Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
6xfFjxyRXf.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, 61712 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\6xfFjxyRXf.dll
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\6xfFjxyRXf.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\6xfFjxyRXf.dll,DllRegisterServer
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Nrzawqzutwib\qenu.dlv"
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\6xfFjxyRXf.dll,DllUnregisterServerrrrrrrrrrrr
|
||
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\6xfFjxyRXf.dll"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6xfFjxyRXf.dll",#1
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
There are 2 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.disneyplus.com/legal/your-california-privacy-rights
|
unknown
|
||
https://www.disneyplus.com/legal/privacy-policy
|
unknown
|
||
http://help.disneyplus.com.
|
unknown
|
||
https://support.hotspotshield.com/
|
unknown
|
||
https://www.hotspotshield.com/terms/
|
unknown
|
||
https://www.pango.co/privacy
|
unknown
|
||
https://disneyplus.com/legal.
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
c-0001.c-msedge.net
|
13.107.4.50
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
217.182.25.250
|
unknown
|
France
|
||
160.4.0.0
|
unknown
|
New Zealand
|
||
180.4.0.0
|
unknown
|
Japan
|
||
235.253.2.0
|
unknown
|
Reserved
|
||
249.253.2.0
|
unknown
|
Reserved
|
||
32.76.231.4
|
unknown
|
United States
|
||
246.178.3.0
|
unknown
|
Reserved
|
||
184.134.163.2
|
unknown
|
United States
|
||
136.86.171.2
|
unknown
|
United States
|
||
208.146.163.2
|
unknown
|
United States
|
||
116.4.0.0
|
unknown
|
China
|
||
92.179.3.0
|
unknown
|
France
|
||
189.232.46.161
|
unknown
|
Mexico
|
||
245.253.2.0
|
unknown
|
Reserved
|
||
148.4.0.0
|
unknown
|
United States
|
||
94.179.3.0
|
unknown
|
Ukraine
|
||
192.16.0.0
|
unknown
|
United States
|
||
208.60.169.2
|
unknown
|
United States
|
||
176.4.0.0
|
unknown
|
Germany
|
||
128.4.0.0
|
unknown
|
United States
|
||
243.253.2.0
|
unknown
|
Reserved
|
||
232.22.167.2
|
unknown
|
Reserved
|
||
195.194.0.0
|
unknown
|
United Kingdom
|
||
241.253.2.0
|
unknown
|
Reserved
|
||
144.23.167.2
|
unknown
|
Costa Rica
|
||
255.178.3.0
|
unknown
|
Reserved
|
||
51.91.76.89
|
unknown
|
France
|
||
24.149.166.2
|
unknown
|
United States
|
||
28.188.226.4
|
unknown
|
United States
|
||
124.4.0.0
|
unknown
|
India
|
||
164.4.0.0
|
unknown
|
Sweden
|
||
250.178.3.0
|
unknown
|
Reserved
|
||
119.193.124.41
|
unknown
|
Korea Republic of
|
||
216.120.236.62
|
unknown
|
United States
|
||
112.135.213.118
|
unknown
|
Sri Lanka
|
||
192.141.163.2
|
unknown
|
Brazil
|
||
192.168.2.1
|
unknown
|
unknown
|
There are 27 hidden IPs, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
BF0000
|
direct allocation
|
page execute and read and write
|
||
C21000
|
direct allocation
|
page execute read
|
||
2B50000
|
direct allocation
|
page execute and read and write
|
||
4F61000
|
direct allocation
|
page execute read
|
||
46B1000
|
direct allocation
|
page execute read
|
||
4481000
|
direct allocation
|
page execute read
|
||
4F00000
|
direct allocation
|
page execute and read and write
|
||
4680000
|
direct allocation
|
page execute and read and write
|
||
4E24000
|
trusted library allocation
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
22A91802000
|
trusted library allocation
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
253B000
|
stack
|
page read and write
|
||
462F000
|
stack
|
page read and write
|
||
262FC453000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
2227FEA0000
|
heap
|
page read and write
|
||
262FC428000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
23F13AE8000
|
heap
|
page read and write
|
||
23F1438B000
|
heap
|
page read and write
|
||
22A9106F000
|
heap
|
page read and write
|
||
23F14800000
|
heap
|
page read and write
|
||
4D5E000
|
stack
|
page read and write
|
||
45B0000
|
trusted library allocation
|
page read and write
|
||
1926D829000
|
heap
|
page read and write
|
||
23F14819000
|
heap
|
page read and write
|
||
262FC2A0000
|
heap
|
page read and write
|
||
4E1D000
|
trusted library allocation
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
23F14318000
|
heap
|
page read and write
|
||
23F14388000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
289CDF7000
|
stack
|
page read and write
|
||
