Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
S0Uj3iEhau.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_S0U_624f1bf42cf3970c0bbbc2316f5a353e1dba16_e01ee71e_0afa0dae\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2B3.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER409.tmp.csv
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER65C.tmp.txt
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREE20.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sat May 14 12:14:58 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF620.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\S0Uj3iEhau.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\S0Uj3iEhau.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\S0Uj3iEhau.dll,DllRegisterServer
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\S0Uj3iEhau.dll,DllUnregisterServer
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\LBQDVFLViUyJtRNx\yIKZtRHMJ.dll"
|
||
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\S0Uj3iEhau.dll"
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\S0Uj3iEhau.dll",#1
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k WerSvcGroup
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -pss -s 468 -p 7136 -ip 7136
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 7136 -s 352
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
There are 5 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://23.239.0.12/S
|
unknown
|
||
https://23.239.0.12/
|
23.239.0.12
|
||
https://23.239.0.12/G
|
unknown
|
||
https://www.disneyplus.com/legal/your-california-privacy-rights
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://www.disneyplus.com/legal/privacy-policy
|
unknown
|
||
https://www.tiktok.com/legal/report/feedback
|
unknown
|
||
http://help.disneyplus.com.
|
unknown
|
||
https://support.hotspotshield.com/
|
unknown
|
||
https://www.hotspotshield.com/terms/
|
unknown
|
||
https://www.pango.co/privacy
|
unknown
|
||
https://disneyplus.com/legal.
|
unknown
|
There are 2 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
23.239.0.12
|
unknown
|
United States
|
||
192.168.2.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProgramId
|
||
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
FileId
|
||
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LowerCaseLongPath
|
||
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LongPathHash
|
||
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Name
|
||
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Publisher
|
||
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Version
|
||
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinFileVersion
|
||
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinaryType
|
||
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProductName
|
||
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProductVersion
|
||
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LinkDate
|
||
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinProductVersion
|
||
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Size
|
||
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Language
|
||
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
IsPeFile
|
||
\REGISTRY\A\{3f084f02-6e1c-1d5f-b521-ee07db0bc82b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
IsOsComponent
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
001840064172BCE4
|
There are 12 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
180001000
|
direct allocation
|
page execute read
|
||
2200000
|
direct allocation
|
page execute and read and write
|
||
1B259EF0000
|
direct allocation
|
page execute and read and write
|
||
1CB19B40000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
19190A20000
|
direct allocation
|
page execute and read and write
|
||
BD0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
1B259EF0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
1B259EF0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
7FFF30829000
|
unkown
|
page readonly
|
||
1E455419000
|
heap
|
