IOC Report
6xfFjxyRXf

loading gif

Files

File Path
Type
Category
Malicious
6xfFjxyRXf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 61712 bytes, 1 file
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\6xfFjxyRXf.dll
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\6xfFjxyRXf.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\6xfFjxyRXf.dll,DllRegisterServer
malicious
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Nrzawqzutwib\qenu.dlv"
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\6xfFjxyRXf.dll,DllUnregisterServerrrrrrrrrrrr
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\6xfFjxyRXf.dll"
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6xfFjxyRXf.dll",#1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
http://help.disneyplus.com.
unknown
https://support.hotspotshield.com/
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
https://disneyplus.com/legal.
unknown

Domains

Name
IP
Malicious
c-0001.c-msedge.net
13.107.4.50

IPs

IP
Domain
Country
Malicious
217.182.25.250
unknown
France
malicious
160.4.0.0
unknown
New Zealand
malicious
180.4.0.0
unknown
Japan
malicious
235.253.2.0
unknown
Reserved
malicious
249.253.2.0
unknown
Reserved
malicious
32.76.231.4
unknown
United States
malicious
246.178.3.0
unknown
Reserved
malicious
184.134.163.2
unknown
United States
malicious
136.86.171.2
unknown
United States
malicious
208.146.163.2
unknown
United States
malicious
116.4.0.0
unknown
China
malicious
92.179.3.0
unknown
France
malicious
189.232.46.161
unknown
Mexico
malicious
245.253.2.0
unknown
Reserved
malicious
148.4.0.0
unknown
United States
malicious
94.179.3.0
unknown
Ukraine
malicious
192.16.0.0
unknown
United States
malicious
208.60.169.2
unknown
United States
malicious
176.4.0.0
unknown
Germany
malicious
128.4.0.0
unknown
United States
malicious
243.253.2.0
unknown
Reserved
malicious
232.22.167.2
unknown
Reserved
malicious
195.194.0.0
unknown
United Kingdom
malicious
241.253.2.0
unknown
Reserved
malicious
144.23.167.2
unknown
Costa Rica
malicious
255.178.3.0
unknown
Reserved
malicious
51.91.76.89
unknown
France
malicious
24.149.166.2
unknown
United States
malicious
28.188.226.4
unknown
United States
malicious
124.4.0.0
unknown
India
malicious
164.4.0.0
unknown
Sweden
malicious
250.178.3.0
unknown
Reserved
malicious
119.193.124.41
unknown
Korea Republic of
malicious
216.120.236.62
unknown
United States
malicious
112.135.213.118
unknown
Sri Lanka
malicious
192.141.163.2
unknown
Brazil
malicious
192.168.2.1
unknown
unknown
There are 27 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
BF0000
direct allocation
page execute and read and write
malicious
C21000
direct allocation
page execute read
malicious
2B50000
direct allocation
page execute and read and write
malicious
4F61000
direct allocation
page execute read
malicious
46B1000
direct allocation
page execute read
malicious
4481000
direct allocation
page execute read
malicious
4F00000
direct allocation
page execute and read and write
malicious
4680000
direct allocation
page execute and read and write
malicious
4E24000
trusted library allocation
page read and write
2944000
heap
page read and write
22A91802000
trusted library allocation
page read and write
44B1000
heap
page read and write
253B000
stack
page read and write
462F000
stack
page read and write
262FC453000
heap
page read and write
2944000
heap
page read and write
2227FEA0000
heap
page read and write
262FC428000
heap
page read and write
4EC1000
trusted library allocation
page read and write
23F13AE8000
heap
page read and write
23F1438B000
heap
page read and write
22A9106F000
heap
page read and write
23F14800000
heap
page read and write
4D5E000
stack
page read and write
45B0000
trusted library allocation
page read and write
1926D829000
heap
page read and write
23F14819000
heap
page read and write
262FC2A0000
heap
page read and write
4E1D000
trusted library allocation
page read and write
2944000
heap
page read and write
2944000
heap
page read and write
23F14318000
heap
page read and write
23F14388000
heap
page read and write
AF0000
heap
page read and write
289CDF7000
stack
page read and write
95D267F000