95D267F000
|
stack
|
page read and write
|
||
AB5018B000
|
stack
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
22280002000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
289CBFC000
|
stack
|
page read and write
|
||
BDF75FF000
|
stack
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
C43000
|
direct allocation
|
page read and write
|
||
4E70000
|
heap
|
page read and write
|
||
479F000
|
stack
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
23F13AB5000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
22280080000
|
heap
|
page read and write
|
||
46D2000
|
direct allocation
|
page read and write
|
||
B61000
|
heap
|
page read and write
|
||
22A9108B000
|
heap
|
page read and write
|
||
1926DFB0000
|
trusted library allocation
|
page read and write
|
||
24AC2F10000
|
trusted library allocation
|
page read and write
|
||
2228004E000
|
heap
|
page read and write
|
||
C20000
|
direct allocation
|
page read and write
|
||
95D27FB000
|
stack
|
page read and write
|
||
44A2000
|
direct allocation
|
page read and write
|
||
AEA000
|
heap
|
page read and write
|
||
2560000
|
remote allocation
|
page read and write
|
||
C25000
|
heap
|
page read and write
|
||
A60000
|
trusted library allocation
|
page read and write
|
||
EFE000
|
heap
|
page read and write
|
||
1926D84F000
|
heap
|
page read and write
|
||
467F000
|
stack
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
A3C000
|
stack
|
page read and write
|
||
2A68000
|
heap
|
page read and write
|
||
2228008B000
|
heap
|
page read and write
|
||
11FE000
|
stack
|
page read and write
|
||
4D10000
|
trusted library allocation
|
page read and write
|
||
95D26FE000
|
stack
|
page read and write
|
||
23F13B16000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
289CEFD000
|
stack
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
24AC2EF0000
|
trusted library allocation
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
4DC1000
|
trusted library allocation
|
page read and write
|
||
22A9104B000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
23F13AA4000
|
heap
|
page read and write
|
||
2228004C000
|
heap
|
page read and write
|
||
23F14378000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
4F60000
|
direct allocation
|
page read and write
|
||
23F1439A000
|
heap
|
page read and write
|
||
289CFFF000
|
stack
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
47E0000
|
heap
|
page read and write
|
||
23F14373000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
23F14388000
|
heap
|
page read and write
|
||
23F13AAB000
|
heap
|
page read and write
|
||
262FC400000
|
heap
|
page read and write
|
||
7F241FB000
|
stack
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
534E000
|
stack
|
page read and write
|
||
4E4D000
|
trusted library allocation
|
page read and write
|
||
2228003C000
|
heap
|
page read and write
|
||
EFD000
|
heap
|
page read and write
|
||
1926D900000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
1926D88B000
|
heap
|
page read and write
|
||
2A49000
|
heap
|
page read and write
|
||
483B000
|
trusted library allocation
|
page read and write
|
||
23F14399000
|
heap
|
page read and write
|
||
22280100000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
23F143DA000
|
heap
|
page read and write
|
||
23F1435E000
|
heap
|
page read and write
|
||
548F000
|
stack
|
page read and write
|
||
22A91100000
|
heap
|
page read and write
|
||
544E000
|
stack
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
4B70000
|
heap
|
page read and write
|
||
2A82000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
538C000
|
stack
|
page read and write
|
||
24AC2CE0000
|
trusted library allocation
|
page read and write
|
||
4A6B000
|
stack
|
page read and write
|
||
24AC20A0000
|
heap
|
page read and write
|
||
A5F000
|
stack
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
289CAFF000
|
stack
|
page read and write
|
||
23F14371000
|
heap
|
page read and write
|
||
1926D84A000
|
heap
|
page read and write
|
||
2ADB000
|
heap
|
page read and write
|
||
4E4D000
|
trusted library allocation
|
page read and write
|
||
20047D47000
|
heap
|
page read and write
|
||
20047C60000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
D7F000
|
stack
|
page read and write
|
||
4F50000
|
heap
|
page read and write
|
||
44A3000
|
direct allocation
|
page read and write
|
||
23F13B08000
|
heap
|
page read and write
|
||
23F14375000
|
heap
|
page read and write
