Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
auExrOTnvB.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0xee4b08f8, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\auExrOTnvB.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\auExrOTnvB.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\auExrOTnvB.dll,DllRegisterServer
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\auExrOTnvB.dll,DllUnregisterServer
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PlUoNfxsJl\nlEiWRnuQfGg.dll"
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
|
||
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\auExrOTnvB.dll"
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\auExrOTnvB.dll",#1
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://23.239.0.12/m
|
unknown
|
||
https://23.239.0.12/
|
23.239.0.12
|
||
https://23.239.0.12/h
|
unknown
|
||
https://www.disneyplus.com/legal/your-california-privacy-rights
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://www.disneyplus.com/legal/privacy-policy
|
unknown
|
||
https://www.tiktok.com/legal/report/feedback
|
unknown
|
||
http://help.disneyplus.com.
|
unknown
|
||
https://support.hotspotshield.com/
|
unknown
|
||
https://www.hotspotshield.com/terms/
|
unknown
|
||
https://www.pango.co/privacy
|
unknown
|
||
https://disneyplus.com/legal.
|
unknown
|
There are 2 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
23.239.0.12
|
unknown
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
||
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\TaskStore
|
Schedule Scan
|
||
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\State
|
BlockUntilTimeStatus
|
||
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\Configuration
|
refreshAfter
|
There are 2 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
237001B0000
|
direct allocation
|
page execute and read and write
|
||
2135E670000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
E70000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
580000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
2A846313000
|
heap
|
page read and write
|
||
2FDD4D08000
|
heap
|
page read and write
|
||
E60000
|
direct allocation
|
page execute and read and write
|
||
225A242E000
|
heap
|
page read and write
|
||
1E811586000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
7FF8CB7F2000
|
unkown
|
page readonly
|
||
225A2624000
|
trusted library allocation
|
page read and write
|
||
75270FC000
|
stack
|
page read and write
|
||
1E810C49000
|
heap
|
page read and write
|
||
19616B13000
|
heap
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
1D96C5D7000
|
heap
|
page read and write
|
||
FFAD47E000
|
stack
|
page read and write
|
||
1AD4E278000
|
heap
|
page read and write
|
||
24C82100000
|
heap
|
page read and write
|
||
F03000
|
heap
|
page read and write
|
||
BE9AE7A000
|
stack
|
page read and write
|
||
225A2502000
|
heap
|
page read and write
|
||
19617A19000
|
heap
|
page read and write
|
||
2259CE00000
|
heap
|
page read and write
|
||
19616A5F000
|
heap
|
page read and write
|
||
1B2D9CA0000
|
heap
|
page read and write
|
||
1E074300000
|
heap
|
page read and write
|
||
1E81157E000
|
heap
|
page read and write
|
||
EE5000
|
heap
|
page read and write
|
||
1D96C5D5000
|
heap
|
page read and write
|
||
24C8205E000
|
heap
|
page read and write
|
||
2259D600000
|
heap
|
page read and write
|
||
2532CDA9000
|
heap
|
page read and write
|
||
B89B37F000
|
stack
|
page read and write
|
||
19617B02000
|
heap
|
page read and write
|
||
FFAD5FC000
|
stack
|
page read and write
|
||
2532CDA0000
|
heap
|
page read and write
|
||
1D60000
|
heap
|
page readonly
|
||
2259CEFE000
|
heap
|
page read and write
|
||
1E81159B000
|
heap
|
page read and write
|
||
2259DDE0000
|
trusted library allocation
|
page read and write
|
||
B89B17B000
|
stack
|
page read and write
|
||
1D96C513000
|
heap
|
page read and write
|
||
2532CD70000
|
trusted library allocation
|
page read and write
|
||
BE9B17C000
|
stack
|
page read and write
|
||
1DF30D30000
|
heap
|
page read and write
|
||
2532DB20000
|
heap
|
page readonly
|
||
7FF8CB7F6000
|
unkown
|
page read and write
|
||
23701C70000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
2135E640000
|
heap
|
page read and write
|
||
2259CE29000
|
heap
|
page read and write
|
||
5786CFB000
|
stack
|
page read and write
|
||
1AD4E1A0000
|
trusted library allocation
|
page read and write
|
||
1E810A10000
|
heap
|
page read and write
|
||
1E810C4C000
|
heap
|
