Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\Plt3z2W7KQ.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\Plt3z2W7KQ.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\Plt3z2W7KQ.dll,DllRegisterServer
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\Plt3z2W7KQ.dll,DllUnregisterServer
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\KFXXkqoKy\adCFCoWid.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\XxAsGMCLqrlaY\QoxZfNcqe.dll"
|
||
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\Plt3z2W7KQ.dll"
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Plt3z2W7KQ.dll",#1
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://23.239.0.12/n
|
unknown
|
||
https://23.239.0.12/O
|
unknown
|
||
https://23.239.0.12/C
|
unknown
|
||
https://23.239.0.12/
|
23.239.0.12
|
||
https://23.239.0.12/ga
|
unknown
|
||
https://23.239.0.12/dll90
|
unknown
|
||
https://www.disneyplus.com/legal/your-california-privacy-rights
|
unknown
|
||
https://www.disneyplus.com/legal/privacy-policy
|
unknown
|
||
https://www.tiktok.com/legal/report/feedback
|
unknown
|
||
http://help.disneyplus.com.
|
unknown
|
||
https://support.hotspotshield.com/
|
unknown
|
||
https://www.hotspotshield.com/terms/
|
unknown
|
||
https://www.pango.co/privacy
|
unknown
|
||
https://disneyplus.com/legal.
|
unknown
|
There are 4 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
23.239.0.12
|
unknown
|
United States
|
||
192.168.2.1
|
unknown
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
2250000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
235EA8D0000
|
direct allocation
|
page execute and read and write
|
||
1360000
|
direct allocation
|
page execute and read and write
|
||
235071B0000
|
direct allocation
|
page execute and read and write
|
||
CCA6D7F000
|
stack
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
170ADAB3000
|
heap
|
page read and write
|
||
24A8DC02000
|
trusted library allocation
|
page read and write
|
||
16EFEB9A000
|
heap
|
page read and write
|
||
24A8D413000
|
heap
|
page read and write
|
||
16F380B0000
|
trusted library allocation
|
page read and write
|
||
16EFEB78000
|
heap
|
page read and write
|
||
170AA7A9000
|
heap
|
page read and write
|
||
17A5E076000
|
heap
|
page read and write
|
||
16EFEBA1000
|
heap
|
page read and write
|
||
16EFEB94000
|
heap
|
page read and write
|
||
170AA670000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
16EFE0B5000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
7FFF2F359000
|
unkown
|
page readonly
|
||
16EFEB8D000
|
heap
|
page read and write
|
||
16EFE029000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
280E000
|
stack
|
page read and write
|
||
16F371E0000
|
trusted library allocation
|
page read and write
|
||
170AA7A2000
|
heap
|
page read and write
|
||
1BBE37F000
|
stack
|
page read and write
|
||
16F37000000
|
heap
|
page read and write
|
||
24A8D47F000
|
heap
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
16EFDED0000
|
heap
|
page read and write
|
||
217E60B2000
|
heap
|
page read and write
|
||
170AAA35000
|
heap
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
1C909E13000
|
heap
|
page read and write
|
||
1431000
|
heap
|
page read and write
|
||
378AA7E000
|
stack
|
page read and write
|
||
16EFE013000
|
heap
|
page read and write
|
||
1C909E70000
|
heap
|
page read and write
|
||
24A8D429000
|
heap
|