|
||
2A93000
|
heap
|
page read and write
|
||
23F14802000
|
heap
|
page read and write
|
||
4C40000
|
remote allocation
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
24AC2320000
|
heap
|
page read and write
|
||
4E15000
|
trusted library allocation
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
BE8F9EC000
|
stack
|
page read and write
|
||
2B97000
|
heap
|
page read and write
|
||
7F23DDB000
|
stack
|
page read and write
|
||
20047D40000
|
heap
|
page read and write
|
||
2560000
|
remote allocation
|
page read and write
|
||
5610000
|
trusted library allocation
|
page read and write
|
||
2FCC000
|
stack
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
23F13A50000
|
heap
|
page read and write
|
||
4BDE000
|
stack
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
33BA000
|
heap
|
page read and write
|
||
4EE8000
|
trusted library allocation
|
page read and write
|
||
4E4D000
|
trusted library allocation
|
page read and write
|
||
4E2C000
|
trusted library allocation
|
page read and write
|
||
EFD000
|
heap
|
page read and write
|
||
530E000
|
stack
|
page read and write
|
||
D3E000
|
stack
|
page read and write
|
||
4C40000
|
remote allocation
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
BDF767C000
|
stack
|
page read and write
|
||
1926D6A0000
|
heap
|
page read and write
|
||
262FC2B0000
|
heap
|
page read and write
|
||
4C1C000
|
stack
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
120E000
|
stack
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
4E73000
|
heap
|
page read and write
|
||
22280053000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
49AD000
|
stack
|
page read and write
|
||
4480000
|
direct allocation
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
4DE4000
|
trusted library allocation
|
page read and write
|
||
23F14802000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
95D2AFF000
|
stack
|
page read and write
|
||
2228004A000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
289CCFB000
|
stack
|
page read and write
|
||
23F143AA000
|
heap
|
page read and write
|
||
7F240FE000
|
stack
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
4DBF000
|
stack
|
page read and write
|
||
10036000
|
unkown
|
page read and write
|
||
4E4D000
|
trusted library allocation
|
page read and write
|
||
23F13A13000
|
heap
|
page read and write
|
||
20047D20000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
24AC20DF000
|
heap
|
page read and write
|
||
2A6A000
|
heap
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
10036000
|
unkown
|
page read and write
|
||
20047D51000
|
heap
|
page read and write
|
||
23F14377000
|
heap
|
page read and write
|
||
23F14300000
|
heap
|
page read and write
|
||
24AC1E70000
|
trusted library allocation
|
page read and write
|
||
23F14388000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
10036000
|
unkown
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
20047D45000
|
heap
|
page read and write
|
||
20047D32000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
20047D2D000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
262FCC02000
|
trusted library allocation
|
page read and write
|
||
23F14388000
|
heap
|
page read and write
|
||
23F13AB2000
|
heap
|
page read and write
|
||
23F143AA000
|
heap
|
page read and write
|
||
4E24000
|
trusted library allocation
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
22A91108000
|
heap
|
page read and write
|
||
46D3000
|
direct allocation
|
page read and write
|
||
22280113000
|
heap
|
page read and write
|
||
F19000
|
heap
|
page read and write
|
||
23F14388000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
22A9104E000
|
heap
|
page read and write
|
||
80782FE000
|
stack
|
page read and write
|
||
23F14802000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
1926D902000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
61A0000
|
heap
|
page read and write
|
||
807827B000
|
stack
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
10001000
|
unkown
|
page execute read
|
||
DF7000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
33F7000
|
heap
|
page read and write
|
||
23F14359000
|
heap
|
page read and write
|
||
4820000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
1003C000
|
unkown
|
page readonly
|
||
22280049000
|
heap
|
page read and write
|
||
46BE000
|
stack
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
E9F000
|
stack
|
