IOC Report
x4ByCNJqst.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\x4ByCNJqst.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\x4ByCNJqst.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\x4ByCNJqst.dll,DllRegisterServer
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\x4ByCNJqst.dll,DllUnregisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZqFjKrAb\CiXiSWjn.dll"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\HhAmkCb\GvrdyVBSmSfKAy.dll"
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\x4ByCNJqst.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\x4ByCNJqst.dll",#1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://23.239.0.12/_
unknown
malicious
https://23.239.0.12/
23.239.0.12
malicious
https://23.239.0.12/r
unknown
malicious
https://23.239.0.12/T
unknown
malicious
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
http://crl.ver)
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
http://help.disneyplus.com.
unknown
https://support.hotspotshield.com/
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
https://disneyplus.com/legal.
unknown
https://www.tiktok.com/legal/report/feedback
unknown
There are 3 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
23.239.0.12
unknown
United States
malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\TaskStore
Schedule Scan
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\State
BlockUntilTimeStatus
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\Configuration
refreshAfter

Memdumps

Base Address
Regiontype
Protect
Malicious
180001000
direct allocation
page execute read
malicious
17092640000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
680000
direct allocation
page execute and read and write
malicious
1A5A5EA0000
direct allocation
page execute and read and write
malicious
F20000
direct allocation
page execute and read and write
malicious
23FCBADD000
heap
page read and write
17E9D24C000
heap
page read and write
702000
heap
page read and write
B8CDEFE000
stack
page read and write
1F4B0173000
heap
page read and write
22E83C5F000
heap
page read and write
17092700000
heap
page read and write
B8CE0FE000
stack
page read and write
732000
heap
page read and write
20F3AE60000
heap
page read and write
23DB203B000
heap
page read and write
20F3AF00000
heap
page read and write
22E83C00000
heap
page read and write
23DB1FB6000
heap
page read and write
17E9D308000
heap
page read and write
17E9D26F000
heap
page read and write
23DB2039000
heap
page read and write
B8CE3FC000
stack
page read and write
1F4AF8C5000
heap
page read and write
1CAAEEFB000
heap
page read and write
2B14773B000
heap
page read and write
B8CE57F000
unkown
page read and write
F8057EA000
stack
page read and write
EEBFCFE000
stack
page read and write
28E4000
heap
page read and write
74D000
heap
page read and write
2AF5A7F000
stack
page read and write
1A5A5E70000
heap
page read and write
7FF8CA970000
unkown
page readonly
23FCBA50000
heap
page read and write
186D6773000
heap
page read and write
253C000
stack
page read and write
1709255F000
heap
page read and write
1F4B01B3000
heap
page read and write
23FCC308000
heap
page read and write
7FF8CA9C9000
unkown
page readonly
17092360000
heap
page read and write
DC2000
heap
page read and write
23FCBA81000
heap
page read and write
EC0000
heap
page read and write
1F4B0181000
heap
page read and write
17092571000
heap
page read and write
7FF8CA9C2000
unkown
page readonly
23DB1FA3000
heap
page read and write
B8CE678000
stack
page read and write
2C5000
stack
page read and write
23FCCA02000
heap
page read and write
66F56FE000
stack
page read and write
170924A0000
heap
page read and write
1F4AF813000
heap
page read and write
22E83C13000
heap
page read and write
186D6745000
heap
page read and write
22E83C52000
heap
page read and write
66F52BC000
stack