page read and write
|
||
217E60C5000
|
heap
|
page read and write
|
||
619B577000
|
stack
|
page read and write
|
||
235072D5000
|
heap
|
page read and write
|
||
170AA650000
|
heap
|
page read and write
|
||
235070B8000
|
heap
|
page read and write
|
||
170AA7AE000
|
heap
|
page read and write
|
||
16F372A1000
|
heap
|
page read and write
|
||
CCA6C7E000
|
stack
|
page read and write
|
||
1431000
|
heap
|
page read and write
|
||
16EFF002000
|
heap
|
page read and write
|
||
16EFEB9B000
|
heap
|
page read and write
|
||
2BF2F44C000
|
heap
|
page read and write
|
||
86F66FE000
|
stack
|
page read and write
|
||
16EFEB8D000
|
heap
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
1C909E5D000
|
heap
|
page read and write
|
||
16EFEBD2000
|
heap
|
page read and write
|
||
32BB000
|
stack
|
page read and write
|
||
24A8D400000
|
heap
|
page read and write
|
||
16EFE062000
|
heap
|
page read and write
|
||
170AA793000
|
heap
|
page read and write
|
||
217E60D8000
|
heap
|
page read and write
|
||
2BF2F500000
|
heap
|
page read and write
|
||
24A8D280000
|
heap
|
page read and write
|
||
16EFE05A000
|
heap
|
page read and write
|
||
16EFEB91000
|
heap
|
page read and write
|
||
16EFEB94000
|
heap
|
page read and write
|
||
7FFF2F356000
|
unkown
|
page read and write
|
||
235E8EF8000
|
heap
|
page read and write
|
||
16EFEB95000
|
heap
|
page read and write
|
||
170ADAC0000
|
trusted library allocation
|
page read and write
|
||
235E92A0000
|
direct allocation
|
page execute and read and write
|
||
217E60A0000
|
heap
|
page read and write
|
||
17A5E113000
|
heap
|
page read and write
|
||
2350710D000
|
heap
|
page read and write
|
||
CA62177000
|
stack
|
page read and write
|
||
22FE000
|
stack
|
page read and write
|
||
28AF000
|
stack
|
page read and write
|
||
170AAA3B000
|
heap
|
page read and write
|
||
16EFEB8D000
|
heap
|
page read and write
|
||
16EFE0F7000
|
heap
|
page read and write
|
||
378A79E000
|
stack
|
page read and write
|
||
16F37520000
|
trusted library allocation
|
page read and write
|
||
16EFEB91000
|
heap
|
page read and write
|
||
217E60D0000
|
heap
|
page read and write
|
||
16EFE000000
|
heap
|
page read and write
|
||
1CD9F3E0000
|
heap
|
page read and write
|
||
217E60CD000
|
heap
|
page read and write
|
||
16EFE059000
|
heap
|
page read and write
|
||
86F677B000
|
stack
|
page read and write
|
||
241C000
|
stack
|
page read and write
|
||
170AA6F0000
|
heap
|
page read and write
|
||
16EFEB8E000
|
heap
|
page read and write
|
||
217E60C6000
|
heap
|
page read and write
|
||
16EFEB8D000
|
heap
|
page read and write
|
||
17A5E000000
|
heap
|
page read and write
|
||
2D60000
|
trusted library allocation
|
page read and write
|
||
1CD9F4A5000
|
heap
|
page read and write
|
||
16EFEB91000
|
heap
|
page read and write
|
||
16EFE065000
|
heap
|
page read and write
|
||
7EC57FE000
|
stack
|
page read and write
|
||
16F380A0000
|
heap
|
page readonly
|
||
235EAAC0000
|
heap
|
page read and write
|
||
17A5E102000
|
heap
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
16EFEB76000
|
heap
|
page read and write
|
||
16F37519000
|
heap
|
page read and write
|
||
23507240000
|
heap
|
page read and write
|
||
16EFDF40000
|
heap
|
page read and write
|
||
235072D0000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
24A8D457000
|
heap
|
page read and write
|
||
16EFEB8F000
|
heap
|
page read and write