stack
page read and write
AB5018B000
stack
page read and write
2944000
heap
page read and write
22280002000
heap
page read and write
2944000
heap
page read and write
2944000
heap
page read and write
289CBFC000
stack
page read and write
BDF75FF000
stack
page read and write
2944000
heap
page read and write
C43000
direct allocation
page read and write
4E70000
heap
page read and write
479F000
stack
page read and write
44B1000
heap
page read and write
23F13AB5000
heap
page read and write
2944000
heap
page read and write
44B1000
heap
page read and write
44B1000
heap
page read and write
22280080000
heap
page read and write
46D2000
direct allocation
page read and write
B61000
heap
page read and write
22A9108B000
heap
page read and write
1926DFB0000
trusted library allocation
page read and write
24AC2F10000
trusted library allocation
page read and write
2228004E000
heap
page read and write
C20000
direct allocation
page read and write
95D27FB000
stack
page read and write
44A2000
direct allocation
page read and write
AEA000
heap
page read and write
2560000
remote allocation
page read and write
C25000
heap
page read and write
A60000
trusted library allocation
page read and write
EFE000
heap
page read and write
1926D84F000
heap
page read and write
467F000
stack
page read and write
2B40000
heap
page read and write
A3C000
stack
page read and write
2A68000
heap
page read and write
2228008B000
heap
page read and write
11FE000
stack
page read and write
4D10000
trusted library allocation
page read and write
95D26FE000
stack
page read and write
23F13B16000
heap
page read and write
2944000
heap
page read and write
289CEFD000
stack
page read and write
44B1000
heap
page read and write
24AC2EF0000
trusted library allocation
page read and write
44B1000
heap
page read and write
2944000
heap
page read and write
4DC1000
trusted library allocation
page read and write
22A9104B000
heap
page read and write
2944000
heap
page read and write
23F13AA4000
heap
page read and write
2228004C000
heap
page read and write
23F14378000
heap
page read and write
2944000
heap
page read and write
4F60000
direct allocation
page read and write
23F1439A000
heap
page read and write
289CFFF000
stack
page read and write
1120000
trusted library allocation
page read and write
47E0000
heap
page read and write
23F14373000
heap
page read and write
2944000
heap
page read and write
23F14388000
heap
page read and write
23F13AAB000
heap
page read and write
262FC400000
heap
page read and write
7F241FB000
stack
page read and write
A30000
heap
page read and write
534E000
stack
page read and write
4E4D000
trusted library allocation
page read and write
2228003C000
heap
page read and write
EFD000
heap
page read and write
1926D900000
heap
page read and write
2944000
heap
page read and write
1926D88B000
heap
page read and write
2A49000
heap
page read and write
483B000
trusted library allocation
page read and write
23F14399000
heap
page read and write
22280100000
heap
page read and write
2944000
heap
page read and write
23F143DA000
heap
page read and write
23F1435E000
heap
page read and write
548F000
stack
page read and write
22A91100000
heap
page read and write
544E000
stack
page read and write
DF0000
heap
page read and write
4B70000
heap
page read and write
2A82000
heap
page read and write
2944000
heap
page read and write
538C000
stack
page read and write
24AC2CE0000
trusted library allocation
page read and write
4A6B000
stack
page read and write
24AC20A0000
heap
page read and write
A5F000
stack
page read and write
2944000
heap
page read and write
2944000
heap
page read and write
289CAFF000
stack
page read and write
23F14371000
heap
page read and write
1926D84A000
heap
page read and write
2ADB000
heap
page read and write
4E4D000
trusted library allocation
page read and write
20047D47000
heap
page read and write
20047C60000
heap
page read and write
2944000
heap
page read and write
D7F000
stack
page read and write
4F50000
heap
page read and write
44A3000
direct allocation
page read and write
23F13B08000
heap
page read and write
23F14375000
heap
page read and write
2A93000
heap
page read and write
23F14802000
heap
page read and write