page read and write
|
||
4F83000
|
direct allocation
|
page read and write
|
||
20047D4D000
|
heap
|
page read and write
|
||
4E4D000
|
trusted library allocation
|
page read and write
|
||
1926D908000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
24AC2040000
|
trusted library allocation
|
page read and write
|
||
2AE9000
|
heap
|
page read and write
|
||
2A8E000
|
heap
|
page read and write
|
||
23F14399000
|
heap
|
page read and write
|
||
24AC2098000
|
heap
|
page read and write
|
||
23F14388000
|
heap
|
page read and write
|
||
22A91113000
|
heap
|
page read and write
|
||
23F1435E000
|
heap
|
page read and write
|
||
A3B000
|
heap
|
page read and write
|
||
2A93000
|
heap
|
page read and write
|
||
20047C40000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
3270000
|
trusted library allocation
|
page read and write
|
||
23F13A4B000
|
heap
|
page read and write
|
||
22A9104F000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
80785FE000
|
stack
|
page read and write
|
||
24AC20D7000
|
heap
|
page read and write
|
||
53CD000
|
stack
|
page read and write
|
||
2227FFA0000
|
trusted library allocation
|
page read and write
|
||
4C6E000
|
stack
|
page read and write
|
||
3452000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
EF9000
|
heap
|
page read and write
|
||
20047D4D000
|
heap
|
page read and write
|
||
B2D000
|
heap
|
page read and write
|
||
5B9000
|
stack
|
page read and write
|
||
23F13AF5000
|
heap
|
page read and write
|
||
23F14802000
|
heap
|
page read and write
|
||
4F62000
|
trusted library allocation
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
23F13A70000
|
heap
|
page read and write
|
||
4E85000
|
trusted library allocation
|
page read and write
|
||
45EE000
|
stack
|
page read and write
|
||
2AE8000
|
heap
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
24AC1E60000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
4E2F000
|
trusted library allocation
|
page read and write
|
||
262FCBB0000
|
trusted library allocation
|
page read and write
|
||
4990000
|
heap
|
page read and write
|
||
482C000
|
stack
|
page read and write
|
||
23F143AA000
|
heap
|
page read and write
|
||
95D23AB000
|
stack
|
page read and write
|
||
80787FF000
|
stack
|
page read and write
|
||
BDF710A000
|
stack
|
page read and write
|
||
61A4000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
CCD000
|
stack
|
page read and write
|
||
2A49000
|
heap
|
page read and write
|
||
20047D00000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
262FC413000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
4B6F000
|
stack
|
page read and write
|
||
BDF74F9000
|
stack
|
page read and write
|
||
289CA7E000
|
stack
|
page read and write
|
||
3238000
|
stack
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
F01000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
2A49000
|
heap
|
page read and write
|
||
23F139E0000
|
trusted library allocation
|
page read and write
|
||
2945000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
20047D37000
|
heap
|
page read and write
|
||
262FC502000
|
heap
|
page read and write
|
||
C42000
|
direct allocation
|
page read and write
|
||
23F13AC7000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
1003C000
|
unkown
|
page readonly
|
||
2944000
|
heap
|
page read and write
|
||
23F13A4D000
|
heap
|
page read and write
|
||
1002B000
|
unkown
|
page readonly
|
||
22A91102000
|
heap
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
4E74000
|
trusted library allocation
|
page read and write
|
||
4DE5000
|
trusted library allocation
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
24FC000
|
stack
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
475E000
|
stack
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
2490000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
22A91080000
|
heap
|
page read and write
|
||
22280070000
|
heap
|
page read and write
|
||
4B2E000
|
stack
|
page read and write
|
||
24AC2050000
|
trusted library allocation
|
page read and write
|
||
BDF7579000
|
stack
|
page read and write
|
||
23F14374000
|
heap
|
page read and write
|
||
46FE000
|
stack
|
page read and write
|
||
4E2F000
|
trusted library allocation
|
page read and write
|
||
23F14820000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
EFA000
|
heap
|
page read and write
|
||
23F14802000
|
heap
|
page read and write
|
||
20047D5F000
|
heap
|
page read and write
|
||
AB5057A000
