IOC Report
wgJ5YjI2QO

loading gif

Files

File Path
Type
Category
Malicious
wgJ5YjI2QO.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x5e833448, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\wgJ5YjI2QO.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\wgJ5YjI2QO.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\wgJ5YjI2QO.dll,DllRegisterServer
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\wgJ5YjI2QO.dll,DllUnregisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\OtCXm\kDbCLHDWWfGFPvP.dll"
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\wgJ5YjI2QO.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\wgJ5YjI2QO.dll",#1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://23.239.0.12/
23.239.0.12
malicious
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
http://schemas.xmlsoap.org/ws/2004/08/add
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
https://disneyplus.com/legal.
unknown
http://crl.ver)
unknown
http://schemas.xmlsoap.org/ws/200
unknown
https://www.tiktok.com/legal/report/feedback
unknown
http://help.disneyplus.com.
unknown
https://support.hotspotshield.com/
unknown
https://displaycatalog.mp.microsoft.c80
unknown
There are 3 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
23.239.0.12
unknown
United States
malicious
192.168.2.1
unknown
unknown
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100

Memdumps

Base Address
Regiontype
Protect
Malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
CD0000
direct allocation
page execute and read and write
malicious
16F0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
14421CA0000
direct allocation
page execute and read and write
malicious
20BBFB80000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
1D30F000000
trusted library allocation
page read and write
1D30F288000
heap
page read and write
1A96D0B5000
heap
page read and write
14421D65000
heap
page read and write
180000000
direct allocation
page read and write
1D309AAB000
heap
page read and write
274D5602000
heap
page read and write
AF9B177000
stack
page read and write
1D30A302000
heap
page read and write
EBFFE7B000
stack
page read and write
27AC000
stack
page read and write
DCB000
heap
page read and write
1D30F29E000
heap
page read and write
5096078000
stack
page read and write
7FFA53261000
unkown
page execute read
14D0000
heap
page read and write
2AE98A82000
heap
page read and write
2661C054000
heap
page read and write
14421A98000
heap
page read and write
14421D60000
heap
page read and write
2AE98A00000
heap
page read and write
1D30A200000
heap
page read and write
16361D25000
heap
page read and write
1D30EFE8000
trusted library allocation
page read and write
14421A20000
heap
page read and write
274D57B7000
heap
page read and write
20BBFC50000
heap
page read and write
AF9B5FA000
stack
page read and write
23F88279000
heap
page read and write
14421A40000
heap
page read and write
16361AC6000
heap
page read and write
2661C100000
heap
page read and write
18002E000
direct allocation
page read and write
19D18082000
heap
page read and write
19D18069000
heap
page read and write
274D579C000
heap
page read and write
16D79B40000
heap
page read and write
274D5796000
heap
page read and write
19D1B250000
heap
page read and write
1D30F470000
trusted library allocation
page read and write
14421C60000
heap
page read and write
274D57C3000
heap
page read and write
23FF6FF000
stack
page read and write
BB5447B000
stack
page read and write
1D30F2E9000
heap
page read and write
274D5799000
heap
page read and write
2AE98B13000
heap
page read and write
7FFA53261000
unkown
page execute read
8C440F7000
stack
page read and write
326F000
stack
page read and write
19D182F0000
heap
page read and write
356E000
stack
page read and write
1D30F020000
trusted library allocation
page read and write
274D4E56000
heap
page read and write
16361AD1000
heap
page read and write
E1D000
heap
page read and write
7FFA53261000
unkown
page execute read
1D30F024000
trusted library allocation
page read and write
1D309AAB000
heap
page read and write
1755000
heap
page read and write
13D0000
heap
page read and write
2661C000000
heap
page read and write
1D30A304000
heap
page read and write
144236A0000
heap
page read and write
274D4E4F000
heap
page read and write
1D309A13000
heap
page read and write
2C5E000
stack
page read and write
282E000
stack
page read and write
1A96D0D6000
heap
page read and write
672517E000
stack
page read and write
2AE99280000
trusted library allocation
page read and write
934F3FB000
stack
page read and write
1D309AF9000
heap
page read and write
274D4E3C000
