Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\Plt3z2W7KQ.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\Plt3z2W7KQ.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\Plt3z2W7KQ.dll,DllRegisterServer
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\Plt3z2W7KQ.dll,DllUnregisterServer
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\XxAsGMCLqrlaY\QoxZfNcqe.dll"
|
||
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\Plt3z2W7KQ.dll"
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Plt3z2W7KQ.dll",#1
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
There are 2 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://23.239.0.12/ga
|
unknown
|
||
https://23.239.0.12/
|
23.239.0.12
|
||
https://23.239.0.12/dll90
|
unknown
|
||
https://www.disneyplus.com/legal/your-california-privacy-rights
|
unknown
|
||
https://www.disneyplus.com/legal/privacy-policy
|
unknown
|
||
https://www.tiktok.com/legal/report/feedback
|
unknown
|
||
http://help.disneyplus.com.
|
unknown
|
||
https://support.hotspotshield.com/
|
unknown
|
||
https://www.hotspotshield.com/terms/
|
unknown
|
||
https://www.pango.co/privacy
|
unknown
|
||
https://disneyplus.com/legal.
|
unknown
|
There are 1 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
23.239.0.12
|
unknown
|
United States
|
||
192.168.2.1
|
unknown
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1C929DA0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
770000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
1C271790000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
F10000
|
direct allocation
|
page execute and read and write
|
||
741607E000
|
stack
|
page read and write
|
||
233F7302000
|
heap
|
page read and write
|
||
1C928500000
|
heap
|
page read and write
|
||
7EEAB7F000
|
stack
|
page read and write
|
||
811000
|
heap
|
page read and write
|
||
1C928430000
|
heap
|
page read and write
|
||
1F17FA4B000
|
heap
|
page read and write
|
||
1AB5B27F000
|
heap
|
page read and write
|
||
233F7DB1000
|
heap
|
page read and write
|
||
233F7D70000
|
heap
|
page read and write
|
||
1C9284D5000
|
heap
|
page read and write
|
||
7ED88FB000
|
stack
|
page read and write
|
||
1033000
|
heap
|
page read and write
|
||
177E87F000
|
stack
|
page read and write
|
||
233F72AB000
|
heap
|
page read and write
|
||
233F7D7D000
|
heap
|
page read and write
|
||
233F7D8A000
|
heap
|
page read and write
|
||
233F7B10000
|
remote allocation
|
page read and write
|
||
233F7DA5000
|
heap
|
page read and write
|
||
233F7DB1000
|
heap
|
page read and write
|
||
1C928543000
|
heap
|
page read and write
|
||
233F7313000
|
heap
|
page read and write
|
||
4D4337E000
|
stack
|
page read and write
|
||
264CB677000
|
heap
|
page read and write
|
||
233F7D69000
|
heap
|
page read and write
|
||
7EEACFE000
|
stack
|
page read and write
|
||
1F17FFB0000
|
trusted library allocation
|
page read and write
|
||
233F7DBC000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
233F7DAF000
|
heap
|
page read and write
|
||
264CB580000
|
heap
|
page read and write
|
||
1C271591000
|
heap
|
page read and write
|
||
2084E680000
|
heap
|
page read and write
|
||
273356D1000
|
heap
|
page read and write
|
||
2280000
|
heap
|
page read and write
|
||
27335660000
|
heap
|
page read and write
|
||
2084E9F5000
|
heap
|
page read and write
|
||
