Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\x4ByCNJqst.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\x4ByCNJqst.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\x4ByCNJqst.dll,DllRegisterServer
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\HhAmkCb\GvrdyVBSmSfKAy.dll"
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\x4ByCNJqst.dll,DllUnregisterServer
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
|
||
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\x4ByCNJqst.dll"
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\x4ByCNJqst.dll",#1
|
There are 2 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://23.239.0.12/r
|
unknown
|
||
https://23.239.0.12/
|
23.239.0.12
|
||
https://23.239.0.12/T
|
unknown
|
||
https://www.disneyplus.com/legal/your-california-privacy-rights
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://www.disneyplus.com/legal/privacy-policy
|
unknown
|
||
https://www.tiktok.com/legal/report/feedback
|
unknown
|
||
http://help.disneyplus.com.
|
unknown
|
||
https://support.hotspotshield.com/
|
unknown
|
||
https://www.hotspotshield.com/terms/
|
unknown
|
||
https://www.pango.co/privacy
|
unknown
|
||
https://disneyplus.com/legal.
|
unknown
|
There are 2 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
23.239.0.12
|
unknown
|
United States
|
||
192.168.2.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\State
|
BlockUntilTimeStatus
|
||
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\TaskStore
|
Schedule Scan
|
||
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\Configuration
|
refreshAfter
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
180001000
|
direct allocation
|
page execute read
|
||
E30000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
181D20E0000
|
direct allocation
|
page execute and read and write
|
||
1460000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
1F155CA0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
1EEB7730000
|
trusted library allocation
|
page read and write
|
||
29B4FF80000
|
heap
|
page read and write
|
||
220EE04B000
|
heap
|
page read and write
|
||
169D413D000
|
heap
|
page read and write
|
||
220EE091000
|
heap
|
page read and write
|
||
7FF8CAA40000
|
unkown
|
page readonly
|
||
7FF8CAA96000
|
unkown
|
page read and write
|
||
B319F4C000
|
stack
|
page read and write
|
||
181D06E0000
|
heap
|
page read and write
|
||
169D41BB000
|
heap
|
page read and write
|
||
201C7CC0000
|
heap
|
page read and write
|
||
29B4FF60000
|
heap
|
page read and write
|
||
2A6D0080000
|
heap
|
page read and write
|
||
221C4CE5000
|
heap
|
page read and write
|
||
29B50072000
|
heap
|
page read and write
|
||
220EE9A7000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
181D0718000
|
heap
|
page read and write
|
||
16FB8EB0000
|
heap
|
page read and write
|
||
220EE0E7000
|
heap
|
page read and write
|
||
96682FB000
|
stack
|
page read and write
|
||
16FB8E05000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
220EEE03000
|
heap
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
220EE113000
|
heap
|
page read and write
|
||
E7FF7FB000
|
stack
|
page read and write
|
||
41CBAFC000
|
stack
|
page read and write
|
||
169D4192000
|
heap
|
page read and write
|
||
2CBB000
|
stack
|
page read and write
|
||
11FFE525000
|
heap
|
page read and write
|
||
1B60848F000
|
heap
|
page read and write
|
||
220EE049000
|
heap
|
page read and write
|
||
29B50300000
|
trusted library allocation
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
1B60845C000
|
heap
|
page read and write
|
||
1B608465000
|
heap
|
page read and write
|
||
966793F000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
29B5004B000
|
heap
|
page read and write
|
||
220EE108000