4C40000
remote allocation
page read and write
510000
heap
page read and write
24AC2320000
heap
page read and write
4E15000
trusted library allocation
page read and write
C70000
heap
page read and write
10000000
unkown
page readonly
BE8F9EC000
stack
page read and write
2B97000
heap
page read and write
7F23DDB000
stack
page read and write
20047D40000
heap
page read and write
2560000
remote allocation
page read and write
5610000
trusted library allocation
page read and write
2FCC000
stack
page read and write
2944000
heap
page read and write
23F13A50000
heap
page read and write
4BDE000
stack
page read and write
2944000
heap
page read and write
44B1000
heap
page read and write
33BA000
heap
page read and write
4EE8000
trusted library allocation
page read and write
4E4D000
trusted library allocation
page read and write
4E2C000
trusted library allocation
page read and write
EFD000
heap
page read and write
530E000
stack
page read and write
D3E000
stack
page read and write
4C40000
remote allocation
page read and write
2944000
heap
page read and write
BDF767C000
stack
page read and write
1926D6A0000
heap
page read and write
262FC2B0000
heap
page read and write
4C1C000
stack
page read and write
2944000
heap
page read and write
120E000
stack
page read and write
E10000
heap
page read and write
4E73000
heap
page read and write
22280053000
heap
page read and write
2944000
heap
page read and write
49AD000
stack
page read and write
4480000
direct allocation
page read and write
2944000
heap
page read and write
4DE4000
trusted library allocation
page read and write
23F14802000
heap
page read and write
2944000
heap
page read and write
2944000
heap
page read and write
95D2AFF000
stack
page read and write
2228004A000
heap
page read and write
2944000
heap
page read and write
289CCFB000
stack
page read and write
23F143AA000
heap
page read and write
7F240FE000
stack
page read and write
2944000
heap
page read and write
4DBF000
stack
page read and write
10036000
unkown
page read and write
4E4D000
trusted library allocation
page read and write
23F13A13000
heap
page read and write
20047D20000
heap
page read and write
44B1000
heap
page read and write
24AC20DF000
heap
page read and write
2A6A000
heap
page read and write
11C0000
heap
page read and write
44B1000
heap
page read and write
29E0000
heap
page read and write
10036000
unkown
page read and write
20047D51000
heap
page read and write
23F14377000
heap
page read and write
23F14300000
heap
page read and write
24AC1E70000
trusted library allocation
page read and write
23F14388000
heap
page read and write
2B90000
heap
page read and write
10036000
unkown
page read and write
10000000
unkown
page readonly
20047D45000
heap
page read and write
20047D32000
heap
page read and write
2944000
heap
page read and write
20047D2D000
heap
page read and write
44B1000
heap
page read and write
262FCC02000
trusted library allocation
page read and write
23F14388000
heap
page read and write
23F13AB2000
heap
page read and write
23F143AA000
heap
page read and write
4E24000
trusted library allocation
page read and write
44B1000
heap
page read and write
22A91108000
heap
page read and write
46D3000
direct allocation
page read and write
22280113000
heap
page read and write
F19000
heap
page read and write
23F14388000
heap
page read and write
2944000
heap
page read and write
22A9104E000
heap
page read and write
80782FE000
stack
page read and write
23F14802000
heap
page read and write
2944000
heap
page read and write
4BAE000
stack
page read and write
1926D902000
heap
page read and write
44B1000
heap
page read and write
61A0000
heap
page read and write
807827B000
stack
page read and write
10001000
unkown
page execute read
10001000
unkown
page execute read
DF7000
heap
page read and write
2944000
heap
page read and write
33F7000
heap
page read and write
23F14359000
heap
page read and write
4820000
heap
page read and write
7B0000
heap
page read and write
1003C000
unkown
page readonly
22280049000
heap
page read and write
46BE000
stack
page read and write
2944000
heap
page read and write
E9F000
stack
page read and write
4F83000
direct allocation
page read and write
