
|
||
24342402000
|
heap
|
page read and write
|
||
1A74CD60000
|
heap
|
page read and write
|
||
19BDFF80000
|
trusted library allocation
|
page read and write
|
||
19BE0220000
|
trusted library allocation
|
page read and write
|
||
2404E373000
|
heap
|
page read and write
|
||
26619C3F000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
2661A718000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
237CE262000
|
heap
|
page read and write
|
||
22D1C2F8000
|
heap
|
page read and write
|
||
2661F600000
|
trusted library allocation
|
page read and write
|
||
15ADD7B000
|
stack
|
page read and write
|
||
A46A87F000
|
stack
|
page read and write
|
||
2404E802000
|
heap
|
page read and write
|
||
1EB8F048000
|
heap
|
page read and write
|
||
2404E821000
|
heap
|
page read and write
|
||
15ADE77000
|
stack
|
page read and write
|
||
2404E397000
|
heap
|
page read and write
|
||
250F000
|
stack
|
page read and write
|
||
2661F610000
|
trusted library allocation
|
page read and write
|
||
1C1350C3000
|
heap
|
page read and write
|
||
24342500000
|
heap
|
page read and write
|
||
1A74CFC0000
|
heap
|
page read and write
|
||
2D827FE000
|
stack
|
page read and write
|
||
1914107C000
|
heap
|
page read and write
|
||
1C1350B0000
|
heap
|
page read and write
|
||
2404E397000
|
heap
|
page read and write
|
||
1EB8F04F000
|
heap
|
page read and write
|
||
2404E397000
|
heap
|
page read and write
|
||
1EB8F029000
|
heap
|
page read and write
|
||
2C9F000
|
stack
|
page read and write
|
||
2404D740000
|
heap
|
page read and write
|
||
C3D000
|
heap
|
page read and write
|
||
1A74CDF0000
|
heap
|
page read and write
|
||
2404E374000
|
heap
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
2404E397000
|
heap
|
page read and write
|
||
745000
|
heap
|
page read and write
|
||
209F753E000
|
heap
|
page read and write
|
||
7FFA53219000
|
unkown
|
page readonly
|
||
FC39E77000
|
stack
|
page read and write
|
||
2661F22D000
|
heap
|
page read and write
|
||
26619CFE000
|
heap
|
page read and write
|
||
209F7546000
|
heap
|
page read and write
|
||
2661F262000
|
heap
|
page read and write
|
||
2661F770000
|
trusted library allocation
|
page read and write
|
||
237CE180000
|
heap
|
page read and write
|
||
BDD000
|
heap
|
page read and write
|
||
23FDAC29000
|
heap
|
page read and write
|
||
209F754F000
|
heap
|
page read and write
|
||
1EB8F108000
|
heap
|
page read and write
|
||
FC25DF8000
|
stack
|
page read and write
|
||
237CE1E0000
|
heap
|
page read and write
|
||
90527FF000
|
stack
|
page read and write
|
||
2661F5B0000
|
trusted library allocation
|
page read and write
|
||
26619CA0000
|
heap
|
page read and write
|
||
2630000
|
trusted library allocation
|
page read and write
|
||
2404D908000
|
heap
|
page read and write
|
||
19141113000
|
heap
|
page read and write
|
||
209F9080000
|
heap
|
page read and write
|
||
19141058000
|
heap
|
page read and write
|
||
2D826FF000
|
stack
|
page read and write
|
||
26619D02000
|
heap
|
page read and write
|
||
2404E371000
|
heap
|
page read and write
|
||
709379000
|
stack
|
page read and write
|
||
2661F2FC000
|
heap
|
page read and write
|
||
2404E802000
|
heap
|
page read and write
|
||
2404E3A3000
|
heap
|
page read and write
|
||
1EB8EDE0000
|
heap
|
page read and write
|
||
209F75F0000
|
heap
|
page read and write
|
||
2404D8C4000
|
heap
|
page read and write
|
||
22D1DD20000
|
heap
|
