IOC Report
wlbsctrl.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\wlbsctrl.dll"
malicious
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\wlbsctrl.dll",#1
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\wlbsctrl.dll",#1

Memdumps

Base Address
Regiontype
Protect
Malicious
DB82FFF000
stack
page read and write
23BBB254000
heap
page read and write
3A3D3FE000
stack
page read and write
1BB0FE30000
heap
page read and write
2A710675000
heap
page read and write
D46ABBF000
stack
page read and write
1FA58213000
heap
page read and write
23BBB276000
heap
page read and write
2A710645000
heap
page read and write
22090E29000
heap
page read and write
97BCC7F000
stack
page read and write
B291E7C000
stack
page read and write
1B764AA9000
heap
page read and write
C21A7FF000
stack
page read and write
1DD10513000
heap
page read and write
2D4F1902000
heap
page read and write
2A71067E000
heap
page read and write
17DAD613000
heap
page read and write
22090E3E000
heap
page read and write
26808664000
heap
page read and write
23BBB190000
trusted library allocation
page read and write
28802831000
heap
page read and write
2680864A000
heap
page read and write
2D4F701D000
heap
page read and write
23BBB290000
heap
page read and write
23BBB213000
heap
page read and write
2D4F6DF0000
trusted library allocation
page read and write
DB828FB000
stack
page read and write
1DD10390000
trusted library allocation
page read and write
1FA58D5F000
heap
page read and write
22090DF0000
trusted library allocation
page read and write
2ED337E000
stack
page read and write
1FA58AD0000
remote allocation
page read and write
1AE4D77000
stack
page read and write
26809FF0000
remote allocation
page read and write
2A710600000
heap
page read and write
28802851000
heap
page read and write
E2411FF000
stack
page read and write
22090C80000
heap
page read and write
AB6A5FC000
stack
page read and write
2A71062A000
heap
page read and write
288029C0000
trusted library allocation
page read and write
3A3D6FE000
stack
page read and write
1F5BF459000
heap
page read and write
26808600000
heap
page read and write
B08587B000
stack
page read and write
E9F59FD000
stack
page read and write
81DECFE000
stack
page read and write
23BBB27F000
heap
page read and write
1F5BF2E0000
heap
page read and write
26808718000
heap
page read and write
1BB10013000
heap
page read and write
2D4F6E80000
trusted library allocation
page read and write
2D4F2158000
heap
page read and write
2ED317E000
stack
page read and write
E2405F8000
stack
page read and write
1F5BF43E000
heap
page read and write
22090EC8000
heap
page read and write
22090ECA000
heap
page read and write
2D4F6EA0000
trusted library allocation
page read and write
1DD10413000
heap
page read and write
1AE4F7F000
stack
page read and write
1FA59202000
heap
page read and write
E9F58FE000
stack
page read and write
23BBB25D000
heap
page read and write
1DD10457000
heap
page read and write
3A3D5FA000
stack
page read and write
1F5BF3A0000
remote allocation
page read and write
C21A4FB000
stack
page read and write
3A3D27E000
stack
page read and write
1FA58DD2000
heap
page read and write
3A939FC000
stack
page read and write
E240FFA000
stack
page read and write
2D4F70F4000
heap
page read and write
1FA58313000
heap
page read and write
B0856FE000
stack
page read and write
2C49CD50000
heap
page read and write
2D4F183D000
heap
page read and write
97BC6CC000
stack
page read and write
1FA58170000
heap
page read and write
1FA582FD000
heap
page read and write
C21A6FF000
stack
page read and write
1FA58248000
heap
page read and write
97BC7CE000
stack
page read and write
7FFFF00E1000
unkown
page execute read
17DAD4A0000
heap
page read and write
2D4F7100000
heap
page read and write
26809FF0000
remote allocation
page read and write
2D4F6DD0000
trusted library allocation
page read and write
1BB0FF60000
remote allocation
