Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\x4ByCNJqst.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\x4ByCNJqst.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\x4ByCNJqst.dll,DllRegisterServer
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\x4ByCNJqst.dll,DllUnregisterServer
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZqFjKrAb\CiXiSWjn.dll"
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\HhAmkCb\GvrdyVBSmSfKAy.dll"
|
||
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\x4ByCNJqst.dll"
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\x4ByCNJqst.dll",#1
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://23.239.0.12/_
|
unknown
|
||
https://23.239.0.12/
|
23.239.0.12
|
||
https://23.239.0.12/r
|
unknown
|
||
https://23.239.0.12/T
|
unknown
|
||
https://www.disneyplus.com/legal/your-california-privacy-rights
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://www.disneyplus.com/legal/privacy-policy
|
unknown
|
||
http://help.disneyplus.com.
|
unknown
|
||
https://support.hotspotshield.com/
|
unknown
|
||
https://www.hotspotshield.com/terms/
|
unknown
|
||
https://www.pango.co/privacy
|
unknown
|
||
https://disneyplus.com/legal.
|
unknown
|
||
https://www.tiktok.com/legal/report/feedback
|
unknown
|
There are 3 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
23.239.0.12
|
unknown
|
United States
|
||
192.168.2.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\TaskStore
|
Schedule Scan
|
||
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\State
|
BlockUntilTimeStatus
|
||
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\Configuration
|
refreshAfter
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
180001000
|
direct allocation
|
page execute read
|
||
17092640000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
680000
|
direct allocation
|
page execute and read and write
|
||
1A5A5EA0000
|
direct allocation
|
page execute and read and write
|
||
F20000
|
direct allocation
|
page execute and read and write
|
||
23FCBADD000
|
heap
|
page read and write
|
||
17E9D24C000
|
heap
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
B8CDEFE000
|
stack
|
page read and write
|
||
1F4B0173000
|
heap
|
page read and write
|
||
22E83C5F000
|
heap
|
page read and write
|
||
17092700000
|
heap
|
page read and write
|
||
B8CE0FE000
|
stack
|
page read and write
|
||
732000
|
heap
|
page read and write
|
||
20F3AE60000
|
heap
|
page read and write
|
||
23DB203B000
|
heap
|
page read and write
|
||
20F3AF00000
|
heap
|
page read and write
|
||
22E83C00000
|
heap
|
page read and write
|
||
23DB1FB6000
|
heap
|
page read and write
|
||
17E9D308000
|
heap
|
page read and write
|
||
17E9D26F000
|
heap
|
page read and write
|
||
23DB2039000
|
heap
|
page read and write
|
||
B8CE3FC000
|
stack
|
page read and write
|
||
1F4AF8C5000
|
heap
|
page read and write
|
||
1CAAEEFB000
|
heap
|
page read and write
|
||
2B14773B000
|
heap
|
page read and write
|
||
B8CE57F000
|
unkown
|
page read and write
|
||
F8057EA000
|
stack
|
page read and write
|
||
EEBFCFE000
|
stack
|
page read and write
|
||
28E4000
|
heap
|
page read and write
|
||
74D000
|
heap
|
page read and write
|
||
2AF5A7F000
|
stack
|
page read and write
|
||
1A5A5E70000
|
heap
|
page read and write
|
||
7FF8CA970000
|
unkown
|
page readonly
|
||
23FCBA50000
|
heap
|
page read and write
|
||
186D6773000
|
heap
|
page read and write
|
||
253C000
|
stack
|
page read and write
|
||
1709255F000
|
heap
|
page read and write
|
||
1F4B01B3000
|
heap
|
page read and write
|
||
23FCC308000
|
heap
|
page read and write
|
||
7FF8CA9C9000
|
unkown
|
page readonly
|
||
17092360000
|
heap
|
page read and write
|
||
DC2000
|
heap
|
page read and write
|
||
23FCBA81000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
1F4B0181000
|
heap
|
page read and write
|
||
17092571000
|
heap
|
page read and write
|
||
7FF8CA9C2000
|
unkown
|
page readonly
|
||
23DB1FA3000
|
heap
|
page read and write
|
||
B8CE678000
|