page read and write
|
||
1A74CE06000
|
heap
|
page read and write
|
||
22D1C311000
|
heap
|
page read and write
|
||
2404D871000
|
heap
|
page read and write
|
||
7FFA531C1000
|
unkown
|
page execute read
|
||
2CB0000
|
remote allocation
|
page read and write
|
||
19BDFF70000
|
trusted library allocation
|
page read and write
|
||
26619C75000
|
heap
|
page read and write
|
||
19141013000
|
heap
|
page read and write
|
||
24342440000
|
heap
|
page read and write
|
||
26619D25000
|
heap
|
page read and write
|
||
23BD0E3C000
|
heap
|
page read and write
|
||
2404E31A000
|
heap
|
page read and write
|
||
5B9B3F9000
|
stack
|
page read and write
|
||
2404E399000
|
heap
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
2404E377000
|
heap
|
page read and write
|
||
26619BE1000
|
trusted library allocation
|
page read and write
|
||
15ADF7E000
|
stack
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
872BA7F000
|
stack
|
page read and write
|
||
2404E802000
|
heap
|
page read and write
|
||
88D40FB000
|
stack
|
page read and write
|
||
5B9B4FF000
|
stack
|
page read and write
|
||
872BC7F000
|
stack
|
page read and write
|
||
2404D829000
|
heap
|
page read and write
|
||
2404E81A000
|
heap
|
page read and write
|
||
2404E387000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
A46A59E000
|
stack
|
page read and write
|
||
19BDFDA0000
|
heap
|
page read and write
|
||
23FDAA30000
|
heap
|
page read and write
|
||
2404E397000
|
heap
|
page read and write
|
||
24342413000
|
heap
|
page read and write
|
||
34C19CD000
|
stack
|
page read and write
|
||
2404D7E0000
|
remote allocation
|
page read and write
|
||
2661A759000
|
heap
|
page read and write
|
||
19BDFFB0000
|
heap
|
page read and write
|
||
1A74CE22000
|
heap
|
page read and write
|
||
2404D7E0000
|
remote allocation
|
page read and write
|
||
2404E391000
|
heap
|
page read and write
|
||
FC3A8F9000
|
stack
|
page read and write
|
||
1A74CE16000
|
heap
|
page read and write
|
||
24342513000
|
heap
|
page read and write
|
||
2404E379000
|
heap
|
page read and write
|
||
2404E3A5000
|
heap
|
page read and write
|
||
54B000
|
heap
|
page read and write
|
||
2404E373000
|
heap
|
page read and write
|
||
2404E397000
|
heap
|
page read and write
|
||
23BD0D80000
|
trusted library allocation
|
page read and write
|
||
88D41FE000
|
stack
|
page read and write
|
||
19BDFFB8000
|
heap
|
page read and write
|
||
26D4000
|
heap
|
page read and write
|
||
FC25E7E000
|
unkown
|
page read and write
|
||
2D8277F000
|
stack
|
page read and write
|
||
7FFA53216000
|
unkown
|
page read and write
|
||
1A74CE22000
|
heap
|
page read and write
|
||
19141027000
|
heap
|
page read and write
|
||
5B9B37E000
|
stack
|
page read and write
|
||
23FDAA20000
|
heap
|
page read and write
|
||
19BE0215000
|
heap
|
page read and write
|
||
872B3AF000
|
stack
|
page read and write
|
||
2661F1D0000
|
trusted library allocation
|
page read and write
|
||
23BD0E4B000
|
heap
|
page read and write
|
||
23FDAC5D000
|
heap
|
page read and write
|
||
FC25AF7000
|
stack
|
page read and write
|
||
1EB8F000000
|
heap
|
page read and write
|
||
26619B40000
|
heap
|
page read and write
|
||
A46A515000
|
stack
|
page read and write
|
||
2404E31C000
|
heap
|
page read and write
|
||
23BD0E13000
|
heap
|
page read and write
|
||
2404E383000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1C1350BD000
|
heap
|
page read and write