|
heap
|
page read and write
|
||
E7FF6FE000
|
stack
|
page read and write
|
||
1B608513000
|
heap
|
page read and write
|
||
29B4FEF0000
|
heap
|
page read and write
|
||
284704DA000
|
heap
|
page read and write
|
||
11FFE437000
|
heap
|
page read and write
|
||
220EEE02000
|
heap
|
page read and write
|
||
221C4A90000
|
heap
|
page read and write
|
||
11FFE433000
|
heap
|
page read and write
|
||
1142000
|
heap
|
page read and write
|
||
7FF8CAA41000
|
unkown
|
page execute read
|
||
1B608502000
|
heap
|
page read and write
|
||
181D2120000
|
heap
|
page readonly
|
||
1EEB7829000
|
heap
|
page read and write
|
||
29B50DF0000
|
trusted library allocation
|
page read and write
|
||
169D4030000
|
heap
|
page read and write
|
||
169D40A0000
|
remote allocation
|
page read and write
|
||
11FFE413000
|
heap
|
page read and write
|
||
181D2114000
|
heap
|
page read and write
|
||
28470F60000
|
heap
|
page read and write
|
||
220EE968000
|
heap
|
page read and write
|
||
119B000
|
heap
|
page read and write
|
||
2A6D0028000
|
heap
|
page read and write
|
||
181D2210000
|
heap
|
page read and write
|
||
29B50230000
|
trusted library allocation
|
page read and write
|
||
4E18E7F000
|
stack
|
page read and write
|
||
28470479000
|
heap
|
page read and write
|
||
220EEE02000
|
heap
|
page read and write
|
||
3178A77000
|
stack
|
page read and write
|
||
1EEB7908000
|
heap
|
page read and write
|
||
29B50051000
|
heap
|
page read and write
|
||
16FB8DB0000
|
heap
|
page read and write
|
||
1B608508000
|
heap
|
page read and write
|
||
1EEB785E000
|
heap
|
page read and write
|
||
169D4BEA000
|
heap
|
page read and write
|
||
176E36A000
|
stack
|
page read and write
|
||
220EEE02000
|
heap
|
page read and write
|
||
220EE98C000
|
heap
|
page read and write
|
||
220EDDD0000
|
heap
|
page read and write
|
||
220EE04E000
|
heap
|
page read and write
|
||
28470423000
|
heap
|
page read and write
|
||
1EEB7813000
|
heap
|
page read and write
|
||
87C0277000
|
stack
|
page read and write
|
||
2A6D0051000
|
heap
|
page read and write
|
||
169D4124000
|
heap
|
page read and write
|
||
220EE9B9000
|
heap
|
page read and write
|
||
220EEE02000
|
heap
|
page read and write
|
||
28470467000
|
heap
|
page read and write
|
||
A2867B000
|
stack
|
page read and write
|
||
181D0710000
|
heap
|
page read and write
|
||
176E87C000
|
stack
|
page read and write
|
||
D3B000
|
heap
|
page read and write
|
||
1F157660000
|
heap
|
page read and write
|
||
9667CFC000
|
stack
|
page read and write
|
||
176E67F000
|
stack
|
page read and write
|
||
1EEB7852000
|
heap
|
page read and write
|
||
169D40C8000
|
heap
|
page read and write
|
||
11E2000
|
heap
|
page read and write
|
||
220EDFF0000
|
remote allocation
|
page read and write
|
||
220EE964000
|
heap
|
page read and write
|
||
11FFE43A000
|
heap
|
page read and write
|
||
220EE96F000
|
heap
|
page read and write
|
||
D8F927E000
|
stack
|
page read and write
|
||
29B50051000
|
heap
|
page read and write
|
||
220EE917000
|
heap
|
page read and write
|
||
220EE9B0000
|
heap
|
page read and write
|
||
29B50008000
|
heap
|
page read and write
|
||
2AB0000
|
trusted library allocation
|
page read and write
|
||
9667EFA000
|
stack
|
page read and write
|
||
28470429000
|
heap
|
page read and write
|
||
16FB8EED000
|
heap
|
page read and write
|
||
220EE973000
|
heap
|
page read and write
|
||
220EE116000
|
heap
|
page read and write
|
||
16FB8ED2000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
7FF8CAA99000
|
unkown
|
page readonly
|
||
28471700000
|
heap
|
page read and write
|
||
16FB8EF6000
|
heap
|
page read and write
|
||
11FFE41F000
|
heap
|
page read and write
|
||
11FFE42E000
|
heap
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
28470E02000