2DAC000
|
stack
|
page read and write
|
||
1AB5B1C0000
|
trusted library allocation
|
page read and write
|
||
1F17F8C0000
|
heap
|
page read and write
|
||
233F8202000
|
heap
|
page read and write
|
||
2084E9F0000
|
heap
|
page read and write
|
||
1F17FA49000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
264CBE90000
|
trusted library allocation
|
page read and write
|
||
1AB5B252000
|
heap
|
page read and write
|
||
233F7D6E000
|
heap
|
page read and write
|
||
1A6B7663000
|
heap
|
page read and write
|
||
2CFE07B000
|
stack
|
page read and write
|
||
233F7D0C000
|
heap
|
page read and write
|
||
1A6BB240000
|
heap
|
page read and write
|
||
16539628000
|
heap
|
page read and write
|
||
273356B7000
|
heap
|
page read and write
|
||
28EF000
|
stack
|
page read and write
|
||
273356B7000
|
heap
|
page read and write
|
||
1F17FA29000
|
heap
|
page read and write
|
||
233F7DAE000
|
heap
|
page read and write
|
||
1C9284D0000
|
heap
|
page read and write
|
||
233F7D9F000
|
heap
|
page read and write
|
||
233F7D83000
|
heap
|
page read and write
|
||
16539602000
|
heap
|
page read and write
|
||
233F7D83000
|
heap
|
page read and write
|
||
294F000
|
stack
|
page read and write
|
||
B6512FF000
|
stack
|
page read and write
|
||
233F7D4A000
|
heap
|
page read and write
|
||
1A6B75D5000
|
heap
|
page read and write
|
||
233F7DB0000
|
heap
|
page read and write
|
||
8AF000
|
heap
|
page read and write
|
||
233F7D9F000
|
heap
|
page read and write
|
||
233F7D70000
|
heap
|
page read and write
|
||
264CB652000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
83F000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
1AB5B313000
|
heap
|
page read and write
|
||
1C92852B000
|
heap
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
1C271520000
|
heap
|
page read and write
|
||
1AB5B308000
|
heap
|
page read and write
|
||
233F7D9F000
|
heap
|
page read and write
|
||
1F17FB02000
|
heap
|
page read and write
|
||
233F7D8D000
|
heap
|
page read and write
|
||
7EEAC7E000
|
stack
|
page read and write
|
||
264CB613000
|
heap
|
page read and write
|
||
233F7D7F000
|
heap
|
page read and write
|
||
1C928410000
|
heap
|
page read and write
|
||
1C271780000
|
direct allocation
|
page execute and read and write
|
||
233F7D18000
|
heap
|
page read and write
|
||
233F7DBC000
|
heap
|
page read and write
|
||
1AB5B190000
|
heap
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
1A6B7657000
|
heap
|
page read and write
|
||
233F72B2000
|
heap
|
page read and write
|
||
1AB5B264000
|
heap
|
page read and write
|
||
1C9284B0000
|
heap
|
page readonly
|
||
ED0000
|
heap
|
page read and write
|
||
1A6B91C0000
|
heap
|
page read and write
|
||
233F7D9F000
|
heap
|
page read and write
|
||
233F8218000
|
heap
|
page read and write
|
||
233F7D8D000
|
heap
|
page read and write
|
||
1653966F000
|
heap
|
page read and write
|
||
233F7D6E000
|
heap
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
1F17FA13000
|
heap
|
page read and write
|
||
233F7D81000
|
heap
|
page read and write
|
||
2084F720000
|
trusted library allocation
|
page read and write
|
||
233F7DD2000
|
heap
|
page read and write
|
||
233F7D75000
|
heap
|
page read and write
|
||
1C928531000
|
heap
|
page read and write
|
||
264CB64D000
|
heap
|
page read and write
|
||
233F8202000
|
heap
|
page read and write
|
||
1C2718B5000
|
heap