stack
|
page read and write
|
||
2C5000
|
stack
|
page read and write
|
||
23FCCA02000
|
heap
|
page read and write
|
||
66F56FE000
|
stack
|
page read and write
|
||
170924A0000
|
heap
|
page read and write
|
||
1F4AF813000
|
heap
|
page read and write
|
||
22E83C13000
|
heap
|
page read and write
|
||
186D6745000
|
heap
|
page read and write
|
||
22E83C52000
|
heap
|
page read and write
|
||
66F52BC000
|
stack
|
page read and write
|
||
1F4B01B2000
|
heap
|
page read and write
|
||
82BC4F7000
|
stack
|
page read and write
|
||
267C17F000
|
stack
|
page read and write
|
||
22E83C64000
|
heap
|
page read and write
|
||
F65000
|
heap
|
page read and write
|
||
1F4AF84D000
|
heap
|
page read and write
|
||
17E9D282000
|
heap
|
page read and write
|
||
4B8B97F000
|
stack
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
23FCBA13000
|
heap
|
page read and write
|
||
186D676B000
|
heap
|
page read and write
|
||
23FCBBF5000
|
heap
|
page read and write
|
||
23DB1FF8000
|
heap
|
page read and write
|
||
7FF8CA970000
|
unkown
|
page readonly
|
||
23FCBACC000
|
heap
|
page read and write
|
||
23DB2060000
|
heap
|
page read and write
|
||
22E83C29000
|
heap
|
page read and write
|
||
186D676B000
|
heap
|
page read and write
|
||
DDB000
|
heap
|
page read and write
|
||
6262A7E000
|
stack
|
page read and write
|
||
23FCCB00000
|
heap
|
page read and write
|
||
82BC0FE000
|
stack
|
page read and write
|
||
23DB1FD5000
|
heap
|
page read and write
|
||
1F4AF8F6000
|
heap
|
page read and write
|
||
22E83C66000
|
heap
|
page read and write
|
||
23FCCA54000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
23DB1F40000
|
heap
|
page read and write
|
||
23DB1EE5000
|
heap
|
page read and write
|
||
1F4B01A1000
|
heap
|
page read and write
|
||
1F4AF84B000
|
heap
|
page read and write
|
||
F805A7E000
|
stack
|
page read and write
|
||
20F3AD30000
|
heap
|
page read and write
|
||
9F0000
|
remote allocation
|
page read and write
|
||
7FF8CA970000
|
unkown
|
page readonly
|
||
1F4B0186000
|
heap
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
C606B7B000
|
stack
|
page read and write
|
||
1A5A5F04000
|
heap
|
page read and write
|
||
26495013000
|
heap
|
page read and write
|
||
7FF8CA9C2000
|
unkown
|
page readonly
|
||
CD1EB2F000
|
stack
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
4B8B27E000
|
stack
|
page read and write
|
||
23DB1FA5000
|
heap
|
page read and write
|
||
26495040000
|
heap
|
page read and write
|
||
23DB1FC2000
|
heap
|
page read and write
|
||
2B1476D9000
|
heap
|
page read and write
|
||
1F4AF8E9000
|
heap
|
page read and write
|
||
1F4AF870000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
2032A9F2000
|
heap
|
page read and write
|
||
626257E000
|
stack
|
page read and write
|
||
82BC37B000
|
stack
|
page read and write
|
||
2EB0000
|
remote allocation
|
page read and write
|
||
82BC6FF000
|
stack
|
page read and write
|
||
2170D690000
|
heap
|
page read and write
|
||
23FCBA80000
|
heap
|
page read and write
|
||
1F4AF8E9000
|
heap
|
page read and write
|
||
17E9D246000
|
heap
|
page read and write
|
||
1F4AF590000
|
heap
|
page read and write
|
||
267C1FE000
|
stack
|
page read and write
|
||
1F4B01B3000
|
heap
|
page read and write
|
||
1F4B01D6000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
2B14771C000
|
heap
|
page read and write
|
||
1F4B0190000
|
heap
|
page read and write
|
||
842EAFE000
|
stack
|
page read and write
|
||
842E8FB000
|
stack
|
page read and write
|
||
17092670000
|
heap
|
page readonly
|
||
23FCBA37000
|
heap
|
page read and write
|
||
20F3AE52000
|
heap
|
page read and write
|
||
626247B000
|
stack
|
page read and write
|
||
1F4AF916000
|
heap
|
page read and write
|
||
20F3AF08000
|
heap
|
page read and write
|
||
26495002000
|
heap
|
page read and write
|
||
2032A9CF000
|
heap
|
page read and write
|
||
23DB203B000
|
heap
|
page read and write
|
||
82BC5FE000
|
stack
|
page read and write
|
||
1F4B017D000
|
heap
|
page read and write
|
||
66F57FF000
|
stack