|
heap
|
page read and write
|
||
220EE99A000
|
heap
|
page read and write
|
||
1B608466000
|
heap
|
page read and write
|
||
87BFEFE000
|
stack
|
page read and write
|
||
220EE95E000
|
heap
|
page read and write
|
||
220EE0DF000
|
heap
|
page read and write
|
||
29B501D0000
|
trusted library allocation
|
page read and write
|
||
1F155C70000
|
heap
|
page read and write
|
||
169D4BE9000
|
heap
|
page read and write
|
||
3178B7B000
|
stack
|
page read and write
|
||
1EEB7860000
|
heap
|
page read and write
|
||
7FF8CAA92000
|
unkown
|
page readonly
|
||
1564CA15000
|
heap
|
page read and write
|
||
11FFE41F000
|
heap
|
page read and write
|
||
11FFE415000
|
heap
|
page read and write
|
||
1B608E02000
|
trusted library allocation
|
page read and write
|
||
D10000
|
heap
|
page readonly
|
||
181D074E000
|
heap
|
page read and write
|
||
9667DF9000
|
stack
|
page read and write
|
||
11FFE417000
|
heap
|
page read and write
|
||
1F155D1B000
|
heap
|
page read and write
|
||
181D0AC0000
|
heap
|
page read and write
|
||
220EE050000
|
heap
|
page read and write
|
||
28470513000
|
heap
|
page read and write
|
||
169D4107000
|
heap
|
page read and write
|
||
220EE0BE000
|
heap
|
page read and write
|
||
2A6CFF80000
|
heap
|
page read and write
|
||
220EE98C000
|
heap
|
page read and write
|
||
29B50000000
|
heap
|
page read and write
|
||
ED5000
|
heap
|
page read and write
|
||
2A6CFF70000
|
heap
|
page read and write
|
||
1EEB7902000
|
heap
|
page read and write
|
||
26FF000
|
stack
|
page read and write
|
||
119E000
|
heap
|
page read and write
|
||
181D0740000
|
heap
|
page read and write
|
||
317850C000
|
stack
|
page read and write
|
||
7FF8CAA41000
|
unkown
|
page execute read
|
||
220EE070000
|
heap
|
page read and write
|
||
220EE9A9000
|
heap
|
page read and write
|
||
16FBC1B3000
|
heap
|
page read and write
|
||
7FF8CAA96000
|
unkown
|
page read and write
|
||
2A1B477000
|
stack
|
page read and write
|
||
284704B8000
|
heap
|
page read and write
|
||
220EE99D000
|
heap
|
page read and write
|
||
169D41B7000
|
heap
|
page read and write
|
||
1F155CD0000
|
heap
|
page readonly
|
||
220EE0EB000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
4A4B9FD000
|
stack
|
page read and write
|
||
1F155AC0000
|
heap
|
page read and write
|
||
169D4194000
|
heap
|
page read and write
|
||
1F155D41000
|
heap
|
page read and write
|
||
A281DE000
|
stack
|
page read and write
|
||
181D0AB0000
|
direct allocation
|
page execute and read and write
|
||
DB0000
|
remote allocation
|
page read and write
|
||
28471600000
|
heap
|
page read and write
|
||
221C48D0000
|
heap
|
page read and write
|
||
220EE97B000
|
heap
|
page read and write
|
||
1F155D4E000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
11FFE402000
|
heap
|
page read and write
|
||
1EEB7863000
|
heap
|
page read and write
|
||
7FF8CAA96000
|
unkown
|
page read and write
|
||
284704E2000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
3178CFF000
|
stack
|
page read and write
|
||
1EEB7913000
|
heap
|
page read and write
|
||
1EEB75C0000
|
heap
|
page read and write
|
||
96680FF000
|
stack
|
page read and write
|
||
220EE013000
|
heap
|
page read and write
|
||
D8F90FF000
|
stack
|
page read and write
|
||
2A6D0A02000
|
trusted library allocation
|
page read and write
|
||
169D4194000
|
heap
|
page read and write
|
||
176E6F8000
|
stack
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
1EEB75D0000
|
heap
|
page read and write
|
||
220EE99E000
|
heap
|
page read and write
|
||
1564CA10000
|
heap
|
page read and write
|
||
1B608460000
|
heap
|
page read and write
|
||
16FB8EF6000
|
heap
|
page read and write
|
||
16FB8EB7000
|
heap
|
page read and write
|
||
220EE9B2000
|
heap
|
page read and write
|
||