heap
page read and write
2661C086000
heap
page read and write
850000
heap
page read and write
274D4E55000
heap
page read and write
9B0000
direct allocation
page execute and read and write
7FFA532B6000
unkown
page read and write
16361A00000
trusted library allocation
page read and write
274D578C000
heap
page read and write
1D30A313000
heap
page read and write
274D4E4A000
heap
page read and write
1A96D0FE000
heap
page read and write
18002D000
direct allocation
page readonly
2AE98A80000
heap
page read and write
1D30A300000
heap
page read and write
1A96D0FE000
heap
page read and write
274D5794000
heap
page read and write
7FFA532B6000
unkown
page read and write
274D577E000
heap
page read and write
BB5437A000
stack
page read and write
2AE98A02000
heap
page read and write
1D309A9B000
heap
page read and write
274D4DD0000
remote allocation
page read and write
274D4E8A000
heap
page read and write
1D30F0B0000
trusted library allocation
page read and write
2AE98B02000
heap
page read and write
274D4E53000
heap
page read and write
2AE98A80000
heap
page read and write
16362940000
trusted library allocation
page read and write
905000
stack
page read and write
14421C94000
heap
page read and write
1D30F110000
trusted library allocation
page read and write
180000000
direct allocation
page read and write
1D30EFE0000
trusted library allocation
page read and write
2661C113000
heap
page read and write
AF9AFFB000
stack
page read and write
274D4F16000
heap
page read and write
180000000
direct allocation
page read and write
23F88313000
heap
page read and write
2AE98970000
heap
page read and write
23FF67F000
stack
page read and write
940000
heap
page read and write
19D18315000
heap
page read and write
2AE98A66000
heap
page read and write
274D4EA9000
heap
page read and write
274D4E52000
heap
page read and write
274D5C02000
heap
page read and write
1A96CF50000
heap
page read and write
1D30F2F7000
heap
page read and write
1D30F140000
remote allocation
page read and write
274D5798000
heap
page read and write
672527E000
stack
page read and write
1D30A359000
heap
page read and write
2661C024000
heap
page read and write
16361830000
heap
page read and write
1750000
heap
page read and write
14D0000
heap
page read and write
1D309A90000
heap
page read and write
14421A90000
heap
page read and write
1D309B07000
heap
page read and write
16362690000
trusted library allocation
page read and write
7FFA532B2000
unkown
page readonly
672507F000
stack
page read and write
1430000
heap
page read and write
AF9B379000
stack
page read and write
1D30F0B0000
trusted library allocation
page read and write
23F881A0000
heap
page read and write
23F88130000
heap
page read and write
7FFA532B2000
unkown
page readonly
23F8826D000
heap
page read and write
1A96D0E6000
heap
page read and write
2AE99402000
trusted library allocation
page read and write
7FFA532B6000
unkown
page read and write
1D30F001000
trusted library allocation
page read and write
934F4FF000
stack
page read and write
19D1B3E3000
heap
page read and write
19D18088000
heap
page read and write
274D57C5000
heap
page read and write
23F88202000
heap
page read and write
1D309A87000
heap
page read and write
8C43FFF000
stack
page read and write
23F88200000
heap
page read and write
1D30EED0000
trusted library allocation
page read and write
7FFA532B2000
unkown
page readonly
BB5407E000
stack
page read and write
23FF7FE000
stack
page read and write
DC0000
heap
page read and write
AF9B277000
stack
page read and write
274D4E00000
heap
page read and write
2352A7C000
stack
page read and write
274D5796000
heap
page read and write
1519000
heap
page read and write
16361A80000
heap
page read and write
274D4E70000
heap
page read and write
7FFA532B9000
unkown
page readonly
2661BE40000
heap
page read and write
1D30A1E0000
trusted library allocation
page read and write
274D5C00000
heap
page read and write
18002D000
direct allocation
page readonly
274D4F02000
heap
page read and write
2DF0000
trusted library allocation
page read and write
18002E000
direct allocation
page read and write
274D579C000
heap
page read and write
1A96D0D1000
heap
page read and write
16D79B8D000
heap
page read and write
23F88302000
heap
page read and write
274D579F000
heap
page read and write
16361ADF000
heap
page read and write
180000000
direct allocation
page read and write
16361A70000
trusted library allocation
page read and write
934EDFB000
stack
page read and write
14FA000
heap
page read and write
274D4E4B000
heap
page read and write
2AE98B00000
heap
page read and write
3590000
remote allocation
page read and write
1D30A1D0000