|
page read and write
|
||
DBF000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
17E9D213000
|
heap
|
page read and write
|
||
2032A9D0000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
1F4B0100000
|
heap
|
page read and write
|
||
22E83C62000
|
heap
|
page read and write
|
||
1A5A5EDB000
|
heap
|
page read and write
|
||
186D99B0000
|
trusted library allocation
|
page read and write
|
||
83F000
|
stack
|
page read and write
|
||
1F4B0161000
|
heap
|
page read and write
|
||
1F4B017D000
|
heap
|
page read and write
|
||
23FCBA3E000
|
heap
|
page read and write
|
||
23DB1FD8000
|
heap
|
page read and write
|
||
2B14773B000
|
heap
|
page read and write
|
||
22E83D02000
|
heap
|
page read and write
|
||
CD1EAAC000
|
stack
|
page read and write
|
||
CD1F1FE000
|
stack
|
page read and write
|
||
C74000
|
stack
|
page read and write
|
||
20F3AE29000
|
heap
|
page read and write
|
||
8D5000
|
heap
|
page read and write
|
||
EE0000
|
direct allocation
|
page execute and read and write
|
||
17092735000
|
heap
|
page read and write
|
||
1F4B016D000
|
heap
|
page read and write
|
||
C44D97F000
|
stack
|
page read and write
|
||
23DB203B000
|
heap
|
page read and write
|
||
626297E000
|
stack
|
page read and write
|
||
2B1476D5000
|
heap
|
page read and write
|
||
20F3AE5C000
|
heap
|
page read and write
|
||
186D676E000
|
heap
|
page read and write
|
||
842E2CB000
|
stack
|
page read and write
|
||
7FF8CA970000
|
unkown
|
page readonly
|
||
17092510000
|
heap
|
page read and write
|
||
1A5A5E50000
|
heap
|
page read and write
|
||
62624FE000
|
stack
|
page read and write
|
||
23DB203B000
|
heap
|
page read and write
|
||
2B14773D000
|
heap
|
page read and write
|
||
1F4AF600000
|
heap
|
page read and write
|
||
22E83AF0000
|
heap
|
page read and write
|
||
20F3AE64000
|
heap
|
page read and write
|
||
23DB1F9E000
|
heap
|
page read and write
|
||
C606CF9000
|
stack
|
page read and write
|
||
2F2F000
|
stack
|
page read and write
|
||
23DB205A000
|
heap
|
page read and write
|
||
23FCBA2F000
|
heap
|
page read and write
|
||
23FCBA5D000
|
heap
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
1F4B01B3000
|
heap
|
page read and write
|
||
26495A02000
|
trusted library allocation
|
page read and write
|
||
210000
|
heap
|
page read and write
|
||
23FCBAC4000
|
heap
|
page read and write
|
||
23FCBBAA000
|
heap
|
page read and write
|
||
28280100000
|
heap
|
page read and write
|
||
23DB1FB6000
|
heap
|
page read and write
|
||
26495113000
|
heap
|
page read and write
|
||
22E83C80000
|
heap
|
page read and write
|
||
66F577B000
|
stack
|
page read and write
|
||
186D6750000
|
heap
|
page read and write
|
||
20F3AE3C000
|
heap
|
page read and write
|
||
23FCBA89000
|
heap
|
page read and write
|
||
23DB2039000
|
heap
|
page read and write
|
||
186D674B000
|
heap
|
page read and write
|
||
1F4B0190000
|
heap
|
page read and write
|
||
DDB000
|
heap
|
page read and write
|
||
1F4B0186000
|
heap
|
page read and write
|
||
2B147530000
|
heap
|
page read and write
|
||
20F3AD40000
|
heap
|
page read and write
|
||
23FCBA91000
|
heap
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
282801A0000
|
heap
|
page read and write
|
||
4B8B579000
|
stack
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
22E83C5A000
|
heap
|
page read and write
|
||
17E9D274000
|
heap
|
page read and write
|
||
1F4AF8E6000
|
heap
|
page read and write
|
||
2EB0000
|
remote allocation
|
page read and write
|
||
1F4B0602000
|
heap
|
page read and write
|
||
17E9D24F000
|
heap
|
page read and write
|
||
17E9D200000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
1F4B0176000
|
heap
|
page read and write
|
||
186D675E000
|
heap
|
page read and write
|
||
1F4AF84A000
|
heap
|
page read and write
|
||
22E83C5D000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
1F4B0602000
|
heap
|
page read and write
|
||
1F4B017E000
|
heap
|
page read and write
|
||
186D6777000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
23FCBA52000
|
heap
|
