IOC Report
x4ByCNJqst

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\x4ByCNJqst.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\x4ByCNJqst.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\x4ByCNJqst.dll,DllRegisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\HhAmkCb\GvrdyVBSmSfKAy.dll"
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\x4ByCNJqst.dll,DllUnregisterServer
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\x4ByCNJqst.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\x4ByCNJqst.dll",#1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://23.239.0.12/r
unknown
malicious
https://23.239.0.12/
23.239.0.12
malicious
https://23.239.0.12/T
unknown
malicious
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
http://crl.ver)
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://www.tiktok.com/legal/report/feedback
unknown
http://help.disneyplus.com.
unknown
https://support.hotspotshield.com/
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
https://disneyplus.com/legal.
unknown
There are 2 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
23.239.0.12
unknown
United States
malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\State
BlockUntilTimeStatus
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\TaskStore
Schedule Scan
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\Configuration
refreshAfter

Memdumps

Base Address
Regiontype
Protect
Malicious
180001000
direct allocation
page execute read
malicious
E30000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
181D20E0000
direct allocation
page execute and read and write
malicious
1460000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
1F155CA0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
1EEB7730000
trusted library allocation
page read and write
29B4FF80000
heap
page read and write
220EE04B000
heap
page read and write
169D413D000
heap
page read and write
220EE091000
heap
page read and write
7FF8CAA40000
unkown
page readonly
7FF8CAA96000
unkown
page read and write
B319F4C000
stack
page read and write
181D06E0000
heap
page read and write
169D41BB000
heap
page read and write
201C7CC0000
heap
page read and write
29B4FF60000
heap
page read and write
2A6D0080000
heap
page read and write
221C4CE5000
heap
page read and write
29B50072000
heap
page read and write
220EE9A7000
heap
page read and write
18002F000
direct allocation
page readonly
181D0718000
heap
page read and write
16FB8EB0000
heap
page read and write
220EE0E7000
heap
page read and write
96682FB000
stack
page read and write
16FB8E05000
heap
page read and write
18002F000
direct allocation
page readonly
220EEE03000
heap
page read and write
1170000
heap
page read and write
220EE113000
heap
page read and write
E7FF7FB000
stack
page read and write
41CBAFC000
stack
page read and write
169D4192000
heap
page read and write
2CBB000
stack
page read and write
11FFE525000
heap
page read and write
1B60848F000
heap
page read and write
220EE049000
heap
page read and write
29B50300000
trusted library allocation
page read and write
334E000
stack
page read and write
1B60845C000
heap
page read and write
1B608465000
heap
page read and write
966793F000
stack
page read and write
180000000
direct allocation
page read and write
29B5004B000
heap
page read and write
220EE108000
heap
page read and write
E7FF6FE000
stack
page read and write
1B608513000
heap
page read and write
29B4FEF0000
heap
page read and write
284704DA000
heap
page read and write
11FFE437000
heap
page read and write
220EEE02000
heap
page read and write
221C4A90000
heap
page read and write
11FFE433000
heap
page read and write
1142000
heap
page read and write
7FF8CAA41000
unkown
page execute read
1B608502000
heap
page read and write
181D2120000
heap
page readonly
1EEB7829000
heap
page read and write
29B50DF0000
trusted library allocation
page read and write
169D4030000
heap
page read and write
169D40A0000
remote allocation
page read and write
11FFE413000
heap
page read and write
181D2114000
heap
page read and write
28470F60000
heap
page read and write
220EE968000
heap
page read and write
119B000
heap
page read and write
2A6D0028000
heap
page read and write
181D2210000
heap
page read and write
