Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
548IrCt4hj.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
MPEG-4 LOAS
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x9292e26a, page size 16384, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\548IrCt4hj.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\548IrCt4hj.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllCanUnloadNow
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZPLPsNKH\eFntQ.dll"
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllGetClassObject
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllRegisterServer
|
||
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\548IrCt4hj.dll"
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\548IrCt4hj.dll",#1
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://174.138.33.49/Z
|
unknown
|
||
https://174.138.33.49:7080/F
|
unknown
|
||
https://174.138.33.49:7080/Only
|
unknown
|
||
https://174.138.33.49:7080/r
|
unknown
|
||
https://174.138.33.49:7080/p
|
unknown
|
||
https://www.disneyplus.com/legal/your-california-privacy-rights
|
unknown
|
||
https://www.disneyplus.com/legal/privacy-policy
|
unknown
|
||
https://174.138.33.49:7080/
|
unknown
|
||
https://www.hotspotshield.com/terms/
|
unknown
|
||
https://www.pango.co/privacy
|
unknown
|
||
https://disneyplus.com/legal.
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://www.tiktok.com/legal/report/feedback
|
unknown
|
||
http://help.disneyplus.com.
|
unknown
|
||
https://support.hotspotshield.com/
|
unknown
|
||
https://174.138.33.49/
|
unknown
|
There are 6 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
157.230.99.206
|
unknown
|
United States
|
||
157.245.111.0
|
unknown
|
United States
|
||
54.37.106.167
|
unknown
|
France
|
||
188.165.79.151
|
unknown
|
France
|
||
202.29.239.162
|
unknown
|
Thailand
|
||
174.138.33.49
|
unknown
|
United States
|
||
43.129.209.178
|
unknown
|
Japan
|
||
103.41.204.169
|
unknown
|
Indonesia
|
||
5.253.30.17
|
unknown
|
Latvia
|
||
85.214.67.203
|
unknown
|
Germany
|
||
103.56.149.105
|
unknown
|
Indonesia
|
||
83.229.80.93
|
unknown
|
United Kingdom
|
||
85.25.120.45
|
unknown
|
Germany
|
||
198.199.70.22
|
unknown
|
United States
|
||
37.187.114.15
|
unknown
|
France
|
||
93.104.209.107
|
unknown
|
Germany
|
||
175.126.176.79
|
unknown
|
Korea Republic of
|
||
139.196.72.155
|
unknown
|
China
|
||
128.199.242.164
|
unknown
|
United Kingdom
|
||
165.232.185.110
|
unknown
|
United States
|
||
104.248.225.227
|
unknown
|
United States
|
||
178.238.225.252
|
unknown
|
Germany
|
||
128.199.217.206
|
unknown
|
United Kingdom
|
||
190.145.8.4
|
unknown
|
Colombia
|
||
103.224.241.74
|
unknown
|
India
|
||
103.71.99.57
|
unknown
|
India
|
||
190.107.19.179
|
unknown
|
Colombia
|
||
210.57.209.142
|
unknown
|
Indonesia
|
||
202.28.34.99
|
unknown
|
Thailand
|
||
87.106.97.83
|
unknown
|
Germany
|
||
103.254.12.236
|
unknown
|
Viet Nam
|
||
103.85.95.4
|
unknown
|
Indonesia
|
||
54.37.228.122
|
unknown
|
France
|
||
202.134.4.210
|
unknown
|
Indonesia
|
||
88.217.172.165
|
unknown
|
Germany
|
||
195.77.239.39
|
unknown
|
Spain
|
||
78.47.204.80
|
unknown
|
Germany
|
||
139.59.80.108
|
unknown
|
Singapore
|
||
104.244.79.94
|
unknown
|
United States
|
||
37.44.244.177
|
unknown
|
Germany
|
||
178.62.112.199
|
unknown
|
European Union
|
||
64.227.55.231
|
unknown
|
United States
|
||
192.168.2.1
|
unknown
|
unknown
|
||
127.0.0.1
|
unknown
|
unknown
|
There are 34 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1E034440000
|
direct allocation
|
page execute and read and write
|
||
C20000
|
direct allocation
|
page execute and read and write
|
||
1120000
|
direct allocation
|
page execute and read and write
|
||
1F33EB00000
|
direct allocation
|
page execute and read and write
|
||
24B1000
|
direct allocation
|
page execute read
|
||
1F33EC51000
|
direct allocation
|
page execute read
|
||
1E034471000
|
direct allocation
|
page execute read
|
||
1151000
|
direct allocation
|
page execute read
|
||
AEB000
|
heap
|
page read and write
|
||
20D64040000
|
heap
|
page read and write
|
||
1F33EB30000
|
heap
|
page readonly
|
||
740437B000
|
stack
|
page read and write
|
||
5763D77000
|
stack
|
page read and write
|
||
17EF4181000
|
heap
|
page read and write
|
||
20ADC7B3000
|
heap
|
page read and write
|
||
15F2D57B000
|
heap
|
page read and write
|
||
25FAEAB0000
|
heap
|
page read and write
|
||
E48A97E000
|
stack
|
page read and write
|
||
15F2CC71000
|
heap
|
page read and write
|
||
2582EC70000
|
heap
|
page read and write
|
||
18008C000
|
unkown
|
page readonly
|
||
21816E26000
|
heap
|
page read and write
|
||
18894A9D000
|
heap
|