page read and write
|
||
BC0000
|
remote allocation
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
1DF30CC5000
|
heap
|
page read and write
|
||
AC5137E000
|
stack
|
page read and write
|
||
1E810C4E000
|
heap
|
page read and write
|
||
2259D5D0000
|
trusted library section
|
page readonly
|
||
AC98277000
|
stack
|
page read and write
|
||
5CA5D8F000
|
stack
|
page read and write
|
||
225A26F0000
|
trusted library allocation
|
page read and write
|
||
1E810D08000
|
heap
|
page read and write
|
||
225A2730000
|
remote allocation
|
page read and write
|
||
19616BAA000
|
heap
|
page read and write
|
||
2532CDB0000
|
trusted library allocation
|
page read and write
|
||
1D96C5DA000
|
heap
|
page read and write
|
||
7FF8CB7F9000
|
unkown
|
page readonly
|
||
18002F000
|
direct allocation
|
page readonly
|
||
180000000
|
direct allocation
|
page read and write
|
||
FA2000
|
heap
|
page read and write
|
||
19617A00000
|
heap
|
page read and write
|
||
1E810C4A000
|
heap
|
page read and write
|
||
2A8460E0000
|
heap
|
page read and write
|
||
1D96C5C4000
|
heap
|
page read and write
|
||
2F2D000
|
stack
|
page read and write
|
||
17873750000
|
heap
|
page read and write
|
||
A12BCE000
|
stack
|
page read and write
|
||
2532DB30000
|
trusted library allocation
|
page read and write
|
||
31EF677000
|
stack
|
page read and write
|
||
1DF30DBF000
|
heap
|
page read and write
|
||
19616A37000
|
heap
|
page read and write
|
||
B95000
|
stack
|
page read and write
|
||
24C82052000
|
heap
|
page read and write
|
||
1E56B3B0000
|
heap
|
page read and write
|
||
1E07403C000
|
heap
|
page read and write
|
||
1E810CAA000
|
heap
|
page read and write
|
||
19617202000
|
heap
|
page read and write
|
||
1E81159A000
|
heap
|
page read and write
|
||
2A846213000
|
heap
|
page read and write
|
||
7FF8CB7F6000
|
unkown
|
page read and write
|
||
2FDD4C02000
|
heap
|
page read and write
|
||
1E810D13000
|
heap
|
page read and write
|
||
1E811588000
|
heap
|
page read and write
|
||
2259CE92000
|
heap
|
page read and write
|
||
2B64000
|
heap
|
page read and write
|
||
B287EFF000
|
stack
|
page read and write
|
||
FFAD67E000
|
stack
|
page read and write
|
||
1DF30DAE000
|
heap
|
page read and write
|
||
19616AB4000
|
heap
|
page read and write
|
||
225A23D0000
|
trusted library allocation
|
page read and write
|
||
1D96C5CB000
|
heap
|
page read and write
|
||
2FDD4C4B000
|
heap
|
page read and write
|
||
2FDD4C7B000
|
heap
|
page read and write
|
||
407927E000
|
stack
|
page read and write
|
||
1E810B80000
|
trusted library allocation
|
page read and write
|
||
225A260E000
|
trusted library allocation
|
page read and write
|
||
45B000
|
heap
|
page read and write
|
||
1AD4E313000
|
heap
|
page read and write
|
||
2259CE3D000
|
heap
|
page read and write
|
||
2FDD4C80000
|
heap
|
page read and write
|
||
19616A00000
|
heap
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
2532CB17000
|
heap
|
page read and write
|
||
AC514FB000
|
stack
|
page read and write
|
||
312F000
|
stack
|
page read and write
|
||
2B30000
|
remote allocation
|
page read and write
|
||
225A2502000
|
heap
|
page read and write
|
||
1AD4E213000
|
heap
|
page read and write
|
||
407907C000
|
stack
|
page read and write
|
||
B95A57F000
|
stack
|
page read and write
|
||
1E81154C000
|
heap
|
page read and write
|
||
2259CD30000
|
trusted library allocation
|
page read and write
|
||
A12B4B000
|
stack
|
page read and write
|
||
225A2600000
|
trusted library allocation
|
page read and write
|
||
1DF30DAE000
|
heap
|
page read and write
|
||
225A24EC000
|
heap
|
page read and write
|
||
B2886F9000
|
stack
|
page read and write
|
||
1AD4E202000
|
heap
|
page read and write
|
||
B89AD5A000
|
stack
|
page read and write
|
||
1AD4EC02000
|
trusted library allocation
|
page read and write
|
||
31EFDFF000
|
stack
|
page read and write
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
225A2456000
|
heap
|
page read and write
|
||
1FB0000
|
heap
|
page read and write
|
||
1E074056000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
1B2D9CA5000
|
heap
|
page read and write
|
||
491000
|
heap
|
page read and write
|
||
F9F000
|
heap
|
page read and write
|
||
2FDD4AB0000
|
heap
|
page read and write
|
||
1D96C460000
|
heap
|
page read and write
|
||
752717F000
|
stack
|
page read and write
|
||
2FDD5402000
|
trusted library allocation
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
1E811A03000
|
heap
|
page read and write
|
||
225A2700000
|
trusted library allocation