page read and write
1F4B01B2000
heap
page read and write
82BC4F7000
stack
page read and write
267C17F000
stack
page read and write
22E83C64000
heap
page read and write
F65000
heap
page read and write
1F4AF84D000
heap
page read and write
17E9D282000
heap
page read and write
4B8B97F000
stack
page read and write
650000
heap
page read and write
23FCBA13000
heap
page read and write
186D676B000
heap
page read and write
23FCBBF5000
heap
page read and write
23DB1FF8000
heap
page read and write
7FF8CA970000
unkown
page readonly
23FCBACC000
heap
page read and write
23DB2060000
heap
page read and write
22E83C29000
heap
page read and write
186D676B000
heap
page read and write
DDB000
heap
page read and write
6262A7E000
stack
page read and write
23FCCB00000
heap
page read and write
82BC0FE000
stack
page read and write
23DB1FD5000
heap
page read and write
1F4AF8F6000
heap
page read and write
22E83C66000
heap
page read and write
23FCCA54000
heap
page read and write
6B0000
heap
page read and write
23DB1F40000
heap
page read and write
23DB1EE5000
heap
page read and write
1F4B01A1000
heap
page read and write
1F4AF84B000
heap
page read and write
F805A7E000
stack
page read and write
20F3AD30000
heap
page read and write
9F0000
remote allocation
page read and write
7FF8CA970000
unkown
page readonly
1F4B0186000
heap
page read and write
654000
heap
page read and write
C606B7B000
stack
page read and write
1A5A5F04000
heap
page read and write
26495013000
heap
page read and write
7FF8CA9C2000
unkown
page readonly
CD1EB2F000
stack
page read and write
F50000
trusted library allocation
page read and write
4B8B27E000
stack
page read and write
23DB1FA5000
heap
page read and write
26495040000
heap
page read and write
23DB1FC2000
heap
page read and write
2B1476D9000
heap
page read and write
1F4AF8E9000
heap
page read and write
1F4AF870000
heap
page read and write
8D0000
heap
page read and write
2032A9F2000
heap
page read and write
626257E000
stack
page read and write
82BC37B000
stack
page read and write
2EB0000
remote allocation
page read and write
82BC6FF000
stack
page read and write
2170D690000
heap
page read and write
23FCBA80000
heap
page read and write
1F4AF8E9000
heap
page read and write
17E9D246000
heap
page read and write
1F4AF590000
heap
page read and write
267C1FE000
stack
page read and write
1F4B01B3000
heap
page read and write
1F4B01D6000
heap
page read and write
18002F000
direct allocation
page readonly
2B14771C000
heap
page read and write
1F4B0190000
heap
page read and write
842EAFE000
stack
page read and write
842E8FB000
stack
page read and write
17092670000
heap
page readonly
23FCBA37000
heap
page read and write
20F3AE52000
heap
page read and write
626247B000
stack
page read and write
1F4AF916000
heap
page read and write
20F3AF08000
heap
page read and write
26495002000
heap
page read and write
2032A9CF000
heap
page read and write
23DB203B000
heap
page read and write
82BC5FE000
stack
page read and write
1F4B017D000
heap
page read and write
66F57FF000
stack
page read and write
DBF000
heap
page read and write
18002D000
direct allocation
page readonly
17E9D213000
heap
page read and write
2032A9D0000
heap
page read and write
18002D000
direct allocation
page readonly
1F4B0100000
heap
page read and write
22E83C62000
heap
page read and write
1A5A5EDB000
heap
page read and write
186D99B0000
trusted library allocation
page read and write
83F000
stack
page read and write
1F4B0161000
heap
page read and write
1F4B017D000
heap
page read and write
23FCBA3E000
heap
page read and write
23DB1FD8000
heap
page read and write
2B14773B000
heap
page read and write
22E83D02000
heap
page read and write
CD1EAAC000
stack
page read and write
CD1F1FE000
stack
page read and write
C74000
stack
page read and write
20F3AE29000
heap
page read and write
8D5000
heap
page read and write
EE0000
direct allocation