page read and write
|
||
15F2D402000
|
heap
|
page read and write
|
||
1E034195000
|
heap
|
page read and write
|
||
21816BD0000
|
heap
|
page read and write
|
||
1E0343E0000
|
heap
|
page read and write
|
||
15F2CC51000
|
heap
|
page read and write
|
||
15F2D576000
|
heap
|
page read and write
|
||
15F2D585000
|
heap
|
page read and write
|
||
1D31E950000
|
trusted library allocation
|
page read and write
|
||
C75000
|
heap
|
page read and write
|
||
1D31EA56000
|
heap
|
page read and write
|
||
5763C7F000
|
stack
|
page read and write
|
||
2582E9BC000
|
heap
|
page read and write
|
||
BEEEE7B000
|
stack
|
page read and write
|
||
2582E9DB000
|
heap
|
page read and write
|
||
1800B5000
|
unkown
|
page readonly
|
||
4E0AB5E000
|
stack
|
page read and write
|
||
15F2D598000
|
heap
|
page read and write
|
||
18894A47000
|
heap
|
page read and write
|
||
15F2CCE5000
|
heap
|
page read and write
|
||
18893456000
|
heap
|
page read and write
|
||
1E650229000
|
heap
|
page read and write
|
||
2EA6BFF000
|
stack
|
page read and write
|
||
15F2CCE8000
|
heap
|
page read and write
|
||
15F2CCF8000
|
heap
|
page read and write
|
||
18894A00000
|
heap
|
page read and write
|
||
1D31EB13000
|
heap
|
page read and write
|
||
17EF4110000
|
heap
|
page read and write
|
||
E48A59B000
|
stack
|
page read and write
|
||
21816D70000
|
heap
|
page read and write
|
||
15F2D57E000
|
heap
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
C405AFE000
|
stack
|
page read and write
|
||
29EE2506000
|
heap
|
page read and write
|
||
29EE24F9000
|
heap
|
page read and write
|
||
188934EC000
|
heap
|
page read and write
|
||
20D6427E000
|
heap
|
page read and write
|
||
29EE5920000
|
heap
|
page read and write
|
||
15F2D599000
|
heap
|
page read and write
|
||
21816E09000
|
heap
|
page read and write
|
||
18893400000
|
heap
|
page read and write
|
||
15F2CC00000
|
heap
|
page read and write
|
||
1E650266000
|
heap
|
page read and write
|
||
2582E935000
|
heap
|
page read and write
|
||
180000000
|
unkown
|
page readonly
|
||
1E650269000
|
heap
|
page read and write
|
||
2880000
|
remote allocation
|
page read and write
|
||
1889342A000
|
heap
|
page read and write
|
||
2582F090000
|
remote allocation
|
page read and write
|
||
15F2D59A000
|
heap
|
page read and write
|
||
233737DB000
|
heap
|
page read and write
|
||
18000A000
|
unkown
|
page execute read
|
||
740407C000
|
stack
|
page read and write
|
||
15F2CC53000
|
heap
|
page read and write
|
||
1E034190000
|
heap
|
page read and write
|
||
20D6426E000
|
heap
|
page read and write
|
||
29EE2710000
|
heap
|
page read and write
|
||
15F2D3F0000
|
remote allocation
|
page read and write
|
||
15F2D586000
|
heap
|
page read and write
|
||
2EA74FB000
|
stack
|
page read and write
|
||
29EE2502000
|
heap
|
page read and write
|
||
E80000
|
trusted library allocation
|
page read and write
|
||
18893F13000
|
heap
|
page read and write
|
||
15F2D5BB000
|
heap
|
page read and write
|
||
15F2CBE0000
|
trusted library allocation
|
page read and write
|
||
2582E91D000
|
heap
|
page read and write
|
||
15F2D5A8000
|
heap
|
page read and write
|
||
18008C000
|
unkown
|
page readonly
|
||
15F2D577000
|
heap
|
page read and write
|
||
1800BB000
|
unkown
|
page readonly
|
||
18894B02000
|
heap
|
page read and write
|
||
188934B9000
|
heap
|
page read and write
|
||
25FAEC4B000
|
heap
|
page read and write
|
||
18893F18000
|
heap
|
page read and write
|
||
17EF4170000
|
heap
|
page read and write
|
||
4E0B077000
|
stack
|
page read and write
|
||
2ABA8FE000
|
stack
|
page read and write
|
||
15F2D57D000
|
heap
|
page read and write
|
||
15F2D584000
|
heap
|
page read and write
|
||
1800BB000
|
unkown
|
page readonly
|
||
C50000
|
heap
|
page readonly
|
||
15F2D581000
|
heap
|
page read and write
|
||
20D64300000
|
heap
|
page read and write
|
||
15F2CC50000
|
heap
|
page read and write
|
||
15F2D51B000
|
heap
|
page read and write
|
||
15F2D582000
|
heap
|
page read and write
|
||
18894A9A000
|
heap
|
page read and write
|
||
1E65025A000
|
heap
|
page read and write
|
||
15F2D581000
|
heap
|
page read and write
|
||
5763E7E000
|
stack
|
page read and write
|
||
15F2CCB0000
|
heap
|
page read and write
|
||
17EF41B2000
|
heap
|
page read and write
|
||
15F2D58B000
|
heap
|
page read and write
|
||
1F33EAF0000
|
direct allocation
|
page execute and read and write
|
||
C40531B000
|
stack
|
page read and write
|
||
29EE2715000
|
heap
|
page read and write
|
||
2582F400000
|
heap
|
page read and write
|
||
15F2D574000
|
heap
|
page read and write
|
||
1D31EA3C000
|
heap
|
page read and write
|
||
15F2D583000
|
heap
|
page read and write
|
||
18893507000
|
heap
|
page read and write
|
||
C405BFF000