page read and write
|
||
228F0350000
|
heap
|
page read and write
|
||
1B258540000
|
heap
|
page read and write
|
||
1E7C6E0D000
|
unkown
|
page read and write
|
||
14F78D80000
|
trusted library allocation
|
page read and write
|
||
B0A000
|
heap
|
page read and write
|
||
23FF7588000
|
heap
|
page read and write
|
||
B869BFF000
|
stack
|
page read and write
|
||
1E454F8B000
|
heap
|
page read and write
|
||
228F046D000
|
heap
|
page read and write
|
||
8DD2476000
|
stack
|
page read and write
|
||
A4A99FF000
|
stack
|
page read and write
|
||
6E106FB000
|
stack
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
1E9E8862000
|
heap
|
page read and write
|
||
1E9E8850000
|
heap
|
page read and write
|
||
7FFF307D1000
|
unkown
|
page execute read
|
||
1E454F9E000
|
heap
|
page read and write
|
||
1E454FBC000
|
heap
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
14F78F02000
|
heap
|
page read and write
|
||
1E9E8780000
|
heap
|
page read and write
|
||
1E7C6E13000
|
unkown
|
page read and write
|
||
1E454F8C000
|
heap
|
page read and write
|
||
228F0450000
|
heap
|
page read and write
|
||
1E454F86000
|
heap
|
page read and write
|
||
1E454F8F000
|
heap
|
page read and write
|
||
7FFF30826000
|
unkown
|
page read and write
|
||
1E9E8710000
|
heap
|
page read and write
|
||
14DB127F000
|
heap
|
page read and write
|
||
1E454FBB000
|
heap
|
page read and write
|
||
A8C38FE000
|
stack
|
page read and write
|
||
1E9E89F0000
|
trusted library allocation
|
page read and write
|
||
228F0360000
|
heap
|
page read and write
|
||
14F78C80000
|
heap
|
page read and write
|
||
1D9381D5000
|
heap
|
page read and write
|
||
1E454FB1000
|
heap
|
page read and write
|
||
8DD257F000
|
stack
|
page read and write
|
||
1E454FCC000
|
heap
|
page read and write
|
||
1B25A190000
|
heap
|
page read and write
|
||
1AB84E4E000
|
heap
|
page read and write
|
||
1B25858B000
|
heap
|
page read and write
|
||
1E454F9C000
|
heap
|
page read and write
|
||
1D938202000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
14F78F00000
|
heap
|
page read and write
|
||
1E454FC2000
|
heap
|
page read and write
|
||
1E454420000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
14F78E13000
|
heap
|
page read and write
|
||
1B25A040000
|
remote allocation
|
page read and write
|
||
B0A000
|
heap
|
page read and write
|
||
14037F8000
|
stack
|
page read and write
|
||
14DB1C02000
|
trusted library allocation
|
page read and write
|
||
1E454613000
|
heap
|
page read and write
|
||
1B25A040000
|
remote allocation
|
page read and write
|
||
1E454F7F000
|
heap
|
page read and write
|
||
1E454F93000
|
heap
|
page read and write
|
||
1E454FAE000
|
heap
|
page read and write
|
||
1E45463C000
|
heap
|
page read and write
|
||
1D938211000
|
heap
|
page read and write
|
||
1D9381D0000
|
heap
|
page read and write
|
||
1E454F7A000
|
heap
|
page read and write
|
||
1B25A004000
|
heap
|
page read and write
|
||
14030FE000
|
stack
|
page read and write
|
||
1E454F78000
|
heap
|
page read and write
|
||
1CB18240000
|
heap
|
page read and write
|
||
228F0429000
|
heap
|
page read and write
|
||
228F0513000
|
heap
|
page read and write
|
||
1E9E9600000
|
trusted library allocation
|
page read and write
|
||
B0A000
|
heap
|
page read and write
|
||
7FFF307D0000
|
unkown
|
page readonly
|
||
14032F7000
|
stack
|
page read and write
|
||
7FFF307D0000
|
unkown
|
page readonly
|
||
1E454F7C000
|
heap
|
page read and write
|
||
1E454FCC000
|
heap
|
page read and write
|
||
19190731000
|
heap
|
page read and write
|
||
228F03C0000
|
heap
|
page read and write
|
||
1B2584F5000
|
heap
|
page read and write
|
||
1E7C6F00000
|
trusted library allocation
|
page read and write
|
||
1B2584C0000
|
heap
|
page read and write
|
||
1E7C6F02000
|
trusted library allocation
|
page read and write
|
||
1E9E8B10000
|
trusted library allocation
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
1B25A004000
|
heap
|
page read and write
|
||
6E1047F000
|
stack
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
191921F0000
|
heap
|
page read and write
|
||