|
||
FC25CFE000
|
stack
|
page read and write
|
||
19141061000
|
heap
|
page read and write
|
||
2404E3A6000
|
heap
|
page read and write
|
||
7FFA53216000
|
unkown
|
page read and write
|
||
1EB8F087000
|
heap
|
page read and write
|
||
FC259F7000
|
stack
|
page read and write
|
||
23FDAD00000
|
heap
|
page read and write
|
||
90525FB000
|
stack
|
page read and write
|
||
24342478000
|
heap
|
page read and write
|
||
1914103C000
|
heap
|
page read and write
|
||
C01000
|
heap
|
page read and write
|
||
23FDAC5C000
|
heap
|
page read and write
|
||
2404E3AD000
|
heap
|
page read and write
|
||
1EB8F102000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
2404D916000
|
heap
|
page read and write
|
||
2404E3B0000
|
heap
|
page read and write
|
||
1A74CE34000
|
heap
|
page read and write
|
||
237CE26C000
|
heap
|
page read and write
|
||
2661F524000
|
trusted library allocation
|
page read and write
|
||
90520FB000
|
stack
|
page read and write
|
||
2404E397000
|
heap
|
page read and write
|
||
90521FD000
|
stack
|
page read and write
|
||
2661F2F7000
|
heap
|
page read and write
|
||
23BD0E4D000
|
heap
|
page read and write
|
||
2404D8C9000
|
heap
|
page read and write
|
||
2404D84F000
|
heap
|
page read and write
|
||
2404E374000
|
heap
|
page read and write
|
||
2661F5F0000
|
trusted library allocation
|
page read and write
|
||
237CE18B000
|
heap
|
page read and write
|
||
19BE0150000
|
trusted library allocation
|
page read and write
|
||
A46A97E000
|
stack
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
19140F50000
|
heap
|
page read and write
|
||
1F6F000
|
stack
|
page read and write
|
||
2661F302000
|
heap
|
page read and write
|
||
2661F520000
|
trusted library allocation
|
page read and write
|
||
2404E3A3000
|
heap
|
page read and write
|
||
1A74D125000
|
heap
|
page read and write
|
||
23BD0E4E000
|
heap
|
page read and write
|
||
23BD0E55000
|
heap
|
page read and write
|
||
23FDAC7C000
|
heap
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
2404E397000
|
heap
|
page read and write
|
||
26619C79000
|
heap
|
page read and write
|
||
2661F2DB000
|
heap
|
page read and write
|
||
24342428000
|
heap
|
page read and write
|
||
23FDAD02000
|
heap
|
page read and write
|
||
5AE000
|
heap
|
page read and write
|
||
19BDFFC0000
|
heap
|
page read and write
|
||
2404E378000
|
heap
|
page read and write
|
||
FC39FFC000
|
stack
|
page read and write
|
||
2404D855000
|
heap
|
page read and write
|
||
23BD1802000
|
trusted library allocation
|
page read and write
|
||
19141055000
|
heap
|
page read and write
|
||
1A74CE17000
|
heap
|
page read and write
|
||
7FFA53219000
|
unkown
|
page readonly
|
||
2404E398000
|
heap
|
page read and write
|
||
15ADAFE000
|
stack
|
page read and write
|
||
CE981F7000
|
stack
|
page read and write
|
||
26619CAF000
|
heap
|
page read and write
|
||
2661F2B3000
|
heap
|
page read and write
|
||
209F7650000
|
heap
|
page read and write
|
||
1A74CE01000
|
heap
|
page read and write
|
||
FC2577E000
|
stack
|
page read and write
|
||
22D1C210000
|
heap
|
page read and write
|
||
2661F508000
|
trusted library allocation
|
page read and write
|
||
22D1C270000
|
heap
|
page read and write
|
||
7FFA53212000
|
unkown
|
page readonly
|
||
18002D000
|
direct allocation
|
page readonly
|
||
7F0000
|
remote allocation
|
page read and write
|
||
BB4000
|
heap
|
page read and write
|
||
24342C02000
|