|
page read and write
|
||
7FF8CB7A0000
|
unkown
|
page readonly
|
||
A12EFE000
|
stack
|
page read and write
|
||
31EFF7A000
|
stack
|
page read and write
|
||
196167D0000
|
heap
|
page read and write
|
||
1E811A19000
|
heap
|
page read and write
|
||
1E56B5E0000
|
heap
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
1D96C5D5000
|
heap
|
page read and write
|
||
1E8115BF000
|
heap
|
page read and write
|
||
1E0742A3000
|
heap
|
page read and write
|
||
2259D758000
|
heap
|
page read and write
|
||
FFAD4FE000
|
stack
|
page read and write
|
||
2532CD90000
|
trusted library allocation
|
page read and write
|
||
2259CEBC000
|
heap
|
page read and write
|
||
1D96C810000
|
heap
|
page read and write
|
||
24C8208F000
|
heap
|
page read and write
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
D5000
|
stack
|
page read and write
|
||
1E811A21000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
2259D702000
|
heap
|
page read and write
|
||
19616AF9000
|
heap
|
page read and write
|
||
7FF8CB7F9000
|
unkown
|
page readonly
|
||
1E074026000
|
heap
|
page read and write
|
||
5721C79000
|
stack
|
page read and write
|
||
AC513FE000
|
stack
|
page read and write
|
||
1E81159A000
|
heap
|
page read and write
|
||
19617A54000
|
heap
|
page read and write
|
||
1E074038000
|
heap
|
page read and write
|
||
A12E7E000
|
stack
|
page read and write
|
||
570000
|
direct allocation
|
page execute and read and write
|
||
237000E0000
|
heap
|
page read and write
|
||
31EF47B000
|
stack
|
page read and write
|
||
2FDD4C00000
|
heap
|
page read and write
|
||
196173D8000
|
heap
|
page read and write
|
||
2259CBD0000
|
heap
|
page read and write
|
||
2259CEA0000
|
heap
|
page read and write
|
||
1DF30DA6000
|
heap
|
page read and write
|
||
AC97FFB000
|
stack
|
page read and write
|
||
2A84623C000
|
heap
|
page read and write
|
||
196167E0000
|
heap
|
page read and write
|
||
19616A5C000
|
heap
|
page read and write
|
||
1E81159C000
|
heap
|
page read and write
|
||
1E810C4D000
|
heap
|
page read and write
|
||
19617A0C000
|
heap
|
page read and write
|
||
1E077340000
|
trusted library allocation
|
page read and write
|
||
4B2000
|
heap
|
page read and write
|
||
2259D718000
|
heap
|
page read and write
|
||
19616ADE000
|
heap
|
page read and write
|
||
B95A5FE000
|
stack
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
2259CBC0000
|
heap
|
page read and write
|
||
F4F000
|
heap
|
page read and write
|
||
1AD4E240000
|
heap
|
page read and write
|
||
1E8115D1000
|
heap
|
page read and write
|
||
1E56B410000
|
heap
|
page read and write
|
||
1E81158C000
|
heap
|
page read and write
|
||
2532CB85000
|
heap
|
page read and write
|
||
2A84625C000
|
heap
|
page read and write
|
||
225A24D7000
|
heap
|
page read and write
|
||
178737D0000
|
heap
|
page read and write
|
||
1E56B600000
|
heap
|
page read and write
|
||
2259D5C0000
|
trusted library section
|
page readonly
|
||
7FF8CB7F6000
|
unkown
|
page read and write
|
||
1E810CAB000
|
heap
|
page read and write
|
||
1E811594000
|
heap
|
page read and write
|
||
225A24F9000
|
heap
|
page read and write
|
||
AC9837F000
|
stack
|
page read and write
|
||
31EFCFE000
|
stack
|
page read and write
|
||
2259D713000
|
heap
|
page read and write
|
||
24C8205A000
|
heap
|
page read and write
|
||
1E56B41E000
|
heap
|
page read and write
|
||
1DF30DA7000
|
heap
|
page read and write
|
||
2B1E000
|
stack
|
page read and write
|
||
1E811586000
|
heap
|
page read and write
|
||
1D96C515000
|
heap
|
page read and write
|
||
BB677EA000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
B2885F8000
|
stack
|
page read and write
|
||
2A846200000
|
heap
|
page read and write
|
||
2FDD4D13000
|
heap
|
page read and write
|
||
2532CB10000
|
heap
|
page read and write
|
||
2135E47D000
|
heap
|
page read and write
|
||
1E81157E000
|
heap
|
page read and write
|
||
1DF30DAE000
|
heap
|
page read and write
|
||
2259CE13000
|
heap
|
page read and write
|
||
1E07404D000
|
heap
|
page read and write
|
||
2A84625A000
|
heap
|
page read and write
|
||
407937F000
|
stack
|
page read and write
|
||
19616A29000
|
heap
|
page read and write
|
||
19616AC8000
|
heap
|
page read and write
|
||
B287F7E000
|
stack
|
page read and write
|
||
1DF30CC0000
|
heap
|
page read and write
|
||
225A2240000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
2259E223000
|
trusted library allocation
|
page read and write
|
||
2135E400000
|
heap
|
page read and write
|
||
5721AFE000
|
stack
|
page read and write
|
||