29B50230000
trusted library allocation
page read and write
4E18E7F000
stack
page read and write
28470479000
heap
page read and write
220EEE02000
heap
page read and write
3178A77000
stack
page read and write
1EEB7908000
heap
page read and write
29B50051000
heap
page read and write
16FB8DB0000
heap
page read and write
1B608508000
heap
page read and write
1EEB785E000
heap
page read and write
169D4BEA000
heap
page read and write
176E36A000
stack
page read and write
220EEE02000
heap
page read and write
220EE98C000
heap
page read and write
220EDDD0000
heap
page read and write
220EE04E000
heap
page read and write
28470423000
heap
page read and write
1EEB7813000
heap
page read and write
87C0277000
stack
page read and write
2A6D0051000
heap
page read and write
169D4124000
heap
page read and write
220EE9B9000
heap
page read and write
220EEE02000
heap
page read and write
28470467000
heap
page read and write
A2867B000
stack
page read and write
181D0710000
heap
page read and write
176E87C000
stack
page read and write
D3B000
heap
page read and write
1F157660000
heap
page read and write
9667CFC000
stack
page read and write
176E67F000
stack
page read and write
1EEB7852000
heap
page read and write
169D40C8000
heap
page read and write
11E2000
heap
page read and write
220EDFF0000
remote allocation
page read and write
220EE964000
heap
page read and write
11FFE43A000
heap
page read and write
220EE96F000
heap
page read and write
D8F927E000
stack
page read and write
29B50051000
heap
page read and write
220EE917000
heap
page read and write
220EE9B0000
heap
page read and write
29B50008000
heap
page read and write
2AB0000
trusted library allocation
page read and write
9667EFA000
stack
page read and write
28470429000
heap
page read and write
16FB8EED000
heap
page read and write
220EE973000
heap
page read and write
220EE116000
heap
page read and write
16FB8ED2000
heap
page read and write
180000000
direct allocation
page read and write
7FF8CAA99000
unkown
page readonly
28471700000
heap
page read and write
16FB8EF6000
heap
page read and write
11FFE41F000
heap
page read and write
11FFE42E000
heap
page read and write
32CE000
stack
page read and write
28470E02000
heap
page read and write
220EE99A000
heap
page read and write
1B608466000
heap
page read and write
87BFEFE000
stack
page read and write
220EE95E000
heap
page read and write
220EE0DF000
heap
page read and write
29B501D0000
trusted library allocation
page read and write
1F155C70000
heap
page read and write
169D4BE9000
heap
page read and write
3178B7B000
stack
page read and write
1EEB7860000
heap
page read and write
7FF8CAA92000
unkown
page readonly
1564CA15000
heap
page read and write
11FFE41F000
heap
page read and write
11FFE415000
heap
page read and write
1B608E02000
trusted library allocation
page read and write
D10000
heap
page readonly
181D074E000
heap
page read and write
9667DF9000
stack
page read and write
11FFE417000
heap
page read and write
1F155D1B000
heap
page read and write
181D0AC0000
heap
page read and write
220EE050000
heap
page read and write
28470513000
heap
page read and write
169D4107000
heap
page read and write
220EE0BE000
heap
page read and write
2A6CFF80000
heap
page read and write
220EE98C000
heap
page read and write
29B50000000
heap
page read and write
ED5000
heap
page read and write
2A6CFF70000
heap
page read and write
1EEB7902000
heap
page read and write
26FF000
stack
page read and write
119E000
heap
page read and write
181D0740000
heap
page read and write
317850C000
stack
page read and write
7FF8CAA41000
unkown
page execute read
220EE070000
heap
page read and write
220EE9A9000
heap
page read and write
16FBC1B3000
heap
page read and write
7FF8CAA96000
unkown
page read and write
2A1B477000
stack
page read and write
284704B8000
heap
page read and write
220EE99D000
heap
page read and write
169D41B7000
heap
page read and write
1F155CD0000
heap
page readonly
220EE0EB000
heap
page read and write
18002E000
direct allocation
page read and write
4A4B9FD000
stack
page read and write
1F155AC0000
heap
page read and write
169D4194000
heap
page read and write
1F155D41000
heap
page read and write
A281DE000
stack
page read and write
181D0AB0000
direct allocation
page execute and read and write
