Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
3sbn8ZI5nn.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\3sbn8ZI5nn.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\3sbn8ZI5nn.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\3sbn8ZI5nn.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\3sbn8ZI5nn.dll,DllRegisterServer
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AnqVDBzeQVYg\suEN.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\OePyddm\FhSZruvkFd.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\YMSlzINcbZQsPglHc\yBEIGVvdVsup.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\QBVSbmHeRpLG\chsmHcFLfM.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\AnqVDBzeQVYg\suEN.dll
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\UsQfes\NGOvoYPWjlP.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\RDczMDqHt\aAoqtcPuM.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\UYBDis\zUQXLCCaPRO.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\UyotLQPaxHMZcAcJw\vcAnFxvlnpwAYy.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\OkmLFCYLyqOEAi\VeCtOcqCU.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\RDczMDqHt\aAoqtcPuM.dll
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\CefliwalFHXv\dxxQ.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\3sbn8ZI5nn.dll",#1
|
||
C:\Program Files\Windows Defender\MpCmdRun.exe
|
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 10 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://172.105.115.71:8080/ka/dll
|
unknown
|
||
https://172.105.115.71:8080/pegvndisbtalf/wkglflelmiac/imeka/D
|
unknown
|
||
https://172.105.115.71:8080/pegvndisbtalf/wkglflelmiac/imeka/
|
unknown
|
||
https://172.105.115.71:8080/nyiusq/dopl/wsaloufw/hnwwqhclt/
|
unknown
|
||
https://172.105.115.71:8080/l
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.105.115.71
|
unknown
|
United States
|
||
188.165.79.151
|
unknown
|
France
|
||
196.44.98.190
|
unknown
|
Ghana
|
||
174.138.33.49
|
unknown
|
United States
|
||
36.67.23.59
|
unknown
|
Indonesia
|
||
103.41.204.169
|
unknown
|
Indonesia
|
||
85.214.67.203
|
unknown
|
Germany
|
||
83.229.80.93
|
unknown
|
United Kingdom
|
||
198.199.70.22
|
unknown
|
United States
|
||
93.104.209.107
|
unknown
|
Germany
|
||
186.250.48.5
|
unknown
|
Brazil
|
||
209.239.112.82
|
unknown
|
United States
|
||
175.126.176.79
|
unknown
|
Korea Republic of
|
||
128.199.242.164
|
unknown
|
United Kingdom
|
||
178.238.225.252
|
unknown
|
Germany
|
||
46.101.98.60
|
unknown
|
Netherlands
|
||
190.145.8.4
|
unknown
|
Colombia
|
||
82.98.180.154
|
unknown
|
Spain
|
||
103.71.99.57
|
unknown
|
India
|
||
87.106.97.83
|
unknown
|
Germany
|
||
103.254.12.236
|
unknown
|
Viet Nam
|
||
103.85.95.4
|
unknown
|
Indonesia
|
||
202.134.4.210
|
unknown
|
Indonesia
|
||
165.22.254.236
|
unknown
|
United States
|
||
78.47.204.80
|
unknown
|
Germany
|
||
118.98.72.86
|
unknown
|
Indonesia
|
||
139.59.80.108
|
unknown
|
Singapore
|
||
104.244.79.94
|
unknown
|
United States
|
||
37.44.244.177
|
unknown
|
Germany
|
||
51.75.33.122
|
unknown
|
France
|
||
160.16.143.191
|
unknown
|
Japan
|
||
103.56.149.105
|
unknown
|
Indonesia
|
||
85.25.120.45
|
unknown
|
Germany
|
||
139.196.72.155
|
unknown
|
China
|
||
115.178.55.22
|
unknown
|
Indonesia
|
||
103.126.216.86
|
unknown
|
Bangladesh
|
||
128.199.217.206
|
unknown
|
United Kingdom
|
||
114.79.130.68
|
unknown
|
India
|
||
103.224.241.74
|
unknown
|
India
|
||
210.57.209.142
|
unknown
|
Indonesia
|
||
202.28.34.99
|
unknown
|
Thailand
|
||
80.211.107.116
|
unknown
|
Italy
|
||
54.37.228.122
|
unknown
|
France
|
||
218.38.121.17
|
unknown
|
Korea Republic of
|
||
185.148.169.10
|
unknown
|
Germany
|
||
195.77.239.39
|
unknown
|
Spain
|
||
178.62.112.199
|
unknown
|
European Union
|
||
62.171.178.147
|
unknown
|
United Kingdom
|
||
64.227.55.231
|
unknown
|
United States
|
There are 39 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
suEN.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
aAoqtcPuM.dll
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
22A0000
|
direct allocation
|
page execute and read and write
|
||
10F0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
233574C0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