A2815A000
|
stack
|
page read and write
|
||
220EDE30000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
2A6D006E000
|
heap
|
page read and write
|
||
1F157664000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
284705ED000
|
heap
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
169D4480000
|
heap
|
page read and write
|
||
11FFE407000
|
heap
|
page read and write
|
||
220EE960000
|
heap
|
page read and write
|
||
284704FD000
|
heap
|
page read and write
|
||
1EEB785B000
|
heap
|
page read and write
|
||
220EE9B2000
|
heap
|
page read and write
|
||
2A1B0FE000
|
stack
|
page read and write
|
||
96681FF000
|
stack
|
page read and write
|
||
28470FED000
|
heap
|
page read and write
|
||
1B608370000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
28470F34000
|
heap
|
page read and write
|
||
220EE99A000
|
heap
|
page read and write
|
||
169D40C0000
|
heap
|
page read and write
|
||
220EE082000
|
heap
|
page read and write
|
||
28470444000
|
heap
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
1EEB7900000
|
heap
|
page read and write
|
||
317887E000
|
stack
|
page read and write
|
||
28470437000
|
heap
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
11FFE3F9000
|
heap
|
page read and write
|
||
1B608469000
|
heap
|
page read and write
|
||
28470495000
|
heap
|
page read and write
|
||
2A6CFFE0000
|
heap
|
page read and write
|
||
220EE996000
|
heap
|
page read and write
|
||
220EE04C000
|
heap
|
page read and write
|
||
220EE94D000
|
heap
|
page read and write
|
||
16FB8D90000
|
heap
|
page read and write
|
||
1564CABB000
|
heap
|
page read and write
|
||
29B50280000
|
heap
|
page readonly
|
||
11FFE520000
|
heap
|
page read and write
|
||
31CD000
|
stack
|
page read and write
|
||
11FFE42E000
|
heap
|
page read and write
|
||
6493BFE000
|
stack
|
page read and write
|
||
169D4485000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
7FF8CAA99000
|
unkown
|
page readonly
|
||
E7FF4FB000
|
stack
|
page read and write
|
||
28470481000
|
heap
|
page read and write
|
||
220EE092000
|
heap
|
page read and write
|
||
176E7FF000
|
stack
|
page read and write
|
||
1564CADC000
|
heap
|
page read and write
|
||
87C047D000
|
stack
|
page read and write
|
||
169D4152000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
169D41B2000
|
heap
|
page read and write
|
||
4E18EFE000
|
stack
|
page read and write
|
||
201C7B80000
|
heap
|
page read and write
|
||
1F155CE5000
|
heap
|
page read and write
|
||
169D41BD000
|
heap
|
page read and write
|
||
169D40A0000
|
remote allocation
|
page read and write
|
||
2A6D0002000
|
heap
|
page read and write
|
||
29B502F0000
|
heap
|
page read and write
|
||
169D4192000
|
heap
|
page read and write
|
||
169D4115000
|
heap
|
page read and write
|
||
1EEB7800000
|
heap
|
page read and write
|
||
169D412A000
|
heap
|
page read and write
|
||
181D0AC5000
|
heap
|
page read and write
|
||
7FF8CAA99000
|
unkown
|
page readonly
|
||
220EE9B0000
|
heap
|
page read and write
|
||
7FF8CAA41000
|
unkown
|
page execute read
|
||
317897B000
|
stack
|
page read and write
|
||
4A4BCFF000
|
stack
|
page read and write
|
||
220EE802000
|
heap
|
page read and write
|
||
284705F5000
|
heap
|
page read and write
|
||
11FFE418000
|
heap
|
page read and write
|
||
1F155D4E000
|
heap
|
page read and write
|
||
7FF8CAA41000
|
unkown
|
page execute read
|
||
11FFE4F0000
|
heap
|
page read and write
|
||
B31A47E000
|
stack
|
page read and write
|
||
28470400000
|
heap
|
page read and write
|
||
1564CA40000
|
heap
|
page read and write
|
||
16FB8ED2000
|
heap
|
page read and write
|
||
7FF8CAA40000
|
unkown
|
page readonly
|
||
220EE9A7000
|
heap
|
page read and write
|
||
221C4A20000
|
heap
|
page read and write
|
||
181D073A000
|
heap
|
page read and write