20047D4D000
heap
page read and write
4E4D000
trusted library allocation
page read and write
1926D908000
heap
page read and write
44B1000
heap
page read and write
24AC2040000
trusted library allocation
page read and write
2AE9000
heap
page read and write
2A8E000
heap
page read and write
23F14399000
heap
page read and write
24AC2098000
heap
page read and write
23F14388000
heap
page read and write
22A91113000
heap
page read and write
23F1435E000
heap
page read and write
A3B000
heap
page read and write
2A93000
heap
page read and write
20047C40000
heap
page read and write
44B1000
heap
page read and write
3270000
trusted library allocation
page read and write
23F13A4B000
heap
page read and write
22A9104F000
heap
page read and write
2944000
heap
page read and write
80785FE000
stack
page read and write
24AC20D7000
heap
page read and write
53CD000
stack
page read and write
2227FFA0000
trusted library allocation
page read and write
4C6E000
stack
page read and write
3452000
heap
page read and write
2944000
heap
page read and write
32F0000
trusted library allocation
page read and write
EF9000
heap
page read and write
20047D4D000
heap
page read and write
B2D000
heap
page read and write
5B9000
stack
page read and write
23F13AF5000
heap
page read and write
23F14802000
heap
page read and write
4F62000
trusted library allocation
page read and write
44B1000
heap
page read and write
23F13A70000
heap
page read and write
4E85000
trusted library allocation
page read and write
45EE000
stack
page read and write
2AE8000
heap
page read and write
32C0000
heap
page read and write
24AC1E60000
heap
page read and write
2944000
heap
page read and write
4E2F000
trusted library allocation
page read and write
262FCBB0000
trusted library allocation
page read and write
4990000
heap
page read and write
482C000
stack
page read and write
23F143AA000
heap
page read and write
95D23AB000
stack
page read and write
80787FF000
stack
page read and write
BDF710A000
stack
page read and write
61A4000
heap
page read and write
2944000
heap
page read and write
2944000
heap
page read and write
CCD000
stack
page read and write
2A49000
heap
page read and write
20047D00000
heap
page read and write
2944000
heap
page read and write
262FC413000
heap
page read and write
2944000
heap
page read and write
44B1000
heap
page read and write
4B6F000
stack
page read and write
BDF74F9000
stack
page read and write
289CA7E000
stack
page read and write
3238000
stack
page read and write
2944000
heap
page read and write
2944000
heap
page read and write
F01000
heap
page read and write
2944000
heap
page read and write
2A49000
heap
page read and write
23F139E0000
trusted library allocation
page read and write
2945000
heap
page read and write
2944000
heap
page read and write
44B1000
heap
page read and write
20047D37000
heap
page read and write
262FC502000
heap
page read and write
C42000
direct allocation
page read and write
23F13AC7000
heap
page read and write
44B1000
heap
page read and write
1003C000
unkown
page readonly
2944000
heap
page read and write
23F13A4D000
heap
page read and write
1002B000
unkown
page readonly
22A91102000
heap
page read and write
D90000
trusted library allocation
page read and write
4E74000
trusted library allocation
page read and write
4DE5000
trusted library allocation
page read and write
2944000
heap
page read and write
24FC000
stack
page read and write
2944000
heap
page read and write
475E000
stack
page read and write
2940000
heap
page read and write
2490000
heap
page read and write
44B1000
heap
page read and write
22A91080000
heap
page read and write
22280070000
heap
page read and write
4B2E000
stack
page read and write
24AC2050000
trusted library allocation
page read and write
BDF7579000
stack
page read and write
23F14374000
heap
page read and write
46FE000
stack
page read and write
4E2F000
trusted library allocation
page read and write
23F14820000
heap
page read and write
44B1000
heap
page read and write
334E000
stack
page read and write
2944000
heap
page read and write
EFA000
heap
page read and write
23F14802000
heap
page read and write
20047D5F000
heap
page read and write
AB5057A000
stack
page read and write