trusted library allocation
|
page read and write
|
||
237CE259000
|
heap
|
page read and write
|
||
2661F524000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
2D8297B000
|
stack
|
page read and write
|
||
2404E397000
|
heap
|
page read and write
|
||
2404E397000
|
heap
|
page read and write
|
||
5B9B57E000
|
stack
|
page read and write
|
||
2404D8A5000
|
heap
|
page read and write
|
||
2404E383000
|
heap
|
page read and write
|
||
7FFA531C1000
|
unkown
|
page execute read
|
||
2661A5E0000
|
trusted library allocation
|
page read and write
|
||
88D3BEB000
|
stack
|
page read and write
|
||
872B77B000
|
stack
|
page read and write
|
||
22D1C1F0000
|
heap
|
page read and write
|
||
1A74CE14000
|
heap
|
page read and write
|
||
237CE262000
|
heap
|
page read and write
|
||
2404E397000
|
heap
|
page read and write
|
||
19BE0130000
|
heap
|
page readonly
|
||
26619D07000
|
heap
|
page read and write
|
||
240E000
|
stack
|
page read and write
|
||
2661F640000
|
remote allocation
|
page read and write
|
||
2661A5F0000
|
trusted library allocation
|
page read and write
|
||
2404D852000
|
heap
|
page read and write
|
||
15ADB7E000
|
stack
|
page read and write
|
||
24F0000
|
trusted library allocation
|
page read and write
|
||
872BB7F000
|
stack
|
page read and write
|
||
24342400000
|
heap
|
page read and write
|
||
2661A602000
|
heap
|
page read and write
|
||
2CB0000
|
remote allocation
|
page read and write
|
||
175000
|
stack
|
page read and write
|
||
26619AD0000
|
heap
|
page read and write
|
||
1A74CE06000
|
heap
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
2661F216000
|
heap
|
page read and write
|
||
24342300000
|
heap
|
page read and write
|
||
23FDAC86000
|
heap
|
page read and write
|
||
258B000
|
stack
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
22D1C235000
|
heap
|
page read and write
|
||
2404D770000
|
trusted library allocation
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
7FFA531C0000
|
unkown
|
page readonly
|
||
2404E383000
|
heap
|
page read and write
|
||
FC256FF000
|
stack
|
page read and write
|
||
2404E397000
|
heap
|
page read and write
|
||
FC258FE000
|
stack
|
page read and write
|
||
1914105E000
|
heap
|
page read and write
|
||
2661F2E0000
|
heap
|
page read and write
|
||
2404E3A3000
|
heap
|
page read and write
|
||
23FDAC26000
|
heap
|
page read and write
|
||
7091F9000
|
stack
|
page read and write
|
||
2661A5D3000
|
trusted library allocation
|
page read and write
|
||
23FDAA90000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
2404E397000
|
heap
|
page read and write
|
||
565000
|
heap
|
page read and write
|
||
26619B70000
|
trusted library allocation
|
page read and write
|
||
2404E386000
|
heap
|
page read and write
|
||
2661F1F0000
|
trusted library allocation
|
page read and write
|
||
FC3A3FB000
|
stack
|
page read and write
|
||
2404E388000
|
heap
|
page read and write
|
||
237D14C0000
|
heap
|
page read and write
|
||
7FFA53219000
|
unkown
|
page readonly
|
||
19BE0219000
|
heap
|
page read and write
|
||
2661A718000
|
heap
|
page read and write
|
||
872B67F000
|
stack
|
page read and write
|
||
209F7542000
|
heap
|
page read and write
|
||
FC25BF9000
|
stack
|
page read and write
|
||
2661F520000
|
trusted library allocation
|
page read and write
|
||
2661F730000
|
trusted library allocation
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
24342BA0000
|