|
page read and write
|
||
80B000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
233F7254000
|
heap
|
page read and write
|
||
233F7D9E000
|
heap
|
page read and write
|
||
7ED8C7E000
|
stack
|
page read and write
|
||
264F000
|
stack
|
page read and write
|
||
27335600000
|
heap
|
page read and write
|
||
233F7D83000
|
heap
|
page read and write
|
||
233F7D9F000
|
heap
|
page read and write
|
||
869000
|
heap
|
page read and write
|
||
2CFDBFE000
|
stack
|
page read and write
|
||
1F17FB08000
|
heap
|
page read and write
|
||
1A6B765E000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
233F7150000
|
heap
|
page read and write
|
||
1AB5B280000
|
heap
|
page read and write
|
||
233F7D7D000
|
heap
|
page read and write
|
||
2CFE177000
|
stack
|
page read and write
|
||
233F72D1000
|
heap
|
page read and write
|
||
9B0000
|
remote allocation
|
page read and write
|
||
233F7229000
|
heap
|
page read and write
|
||
233F8202000
|
heap
|
page read and write
|
||
16539570000
|
heap
|
page read and write
|
||
233F8202000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
264CB700000
|
heap
|
page read and write
|
||
1C2715A3000
|
heap
|
page read and write
|
||
1F17FA4F000
|
heap
|
page read and write
|
||
B6510FF000
|
stack
|
page read and write
|
||
273356AB000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
1F17FA93000
|
heap
|
page read and write
|
||
7415F77000
|
stack
|
page read and write
|
||
233F7D7D000
|
heap
|
page read and write
|
||
2084E732000
|
heap
|
page read and write
|
||
1F17FA4C000
|
heap
|
page read and write
|
||
273356DF000
|
heap
|
page read and write
|
||
2084E9B0000
|
trusted library allocation
|
page read and write
|
||
7FFF2F372000
|
unkown
|
page readonly
|
||
18002E000
|
direct allocation
|
page read and write
|
||
233F7DB8000
|
heap
|
page read and write
|
||
7FFF2F376000
|
unkown
|
page read and write
|
||
264CB63C000
|
heap
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
2084E9C0000
|
trusted library allocation
|
page read and write
|
||
C61313D000
|
stack
|
page read and write
|
||
233F7D8D000
|
heap
|
page read and write
|
||
177E525000
|
stack
|
page read and write
|
||
233F7D7B000
|
heap
|
page read and write
|
||
233F7D7F000
|
heap
|
page read and write
|
||
1F17F920000
|
heap
|
page read and write
|
||
233F7DA0000
|
heap
|
page read and write
|
||
1C271760000
|
heap
|
page read and write
|
||
107F000
|
heap
|
page read and write
|
||
233F7D7F000
|
heap
|
page read and write
|
||
A38AB8E000
|
stack
|
page read and write
|
||
7FFF2F321000
|
unkown
|
page execute read
|
||
233F7D7D000
|
heap
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
233F7DA0000
|
heap
|
page read and write
|
||
233F7D68000
|
heap
|
page read and write
|
||
233F7D9F000
|
heap
|
page read and write
|
||
1048000
|
heap
|
page read and write
|
||
7FFF2F321000
|
unkown
|
page execute read
|
||
83C000
|
heap
|
page read and write
|
||
A38B1FE000
|
stack
|
page read and write
|
||
34D8FB000
|
stack
|
page read and write
|
||
7C0000
|
trusted library allocation
|
page read and write
|
||
233F7D7F000
|
heap
|
page read and write
|
||
233F7D5C000
|
heap
|
page read and write
|
||
264CB681000
|
heap
|
page read and write
|
||
1A6B767A000
|
heap
|
page read and write
|
||
1F17FA63000
|
heap
|
page read and write
|
||
B65107A000
|
stack
|
page read and write
|