trusted library allocation
page read and write
BB53ACB000
stack
page read and write
16361ACE000
heap
page read and write
16D79A00000
heap
page read and write
274D577E000
heap
page read and write
5095FF9000
stack
page read and write
16D79B80000
heap
page read and write
274D4EE2000
heap
page read and write
23F88300000
heap
page read and write
274D5C21000
heap
page read and write
274D5710000
heap
page read and write
23F88213000
heap
page read and write
19D180A1000
heap
page read and write
274D4E26000
heap
page read and write
16361840000
trusted library allocation
page read and write
2661BDE0000
heap
page read and write
274D4BA0000
heap
page read and write
20BC1554000
heap
page read and write
272F000
stack
page read and write
EBFFF7B000
stack
page read and write
274D5794000
heap
page read and write
3620000
heap
page read and write
EB802FF000
stack
page read and write
33ED000
stack
page read and write
1A96D106000
heap
page read and write
1D309A8A000
heap
page read and write
1D30F140000
trusted library allocation
page read and write
274D4E4C000
heap
page read and write
274D57A8000
heap
page read and write
274D4E13000
heap
page read and write
16361990000
heap
page read and write
12D0000
remote allocation
page read and write
2AE989E0000
heap
page read and write
274D4F08000
heap
page read and write
16361A87000
heap
page read and write
1D30A1F0000
trusted library allocation
page read and write
2352C79000
stack
page read and write
AF9AEFE000
stack
page read and write
274D4EBF000
heap
page read and write
1A96D102000
heap
page read and write
1460000
heap
page read and write
2661C108000
heap
page read and write
1D30AE70000
trusted library allocation
page read and write
934F2FB000
stack
page read and write
1D309B02000
heap
page read and write
1A96D0E5000
heap
page read and write
67252FB000
stack
page read and write
274D579D000
heap
page read and write
274D4F13000
heap
page read and write
1D309A29000
heap
page read and write
1A96D104000
heap
page read and write
1D30F100000
trusted library allocation
page read and write
12D0000
remote allocation
page read and write
23FF77E000
stack
page read and write
1D309AF9000
heap
page read and write
2AE98A60000
heap
page read and write
2661C064000
heap
page read and write
1A96D0C0000
heap
page read and write
1D30A215000
heap
page read and write
1D30F010000
trusted library allocation
page read and write
274D579E000
heap
page read and write
20BBF980000
heap
page read and write
1740000
trusted library allocation
page read and write
2661C07D000
heap
page read and write
EBFFC7B000
stack
page read and write
18002F000
direct allocation
page readonly
9F0000
heap
page readonly
18002E000
direct allocation
page read and write
23F88140000
heap
page read and write
8C441FD000
stack
page read and write
1D309B02000
heap
page read and write
274D574E000
heap
page read and write
16361970000
heap
page read and write
13B0000
heap
page read and write
274D579A000
heap
page read and write
274D5796000
heap
page read and write
934F5FE000
stack
page read and write
2894000
heap
page read and write
2352CFE000
stack
page read and write
1D309A77000
heap
page read and write
19D18082000
heap
page read and write
20BBF930000
heap
page read and write
2661C802000
trusted library allocation
page read and write
163628D0000
heap
page readonly
12B4000
stack
page read and write
7FFA53261000
unkown
page execute read
6724DF5000
stack
page read and write
7FFA53260000
unkown
page readonly
1D30A359000
heap
page read and write
274D5C03000
heap
page read and write
1D309940000
trusted library allocation
page read and write
1D309AA9000
heap
page read and write
7FFA532B6000
unkown
page read and write
274D4C10000
heap
page read and write
E22000
heap
page read and write
1A96D1C0000
heap
page read and write
1D30EFE0000
trusted library allocation
page read and write
2661C05E000
heap
page read and write
20BBF910000
heap
page read and write
1D30EFEE000
trusted library allocation
page read and write
2661BF40000
trusted library allocation
page read and write
7FFA53260000
unkown
page readonly
274D57FF000
heap
page read and write
2AE98980000
heap
page read and write
14FE000
heap
page read and write
1D30F29C000
heap
page read and write
18002F000
direct allocation
page readonly
1D30F140000
remote allocation
page read and write
AF9B47E000
stack
page read and write
1D30A9F0000
trusted library allocation
page read and write
1D3097D0000
heap
page read and write
274D4EC5000
heap
page read and write
7FFA532B9000
unkown
page readonly
34EF000
stack
page read and write
23F88228000
heap
page read and write
19D180A1000
heap
page read and write
14F2000
heap