trusted library allocation
|
page read and write
|
||
19141029000
|
heap
|
page read and write
|
||
22D1C2F1000
|
heap
|
page read and write
|
||
9B4B8FE000
|
stack
|
page read and write
|
||
26AF000
|
stack
|
page read and write
|
||
2404E35E000
|
heap
|
page read and write
|
||
1EB8F04B000
|
heap
|
page read and write
|
||
2404E36F000
|
heap
|
page read and write
|
||
23BD0E47000
|
heap
|
page read and write
|
||
2404E373000
|
heap
|
page read and write
|
||
1EB8EE40000
|
heap
|
page read and write
|
||
2404E802000
|
heap
|
page read and write
|
||
2A9B000
|
stack
|
page read and write
|
||
209F9084000
|
heap
|
page read and write
|
||
2404E397000
|
heap
|
page read and write
|
||
2404E396000
|
heap
|
page read and write
|
||
23BD0E48000
|
heap
|
page read and write
|
||
23FDAC3C000
|
heap
|
page read and write
|
||
23FDAC52000
|
heap
|
page read and write
|
||
23FDAC00000
|
heap
|
page read and write
|
||
23BD0E50000
|
heap
|
page read and write
|
||
237D14C3000
|
heap
|
page read and write
|
||
2434245A000
|
heap
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
5C5000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
2404D858000
|
heap
|
page read and write
|
||
22D1C230000
|
heap
|
page read and write
|
||
2404D913000
|
heap
|
page read and write
|
||
1A74CE35000
|
heap
|
page read and write
|
||
2404E397000
|
heap
|
page read and write
|
||
2661F1E0000
|
trusted library allocation
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
2404E37F000
|
heap
|
page read and write
|
||
2404E380000
|
heap
|
page read and write
|
||
872B977000
|
stack
|
page read and write
|
||
2404E37F000
|
heap
|
page read and write
|
||
2404E3A4000
|
heap
|
page read and write
|
||
22D1DC84000
|
heap
|
page read and write
|
||
2404E39A000
|
heap
|
page read and write
|
||
2404E397000
|
heap
|
page read and write
|
||
2404E394000
|
heap
|
page read and write
|
||
2D828FF000
|
stack
|
page read and write
|
||
19BE01A0000
|
trusted library allocation
|
page read and write
|
||
23BD0E4A000
|
heap
|
page read and write
|
||
2661F50E000
|
trusted library allocation
|
page read and write
|
||
26619AE0000
|
heap
|
page read and write
|
||
209F7700000
|
heap
|
page read and write
|
||
26619C6F000
|
heap
|
page read and write
|
||
2661F24B000
|
heap
|
page read and write
|
||
19BDFFF5000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
2661A5D0000
|
trusted library allocation
|
page read and write
|
||
1EB8F070000
|
heap
|
page read and write
|
||
23FDAC13000
|
heap
|
page read and write
|
||
1914107B000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
2404E397000
|
heap
|
page read and write
|
||
1EB8F076000
|
heap
|
page read and write
|
||
FC3A77E000
|
stack
|
page read and write
|
||
CE980FB000
|
stack
|
page read and write
|
||
2404E3A2000
|
heap
|
page read and write
|
||
237CE249000
|
heap
|
page read and write
|
||
2520000
|
heap
|
page read and write
|
||
2044000
|
heap
|
page read and write
|
||
90524FC000
|
stack
|
page read and write
|
||
2404E396000
|
heap
|
page read and write
|
||
CE983FE000
|
stack
|
page read and write
|
||
23BD0F13000
|
heap
|
page read and write
|
||
19141100000
|
heap
|
page read and write
|
||
C08000
|
heap
|
page read and write
|
||
22D1C2A0000
|
heap
|
page readonly
|
||
237CE200000
|
heap
|
page read and write
|
||
23FDAD13000
|
heap
|
page read and write
|
||
2404E380000
|
heap
|
page read and write
|
||