|
stack
|
page read and write
|
||
E9B000
|
heap
|
page read and write
|
||
1E650200000
|
heap
|
page read and write
|
||
2582E9BC000
|
heap
|
page read and write
|
||
15F2D58B000
|
heap
|
page read and write
|
||
7404477000
|
stack
|
page read and write
|
||
21816DF7000
|
heap
|
page read and write
|
||
1CF60190000
|
heap
|
page read and write
|
||
B4B000
|
heap
|
page read and write
|
||
18898E50000
|
trusted library allocation
|
page read and write
|
||
2EA71FA000
|
stack
|
page read and write
|
||
1CF601F8000
|
heap
|
page read and write
|
||
F72F67E000
|
stack
|
page read and write
|
||
1185000
|
heap
|
page read and write
|
||
2582E9BA000
|
heap
|
page read and write
|
||
28EF000
|
stack
|
page read and write
|
||
F72F77F000
|
stack
|
page read and write
|
||
233737D0000
|
heap
|
page read and write
|
||
5885C7C000
|
stack
|
page read and write
|
||
15F2D5B0000
|
heap
|
page read and write
|
||
25FAEC4D000
|
heap
|
page read and write
|
||
15F2D5A2000
|
heap
|
page read and write
|
||
2E43AFB000
|
stack
|
page read and write
|
||
1E035E20000
|
heap
|
page read and write
|
||
180000000
|
unkown
|
page readonly
|
||
15F2D589000
|
heap
|
page read and write
|
||
117F000
|
direct allocation
|
page readonly
|
||
15F2D586000
|
heap
|
page read and write
|
||
21816E1E000
|
heap
|
page read and write
|
||
2880000
|
remote allocation
|
page read and write
|
||
2820000
|
trusted library allocation
|
page read and write
|
||
188934AD000
|
heap
|
page read and write
|
||
15F2CC3C000
|
heap
|
page read and write
|
||
15F2D3F0000
|
remote allocation
|
page read and write
|
||
2ABA87D000
|
stack
|
page read and write
|
||
1C2E8820000
|
trusted library allocation
|
page read and write
|
||
18894A54000
|
heap
|
page read and write
|
||
2EA78FD000
|
stack
|
page read and write
|
||
15F2D59B000
|
heap
|
page read and write
|
||
17EF419F000
|
heap
|
page read and write
|
||
25FAED08000
|
heap
|
page read and write
|
||
15F2D5A8000
|
heap
|
page read and write
|
||
20D64A02000
|
trusted library allocation
|
page read and write
|
||
1E650268000
|
heap
|
page read and write
|
||
1CF60480000
|
heap
|
page read and write
|
||
18898D2E000
|
trusted library allocation
|
page read and write
|
||
15F2D581000
|
heap
|
page read and write
|
||
18898E30000
|
trusted library allocation
|
page read and write
|
||
1C2E84C0000
|
trusted library allocation
|
page read and write
|
||
2181A7F0000
|
heap
|
page read and write
|
||
17EF41A1000
|
heap
|
page read and write
|
||
2582E9DD000
|
heap
|
page read and write
|
||
18893DF0000
|
trusted library allocation
|
page read and write
|
||
B21000
|
heap
|
page read and write
|
||
2582E953000
|
heap
|
page read and write
|
||
F72F3FB000
|
stack
|
page read and write
|
||
15F2DA44000
|
heap
|
page read and write
|
||
18894AD7000
|
heap
|
page read and write
|
||
15F2D589000
|
heap
|
page read and write
|
||
188934BB000
|
heap
|
page read and write
|
||
18898DF0000
|
trusted library allocation
|
page read and write
|
||
1E65025C000
|
heap
|
page read and write
|
||
2582F401000
|
heap
|
page read and write
|
||
2582E926000
|
heap
|
page read and write
|
||
18898E60000
|
trusted library allocation
|
page read and write
|
||
29EE40C0000
|
heap
|
page read and write
|
||
2582E979000
|
heap
|
page read and write
|
||
2582E9BA000
|
heap
|
page read and write
|
||
2582E979000
|
heap
|
page read and write
|
||
2EA73FA000
|
stack
|
page read and write
|
||
1E650A02000
|
trusted library allocation
|
page read and write
|
||
64EF2F9000
|
stack
|
page read and write
|
||
1F33ED20000
|
heap
|
page read and write
|
||
15F2D586000
|
heap
|
page read and write
|
||
1778DCC000
|
stack
|
page read and write
|
||
2582E8F0000
|
heap
|
page read and write
|
||
23373690000
|
heap
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
2EA7AFE000
|
stack
|
page read and write
|
||
2ABA58C000
|
stack
|
page read and write
|
||
588578F000
|
stack
|
page read and write
|
||
15F2D598000
|
heap
|
page read and write
|
||
88D0000
|
heap
|
page read and write
|
||
21816E03000
|
heap
|
page read and write
|
||
15F2D585000
|
heap
|
page read and write
|
||
28B8000
|
heap
|
page read and write
|
||
1C2E8420000
|
heap
|
page read and write
|
||
18893E15000
|
heap
|
page read and write
|
||
18894A47000
|
heap
|
page read and write
|
||
18893413000
|
heap
|
page read and write
|
||
18893DF3000
|
trusted library allocation
|
page read and write
|
||
1800B1000
|
unkown
|
page read and write
|
||
21816E0D000
|
heap
|
page read and write
|
||
1F33EC7F000
|
direct allocation
|
page readonly
|
||
15F2CCCD000
|
heap
|
page read and write
|
||
15F2CCE9000
|
heap
|
page read and write
|
||
5763BFB000
|
stack
|