||
1C2717C0000
|
heap
|
page readonly
|
||
1C928509000
|
heap
|
page read and write
|
||
233F7D7F000
|
heap
|
page read and write
|
||
A38B0F7000
|
stack
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
3C4000
|
stack
|
page read and write
|
||
1A6B7679000
|
heap
|
page read and write
|
||
233F7D9C000
|
heap
|
page read and write
|
||
264CB64A000
|
heap
|
page read and write
|
||
233F71B0000
|
heap
|
page read and write
|
||
7416177000
|
stack
|
page read and write
|
||
7ED89FB000
|
stack
|
page read and write
|
||
28CF000
|
stack
|
page read and write
|
||
233F7D78000
|
heap
|
page read and write
|
||
16539713000
|
heap
|
page read and write
|
||
B6511F9000
|
stack
|
page read and write
|
||
264CB702000
|
heap
|
page read and write
|
||
264CB600000
|
heap
|
page read and write
|
||
233F71E0000
|
trusted library allocation
|
page read and write
|
||
233F7D9E000
|
heap
|
page read and write
|
||
233F7D70000
|
heap
|
page read and write
|
||
A38AA8C000
|
stack
|
page read and write
|
||
233F7DE1000
|
heap
|
page read and write
|
||
74161FF000
|
stack
|
page read and write
|
||
1C92850E000
|
heap
|
page read and write
|
||
86D000
|
heap
|
page read and write
|
||
233F7D9E000
|
heap
|
page read and write
|
||
233F7249000
|
heap
|
page read and write
|
||
2084E9F9000
|
heap
|
page read and write
|
||
1F180002000
|
trusted library allocation
|
page read and write
|
||
1A6B7640000
|
heap
|
page read and write
|
||
2084E728000
|
heap
|
page read and write
|
||
233F7D73000
|
heap
|
page read and write
|
||
BD5000
|
heap
|
page read and write
|
||
16539652000
|
heap
|
page read and write
|
||
2084E730000
|
heap
|
page read and write
|
||
233F72F6000
|
heap
|
page read and write
|
||
273358B0000
|
heap
|
page read and write
|
||
233F7D83000
|
heap
|
page read and write
|
||
27CD000
|
stack
|
page read and write
|
||
37FC1CC000
|
stack
|
page read and write
|
||
1A6BAA40000
|
trusted library allocation
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
1A6BAA30000
|
heap
|
page read and write
|
||
811000
|
heap
|
page read and write
|
||
233F7D7D000
|
heap
|
page read and write
|
||
264CB64E000
|
heap
|
page read and write
|
||
233F7D8D000
|
heap
|
page read and write
|
||
165395E0000
|
heap
|
page read and write
|
||
4D432FD000
|
stack
|
page read and write
|
||
1A6B765A000
|
heap
|
page read and write
|
||
2084E990000
|
trusted library allocation
|
page read and write
|
||
7ED859E000
|
stack
|
page read and write
|
||
273358B5000
|
heap
|
page read and write
|
||
7FFF2F376000
|
unkown
|
page read and write
|
||
310000
|
heap
|
page read and write
|
||
7FFF2F379000
|
unkown
|
page readonly
|
||
1A6B7686000
|
heap
|
page read and write
|
||
177E8FE000
|
stack
|
page read and write
|
||
233F7D4A000
|
heap
|
page read and write
|
||
233F7D75000
|
heap
|
page read and write
|
||
104A000
|
heap
|
page read and write
|
||
233F7D8B000
|
heap
|
page read and write
|
||
1C27158D000
|
heap
|
page read and write
|
||
37FC6F9000
|
stack
|
page read and write
|
||
233F7D75000
|
heap
|
page read and write
|
||
233F72C3000
|
heap
|
page read and write
|
||
16539E80000
|
trusted library allocation
|
page read and write
|
||
233F7D7D000
|
heap
|
page read and write
|
||
264CB64B000
|
heap
|
page read and write
|
||
1A6B764E000
|
heap
|
page read and write
|
||
233F8202000
|
heap
|
page read and write