174A2860000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
195D8F40000
|
direct allocation
|
page execute and read and write
|
||
6B0000
|
direct allocation
|
page execute and read and write
|
||
765000
|
heap
|
page read and write
|
||
128E000
|
heap
|
page read and write
|
||
706000
|
heap
|
page read and write
|
||
76C000
|
heap
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
8C1A7E000
|
stack
|
page read and write
|
||
1165000
|
heap
|
page read and write
|
||
7FFD14661000
|
unkown
|
page execute read
|
||
FF1000
|
heap
|
page read and write
|
||
17E8EE77000
|
heap
|
page read and write
|
||
11D5000
|
heap
|
page read and write
|
||
9AE000
|
heap
|
page read and write
|
||
120B000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
121C000
|
heap
|
page read and write
|
||
174A25B8000
|
heap
|
page read and write
|
||
7FFD14660000
|
unkown
|
page readonly
|
||
531000
|
heap
|
page read and write
|
||
7FFD14660000
|
unkown
|
page readonly
|
||
1EF3000
|
heap
|
page read and write
|
||
F4D000
|
stack
|
page read and write
|
||
8C1B7A000
|
stack
|
page read and write
|
||
F3BCCFD000
|
stack
|
page read and write
|
||
23357589000
|
heap
|
page read and write
|
||
26A75FF000
|
stack
|
page read and write
|
||
2B67000
|
heap
|
page read and write
|
||
174A28D5000
|
heap
|
page read and write
|
||
17E8EE58000
|
heap
|
page read and write
|
||
21945202000
|
heap
|
page read and write
|
||
11CF000
|
heap
|
page read and write
|
||
1496FBBA000
|
heap
|
page read and write
|
||
FCD000
|
heap
|
page read and write
|
||
7FFD14660000
|
unkown
|
page readonly
|
||
11F8000
|
heap
|
page read and write
|
||
4E9E000
|
stack
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
121C000
|
heap
|
page read and write
|
||
21945A80000
|
remote allocation
|
page read and write
|
||
174A2580000
|
heap
|
page read and write
|
||
243C000
|
heap
|
page read and write
|
||
2B64000
|
heap
|
page read and write
|
||
54BD8FE000
|
stack
|
page read and write
|
||
8BADBF9000
|
stack
|
page read and write
|
||
527000
|
heap
|
page read and write
|
||
7FFD14698000
|
unkown
|
page readonly
|
||
6BECAFB000
|
stack
|
page read and write
|
||
8C16FB000
|
stack
|
page read and write
|
||
1216000
|
heap
|
page read and write
|
||
1496FA75000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
22F0000
|
trusted library allocation
|
page read and write
|
||
2410000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
7FFD146E2000
|
unkown
|
page readonly
|
||
11E5000
|
heap
|
page read and write
|
||
174A25D9000
|
heap
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
120000
|
remote allocation
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1496FA13000
|
heap
|
page read and write
|
||
463000
|
heap
|
page read and write
|
||
59C0000
|
heap
|
page read and write
|
||
174A261C000
|
heap
|
page read and write
|
||
17E8EE74000
|
heap
|
page read and write
|
||
2B2A000
|
heap
|
page read and write
|
||
20DF4102000
|
heap
|
page read and write
|
||
11CE000
|
heap
|
page read and write
|
||
1E967CA0000
|
heap
|
page read and write
|
||
7FFD146DE000
|
unkown
|
page read and write
|
||
7FFD14660000
|
unkown
|
page readonly
|
||
14970602000
|
heap
|
page read and write
|
||
11CC000
|
heap
|
page read and write
|
||
3359000
|
heap
|
page read and write
|
||
3381000
|
heap
|
page read and write
|
||
2180DC6E000
|
heap
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
54BDC7E000
|
stack
|
page read and write
|
||
23357578000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
1496FA29000
|
heap
|
page read and write
|
||
23357585000
|
heap
|
page read and write
|
||
174A2890000
|
direct allocation
|
page execute and read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
1270000
|
heap
|
page read and write
|
||
6F5000
|
heap
|
page read and write
|
||
17E8EE56000
|
heap
|
page read and write
|
||
17E8EE6D000
|
heap
|
page read and write
|
||
8C197A000
|
stack
|
page read and write
|
||
1198000
|
heap
|
page read and write
|
||
1264000
|
heap
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
A25000
|
heap
|
page read and write
|
||
1496FA2C000
|
heap
|
page read and write
|
||
14970522000
|
heap
|
page read and write
|
||
7FFD146E2000
|
unkown
|
page readonly
|
||
54BD87E000
|
stack
|
page read and write
|
||
50D000
|
heap
|
page read and write