page read and write
9D0000
heap
page read and write
1D30F2FC000
heap
page read and write
1A96D0E4000
heap
page read and write
1D30F255000
heap
page read and write
2AE98A2A000
heap
page read and write
1D30F0B0000
trusted library allocation
page read and write
615078D000
stack
page read and write
E60000
heap
page read and write
AF9B4FF000
unkown
page read and write
274D579F000
heap
page read and write
274D5C03000
heap
page read and write
14CD000
heap
page read and write
8C442FF000
stack
page read and write
AF9AE7E000
stack
page read and write
D7F000
stack
page read and write
19D1831B000
heap
page read and write
2AE98A3C000
heap
page read and write
274D5794000
heap
page read and write
16361A10000
trusted library allocation
page read and write
EBFFFFE000
stack
page read and write
23F88258000
heap
page read and write
274D5C02000
heap
page read and write
1D30A318000
heap
page read and write
960000
heap
page read and write
1D30F130000
trusted library allocation
page read and write
19D1B3F0000
trusted library allocation
page read and write
274D57BE000
heap
page read and write
23FF3B6000
stack
page read and write
2AE98A8C000
heap
page read and write
1410000
heap
page read and write
1D30EEC0000
trusted library allocation
page read and write
19D1808C000
heap
page read and write
2890000
heap
page read and write
149C000
heap
page read and write
274D4EB3000
heap
page read and write
7FFA532B9000
unkown
page readonly
16361D20000
heap
page read and write
2352BFD000
stack
page read and write
274D579F000
heap
page read and write
67250FE000
stack
page read and write
274D578C000
heap
page read and write
18002F000
direct allocation
page readonly
23F8823E000
heap
page read and write
1D30F120000
trusted library allocation
page read and write
1468000
heap
page read and write
274D4DD0000
remote allocation
page read and write
20BBF8A0000
heap
page read and write
274D57B7000
heap
page read and write
2661C002000
heap
page read and write
163628F0000
trusted library allocation
page read and write
19D18010000
heap
page read and write
1450000
direct allocation
page execute and read and write
274D4D10000
trusted library allocation
page read and write
2AE98A13000
heap
page read and write
19D1807D000
heap
page read and write
274D5C02000
heap
page read and write
274D4EDA000
heap
page read and write
19D18079000
heap
page read and write
2661BDD0000
heap
page read and write
20BBF9A0000
direct allocation
page execute and read and write
1D309B25000
heap
page read and write
2661C04A000
heap
page read and write
16361D30000
trusted library allocation
page read and write
1D30F21F000
heap
page read and write
14421CD0000
heap
page readonly
1A96D0EE000
heap
page read and write
2661C03C000
heap
page read and write
1D309A6E000
heap
page read and write
274D57A5000
heap
page read and write
16361ACE000
heap
page read and write
1D309A8C000
heap
page read and write
50960FE000
stack
page read and write
2661C102000
heap
page read and write
274D576B000
heap
page read and write
274D4EAA000
heap
page read and write
274D4EF4000
heap
page read and write
1D30F004000
trusted library allocation
page read and write
3590000
remote allocation
page read and write
1A96D0FE000
heap
page read and write
3590000
remote allocation
page read and write
DE5000
heap
page read and write
274D5C02000
heap
page read and write
1D309A74000
heap
page read and write
2E24000
heap
page read and write
274D57AD000
heap
page read and write
AF9ABEC000
stack
page read and write
274D57B2000
heap
page read and write
18002F000
direct allocation
page readonly
2352D7A000
stack
page read and write
274D5797000
heap
page read and write
5095F7F000
stack
page read and write
14A2000
heap
page read and write
1D3097E0000
heap
page read and write
274D4DD0000
remote allocation
page read and write
19D1807E000
heap
page read and write
1A96D0EE000
heap
page read and write
BB5427E000
stack
page read and write
274D5794000
heap
page read and write
67251FE000
stack
page read and write
274D57B7000
heap
page read and write
1D30F200000
heap
page read and write
360E000
stack
page read and write
16D79B93000
heap
page read and write
2AE98B08000
heap
page read and write
19D17ED0000
heap
page read and write
274D5C02000
heap
page read and write
20BBF9B0000
heap
page read and write
274D4EEB000
heap
page read and write
1A96D0FE000
heap
page read and write
AF9B6FA000
stack
page read and write
1D30F262000
heap
page read and write
EB801FF000
stack
page read and write
274D5782000
heap
page read and write
1D30F430000
trusted library allocation
page read and write
19D180A6000
heap
page read and write
1D309AA8000
heap