DB0000
remote allocation
page read and write
28471600000
heap
page read and write
221C48D0000
heap
page read and write
220EE97B000
heap
page read and write
1F155D4E000
heap
page read and write
CE0000
heap
page read and write
11FFE402000
heap
page read and write
1EEB7863000
heap
page read and write
7FF8CAA96000
unkown
page read and write
284704E2000
heap
page read and write
18002E000
direct allocation
page read and write
3178CFF000
stack
page read and write
1EEB7913000
heap
page read and write
1EEB75C0000
heap
page read and write
96680FF000
stack
page read and write
220EE013000
heap
page read and write
D8F90FF000
stack
page read and write
2A6D0A02000
trusted library allocation
page read and write
169D4194000
heap
page read and write
176E6F8000
stack
page read and write
2C80000
heap
page read and write
1EEB75D0000
heap
page read and write
220EE99E000
heap
page read and write
1564CA10000
heap
page read and write
1B608460000
heap
page read and write
16FB8EF6000
heap
page read and write
16FB8EB7000
heap
page read and write
220EE9B2000
heap
page read and write
A2815A000
stack
page read and write
220EDE30000
heap
page read and write
18002D000
direct allocation
page readonly
2A6D006E000
heap
page read and write
1F157664000
heap
page read and write
18002D000
direct allocation
page readonly
284705ED000
heap
page read and write
2C3F000
stack
page read and write
169D4480000
heap
page read and write
11FFE407000
heap
page read and write
220EE960000
heap
page read and write
284704FD000
heap
page read and write
1EEB785B000
heap
page read and write
220EE9B2000
heap
page read and write
2A1B0FE000
stack
page read and write
96681FF000
stack
page read and write
28470FED000
heap
page read and write
1B608370000
heap
page read and write
180000000
direct allocation
page read and write
28470F34000
heap
page read and write
220EE99A000
heap
page read and write
169D40C0000
heap
page read and write
220EE082000
heap
page read and write
28470444000
heap
page read and write
314E000
stack
page read and write
1EEB7900000
heap
page read and write
317887E000
stack
page read and write
28470437000
heap
page read and write
10B0000
heap
page read and write
11FFE3F9000
heap
page read and write
1B608469000
heap
page read and write
28470495000
heap
page read and write
2A6CFFE0000
heap
page read and write
220EE996000
heap
page read and write
220EE04C000
heap
page read and write
220EE94D000
heap
page read and write
16FB8D90000
heap
page read and write
1564CABB000
heap
page read and write
29B50280000
heap
page readonly
11FFE520000
heap
page read and write
31CD000
stack
page read and write
11FFE42E000
heap
page read and write
6493BFE000
stack
page read and write
169D4485000
heap
page read and write
18002F000
direct allocation
page readonly
7FF8CAA99000
unkown
page readonly
E7FF4FB000
stack
page read and write
28470481000
heap
page read and write
220EE092000
heap
page read and write
176E7FF000
stack
page read and write
1564CADC000
heap
page read and write
87C047D000
stack
page read and write
169D4152000
heap
page read and write
18002E000
direct allocation
page read and write
169D41B2000
heap
page read and write
4E18EFE000
stack
page read and write
201C7B80000
heap
page read and write
1F155CE5000
heap
page read and write
169D41BD000
heap
page read and write
169D40A0000
remote allocation
page read and write
2A6D0002000
heap
page read and write
29B502F0000
heap
page read and write
169D4192000
heap
page read and write
169D4115000
heap
page read and write
1EEB7800000
heap
page read and write
169D412A000
heap
page read and write
181D0AC5000
heap
page read and write
7FF8CAA99000
unkown
page readonly
220EE9B0000
heap
page read and write
7FF8CAA41000
unkown
page execute read
317897B000
stack
page read and write
4A4BCFF000
stack
page read and write
220EE802000
heap
page read and write
284705F5000
heap
page read and write
11FFE418000
heap
page read and write
1F155D4E000
heap
page read and write
7FF8CAA41000
unkown
page execute read
11FFE4F0000
heap
page read and write
B31A47E000
stack
page read and write
28470400000
heap
page read and write
1564CA40000
heap
page read and write
16FB8ED2000
heap
page read and write
7FF8CAA40000
unkown
page readonly
220EE9A7000
heap
page read and write