23BD0E75000
|
heap
|
page read and write
|
||
23FDAC5E000
|
heap
|
page read and write
|
||
9B4B97F000
|
stack
|
page read and write
|
||
2661F500000
|
trusted library allocation
|
page read and write
|
||
2404E81A000
|
heap
|
page read and write
|
||
1EB8F100000
|
heap
|
page read and write
|
||
23FDAD08000
|
heap
|
page read and write
|
||
1A74D120000
|
heap
|
page read and write
|
||
5B9B27A000
|
stack
|
page read and write
|
||
1EB8F083000
|
heap
|
page read and write
|
||
26619CFE000
|
heap
|
page read and write
|
||
237CE25E000
|
heap
|
page read and write
|
||
2661F1C0000
|
trusted library allocation
|
page read and write
|
||
C3D000
|
heap
|
page read and write
|
||
209F74F0000
|
heap
|
page read and write
|
||
2404E39A000
|
heap
|
page read and write
|
||
26619D02000
|
heap
|
page read and write
|
||
2404E397000
|
heap
|
page read and write
|
||
1A74CE12000
|
heap
|
page read and write
|
||
7FFA531C0000
|
unkown
|
page readonly
|
||
88D42FE000
|
stack
|
page read and write
|
||
15AE07F000
|
stack
|
page read and write
|
||
19141000000
|
heap
|
page read and write
|
||
2404E397000
|
heap
|
page read and write
|
||
5A6000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
2D8287E000
|
stack
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
2404E300000
|
heap
|
page read and write
|
||
88D43FB000
|
stack
|
page read and write
|
||
237CE240000
|
heap
|
page read and write
|
||
19BE0120000
|
trusted library allocation
|
page read and write
|
||
FC3A2FC000
|
stack
|
page read and write
|
||
2404D8F9000
|
heap
|
page read and write
|
||
2404D7E0000
|
remote allocation
|
page read and write
|
||
7FFA531C1000
|
unkown
|
page execute read
|
||
2404E350000
|
heap
|
page read and write
|
||
CE97BBC000
|
stack
|
page read and write
|
||
708D9B000
|
stack
|
page read and write
|
||
19BDFF90000
|
trusted library allocation
|
page read and write
|
||
19141064000
|
heap
|
page read and write
|
||
7FFA53212000
|
unkown
|
page readonly
|
||
CE97EFF000
|
stack
|
page read and write
|
||
2404E385000
|
heap
|
page read and write
|
||
243422A0000
|
heap
|
page read and write
|
||
237CE27D000
|
heap
|
page read and write
|
||
A46AA7B000
|
stack
|
page read and write
|
||
A46A9FF000
|
stack
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
2404D83C000
|
heap
|
page read and write
|
||
1A74CE22000
|
heap
|
page read and write
|
||
2404E380000
|
heap
|
page read and write
|
||
1C134E80000
|
heap
|
page read and write
|
||
2661F2A1000
|
heap
|
page read and write
|
||
2404E383000
|
heap
|
page read and write
|
||
2661A615000
|
heap
|
page read and write
|
||
2404E3A7000
|
heap
|
page read and write
|
||
872B87B000
|
stack
|
page read and write
|
||
2404D8AC000
|
heap
|
page read and write
|
||
2661F1F0000
|
trusted library allocation
|
page read and write
|
||
2404E3A2000
|
heap
|
page read and write
|
||
2404E397000
|
heap
|
page read and write
|
||
2404E202000
|
heap
|
page read and write
|
||
23BD0CF0000
|
heap
|
page read and write
|
||
209F73A0000
|
heap
|
page read and write
|
||
26619CBC000
|
heap
|
page read and write
|
||
2661F1E0000
|
trusted library allocation
|
page read and write
|
||
24342502000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
90528FE000
|
stack
|
page read and write
|
||
19141A02000
|
trusted library allocation
|
page read and write
|
||
26619C77000
|
heap
|
page read and write
|
||
2404E36F000
|
heap
|