page read and write
|
||
1CAAEF1D000
|
heap
|
page read and write
|
||
28280365000
|
heap
|
page read and write
|
||
2AF575E000
|
stack
|
page read and write
|
||
842E9FB000
|
stack
|
page read and write
|
||
EEBFBFE000
|
stack
|
page read and write
|
||
2032A9DE000
|
heap
|
page read and write
|
||
23DB2140000
|
heap
|
page read and write
|
||
1A5A5ED0000
|
heap
|
page read and write
|
||
1F4AF83C000
|
heap
|
page read and write
|
||
F805AFF000
|
stack
|
page read and write
|
||
186D6773000
|
heap
|
page read and write
|
||
1F4B01BD000
|
heap
|
page read and write
|
||
17E9D247000
|
heap
|
page read and write
|
||
1F4B0190000
|
heap
|
page read and write
|
||
C44D9FF000
|
stack
|
page read and write
|
||
1F4B0176000
|
heap
|
page read and write
|
||
D8E000
|
heap
|
page read and write
|
||
CD1F0F7000
|
stack
|
page read and write
|
||
17E9DC02000
|
trusted library allocation
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
282801A8000
|
heap
|
page read and write
|
||
186D6740000
|
heap
|
page read and write
|
||
D58000
|
heap
|
page read and write
|
||
EEBF8FE000
|
stack
|
page read and write
|
||
186D99A3000
|
heap
|
page read and write
|
||
26494EC0000
|
heap
|
page read and write
|
||
263B000
|
stack
|
page read and write
|
||
2B147690000
|
heap
|
page read and write
|
||
2B147540000
|
trusted library allocation
|
page read and write
|
||
23FCCA16000
|
heap
|
page read and write
|
||
2B1485E0000
|
trusted library allocation
|
page read and write
|
||
1F4AF87E000
|
heap
|
page read and write
|
||
1A5A5E74000
|
heap
|
page read and write
|
||
22E83A90000
|
heap
|
page read and write
|
||
DFA000
|
heap
|
page read and write
|
||
2B1476D0000
|
heap
|
page read and write
|
||
CCF1F3D000
|
stack
|
page read and write
|
||
24BE000
|
stack
|
page read and write
|
||
C606D7D000
|
stack
|
page read and write
|
||
23DB2039000
|
heap
|
page read and write
|
||
1F4B0002000
|
heap
|
page read and write
|
||
1A5A77E0000
|
heap
|
page read and write
|
||
17E9D313000
|
heap
|
page read and write
|
||
2B147733000
|
heap
|
page read and write
|
||
23DB2062000
|
heap
|
page read and write
|
||
77B707E000
|
stack
|
page read and write
|
||
4B8AF0B000
|
stack
|
page read and write
|
||
EEBF9FE000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
C44D8F8000
|
stack
|
page read and write
|
||
26495028000
|
heap
|
page read and write
|
||
23FCBA29000
|
heap
|
page read and write
|
||
23FCCA00000
|
heap
|
page read and write
|
||
23FCCB0A000
|
heap
|
page read and write
|
||
1A5A5E85000
|
heap
|
page read and write
|
||
2B147670000
|
heap
|
page read and write
|
||
82BC17E000
|
stack
|
page read and write
|
||
23FCCA43000
|
heap
|
page read and write
|
||
1A5A5E80000
|
heap
|
page read and write
|
||
1CAAF040000
|
heap
|
page read and write
|
||
7FF8CA9C6000
|
unkown
|
page read and write
|
||
186D6799000
|
heap
|
page read and write
|
||
28280360000
|
heap
|
page read and write
|
||
1F4B0190000
|
heap
|
page read and write
|
||
23DB2004000
|
heap
|
page read and write
|
||
842E7FB000
|
stack
|
page read and write
|
||
20F3AE5E000
|
heap
|
page read and write
|
||
B8CE2F7000
|
stack
|
page read and write
|
||
23DB203B000
|
heap
|
page read and write
|
||
23DB1FA5000
|
heap
|
page read and write
|
||
77B6DAF000
|
stack
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
F805B7E000
|
stack
|
page read and write
|
||
20F3B802000
|
trusted library allocation
|
page read and write
|
||
B8CE4FE000
|
stack
|
page read and write
|
||
17E9D160000
|
heap
|
page read and write
|
||
1F4B0622000
|
heap
|
page read and write
|
||
2B148640000
|
trusted library allocation
|
page read and write
|
||
1F4B01BB000
|
heap
|
page read and write
|
||
17E9D257000
|
heap
|
page read and write
|
||
23FCC32D000
|
heap
|
page read and write
|
||
2B147720000
|
heap
|
page read and write
|
||
23DB1FDB000
|
heap
|
page read and write
|
||
4B8B8FE000
|
stack
|
page read and write
|
||
1F4B014E000
|
heap
|
page read and write
|
||
186D6774000
|
heap
|
page read and write