|
||
169D413D000
|
heap
|
page read and write
|
||
220EE9C2000
|
heap
|
page read and write
|
||
284703A0000
|
heap
|
page read and write
|
||
1B608464000
|
heap
|
page read and write
|
||
29B50012000
|
heap
|
page read and write
|
||
29B4FFF0000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
1F155CE0000
|
heap
|
page read and write
|
||
6493A75000
|
stack
|
page read and write
|
||
1F1575F0000
|
heap
|
page read and write
|
||
1B608482000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
41CBEFF000
|
stack
|
page read and write
|
||
284705BF000
|
heap
|
page read and write
|
||
220EE996000
|
heap
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
220EEE00000
|
heap
|
page read and write
|
||
1564C8C0000
|
heap
|
page read and write
|
||
181D074F000
|
heap
|
page read and write
|
||
16FB8EF0000
|
heap
|
page read and write
|
||
954000
|
stack
|
page read and write
|
||
220EEE1A000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
169D4192000
|
heap
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
B31A4F9000
|
stack
|
page read and write
|
||
4E18BFB000
|
stack
|
page read and write
|
||
1B60845E000
|
heap
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
220EE996000
|
heap
|
page read and write
|
||
220EE9A0000
|
heap
|
page read and write
|
||
1B608462000
|
heap
|
page read and write
|
||
966837F000
|
stack
|
page read and write
|
||
284704D0000
|
heap
|
page read and write
|
||
29B5004A000
|
heap
|
page read and write
|
||
1B608413000
|
heap
|
page read and write
|
||
169D41B9000
|
heap
|
page read and write
|
||
16FB8EF0000
|
heap
|
page read and write
|
||
277F000
|
stack
|
page read and write
|
||
220EE96B000
|
heap
|
page read and write
|
||
221C4A69000
|
heap
|
page read and write
|
||
1B60845D000
|
heap
|
page read and write
|
||
181D2110000
|
heap
|
page read and write
|
||
1495000
|
heap
|
page read and write
|
||
3350000
|
heap
|
page read and write
|
||
1108000
|
heap
|
page read and write
|
||
181D074E000
|
heap
|
page read and write
|
||
220EE102000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
169D3FA0000
|
heap
|
page read and write
|
||
220EE98C000
|
heap
|
page read and write
|
||
169D4010000
|
heap
|
page read and write
|
||
28470F37000
|
heap
|
page read and write
|
||
29B502A0000
|
trusted library allocation
|
page read and write
|
||
D8F91FE000
|
stack
|
page read and write
|
||
220EDDC0000
|
heap
|
page read and write
|
||
1EEB7839000
|
heap
|
page read and write
|
||
1EEB783C000
|
heap
|
page read and write
|
||
1EEB785C000
|
heap
|
page read and write
|
||
16FB8EBB000
|
heap
|
page read and write
|
||
220EE996000
|
heap
|
page read and write
|
||
176E3EE000
|
stack
|
page read and write
|
||
169D4152000
|
heap
|
page read and write
|
||
29B502F9000
|
heap
|
page read and write
|
||
1B60842A000
|
heap
|
page read and write
|
||
201C7D30000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
2847042F000
|
heap
|
page read and write
|
||
87C037E000
|
stack
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
1EEB7861000
|
heap
|
page read and write
|
||
16FB8ECD000
|
heap
|
page read and write
|
||
11FFE407000
|
heap
|
page read and write
|
||
A2857B000
|
stack
|
page read and write
|
||
11FFE3F0000
|
heap
|
page read and write
|
||
284703F0000
|
heap
|
page read and write
|
||
284704BB000
|
heap
|
page read and write
|
||
28470413000
|
heap
|
page read and write
|
||
41CBFFE000
|
stack
|
page read and write
|
||
1EEB7886000
|
heap
|
page read and write
|
||
16FB8EC9000
|
heap
|
page read and write
|
||
A2847E000
|
stack
|
page read and write
|
||
A2877E000
|
stack
|
page read and write
|
||
1EEB8002000
|
trusted library allocation
|
page read and write
|
||
29B4FF00000
|
trusted library allocation
|