|
stack
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
4D7E000
|
stack
|
page read and write
|
||
23F13A88000
|
heap
|
page read and write
|
||
23F138E0000
|
heap
|
page read and write
|
||
23F14399000
|
heap
|
page read and write
|
||
A799000
|
trusted library allocation
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
7F2407E000
|
stack
|
page read and write
|
||
EF5000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
22A9103C000
|
heap
|
page read and write
|
||
22280013000
|
heap
|
page read and write
|
||
24AC2330000
|
trusted library allocation
|
page read and write
|
||
467F000
|
stack
|
page read and write
|
||
1926D855000
|
heap
|
page read and write
|
||
22A90E50000
|
heap
|
page read and write
|
||
7F242FB000
|
stack
|
page read and write
|
||
2228004B000
|
heap
|
page read and write
|
||
4EE8000
|
trusted library allocation
|
page read and write
|
||
AEC0000
|
trusted library allocation
|
page read and write
|
||
28D0000
|
trusted library allocation
|
page read and write
|
||
550C000
|
stack
|
page read and write
|
||
22280029000
|
heap
|
page read and write
|
||
9D5000
|
heap
|
page read and write
|
||
4A2E000
|
stack
|
page read and write
|
||
23F143AA000
|
heap
|
page read and write
|
||
E5E000
|
stack
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
7F245FE000
|
stack
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
20047B10000
|
heap
|
page read and write
|
||
B4A000
|
heap
|
page read and write
|
||
44C9000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
EFD000
|
heap
|
page read and write
|
||
EFD000
|
heap
|
page read and write
|
||
1926D83C000
|
heap
|
page read and write
|
||
B33000
|
heap
|
page read and write
|
||
1926D800000
|
heap
|
page read and write
|
||
20047D4D000
|
heap
|
page read and write
|
||
73D000
|
stack
|
page read and write
|
||
2228004F000
|
heap
|
page read and write
|
||
23F14360000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
262FC473000
|
heap
|
page read and write
|
||
23F14388000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
23F141F0000
|
remote allocation
|
page read and write
|
||
23F14802000
|
heap
|
page read and write
|
||
2A37000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
262FC513000
|
heap
|
page read and write
|
||
1926D710000
|
heap
|
page read and write
|
||
25A0000
|
trusted library allocation
|
page read and write
|
||
8F0000
|
trusted library allocation
|
page read and write
|
||
4EE7000
|
trusted library allocation
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
4F82000
|
direct allocation
|
page read and write
|
||
23F143AB000
|
heap
|
page read and write
|
||
262FC402000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
4BEF000
|
stack
|
page read and write
|
||
2A49000
|
heap
|
page read and write
|
||
1002B000
|
unkown
|
page readonly
|
||
2944000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
95D2D7F000
|
unkown
|
page read and write
|
||
B56000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
47F0000
|
trusted library allocation
|
page read and write
|
||
22A90E40000
|
heap
|
page read and write
|
||
23F143A9000
|
heap
|
page read and write
|
||
24AC2F20000
|
trusted library allocation
|
page read and write
|
||
262FC500000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
A48000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
22A91052000
|
heap
|
page read and write
|
||
807857B000
|
stack
|
page read and write
|
||
24AC2329000
|
heap
|
page read and write
|
||
20047D37000
|
heap
|
page read and write
|
||
24AC1FC0000
|
heap
|
page read and write
|
||
23F1437F000
|
heap
|
page read and write
|
||
23F14377000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
A1E000
|
stack
|
page read and write
|
||
47B0000
|
heap
|
page read and write
|
||
448D000
|
trusted library allocation
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
EF5000
|
heap
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
4C2E000
|
stack
|
page read and write
|
||
20047D40000
|
heap
|
page read and write
|
||
1926D6B0000
|
heap
|
page read and write
|
||
80788FC000
|
stack
|
page read and write
|
||
262FC43D000
|
heap
|
page read and write
|
||
23F141F0000
|
remote allocation
|
page read and write
|
||
807837E000
|
stack
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
23F13A00000
|
heap
|
page read and write
|
||
1926D86F000
|
heap
|
page read and write
|
||
4E4D000
|
trusted library allocation
|
page read and write