page execute and read and write
17092735000
heap
page read and write
1F4B016D000
heap
page read and write
C44D97F000
stack
page read and write
23DB203B000
heap
page read and write
626297E000
stack
page read and write
2B1476D5000
heap
page read and write
20F3AE5C000
heap
page read and write
186D676E000
heap
page read and write
842E2CB000
stack
page read and write
7FF8CA970000
unkown
page readonly
17092510000
heap
page read and write
1A5A5E50000
heap
page read and write
62624FE000
stack
page read and write
23DB203B000
heap
page read and write
2B14773D000
heap
page read and write
1F4AF600000
heap
page read and write
22E83AF0000
heap
page read and write
20F3AE64000
heap
page read and write
23DB1F9E000
heap
page read and write
C606CF9000
stack
page read and write
2F2F000
stack
page read and write
23DB205A000
heap
page read and write
23FCBA2F000
heap
page read and write
23FCBA5D000
heap
page read and write
660000
heap
page read and write
1F4B01B3000
heap
page read and write
26495A02000
trusted library allocation
page read and write
210000
heap
page read and write
23FCBAC4000
heap
page read and write
23FCBBAA000
heap
page read and write
28280100000
heap
page read and write
23DB1FB6000
heap
page read and write
26495113000
heap
page read and write
22E83C80000
heap
page read and write
66F577B000
stack
page read and write
186D6750000
heap
page read and write
20F3AE3C000
heap
page read and write
23FCBA89000
heap
page read and write
23DB2039000
heap
page read and write
186D674B000
heap
page read and write
1F4B0190000
heap
page read and write
DDB000
heap
page read and write
1F4B0186000
heap
page read and write
2B147530000
heap
page read and write
20F3AD40000
heap
page read and write
23FCBA91000
heap
page read and write
28E0000
heap
page read and write
282801A0000
heap
page read and write
4B8B579000
stack
page read and write
F10000
heap
page read and write
22E83C5A000
heap
page read and write
17E9D274000
heap
page read and write
1F4AF8E6000
heap
page read and write
2EB0000
remote allocation
page read and write
1F4B0602000
heap
page read and write
17E9D24F000
heap
page read and write
17E9D200000
heap
page read and write
18002D000
direct allocation
page readonly
1F4B0176000
heap
page read and write
186D675E000
heap
page read and write
1F4AF84A000
heap
page read and write
22E83C5D000
heap
page read and write
18002E000
direct allocation
page read and write
1F4B0602000
heap
page read and write
1F4B017E000
heap
page read and write
186D6777000
heap
page read and write
18002F000
direct allocation
page readonly
23FCBA52000
heap
page read and write
1CAAEF1D000
heap
page read and write
28280365000
heap
page read and write
2AF575E000
stack
page read and write
842E9FB000
stack
page read and write
EEBFBFE000
stack
page read and write
2032A9DE000
heap
page read and write
23DB2140000
heap
page read and write
1A5A5ED0000
heap
page read and write
1F4AF83C000
heap
page read and write
F805AFF000
stack
page read and write
186D6773000
heap
page read and write
1F4B01BD000
heap
page read and write
17E9D247000
heap
page read and write
1F4B0190000
heap
page read and write
C44D9FF000
stack
page read and write
1F4B0176000
heap
page read and write
D8E000
heap
page read and write
CD1F0F7000
stack
page read and write
17E9DC02000
trusted library allocation
page read and write
18002F000
direct allocation
page readonly
282801A8000
heap
page read and write
186D6740000
heap
page read and write
D58000
heap
page read and write
EEBF8FE000
stack
page read and write
186D99A3000
heap
page read and write
26494EC0000
heap
page read and write
263B000
stack
page read and write
2B147690000
heap
page read and write
2B147540000
trusted library allocation
page read and write
23FCCA16000
heap
page read and write
2B1485E0000
trusted library allocation
page read and write
1F4AF87E000
heap
page read and write