|
||
16F38090000
|
trusted library allocation
|
page read and write
|
||
538A5F7000
|
stack
|
page read and write
|
||
16F37E80000
|
trusted library allocation
|
page read and write
|
||
915000
|
heap
|
page read and write
|
||
217E60D8000
|
heap
|
page read and write
|
||
24A8D502000
|
heap
|
page read and write
|
||
5389F5C000
|
stack
|
page read and write
|
||
16EFEBC6000
|
heap
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
16EFE0E5000
|
heap
|
page read and write
|
||
17A5E002000
|
heap
|
page read and write
|
||
16EFE05D000
|
heap
|
page read and write
|
||
16EFEB8D000
|
heap
|
page read and write
|
||
17A5DFD0000
|
heap
|
page read and write
|
||
7FFF2F300000
|
unkown
|
page readonly
|
||
2BF2F300000
|
heap
|
page read and write
|
||
235E8E40000
|
heap
|
page read and write
|
||
24A8D508000
|
heap
|
page read and write
|
||
16EFE116000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
170AA7B6000
|
heap
|
page read and write
|
||
619B77F000
|
stack
|
page read and write
|
||
170AA777000
|
heap
|
page read and write
|
||
14A5000
|
heap
|
page read and write
|
||
16EFF002000
|
heap
|
page read and write
|
||
16EFEB94000
|
heap
|
page read and write
|
||
170AA770000
|
heap
|
page read and write
|
||
CA61E7E000
|
stack
|
page read and write
|
||
F78A97C000
|
stack
|
page read and write
|
||
4BAAA7E000
|
stack
|
page read and write
|
||
217E60D0000
|
heap
|
page read and write
|
||
16EFF000000
|
heap
|
page read and write
|
||
1C909F13000
|
heap
|
page read and write
|
||
235E8ED0000
|
heap
|
page read and write
|
||
16EFEB9E000
|
heap
|
page read and write
|
||
CA6237F000
|
stack
|
page read and write
|
||
9B8000
|
heap
|
page read and write
|
||
17A5E028000
|
heap
|
page read and write
|
||
1C909F00000
|
heap
|
page read and write
|
||
23506ED0000
|
heap
|
page read and write
|
||
16EFEB78000
|
heap
|
page read and write
|
||
350F000
|
stack
|
page read and write
|
||
16EFEB99000
|
heap
|
page read and write
|
||
217E60B7000
|
heap
|
page read and write
|
||
2BF2F427000
|
heap
|
page read and write
|
||
16EFEBAE000
|
heap
|
page read and write
|
||
16F380C0000
|
trusted library allocation
|
page read and write
|
||
16EFE0A4000
|
heap
|
page read and write
|
||
16EFEB00000
|
heap
|
page read and write
|
||
16EFEB8E000
|
heap
|
page read and write
|
||
170AD930000
|
heap
|
page read and write
|
||
538A27D000
|
stack
|
page read and write
|
||
FA4000
|
stack
|
page read and write
|
||
24A8D472000
|
heap
|
page read and write
|
||
170AA79D000
|
heap
|
page read and write
|
||
F78AE7B000
|
stack
|
page read and write
|
||
7FFF2F301000
|
unkown
|
page execute read
|
||
5C4000
|
stack
|
page read and write
|
||
217E6070000
|
heap
|
page read and write
|
||
17A5E03C000
|
heap
|
page read and write
|
||
13C8000
|
heap
|
page read and write
|
||
235071E0000
|
heap
|
page readonly
|
||
16EFE05B000
|
heap
|
page read and write
|
||
2DDF000
|
stack
|
page read and write
|
||
144A000
|
heap
|
page read and write
|
||
2D60000
|
trusted library allocation
|
page read and write
|
||
16EFEB78000
|
heap
|
page read and write
|
||
235EA940000
|
heap
|
page read and write
|
||
538A3FE000
|
stack
|
page read and write
|
||
378A71B000
|
stack
|
page read and write
|
||
F78A9FE000
|
stack
|
page read and write
|
||
1C909E00000
|
heap
|
page read and write
|
||
16EFE0DD000
|
heap
|
page read and write
|
||