page read and write
2D4F1610000
heap
page read and write
1FA58D91000
heap
page read and write
26808460000
heap
page read and write
1FA59202000
heap
page read and write
2C49CE3D000
heap
page read and write
28803700000
trusted library allocation
page read and write
2449F829000
heap
page read and write
1FA59202000
heap
page read and write
97BCE7F000
stack
page read and write
2A710669000
heap
page read and write
8D66FAB000
stack
page read and write
2449F896000
heap
page read and write
1FA59203000
heap
page read and write
23BBB313000
heap
page read and write
E9F56FC000
stack
page read and write
1AE4B7C000
stack
page read and write
23BBB276000
heap
page read and write
1FA582B0000
heap
page read and write
2449F908000
heap
page read and write
2D4F7019000
heap
page read and write
22090EDD000
heap
page read and write
220E02F0000
heap
page read and write
2D4F6C90000
trusted library allocation
page read and write
1B764A81000
heap
page read and write
220E03AB000
heap
page read and write
2A710658000
heap
page read and write
1B764C60000
heap
page read and write
2449F913000
heap
page read and write
2D4F6DF4000
trusted library allocation
page read and write
1FA58D8D000
heap
page read and write
2D4F6F10000
remote allocation
page read and write
B291C7D000
stack
page read and write
17DADE02000
trusted library allocation
page read and write
1FA582EA000
heap
page read and write
17DAD661000
heap
page read and write
2D4F15B0000
heap
page read and write
2D4F6DB0000
trusted library allocation
page read and write
1DD10475000
heap
page read and write
2D4F2C00000
trusted library allocation
page read and write
2D4F188D000
heap
page read and write
2D4F70C2000
heap
page read and write
2A710664000
heap
page read and write
7FFFF019D000
unkown
page readonly
B08567C000
stack
page read and write
1B764AB3000
heap
page read and write
1AE4C7B000
stack
page read and write
2449F862000
heap
page read and write
2A71065C000
heap
page read and write
1FA58D9B000
heap
page read and write
2680863D000
heap
page read and write
1FA582AE000
heap
page read and write
2D4F6EE0000
trusted library allocation
page read and write
2A710641000
heap
page read and write
288036F0000
trusted library allocation
page read and write
7FFFF019B000
unkown
page read and write
2A710560000
heap
page read and write
B2916FC000
stack
page read and write
AB6A19C000
stack
page read and write
1FA58302000
heap
page read and write
E240CFE000
stack
page read and write
1DD10400000
heap
page read and write
1BB10058000
heap
page read and write
2D4F18F9000
heap
page read and write
2A710500000
heap
page read and write
C21A5F7000
stack
page read and write
1FA58D8F000
heap
page read and write
2A710662000
heap
page read and write
1F5BF413000
heap
page read and write
1BB0FF60000
remote allocation
page read and write
1FA58D9F000
heap
page read and write
288029B5000
heap
page read and write
244A0002000
trusted library allocation
page read and write
1B764C40000
heap
page read and write
23BBB259000
heap
page read and write
2449F900000
heap
page read and write
1B764AA0000
heap
page read and write
2D4F17E1000
trusted library allocation
page read and write
17DAD680000
heap
page read and write
1FA58D9D000
heap
page read and write
2D4F18F9000
heap
page read and write
1FA59202000
heap
page read and write
AB6AA7C000
stack
page read and write
23BBB302000
heap
page read and write
26808700000
heap
page read and write
17DAD668000
heap
page read and write
288029B0000
heap
page read and write
1FA582CB000
heap
page read and write
2A71067A000
heap
page read and write
23BBB030000
heap
page read and write
2449F902000
heap
page read and write
1FA58D9F000
heap
page read and write
2D4F6F10000
remote allocation
page read and write
2A710666000
heap
page read and write
1FA59202000
heap
page read and write
B291D7E000
stack
page read and write
8D6757A000
stack
page read and write
1FA58DB5000
heap