44B1000
heap
page read and write
2944000
heap
page read and write
2F60000
heap
page read and write
4D7E000
stack
page read and write
23F13A88000
heap
page read and write
23F138E0000
heap
page read and write
23F14399000
heap
page read and write
A799000
trusted library allocation
page read and write
2944000
heap
page read and write
7F2407E000
stack
page read and write
EF5000
heap
page read and write
2944000
heap
page read and write
22A9103C000
heap
page read and write
22280013000
heap
page read and write
24AC2330000
trusted library allocation
page read and write
467F000
stack
page read and write
1926D855000
heap
page read and write
22A90E50000
heap
page read and write
7F242FB000
stack
page read and write
2228004B000
heap
page read and write
4EE8000
trusted library allocation
page read and write
AEC0000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
550C000
stack
page read and write
22280029000
heap
page read and write
9D5000
heap
page read and write
4A2E000
stack
page read and write
23F143AA000
heap
page read and write
E5E000
stack
page read and write
2944000
heap
page read and write
7F245FE000
stack
page read and write
C20000
heap
page read and write
20047B10000
heap
page read and write
B4A000
heap
page read and write
44C9000
heap
page read and write
2944000
heap
page read and write
3C0000
heap
page read and write
EFD000
heap
page read and write
EFD000
heap
page read and write
1926D83C000
heap
page read and write
B33000
heap
page read and write
1926D800000
heap
page read and write
20047D4D000
heap
page read and write
73D000
stack
page read and write
2228004F000
heap
page read and write
23F14360000
heap
page read and write
2944000
heap
page read and write
D60000
heap
page read and write
262FC473000
heap
page read and write
23F14388000
heap
page read and write
44B1000
heap
page read and write
2944000
heap
page read and write
23F141F0000
remote allocation
page read and write
23F14802000
heap
page read and write
2A37000
heap
page read and write
44B1000
heap
page read and write
262FC513000
heap
page read and write
1926D710000
heap
page read and write
25A0000
trusted library allocation
page read and write
8F0000
trusted library allocation
page read and write
4EE7000
trusted library allocation
page read and write
2944000
heap
page read and write
4F82000
direct allocation
page read and write
23F143AB000
heap
page read and write
262FC402000
heap
page read and write
2944000
heap
page read and write
4BEF000
stack
page read and write
2A49000
heap
page read and write
1002B000
unkown
page readonly
2944000
heap
page read and write
2944000
heap
page read and write
2944000
heap
page read and write
CF0000
heap
page read and write
2944000
heap
page read and write
95D2D7F000
unkown
page read and write
B56000
heap
page read and write
44B1000
heap
page read and write
47F0000
trusted library allocation
page read and write
22A90E40000
heap
page read and write
23F143A9000
heap
page read and write
24AC2F20000
trusted library allocation
page read and write
262FC500000
heap
page read and write
2944000
heap
page read and write
A48000
heap
page read and write
2944000
heap
page read and write
22A91052000
heap
page read and write
807857B000
stack
page read and write
24AC2329000
heap
page read and write
20047D37000
heap
page read and write
24AC1FC0000
heap
page read and write
23F1437F000
heap
page read and write
23F14377000
heap
page read and write
AE0000
heap
page read and write
A1E000
stack
page read and write
47B0000
heap
page read and write
448D000
trusted library allocation
page read and write
44B1000
heap
page read and write
EF5000
heap
page read and write
EC0000
trusted library allocation
page read and write
4C2E000
stack
page read and write
20047D40000
heap
page read and write
1926D6B0000
heap
page read and write
80788FC000
stack
page read and write
262FC43D000
heap
page read and write
23F141F0000
remote allocation
page read and write
807837E000
stack
page read and write
2944000
heap
page read and write
23F13A00000
heap
page read and write
1926D86F000
heap
page read and write
4E4D000
trusted library allocation
page read and write
262FC474000
heap
page read and write
338F000