|
||
2180DC3F000
|
heap
|
page read and write
|
||
17E8F680000
|
trusted library allocation
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
6FD000
|
heap
|
page read and write
|
||
14970631000
|
heap
|
page read and write
|
||
14970543000
|
heap
|
page read and write
|
||
17E8EE47000
|
heap
|
page read and write
|
||
20DF4088000
|
heap
|
page read and write
|
||
20DF3DA0000
|
heap
|
page read and write
|
||
14970402000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
7FFD146E2000
|
unkown
|
page readonly
|
||
B40000
|
remote allocation
|
page read and write
|
||
9DC9EFF000
|
stack
|
page read and write
|
||
195DAB10000
|
trusted library allocation
|
page read and write
|
||
14970592000
|
heap
|
page read and write
|
||
20DF406D000
|
heap
|
page read and write
|
||
120000
|
remote allocation
|
page read and write
|
||
23357578000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
7FFD146E5000
|
unkown
|
page readonly
|
||
18002D000
|
direct allocation
|
page readonly
|
||
527000
|
heap
|
page read and write
|
||
21945140000
|
heap
|
page read and write
|
||
6F5000
|
heap
|
page read and write
|
||
195D8F80000
|
heap
|
page read and write
|
||
195D8FD9000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
9AE000
|
heap
|
page read and write
|
||
23358F20000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
21945150000
|
heap
|
page read and write
|
||
23357597000
|
heap
|
page read and write
|
||
351F000
|
heap
|
page read and write
|
||
195D8E60000
|
heap
|
page read and write
|
||
49C000
|
heap
|
page read and write
|
||
127D000
|
heap
|
page read and write
|
||
2AE9000
|
heap
|
page read and write
|
||
21F87DC000
|
stack
|
page read and write
|
||
8BAD6FE000
|
stack
|
page read and write
|
||
17E8EE84000
|
heap
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
6BECA7D000
|
stack
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
195D9250000
|
heap
|
page readonly
|
||
1496F970000
|
heap
|
page read and write
|
||
1264000
|
heap
|
page read and write
|
||
703000
|
heap
|
page read and write
|
||
11D8000
|
heap
|
page read and write
|
||
988000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
1180000
|
remote allocation
|
page read and write
|
||
1264000
|
heap
|
page read and write
|
||
11D8000
|
heap
|
page read and write
|
||
7FFD146E2000
|
unkown
|
page readonly
|
||
7DAEFF000
|
stack
|
page read and write
|
||
11DC000
|
heap
|
page read and write
|
||
195D8ED0000
|
heap
|
page read and write
|
||
6BECCFF000
|
stack
|
page read and write
|
||
1496FA8C000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
17E8EE75000
|
heap
|
page read and write
|
||
4EF000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
2B6C000
|
heap
|
page read and write
|
||
11D5000
|
heap
|
page read and write
|
||
2B6A000
|
heap
|
page read and write
|
||
17E8F802000
|
trusted library allocation
|
page read and write
|
||
1150000
|
trusted library allocation
|
page read and write
|
||
FD6000
|
heap
|
page read and write
|
||
CFB000
|
stack
|
page read and write
|
||
515000
|
heap
|
page read and write
|
||
11CA000
|
heap
|
page read and write
|
||
174A25D9000
|
heap
|
page read and write
|
||
195D8F9F000
|
heap
|
page read and write
|
||
538000
|
heap
|
page read and write
|
||
174A25E7000
|
heap
|
page read and write
|
||
174A4120000
|
heap
|
page read and write
|
||
C85000
|
heap
|
page read and write
|
||
2363000
|
heap
|
page read and write
|
||
11D5000
|
heap
|
page read and write
|
||
174A25D9000
|
heap
|
page read and write
|
||
3338000
|
heap
|
page read and write
|
||
527000
|
heap
|
page read and write
|
||
6FD000
|
heap
|
page read and write
|
||
23357350000
|
heap
|
page read and write
|
||
F3BCE7E000
|
stack
|
page read and write
|
||
5130000
|
trusted library allocation
|
page read and write
|
||
23358DF0000
|
heap
|
page read and write
|
||
9BF000
|
heap
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
36CE000
|
stack
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
20DF4013000
|
heap
|
page read and write
|
||
195D8FEB000
|
heap
|
page read and write
|
||
17E8EE31000
|
heap
|
page read and write
|
||
1216000
|
heap
|
page read and write
|
||
9DC99FD000
|
stack
|
page read and write
|
||
1216000
|
heap
|
page read and write
|
||
9DCA0FF000
|
stack
|
page read and write