page read and write
|
||
64EF479000
|
stack
|
page read and write
|
||
15F2D51D000
|
heap
|
page read and write
|
||
15F2D574000
|
heap
|
page read and write
|
||
20D64250000
|
heap
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
1D31EA4D000
|
heap
|
page read and write
|
||
18894AF8000
|
heap
|
page read and write
|
||
29EE2511000
|
heap
|
page read and write
|
||
188934B8000
|
heap
|
page read and write
|
||
2582E90A000
|
heap
|
page read and write
|
||
7C0000
|
remote allocation
|
page read and write
|
||
1E650257000
|
heap
|
page read and write
|
||
20D64308000
|
heap
|
page read and write
|
||
18898D40000
|
trusted library allocation
|
page read and write
|
||
1CF60485000
|
heap
|
page read and write
|
||
C4059F7000
|
stack
|
page read and write
|
||
603F27A000
|
stack
|
page read and write
|
||
21819FE0000
|
heap
|
page read and write
|
||
15F2D58C000
|
heap
|
page read and write
|
||
20ADC550000
|
heap
|
page read and write
|
||
1C2E9310000
|
trusted library allocation
|
page read and write
|
||
18894C00000
|
trusted library allocation
|
page read and write
|
||
21816E09000
|
heap
|
page read and write
|
||
1CF601F0000
|
heap
|
page read and write
|
||
20D641B0000
|
trusted library allocation
|
page read and write
|
||
15F2CD16000
|
heap
|
page read and write
|
||
1C2E8750000
|
trusted library allocation
|
page read and write
|
||
18898E80000
|
remote allocation
|
page read and write
|
||
17EF41B0000
|
heap
|
page read and write
|
||
21816DFA000
|
heap
|
page read and write
|
||
18898DF0000
|
trusted library allocation
|
page read and write
|
||
15F2D58A000
|
heap
|
page read and write
|
||
15F2D5A9000
|
heap
|
page read and write
|
||
18894A65000
|
heap
|
page read and write
|
||
21816E04000
|
heap
|
page read and write
|
||
1889349C000
|
heap
|
page read and write
|
||
15F2DA20000
|
heap
|
page read and write
|
||
18898D28000
|
trusted library allocation
|
page read and write
|
||
BEEE9EA000
|
stack
|
page read and write
|
||
1C2E84B0000
|
trusted library allocation
|
page read and write
|
||
180088000
|
unkown
|
page execute read
|
||
1889347F000
|
heap
|
page read and write
|
||
25FAED00000
|
heap
|
page read and write
|
||
15F2DA02000
|
heap
|
page read and write
|
||
20ADC7AD000
|
heap
|
page read and write
|
||
20D640B0000
|
heap
|
page read and write
|
||
1D31EB02000
|
heap
|
page read and write
|
||
1D31EB00000
|
heap
|
page read and write
|
||
5885A7E000
|
stack
|
page read and write
|
||
15F2D5A2000
|
heap
|
page read and write
|
||
21816DFE000
|
heap
|
page read and write
|
||
15F2D57B000
|
heap
|
page read and write
|
||
281E000
|
stack
|
page read and write
|
||
4E0AADC000
|
stack
|
page read and write
|
||
25FAEC00000
|
heap
|
page read and write
|
||
2E43CFB000
|
stack
|
page read and write
|
||
15F2D5A9000
|
heap
|
page read and write
|
||
15F2D5A9000
|
heap
|
page read and write
|
||
15F2D597000
|
heap
|
page read and write
|
||
15F2CA80000
|
heap
|
page read and write
|
||
15F2D59B000
|
heap
|
page read and write
|
||
1D31EA63000
|
heap
|
page read and write
|
||
20D64313000
|
heap
|
page read and write
|
||
1C2E8740000
|
heap
|
page readonly
|
||
18898F70000
|
trusted library allocation
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
15F2DA02000
|
heap
|
page read and write
|
||
21816E04000
|
heap
|
page read and write
|
||
25FAEA50000
|
heap
|
page read and write
|
||
180007000
|
unkown
|
page execute read
|
||
29EE24E0000
|
heap
|
page read and write
|
||
F34000
|
heap
|
page read and write
|
||
C10000
|
direct allocation
|
page execute and read and write
|
||
1E6500A0000
|
heap
|
page read and write
|
||
B0002CC000
|
stack
|
page read and write
|
||
20D6423C000
|
heap
|
page read and write
|
||
17EF41B4000
|
heap
|
page read and write
|
||
2ABA97E000
|
stack
|
page read and write
|
||
15F2D54C000
|
heap
|
page read and write
|
||
15F2D572000
|
heap
|
page read and write
|
||
15F2D57C000
|
heap
|
page read and write
|
||
29EE24E8000
|
heap
|
page read and write
|
||
15F2DA19000
|
heap
|
page read and write
|
||
15F2CC29000
|
heap
|
page read and write
|
||
EBE000
|
heap
|
page read and write
|
||
29EE6130000
|
heap
|
page read and write
|
||
1F33EAA0000
|
heap
|
page read and write
|
||
1C2E8730000
|
trusted library allocation
|
page read and write
|
||
F72F6FF000
|
stack
|
page read and write
|
||
1C2E87B0000
|
trusted library allocation
|
page read and write
|
||
1800B5000
|
unkown
|
page readonly
|
||
29EE2490000
|
heap
|
page read and write
|
||
5885BFF000
|
stack
|
page read and write
|
||
588570A000
|
stack
|
page read and write
|
||
2582E935000
|
heap
|
page read and write
|
||
29EE24FD000
|
heap
|
page read and write
|
||
18894AA9000
|
heap
|