|
||
233F7DAE000
|
heap
|
page read and write
|
||
233F7D7E000
|
heap
|
page read and write
|
||
2084E620000
|
trusted library allocation
|
page read and write
|
||
233F8202000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
233F7140000
|
heap
|
page read and write
|
||
233F7C02000
|
heap
|
page read and write
|
||
1A6B765A000
|
heap
|
page read and write
|
||
2084F4F0000
|
trusted library allocation
|
page read and write
|
||
233F7D71000
|
heap
|
page read and write
|
||
FCF000
|
stack
|
page read and write
|
||
233F7D8D000
|
heap
|
page read and write
|
||
7FFF2F379000
|
unkown
|
page readonly
|
||
4D4327B000
|
stack
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
7EEAA75000
|
stack
|
page read and write
|
||
862000
|
heap
|
page read and write
|
||
264CB66C000
|
heap
|
page read and write
|
||
89C000
|
heap
|
page read and write
|
||
273356C5000
|
heap
|
page read and write
|
||
233F72A4000
|
heap
|
page read and write
|
||
7ED8D7E000
|
stack
|
page read and write
|
||
29F10C70000
|
heap
|
page read and write
|
||
1F17FA87000
|
heap
|
page read and write
|
||
233F7D50000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
1A6B766D000
|
heap
|
page read and write
|
||
34D9FB000
|
stack
|
page read and write
|
||
7FFF2F321000
|
unkown
|
page execute read
|
||
233F8202000
|
heap
|
page read and write
|
||
233F72B5000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
233F7D96000
|
heap
|
page read and write
|
||
233F7DB2000
|
heap
|
page read and write
|
||
233F7D90000
|
heap
|
page read and write
|
||
1A6B75DB000
|
heap
|
page read and write
|
||
EF0000
|
direct allocation
|
page execute and read and write
|
||
37FC67E000
|
stack
|
page read and write
|
||
233F7D9E000
|
heap
|
page read and write
|
||
16539600000
|
heap
|
page read and write
|
||
34D7FB000
|
stack
|
page read and write
|
||
233F724D000
|
heap
|
page read and write
|
||
1F17FA4D000
|
heap
|
page read and write
|
||
233F72E1000
|
heap
|
page read and write
|
||
1C2718B0000
|
heap
|
page read and write
|
||
105B000
|
heap
|
page read and write
|
||
233F723C000
|
heap
|
page read and write
|
||
7FFF2F320000
|
unkown
|
page readonly
|
||
233F7D86000
|
heap
|
page read and write
|
||
7ED8A7E000
|
stack
|
page read and write
|
||
1C273204000
|
heap
|
page read and write
|
||
233F821A000
|
heap
|
page read and write
|
||
264CB5F0000
|
heap
|
page read and write
|
||
233F7D75000
|
heap
|
page read and write
|
||
7EEAAFF000
|
stack
|
page read and write
|
||
177E97E000
|
stack
|
page read and write
|
||
7A0000
|
heap
|
page readonly
|
||
233F7D95000
|
heap
|
page read and write
|
||
1C2733C0000
|
heap
|
page read and write
|
||
233F7D9F000
|
heap
|
page read and write
|
||
233F7D75000
|
heap
|
page read and write
|
||
7FFF2F379000
|
unkown
|
page readonly
|
||
273356A0000
|
heap
|
page read and write
|
||
2CFE37D000
|
stack
|
page read and write
|
||
86D000
|
heap
|
page read and write
|
||
A38AB0F000
|
stack
|
page read and write
|
||
233F8202000
|
heap
|
page read and write
|
||
233F72C8000
|
heap
|
page read and write
|
||
16539702000
|
heap
|
page read and write
|
||
1A6B7530000
|
heap
|
page read and write
|
||
233F7D8D000
|
heap
|
page read and write
|
||
2084E9A0000
|
heap
|
page readonly
|
||
233F7DA0000
|
heap
|
page read and write
|
||
233F7D83000
|
heap
|
page read and write
|
||
273356C3000
|