228F043C000
|
heap
|
page read and write
|
||
1E454F76000
|
heap
|
page read and write
|
||
2610000
|
remote allocation
|
page read and write
|
||
228F0500000
|
heap
|
page read and write
|
||
14DB1300000
|
heap
|
page read and write
|
||
B5B000
|
heap
|
page read and write
|
||
AFC000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1E454F94000
|
heap
|
page read and write
|
||
191906C0000
|
heap
|
page read and write
|
||
A4A9DFE000
|
stack
|
page read and write
|
||
1E454F9F000
|
heap
|
page read and write
|
||
1B258450000
|
unkown
|
page read and write
|
||
9AD27F000
|
stack
|
page read and write
|
||
1E4546F7000
|
heap
|
page read and write
|
||
A4A9C7F000
|
stack
|
page read and write
|
||
1D938225000
|
heap
|
page read and write
|
||
1E454F86000
|
heap
|
page read and write
|
||
1AB84E56000
|
heap
|
page read and write
|
||
1AB84F00000
|
heap
|
page read and write
|
||
1E455402000
|
heap
|
page read and write
|
||
8DD2476000
|
stack
|
page read and write
|
||
1E454FC3000
|
heap
|
page read and write
|
||
1B2584F0000
|
heap
|
page read and write
|
||
1E455422000
|
heap
|
page read and write
|
||
1E454F7B000
|
heap
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
1AB84E8B000
|
heap
|
page read and write
|
||
1E454F93000
|
heap
|
page read and write
|
||
1E454F8A000
|
heap
|
page read and write
|
||
228F046A000
|
heap
|
page read and write
|
||
1E454F0D000
|
heap
|
page read and write
|
||
1AB84CC0000
|
heap
|
page read and write
|
||
1AB84F08000
|
heap
|
page read and write
|
||
1E9E8825000
|
heap
|
page read and write
|
||
C1181EC000
|
stack
|
page read and write
|
||
2DEA4FF000
|
stack
|
page read and write
|
||
28BF000
|
stack
|
page read and write
|
||
19190752000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
2B6E000
|
stack
|
page read and write
|
||
23DFFE000
|
stack
|
page read and write
|
||
1E454F8C000
|
heap
|
page read and write
|
||
19192070000
|
heap
|
page readonly
|
||
1E454F9E000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
1B25A190000
|
heap
|
page read and write
|
||
1E454FA9000
|
heap
|
page read and write
|
||
1E454FAC000
|
heap
|
page read and write
|
||
1E454629000
|
heap
|
page read and write
|
||
1AB84E73000
|
heap
|
page read and write
|
||
972000
|
heap
|
page read and write
|
||
C1184FE000
|
stack
|
page read and write
|
||
1AB84C60000
|
heap
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
1E454FAC000
|
heap
|
page read and write
|
||
1E7C6E02000
|
unkown
|
page read and write
|
||
1CB18525000
|
heap
|
page read and write
|
||
B28000
|
heap
|
page read and write
|
||
1E455402000
|
heap
|
page read and write
|
||
1E7C7100000
|
heap
|
page read and write
|
||
7FFF30822000
|
unkown
|
page readonly
|
||
1E454681000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
1E9E8875000
|
heap
|
page read and write
|
||
7FFF30829000
|
unkown
|
page readonly
|
||
1E454665000
|
heap
|
page read and write
|
||
AFC000
|
heap
|
page read and write
|
||
1B258500000
|
heap
|
page read and write
|
||
1E7C7002000
|
heap
|
page read and write
|
||
1E454F86000
|
heap
|
page read and write
|
||
1E454F87000
|
heap
|
page read and write
|
||
1E454FA0000
|
heap
|
page read and write
|
||
B90000
|
direct allocation
|
page execute and read and write
|
||
A4A9D7E000
|
stack
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
1E454F84000
|
heap
|
page read and write
|
||
1B2584F0000
|
heap
|
page read and write
|
||
8DD257F000
|
stack
|
page read and write
|
||
7FFF30829000
|
unkown
|
page readonly
|
||
1E454F78000
|
heap
|
page read and write
|
||
1E454F58000
|
heap
|
page read and write
|
||
2610000
|
remote allocation
|
page read and write
|
||
1E9E8A50000
|
trusted library allocation
|
page read and write
|
||
228F03F0000
|
trusted library allocation
|
page read and write
|
||
7FFF30822000
|
unkown
|
page readonly
|
||
1E454F9E000
|
heap
|
page read and write
|
||
228F048D000
|
heap
|
page read and write
|
||
1E454F72000
|
heap
|
page read and write
|
||
228F0E02000
|
trusted library allocation
|
page read and write
|
||
6E104FF000
|
stack
|
page read and write