BE9B078000
|
stack
|
page read and write
|
||
225A2414000
|
heap
|
page read and write
|
||
19616A4A000
|
heap
|
page read and write
|
||
19616A69000
|
heap
|
page read and write
|
||
2135FF04000
|
heap
|
page read and write
|
||
1D96C511000
|
heap
|
page read and write
|
||
1AD4E25B000
|
heap
|
page read and write
|
||
1E07401E000
|
heap
|
page read and write
|
||
2259E220000
|
trusted library allocation
|
page read and write
|
||
2259E230000
|
trusted library allocation
|
page read and write
|
||
1E811588000
|
heap
|
page read and write
|
||
5786DFB000
|
stack
|
page read and write
|
||
2A846300000
|
heap
|
page read and write
|
||
B288178000
|
stack
|
page read and write
|
||
19616A13000
|
heap
|
page read and write
|
||
F03000
|
heap
|
page read and write
|
||
2259D5F0000
|
trusted library section
|
page readonly
|
||
2259CE6F000
|
heap
|
page read and write
|
||
225A22C0000
|
trusted library allocation
|
page read and write
|
||
1DF30CB0000
|
heap
|
page read and write
|
||
1B2D9CD0000
|
heap
|
page read and write
|
||
7526BF9000
|
stack
|
page read and write
|
||
1AD4E302000
|
heap
|
page read and write
|
||
19616AB7000
|
heap
|
page read and write
|
||
1E810CBF000
|
heap
|
page read and write
|
||
1E811588000
|
heap
|
page read and write
|
||
225A24EE000
|
heap
|
page read and write
|
||
31EFE7E000
|
stack
|
page read and write
|
||
F5B000
|
heap
|
page read and write
|
||
24C82062000
|
heap
|
page read and write
|
||
1E0742A0000
|
heap
|
page read and write
|
||
225A23E0000
|
trusted library allocation
|
page read and write
|
||
1E811A03000
|
heap
|
page read and write
|
||
7FF8CB7A1000
|
unkown
|
page execute read
|
||
EC8000
|
heap
|
page read and write
|
||
1D96C56D000
|
heap
|
page read and write
|
||
1E074029000
|
heap
|
page read and write
|
||
1D96C550000
|
heap
|
page read and write
|
||
1E810A20000
|
heap
|
page read and write
|
||
B2884FE000
|
unkown
|
page read and write
|
||
1E07403C000
|
heap
|
page read and write
|
||
1D96C56D000
|
heap
|
page read and write
|
||
2259CE8E000
|
heap
|
page read and write
|
||
2259E201000
|
trusted library allocation
|
page read and write
|
||
1E811A02000
|
heap
|
page read and write
|
||
19617330000
|
heap
|
page read and write
|
||
1E810CC6000
|
heap
|
page read and write
|
||
225A2621000
|
trusted library allocation
|
page read and write
|
||
2A1F000
|
stack
|
page read and write
|
||
1E811A02000
|
heap
|
page read and write
|
||
225A2600000
|
trusted library allocation
|
page read and write
|
||
1D96C4F9000
|
heap
|
page read and write
|
||
1E810C47000
|
heap
|
page read and write
|
||
225A2504000
|
heap
|
page read and write
|
||
572174B000
|
stack
|
page read and write
|
||
2A846258000
|
heap
|
page read and write
|
||
2135E48D000
|
heap
|
page read and write
|
||
FFADA7F000
|
stack
|
page read and write
|
||
1E810A80000
|
heap
|
page read and write
|
||
225A24F8000
|
heap
|
page read and write
|
||
2FDD4A40000
|
heap
|
page read and write
|
||
1E811588000
|
heap
|
page read and write
|
||
24C82102000
|
heap
|
page read and write
|
||
225A243F000
|
heap
|
page read and write
|
||
2370021B000
|
heap
|
page read and write
|
||
1D96C5D2000
|
heap
|
page read and write
|
||
196173EF000
|
heap
|
page read and write
|
||
2135E390000
|
heap
|
page read and write
|
||
7526CFC000
|
stack
|
page read and write
|
||
2FDD4C2A000
|
heap
|
page read and write
|
||
24C82108000
|
heap
|
page read and write
|
||
23700000000
|
heap
|
page read and write
|
||
1B2D9D4C000
|
heap
|
page read and write
|
||
1B2D9D20000
|
heap
|
page read and write
|
||
24C82085000
|
heap
|
page read and write
|
||
1E810CDA000
|
heap
|
page read and write
|
||
1E07430B000
|
heap
|
page read and write
|
||
2A84627F000
|
heap
|
page read and write
|
||
24C81FD0000
|
trusted library allocation
|
page read and write
|
||
7FF8CB7F9000
|
unkown
|
page readonly
|
||
1E811402000
|
heap
|
page read and write
|
||
2259D718000
|
heap
|
page read and write
|
||
1E81150F000
|
heap
|
page read and write
|
||
B89B2FF000
|
stack
|
page read and write
|
||
1D96C5D5000
|
heap
|
page read and write
|
||
1D96C54A000
|
heap
|
page read and write
|
||
1E811594000
|
heap
|
page read and write
|
||
2FDD4C3C000
|
heap
|
page read and write
|
||
7FF8CB7A1000
|
unkown
|
page execute read
|
||
5786FFF000
|
stack
|
page read and write
|
||
1E810CE2000
|
heap
|
page read and write
|
||
237001F7000
|
heap
|
page read and write
|
||
237E000
|
stack
|
page read and write
|
||
1E811587000
|
heap
|
page read and write
|
||
2532CB57000