page read and write
|
||
19140F60000
|
heap
|
page read and write
|
||
2661F220000
|
heap
|
page read and write
|
||
2404E387000
|
heap
|
page read and write
|
||
9B4B87E000
|
stack
|
page read and write
|
||
2404D8B3000
|
heap
|
page read and write
|
||
19BDFFFC000
|
heap
|
page read and write
|
||
510000
|
direct allocation
|
page execute and read and write
|
||
19BDFFFE000
|
heap
|
page read and write
|
||
2661A704000
|
heap
|
page read and write
|
||
2661F23E000
|
heap
|
page read and write
|
||
19BE0D10000
|
trusted library allocation
|
page read and write
|
||
19BE0210000
|
heap
|
page read and write
|
||
209F76F0000
|
heap
|
page read and write
|
||
905217E000
|
stack
|
page read and write
|
||
23FDAC60000
|
heap
|
page read and write
|
||
2404E3C6000
|
heap
|
page read and write
|
||
7092FE000
|
stack
|
page read and write
|
||
23FDB402000
|
trusted library allocation
|
page read and write
|
||
248C000
|
stack
|
page read and write
|
||
1A74CE1E000
|
heap
|
page read and write
|
||
2661A702000
|
heap
|
page read and write
|
||
C01000
|
heap
|
page read and write
|
||
2404E391000
|
heap
|
page read and write
|
||
2404E384000
|
heap
|
page read and write
|
||
2404D6D0000
|
heap
|
page read and write
|
||
2661F302000
|
heap
|
page read and write
|
||
1EB8EDD0000
|
heap
|
page read and write
|
||
22D1C2B0000
|
heap
|
page read and write
|
||
1A74CDC0000
|
heap
|
page read and write
|
||
FC2567C000
|
stack
|
page read and write
|
||
23FDAC61000
|
heap
|
page read and write
|
||
237CE268000
|
heap
|
page read and write
|
||
2404E371000
|
heap
|
page read and write
|
||
19141002000
|
heap
|
page read and write
|
||
2480000
|
heap
|
page read and write
|
||
19140FC0000
|
heap
|
page read and write
|
||
2404E802000
|
heap
|
page read and write
|
||
2404E803000
|
heap
|
page read and write
|
||
7FFA53216000
|
unkown
|
page read and write
|
||
23FDAC63000
|
heap
|
page read and write
|
||
26D0000
|
heap
|
page read and write
|
||
2404D8EC000
|
heap
|
page read and write
|
||
2404D8B6000
|
heap
|
page read and write
|
||
2661F28A000
|
heap
|
page read and write
|
||
1C134FC0000
|
heap
|
page read and write
|
||
26619C8D000
|
heap
|
page read and write
|
||
2404E377000
|
heap
|
page read and write
|
||
2404E3BF000
|
heap
|
page read and write
|
||
2661F640000
|
remote allocation
|
page read and write
|
||
26619C29000
|
heap
|
page read and write
|
||
7FFA53212000
|
unkown
|
page readonly
|
||
2661ACE0000
|
trusted library allocation
|
page read and write
|
||
23BD0CE0000
|
heap
|
page read and write
|
||
237CE185000
|
heap
|
page read and write
|
||
2404E377000
|
heap
|
page read and write
|
||
2661A713000
|
heap
|
page read and write
|
||
23BD0F02000
|
heap
|
page read and write
|
||
7FFA53219000
|
unkown
|
page readonly
|
||
26619C93000
|
heap
|
page read and write
|
||
1EB8F802000
|
trusted library allocation
|
page read and write
|
||
26619C00000
|
heap
|
page read and write
|
||
B78000
|
heap
|
page read and write
|
||
2404E397000
|
heap
|
page read and write
|
||
2404E800000
|
heap
|
page read and write
|
||
23BD0E70000
|
heap
|
page read and write
|
||
1A74CE1E000
|
heap
|
page read and write
|
||
5B9B2FE000
|
stack
|
page read and write
|
||
2404D8F7000
|
heap
|
page read and write
|
||
7FFA53212000
|
unkown
|
page readonly
|
||
209F76B0000
|
heap
|
page readonly
|
||
237CE26C000
|
heap
|
page read and write
|
||
237D1DD0000
|
heap
|