221C4A20000
heap
page read and write
181D073A000
heap
page read and write
169D413D000
heap
page read and write
220EE9C2000
heap
page read and write
284703A0000
heap
page read and write
1B608464000
heap
page read and write
29B50012000
heap
page read and write
29B4FFF0000
trusted library allocation
page read and write
9B0000
heap
page read and write
1F155CE0000
heap
page read and write
6493A75000
stack
page read and write
1F1575F0000
heap
page read and write
1B608482000
heap
page read and write
18002F000
direct allocation
page readonly
41CBEFF000
stack
page read and write
284705BF000
heap
page read and write
220EE996000
heap
page read and write
EB0000
heap
page read and write
220EEE00000
heap
page read and write
1564C8C0000
heap
page read and write
181D074F000
heap
page read and write
16FB8EF0000
heap
page read and write
954000
stack
page read and write
220EEE1A000
heap
page read and write
D30000
heap
page read and write
169D4192000
heap
page read and write
1170000
heap
page read and write
B31A4F9000
stack
page read and write
4E18BFB000
stack
page read and write
1B60845E000
heap
page read and write
1490000
heap
page read and write
220EE996000
heap
page read and write
220EE9A0000
heap
page read and write
1B608462000
heap
page read and write
966837F000
stack
page read and write
284704D0000
heap
page read and write
29B5004A000
heap
page read and write
1B608413000
heap
page read and write
169D41B9000
heap
page read and write
16FB8EF0000
heap
page read and write
277F000
stack
page read and write
220EE96B000
heap
page read and write
221C4A69000
heap
page read and write
1B60845D000
heap
page read and write
181D2110000
heap
page read and write
1495000
heap
page read and write
3350000
heap
page read and write
1108000
heap
page read and write
181D074E000
heap
page read and write
220EE102000
heap
page read and write
8A0000
heap
page read and write
169D3FA0000
heap
page read and write
220EE98C000
heap
page read and write
169D4010000
heap
page read and write
28470F37000
heap
page read and write
29B502A0000
trusted library allocation
page read and write
D8F91FE000
stack
page read and write
220EDDC0000
heap
page read and write
1EEB7839000
heap
page read and write
1EEB783C000
heap
page read and write
1EEB785C000
heap
page read and write
16FB8EBB000
heap
page read and write
220EE996000
heap
page read and write
176E3EE000
stack
page read and write
169D4152000
heap
page read and write
29B502F9000
heap
page read and write
1B60842A000
heap
page read and write
201C7D30000
heap
page read and write
18002E000
direct allocation
page read and write
2847042F000
heap
page read and write
87C037E000
stack
page read and write
2C84000
heap
page read and write
1EEB7861000
heap
page read and write
16FB8ECD000
heap
page read and write
11FFE407000
heap
page read and write
A2857B000
stack
page read and write
11FFE3F0000
heap
page read and write
284703F0000
heap
page read and write
284704BB000
heap
page read and write
28470413000
heap
page read and write
41CBFFE000
stack
page read and write
1EEB7886000
heap
page read and write
16FB8EC9000
heap
page read and write
A2847E000
stack
page read and write
A2877E000
stack
page read and write
1EEB8002000
trusted library allocation
page read and write
29B4FF00000
trusted library allocation
page read and write
28471643000
heap
page read and write
1EEB785A000
heap
page read and write
181D0740000
heap
page read and write
28471619000
heap
page read and write
16FB8EC6000
heap
page read and write
1B608C80000
trusted library allocation
page read and write
16FB8EC9000
heap
page read and write
1B608468000
heap
page read and write
16FB8ED8000
heap
page read and write
220EE966000
heap
page read and write
2A1B17F000
stack
page read and write
11FFE42E000
heap
page read and write
220EE04A000
heap
page read and write
6493B7F000
stack
page read and write
220EE98C000
heap
page read and write
221C4A60000
heap
page read and write
220EE998000
heap
page read and write
1B608380000
heap
page read and write
220EE9C1000
heap
page read and write
221C4A84000
heap
page read and write
1F155C00000
heap
page read and write
2A6D0000000
heap
page read and write
4A4B97B000
stack
page read and write
10D0000
direct allocation
page execute and read and write