page read and write
|
||
1E650313000
|
heap
|
page read and write
|
||
21816E27000
|
heap
|
page read and write
|
||
BEEECFE000
|
stack
|
page read and write
|
||
15F2D5AA000
|
heap
|
page read and write
|
||
18894AB0000
|
heap
|
page read and write
|
||
15F2D57C000
|
heap
|
page read and write
|
||
15F2CC4D000
|
heap
|
page read and write
|
||
188933B0000
|
trusted library allocation
|
page read and write
|
||
15F2DA02000
|
heap
|
page read and write
|
||
18893F02000
|
heap
|
page read and write
|
||
21816E0D000
|
heap
|
page read and write
|
||
18893E00000
|
heap
|
page read and write
|
||
15F2D572000
|
heap
|
page read and write
|
||
17EF41A1000
|
heap
|
page read and write
|
||
20ADC690000
|
heap
|
page read and write
|
||
2582E953000
|
heap
|
page read and write
|
||
1E03449D000
|
direct allocation
|
page readonly
|
||
B75000
|
heap
|
page read and write
|
||
18894B00000
|
heap
|
page read and write
|
||
2582EC75000
|
heap
|
page read and write
|
||
18893F18000
|
heap
|
page read and write
|
||
15F2D57B000
|
heap
|
page read and write
|
||
8419000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
2EA6F78000
|
stack
|
page read and write
|
||
740467A000
|
stack
|
page read and write
|
||
15F2D526000
|
heap
|
page read and write
|
||
24DD000
|
direct allocation
|
page readonly
|
||
117D000
|
direct allocation
|
page readonly
|
||
17EF4192000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
20D64280000
|
heap
|
page read and write
|
||
1C2E83C0000
|
trusted library allocation
|
page read and write
|
||
79A000
|
stack
|
page read and write
|
||
15F2D5BA000
|
heap
|
page read and write
|
||
25FAEC46000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
15F2CD02000
|
heap
|
page read and write
|
||
C40539E000
|
stack
|
page read and write
|
||
20D64200000
|
heap
|
page read and write
|
||
15F2D3F0000
|
remote allocation
|
page read and write
|
||
15F2D5A1000
|
heap
|
page read and write
|
||
15F2D59A000
|
heap
|
page read and write
|
||
18893E02000
|
heap
|
page read and write
|
||
1D31EA6F000
|
heap
|
page read and write
|
||
851C000
|
stack
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
24DE000
|
direct allocation
|
page read and write
|
||
17EF4196000
|
heap
|
page read and write
|
||
BC7000
|
heap
|
page read and write
|
||
20D64050000
|
heap
|
page read and write
|
||
18893F04000
|
heap
|
page read and write
|
||
ED8000
|
heap
|
page read and write
|
||
20D64213000
|
heap
|
page read and write
|
||
18898D50000
|
trusted library allocation
|
page read and write
|
||
2EA70FA000
|
stack
|
page read and write
|
||
29EE271B000
|
heap
|
page read and write
|
||
1E650300000
|
heap
|
page read and write
|
||
740457F000
|
stack
|
page read and write
|
||
1E6509A0000
|
trusted library allocation
|
page read and write
|
||
25FAEC29000
|
heap
|
page read and write
|
||
18894ADE000
|
heap
|
page read and write
|
||
15F2D598000
|
heap
|
page read and write
|
||
20D6424B000
|
heap
|
page read and write
|
||
15F2D585000
|
heap
|
page read and write
|
||
4E0B378000
|
stack
|
page read and write
|
||
15F2D57F000
|
heap
|
page read and write
|
||
1C2E8440000
|
heap
|
page read and write
|
||
18893498000
|
heap
|
page read and write
|
||
18893310000
|
heap
|
page read and write
|
||
64EF279000
|
stack
|
page read and write
|
||
21816E12000
|
heap
|
page read and write
|
||
1E65023C000
|
heap
|
page read and write
|
||
180001000
|
unkown
|
page execute read
|
||
20D6422A000
|
heap
|
page read and write
|
||
879F000
|
stack
|
page read and write
|
||
17EF41AF000
|
heap
|
page read and write
|
||
25FAED13000
|
heap
|
page read and write
|
||
1D31EA00000
|
heap
|
page read and write
|
||
1D31EA28000
|
heap
|
page read and write
|
||
188934C9000
|
heap
|
page read and write
|
||
18893488000
|
heap
|
page read and write
|
||
1C2E852D000
|
heap
|
page read and write
|
||
21816DB0000
|
heap
|
page read and write
|
||
25FAEA40000
|
heap
|
page read and write
|
||
18898D20000
|
trusted library allocation
|
page read and write
|
||
18898E40000
|
trusted library allocation
|
page read and write
|
||
15F2CCC4000
|
heap
|
page read and write
|
||
180007000
|
unkown
|
page execute read
|
||
15F2D597000
|
heap
|
page read and write
|
||
15F2D587000
|
heap
|
page read and write
|
||
21816D7B000
|
heap
|
page read and write
|
||
2582E922000
|
heap
|
page read and write
|
||
29EE2502000
|
heap
|
page read and write
|
||
BEEEDFC000
|
stack
|
page read and write
|
||
B75000
|
heap
|
page read and write
|
||
18898E80000
|
remote allocation
|
page read and write
|
||
296F000
|
stack
|
page read and write
|
||
15F2D5A9000
|
heap
|
page read and write
|
||
B00077B000
|
stack
|
page read and write
|
||
15F2D54A000
|
heap