|
||
14DB1308000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1B258580000
|
heap
|
page read and write
|
||
1E9E87A0000
|
heap
|
page read and write
|
||
1E4545F0000
|
remote allocation
|
page read and write
|
||
1B25858B000
|
heap
|
page read and write
|
||
23DA7B000
|
stack
|
page read and write
|
||
1E9E8720000
|
trusted library allocation
|
page read and write
|
||
6F4000
|
stack
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
1E454F8C000
|
heap
|
page read and write
|
||
B8697FA000
|
stack
|
page read and write
|
||
A8C34CD000
|
stack
|
page read and write
|
||
1E454716000
|
heap
|
page read and write
|
||
14DB1313000
|
heap
|
page read and write
|
||
1E7C6E00000
|
unkown
|
page read and write
|
||
1B258560000
|
direct allocation
|
page execute and read and write
|
||
14DB1253000
|
heap
|
page read and write
|
||
27BE000
|
stack
|
page read and write
|
||
1B258570000
|
heap
|
page readonly
|
||
1402DFB000
|
stack
|
page read and write
|
||
1E455402000
|
heap
|
page read and write
|
||
19190690000
|
heap
|
page read and write
|
||
1E454F77000
|
heap
|
page read and write
|
||
1D9381F7000
|
heap
|
page read and write
|
||
14F78E00000
|
heap
|
page read and write
|
||
1E455403000
|
heap
|
page read and write
|
||
9AC9FB000
|
stack
|
page read and write
|
||
191906B0000
|
direct allocation
|
page execute and read and write
|
||
1E9E8AA0000
|
heap
|
page readonly
|
||
A98000
|
heap
|
page read and write
|
||
1E4546D7000
|
heap
|
page read and write
|
||
1AB84E4C000
|
heap
|
page read and write
|
||
1CB18290000
|
heap
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
14DB124D000
|
heap
|
page read and write
|
||
1E454F5C000
|
heap
|
page read and write
|
||
86F8279000
|
stack
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
1B25A000000
|
heap
|
page read and write
|
||
9AD37E000
|
stack
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
1E454FD8000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1E4546B3000
|
heap
|
page read and write
|
||
1E4545F0000
|
remote allocation
|
page read and write
|
||
1E9E8B00000
|
heap
|
page read and write
|
||
86F81F9000
|
stack
|
page read and write
|
||
2A6B000
|
stack
|
page read and write
|
||
1E454F00000
|
heap
|
page read and write
|
||
238F000
|
stack
|
page read and write
|
||
228F0402000
|
heap
|
page read and write
|
||
1AB84E70000
|
heap
|
page read and write
|
||
7FFF30826000
|
unkown
|
page read and write
|
||
7FFF307D1000
|
unkown
|
page execute read
|
||
1E45466B000
|
heap
|
page read and write
|
||
14033F7000
|
stack
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
AE5000
|
heap
|
page read and write
|
||
1E454713000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
1D93820F000
|
heap
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1E454F9F000
|
heap
|
page read and write
|
||
1E454FB0000
|
heap
|
page read and write
|
||
23E0FF000
|
stack
|
page read and write
|
||
1B258570000
|
heap
|
page readonly
|
||
C85000
|
heap
|
page read and write
|
||
1D938220000
|
heap
|
page read and write
|
||
1D93820F000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
2C6F000
|
stack
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
1AB85602000
|
trusted library allocation
|
page read and write
|
||
1E455418000
|
heap
|
page read and write
|
||
1D9381F7000
|
heap
|
page read and write
|
||
1D9381E0000
|
heap
|
page read and write
|
||
23DDFB000
|
stack
|
page read and write
|
||
6E105FC000
|
stack
|
page read and write
|
||
B869C7F000
|
stack
|
page read and write
|
||
1E454F8C000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
1E454FB3000
|
heap
|
page read and write
|
||
1E454F50000
|
heap
|
page read and write
|
||
720000
|
remote allocation
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
14DB1229000
|
heap
|
page read and write
|
||
1E9E8AC0000
|
trusted library allocation
|
page read and write
|
||
1E7C6E66000
|
heap
|
page read and write
|
||
228F0413000
|
heap
|
page read and write
|
||
9AD17D000
|
stack
|
page read and write
|
||
1B258580000
|
heap
|
page read and write
|
||
C11847E000
|