1A5A5E74000
heap
page read and write
22E83A90000
heap
page read and write
DFA000
heap
page read and write
2B1476D0000
heap
page read and write
CCF1F3D000
stack
page read and write
24BE000
stack
page read and write
C606D7D000
stack
page read and write
23DB2039000
heap
page read and write
1F4B0002000
heap
page read and write
1A5A77E0000
heap
page read and write
17E9D313000
heap
page read and write
2B147733000
heap
page read and write
23DB2062000
heap
page read and write
77B707E000
stack
page read and write
4B8AF0B000
stack
page read and write
EEBF9FE000
stack
page read and write
180000000
direct allocation
page read and write
C44D8F8000
stack
page read and write
26495028000
heap
page read and write
23FCBA29000
heap
page read and write
23FCCA00000
heap
page read and write
23FCCB0A000
heap
page read and write
1A5A5E85000
heap
page read and write
2B147670000
heap
page read and write
82BC17E000
stack
page read and write
23FCCA43000
heap
page read and write
1A5A5E80000
heap
page read and write
1CAAF040000
heap
page read and write
7FF8CA9C6000
unkown
page read and write
186D6799000
heap
page read and write
28280360000
heap
page read and write
1F4B0190000
heap
page read and write
23DB2004000
heap
page read and write
842E7FB000
stack
page read and write
20F3AE5E000
heap
page read and write
B8CE2F7000
stack
page read and write
23DB203B000
heap
page read and write
23DB1FA5000
heap
page read and write
77B6DAF000
stack
page read and write
2D2E000
stack
page read and write
F805B7E000
stack
page read and write
20F3B802000
trusted library allocation
page read and write
B8CE4FE000
stack
page read and write
17E9D160000
heap
page read and write
1F4B0622000
heap
page read and write
2B148640000
trusted library allocation
page read and write
1F4B01BB000
heap
page read and write
17E9D257000
heap
page read and write
23FCC32D000
heap
page read and write
2B147720000
heap
page read and write
23DB1FDB000
heap
page read and write
4B8B8FE000
stack
page read and write
1F4B014E000
heap
page read and write
186D6774000
heap
page read and write
186D677D000
heap
page read and write
23DB2AC1000
heap
page read and write
23FCCA19000
heap
page read and write
2B148380000
trusted library allocation
page read and write
7FF8CA9C6000
unkown
page read and write
2032ACE5000
heap
page read and write
7FF8CA971000
unkown
page execute read
D92000
heap
page read and write
C44D87F000
stack
page read and write
1CAAEEF0000
heap
page read and write
4B8AF8E000
stack
page read and write
F805C7F000
stack
page read and write
E50000
heap
page read and write
77B6D2F000
stack
page read and write
22E83BF0000
trusted library allocation
page read and write
1F4AF7C0000
remote allocation
page read and write
23FCBA43000
heap
page read and write
23FCBA99000
heap
page read and write
F805BFE000
stack
page read and write
1F4AF851000
heap
page read and write
2B1476E0000
heap
page read and write
186D99A0000
heap
page read and write
D98000
heap
page read and write
2170D7C5000
heap
page read and write
23DB1FC6000
heap
page read and write
1F4B0190000
heap
page read and write
1F4B0190000
heap
page read and write
1F4B0190000
heap
page read and write
1CAAEEB0000
heap
page read and write
640000
direct allocation
page execute and read and write
186D66B0000
heap
page read and write
1F4B016F000
heap
page read and write
600000
heap
page read and write
23FCC202000
heap
page read and write
1F4AF902000
heap
page read and write
2B1485C0000
trusted library allocation
page read and write
7FF8CA9C9000
unkown
page readonly
3D0000
heap
page read and write
EEBFB7D000
stack
page read and write
F60000
heap
page read and write
755000
heap
page read and write
1A5A5F00000
heap
page read and write
4B8B87A000
stack
page read and write
23FCB7D0000
heap
page read and write
17E9D229000
heap
page read and write
880000
heap
page read and write
CD1EFFB000