page read and write
|
||
28471643000
|
heap
|
page read and write
|
||
1EEB785A000
|
heap
|
page read and write
|
||
181D0740000
|
heap
|
page read and write
|
||
28471619000
|
heap
|
page read and write
|
||
16FB8EC6000
|
heap
|
page read and write
|
||
1B608C80000
|
trusted library allocation
|
page read and write
|
||
16FB8EC9000
|
heap
|
page read and write
|
||
1B608468000
|
heap
|
page read and write
|
||
16FB8ED8000
|
heap
|
page read and write
|
||
220EE966000
|
heap
|
page read and write
|
||
2A1B17F000
|
stack
|
page read and write
|
||
11FFE42E000
|
heap
|
page read and write
|
||
220EE04A000
|
heap
|
page read and write
|
||
6493B7F000
|
stack
|
page read and write
|
||
220EE98C000
|
heap
|
page read and write
|
||
221C4A60000
|
heap
|
page read and write
|
||
220EE998000
|
heap
|
page read and write
|
||
1B608380000
|
heap
|
page read and write
|
||
220EE9C1000
|
heap
|
page read and write
|
||
221C4A84000
|
heap
|
page read and write
|
||
1F155C00000
|
heap
|
page read and write
|
||
2A6D0000000
|
heap
|
page read and write
|
||
4A4B97B000
|
stack
|
page read and write
|
||
10D0000
|
direct allocation
|
page execute and read and write
|
||
1F155D10000
|
heap
|
page read and write
|
||
6493C7E000
|
stack
|
page read and write
|
||
28470FD6000
|
heap
|
page read and write
|
||
1192000
|
heap
|
page read and write
|
||
2C20000
|
remote allocation
|
page read and write
|
||
1B60843C000
|
heap
|
page read and write
|
||
2847045B000
|
heap
|
page read and write
|
||
220EE0FA000
|
heap
|
page read and write
|
||
11FFE41F000
|
heap
|
page read and write
|
||
2AB0000
|
trusted library allocation
|
page read and write
|
||
220EE950000
|
heap
|
page read and write
|
||
169D41BA000
|
heap
|
page read and write
|
||
220EE966000
|
heap
|
page read and write
|
||
7FF8CAA40000
|
unkown
|
page readonly
|
||
116A000
|
heap
|
page read and write
|
||
10E0000
|
heap
|
page readonly
|
||
618F0FD000
|
stack
|
page read and write
|
||
87BFE7B000
|
stack
|
page read and write
|
||
B31A37D000
|
stack
|
page read and write
|
||
1EEB7845000
|
heap
|
page read and write
|
||
220EE973000
|
heap
|
page read and write
|
||
169D4115000
|
heap
|
page read and write
|
||
317858E000
|
stack
|
page read and write
|
||
169D40A0000
|
remote allocation
|
page read and write
|
||
2A6D0076000
|
heap
|
page read and write
|
||
220EE09B000
|
heap
|
page read and write
|
||
2847160C000
|
heap
|
page read and write
|
||
1B608476000
|
heap
|
page read and write
|
||
220EE996000
|
heap
|
page read and write
|
||
28470489000
|
heap
|
page read and write
|
||
30CB000
|
stack
|
page read and write
|
||
2A1B07C000
|
stack
|
page read and write
|
||
7FF8CAA92000
|
unkown
|
page readonly
|
||
220EE900000
|
heap
|
page read and write
|
||
16FB8C50000
|
heap
|
page read and write
|
||
16FB8E30000
|
heap
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
1B608500000
|
heap
|
page read and write
|
||
201C7D38000
|
heap
|
page read and write
|
||
16FBC1C0000
|
trusted library allocation
|
page read and write
|
||
169D41B6000
|
heap
|
page read and write
|
||
3178DFF000
|
stack
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
1B60846A000
|
heap
|
page read and write
|
||
28470450000
|
heap
|
page read and write
|
||
220EE974000
|
heap
|
page read and write
|
||
2A1B7FF000
|
stack
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
87C017B000
|
stack
|
page read and write
|
||
220EE9B0000
|
heap
|
page read and write
|
||
2847170A000
|
heap
|
page read and write
|
||
28470390000
|
heap
|
page read and write
|
||
16FB8EDC000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
220EEE02000
|
heap
|
page read and write
|
||
220EE996000
|
heap
|
page read and write
|
||
28470452000
|
heap
|
page read and write
|
||