|
heap
|
page read and write
|
||
1E811586000
|
heap
|
page read and write
|
||
2259CC30000
|
heap
|
page read and write
|
||
2A84625E000
|
heap
|
page read and write
|
||
1D96C6C0000
|
remote allocation
|
page read and write
|
||
2532CA80000
|
heap
|
page read and write
|
||
1E810CEE000
|
heap
|
page read and write
|
||
7FF8CB7F9000
|
unkown
|
page readonly
|
||
1E56B700000
|
heap
|
page read and write
|
||
2A9B000
|
stack
|
page read and write
|
||
1E81158C000
|
heap
|
page read and write
|
||
178736E0000
|
heap
|
page read and write
|
||
19616A8D000
|
heap
|
page read and write
|
||
237001FB000
|
heap
|
page read and write
|
||
5CA607E000
|
stack
|
page read and write
|
||
24C82000000
|
heap
|
page read and write
|
||
2532CD50000
|
trusted library allocation
|
page read and write
|
||
1E074032000
|
heap
|
page read and write
|
||
1AD4E253000
|
heap
|
page read and write
|
||
2259CE79000
|
heap
|
page read and write
|
||
1DF30DBE000
|
heap
|
page read and write
|
||
B89ADDE000
|
stack
|
page read and write
|
||
AC97EFE000
|
stack
|
page read and write
|
||
1E074041000
|
heap
|
page read and write
|
||
225A2610000
|
trusted library allocation
|
page read and write
|
||
1E811588000
|
heap
|
page read and write
|
||
1D96C5D2000
|
heap
|
page read and write
|
||
75266AB000
|
stack
|
page read and write
|
||
1E073FE0000
|
heap
|
page read and write
|
||
19616930000
|
trusted library allocation
|
page read and write
|
||
19617300000
|
heap
|
page read and write
|
||
5721B79000
|
stack
|
page read and write
|
||
F4F000
|
heap
|
page read and write
|
||
1E811A02000
|
heap
|
page read and write
|
||
1E073F50000
|
heap
|
page read and write
|
||
24C81E70000
|
heap
|
page read and write
|
||
1E81159E000
|
heap
|
page read and write
|
||
2370022E000
|
heap
|
page read and write
|
||
225A23D0000
|
trusted library allocation
|
page read and write
|
||
1DF30D80000
|
heap
|
page read and write
|
||
BB67C7E000
|
stack
|
page read and write
|
||
1B3395D000
|
stack
|
page read and write
|
||
24FB000
|
stack
|
page read and write
|
||
225A24FE000
|
heap
|
page read and write
|
||
1E073FC0000
|
heap
|
page read and write
|
||
2259CE74000
|
heap
|
page read and write
|
||
19616BED000
|
heap
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
225A2230000
|
trusted library allocation
|
page read and write
|
||
AC980FB000
|
stack
|
page read and write
|
||
5721BFE000
|
stack
|
page read and write
|
||
1DF30D10000
|
heap
|
page read and write
|
||
19616A8A000
|
heap
|
page read and write
|
||
1E07402D000
|
heap
|
page read and write
|
||
7FF8CB7A1000
|
unkown
|
page execute read
|
||
19616AE1000
|
heap
|
page read and write
|
||
23700220000
|
heap
|
page read and write
|
||
24C81ED0000
|
heap
|
page read and write
|
||
2135E600000
|
heap
|
page read and write
|
||
2A846C02000
|
trusted library allocation
|
page read and write
|
||
237001F0000
|
heap
|
page read and write
|
||
1E074032000
|
heap
|
page read and write
|
||
19616A2E000
|
heap
|
page read and write
|
||
7526EFB000
|
stack
|
page read and write
|
||
FFAD77B000
|
stack
|
page read and write
|
||
2259CE24000
|
heap
|
page read and write
|
||
578679C000
|
stack
|
page read and write
|
||
B95A9FB000
|
stack
|
page read and write
|
||
1E810C00000
|
heap
|
page read and write
|
||
1B2D9D2B000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
178737D8000
|
heap
|
page read and write
|
||
19616A52000
|
heap
|
page read and write
|
||
1E074029000
|
heap
|
page read and write
|
||
225A2710000
|
trusted library allocation
|
page read and write
|
||
1E811592000
|
heap
|
page read and write
|
||
178737E5000
|
heap
|
page read and write
|
||
225A2400000
|
heap
|
page read and write
|
||
1E8115D5000
|
heap
|
page read and write
|
||
1E810C13000
|
heap
|
page read and write
|
||
19616A79000
|
heap
|
page read and write
|
||
1E811588000
|
heap
|
page read and write
|
||
225A2608000
|
trusted library allocation
|
page read and write
|
||
2259CD40000
|
trusted library section
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
24C82013000
|
heap
|
page read and write
|
||
1E810BF0000
|
remote allocation
|
page read and write
|
||
225A2600000
|
trusted library allocation
|
page read and write
|
||
1E811500000
|
heap
|
page read and write
|
||
1D96C480000
|
heap
|
page read and write
|
||
1E56B705000
|
heap
|
page read and write
|
||
7FF8CB7A0000
|
unkown
|
page readonly
|
||
2532CAF0000
|
heap
|
page read and write
|
||
1E810C3C000
|
heap
|
page read and write
|
||
1E077B40000
|
heap
|