stack
page read and write
22E84402000
trusted library allocation
page read and write
23DB2005000
heap
page read and write
2032A9B0000
heap
page read and write
17E9DA70000
trusted library allocation
page read and write
23FCB970000
trusted library allocation
page read and write
626277B000
stack
page read and write
186D6720000
heap
page read and write
2032A9D2000
heap
page read and write
23FCB820000
heap
page read and write
66F533F000
stack
page read and write
1A5A5EFB000
heap
page read and write
1F4AF7C0000
remote allocation
page read and write
23DB1FD5000
heap
page read and write
1F4B0622000
heap
page read and write
23FCBA3B000
heap
page read and write
23FCBAB5000
heap
page read and write
1F4B0190000
heap
page read and write
2032A950000
heap
page read and write
23FCC313000
heap
page read and write
EEBFC7E000
stack
page read and write
2EAF000
stack
page read and write
23DB1FB2000
heap
page read and write
186D6773000
heap
page read and write
7FF8CA9C9000
unkown
page readonly
186D6770000
heap
page read and write
25BE000
stack
page read and write
DDB000
heap
page read and write
26495055000
heap
page read and write
23FCBA65000
heap
page read and write
288E000
stack
page read and write
23FCCB02000
heap
page read and write
17092730000
heap
page read and write
23FCBA00000
heap
page read and write
1F4B0600000
heap
page read and write
23FCC3D4000
heap
page read and write
2032ACE0000
heap
page read and write
1F4B061A000
heap
page read and write
1F4AF829000
heap
page read and write
1F4B01A1000
heap
page read and write
23FCBAA9000
heap
page read and write
26495000000
heap
page read and write
1F4AF8E1000
heap
page read and write
23FCBAD1000
heap
page read and write
23DB2039000
heap
page read and write
23FCBA6C000
heap
page read and write
4B8B47C000
stack
page read and write
2032A9C6000
heap
page read and write
2032A9D4000
heap
page read and write
186D6773000
heap
page read and write
18002D000
direct allocation
page readonly
23DB206D000
heap
page read and write
1A5A5E90000
direct allocation
page execute and read and write
20F3AE80000
heap
page read and write
1CAAEED0000
heap
page read and write
2B1485F0000
trusted library allocation
page read and write
1F4AF800000
heap
page read and write
17094040000
heap
page read and write
1F4AF8BF000
heap
page read and write
18002F000
direct allocation
page readonly
23FCC300000
heap
page read and write
2DAB000
stack
page read and write
23DB205A000
heap
page read and write
267C0FF000
stack
page read and write
1A5A5DE0000
heap
page read and write
17E9D24D000
heap
page read and write
22E83D00000
heap
page read and write
1F4B017D000
heap
page read and write
E70000
heap
page read and write
20FF000
stack
page read and write
1A5A5F05000
heap
page read and write
20F3AE13000
heap
page read and write
17092518000
heap
page read and write
1F4B01AC000
heap
page read and write
7FF8CA971000
unkown
page execute read
1CAAF045000
heap
page read and write
186D677B000
heap
page read and write
C606BF9000
stack
page read and write
186D6690000
heap
page read and write
1F4B01A1000
heap
page read and write
23DB2AC1000
heap
page read and write
23DB1EE0000
heap
page read and write
23DB1FC2000
heap
page read and write
1CAAED70000
heap
page read and write
1F4B018F000
heap
page read and write
23DB2039000
heap
page read and write
6BB000
heap
page read and write
7FF8CA9C2000
unkown
page readonly
7FF8CA9C9000
unkown
page readonly
2032A9DE000
heap
page read and write
2B148370000
trusted library allocation
page read and write
2AF56DB000
stack
page read and write
23DB205E000
heap
page read and write
1A5A7770000
heap
page readonly
23DB2004000
heap
page read and write
2032A9D5000
heap
page read and write
20F3AF13000
heap
page read and write
23FCC339000
heap
page read and write
1F4B016F000
heap
page read and write
1F4AF5A0000
heap
page read and write
20F3ADD0000