|
page read and write
|
||
2582E810000
|
heap
|
page read and write
|
||
21816DE0000
|
heap
|
page read and write
|
||
15F2D5D7000
|
heap
|
page read and write
|
||
15F2D58C000
|
heap
|
page read and write
|
||
24BB000
|
heap
|
page read and write
|
||
1F33EB50000
|
heap
|
page read and write
|
||
15F2D563000
|
heap
|
page read and write
|
||
15F2DA03000
|
heap
|
page read and write
|
||
1D31E7F0000
|
heap
|
page read and write
|
||
2582E979000
|
heap
|
page read and write
|
||
21816DE8000
|
heap
|
page read and write
|
||
2972000
|
heap
|
page read and write
|
||
18893F00000
|
heap
|
page read and write
|
||
BA9000
|
heap
|
page read and write
|
||
15F2DA02000
|
heap
|
page read and write
|
||
2582E8F8000
|
heap
|
page read and write
|
||
E48A8FE000
|
stack
|
page read and write
|
||
1E65025E000
|
heap
|
page read and write
|
||
25FAEC8A000
|
heap
|
page read and write
|
||
C4058FB000
|
stack
|
page read and write
|
||
603F3FE000
|
stack
|
page read and write
|
||
18898C10000
|
trusted library allocation
|
page read and write
|
||
25FAEC3C000
|
heap
|
page read and write
|
||
29EE24F6000
|
heap
|
page read and write
|
||
15F2D5B4000
|
heap
|
page read and write
|
||
29EE2503000
|
heap
|
page read and write
|
||
1F33EC50000
|
direct allocation
|
page read and write
|
||
15F2D570000
|
heap
|
page read and write
|
||
15F2D500000
|
heap
|
page read and write
|
||
1800BE000
|
unkown
|
page readonly
|
||
25FAEC55000
|
heap
|
page read and write
|
||
1D31F202000
|
trusted library allocation
|
page read and write
|
||
871E000
|
stack
|
page read and write
|
||
1C2E852D000
|
heap
|
page read and write
|
||
15F2D598000
|
heap
|
page read and write
|
||
15F2D597000
|
heap
|
page read and write
|
||
869E000
|
stack
|
page read and write
|
||
15F2DA02000
|
heap
|
page read and write
|
||
15F2D54F000
|
heap
|
page read and write
|
||
25FAEC13000
|
heap
|
page read and write
|
||
2820000
|
trusted library allocation
|
page read and write
|
||
15F2CCA5000
|
heap
|
page read and write
|
||
1E03449F000
|
direct allocation
|
page readonly
|
||
E20000
|
heap
|
page read and write
|
||
15F2CC4F000
|
heap
|
page read and write
|
||
17EF4140000
|
heap
|
page read and write
|
||
18893441000
|
heap
|
page read and write
|
||
BEEEC7E000
|
stack
|
page read and write
|
||
188934E0000
|
heap
|
page read and write
|
||
17EF4145000
|
heap
|
page read and write
|
||
15F2D59B000
|
heap
|
page read and write
|
||
15F2D5B0000
|
heap
|
page read and write
|
||
1C2E8536000
|
heap
|
page read and write
|
||
5763AFC000
|
stack
|
page read and write
|
||
18894980000
|
trusted library allocation
|
page read and write
|
||
23373AB5000
|
heap
|
page read and write
|
||
20ADC7A0000
|
heap
|
page read and write
|
||
C40577B000
|
stack
|
page read and write
|
||
15F2D5AD000
|
heap
|
page read and write
|
||
17EF419F000
|
heap
|
page read and write
|
||
15F2D596000
|
heap
|
page read and write
|
||
21816E0A000
|
heap
|
page read and write
|
||
20D64256000
|
heap
|
page read and write
|
||
B21000
|
heap
|
page read and write
|
||
25FAEC70000
|
heap
|
page read and write
|
||
15F2CC4B000
|
heap
|
page read and write
|
||
177907F000
|
stack
|
page read and write
|
||
15F2CC13000
|
heap
|
page read and write
|
||
21819FF0000
|
trusted library allocation
|
page read and write
|
||
18894AEE000
|
heap
|
page read and write
|
||
25FAF402000
|
trusted library allocation
|
page read and write
|
||
2ECB000
|
stack
|
page read and write
|
||
1E65025F000
|
heap
|
page read and write
|
||
18898D20000
|
trusted library allocation
|
page read and write
|
||
24DF000
|
direct allocation
|
page readonly
|
||
18898C00000
|
trusted library allocation
|
page read and write
|
||
1E650264000
|
heap
|
page read and write
|
||
AE5000
|
stack
|
page read and write
|
||
25FAEBB0000
|
trusted library allocation
|
page read and write
|
||
1C2E852D000
|
heap
|
page read and write
|
||
18000A000
|
unkown
|
page execute read
|
||
18898E80000
|
trusted library allocation
|
page read and write
|
||
29EE5930000
|
trusted library allocation
|
page read and write
|
||
29EE24FF000
|
heap
|
page read and write
|
||
1E650261000
|
heap
|
page read and write
|
||
2E439FB000
|
stack
|
page read and write
|
||
EFA000
|
heap
|
page read and write
|
||
1E65027A000
|
heap
|
page read and write
|
||
1C2E84D0000
|
trusted library allocation
|
page read and write
|
||
18898D50000
|
trusted library allocation
|
page read and write
|
||
24E0000
|
trusted library allocation
|
page read and write
|
||
18898E10000
|
trusted library allocation
|
page read and write
|
||
17EF40F0000
|
heap
|
page read and write
|
||
1E03BD9B000
|
heap
|
page read and write
|
||
E60000
|
direct allocation
|