stack
|
page read and write
|
||
6E101D6000
|
stack
|
page read and write
|
||
1E454F80000
|
heap
|
page read and write
|
||
7FFF307D1000
|
unkown
|
page execute read
|
||
1E454FBE000
|
heap
|
page read and write
|
||
1E454F7E000
|
heap
|
page read and write
|
||
B28000
|
heap
|
page read and write
|
||
1E455402000
|
heap
|
page read and write
|
||
191905B0000
|
heap
|
page read and write
|
||
2300000
|
heap
|
page read and write
|
||
1E454F8B000
|
heap
|
page read and write
|
||
1B258540000
|
heap
|
page read and write
|
||
1E454F9F000
|
heap
|
page read and write
|
||
1E9E8850000
|
heap
|
page read and write
|
||
1B258500000
|
heap
|
page read and write
|
||
BE5000
|
heap
|
page read and write
|
||
228F0449000
|
heap
|
page read and write
|
||
1D938180000
|
heap
|
page read and write
|
||
1D938204000
|
heap
|
page read and write
|
||
228F0502000
|
heap
|
page read and write
|
||
23DEF7000
|
stack
|
page read and write
|
||
1E454FAE000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
1919071E000
|
heap
|
page read and write
|
||
1AB84C50000
|
heap
|
page read and write
|
||
1B2584C0000
|
heap
|
page read and write
|
||
1E454FA2000
|
heap
|
page read and write
|
||
C1186FB000
|
stack
|
page read and write
|
||
C1187F7000
|
stack
|
page read and write
|
||
B0A000
|
heap
|
page read and write
|
||
14DB128D000
|
heap
|
page read and write
|
||
1E9E8807000
|
heap
|
page read and write
|
||
1E45465E000
|
heap
|
page read and write
|
||
7FFF30826000
|
unkown
|
page read and write
|
||
C1185FC000
|
stack
|
page read and write
|
||
7FFF307D0000
|
unkown
|
page readonly
|
||
7FFF30829000
|
unkown
|
page readonly
|
||
1E455402000
|
heap
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
23DAFE000
|
stack
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
14DB1200000
|
heap
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
1E454E02000
|
heap
|
page read and write
|
||
B25000
|
heap
|
page read and write
|
||
1E454F86000
|
heap
|
page read and write
|
||
1B258570000
|
heap
|
page readonly
|
||
1E454F9E000
|
heap
|
page read and write
|
||
1B258580000
|
heap
|
page read and write
|
||
1E455400000
|
heap
|
page read and write
|
||
2DEA3FE000
|
stack
|
page read and write
|
||
23FF7595000
|
heap
|
page read and write
|
||
1E454F84000
|
heap
|
page read and write
|
||
1919074C000
|
heap
|
page read and write
|
||
1E454661000
|
heap
|
page read and write
|
||
1CB18298000
|
heap
|
page read and write
|
||
B5B000
|
heap
|
page read and write
|
||
1D938206000
|
heap
|
page read and write
|
||
1AB84E52000
|
heap
|
page read and write
|
||
1AB84E27000
|
heap
|
page read and write
|
||
24B0000
|
trusted library allocation
|
page read and write
|
||
1E454F78000
|
heap
|
page read and write
|
||
1E45465C000
|
heap
|
page read and write
|
||
2DEA1FB000
|
stack
|
page read and write
|
||
BA0000
|
heap
|
page readonly
|
||
9ACC7F000
|
stack
|
page read and write
|
||
1E455402000
|
heap
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
1E454F19000
|
heap
|
page read and write
|
||
B1F000
|
heap
|
page read and write
|
||
1D938211000
|
heap
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
1E454F7A000
|
heap
|
page read and write
|
||
19190A50000
|
heap
|
page read and write
|
||
1E7C6E37000
|
heap
|
page read and write
|
||
1E9E8848000
|
heap
|
page read and write
|
||
8DD24FF000
|
stack
|
page read and write
|
||
7FFF30829000
|
unkown
|
page readonly
|
||
2C70000
|
heap
|
page read and write
|
||
1E455402000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
14F78E3D000
|
heap
|
page read and write
|
||
1E454F70000
|
heap
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
14DB1202000
|
heap
|
page read and write
|
||
1B25A000000
|
heap
|
page read and write
|
||
C11897E000
|
stack
|
page read and write
|
||
24B0000
|
trusted library allocation
|
page read and write
|
||
A4A9E7B000
|
stack
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
1D938160000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
720000
|
remote allocation
|
page read and write
|
||
1E454708000
|
heap
|
page read and write