7EC5779000
|
stack
|
page read and write
|
||
16EFDFE0000
|
remote allocation
|
page read and write
|
||
2BF2F44D000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
16EFDF70000
|
trusted library allocation
|
page read and write
|
||
CCA6E7E000
|
stack
|
page read and write
|
||
619AECB000
|
stack
|
page read and write
|
||
170AA79D000
|
heap
|
page read and write
|
||
7FFF2F352000
|
unkown
|
page readonly
|
||
16F372A1000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
2BF2F454000
|
heap
|
page read and write
|
||
7FFF2F352000
|
unkown
|
page readonly
|
||
217E6270000
|
heap
|
page read and write
|
||
16EFE108000
|
heap
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
4BAA9F9000
|
stack
|
page read and write
|
||
1C909E29000
|
heap
|
page read and write
|
||
24A8D48D000
|
heap
|
page read and write
|
||
16F38110000
|
trusted library allocation
|
page read and write
|
||
24A8D500000
|
heap
|
page read and write
|
||
16EFEB9B000
|
heap
|
page read and write
|
||
619AF4E000
|
stack
|
page read and write
|
||
3490000
|
remote allocation
|
page read and write
|
||
17A5EA02000
|
trusted library allocation
|
page read and write
|
||
CCA6DFE000
|
stack
|
page read and write
|
||
7EC587C000
|
stack
|
page read and write
|
||
16EFDFE0000
|
remote allocation
|
page read and write
|
||
16EFEBAE000
|
heap
|
page read and write
|
||
24A8D402000
|
heap
|
page read and write
|
||
16EFE058000
|
heap
|
page read and write
|
||
3490000
|
remote allocation
|
page read and write
|
||
16EFEB97000
|
heap
|
page read and write
|
||
7FFF2F301000
|
unkown
|
page execute read
|
||
217E60C2000
|
heap
|
page read and write
|
||
217E60C4000
|
heap
|
page read and write
|
||
16EFE052000
|
heap
|
page read and write
|
||
16F37010000
|
trusted library allocation
|
page read and write
|
||
16F37515000
|
heap
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
2BF2F457000
|
heap
|
page read and write
|
||
1C909F08000
|
heap
|
page read and write
|
||
4BAA97C000
|
stack
|
page read and write
|
||
145C000
|
heap
|
page read and write
|
||
7FFF2F300000
|
unkown
|
page readonly
|
||
1C909E53000
|
heap
|
page read and write
|
||
16EFEB78000
|
heap
|
page read and write
|
||
16EFE102000
|
heap
|
page read and write
|
||
237F000
|
stack
|
page read and write
|
||
16EFEB9D000
|
heap
|
page read and write
|
||
235EA900000
|
heap
|
page readonly
|
||
1451000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
4BAAAF9000
|
stack
|
page read and write
|
||
16EFF003000
|
heap
|
page read and write
|
||
16EFEA02000
|
heap
|
page read and write
|
||
217E60AB000
|
heap
|
page read and write
|
||
3490000
|
remote allocation
|
page read and write
|
||
235E8EF0000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
16F372BD000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
16F3729A000
|
heap
|
page read and write
|
||
FD0000
|
remote allocation
|
page read and write
|
||
235E92B5000
|
heap
|
page read and write
|
||
CA61B6B000
|
stack
|
page read and write
|
||
CCA6EFE000
|
stack
|
page read and write
|
||
619B47E000
|
stack
|
page read and write
|
||
235E8EB0000
|
heap
|
page read and write
|
||
16EFEB94000
|
heap
|
page read and write
|
||
16F37160000
|
heap
|
page read and write
|
||
619AFCE000
|
stack
|
page read and write
|
||
16EFE0C4000
|
heap
|
page read and write
|
||
538A6FA000
|
stack
|
page read and write
|
||
16EFEBB8000
|
heap
|