trusted library allocation
page read and write
B8CDF7D000
stack
page read and write
23FCBA9B000
heap
page read and write
1A5A5E00000
heap
page read and write
23FCB7C0000
heap
page read and write
186DA1B0000
heap
page read and write
1F4B0602000
heap
page read and write
26494F30000
heap
page read and write
23FCCA10000
heap
page read and write
23DB1FF8000
heap
page read and write
23DB2750000
remote allocation
page read and write
1F4B0176000
heap
page read and write
1F4AF913000
heap
page read and write
17E9D1D0000
heap
page read and write
1F4AF7C0000
remote allocation
page read and write
DEA000
heap
page read and write
990000
heap
page read and write
2032A9F1000
heap
page read and write
C44DA7C000
stack
page read and write
7FF8CA9C2000
unkown
page readonly
C60670B000
stack
page read and write
9F0000
remote allocation
page read and write
1CAAEF1B000
heap
page read and write
2170D7B0000
heap
page read and write
1F4B0183000
heap
page read and write
1F4AF849000
heap
page read and write
2032A9F5000
heap
page read and write
1F4B0602000
heap
page read and write
186D6758000
heap
page read and write
23FCBB13000
heap
page read and write
28280000000
heap
page read and write
23FCBBED000
heap
page read and write
282800E0000
heap
page read and write
1F4B01BB000
heap
page read and write
2649506F000
heap
page read and write
6262877000
stack
page read and write
26495102000
heap
page read and write
22E83C8A000
heap
page read and write
1F4B01B2000
heap
page read and write
1F4AF884000
heap
page read and write
186D6782000
heap
page read and write
7B0000
heap
page readonly
1F4B011E000
heap
page read and write
23DB205A000
heap
page read and write
22E83C67000
heap
page read and write
2F40000
heap
page read and write
1F4AF700000
trusted library allocation
page read and write
1F4B0176000
heap
page read and write
180000000
direct allocation
page read and write
2B1477E0000
trusted library allocation
page read and write
1F4B01A2000
heap
page read and write
22E83C8D000
heap
page read and write
23DB1FDD000
heap
page read and write
26494F60000
trusted library allocation
page read and write
1F4B018E000
heap
page read and write
20F3AE62000
heap
page read and write
23FCBBFD000
heap
page read and write
20F3AF02000
heap
page read and write
B8CE1F7000
stack
page read and write
7FF8CA971000
unkown
page execute read
DF1000
heap
page read and write
1F4B0116000
heap
page read and write
77B6CA5000
stack
page read and write
2B14773B000
heap
page read and write
DFE000
heap
page read and write
23FCBAC1000
heap
page read and write
1A5A5CA0000
heap
page read and write
7FF8CA9C6000
unkown
page read and write
2B147726000
heap
page read and write
22E83D08000
heap
page read and write
17E9D254000
heap
page read and write
267C075000
stack
page read and write
2B148300000
trusted library allocation
page read and write
23FCBAEA000
heap
page read and write
1A5A5F0E000
heap
page read and write
B8CE07C000
stack
page read and write
170924C0000
heap
page read and write
1A5A5F00000
heap
page read and write
17092704000
heap
page read and write
1F4B01B2000
heap
page read and write
23FCB920000
trusted library allocation
page read and write
1F4AF8AA000
heap
page read and write
18002E000
direct allocation
page read and write
DFE000
heap
page read and write
7FF8CA971000
unkown
page execute read
23DB1F70000
heap
page read and write
1F4B0602000
heap
page read and write
DDB000
heap
page read and write
EEBF87A000
stack
page read and write
17E9D24B000
heap
page read and write
17E9D300000
heap
page read and write
1F4AF8D4000
heap
page read and write
2CAC000
stack
page read and write
1F4B016D000
heap
page read and write
2EB0000
remote allocation
page read and write
C44D59E000
stack
page read and write
2032A9C2000
heap
page read and write
17092630000
direct allocation
page execute and read and write
82BC3FF000
stack
page read and write