|
||
186D677D000
|
heap
|
page read and write
|
||
23DB2AC1000
|
heap
|
page read and write
|
||
23FCCA19000
|
heap
|
page read and write
|
||
2B148380000
|
trusted library allocation
|
page read and write
|
||
7FF8CA9C6000
|
unkown
|
page read and write
|
||
2032ACE5000
|
heap
|
page read and write
|
||
7FF8CA971000
|
unkown
|
page execute read
|
||
D92000
|
heap
|
page read and write
|
||
C44D87F000
|
stack
|
page read and write
|
||
1CAAEEF0000
|
heap
|
page read and write
|
||
4B8AF8E000
|
stack
|
page read and write
|
||
F805C7F000
|
stack
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
77B6D2F000
|
stack
|
page read and write
|
||
22E83BF0000
|
trusted library allocation
|
page read and write
|
||
1F4AF7C0000
|
remote allocation
|
page read and write
|
||
23FCBA43000
|
heap
|
page read and write
|
||
23FCBA99000
|
heap
|
page read and write
|
||
F805BFE000
|
stack
|
page read and write
|
||
1F4AF851000
|
heap
|
page read and write
|
||
2B1476E0000
|
heap
|
page read and write
|
||
186D99A0000
|
heap
|
page read and write
|
||
D98000
|
heap
|
page read and write
|
||
2170D7C5000
|
heap
|
page read and write
|
||
23DB1FC6000
|
heap
|
page read and write
|
||
1F4B0190000
|
heap
|
page read and write
|
||
1F4B0190000
|
heap
|
page read and write
|
||
1F4B0190000
|
heap
|
page read and write
|
||
1CAAEEB0000
|
heap
|
page read and write
|
||
640000
|
direct allocation
|
page execute and read and write
|
||
186D66B0000
|
heap
|
page read and write
|
||
1F4B016F000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
23FCC202000
|
heap
|
page read and write
|
||
1F4AF902000
|
heap
|
page read and write
|
||
2B1485C0000
|
trusted library allocation
|
page read and write
|
||
7FF8CA9C9000
|
unkown
|
page readonly
|
||
3D0000
|
heap
|
page read and write
|
||
EEBFB7D000
|
stack
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
755000
|
heap
|
page read and write
|
||
1A5A5F00000
|
heap
|
page read and write
|
||
4B8B87A000
|
stack
|
page read and write
|
||
23FCB7D0000
|
heap
|
page read and write
|
||
17E9D229000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
CD1EFFB000
|
stack
|
page read and write
|
||
22E84402000
|
trusted library allocation
|
page read and write
|
||
23DB2005000
|
heap
|
page read and write
|
||
2032A9B0000
|
heap
|
page read and write
|
||
17E9DA70000
|
trusted library allocation
|
page read and write
|
||
23FCB970000
|
trusted library allocation
|
page read and write
|
||
626277B000
|
stack
|
page read and write
|
||
186D6720000
|
heap
|
page read and write
|
||
2032A9D2000
|
heap
|
page read and write
|
||
23FCB820000
|
heap
|
page read and write
|
||
66F533F000
|
stack
|
page read and write
|
||
1A5A5EFB000
|
heap
|
page read and write
|
||
1F4AF7C0000
|
remote allocation
|
page read and write
|
||
23DB1FD5000
|
heap
|
page read and write
|
||
1F4B0622000
|
heap
|
page read and write
|
||
23FCBA3B000
|
heap
|
page read and write
|
||
23FCBAB5000
|
heap
|
page read and write
|
||
1F4B0190000
|
heap
|
page read and write
|
||
2032A950000
|
heap
|
page read and write
|
||
23FCC313000
|
heap
|
page read and write
|
||
EEBFC7E000
|
stack
|
page read and write
|
||
2EAF000
|
stack
|
page read and write
|
||
23DB1FB2000
|
heap
|
page read and write
|
||
186D6773000
|
heap
|
page read and write
|
||
7FF8CA9C9000
|
unkown
|
page readonly
|
||
186D6770000
|
heap
|
page read and write
|
||
25BE000
|
stack
|
page read and write
|
||
DDB000
|
heap
|
page read and write
|
||
26495055000
|
heap
|
page read and write
|
||
23FCBA65000
|
heap
|
page read and write
|
||
288E000
|
stack
|
page read and write
|
||
23FCCB02000
|
heap
|
page read and write
|
||
17092730000
|
heap
|
page read and write
|
||
23FCBA00000
|
heap
|
page read and write
|
||
1F4B0600000
|
heap
|
page read and write
|
||
23FCC3D4000
|
heap
|
page read and write
|
||
2032ACE0000
|
heap
|
page read and write
|
||
1F4B061A000
|
heap
|
page read and write
|
||
1F4AF829000
|
heap
|
page read and write
|
||
1F4B01A1000
|
heap
|