|
||
23359070000
|
heap
|
page read and write
|
||
7FFD146E5000
|
unkown
|
page readonly
|
||
8BAD8FF000
|
stack
|
page read and write
|
||
D20000
|
remote allocation
|
page read and write
|
||
17E8EE57000
|
heap
|
page read and write
|
||
14970290000
|
trusted library allocation
|
page read and write
|
||
127D000
|
heap
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
33A1000
|
heap
|
page read and write
|
||
23357586000
|
heap
|
page read and write
|
||
2B6C000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
9AE000
|
heap
|
page read and write
|
||
54D000
|
heap
|
page read and write
|
||
11BE000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
2180E402000
|
trusted library allocation
|
page read and write
|
||
174A25A9000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
21945A80000
|
remote allocation
|
page read and write
|
||
1264000
|
heap
|
page read and write
|
||
11BE000
|
heap
|
page read and write
|
||
6BEC5FF000
|
stack
|
page read and write
|
||
17E8EE7E000
|
heap
|
page read and write
|
||
9DC9BFD000
|
stack
|
page read and write
|
||
9DC97FA000
|
stack
|
page read and write
|
||
528000
|
heap
|
page read and write
|
||
1180000
|
remote allocation
|
page read and write
|
||
7FFD146DE000
|
unkown
|
page read and write
|
||
20DF4802000
|
heap
|
page read and write
|
||
1E967E44000
|
heap
|
page read and write
|
||
174A28A0000
|
heap
|
page readonly
|
||
7DB1FB000
|
stack
|
page read and write
|
||
FC6000
|
heap
|
page read and write
|
||
174A4090000
|
trusted library allocation
|
page read and write
|
||
6BEC67C000
|
stack
|
page read and write
|
||
1E967E13000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
20DF40C2000
|
heap
|
page read and write
|
||
B40000
|
remote allocation
|
page read and write
|
||
11FD000
|
heap
|
page read and write
|
||
8C13FF000
|
stack
|
page read and write
|
||
2CCB000
|
stack
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
17E8EE00000
|
heap
|
page read and write
|
||
54F000
|
heap
|
page read and write
|
||
2AAE000
|
stack
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
2180D9E0000
|
heap
|
page read and write
|
||
26A70FB000
|
stack
|
page read and write
|
||
70C000
|
heap
|
page read and write
|
||
1264000
|
heap
|
page read and write
|
||
174A24B0000
|
heap
|
page read and write
|
||
9DC939B000
|
stack
|
page read and write
|
||
527000
|
heap
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
7DB077000
|
stack
|
page read and write
|
||
6BEC47B000
|
stack
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
174A25F0000
|
heap
|
page read and write
|
||
174A4090000
|
trusted library allocation
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
195D8F9F000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
14970500000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
7DB17F000
|
stack
|
page read and write
|
||
21945240000
|
heap
|
page read and write
|
||
11DD000
|
heap
|
page read and write
|
||
1216000
|
heap
|
page read and write
|
||
2180DD02000
|
heap
|
page read and write
|
||
23357520000
|
trusted library allocation
|
page read and write
|
||
11BE000
|
heap
|
page read and write
|
||
17E8EE4E000
|
heap
|
page read and write
|
||
11D8000
|
heap
|
page read and write
|
||
20DF3D90000
|
heap
|
page read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
1E967E37000
|
heap
|
page read and write
|
||
1FB0000
|
trusted library allocation
|
page read and write
|
||
195D8EF0000
|
heap
|
page read and write
|
||
F3BCF7D000
|
stack
|
page read and write
|
||
7FFD146E5000
|
unkown
|
page readonly
|
||
1496FA92000
|
heap
|
page read and write
|
||
7FFD146E7000
|
unkown
|
page readonly
|
||
8C1779000
|
stack
|
page read and write
|
||
219451E0000
|
trusted library allocation
|
page read and write
|
||
1496FA6F000
|
heap
|
page read and write
|
||
21F8C7E000
|
stack
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
11E3000
|
heap
|
page read and write
|
||
17E8EE60000
|
heap
|
page read and write
|
||
20DF40E6000
|
heap
|
page read and write
|
||
2ADC000
|
heap
|
page read and write
|
||
6BEC87B000
|
stack
|
page read and write
|
||
1130000
|
heap
|
page readonly
|
||
17E8EDE0000
|
heap
|
page read and write
|
||
11CE000
|
heap
|
page read and write
|
||
8C147F000
|
stack
|
page read and write
|
||
195D92A5000