2810000
trusted library allocation
page read and write
23DB1FB2000
heap
page read and write
EEBFA7B000
stack
page read and write
26495100000
heap
page read and write
1F4B0197000
heap
page read and write
180000000
direct allocation
page read and write
2032A9F3000
heap
page read and write
23DB2AC0000
heap
page read and write
2170D700000
heap
page read and write
DF1000
heap
page read and write
1F4B0190000
heap
page read and write
186D6767000
heap
page read and write
2B1476E7000
heap
page read and write
26494ED0000
heap
page read and write
1A5A5F0E000
heap
page read and write
23FCCA02000
heap
page read and write
D50000
heap
page read and write
1F4AF84E000
heap
page read and write
1F4AF850000
heap
page read and write
1F4AF908000
heap
page read and write
CD1EBAF000
stack
page read and write
1F4B0179000
heap
page read and write
23DB2750000
remote allocation
page read and write
20F3ADA0000
heap
page read and write
23DB205A000
heap
page read and write
EF0000
heap
page readonly
2B148310000
trusted library allocation
page read and write
22E83C3C000
heap
page read and write
17092568000
heap
page read and write
23FCC3ED000
heap
page read and write
23DB206C000
heap
page read and write
23DB2750000
remote allocation
page read and write
2032A9BB000
heap
page read and write
1F4AF8A9000
heap
page read and write
20F3AE00000
heap
page read and write
17092610000
heap
page read and write
267C2FE000
stack
page read and write
1F4AF8B3000
heap
page read and write
23FCC35C000
heap
page read and write
267C37B000
stack
page read and write
23DB1FC6000
heap
page read and write
23DB1ED0000
heap
page read and write
267C27E000
stack
page read and write
23FCC306000
heap
page read and write
22E83A80000
heap
page read and write
1F4B0186000
heap
page read and write
2032A9C7000
heap
page read and write
4B8B67F000
stack
page read and write
18002E000
direct allocation
page read and write
17E9D302000
heap
page read and write
23DB1F78000
heap
page read and write
23FCBA48000
heap
page read and write
1F4B061A000
heap
page read and write
82BC07B000
stack
page read and write
23FCBAC3000
heap
page read and write
DC2000
heap
page read and write
180000000
direct allocation
page read and write
1F4B016C000
heap
page read and write
1F4B0172000
heap
page read and write
2170D7B8000
heap
page read and write
7FF8CA9C6000
unkown
page read and write
EEBFAFC000
stack
page read and write
2032A9DE000
heap
page read and write
DFE000
heap
page read and write
C44D51A000
stack
page read and write
77B70FE000
stack
page read and write
CD1F2FE000
stack
page read and write
712000
heap
page read and write
1709254F000
heap
page read and write
2032A970000
heap
page read and write
1F4B0177000
heap
page read and write
17E9D23C000
heap
page read and write
2032A9D6000
heap
page read and write
23DB205D000
heap
page read and write
EEBF97E000
stack
page read and write
20F3AE8A000
heap
page read and write
22E83C5C000
heap
page read and write
2032A8F0000
heap
page read and write
186D6620000
heap
page read and write
18002E000
direct allocation
page read and write
22E83D13000
heap
page read and write
D92000
heap
page read and write
1A5A5F0F000
heap
page read and write
2AF57DE000
stack
page read and write
CD1F3FF000
stack
page read and write
23FCBBC6000
heap
page read and write
754000
heap
page read and write
B8CDE7B000
stack
page read and write
23DB1FF8000
heap
page read and write
4B8B77F000
stack
page read and write
1F4B01A1000
heap
page read and write
C606C7E000
stack
page read and write
17E9D28F000
heap
page read and write
17E9D170000
heap
page read and write
66F53BE000
stack
page read and write
4B8B37E000
stack
page read and write
23DB206C000
heap
page read and write
2B1485D0000
heap
page readonly
23DB205A000
heap
page read and write
186D6799000
heap
page read and write
There are 654 hidden memdumps, click here to show them.