1F155D10000
heap
page read and write
6493C7E000
stack
page read and write
28470FD6000
heap
page read and write
1192000
heap
page read and write
2C20000
remote allocation
page read and write
1B60843C000
heap
page read and write
2847045B000
heap
page read and write
220EE0FA000
heap
page read and write
11FFE41F000
heap
page read and write
2AB0000
trusted library allocation
page read and write
220EE950000
heap
page read and write
169D41BA000
heap
page read and write
220EE966000
heap
page read and write
7FF8CAA40000
unkown
page readonly
116A000
heap
page read and write
10E0000
heap
page readonly
618F0FD000
stack
page read and write
87BFE7B000
stack
page read and write
B31A37D000
stack
page read and write
1EEB7845000
heap
page read and write
220EE973000
heap
page read and write
169D4115000
heap
page read and write
317858E000
stack
page read and write
169D40A0000
remote allocation
page read and write
2A6D0076000
heap
page read and write
220EE09B000
heap
page read and write
2847160C000
heap
page read and write
1B608476000
heap
page read and write
220EE996000
heap
page read and write
28470489000
heap
page read and write
30CB000
stack
page read and write
2A1B07C000
stack
page read and write
7FF8CAA92000
unkown
page readonly
220EE900000
heap
page read and write
16FB8C50000
heap
page read and write
16FB8E30000
heap
page read and write
2B3E000
stack
page read and write
1B608500000
heap
page read and write
201C7D38000
heap
page read and write
16FBC1C0000
trusted library allocation
page read and write
169D41B6000
heap
page read and write
3178DFF000
stack
page read and write
2B10000
heap
page read and write
1B60846A000
heap
page read and write
28470450000
heap
page read and write
220EE974000
heap
page read and write
2A1B7FF000
stack
page read and write
304F000
stack
page read and write
87C017B000
stack
page read and write
220EE9B0000
heap
page read and write
2847170A000
heap
page read and write
28470390000
heap
page read and write
16FB8EDC000
heap
page read and write
18002D000
direct allocation
page readonly
220EEE02000
heap
page read and write
220EE996000
heap
page read and write
28470452000
heap
page read and write
169D41B6000
heap
page read and write
220EE974000
heap
page read and write
7FF8CAA92000
unkown
page readonly
284704E4000
heap
page read and write
7FF8CAA96000
unkown
page read and write
181D0650000
heap
page read and write
D00000
direct allocation
page execute and read and write
1F155D3B000
heap
page read and write
169D4BE0000
heap
page read and write
220EDFF0000
remote allocation
page read and write
220EE962000
heap
page read and write
220EE919000
heap
page read and write
16FB8EE1000
heap
page read and write
DE0000
heap
page read and write
D8F9076000
stack
page read and write
2C20000
remote allocation
page read and write
2A6D0013000
heap
page read and write
16FB8E0B000
heap
page read and write
ED0000
heap
page read and write
990000
heap
page read and write
16FB8EF6000
heap
page read and write
4E1907E000
stack
page read and write
2A6D0100000
heap
page read and write
11FFE432000
heap
page read and write
2847043E000
heap
page read and write
220EE99E000
heap
page read and write
221C4CE0000
heap
page read and write
1B608454000
heap
page read and write
169D415F000
heap
page read and write
220EE9DC000
heap
page read and write
28470459000
heap
page read and write
28470485000
heap
page read and write
119E000
heap
page read and write
9667FFE000
stack
page read and write
EB4000
heap
page read and write
87BFF7E000
stack
page read and write
2A1B677000
stack
page read and write
220EE980000
heap
page read and write
220EE08A000
heap
page read and write
1F155C20000
heap
page read and write
220EE0C5000
heap
page read and write
1100000
heap
page read and write
A284FE000
stack
page read and write
1EEB7838000
heap
page read and write
2A1B379000
stack
page read and write
1EEB7630000
heap
page read and write
169D4194000
heap
page read and write
116D000
heap
page read and write
29B502F5000
heap
page read and write
2C20000
remote allocation
page read and write
A286FE000
stack
page read and write
28471602000
heap
page read and write
169D4107000
heap
page read and write
D8F917F000
stack
page read and write
2BBC000
stack
page read and write
4E18F7E000