page read and write
|
||
2404D902000
|
heap
|
page read and write
|
||
237CE25D000
|
heap
|
page read and write
|
||
E65000
|
heap
|
page read and write
|
||
CE982FF000
|
stack
|
page read and write
|
||
2D82676000
|
stack
|
page read and write
|
||
237CFDF0000
|
heap
|
page read and write
|
||
1A74CE1E000
|
heap
|
page read and write
|
||
19141057000
|
heap
|
page read and write
|
||
237D15D0000
|
trusted library allocation
|
page read and write
|
||
19BDFEE0000
|
heap
|
page read and write
|
||
2404E397000
|
heap
|
page read and write
|
||
1EB8F03C000
|
heap
|
page read and write
|
||
237CE259000
|
heap
|
page read and write
|
||
23BD0E00000
|
heap
|
page read and write
|
||
2404E3A2000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
2404E37F000
|
heap
|
page read and write
|
||
2404D84B000
|
heap
|
page read and write
|
||
FC3A1FE000
|
stack
|
page read and write
|
||
2661F1F0000
|
trusted library allocation
|
page read and write
|
||
5B9B47C000
|
stack
|
page read and write
|
||
2404E315000
|
heap
|
page read and write
|
||
2661A600000
|
heap
|
page read and write
|
||
E50000
|
direct allocation
|
page execute and read and write
|
||
1A74CE2E000
|
heap
|
page read and write
|
||
237CE170000
|
heap
|
page read and write
|
||
2661F5B0000
|
trusted library allocation
|
page read and write
|
||
2661B160000
|
trusted library allocation
|
page read and write
|
||
1EB8F013000
|
heap
|
page read and write
|
||
2404D8E4000
|
heap
|
page read and write
|
||
2404D889000
|
heap
|
page read and write
|
||
1EB8F054000
|
heap
|
page read and write
|
||
237CE256000
|
heap
|
page read and write
|
||
1914107B000
|
heap
|
page read and write
|
||
7FFA531C1000
|
unkown
|
page execute read
|
||
19BE0140000
|
trusted library allocation
|
page read and write
|
||
FC3A0FA000
|
stack
|
page read and write
|
||
23BD0E56000
|
heap
|
page read and write
|
||
2661F2F1000
|
heap
|
page read and write
|
||
C3D000
|
heap
|
page read and write
|
||
9B4B5BB000
|
stack
|
page read and write
|
||
1EB8F113000
|
heap
|
page read and write
|
||
15ADA7C000
|
stack
|
page read and write
|
||
23BD0E51000
|
heap
|
page read and write
|
||
15AE17E000
|
stack
|
page read and write
|
||
2661A758000
|
heap
|
page read and write
|
||
22D1C180000
|
heap
|
page read and write
|
||
A75000
|
stack
|
page read and write
|
||
23BD0D50000
|
heap
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
23BD0E53000
|
heap
|
page read and write
|
||
2404E386000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
19BDFFFC000
|
heap
|
page read and write
|
||
2404E3CD000
|
heap
|
page read and write
|
||
2404E37F000
|
heap
|
page read and write
|
||
1A74CDFB000
|
heap
|
page read and write
|
||
2404E39C000
|
heap
|
page read and write
|
||
2404E31B000
|
heap
|
page read and write
|
||
1FEF000
|
stack
|
page read and write
|
||
2B1E000
|
stack
|
page read and write
|
||
2661F5D0000
|
trusted library allocation
|
page read and write
|
||
2404E39E000
|
heap
|
page read and write
|
||
19141102000
|
heap
|
page read and write
|
||
2404E394000
|
heap
|
page read and write
|
||
C0000
|
heap
|
page read and write
|
||
2404E397000
|
heap
|
page read and write
|
||
2404E363000
|
heap
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
19BDFF00000
|
heap
|
page read and write
|
||
2404D849000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
There are 663 hidden memdumps, click here to show them.