page read and write
|
||
2BF2F413000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
1BBE27E000
|
stack
|
page read and write
|
||
2BF2FC02000
|
trusted library allocation
|
page read and write
|
||
1350000
|
direct allocation
|
page execute and read and write
|
||
142E000
|
heap
|
page read and write
|
||
7FFF2F352000
|
unkown
|
page readonly
|
||
2BF2F513000
|
heap
|
page read and write
|
||
16EFDEE0000
|
heap
|
page read and write
|
||
1BBDB5C000
|
stack
|
page read and write
|
||
F78AD7B000
|
stack
|
page read and write
|
||
16F371D0000
|
trusted library allocation
|
page read and write
|
||
17A5DF60000
|
heap
|
page read and write
|
||
538A4FA000
|
stack
|
page read and write
|
||
2BF2F400000
|
heap
|
page read and write
|
||
16EFEBC1000
|
heap
|
page read and write
|
||
CA6227F000
|
stack
|
page read and write
|
||
1C909E5D000
|
heap
|
page read and write
|
||
16EFEB9D000
|
heap
|
page read and write
|
||
7FFF2F356000
|
unkown
|
page read and write
|
||
16EFF021000
|
heap
|
page read and write
|
||
217E6310000
|
heap
|
page read and write
|
||
16EFEB8D000
|
heap
|
page read and write
|
||
2BF2FBA0000
|
trusted library allocation
|
page read and write
|
||
148E000
|
heap
|
page read and write
|
||
17A5DF70000
|
heap
|
page read and write
|
||
16EFE0AB000
|
heap
|
page read and write
|
||
86F65FE000
|
stack
|
page read and write
|
||
2BF2F44F000
|
heap
|
page read and write
|
||
217E60D0000
|
heap
|
page read and write
|
||
A34000
|
heap
|
page read and write
|
||
7EC53AE000
|
stack
|
page read and write
|
||
FD0000
|
remote allocation
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
619B67F000
|
stack
|
page read and write
|
||
217E60CD000
|
heap
|
page read and write
|
||
217E60D9000
|
heap
|
page read and write
|
||
31BB000
|
stack
|
page read and write
|
||
16EFEB52000
|
heap
|
page read and write
|
||
170AA7AA000
|
heap
|
page read and write
|
||
F78AF77000
|
stack
|
page read and write
|
||
1C909D20000
|
trusted library allocation
|
page read and write
|
||
16EFEB9E000
|
heap
|
page read and write
|
||
16EFE089000
|
heap
|
page read and write
|
||
24A8D380000
|
trusted library allocation
|
page read and write
|
||
217E6010000
|
heap
|
page read and write
|
||
24A8D43C000
|
heap
|
page read and write
|
||
16EFE0EC000
|
heap
|
page read and write
|
||
7FFF2F300000
|
unkown
|
page readonly
|
||
16EFEB9D000
|
heap
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
170AA510000
|
heap
|
page read and write
|
||
1C909E3C000
|
heap
|
page read and write
|
||
619B3FB000
|
stack
|
page read and write
|
||
F78B17C000
|
stack
|
page read and write
|
||
16EFEB96000
|
heap
|
page read and write
|
||
235070FF000
|
heap
|
page read and write
|
||
235E92B0000
|
heap
|
page read and write
|
||
217E60B7000
|
heap
|
page read and write
|
||
F78B27E000
|
stack
|
page read and write
|
||
170AA799000
|
heap
|
page read and write
|
||
7FFF2F356000
|
unkown
|
page read and write
|
||
235EAAC4000
|
heap
|
page read and write
|
||
538A7FF000
|
stack
|
page read and write
|
||
2BF2F2A0000
|
heap
|
page read and write
|
||
23507080000
|
heap
|
page read and write
|
||
235070B0000
|
heap
|
page read and write
|
||
16F372C1000
|
heap
|
page read and write
|
||
23507010000
|
heap
|
page read and write
|
||
7EC567F000
|
stack
|
page read and write
|
||
7FFF2F301000
|
unkown
|
page execute read
|
||
1C909E77000
|
heap
|