page read and write
|
||
1E811594000
|
heap
|
page read and write
|
||
31EF77A000
|
stack
|
page read and write
|
||
1E811588000
|
heap
|
page read and write
|
||
1E56B439000
|
heap
|
page read and write
|
||
2A8460D0000
|
heap
|
page read and write
|
||
1D96C5D5000
|
heap
|
page read and write
|
||
40792FB000
|
stack
|
page read and write
|
||
2FDD4BB0000
|
trusted library allocation
|
page read and write
|
||
AC5147F000
|
stack
|
page read and write
|
||
2259CE76000
|
heap
|
page read and write
|
||
2259D5E0000
|
trusted library section
|
page readonly
|
||
1D96C815000
|
heap
|
page read and write
|
||
7FF8CB7F6000
|
unkown
|
page read and write
|
||
225A24FA000
|
heap
|
page read and write
|
||
BE9AEFF000
|
stack
|
page read and write
|
||
B95ACFF000
|
stack
|
page read and write
|
||
FA1000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
23700160000
|
heap
|
page read and write
|
||
2532CB5F000
|
heap
|
page read and write
|
||
31EFBFE000
|
stack
|
page read and write
|
||
1E074305000
|
heap
|
page read and write
|
||
AC50F85000
|
stack
|
page read and write
|
||
2532CB5F000
|
heap
|
page read and write
|
||
19616BF5000
|
heap
|
page read and write
|
||
2259D759000
|
heap
|
page read and write
|
||
24C8203C000
|
heap
|
page read and write
|
||
1AD4E110000
|
heap
|
page read and write
|
||
2A846170000
|
trusted library allocation
|
page read and write
|
||
FFAD1CB000
|
stack
|
page read and write
|
||
1D96C6F1000
|
heap
|
page read and write
|
||
2532CDA5000
|
heap
|
page read and write
|
||
1E81158E000
|
heap
|
page read and write
|
||
1DF30DA4000
|
heap
|
page read and write
|
||
2FDD4C53000
|
heap
|
page read and write
|
||
23FF000
|
stack
|
page read and write
|
||
23700100000
|
heap
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
2259CEA2000
|
heap
|
page read and write
|
||
2FDD4C48000
|
heap
|
page read and write
|
||
19616BFD000
|
heap
|
page read and write
|
||
5786EFF000
|
stack
|
page read and write
|
||
5CA617E000
|
stack
|
page read and write
|
||
B89B0FE000
|
stack
|
page read and write
|
||
225A24A1000
|
heap
|
page read and write
|
||
225A2730000
|
remote allocation
|
page read and write
|
||
BB67B7F000
|
stack
|
page read and write
|
||
1E810D02000
|
heap
|
page read and write
|
||
19616AFC000
|
heap
|
page read and write
|
||
BE9AF7F000
|
stack
|
page read and write
|
||
1E811A02000
|
heap
|
page read and write
|
||
2532D8F0000
|
trusted library allocation
|
page read and write
|
||
2FDD4D02000
|
heap
|
page read and write
|
||
B95A4FB000
|
stack
|
page read and write
|
||
1D96C526000
|
heap
|
page read and write
|
||
1E00000
|
heap
|
page read and write
|
||
B89B1FD000
|
stack
|
page read and write
|
||
2135E6C0000
|
heap
|
page read and write
|
||
1E811A02000
|
heap
|
page read and write
|
||
1D96C6F0000
|
heap
|
page read and write
|
||
2A846202000
|
heap
|
page read and write
|
||
7FF8CB7A1000
|
unkown
|
page execute read
|
||
1E81159A000
|
heap
|
page read and write
|
||
19616980000
|
trusted library allocation
|
page read and write
|
||
31EFC7E000
|
stack
|
page read and write
|
||
BE9B0FF000
|
stack
|
page read and write
|
||
2532CD60000
|
trusted library allocation
|
page read and write
|
||
1E811A02000
|
heap
|
page read and write
|
||
2135E6C5000
|
heap
|
page read and write
|
||
1E810CF8000
|
heap
|
page read and write
|
||
2135FF00000
|
heap
|
page read and write
|
||
2FDD4D00000
|
heap
|
page read and write
|
||
1E8115AB000
|
heap
|
page read and write
|
||
7FF8CB7F2000
|
unkown
|
page readonly
|
||
19616A3C000
|
heap
|
page read and write
|
||
225A24F2000
|
heap
|
page read and write
|
||
19617B0A000
|
heap
|
page read and write
|
||
247E000
|
stack
|
page read and write
|
||
31F017E000
|
stack
|
page read and write
|
||
225A26A0000
|
trusted library allocation
|
page read and write
|
||
23700190000
|
heap
|
page readonly
|
||
1E811584000
|
heap
|
page read and write
|
||
1961736E000
|
heap
|
page read and write
|
||
1D96C6C0000
|
remote allocation
|
page read and write
|
||
19617B00000
|
heap
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
24C82063000
|
heap
|
page read and write
|
||
F5B000
|
heap
|
page read and write
|
||
237001A5000
|
heap
|
page read and write
|
||
1E074056000
|
heap
|
page read and write
|
||
2259CEAF000
|
heap
|
page read and write
|
||
1AD4E200000
|
heap
|
page read and write
|
||
1E07402E000
|
heap
|
page read and write
|
||
AC512FF000
|
stack
|
page read and write
|
||
213600F0000
|
heap
|
page read and write
|
||
24C82113000
|
heap
|