169D41B6000
|
heap
|
page read and write
|
||
220EE974000
|
heap
|
page read and write
|
||
7FF8CAA92000
|
unkown
|
page readonly
|
||
284704E4000
|
heap
|
page read and write
|
||
7FF8CAA96000
|
unkown
|
page read and write
|
||
181D0650000
|
heap
|
page read and write
|
||
D00000
|
direct allocation
|
page execute and read and write
|
||
1F155D3B000
|
heap
|
page read and write
|
||
169D4BE0000
|
heap
|
page read and write
|
||
220EDFF0000
|
remote allocation
|
page read and write
|
||
220EE962000
|
heap
|
page read and write
|
||
220EE919000
|
heap
|
page read and write
|
||
16FB8EE1000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
D8F9076000
|
stack
|
page read and write
|
||
2C20000
|
remote allocation
|
page read and write
|
||
2A6D0013000
|
heap
|
page read and write
|
||
16FB8E0B000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
16FB8EF6000
|
heap
|
page read and write
|
||
4E1907E000
|
stack
|
page read and write
|
||
2A6D0100000
|
heap
|
page read and write
|
||
11FFE432000
|
heap
|
page read and write
|
||
2847043E000
|
heap
|
page read and write
|
||
220EE99E000
|
heap
|
page read and write
|
||
221C4CE0000
|
heap
|
page read and write
|
||
1B608454000
|
heap
|
page read and write
|
||
169D415F000
|
heap
|
page read and write
|
||
220EE9DC000
|
heap
|
page read and write
|
||
28470459000
|
heap
|
page read and write
|
||
28470485000
|
heap
|
page read and write
|
||
119E000
|
heap
|
page read and write
|
||
9667FFE000
|
stack
|
page read and write
|
||
EB4000
|
heap
|
page read and write
|
||
87BFF7E000
|
stack
|
page read and write
|
||
2A1B677000
|
stack
|
page read and write
|
||
220EE980000
|
heap
|
page read and write
|
||
220EE08A000
|
heap
|
page read and write
|
||
1F155C20000
|
heap
|
page read and write
|
||
220EE0C5000
|
heap
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
A284FE000
|
stack
|
page read and write
|
||
1EEB7838000
|
heap
|
page read and write
|
||
2A1B379000
|
stack
|
page read and write
|
||
1EEB7630000
|
heap
|
page read and write
|
||
169D4194000
|
heap
|
page read and write
|
||
116D000
|
heap
|
page read and write
|
||
29B502F5000
|
heap
|
page read and write
|
||
2C20000
|
remote allocation
|
page read and write
|
||
A286FE000
|
stack
|
page read and write
|
||
28471602000
|
heap
|
page read and write
|
||
169D4107000
|
heap
|
page read and write
|
||
D8F917F000
|
stack
|
page read and write
|
||
2BBC000
|
stack
|
page read and write
|
||
4E18F7E000
|
stack
|
page read and write
|
||
181D06C0000
|
heap
|
page read and write
|
||
28470449000
|
heap
|
page read and write
|
||
220EE9B7000
|
heap
|
page read and write
|
||
116A000
|
heap
|
page read and write
|
||
1B6083E0000
|
heap
|
page read and write
|
||
220EE998000
|
heap
|
page read and write
|
||
28470F00000
|
heap
|
page read and write
|
||
220EEE1A000
|
heap
|
page read and write
|
||
220EE9A8000
|
heap
|
page read and write
|
||
DB0000
|
remote allocation
|
page read and write
|
||
221C4A00000
|
heap
|
page read and write
|
||
7FF8CAA92000
|
unkown
|
page readonly
|
||
DC0000
|
heap
|
page read and write
|
||
169D41B9000
|
heap
|
page read and write
|
||
220EE962000
|
heap
|
page read and write
|
||
220EE9A8000
|
heap
|
page read and write
|
||
29B50052000
|
heap
|
page read and write
|
||
220EE920000
|
heap
|
page read and write
|
||
220EE0D2000
|
heap
|
page read and write
|
||
16FB8EDC000
|
heap
|
page read and write
|
||
2A6D0880000
|
trusted library allocation
|
page read and write
|
||
D91000
|
heap
|
page read and write
|
||
4A4BC7E000
|
stack
|
page read and write
|
||
1564CA20000
|
heap
|
page read and write
|
||
1142000
|
heap
|
page read and write
|
||
220EE0EA000
|
heap
|
page read and write
|
||
1564CAB0000
|
heap
|
page read and write
|
||
DCE000