page execute and read and write
|
||
57636CB000
|
stack
|
page read and write
|
||
25FAEC50000
|
heap
|
page read and write
|
||
1F33E940000
|
heap
|
page read and write
|
||
5885B79000
|
stack
|
page read and write
|
||
15F2D5A8000
|
heap
|
page read and write
|
||
18898E80000
|
remote allocation
|
page read and write
|
||
1C2E8819000
|
heap
|
page read and write
|
||
BA9000
|
heap
|
page read and write
|
||
23373AB0000
|
heap
|
page read and write
|
||
1800BE000
|
unkown
|
page readonly
|
||
18893514000
|
heap
|
page read and write
|
||
4E0ABDD000
|
stack
|
page read and write
|
||
21816D30000
|
heap
|
page read and write
|
||
4E0B4FC000
|
stack
|
page read and write
|
||
1E650287000
|
heap
|
page read and write
|
||
18898D64000
|
trusted library allocation
|
page read and write
|
||
1C2E8525000
|
heap
|
page read and write
|
||
1C2E83B0000
|
heap
|
page read and write
|
||
1F3406C3000
|
heap
|
page read and write
|
||
15F2D598000
|
heap
|
page read and write
|
||
15F2CCE2000
|
heap
|
page read and write
|
||
29EE250A000
|
heap
|
page read and write
|
||
15F2D598000
|
heap
|
page read and write
|
||
15F2CD08000
|
heap
|
page read and write
|
||
18894990000
|
trusted library allocation
|
page read and write
|
||
29EE5923000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
15F2D570000
|
heap
|
page read and write
|
||
29EE24B0000
|
heap
|
page read and write
|
||
1C2E84E0000
|
heap
|
page read and write
|
||
4E0B3FF000
|
unkown
|
page read and write
|
||
15F2CC55000
|
heap
|
page read and write
|
||
1E034430000
|
direct allocation
|
page execute and read and write
|
||
15F2CC8A000
|
heap
|
page read and write
|
||
21819FE3000
|
heap
|
page read and write
|
||
BB348FD000
|
stack
|
page read and write
|
||
1C2E8760000
|
trusted library allocation
|
page read and write
|
||
15F2CC4C000
|
heap
|
page read and write
|
||
2582E9BC000
|
heap
|
page read and write
|
||
1E0342C0000
|
heap
|
page read and write
|
||
15F2CAE0000
|
heap
|
page read and write
|
||
2E43BFE000
|
stack
|
page read and write
|
||
1D31EA02000
|
heap
|
page read and write
|
||
20D6422E000
|
heap
|
page read and write
|
||
21816E03000
|
heap
|
page read and write
|
||
C4057FE000
|
stack
|
page read and write
|
||
15F2D575000
|
heap
|
page read and write
|
||
4E0B27E000
|
stack
|
page read and write
|
||
1E034470000
|
direct allocation
|
page read and write
|
||
15F2DA00000
|
heap
|
page read and write
|
||
1CF60110000
|
heap
|
page read and write
|
||
2582F402000
|
heap
|
page read and write
|
||
15F2CC57000
|
heap
|
page read and write
|
||
B0006FE000
|
stack
|
page read and write
|
||
1E0344A0000
|
heap
|
page readonly
|
||
18898D60000
|
trusted library allocation
|
page read and write
|
||
64EEE9B000
|
stack
|
page read and write
|
||
EF7000
|
heap
|
page read and write
|
||
15F2CA70000
|
heap
|
page read and write
|
||
C60000
|
trusted library allocation
|
page read and write
|
||
17EF419F000
|
heap
|
page read and write
|
||
74040FD000
|
stack
|
page read and write
|
||
2E4F000
|
stack
|
page read and write
|
||
24A0000
|
heap
|
page read and write
|
||
18893485000
|
heap
|
page read and write
|
||
17EF4194000
|
heap
|
page read and write
|
||
15F2D5A1000
|
heap
|
page read and write
|
||
2820000
|
trusted library allocation
|
page read and write
|
||
1C2E8815000
|
heap
|
page read and write
|
||
18893320000
|
heap
|
page read and write
|
||
BEEEEFE000
|
stack
|
page read and write
|
||
18898D41000
|
trusted library allocation
|
page read and write
|
||
21816E26000
|
heap
|
page read and write
|
||
17EF41A1000
|
heap
|
page read and write
|
||
233738D0000
|
heap
|
page read and write
|
||
18898D60000
|
trusted library allocation
|
page read and write
|
||
1D31E7E0000
|
heap
|
page read and write
|
||
29EE250B000
|
heap
|
page read and write
|
||
1E650213000
|
heap
|
page read and write
|
||
1E650090000
|
heap
|
page read and write
|
||
2E4348C000
|
stack
|
page read and write
|
||
5885AF8000
|
stack
|
page read and write
|
||
B75000
|
heap
|
page read and write
|
||
18894AE5000
|
heap
|
page read and write
|
||
20D64302000
|
heap
|
page read and write
|
||
15F2CCBA000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
1F33EA80000
|
heap
|
page read and write
|
||
2582F090000
|
remote allocation
|
page read and write
|
||
C40567E000
|
stack
|
page read and write
|
||
1E650100000
|
heap
|
page read and write
|
||
EB5000
|
heap
|
page read and write
|
||
2EA6B7B000
|
stack
|
page read and write
|
||
1F33EC7D000
|
direct allocation
|
page readonly
|
||
15F2D5AA000
|
heap
|
page read and write
|
||
2582E95C000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
21816DFA000
|
heap
|
page read and write
|
||
18899000000