page read and write
|
||
23FCBAA9000
|
heap
|
page read and write
|
||
26495000000
|
heap
|
page read and write
|
||
1F4AF8E1000
|
heap
|
page read and write
|
||
23FCBAD1000
|
heap
|
page read and write
|
||
23DB2039000
|
heap
|
page read and write
|
||
23FCBA6C000
|
heap
|
page read and write
|
||
4B8B47C000
|
stack
|
page read and write
|
||
2032A9C6000
|
heap
|
page read and write
|
||
2032A9D4000
|
heap
|
page read and write
|
||
186D6773000
|
heap
|
page read and write
|
||
18002D000
|
direct allocation
|
page readonly
|
||
23DB206D000
|
heap
|
page read and write
|
||
1A5A5E90000
|
direct allocation
|
page execute and read and write
|
||
20F3AE80000
|
heap
|
page read and write
|
||
1CAAEED0000
|
heap
|
page read and write
|
||
2B1485F0000
|
trusted library allocation
|
page read and write
|
||
1F4AF800000
|
heap
|
page read and write
|
||
17094040000
|
heap
|
page read and write
|
||
1F4AF8BF000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page readonly
|
||
23FCC300000
|
heap
|
page read and write
|
||
2DAB000
|
stack
|
page read and write
|
||
23DB205A000
|
heap
|
page read and write
|
||
267C0FF000
|
stack
|
page read and write
|
||
1A5A5DE0000
|
heap
|
page read and write
|
||
17E9D24D000
|
heap
|
page read and write
|
||
22E83D00000
|
heap
|
page read and write
|
||
1F4B017D000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
20FF000
|
stack
|
page read and write
|
||
1A5A5F05000
|
heap
|
page read and write
|
||
20F3AE13000
|
heap
|
page read and write
|
||
17092518000
|
heap
|
page read and write
|
||
1F4B01AC000
|
heap
|
page read and write
|
||
7FF8CA971000
|
unkown
|
page execute read
|
||
1CAAF045000
|
heap
|
page read and write
|
||
186D677B000
|
heap
|
page read and write
|
||
C606BF9000
|
stack
|
page read and write
|
||
186D6690000
|
heap
|
page read and write
|
||
1F4B01A1000
|
heap
|
page read and write
|
||
23DB2AC1000
|
heap
|
page read and write
|
||
23DB1EE0000
|
heap
|
page read and write
|
||
23DB1FC2000
|
heap
|
page read and write
|
||
1CAAED70000
|
heap
|
page read and write
|
||
1F4B018F000
|
heap
|
page read and write
|
||
23DB2039000
|
heap
|
page read and write
|
||
6BB000
|
heap
|
page read and write
|
||
7FF8CA9C2000
|
unkown
|
page readonly
|
||
7FF8CA9C9000
|
unkown
|
page readonly
|
||
2032A9DE000
|
heap
|
page read and write
|
||
2B148370000
|
trusted library allocation
|
page read and write
|
||
2AF56DB000
|
stack
|
page read and write
|
||
23DB205E000
|
heap
|
page read and write
|
||
1A5A7770000
|
heap
|
page readonly
|
||
23DB2004000
|
heap
|
page read and write
|
||
2032A9D5000
|
heap
|
page read and write
|
||
20F3AF13000
|
heap
|
page read and write
|
||
23FCC339000
|
heap
|
page read and write
|
||
1F4B016F000
|
heap
|
page read and write
|
||
1F4AF5A0000
|
heap
|
page read and write
|
||
20F3ADD0000
|
trusted library allocation
|
page read and write
|
||
B8CDF7D000
|
stack
|
page read and write
|
||
23FCBA9B000
|
heap
|
page read and write
|
||
1A5A5E00000
|
heap
|
page read and write
|
||
23FCB7C0000
|
heap
|
page read and write
|
||
186DA1B0000
|
heap
|
page read and write
|
||
1F4B0602000
|
heap
|
page read and write
|
||
26494F30000
|
heap
|
page read and write
|
||
23FCCA10000
|
heap
|
page read and write
|
||
23DB1FF8000
|
heap
|
page read and write
|
||
23DB2750000
|
remote allocation
|
page read and write
|
||
1F4B0176000
|
heap
|
page read and write
|
||
1F4AF913000
|
heap
|
page read and write
|
||
17E9D1D0000
|
heap
|
page read and write
|
||
1F4AF7C0000
|
remote allocation
|
page read and write
|
||
DEA000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
2032A9F1000
|
heap
|
page read and write
|
||
C44DA7C000
|
stack
|
page read and write
|
||
7FF8CA9C2000
|
unkown
|
page readonly
|
||
C60670B000
|
stack
|
page read and write
|
||
9F0000
|
remote allocation
|
page read and write
|
||
1CAAEF1B000
|
heap
|
page read and write
|
||
2170D7B0000
|
heap
|
page read and write
|
||
1F4B0183000
|
heap
|
page read and write
|
||
1F4AF849000
|
heap
|