page read and write
|
||
1E810C6C000
|
heap
|
page read and write
|
||
AC9847F000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1E810D16000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
FFAD877000
|
stack
|
page read and write
|
||
1E810C84000
|
heap
|
page read and write
|
||
AC9817E000
|
stack
|
page read and write
|
||
1DF30D97000
|
heap
|
page read and write
|
||
24C82077000
|
heap
|
page read and write
|
||
2259D5B0000
|
trusted library section
|
page readonly
|
||
B288377000
|
stack
|
page read and write
|
||
7526FFB000
|
stack
|
page read and write
|
||
225A23E0000
|
trusted library allocation
|
page read and write
|
||
19616A45000
|
heap
|
page read and write
|
||
1E81159A000
|
heap
|
page read and write
|
||
1E074018000
|
heap
|
page read and write
|
||
1D96C513000
|
heap
|
page read and write
|
||
1E811586000
|
heap
|
page read and write
|
||
1D96C54D000
|
heap
|
page read and write
|
||
2135E438000
|
heap
|
page read and write
|
||
225A24DD000
|
heap
|
page read and write
|
||
19617A02000
|
heap
|
page read and write
|
||
23700220000
|
heap
|
page read and write
|
||
B95ABFF000
|
stack
|
page read and write
|
||
2B30000
|
remote allocation
|
page read and write
|
||
EA5000
|
heap
|
page read and write
|
||
1D96C54A000
|
heap
|
page read and write
|
||
1D96C5CB000
|
heap
|
page read and write
|
||
2A846308000
|
heap
|
page read and write
|
||
1E81159A000
|
heap
|
page read and write
|
||
19616AD6000
|
heap
|
page read and write
|
||
31EFA7C000
|
stack
|
page read and write
|
||
752672F000
|
stack
|
page read and write
|
||
4D4000
|
heap
|
page read and write
|
||
1D96C4E0000
|
heap
|
page read and write
|
||
7FF8CB7A0000
|
unkown
|
page readonly
|
||
B28807B000
|
stack
|
page read and write
|
||
2259CF02000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
225A244C000
|
heap
|
page read and write
|
||
2FDD4C6F000
|
heap
|
page read and write
|
||
2FDD4C13000
|
heap
|
page read and write
|
||
1AD4E100000
|
heap
|
page read and write
|
||
1E811A02000
|
heap
|
page read and write
|
||
2135E430000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
2532DB40000
|
trusted library allocation
|
page read and write
|
||
2A846289000
|
heap
|
page read and write
|
||
2135E6A0000
|
heap
|
page readonly
|
||
1E56B418000
|
heap
|
page read and write
|
||
5CA60FE000
|
stack
|
page read and write
|
||
302E000
|
stack
|
page read and write
|
||
2FDD4C4E000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
1D96C526000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
7FF8CB7F2000
|
unkown
|
page readonly
|
||
18002E000
|
direct allocation
|
page read and write
|
||
2259D5A0000
|
trusted library section
|
page readonly
|
||
225A249F000
|
heap
|
page read and write
|
||
19616ACB000
|
heap
|
page read and write
|
||
1DF30DC6000
|
heap
|
page read and write
|
||
225A2614000
|
trusted library allocation
|
page read and write
|
||
2532CCE0000
|
heap
|
page read and write
|
||
1E8115AB000
|
heap
|
page read and write
|
||
1AD4E228000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
1E8F000
|
stack
|
page read and write
|
||
EB0000
|
heap
|
page readonly
|
||
B28847F000
|
stack
|
page read and write
|
||
237001A0000
|
heap
|
page read and write
|
||
23701B80000
|
heap
|
page read and write
|
||
1D96C532000
|
heap
|
page read and write
|
||
2A846259000
|
heap
|
page read and write
|
||
BC0000
|
remote allocation
|
page read and write
|
||
1D96C3F0000
|
heap
|
page read and write
|
||
1E811586000
|
heap
|
page read and write
|
||
2FDD4C89000
|
heap
|
page read and write
|
||
24C82067000
|
heap
|
page read and write
|
||
225A2730000
|
remote allocation
|
page read and write
|
||
1E810BF0000
|
remote allocation
|
page read and write
|
||
AC5127F000
|
stack
|
page read and write
|
||
19617A02000
|
heap
|
page read and write
|
||
1D96C5CB000
|
heap
|
page read and write
|
||
2532CA90000
|
trusted library allocation
|
page read and write
|
||
19616A97000
|
heap
|
page read and write
|
||
2259CF13000
|
heap
|
page read and write
|
||
AC97E7E000
|
stack
|
page read and write
|
||
19616AD3000
|
heap
|
page read and write
|
||
1E81156D000
|
heap
|
page read and write
|
||
2B30000
|
remote allocation
|
page read and write
|
||
1E810C46000
|
heap
|
page read and write
|
||
19616AAC000
|
heap
|
page read and write
|
||
1E810CB4000
|
heap
|
page read and write
|
||
1E811590000
|
heap
|
page read and write
|
||
F2D000
|
heap
|
page read and write
|
||
1E81159A000
|
heap
|
page read and write
|
||
2259D602000
|
heap
|