|
||
262FC474000
|
heap
|
page read and write
|
||
338F000
|
stack
|
page read and write
|
||
23F13A3C000
|
heap
|
page read and write
|
||
24AC2F00000
|
heap
|
page readonly
|
||
2920000
|
trusted library allocation
|
page read and write
|
||
49EC000
|
stack
|
page read and write
|
||
2A8E000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
2A6A000
|
heap
|
page read and write
|
||
22A90EB0000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
23F1439A000
|
heap
|
page read and write
|
||
1926D913000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
23F13A4F000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
4E36000
|
trusted library allocation
|
page read and write
|
||
4F30000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
F05000
|
heap
|
page read and write
|
||
4E24000
|
trusted library allocation
|
page read and write
|
||
DFA000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
23F1434C000
|
heap
|
page read and write
|
||
1926D813000
|
heap
|
page read and write
|
||
22A91055000
|
heap
|
page read and write
|
||
F07000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
23F13B02000
|
heap
|
page read and write
|
||
20047D51000
|
heap
|
page read and write
|
||
23F14373000
|
heap
|
page read and write
|
||
A7A000
|
stack
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
24AC2030000
|
trusted library allocation
|
page read and write
|
||
47F0000
|
heap
|
page read and write
|
||
23F13A4C000
|
heap
|
page read and write
|
||
23F13AC1000
|
heap
|
page read and write
|
||
20047D05000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
44B3000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
7F243F7000
|
stack
|
page read and write
|
||
47DE000
|
stack
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
1926E002000
|
trusted library allocation
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
23F141F0000
|
remote allocation
|
page read and write
|
||
29FA000
|
heap
|
page read and write
|
||
BE900FD000
|
stack
|
page read and write
|
||
54CE000
|
stack
|
page read and write
|
||
2228007F000
|
heap
|
page read and write
|
||
20047D5D000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
44B1000
|
heap
|
page read and write
|
||
23F13B13000
|
heap
|
page read and write
|
||
C7B000
|
stack
|
page read and write
|
||
23F14370000
|
heap
|
page read and write
|
||
23F14803000
|
heap
|
page read and write
|
||
22280000000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
4E15000
|
trusted library allocation
|
page read and write
|
||
23F13880000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
2227FE30000
|
heap
|
page read and write
|
||
20047D51000
|
heap
|
page read and write
|
||
23F1436F000
|
heap
|
page read and write
|
||
262FC310000
|
heap
|
page read and write
|
||
BE901FF000
|
stack
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
46B0000
|
direct allocation
|
page read and write
|
||
4E15000
|
trusted library allocation
|
page read and write
|
||
23F14384000
|
heap
|
page read and write
|
||
20047D43000
|
heap
|
page read and write
|
||
20047D40000
|
heap
|
page read and write
|
||
AFA000
|
heap
|
page read and write
|
||
BDF747E000
|
stack
|
page read and write
|
||
23F14803000
|
heap
|
page read and write
|
||
4E26000
|
trusted library allocation
|
page read and write
|
||
24AC20DF000
|
heap
|
page read and write
|
||
23F14375000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
2227FE40000
|
heap
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
4920000
|
trusted library allocation
|
page read and write
|
||
63D000
|
stack
|
page read and write
|
||
B23000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
7F244FF000
|
stack
|
page read and write
|
||
2560000
|
remote allocation
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
BE8FEFB000
|
stack
|
page read and write
|
||
341D000
|
heap
|
page read and write
|
||
23F14202000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
D3F000
|
stack
|
page read and write
|
||
C3A000
|
stack
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
B30000
|
heap
|
page read and write
|
||
289C78B000
|
stack
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
AB505F9000
|
stack
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
23F1437D000
|
heap
|
page read and write
|
||
23F14322000
|
heap
|
page read and write
|
||
4D9F000
|
stack
|
page read and write
|
||
24AC2090000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