|
heap
|
page read and write
|
||
225E000
|
stack
|
page read and write
|
||
318C000
|
stack
|
page read and write
|
||
17E8EE6F000
|
heap
|
page read and write
|
||
6BECEFE000
|
stack
|
page read and write
|
||
180000
|
heap
|
page read and write
|
||
240E000
|
stack
|
page read and write
|
||
2180DC5A000
|
heap
|
page read and write
|
||
21F8AFF000
|
stack
|
page read and write
|
||
9DC9FFF000
|
stack
|
page read and write
|
||
515000
|
heap
|
page read and write
|
||
2180DA40000
|
heap
|
page read and write
|
||
195D8FC5000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1496FB13000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
7FFD14698000
|
unkown
|
page readonly
|
||
B50000
|
heap
|
page read and write
|
||
20DF4029000
|
heap
|
page read and write
|
||
17E8EE42000
|
heap
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
8C15FF000
|
stack
|
page read and write
|
||
2B0D000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
505000
|
heap
|
page read and write
|
||
195D8FB0000
|
heap
|
page read and write
|
||
14970502000
|
heap
|
page read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
23357590000
|
heap
|
page read and write
|
||
1E967E02000
|
heap
|
page read and write
|
||
120C000
|
heap
|
page read and write
|
||
18002B000
|
direct allocation
|
page readonly
|
||
7FFD14661000
|
unkown
|
page execute read
|
||
195D9150000
|
heap
|
page read and write
|
||
7FFD146E7000
|
unkown
|
page readonly
|
||
23357558000
|
heap
|
page read and write
|
||
556000
|
heap
|
page read and write
|
||
17E8EE7B000
|
heap
|
page read and write
|
||
7DAE7C000
|
stack
|
page read and write
|
||
8C127B000
|
stack
|
page read and write
|
||
1E9685A0000
|
trusted library allocation
|
page read and write
|
||
17E8ED70000
|
heap
|
page read and write
|
||
2B5F000
|
heap
|
page read and write
|
||
1E967F02000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
515000
|
heap
|
page read and write
|
||
23357586000
|
heap
|
page read and write
|
||
11F8000
|
heap
|
page read and write
|
||
23357581000
|
heap
|
page read and write
|
||
1496FA58000
|
heap
|
page read and write
|
||
23357578000
|
heap
|
page read and write
|
||
7DAFFC000
|
stack
|
page read and write
|
||
6BECBFE000
|
stack
|
page read and write
|
||
1F9E000
|
stack
|
page read and write
|
||
1496FA78000
|
heap
|
page read and write
|
||
174A25D9000
|
heap
|
page read and write
|
||
1203000
|
heap
|
page read and write
|
||
17E8EE67000
|
heap
|
page read and write
|
||
F3BCA7B000
|
stack
|
page read and write
|
||
174A25AE000
|
heap
|
page read and write
|
||
23358E1C000
|
heap
|
page read and write
|
||
87B000
|
stack
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
6FD000
|
heap
|
page read and write
|
||
14970600000
|
heap
|
page read and write
|
||
21945A80000
|
remote allocation
|
page read and write
|
||
11DC000
|
heap
|
page read and write
|
||
2B64000
|
heap
|
page read and write
|
||
7FFD146E7000
|
unkown
|
page readonly
|
||
20DF3E00000
|
heap
|
page read and write
|
||
22D0000
|
direct allocation
|
page execute and read and write
|
||
23358E1C000
|
heap
|
page read and write
|
||
2180DC00000
|
heap
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
23357500000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
174A25A9000
|
heap
|
page read and write
|
||
17E8EE6A000
|
heap
|
page read and write
|
||
1E967E00000
|
heap
|
page read and write
|
||
20DF4113000
|
heap
|
page read and write
|
||
56A0000
|
heap
|
page read and write
|
||
4E8000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
2180DB40000
|
trusted library allocation
|
page read and write
|
||
8BAD9FE000
|
stack
|
page read and write
|
||
26B0000
|
heap
|
page read and write
|
||
1496FA95000
|
heap
|
page read and write
|
||
2B2B000
|
stack
|
page read and write
|
||
21F8BF9000
|
stack
|
page read and write
|
||
21945258000
|
heap
|
page read and write
|
||
195D8F9F000
|
heap
|
page read and write
|
||
1E967CB0000
|
heap
|
page read and write
|
||
20DF4000000
|
heap
|
page read and write
|
||
7FFD146E5000
|
unkown
|
page readonly
|
||
23357580000
|
heap
|
page read and write
|
||
FCD000
|
heap
|
page read and write
|
||
721000
|
heap
|
page read and write
|
||
1E967E52000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
1120000
|
direct allocation
|