page read and write
|
||
2032A9F5000
|
heap
|
page read and write
|
||
1F4B0602000
|
heap
|
page read and write
|
||
186D6758000
|
heap
|
page read and write
|
||
23FCBB13000
|
heap
|
page read and write
|
||
28280000000
|
heap
|
page read and write
|
||
23FCBBED000
|
heap
|
page read and write
|
||
282800E0000
|
heap
|
page read and write
|
||
1F4B01BB000
|
heap
|
page read and write
|
||
2649506F000
|
heap
|
page read and write
|
||
6262877000
|
stack
|
page read and write
|
||
26495102000
|
heap
|
page read and write
|
||
22E83C8A000
|
heap
|
page read and write
|
||
1F4B01B2000
|
heap
|
page read and write
|
||
1F4AF884000
|
heap
|
page read and write
|
||
186D6782000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page readonly
|
||
1F4B011E000
|
heap
|
page read and write
|
||
23DB205A000
|
heap
|
page read and write
|
||
22E83C67000
|
heap
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
1F4AF700000
|
trusted library allocation
|
page read and write
|
||
1F4B0176000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
2B1477E0000
|
trusted library allocation
|
page read and write
|
||
1F4B01A2000
|
heap
|
page read and write
|
||
22E83C8D000
|
heap
|
page read and write
|
||
23DB1FDD000
|
heap
|
page read and write
|
||
26494F60000
|
trusted library allocation
|
page read and write
|
||
1F4B018E000
|
heap
|
page read and write
|
||
20F3AE62000
|
heap
|
page read and write
|
||
23FCBBFD000
|
heap
|
page read and write
|
||
20F3AF02000
|
heap
|
page read and write
|
||
B8CE1F7000
|
stack
|
page read and write
|
||
7FF8CA971000
|
unkown
|
page execute read
|
||
DF1000
|
heap
|
page read and write
|
||
1F4B0116000
|
heap
|
page read and write
|
||
77B6CA5000
|
stack
|
page read and write
|
||
2B14773B000
|
heap
|
page read and write
|
||
DFE000
|
heap
|
page read and write
|
||
23FCBAC1000
|
heap
|
page read and write
|
||
1A5A5CA0000
|
heap
|
page read and write
|
||
7FF8CA9C6000
|
unkown
|
page read and write
|
||
2B147726000
|
heap
|
page read and write
|
||
22E83D08000
|
heap
|
page read and write
|
||
17E9D254000
|
heap
|
page read and write
|
||
267C075000
|
stack
|
page read and write
|
||
2B148300000
|
trusted library allocation
|
page read and write
|
||
23FCBAEA000
|
heap
|
page read and write
|
||
1A5A5F0E000
|
heap
|
page read and write
|
||
B8CE07C000
|
stack
|
page read and write
|
||
170924C0000
|
heap
|
page read and write
|
||
1A5A5F00000
|
heap
|
page read and write
|
||
17092704000
|
heap
|
page read and write
|
||
1F4B01B2000
|
heap
|
page read and write
|
||
23FCB920000
|
trusted library allocation
|
page read and write
|
||
1F4AF8AA000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
DFE000
|
heap
|
page read and write
|
||
7FF8CA971000
|
unkown
|
page execute read
|
||
23DB1F70000
|
heap
|
page read and write
|
||
1F4B0602000
|
heap
|
page read and write
|
||
DDB000
|
heap
|
page read and write
|
||
EEBF87A000
|
stack
|
page read and write
|
||
17E9D24B000
|
heap
|
page read and write
|
||
17E9D300000
|
heap
|
page read and write
|
||
1F4AF8D4000
|
heap
|
page read and write
|
||
2CAC000
|
stack
|
page read and write
|
||
1F4B016D000
|
heap
|
page read and write
|
||
2EB0000
|
remote allocation
|
page read and write
|
||
C44D59E000
|
stack
|
page read and write
|
||
2032A9C2000
|
heap
|
page read and write
|
||
17092630000
|
direct allocation
|
page execute and read and write
|
||
82BC3FF000
|
stack
|
page read and write
|
||
2810000
|
trusted library allocation
|
page read and write
|
||
23DB1FB2000
|
heap
|
page read and write
|
||
EEBFA7B000
|
stack
|
page read and write
|
||
26495100000
|
heap
|
page read and write
|
||
1F4B0197000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
2032A9F3000
|
heap
|
page read and write
|
||
23DB2AC0000
|
heap
|
page read and write
|
||
2170D700000
|
heap
|
page read and write
|
||
DF1000
|
heap
|
page read and write
|
||
1F4B0190000
|
heap
|
page read and write
|
||
186D6767000
|
heap
|
page read and write
|
||
2B1476E7000
|
heap
|