page read and write
19D18079000
heap
page read and write
14A2000
heap
page read and write
1A96D0B0000
heap
page read and write
274D4E49000
heap
page read and write
1A96D0EE000
heap
page read and write
144219B0000
heap
page read and write
274D4E4E000
heap
page read and write
19D1B3E0000
heap
page read and write
1A96D0E2000
heap
page read and write
19D18076000
heap
page read and write
BB5477F000
stack
page read and write
1519000
heap
page read and write
1D30F24D000
heap
page read and write
20BBF9B8000
heap
page read and write
20BC1550000
heap
page read and write
2661C06D000
heap
page read and write
274D5700000
heap
page read and write
163628E0000
trusted library allocation
page read and write
19D1808C000
heap
page read and write
2661C013000
heap
page read and write
1D309A3D000
heap
page read and write
274D5C02000
heap
page read and write
5C2B72E000
stack
page read and write
18002D000
direct allocation
page readonly
1200000
heap
page read and write
1D309A00000
heap
page read and write
1D30A202000
heap
page read and write
20BBFA0E000
heap
page read and write
16361AD7000
heap
page read and write
14421AC2000
heap
page read and write
EBFFD7E000
stack
page read and write
509617C000
stack
page read and write
16361ACE000
heap
page read and write
274D5C02000
heap
page read and write
EB800F7000
stack
page read and write
1D309AA6000
heap
page read and write
2AE98A54000
heap
page read and write
8C43F7A000
stack
page read and write
5C2B6AB000
stack
page read and write
274D57B7000
heap
page read and write
274D57DA000
heap
page read and write
BB53B4F000
stack
page read and write
2AE98A5A000
heap
page read and write
14421C90000
heap
page read and write
18002E000
direct allocation
page read and write
1D30F010000
trusted library allocation
page read and write
274D579F000
heap
page read and write
274D5798000
heap
page read and write
19D18310000
heap
page read and write
1D309840000
heap
page read and write
1A96D080000
heap
page read and write
14FE000
heap
page read and write
16361D29000
heap
page read and write
1D30F240000
heap
page read and write
20BC1710000
heap
page read and write
14F2000
heap
page read and write
23F88C02000
trusted library allocation
page read and write
14421C80000
direct allocation
page execute and read and write
274D5713000
heap
page read and write
7FFA53260000
unkown
page readonly
1720000
heap
page readonly
1D30F2F0000
heap
page read and write
1519000
heap
page read and write
18002D000
direct allocation
page readonly
14421AD2000
heap
page read and write
1D30A1D3000
trusted library allocation
page read and write
BB5417A000
stack
page read and write
7FFA532B9000
unkown
page readonly
19D1809D000
heap
page read and write
274D5794000
heap
page read and write
14FE000
heap
page read and write
2CDB000
stack
page read and write
EBFFCFE000
stack
page read and write
E45000
heap
page read and write
14421ABC000
heap
page read and write
7FFA53260000
unkown
page readonly
32EB000
stack
page read and write
5C2B7AE000
stack
page read and write
1D30F0F0000
trusted library allocation
page read and write
5095EFF000
stack
page read and write
274D4E29000
heap
page read and write
274D5788000
heap
page read and write
20BBFBB0000
heap
page readonly
336E000
stack
page read and write
23F881D0000
trusted library allocation
page read and write
1095000
heap
page read and write
7FFA532B2000
unkown
page readonly
274D5C19000
heap
page read and write
1A96D0D6000
heap
page read and write
1D30F0D0000
trusted library allocation
page read and write
2661C06D000
heap
page read and write
274D579A000
heap
page read and write
BB5497B000
stack
page read and write
8C43CFE000
stack
page read and write
1090000
heap
page read and write
163628C0000
trusted library allocation
page read and write
BB54B7F000
stack
page read and write
20BBFC55000
heap
page read and write
8C43D7D000
stack
page read and write
19D18060000
heap
page read and write
AF9B07F000
stack
page read and write
274D4BB0000
heap
page read and write
1D309A56000
heap
page read and write
274D57A8000
heap
page read and write
274D57A4000
heap
page read and write
274D5C02000
heap
page read and write
274D579A000
heap
page read and write
1D30F140000
remote allocation
page read and write
1D30A318000
heap
page read and write
19D18092000
heap
page read and write
8C43C7B000
stack
page read and write
5095E7A000
stack
page read and write
BB53EF7000
stack
page read and write
1D30F28E000
heap
page read and write
1D30F22C000
heap
page read and write
2E20000
heap
page read and write
9C0000
heap
page read and write
19D18030000
heap
page read and write
There are 536 hidden memdumps, click here to show them.