|
heap
|
page read and write
|
||
233738F0000
|
heap
|
page read and write
|
||
4E0B177000
|
stack
|
page read and write
|
||
29EE2420000
|
heap
|
page read and write
|
||
1E650308000
|
heap
|
page read and write
|
||
21816D10000
|
heap
|
page read and write
|
||
1E650302000
|
heap
|
page read and write
|
||
2582E8A0000
|
heap
|
page read and write
|
||
64EF37E000
|
stack
|
page read and write
|
||
BEEED7B000
|
stack
|
page read and write
|
||
57637CE000
|
stack
|
page read and write
|
||
E48A87E000
|
stack
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
15F2D582000
|
heap
|
page read and write
|
||
1E0342E0000
|
heap
|
page read and write
|
||
576374E000
|
stack
|
page read and write
|
||
15F2D5BC000
|
heap
|
page read and write
|
||
1E035E3D000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
25FAEC27000
|
heap
|
page read and write
|
||
2582E9BA000
|
heap
|
page read and write
|
||
15F2D5AA000
|
heap
|
page read and write
|
||
1E034180000
|
heap
|
page read and write
|
||
1800B1000
|
unkown
|
page read and write
|
||
1F346621000
|
heap
|
page read and write
|
||
2582F090000
|
remote allocation
|
page read and write
|
||
18898FB0000
|
trusted library allocation
|
page read and write
|
||
117E000
|
direct allocation
|
page read and write
|
||
E70000
|
heap
|
page readonly
|
||
BEEEF7E000
|
stack
|
page read and write
|
||
21816D75000
|
heap
|
page read and write
|
||
25FAEC7F000
|
heap
|
page read and write
|
||
188934A1000
|
heap
|
page read and write
|
||
1D31EA25000
|
heap
|
page read and write
|
||
603F47F000
|
stack
|
page read and write
|
||
18898E70000
|
trusted library allocation
|
page read and write
|
||
17EF4186000
|
heap
|
page read and write
|
||
20D6428A000
|
heap
|
page read and write
|
||
18894500000
|
trusted library allocation
|
page read and write
|
||
188934BB000
|
heap
|
page read and write
|
||
24B0000
|
direct allocation
|
page read and write
|
||
1C2E8536000
|
heap
|
page read and write
|
||
25FAED02000
|
heap
|
page read and write
|
||
4E0AF7E000
|
stack
|
page read and write
|
||
18898D44000
|
trusted library allocation
|
page read and write
|
||
17EF4186000
|
heap
|
page read and write
|
||
2EA72FE000
|
stack
|
page read and write
|
||
2880000
|
remote allocation
|
page read and write
|
||
15F2DA03000
|
heap
|
page read and write
|
||
1E0342E8000
|
heap
|
page read and write
|
||
1F33ED25000
|
heap
|
page read and write
|
||
1C2E84E9000
|
heap
|
page read and write
|
||
29EE2502000
|
heap
|
page read and write
|
||
1F3406B0000
|
heap
|
page read and write
|
||
1D31E850000
|
heap
|
page read and write
|
||
21816E03000
|
heap
|
page read and write
|
||
15F2D57B000
|
heap
|
page read and write
|
||
2582E956000
|
heap
|
page read and write
|
||
2DAC000
|
stack
|
page read and write
|
||
18894AE7000
|
heap
|
page read and write
|
||
15F2D57C000
|
heap
|
page read and write
|
||
7C0000
|
remote allocation
|
page read and write
|
||
29EE2502000
|
heap
|
page read and write
|
||
1E65024E000
|
heap
|
page read and write
|
||
F19000
|
heap
|
page read and write
|
||
29EE24F9000
|
heap
|
page read and write
|
||
B4D000
|
heap
|
page read and write
|
||
18894A43000
|
heap
|
page read and write
|
||
15F2DA02000
|
heap
|
page read and write
|
||
180088000
|
unkown
|
page execute read
|
||
1C2E84F1000
|
heap
|
page read and write
|
||
18898DF0000
|
trusted library allocation
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
1CF60170000
|
heap
|
page read and write
|
||
18893502000
|
heap
|
page read and write
|
||
5763F7F000
|
stack
|
page read and write
|
||
15F2D593000
|
heap
|
page read and write
|
||
18894A43000
|
heap
|
page read and write
|
||
18893380000
|
heap
|
page read and write
|
||
15F2D583000
|
heap
|
page read and write
|
||
2582E925000
|
heap
|
page read and write
|
||
2582F404000
|
heap
|
page read and write
|
||
15F2CCAC000
|
heap
|
page read and write
|
||
17EF4090000
|
heap
|
page read and write
|
||
1D31EA13000
|
heap
|
page read and write
|
||
15F2CD13000
|
heap
|
page read and write
|
||
180001000
|
unkown
|
page execute read
|
||
859B000
|
stack
|
page read and write
|
||
1C2E8810000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
15F2DA02000
|
heap
|
page read and write
|
||
1F33EB58000
|
heap
|
page read and write
|
||
2582E9DC000
|
heap
|
page read and write
|
||
2582E880000
|
heap
|
page read and write
|
||
740417E000
|
stack
|
page read and write
|
||
17790FF000
|
stack
|
page read and write
|
||
15F2D598000
|
heap
|
page read and write
|
||
15F2DA02000
|
heap
|
page read and write
|
||
17EF4195000
|
heap
|
page read and write
|
||
15F2D583000
|
heap
|
page read and write
|
There are 701 hidden memdumps, click here to show them.