page read and write
|
||
16EFEB91000
|
heap
|
page read and write
|
||
217E6315000
|
heap
|
page read and write
|
||
16EFF002000
|
heap
|
page read and write
|
||
CCA6985000
|
stack
|
page read and write
|
||
170AA78A000
|
heap
|
page read and write
|
||
235E8F3E000
|
heap
|
page read and write
|
||
16EFEB78000
|
heap
|
page read and write
|
||
16EFEB9B000
|
heap
|
page read and write
|
||
17A5E06B000
|
heap
|
page read and write
|
||
CA6207B000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
A13000
|
heap
|
page read and write
|
||
2BF2F290000
|
heap
|
page read and write
|
||
170AA78A000
|
heap
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
F78B07F000
|
stack
|
page read and write
|
||
16F37240000
|
trusted library allocation
|
page read and write
|
||
1C909BB0000
|
heap
|
page read and write
|
||
16EFEBAA000
|
heap
|
page read and write
|
||
86F667E000
|
stack
|
page read and write
|
||
7EC56FE000
|
stack
|
page read and write
|
||
1CD9F450000
|
heap
|
page read and write
|
||
33CF000
|
stack
|
page read and write
|
||
1C909E4D000
|
heap
|
page read and write
|
||
86F64FF000
|
stack
|
page read and write
|
||
7FFF2F359000
|
unkown
|
page readonly
|
||
13C0000
|
heap
|
page read and write
|
||
17A5E870000
|
trusted library allocation
|
page read and write
|
||
170AA793000
|
heap
|
page read and write
|
||
217E60DD000
|
heap
|
page read and write
|
||
17A5E100000
|
heap
|
page read and write
|
||
1C909BC0000
|
heap
|
page read and write
|
||
CCA6CFE000
|
stack
|
page read and write
|
||
24A8D451000
|
heap
|
page read and write
|
||
7FFF2F352000
|
unkown
|
page readonly
|
||
170AA78F000
|
heap
|
page read and write
|
||
16EFE03C000
|
heap
|
page read and write
|
||
16EFEB8D000
|
heap
|
page read and write
|
||
1459000
|
heap
|
page read and write
|
||
145C000
|
heap
|
page read and write
|
||
16F3729B000
|
heap
|
page read and write
|
||
16EFE113000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
13FC000
|
heap
|
page read and write
|
||
CCA6F7B000
|
stack
|
page read and write
|
||
145C000
|
heap
|
page read and write
|
||
7EC532A000
|
stack
|
page read and write
|
||
16F372A2000
|
heap
|
page read and write
|
||
23507030000
|
heap
|
page read and write
|
||
235E9280000
|
heap
|
page read and write
|
||
148C000
|
heap
|
page read and write
|
||
1BBE07B000
|
stack
|
page read and write
|
||
13A0000
|
heap
|
page readonly
|
||
EF0000
|
heap
|
page read and write
|
||
1C909C20000
|
heap
|
page read and write
|
||
2BF2F43C000
|
heap
|
page read and write
|
||
16EFEB95000
|
heap
|
page read and write
|
||
16EFE0B0000
|
heap
|
page read and write
|
||
2BF2F44B000
|
heap
|
page read and write
|
||
17A5E065000
|
heap
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
16F37510000
|
heap
|
page read and write
|
||
16EFEB8D000
|
heap
|
page read and write
|
||
2BF2F481000
|
heap
|
page read and write
|
||
16EFEBB4000
|
heap
|
page read and write
|
||
970000
|
direct allocation
|
page execute and read and write
|
||
7FFF2F359000
|
unkown
|
page readonly
|
||
16EFF002000
|
heap
|
page read and write
|
||
1BBE17B000
|
stack
|
page read and write
|
||
148C000
|
heap
|
page read and write
|
||
7FFF2F301000
|
unkown
|
page execute read
|
||
18002D000
|
direct allocation
|
page readonly
|
||
16EFE04D000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
7FFF2F356000
|
unkown
|
page read and write
|
||