page execute and read and write
|
||
121D000
|
heap
|
page read and write
|
||
9D7000
|
heap
|
page read and write
|
||
233574F0000
|
direct allocation
|
page execute and read and write
|
||
23357550000
|
heap
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
174A25F9000
|
heap
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
2B61000
|
heap
|
page read and write
|
||
14970623000
|
heap
|
page read and write
|
||
1F1F000
|
stack
|
page read and write
|
||
22E0000
|
heap
|
page readonly
|
||
23359075000
|
heap
|
page read and write
|
||
274F000
|
stack
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
7FFD14698000
|
unkown
|
page readonly
|
||
20DF4900000
|
heap
|
page read and write
|
||
1222000
|
heap
|
page read and write
|
||
2300000
|
heap
|
page read and write
|
||
1497056F000
|
heap
|
page read and write
|
||
31DE000
|
stack
|
page read and write
|
||
174A260A000
|
heap
|
page read and write
|
||
495000
|
heap
|
page read and write
|
||
1496F960000
|
heap
|
page read and write
|
||
F3BCD7C000
|
stack
|
page read and write
|
||
57B000
|
heap
|
page read and write
|
||
2180DC13000
|
heap
|
page read and write
|
||
FCD000
|
heap
|
page read and write
|
||
195D8F89000
|
heap
|
page read and write
|
||
9B3000
|
heap
|
page read and write
|
||
527000
|
heap
|
page read and write
|
||
2B6A000
|
heap
|
page read and write
|
||
23357490000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
7DB0FE000
|
stack
|
page read and write
|
||
17E8EE55000
|
heap
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
F9000
|
stack
|
page read and write
|
||
6A0000
|
remote allocation
|
page read and write
|
||
258E000
|
stack
|
page read and write
|
||
1496FA85000
|
heap
|
page read and write
|
||
546000
|
heap
|
page read and write
|
||
20DF403E000
|
heap
|
page read and write
|
||
7FFD146DE000
|
unkown
|
page read and write
|
||
555000
|
heap
|
page read and write
|
||
1496FB8F000
|
heap
|
page read and write
|
||
17E8ED80000
|
heap
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
1E967E2F000
|
heap
|
page read and write
|
||
23357563000
|
heap
|
page read and write
|
||
558000
|
heap
|
page read and write
|
||
1496FA00000
|
heap
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
1496FA89000
|
heap
|
page read and write
|
||
100000
|
remote allocation
|
page read and write
|
||
100000
|
remote allocation
|
page read and write
|
||
2B61000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
6D8000
|
heap
|
page read and write
|
||
21F8A7F000
|
stack
|
page read and write
|
||
11DC000
|
heap
|
page read and write
|
||
120C000
|
heap
|
page read and write
|
||
2B2F000
|
stack
|
page read and write
|
||
1202000
|
heap
|
page read and write
|
||
1496FA55000
|
heap
|
page read and write
|
||
120C000
|
heap
|
page read and write
|
||
D20000
|
remote allocation
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
17E8EE29000
|
heap
|
page read and write
|
||
17E8EE40000
|
heap
|
page read and write
|
||
127D000
|
heap
|
page read and write
|
||
174A25AF000
|
heap
|
page read and write
|
||
174A25EA000
|
heap
|
page read and write
|
||
2335757E000
|
heap
|
page read and write
|
||
18002C000
|
direct allocation
|
page read and write
|
||
26A76F9000
|
stack
|
page read and write
|
||
174A25F7000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
1E967E29000
|
heap
|
page read and write
|
||
FD5000
|
heap
|
page read and write
|
||
2B64000
|
heap
|
page read and write
|
||
721000
|
heap
|
page read and write
|
||
535000
|
heap
|
page read and write
|
||
11FD000
|
heap
|
page read and write
|
||
174A2760000
|
heap
|
page read and write
|
||
3381000
|
heap
|
page read and write
|
||
21F8B7E000
|
stack
|
page read and write
|
||
1FD0000
|
heap
|
page read and write
|
||
20DF40B9000
|
heap
|
page read and write
|
||
9DC98FE000
|
stack
|
page read and write
|
||
9BC000
|
heap
|
page read and write
|
||
2607000
|
stack
|
page read and write
|
||
26A77FF000
|
stack
|
page read and write
|
||
320F000
|
stack
|
page read and write
|
||
195D8FD9000
|
heap
|
page read and write
|
||
2180DC2A000
|
heap
|
page read and write
|
||
238E000
|
stack
|
page read and write
|
||
7FFD146DE000
|
unkown
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
17E8EE96000
|
heap
|
page read and write
|
||
1496FA43000
|
heap
|