F19000
|
heap
|
page read and write
|
||
23F14371000
|
heap
|
page read and write
|
||
EDA000
|
heap
|
page read and write
|
||
23F13870000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
61B0000
|
trusted library allocation
|
page read and write
|
||
95D2BFC000
|
stack
|
page read and write
|
||
BDF718E000
|
stack
|
page read and write
|
||
AB50779000
|
stack
|
page read and write
|
||
23F13A83000
|
heap
|
page read and write
|
||
95D29F7000
|
stack
|
page read and write
|
||
22A90FB0000
|
trusted library allocation
|
page read and write
|
||
1926D895000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
1002B000
|
unkown
|
page readonly
|
||
23F14802000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
3438000
|
heap
|
page read and write
|
||
49BF000
|
stack
|
page read and write
|
||
22A91000000
|
heap
|
page read and write
|
||
49C0000
|
trusted library allocation
|
page read and write
|
||
4E1D000
|
trusted library allocation
|
page read and write
|
||
23F14380000
|
heap
|
page read and write
|
||
23F1437B000
|
heap
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
1003C000
|
unkown
|
page readonly
|
||
22280108000
|
heap
|
page read and write
|
||
23F14386000
|
heap
|
page read and write
|
||
262FC47C000
|
heap
|
page read and write
|
||
22280102000
|
heap
|
page read and write
|
||
4E24000
|
trusted library allocation
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
23F14373000
|
heap
|
page read and write
|
||
80789FF000
|
stack
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
B3B000
|
heap
|
page read and write
|
||
3305000
|
heap
|
page read and write
|
||
96E000
|
stack
|
page read and write
|
||
24AC20DF000
|
heap
|
page read and write
|
||
120E000
|
stack
|
page read and write
|
||
22280802000
|
trusted library allocation
|
page read and write
|
||
4DF3000
|
trusted library allocation
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
22A91029000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
29E3000
|
heap
|
page read and write
|
||
23F14388000
|
heap
|
page read and write
|
||
22A91013000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
9AF000
|
stack
|
page read and write
|
||
AC0000
|
trusted library allocation
|
page read and write
|
||
57C000
|
stack
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
20047D2B000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
4E1D000
|
trusted library allocation
|
page read and write
|
||
23F14844000
|
heap
|
page read and write
|
||
4E24000
|
trusted library allocation
|
page read and write
|
||
95D28FA000
|
stack
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
F12000
|
heap
|
page read and write
|
||
95D2CFA000
|
stack
|
page read and write
|
||
F05000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
4E1D000
|
trusted library allocation
|
page read and write
|
||
24AC2F70000
|
trusted library allocation
|
page read and write
|
||
22280057000
|
heap
|
page read and write
|
||
1926D884000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
1002B000
|
unkown
|
page readonly
|
||
44B1000
|
heap
|
page read and write
|
||
23F1437D000
|
heap
|
page read and write
|
||
4E1D000
|
trusted library allocation
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
80786F7000
|
stack
|
page read and write
|
||
44C0000
|
heap
|
page read and write
|
||
2ADB000
|
heap
|
page read and write
|
||
44B1000
|
heap
|
page read and write
|
||
AB5067E000
|
stack
|
page read and write
|
||
20047D46000
|
heap
|
page read and write
|
||
44B0000
|
heap
|
page read and write
|
||
10036000
|
unkown
|
page read and write
|
||
33B0000
|
heap
|
page read and write
|
||
BE8FFFE000
|
stack
|
page read and write
|
||
4C40000
|
remote allocation
|
page read and write
|
||
2A43000
|
heap
|
page read and write
|
||
24AC1FA0000
|
heap
|
page read and write
|
||
24AC2325000
|
heap
|
page read and write
|
||
860000
|
trusted library allocation
|
page read and write
|
||
23F14357000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
23F13A29000
|
heap
|
page read and write
|
||
A3EB000
|
trusted library allocation
|
page read and write
|
||
23F13AE2000
|
heap
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
A74E000
|
trusted library allocation
|
page read and write
|
||
23F14381000
|
heap
|
page read and write
|
||
23F1437A000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
1003C000
|
unkown
|
page readonly
|
There are 685 hidden memdumps, click here to show them.