148E000
|
heap
|
page read and write
|
||
12F5000
|
heap
|
page read and write
|
||
23507244000
|
heap
|
page read and write
|
||
A34000
|
heap
|
page read and write
|
||
170AA77B000
|
heap
|
page read and write
|
||
16EFEB91000
|
heap
|
page read and write
|
||
148E000
|
heap
|
page read and write
|
||
16EFF002000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
16EFEB78000
|
heap
|
page read and write
|
||
2BF2F429000
|
heap
|
page read and write
|
||
16EFEB14000
|
heap
|
page read and write
|
||
CA61BEE000
|
stack
|
page read and write
|
||
16EFEB91000
|
heap
|
page read and write
|
||
2BF2F476000
|
heap
|
page read and write
|
||
7FFF2F359000
|
unkown
|
page readonly
|
||
16EFDFE0000
|
remote allocation
|
page read and write
|
||
16EFF002000
|
heap
|
page read and write
|
||
2BF2F508000
|
heap
|
page read and write
|
||
23508BC0000
|
heap
|
page read and write
|
||
16EFE05E000
|
heap
|
page read and write
|
||
17A5E013000
|
heap
|
page read and write
|
||
2BF2F502000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
1451000
|
heap
|
page read and write
|
||
16EFF002000
|
heap
|
page read and write
|
||
24A8D220000
|
heap
|
page read and write
|
||
24A8D513000
|
heap
|
page read and write
|
||
3C714FD000
|
stack
|
page read and write
|
||
217E60DE000
|
heap
|
page read and write
|
||
16EFEB9D000
|
heap
|
page read and write
|
||
1CD9F490000
|
heap
|
page read and write
|
||
292B000
|
stack
|
page read and write
|
||
148C000
|
heap
|
page read and write
|
||
170AAA30000
|
heap
|
page read and write
|
||
235E8F4E000
|
heap
|
page read and write
|
||
16EFE0EF000
|
heap
|
page read and write
|
||
170ADAB0000
|
heap
|
page read and write
|
||
990000
|
heap
|
page readonly
|
||
16EFE0CB000
|
heap
|
page read and write
|
||
1C909F02000
|
heap
|
page read and write
|
||
217E60D8000
|
heap
|
page read and write
|
||
16EFF002000
|
heap
|
page read and write
|
||
7FFF2F300000
|
unkown
|
page readonly
|
||
4BAAB7F000
|
stack
|
page read and write
|
||
1C909E83000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
235070A0000
|
direct allocation
|
page execute and read and write
|
||
2440000
|
heap
|
page read and write
|
||
F78AC7F000
|
stack
|
page read and write
|
||
1CD9F498000
|
heap
|
page read and write
|
||
86F6475000
|
stack
|
page read and write
|
||
538A979000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
5389FDE000
|
stack
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
16EFEB18000
|
heap
|
page read and write
|
||
24A8D210000
|
heap
|
page read and write
|
||
217E60CD000
|
heap
|
page read and write
|
||
4BAA56B000
|
stack
|
page read and write
|
||
1C90A602000
|
trusted library allocation
|
page read and write
|
||
170AA787000
|
heap
|
page read and write
|
||
538A87F000
|
unkown
|
page read and write
|
||
16EFEB91000
|
heap
|
page read and write
|
||
16F37140000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
2BF2F470000
|
heap
|
page read and write
|
||
86F657F000
|
stack
|
page read and write
|
||
16EFEB75000
|
heap
|
page read and write
|
||
16F37259000
|
heap
|
page read and write
|
||
16EFE0EF000
|
heap
|
page read and write
|
||
16F37250000
|
heap
|
page read and write
|
||
170AA78E000
|
heap
|
page read and write
|
||
16EFEB91000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
3520000
|
heap
|
page read and write
|
There are 482 hidden memdumps, click here to show them.