heap
|
page read and write
|
||
233F7308000
|
heap
|
page read and write
|
||
2CFDB7B000
|
stack
|
page read and write
|
||
3F0000
|
remote allocation
|
page read and write
|
||
1A6BAA33000
|
heap
|
page read and write
|
||
1C2714B0000
|
heap
|
page read and write
|
||
16539613000
|
heap
|
page read and write
|
||
233F7D9F000
|
heap
|
page read and write
|
||
B44000
|
stack
|
page read and write
|
||
233F7DD2000
|
heap
|
page read and write
|
||
2084E8F0000
|
trusted library allocation
|
page read and write
|
||
1AB5B229000
|
heap
|
page read and write
|
||
862000
|
heap
|
page read and write
|
||
2084E730000
|
heap
|
page read and write
|
||
233F7D94000
|
heap
|
page read and write
|
||
233F724A000
|
heap
|
page read and write
|
||
1C271540000
|
heap
|
page read and write
|
||
1653963D000
|
heap
|
page read and write
|
||
34D47B000
|
stack
|
page read and write
|
||
273356C1000
|
heap
|
page read and write
|
||
7FFF2F320000
|
unkown
|
page readonly
|
||
86D000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
1F17FA3C000
|
heap
|
page read and write
|
||
233F7D5C000
|
heap
|
page read and write
|
||
233F7D77000
|
heap
|
page read and write
|
||
233F7D9F000
|
heap
|
page read and write
|
||
A38AFFB000
|
stack
|
page read and write
|
||
233F7B10000
|
remote allocation
|
page read and write
|
||
107F000
|
heap
|
page read and write
|
||
233F8200000
|
heap
|
page read and write
|
||
233F7D9C000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
2084E610000
|
heap
|
page read and write
|
||
16539670000
|
heap
|
page read and write
|
||
233F7D83000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
233F7D9E000
|
heap
|
page read and write
|
||
264CB590000
|
heap
|
page read and write
|
||
27335680000
|
heap
|
page read and write
|
||
2964000
|
heap
|
page read and write
|
||
26CB000
|
stack
|
page read and write
|
||
2084E6A0000
|
heap
|
page read and write
|
||
89C000
|
heap
|
page read and write
|
||
29F10B30000
|
heap
|
page read and write
|
||
1A6B766D000
|
heap
|
page read and write
|
||
177E5AF000
|
stack
|
page read and write
|
||
7FFF2F376000
|
unkown
|
page read and write
|
||
7FFF2F372000
|
unkown
|
page readonly
|
||
3F0000
|
remote allocation
|
page read and write
|
||
233F7DBF000
|
heap
|
page read and write
|
||
233F7251000
|
heap
|
page read and write
|
||
7ED8B77000
|
stack
|
page read and write
|
||
233F7D78000
|
heap
|
page read and write
|
||
29F10CB0000
|
heap
|
page read and write
|
||
2284000
|
heap
|
page read and write
|
||
1AB5B25D000
|
heap
|
page read and write
|
||
1F17FA7C000
|
heap
|
page read and write
|
||
1C9282D0000
|
heap
|
page read and write
|
||
2084E6E0000
|
heap
|
page read and write
|
||
1AB5B28A000
|
heap
|
page read and write
|
||
233F7D71000
|
heap
|
page read and write
|
||
B651278000
|
stack
|
page read and write
|
||
233F7D9F000
|
heap
|
page read and write
|
||
273356B2000
|
heap
|
page read and write
|
||
83D000
|
heap
|
page read and write
|
||
233F7D9F000
|
heap
|
page read and write
|
||
7415A7B000
|
stack
|
page read and write
|
||
1AB5B200000
|
heap
|
page read and write
|
||
264CC002000
|
trusted library allocation
|
page read and write
|
||
7FFF2F320000
|
unkown
|
page readonly
|
||
1AB5BC02000
|
trusted library allocation
|
page read and write
|
||
233F7D75000
|
heap
|
page read and write
|
||
1A6B765F000
|
heap
|