|
heap
|
page read and write
|
||
220EE998000
|
heap
|
page read and write
|
||
2A1B57E000
|
stack
|
page read and write
|
||
7FF8CAA99000
|
unkown
|
page readonly
|
||
284705AA000
|
heap
|
page read and write
|
||
1075000
|
stack
|
page read and write
|
||
A285FC000
|
stack
|
page read and write
|
||
220EEE02000
|
heap
|
page read and write
|
||
E7FEFEB000
|
stack
|
page read and write
|
||
DB3000
|
heap
|
page read and write
|
||
2A6D0113000
|
heap
|
page read and write
|
||
1B608400000
|
heap
|
page read and write
|
||
220EE9B9000
|
heap
|
page read and write
|
||
28470500000
|
heap
|
page read and write
|
||
169D4124000
|
heap
|
page read and write
|
||
28470CE0000
|
trusted library allocation
|
page read and write
|
||
16FB8E00000
|
heap
|
page read and write
|
||
220EE99E000
|
heap
|
page read and write
|
||
220EDF30000
|
trusted library allocation
|
page read and write
|
||
119E000
|
heap
|
page read and write
|
||
221C4A8D000
|
heap
|
page read and write
|
||
220EEE02000
|
heap
|
page read and write
|
||
169D41B6000
|
heap
|
page read and write
|
||
29B51000000
|
trusted library allocation
|
page read and write
|
||
2847044B000
|
heap
|
page read and write
|
||
1F155C90000
|
direct allocation
|
page execute and read and write
|
||
2A1B779000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
28471702000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
1F155D41000
|
heap
|
page read and write
|
||
E7FF5FB000
|
stack
|
page read and write
|
||
220EE9AD000
|
heap
|
page read and write
|
||
201C7D45000
|
heap
|
page read and write
|
||
6493AFF000
|
stack
|
page read and write
|
||
7FF8CAA40000
|
unkown
|
page readonly
|
||
28470F27000
|
heap
|
page read and write
|
||
1EEB785D000
|
heap
|
page read and write
|
||
1192000
|
heap
|
page read and write
|
||
11FFE3D0000
|
heap
|
page read and write
|
||
2A6D003C000
|
heap
|
page read and write
|
||
176E77E000
|
stack
|
page read and write
|
||
284704CE000
|
heap
|
page read and write
|
||
3178C7E000
|
stack
|
page read and write
|
||
181D0A90000
|
heap
|
page read and write
|
||
87C057E000
|
stack
|
page read and write
|
||
B31A3F9000
|
stack
|
page read and write
|
||
11FFE2A0000
|
heap
|
page read and write
|
||
220EE964000
|
heap
|
page read and write
|
||
169D41B9000
|
heap
|
page read and write
|
||
2847043B000
|
heap
|
page read and write
|
||
220EE03C000
|
heap
|
page read and write
|
||
28471654000
|
heap
|
page read and write
|
||
29B50290000
|
trusted library allocation
|
page read and write
|
||
220EE029000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
96678BB000
|
stack
|
page read and write
|
||
28471602000
|
heap
|
page read and write
|
||
220EEE21000
|
heap
|
page read and write
|
||
41CBF7B000
|
stack
|
page read and write
|
||
220EE000000
|
heap
|
page read and write
|
||
220EE04F000
|
heap
|
page read and write
|
||
2A6D0102000
|
heap
|
page read and write
|
||
284704AE000
|
heap
|
page read and write
|
||
28470C90000
|
trusted library allocation
|
page read and write
|
||
220EE962000
|
heap
|
page read and write
|
||
2847049A000
|
heap
|
page read and write
|
||
284705FD000
|
heap
|
page read and write
|
||
1B60845B000
|
heap
|
page read and write
|
||
169D4BE8000
|
heap
|
page read and write
|
||
29B50032000
|
heap
|
page read and write
|
||
220EDFF0000
|
remote allocation
|
page read and write
|
||
16FBC1B0000
|
heap
|
page read and write
|
||
220EE949000
|
heap
|
page read and write
|
||
29B50270000
|
trusted library allocation
|
page read and write
|
||
220EE9B0000
|
heap
|
page read and write
|
||
169D4127000
|
heap
|
page read and write
|
||
16FBBFE0000
|
heap
|
page read and write
|
||
4E18FFE000
|
stack
|
page read and write
|
There are 616 hidden memdumps, click here to show them.