page read and write
|
||
1180000
|
remote allocation
|
page read and write
|
||
2B5F000
|
heap
|
page read and write
|
||
A2C000
|
heap
|
page read and write
|
||
233575C4000
|
heap
|
page read and write
|
||
21D9000
|
stack
|
page read and write
|
||
2B5F000
|
heap
|
page read and write
|
||
14970628000
|
heap
|
page read and write
|
||
6A0000
|
remote allocation
|
page read and write
|
||
558000
|
heap
|
page read and write
|
||
706000
|
heap
|
page read and write
|
||
20DF3F00000
|
trusted library allocation
|
page read and write
|
||
1223000
|
heap
|
page read and write
|
||
21F8CFF000
|
stack
|
page read and write
|
||
121C000
|
heap
|
page read and write
|
||
9E8000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
9DC9CFF000
|
stack
|
page read and write
|
||
17E8EE3C000
|
heap
|
page read and write
|
||
29CD000
|
stack
|
page read and write
|
||
7FFD14660000
|
unkown
|
page readonly
|
||
1496FA3C000
|
heap
|
page read and write
|
||
308D000
|
stack
|
page read and write
|
||
174A2588000
|
heap
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
9E8000
|
heap
|
page read and write
|
||
7FFD14661000
|
unkown
|
page execute read
|
||
67A000
|
stack
|
page read and write
|
||
17E8EF02000
|
heap
|
page read and write
|
||
21945C02000
|
trusted library allocation
|
page read and write
|
||
174A25B1000
|
heap
|
page read and write
|
||
555000
|
heap
|
page read and write
|
||
7FFD146E5000
|
unkown
|
page readonly
|
||
6F0000
|
heap
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
7FFD14661000
|
unkown
|
page execute read
|
||
1496F9D0000
|
heap
|
page read and write
|
||
1496FA68000
|
heap
|
page read and write
|
||
1496FBE6000
|
heap
|
page read and write
|
||
5BD0000
|
trusted library allocation
|
page read and write
|
||
516000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
21945224000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
14970270000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
trusted library allocation
|
page read and write
|
||
120B000
|
heap
|
page read and write
|
||
2180DC02000
|
heap
|
page read and write
|
||
149705C0000
|
heap
|
page read and write
|
||
D9000
|
stack
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
7FFD146E2000
|
unkown
|
page readonly
|
||
3311000
|
heap
|
page read and write
|
||
14970554000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
195DAB40000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
127A000
|
heap
|
page read and write
|
||
174A25F9000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
215E000
|
stack
|
page read and write
|
||
174A2540000
|
heap
|
page read and write
|
||
1EF0000
|
heap
|
page read and write
|
||
6E0000
|
direct allocation
|
page execute and read and write
|
||
17E8EE62000
|
heap
|
page read and write
|
||
F3BCFFE000
|
stack
|
page read and write
|
||
325F000
|
stack
|
page read and write
|
||
330C000
|
stack
|
page read and write
|
||
8BADAFD000
|
stack
|
page read and write
|
||
2963000
|
heap
|
page read and write
|
||
174A2520000
|
heap
|
page read and write
|
||
1275000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
120B000
|
heap
|
page read and write
|
||
21945200000
|
heap
|
page read and write
|
||
8C187E000
|
stack
|
page read and write
|
||
54BDA7E000
|
stack
|
page read and write
|
||
50D000
|
heap
|
page read and write
|
||
174A25B0000
|
heap
|
page read and write
|
||
9CE000
|
heap
|
page read and write
|
||
1203000
|
heap
|
page read and write
|
||
219451B0000
|
heap
|
page read and write
|
||
128A000
|
heap
|
page read and write
|
||
1FE0000
|
heap
|
page read and write
|
||
FD5000
|
heap
|
page read and write
|
||
1E968602000
|
trusted library allocation
|
page read and write
|
||
174A2602000
|
heap
|
page read and write
|
||
7FFD146E5000
|
unkown
|
page readonly
|
||
21945302000
|
heap
|
page read and write
|
||
195D917C000
|
heap
|
page read and write
|
||
1219000
|
heap
|
page read and write
|
||
7DAF7F000
|
stack
|
page read and write
|
||
6EF000
|
heap
|
page read and write
|
||
2B6C000
|
heap
|
page read and write
|
||
23357520000
|
trusted library allocation
|
page read and write
|
||
4CB000
|
heap
|
page read and write
|
||
2180DD13000
|
heap
|
page read and write
|
||
2C4D000
|
stack
|
page read and write
|
||
195D8FC9000
|
heap
|
page read and write
|
||