page read and write
|
||
26494ED0000
|
heap
|
page read and write
|
||
1A5A5F0E000
|
heap
|
page read and write
|
||
23FCCA02000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
1F4AF84E000
|
heap
|
page read and write
|
||
1F4AF850000
|
heap
|
page read and write
|
||
1F4AF908000
|
heap
|
page read and write
|
||
CD1EBAF000
|
stack
|
page read and write
|
||
1F4B0179000
|
heap
|
page read and write
|
||
23DB2750000
|
remote allocation
|
page read and write
|
||
20F3ADA0000
|
heap
|
page read and write
|
||
23DB205A000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page readonly
|
||
2B148310000
|
trusted library allocation
|
page read and write
|
||
22E83C3C000
|
heap
|
page read and write
|
||
17092568000
|
heap
|
page read and write
|
||
23FCC3ED000
|
heap
|
page read and write
|
||
23DB206C000
|
heap
|
page read and write
|
||
23DB2750000
|
remote allocation
|
page read and write
|
||
2032A9BB000
|
heap
|
page read and write
|
||
1F4AF8A9000
|
heap
|
page read and write
|
||
20F3AE00000
|
heap
|
page read and write
|
||
17092610000
|
heap
|
page read and write
|
||
267C2FE000
|
stack
|
page read and write
|
||
1F4AF8B3000
|
heap
|
page read and write
|
||
23FCC35C000
|
heap
|
page read and write
|
||
267C37B000
|
stack
|
page read and write
|
||
23DB1FC6000
|
heap
|
page read and write
|
||
23DB1ED0000
|
heap
|
page read and write
|
||
267C27E000
|
stack
|
page read and write
|
||
23FCC306000
|
heap
|
page read and write
|
||
22E83A80000
|
heap
|
page read and write
|
||
1F4B0186000
|
heap
|
page read and write
|
||
2032A9C7000
|
heap
|
page read and write
|
||
4B8B67F000
|
stack
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
17E9D302000
|
heap
|
page read and write
|
||
23DB1F78000
|
heap
|
page read and write
|
||
23FCBA48000
|
heap
|
page read and write
|
||
1F4B061A000
|
heap
|
page read and write
|
||
82BC07B000
|
stack
|
page read and write
|
||
23FCBAC3000
|
heap
|
page read and write
|
||
DC2000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1F4B016C000
|
heap
|
page read and write
|
||
1F4B0172000
|
heap
|
page read and write
|
||
2170D7B8000
|
heap
|
page read and write
|
||
7FF8CA9C6000
|
unkown
|
page read and write
|
||
EEBFAFC000
|
stack
|
page read and write
|
||
2032A9DE000
|
heap
|
page read and write
|
||
DFE000
|
heap
|
page read and write
|
||
C44D51A000
|
stack
|
page read and write
|
||
77B70FE000
|
stack
|
page read and write
|
||
CD1F2FE000
|
stack
|
page read and write
|
||
712000
|
heap
|
page read and write
|
||
1709254F000
|
heap
|
page read and write
|
||
2032A970000
|
heap
|
page read and write
|
||
1F4B0177000
|
heap
|
page read and write
|
||
17E9D23C000
|
heap
|
page read and write
|
||
2032A9D6000
|
heap
|
page read and write
|
||
23DB205D000
|
heap
|
page read and write
|
||
EEBF97E000
|
stack
|
page read and write
|
||
20F3AE8A000
|
heap
|
page read and write
|
||
22E83C5C000
|
heap
|
page read and write
|
||
2032A8F0000
|
heap
|
page read and write
|
||
186D6620000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page read and write
|
||
22E83D13000
|
heap
|
page read and write
|
||
D92000
|
heap
|
page read and write
|
||
1A5A5F0F000
|
heap
|
page read and write
|
||
2AF57DE000
|
stack
|
page read and write
|
||
CD1F3FF000
|
stack
|
page read and write
|
||
23FCBBC6000
|
heap
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
B8CDE7B000
|
stack
|
page read and write
|
||
23DB1FF8000
|
heap
|
page read and write
|
||
4B8B77F000
|
stack
|
page read and write
|
||
1F4B01A1000
|
heap
|
page read and write
|
||
C606C7E000
|
stack
|
page read and write
|
||
17E9D28F000
|
heap
|
page read and write
|
||
17E9D170000
|
heap
|
page read and write
|
||
66F53BE000
|
stack
|
page read and write
|
||
4B8B37E000
|
stack
|
page read and write
|
||
23DB206C000
|
heap
|
page read and write
|
||
2B1485D0000
|
heap
|
page readonly
|
||
23DB205A000
|
heap
|
page read and write
|
||
186D6799000
|
heap
|
page read and write
|
There are 654 hidden memdumps, click here to show them.