stack
page read and write
23F13A3C000
heap
page read and write
24AC2F00000
heap
page readonly
2920000
trusted library allocation
page read and write
49EC000
stack
page read and write
2A8E000
heap
page read and write
10001000
unkown
page execute read
2A6A000
heap
page read and write
22A90EB0000
heap
page read and write
2944000
heap
page read and write
23F1439A000
heap
page read and write
1926D913000
heap
page read and write
2944000
heap
page read and write
44B1000
heap
page read and write
2944000
heap
page read and write
23F13A4F000
heap
page read and write
44B1000
heap
page read and write
4E36000
trusted library allocation
page read and write
4F30000
heap
page read and write
2944000
heap
page read and write
F05000
heap
page read and write
4E24000
trusted library allocation
page read and write
DFA000
heap
page read and write
44B1000
heap
page read and write
23F1434C000
heap
page read and write
1926D813000
heap
page read and write
22A91055000
heap
page read and write
F07000
heap
page read and write
2944000
heap
page read and write
23F13B02000
heap
page read and write
20047D51000
heap
page read and write
23F14373000
heap
page read and write
A7A000
stack
page read and write
2944000
heap
page read and write
24AC2030000
trusted library allocation
page read and write
47F0000
heap
page read and write
23F13A4C000
heap
page read and write
23F13AC1000
heap
page read and write
20047D05000
heap
page read and write
2944000
heap
page read and write
44B3000
heap
page read and write
44B1000
heap
page read and write
7F243F7000
stack
page read and write
47DE000
stack
page read and write
2944000
heap
page read and write
2944000
heap
page read and write
ED0000
heap
page read and write
1926E002000
trusted library allocation
page read and write
2944000
heap
page read and write
880000
heap
page read and write
2944000
heap
page read and write
23F141F0000
remote allocation
page read and write
29FA000
heap
page read and write
BE900FD000
stack
page read and write
54CE000
stack
page read and write
2228007F000
heap
page read and write
20047D5D000
heap
page read and write
44B1000
heap
page read and write
10000000
unkown
page readonly
44B1000
heap
page read and write
23F13B13000
heap
page read and write
C7B000
stack
page read and write
23F14370000
heap
page read and write
23F14803000
heap
page read and write
22280000000
heap
page read and write
2944000
heap
page read and write
4E15000
trusted library allocation
page read and write
23F13880000
heap
page read and write
2944000
heap
page read and write
2227FE30000
heap
page read and write
20047D51000
heap
page read and write
23F1436F000
heap
page read and write
262FC310000
heap
page read and write
BE901FF000
stack
page read and write
2944000
heap
page read and write
46B0000
direct allocation
page read and write
4E15000
trusted library allocation
page read and write
23F14384000
heap
page read and write
20047D43000
heap
page read and write
20047D40000
heap
page read and write
AFA000
heap
page read and write
BDF747E000
stack
page read and write
23F14803000
heap
page read and write
4E26000
trusted library allocation
page read and write
24AC20DF000
heap
page read and write
23F14375000
heap
page read and write
9B0000
heap
page read and write
2227FE40000
heap
page read and write
4400000
trusted library allocation
page read and write
4920000
trusted library allocation
page read and write
63D000
stack
page read and write
B23000
heap
page read and write
44B1000
heap
page read and write
7F244FF000
stack
page read and write
2560000
remote allocation
page read and write
4DC0000
trusted library allocation
page read and write
BE8FEFB000
stack
page read and write
341D000
heap
page read and write
23F14202000
heap
page read and write
44B1000
heap
page read and write
D3F000
stack
page read and write
C3A000
stack
page read and write
10000000
unkown
page readonly
B30000
heap
page read and write
289C78B000
stack
page read and write
4EC0000
trusted library allocation
page read and write
AB505F9000
stack
page read and write
2944000
heap
page read and write
23F1437D000
heap
page read and write
23F14322000
heap
page read and write
4D9F000
stack
page read and write