|
||
1D938211000
|
heap
|
page read and write
|
||
1E454F9D000
|
heap
|
page read and write
|
||
1E9E8AB0000
|
trusted library allocation
|
page read and write
|
||
1CB182E3000
|
heap
|
page read and write
|
||
1E45466A000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
1919070D000
|
heap
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
7FFF30822000
|
unkown
|
page readonly
|
||
1B258450000
|
heap
|
page read and write
|
||
86F8379000
|
stack
|
page read and write
|
||
283E000
|
stack
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
29EE000
|
stack
|
page read and write
|
||
14F78E28000
|
heap
|
page read and write
|
||
1E454F8B000
|
heap
|
page read and write
|
||
918000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
14DB1170000
|
heap
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
7FFF30822000
|
unkown
|
page readonly
|
||
7FFF30826000
|
unkown
|
page read and write
|
||
1B258500000
|
heap
|
page read and write
|
||
1E454F86000
|
heap
|
page read and write
|
||
1CB182EC000
|
heap
|
page read and write
|
||
1E454F7B000
|
heap
|
page read and write
|
||
7FFF30826000
|
unkown
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
14036FF000
|
unkown
|
page read and write
|
||
14F79602000
|
trusted library allocation
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
23FF7580000
|
heap
|
page read and write
|
||
1B258540000
|
heap
|
page read and write
|
||
1E9E8800000
|
heap
|
page read and write
|
||
1E7C6F15000
|
trusted library allocation
|
page read and write
|
||
1CB18260000
|
direct allocation
|
page execute and read and write
|
||
1CB19CD0000
|
heap
|
page read and write
|
||
252F000
|
stack
|
page read and write
|
||
1CB181D0000
|
heap
|
page read and write
|
||
1E7C6BE0000
|
trusted library allocation
|
page read and write
|
||
19190620000
|
heap
|
page read and write
|
||
140307E000
|
stack
|
page read and write
|
||
B869CFC000
|
stack
|
page read and write
|
||
1E455418000
|
heap
|
page read and write
|
||
1E4546E9000
|
heap
|
page read and write
|
||
9ACCFE000
|
stack
|
page read and write
|
||
1D93820F000
|
heap
|
page read and write
|
||
1B25858B000
|
heap
|
page read and write
|
||
8DD24FF000
|
stack
|
page read and write
|
||
14DB123C000
|
heap
|
page read and write
|
||
1E9E8842000
|
heap
|
page read and write
|
||
B1F000
|
heap
|
page read and write
|
||
1E454681000
|
heap
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
1E454688000
|
heap
|
page read and write
|
||
1D9381F2000
|
heap
|
page read and write
|
||
A4A9CFE000
|
stack
|
page read and write
|
||
1E454F9D000
|
heap
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
1AB84E4B000
|
heap
|
page read and write
|
||
23DB7E000
|
stack
|
page read and write
|
||
2DE9C9B000
|
stack
|
page read and write
|
||
B28000
|
heap
|
page read and write
|
||
1E454FC3000
|
heap
|
page read and write
|
||
1CB19CD4000
|
heap
|
page read and write
|
||
9AD077000
|
stack
|
page read and write
|
||
1E454FC1000
|
heap
|
page read and write
|
||
86F83FF000
|
stack
|
page read and write
|
||
1AB84F13000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
1E454F91000
|
heap
|
page read and write
|
||
7FFF30822000
|
unkown
|
page readonly
|
||
1E9E8B05000
|
heap
|
page read and write
|
||
1E454F7C000
|
heap
|
page read and write
|
||
1E454F8B000
|
heap
|
page read and write
|
||
228F048A000
|
heap
|
page read and write
|
||
1AB84E3C000
|
heap
|
page read and write
|
||
1E454F5C000
|
heap
|
page read and write
|
||
2304000
|
heap
|
page read and write
|
||
1E9E89E0000
|
trusted library allocation
|
page read and write
|
||
228F0453000
|
heap
|
page read and write
|
||
1E454F78000
|
heap
|
page read and write
|
||
1E454480000
|
heap
|
page read and write
|
||
228F0508000
|
heap
|
page read and write
|
||
1E7C6C40000
|
heap
|
page read and write
|
||
86F7DAC000
|
stack
|
page read and write
|
||
1B25A190000
|
heap
|
page read and write
|
||
5A5000
|
stack
|
page read and write
|
||
1E454F78000
|
heap
|
page read and write
|
||
1B25A004000
|
heap
|
page read and write
|
||
8DD2476000
|
stack
|
page read and write