50F000
|
stack
|
page read and write
|
||
7FFD146E7000
|
unkown
|
page readonly
|
||
7FFD146DE000
|
unkown
|
page read and write
|
||
6F5000
|
heap
|
page read and write
|
||
F3BD0FD000
|
stack
|
page read and write
|
||
7FFD14661000
|
unkown
|
page execute read
|
||
1E967E3E000
|
heap
|
page read and write
|
||
2B61000
|
heap
|
page read and write
|
||
2194522A000
|
heap
|
page read and write
|
||
2610000
|
trusted library allocation
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
7FFD14698000
|
unkown
|
page readonly
|
||
20DF40CA000
|
heap
|
page read and write
|
||
FD5000
|
heap
|
page read and write
|
||
54D000
|
heap
|
page read and write
|
||
233575B2000
|
heap
|
page read and write
|
||
174A25D9000
|
heap
|
page read and write
|
||
14970613000
|
heap
|
page read and write
|
||
2B4E000
|
heap
|
page read and write
|
||
195D92A0000
|
heap
|
page read and write
|
||
54BDB7E000
|
stack
|
page read and write
|
||
4FF000
|
heap
|
page read and write
|
||
128E000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
7FFD146E7000
|
unkown
|
page readonly
|
||
17E8EE7A000
|
heap
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
2B67000
|
heap
|
page read and write
|
||
195D8FD7000
|
heap
|
page read and write
|
||
3010000
|
trusted library allocation
|
page read and write
|
||
546000
|
heap
|
page read and write
|
||
2B2C000
|
heap
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
2180DC69000
|
heap
|
page read and write
|
||
7FFD14698000
|
unkown
|
page readonly
|
||
195D8F70000
|
direct allocation
|
page execute and read and write
|
||
56A000
|
heap
|
page read and write
|
||
7FFD14660000
|
unkown
|
page readonly
|
||
233575B2000
|
heap
|
page read and write
|
||
6BECDFD000
|
stack
|
page read and write
|
||
8BAD7FE000
|
stack
|
page read and write
|
||
527000
|
heap
|
page read and write
|
||
B1A000
|
stack
|
page read and write
|
||
54D000
|
heap
|
page read and write
|
||
6FD000
|
heap
|
page read and write
|
||
149705B2000
|
heap
|
page read and write
|
||
7FFD146DE000
|
unkown
|
page read and write
|
||
14970522000
|
heap
|
page read and write
|
||
1FA0000
|
heap
|
page readonly
|
||
40000
|
heap
|
page read and write
|
||
17E8EE13000
|
heap
|
page read and write
|
||
3A80000
|
heap
|
page read and write
|
||
7FFD14698000
|
unkown
|
page readonly
|
||
127C000
|
heap
|
page read and write
|
||
1496FA65000
|
heap
|
page read and write
|
||
54BDD7F000
|
stack
|
page read and write
|
||
50D000
|
heap
|
page read and write
|
||
2B6A000
|
heap
|
page read and write
|
||
47B000
|
stack
|
page read and write
|
||
226D000
|
stack
|
page read and write
|
||
2B67000
|
heap
|
page read and write
|
||
54BD58B000
|
stack
|
page read and write
|
||
FA8000
|
heap
|
page read and write
|
||
9FA000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
21945213000
|
heap
|
page read and write
|
||
7FFD146E2000
|
unkown
|
page readonly
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
8BAD3AC000
|
stack
|
page read and write
|
||
195D9290000
|
trusted library allocation
|
page read and write
|
||
310D000
|
stack
|
page read and write
|
||
1E967D00000
|
heap
|
page read and write
|
||
1216000
|
heap
|
page read and write
|
||
546000
|
heap
|
page read and write
|
||
2180D9D0000
|
heap
|
page read and write
|
||
1202000
|
heap
|
page read and write
|
||
17E8EE5C000
|
heap
|
page read and write
|
||
11FD000
|
heap
|
page read and write
|
||
7FFD14661000
|
unkown
|
page execute read
|
||
120A000
|
heap
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
2360000
|
heap
|
page read and write
|
||
2180DC77000
|
heap
|
page read and write
|
||
1E967E49000
|
heap
|
page read and write
|
||
174A28D0000
|
heap
|
page read and write
|
||
F3BCAFE000
|
stack
|
page read and write
|
||
555000
|
heap
|
page read and write
|
||
6BEC97F000
|
stack
|
page read and write
|
||
26A74FE000
|
stack
|
page read and write
|
||
149705C7000
|
heap
|
page read and write
|
||
121E000
|
heap
|
page read and write
|
||
17E8EE5A000
|
heap
|
page read and write
|
||
11CE000
|
heap
|
page read and write
|
||
7FFD146E7000
|
unkown
|
page readonly
|
||
3310000
|
heap
|
page read and write
|
||
9DC9DFF000
|
stack
|
page read and write
|
||
195D8FB2000
|
heap
|
page read and write
|
There are 700 hidden memdumps, click here to show them.