24AC2090000
heap
page read and write
9D0000
heap
page read and write
F19000
heap
page read and write
23F14371000
heap
page read and write
EDA000
heap
page read and write
23F13870000
heap
page read and write
44B1000
heap
page read and write
61B0000
trusted library allocation
page read and write
95D2BFC000
stack
page read and write
BDF718E000
stack
page read and write
AB50779000
stack
page read and write
23F13A83000
heap
page read and write
95D29F7000
stack
page read and write
22A90FB0000
trusted library allocation
page read and write
1926D895000
heap
page read and write
44B1000
heap
page read and write
1002B000
unkown
page readonly
23F14802000
heap
page read and write
44B1000
heap
page read and write
44B1000
heap
page read and write
3438000
heap
page read and write
49BF000
stack
page read and write
22A91000000
heap
page read and write
49C0000
trusted library allocation
page read and write
4E1D000
trusted library allocation
page read and write
23F14380000
heap
page read and write
23F1437B000
heap
page read and write
29F0000
heap
page read and write
1003C000
unkown
page readonly
22280108000
heap
page read and write
23F14386000
heap
page read and write
262FC47C000
heap
page read and write
22280102000
heap
page read and write
4E24000
trusted library allocation
page read and write
2944000
heap
page read and write
23F14373000
heap
page read and write
80789FF000
stack
page read and write
10001000
unkown
page execute read
B3B000
heap
page read and write
3305000
heap
page read and write
96E000
stack
page read and write
24AC20DF000
heap
page read and write
120E000
stack
page read and write
22280802000
trusted library allocation
page read and write
4DF3000
trusted library allocation
page read and write
2944000
heap
page read and write
2944000
heap
page read and write
22A91029000
heap
page read and write
44B1000
heap
page read and write
29E3000
heap
page read and write
23F14388000
heap
page read and write
22A91013000
heap
page read and write
2944000
heap
page read and write
9AF000
stack
page read and write
AC0000
trusted library allocation
page read and write
57C000
stack
page read and write
4E80000
trusted library allocation
page read and write
20047D2B000
heap
page read and write
2944000
heap
page read and write
2944000
heap
page read and write
4E1D000
trusted library allocation
page read and write
23F14844000
heap
page read and write
4E24000
trusted library allocation
page read and write
95D28FA000
stack
page read and write
2944000
heap
page read and write
44B1000
heap
page read and write
F12000
heap
page read and write
95D2CFA000
stack
page read and write
F05000
heap
page read and write
2944000
heap
page read and write
4E1D000
trusted library allocation
page read and write
24AC2F70000
trusted library allocation
page read and write
22280057000
heap
page read and write
1926D884000
heap
page read and write
2944000
heap
page read and write
1002B000
unkown
page readonly
44B1000
heap
page read and write
23F1437D000
heap
page read and write
4E1D000
trusted library allocation
page read and write
44B1000
heap
page read and write
44B1000
heap
page read and write
80786F7000
stack
page read and write
44C0000
heap
page read and write
2ADB000
heap
page read and write
44B1000
heap
page read and write
AB5067E000
stack
page read and write
20047D46000
heap
page read and write
44B0000
heap
page read and write
10036000
unkown
page read and write
33B0000
heap
page read and write
BE8FFFE000
stack
page read and write
4C40000
remote allocation
page read and write
2A43000
heap
page read and write
24AC1FA0000
heap
page read and write
24AC2325000
heap
page read and write
860000
trusted library allocation
page read and write
23F14357000
heap
page read and write
2944000
heap
page read and write
23F13A29000
heap
page read and write
A3EB000
trusted library allocation
page read and write
23F13AE2000
heap
page read and write
3300000
heap
page read and write
A74E000
trusted library allocation
page read and write
23F14381000
heap
page read and write
23F1437A000
heap
page read and write
D80000
heap
page read and write
1003C000
unkown
page readonly
There are 685 hidden memdumps, click here to show them.