stack
page read and write
181D06C0000
heap
page read and write
28470449000
heap
page read and write
220EE9B7000
heap
page read and write
116A000
heap
page read and write
1B6083E0000
heap
page read and write
220EE998000
heap
page read and write
28470F00000
heap
page read and write
220EEE1A000
heap
page read and write
220EE9A8000
heap
page read and write
DB0000
remote allocation
page read and write
221C4A00000
heap
page read and write
7FF8CAA92000
unkown
page readonly
DC0000
heap
page read and write
169D41B9000
heap
page read and write
220EE962000
heap
page read and write
220EE9A8000
heap
page read and write
29B50052000
heap
page read and write
220EE920000
heap
page read and write
220EE0D2000
heap
page read and write
16FB8EDC000
heap
page read and write
2A6D0880000
trusted library allocation
page read and write
D91000
heap
page read and write
4A4BC7E000
stack
page read and write
1564CA20000
heap
page read and write
1142000
heap
page read and write
220EE0EA000
heap
page read and write
1564CAB0000
heap
page read and write
DCE000
heap
page read and write
220EE998000
heap
page read and write
2A1B57E000
stack
page read and write
7FF8CAA99000
unkown
page readonly
284705AA000
heap
page read and write
1075000
stack
page read and write
A285FC000
stack
page read and write
220EEE02000
heap
page read and write
E7FEFEB000
stack
page read and write
DB3000
heap
page read and write
2A6D0113000
heap
page read and write
1B608400000
heap
page read and write
220EE9B9000
heap
page read and write
28470500000
heap
page read and write
169D4124000
heap
page read and write
28470CE0000
trusted library allocation
page read and write
16FB8E00000
heap
page read and write
220EE99E000
heap
page read and write
220EDF30000
trusted library allocation
page read and write
119E000
heap
page read and write
221C4A8D000
heap
page read and write
220EEE02000
heap
page read and write
169D41B6000
heap
page read and write
29B51000000
trusted library allocation
page read and write
2847044B000
heap
page read and write
1F155C90000
direct allocation
page execute and read and write
2A1B779000
stack
page read and write
180000000
direct allocation
page read and write
28471702000
heap
page read and write
9F0000
heap
page read and write
18002D000
direct allocation
page readonly
1F155D41000
heap
page read and write
E7FF5FB000
stack
page read and write
220EE9AD000
heap
page read and write
201C7D45000
heap
page read and write
6493AFF000
stack
page read and write
7FF8CAA40000
unkown
page readonly
28470F27000
heap
page read and write
1EEB785D000
heap
page read and write
1192000
heap
page read and write
11FFE3D0000
heap
page read and write
2A6D003C000
heap
page read and write
176E77E000
stack
page read and write
284704CE000
heap
page read and write
3178C7E000
stack
page read and write
181D0A90000
heap
page read and write
87C057E000
stack
page read and write
B31A3F9000
stack
page read and write
11FFE2A0000
heap
page read and write
220EE964000
heap
page read and write
169D41B9000
heap
page read and write
2847043B000
heap
page read and write
220EE03C000
heap
page read and write
28471654000
heap
page read and write
29B50290000
trusted library allocation
page read and write
220EE029000
heap
page read and write
D50000
heap
page read and write
96678BB000
stack
page read and write
28471602000
heap
page read and write
220EEE21000
heap
page read and write
41CBF7B000
stack
page read and write
220EE000000
heap
page read and write
220EE04F000
heap
page read and write
2A6D0102000
heap
page read and write
284704AE000
heap
page read and write
28470C90000
trusted library allocation
page read and write
220EE962000
heap
page read and write
2847049A000
heap
page read and write
284705FD000
heap
page read and write
1B60845B000
heap
page read and write
169D4BE8000
heap
page read and write
29B50032000
heap
page read and write
220EDFF0000
remote allocation
page read and write
16FBC1B0000
heap
page read and write
220EE949000
heap
page read and write
29B50270000
trusted library allocation
page read and write
220EE9B0000
heap
page read and write
169D4127000
heap
page read and write
16FBBFE0000
heap
page read and write
4E18FFE000
stack
page read and write
There are 616 hidden memdumps, click here to show them.