page read and write
|
||
31EFB7B000
|
stack
|
page read and write
|
||
19616A80000
|
heap
|
page read and write
|
||
225A22B0000
|
trusted library allocation
|
page read and write
|
||
1E811A00000
|
heap
|
page read and write
|
||
2135E660000
|
direct allocation
|
page execute and read and write
|
||
2532CB5F000
|
heap
|
page read and write
|
||
1E811511000
|
heap
|
page read and write
|
||
1B2D9C20000
|
heap
|
page read and write
|
||
1E811513000
|
heap
|
page read and write
|
||
1D96C6C0000
|
remote allocation
|
page read and write
|
||
1E074220000
|
heap
|
page read and write
|
||
2FDD4C2C000
|
heap
|
page read and write
|
||
1D96C532000
|
heap
|
page read and write
|
||
1E811584000
|
heap
|
page read and write
|
||
F9F000
|
heap
|
page read and write
|
||
2FDD4A50000
|
heap
|
page read and write
|
||
1E81158B000
|
heap
|
page read and write
|
||
B287E7B000
|
stack
|
page read and write
|
||
2259D700000
|
heap
|
page read and write
|
||
2532DB90000
|
trusted library allocation
|
page read and write
|
||
1D96C516000
|
heap
|
page read and write
|
||
7526DFE000
|
stack
|
page read and write
|
||
1E810C79000
|
heap
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
5CA5D06000
|
stack
|
page read and write
|
||
31EFD7F000
|
stack
|
page read and write
|
||
FFAD97E000
|
stack
|
page read and write
|
||
1B2D9CB0000
|
heap
|
page read and write
|
||
24C82802000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
1E810C29000
|
heap
|
page read and write
|
||
1E811A02000
|
heap
|
page read and write
|
||
19617333000
|
heap
|
page read and write
|
||
7FF8CB7A0000
|
unkown
|
page readonly
|
||
7FF8CB7F2000
|
unkown
|
page readonly
|
||
19616A63000
|
heap
|
page read and write
|
||
19616BBF000
|
heap
|
page read and write
|
||
1AD4E170000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
225A26E0000
|
trusted library allocation
|
page read and write
|
||
225A2500000
|
heap
|
page read and write
|
||
B89B07E000
|
stack
|
page read and write
|
||
225A24AC000
|
heap
|
page read and write
|
||
2259CE5A000
|
heap
|
page read and write
|
||
225A2463000
|
heap
|
page read and write
|
||
1D96C552000
|
heap
|
page read and write
|
||
2A846140000
|
heap
|
page read and write
|
||
1DF30D92000
|
heap
|
page read and write
|
||
1DEF000
|
stack
|
page read and write
|
||
1F2C000
|
stack
|
page read and write
|
||
225A2502000
|
heap
|
page read and write
|
||
BB67BFF000
|
stack
|
page read and write
|
||
1D96C56D000
|
heap
|
page read and write
|
||
1DF30DA2000
|
heap
|
page read and write
|
||
1DF30D8B000
|
heap
|
page read and write
|
||
19616A86000
|
heap
|
page read and write
|
||
31EF97E000
|
stack
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
1E074056000
|
heap
|
page read and write
|
||
24C81E60000
|
heap
|
page read and write
|
||
1AD4E300000
|
heap
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
1D96C520000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
19616830000
|
heap
|
page read and write
|
||
2259CE8C000
|
heap
|
page read and write
|
||
EFA000
|
heap
|
page read and write
|
||
1DF30DC5000
|
heap
|
page read and write
|
||
24C82029000
|
heap
|
page read and write
|
||
7526AFF000
|
stack
|
page read and write
|
||
1E074010000
|
heap
|
page read and write
|
||
1E811590000
|
heap
|
page read and write
|
||
2A846302000
|
heap
|
page read and write
|
||
19617A43000
|
heap
|
page read and write
|
||
BE9AFFF000
|
stack
|
page read and write
|
||
23700180000
|
direct allocation
|
page execute and read and write
|
||
B288277000
|
stack
|
page read and write
|
||
1D96C50C000
|
heap
|
page read and write
|
||
1D96C5CB000
|
heap
|
page read and write
|
||
B89B27C000
|
stack
|
page read and write
|
||
23701C74000
|
heap
|
page read and write
|
||
AC97BEB000
|
stack
|
page read and write
|
||
40793FE000
|
stack
|
page read and write
|
||
2259D615000
|
heap
|
page read and write
|
||
B95AAF7000
|
stack
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
1E811590000
|
heap
|
page read and write
|
||
225A2420000
|
heap
|
page read and write
|
||
19616A95000
|
heap
|
page read and write
|
||
1E81158B000
|
heap
|
page read and write
|
||
1E810BF0000
|
remote allocation
|
page read and write
|
||
2A84625D000
|
heap
|
page read and write
|
||
1DF30D96000
|
heap
|
page read and write
|
||
1E8115DB000
|
heap
|
page read and write
|
||
31EF87A000
|
stack
|
page read and write
|
||
1E811588000
|
heap
|
page read and write
|
||
2A846229000
|
heap
|
page read and write
|
There are 725 hidden memdumps, click here to show them.