page read and write
|
||
FD8000
|
heap
|
page read and write
|
||
1AB5B202000
|
heap
|
page read and write
|
||
760000
|
direct allocation
|
page execute and read and write
|
||
34DAFF000
|
stack
|
page read and write
|
||
1653967B000
|
heap
|
page read and write
|
||
2E2E000
|
stack
|
page read and write
|
||
7FFF2F379000
|
unkown
|
page readonly
|
||
950000
|
trusted library allocation
|
page read and write
|
||
233F7213000
|
heap
|
page read and write
|
||
233F7D5C000
|
heap
|
page read and write
|
||
1A6B75E0000
|
heap
|
page read and write
|
||
2CFDE7E000
|
stack
|
page read and write
|
||
233F72A3000
|
heap
|
page read and write
|
||
7415D7B000
|
stack
|
page read and write
|
||
16539580000
|
heap
|
page read and write
|
||
1AB5B300000
|
heap
|
page read and write
|
||
233F72B2000
|
heap
|
page read and write
|
||
233F8222000
|
heap
|
page read and write
|
||
233F7D83000
|
heap
|
page read and write
|
||
7FFF2F321000
|
unkown
|
page execute read
|
||
180000000
|
direct allocation
|
page read and write
|
||
1C273200000
|
heap
|
page read and write
|
||
233F7DC4000
|
heap
|
page read and write
|
||
233F7DAF000
|
heap
|
page read and write
|
||
1C271568000
|
heap
|
page read and write
|
||
7FFF2F320000
|
unkown
|
page readonly
|
||
1F17FA52000
|
heap
|
page read and write
|
||
1C929EF0000
|
heap
|
page read and write
|
||
1F17FA00000
|
heap
|
page read and write
|
||
233F7DAD000
|
heap
|
page read and write
|
||
741627F000
|
unkown
|
page read and write
|
||
7415AFE000
|
stack
|
page read and write
|
||
1C928542000
|
heap
|
page read and write
|
||
233F7D5C000
|
heap
|
page read and write
|
||
89C000
|
heap
|
page read and write
|
||
273356C0000
|
heap
|
page read and write
|
||
233F724B000
|
heap
|
page read and write
|
||
2084EA00000
|
trusted library allocation
|
page read and write
|
||
7D8000
|
heap
|
page read and write
|
||
1C929EF4000
|
heap
|
page read and write
|
||
7FFF2F372000
|
unkown
|
page readonly
|
||
1F17FB13000
|
heap
|
page read and write
|
||
233F7D9F000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
273356D1000
|
heap
|
page read and write
|
||
7FFF2F372000
|
unkown
|
page readonly
|
||
16539700000
|
heap
|
page read and write
|
||
1A6B7672000
|
heap
|
page read and write
|
||
233F7DBF000
|
heap
|
page read and write
|
||
233F7D18000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
29F10CC5000
|
heap
|
page read and write
|
||
233F7DA6000
|
heap
|
page read and write
|
||
2084E8E0000
|
trusted library allocation
|
page read and write
|
||
274E000
|
stack
|
page read and write
|
||
1C928480000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
1C9284A0000
|
direct allocation
|
page execute and read and write
|
||
7ED849B000
|
stack
|
page read and write
|
||
233F8222000
|
heap
|
page read and write
|
||
233F821A000
|
heap
|
page read and write
|
||
1C929E20000
|
heap
|
page read and write
|
||
1F17FA50000
|
heap
|
page read and write
|
||
264CB713000
|
heap
|
page read and write
|
||
233F8202000
|
heap
|
page read and write
|
||
233F7DAF000
|
heap
|
page read and write
|
||
2CFE27F000
|
stack
|
page read and write
|
||
1F17FA8B000
|
heap
|
page read and write
|
||
B65117F000
|
stack
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
264CB650000
|
heap
|
page read and write
|
||
1AB5B213000
|
heap
|
page read and write
|
||
29F10CB8000
|
heap
|