|
||
7FFF307D0000
|
unkown
|
page readonly
|
||
1B2584F5000
|
heap
|
page read and write
|
||
1E454F9D000
|
heap
|
page read and write
|
||
B5428FD000
|
stack
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
228F0400000
|
heap
|
page read and write
|
||
7FFF30829000
|
unkown
|
page readonly
|
||
1AB84DC0000
|
trusted library allocation
|
page read and write
|
||
1B258450000
|
unkown
|
page read and write
|
||
1E454F97000
|
heap
|
page read and write
|
||
1E454F78000
|
heap
|
page read and write
|
||
1CB18270000
|
heap
|
page readonly
|
||
9ACE7F000
|
stack
|
page read and write
|
||
7FFF30829000
|
unkown
|
page readonly
|
||
1D938205000
|
heap
|
page read and write
|
||
7FFF307D0000
|
unkown
|
page readonly
|
||
14DB125D000
|
heap
|
page read and write
|
||
1E454F79000
|
heap
|
page read and write
|
||
25AC000
|
stack
|
page read and write
|
||
7FFF307D1000
|
unkown
|
page execute read
|
||
7FFF30822000
|
unkown
|
page readonly
|
||
1E454F1F000
|
heap
|
page read and write
|
||
14DB125D000
|
heap
|
page read and write
|
||
1E454F7F000
|
heap
|
page read and write
|
||
1E454F8C000
|
heap
|
page read and write
|
||
1B25A000000
|
heap
|
page read and write
|
||
23FF7550000
|
heap
|
page read and write
|
||
8DD257F000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
7FFF30826000
|
unkown
|
page read and write
|
||
1E454654000
|
heap
|
page read and write
|
||
1E4545F0000
|
remote allocation
|
page read and write
|
||
AD2000
|
heap
|
page read and write
|
||
BD0000
|
direct allocation
|
page execute and read and write
|
||
1D9381EB000
|
heap
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
2DEA2FB000
|
stack
|
page read and write
|
||
228F044B000
|
heap
|
page read and write
|
||
1E9E8850000
|
heap
|
page read and write
|
||
14DB11A0000
|
trusted library allocation
|
page read and write
|
||
1E7C6BD0000
|
heap
|
page read and write
|
||
19192234000
|
heap
|
page read and write
|
||
1E454F93000
|
heap
|
page read and write
|
||
228F044D000
|
heap
|
page read and write
|
||
1CB181F0000
|
heap
|
page read and write
|
||
8DD24FF000
|
stack
|
page read and write
|
||
1E454F9F000
|
heap
|
page read and write
|
||
19192230000
|
heap
|
page read and write
|
||
1B2584C0000
|
heap
|
page read and write
|
||
1E454F91000
|
heap
|
page read and write
|
||
1E4546E4000
|
heap
|
page read and write
|
||
1E455402000
|
heap
|
page read and write
|
||
19190A55000
|
heap
|
page read and write
|
||
1E4546C8000
|
heap
|
page read and write
|
||
23DCFE000
|
stack
|
page read and write
|
||
14DB126F000
|
heap
|
page read and write
|
||
1AB84E83000
|
heap
|
page read and write
|
||
1E454F7D000
|
heap
|
page read and write
|
||
1AB84F02000
|
heap
|
page read and write
|
||
A8C3BF9000
|
stack
|
page read and write
|
||
C11887E000
|
stack
|
page read and write
|
||
1D938100000
|
heap
|
page read and write
|
||
1E7C7013000
|
heap
|
page read and write
|
||
1CB19B90000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
1D93821F000
|
heap
|
page read and write
|
||
AD2000
|
heap
|
page read and write
|
||
1E454F79000
|
heap
|
page read and write
|
||
1E454F7B000
|
heap
|
page read and write
|
||
1E454669000
|
heap
|
page read and write
|
||
A4A9976000
|
stack
|
page read and write
|
||
1B258560000
|
direct allocation
|
page execute and read and write
|
||
9ACF7B000
|
stack
|
page read and write
|
||
2610000
|
remote allocation
|
page read and write
|
||
191906C8000
|
heap
|
page read and write
|
||
1E9E8B09000
|
heap
|
page read and write
|
||
1E7C7102000
|
heap
|
page read and write
|
||
7FFF30822000
|
unkown
|
page readonly
|
||
14DB1213000
|
heap
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
1CB18520000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1E454F9B000
|
heap
|
page read and write
|
||
14034FE000
|
stack
|
page read and write
|
||
1AB84E00000
|
heap
|
page read and write
|
||
7FFF307D0000
|
unkown
|
page readonly
|
||
14F78E02000
|
heap
|
page read and write
|
||
23FF74E0000
|
heap
|
page read and write
|
||
B869A7E000
|
stack
|
page read and write
|
||
86F82FE000
|
stack
|