page read and write
|
||
233F7D85000
|
heap
|
page read and write
|
||
264CB629000
|
heap
|
page read and write
|
||
9B0000
|
remote allocation
|
page read and write
|
||
1A6B7669000
|
heap
|
page read and write
|
||
A38AEFB000
|
stack
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
273356E1000
|
heap
|
page read and write
|
||
1AB5B27F000
|
heap
|
page read and write
|
||
1653A002000
|
trusted library allocation
|
page read and write
|
||
233F7DA0000
|
heap
|
page read and write
|
||
7415B7E000
|
stack
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
7FFF2F376000
|
unkown
|
page read and write
|
||
1A6B767E000
|
heap
|
page read and write
|
||
1F17F8B0000
|
heap
|
page read and write
|
||
273356C7000
|
heap
|
page read and write
|
||
7EEABFE000
|
stack
|
page read and write
|
||
233F7D0B000
|
heap
|
page read and write
|
||
264CB708000
|
heap
|
page read and write
|
||
233F7200000
|
heap
|
page read and write
|
||
37FC5F9000
|
stack
|
page read and write
|
||
233F7D8D000
|
heap
|
page read and write
|
||
273356D1000
|
heap
|
page read and write
|
||
273356C8000
|
heap
|
page read and write
|
||
1AB5B23C000
|
heap
|
page read and write
|
||
233F7D83000
|
heap
|
page read and write
|
||
2EAB000
|
stack
|
page read and write
|
||
2084E950000
|
trusted library allocation
|
page read and write
|
||
1A6B7663000
|
heap
|
page read and write
|
||
233F7D71000
|
heap
|
page read and write
|
||
233F7DA2000
|
heap
|
page read and write
|
||
233F7D8D000
|
heap
|
page read and write
|
||
F40000
|
heap
|
page readonly
|
||
233F72D1000
|
heap
|
page read and write
|
||
1A6B75D0000
|
heap
|
page read and write
|
||
233F7D9F000
|
heap
|
page read and write
|
||
233F7D6E000
|
heap
|
page read and write
|
||
9B0000
|
remote allocation
|
page read and write
|
||
1AB5B302000
|
heap
|
page read and write
|
||
233F7D21000
|
heap
|
page read and write
|
||
1076000
|
heap
|
page read and write
|
||
233F7D65000
|
heap
|
page read and write
|
||
233F7D70000
|
heap
|
page read and write
|
||
B65137C000
|
stack
|
page read and write
|
||
233F7DC4000
|
heap
|
page read and write
|
||
2084E730000
|
heap
|
page read and write
|
||
7415E78000
|
stack
|
page read and write
|
||
37FC57A000
|
stack
|
page read and write
|
||
233F7288000
|
heap
|
page read and write
|
||
1F17FA2C000
|
heap
|
page read and write
|
||
811000
|
heap
|
page read and write
|
||
A38B2FE000
|
stack
|
page read and write
|
||
7ED851E000
|
stack
|
page read and write
|
||
1AB5B130000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
1F17FB00000
|
heap
|
page read and write
|
||
1C271560000
|
heap
|
page read and write
|
||
2084E6E8000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
233F7316000
|
heap
|
page read and write
|
||
1AB5B120000
|
heap
|
page read and write
|
||
233F7DD3000
|
heap
|
page read and write
|
||
233F7B10000
|
remote allocation
|
page read and write
|
||
264CB649000
|
heap
|
page read and write
|
||
233F7270000
|
heap
|
page read and write
|
||
233F7DAE000
|
heap
|
page read and write
|
||
233F7D00000
|
heap
|
page read and write
|
||
233F72F8000
|
heap
|
page read and write
|
||
1A6B75A0000
|
heap
|
page read and write
|
||
233F7D7D000
|
heap
|
page read and write
|
||
1F17FA48000
|
heap
|
page read and write
|
||
9E5000
|
heap
|
page read and write
|
There are 550 hidden memdumps, click here to show them.