page read and write
|
||
14DB1280000
|
heap
|
page read and write
|
||
1E454F17000
|
heap
|
page read and write
|
||
1E454FAE000
|
heap
|
page read and write
|
||
1E4546AA000
|
heap
|
page read and write
|
||
1E454F61000
|
heap
|
page read and write
|
||
1E454600000
|
heap
|
page read and write
|
||
7FFF307D0000
|
unkown
|
page readonly
|
||
2620000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
1E454F8F000
|
heap
|
page read and write
|
||
1E45465F000
|
heap
|
page read and write
|
||
19190640000
|
heap
|
page read and write
|
||
1AB84E29000
|
heap
|
page read and write
|
||
1E454F89000
|
heap
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
1CB182DD000
|
heap
|
page read and write
|
||
1E454FB4000
|
heap
|
page read and write
|
||
6E1067E000
|
stack
|
page read and write
|
||
14DB1100000
|
heap
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
1B2584F5000
|
heap
|
page read and write
|
||
1B2584F0000
|
heap
|
page read and write
|
||
C118A7F000
|
stack
|
page read and write
|
||
1D938223000
|
heap
|
page read and write
|
||
1E454F8C000
|
heap
|
page read and write
|
||
1E454667000
|
heap
|
page read and write
|
||
1E454FA3000
|
heap
|
page read and write
|
||
14F78E5A000
|
heap
|
page read and write
|
||
6E1057E000
|
stack
|
page read and write
|
||
14DB1110000
|
heap
|
page read and write
|
||
1E4546A9000
|
heap
|
page read and write
|
||
1E4546C2000
|
heap
|
page read and write
|
||
1E454F9F000
|
heap
|
page read and write
|
||
B5B000
|
heap
|
page read and write
|
||
1E9E8A90000
|
trusted library allocation
|
page read and write
|
||
BC4000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
2230000
|
heap
|
page readonly
|
||
1E454F9E000
|
heap
|
page read and write
|
||
B869AFE000
|
stack
|
page read and write
|
||
7FFF30826000
|
unkown
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
22BF000
|
stack
|
page read and write
|
||
14F78C20000
|
heap
|
page read and write
|
||
1E454663000
|
heap
|
page read and write
|
||
962000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
14035FA000
|
stack
|
page read and write
|
||
1E454702000
|
heap
|
page read and write
|
||
7FFF307D1000
|
unkown
|
page execute read
|
||
1AB84E8E000
|
heap
|
page read and write
|
||
1E454580000
|
trusted library allocation
|
page read and write
|
||
1B258560000
|
direct allocation
|
page execute and read and write
|
||
AF9000
|
heap
|
page read and write
|
||
14F78F13000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
1E7C6F23000
|
heap
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
7FFF307D1000
|
unkown
|
page execute read
|
||
1CB18090000
|
heap
|
page read and write
|
||
C118B7E000
|
stack
|
page read and write
|
||
2BEF000
|
stack
|
page read and write
|
||
1E454F72000
|
heap
|
page read and write
|
||
1E455422000
|
heap
|
page read and write
|
||
14DB1302000
|
heap
|
page read and write
|
||
1AB84E13000
|
heap
|
page read and write
|
||
1AB84E4A000
|
heap
|
page read and write
|
||
1E7C6E1F000
|
unkown
|
page read and write
|
||
191906FD000
|
heap
|
page read and write
|
||
140367F000
|
stack
|
page read and write
|
||
1E7C6E28000
|
heap
|
page read and write
|
||
7FFF307D1000
|
unkown
|
page execute read
|
||
1E454F9E000
|
heap
|
page read and write
|
||
1E454FBC000
|
heap
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
293B000
|
stack
|
page read and write
|
||
1E454FB0000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
1E9E9820000
|
trusted library allocation
|
page read and write
|
||
14F78E75000
|
heap
|
page read and write
|
||
14F78C10000
|
heap
|
page read and write
|
||
1E7C7113000
|
heap
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
1E454410000
|
heap
|
page read and write
|
||
1E454F9E000
|
heap
|
page read and write
|
||
1E454F8B000
|
heap
|
page read and write
|
||
1E454F78000
|
heap
|
page read and write
|
||
B869B79000
|
stack
|
page read and write
|
||
1E454F83000
|
heap
|
page read and write
|
||
1E454F8F000
|
heap
|
page read and write
|
||
228F0481000
|
heap
|
page read and write
|
There are 650 hidden memdumps, click here to show them.