page read and write
1BB0FDD0000
heap
page read and write
220E0370000
heap
page read and write
1FA58D8D000
heap
page read and write
28802808000
heap
page read and write
1FA58D9F000
heap
page read and write
81DEF7F000
stack
page read and write
2D4F1886000
heap
page read and write
17DAD63C000
heap
page read and write
2D4F1855000
heap
page read and write
1FA59202000
heap
page read and write
B291F7F000
stack
page read and write
2D4F2102000
heap
page read and write
220E03C2000
heap
page read and write
E240E7A000
stack
page read and write
28802851000
heap
page read and write
DB830FE000
stack
page read and write
2D4F703B000
heap
page read and write
2D4F2100000
heap
page read and write
1DD10300000
heap
page read and write
2D4F1902000
heap
page read and write
7FFFF00E7000
unkown
page execute read
2A71067B000
heap
page read and write
1FA582ED000
heap
page read and write
17DADDB0000
trusted library allocation
page read and write
B0858FE000
stack
page read and write
2A710661000
heap
page read and write
2D4F6DD1000
trusted library allocation
page read and write
1FA59202000
heap
page read and write
2D4F6E80000
trusted library allocation
page read and write
2D4F1898000
heap
page read and write
1FA5824D000
heap
page read and write
268085E0000
trusted library allocation
page read and write
2A710631000
heap
page read and write
B051EFF000
stack
page read and write
1FA58238000
heap
page read and write
26808658000
heap
page read and write
2A71065B000
heap
page read and write
2D4F1871000
heap
page read and write
E2407FB000
stack
page read and write
1B764A96000
heap
page read and write
2C49CD80000
trusted library allocation
page read and write
2D4F8000000
heap
page read and write
2A71065A000
heap
page read and write
1FA5923E000
heap
page read and write
7FFFF00EA000
unkown
page readonly
2A710667000
heap
page read and write
17DAD4B0000
heap
page read and write
2A710674000
heap
page read and write
1FA58229000
heap
page read and write
1FA58251000
heap
page read and write
1FA58200000
heap
page read and write
23BBB23C000
heap
page read and write
220E03CF000
heap
page read and write
2449F861000
heap
page read and write
B0520FE000
stack
page read and write
26808659000
heap
page read and write
2D4F1853000
heap
page read and write
97BCAFC000
stack
page read and write
26808602000
heap
page read and write
23BBB202000
heap
page read and write
1FA59202000
heap
page read and write
1FA58247000
heap
page read and write
1FA58D8D000
heap
page read and write
220E03E6000
heap
page read and write
28802800000
heap
page read and write
22090E00000
heap
page read and write
2A710660000
heap
page read and write
E2401EB000
stack
page read and write
2D4F702B000
heap
page read and write
1FA58D92000
heap
page read and write
3A3D4FA000
stack
page read and write
2DCB080D000
heap
page read and write
28802920000
trusted library allocation
page read and write
1FA58110000
heap
page read and write
3A938FE000
stack
page read and write
2D4F7061000
heap
page read and write
1FA58D8F000
heap
page read and write
2449F851000
heap
page read and write
1FA58288000
heap
page read and write
28802980000
trusted library allocation
page read and write
22090CF0000
heap
page read and write
2D4F1813000
heap
page read and write
E9F57FF000
stack
page read and write
17DAD510000
heap
page read and write
23BBB090000
heap
page read and write
1F5BF470000
heap
page read and write
2C49CE6A000
heap
page read and write
2C49D802000
trusted library allocation
page read and write
3A93878000
stack
page read and write
2A71065F000
heap
page read and write
220E1E8B000
unkown
page execute read
2DCB240B000
unkown
page execute read
2DCB0821000
heap
page read and write
2D4F7054000
heap
page read and write
E2409FB000
stack
page read and write
7FFFF019D000
unkown
page readonly
23BBB264000
heap
page read and write
1FA58D8D000
heap
page read and write
7FFFF016C000
unkown
page write copy
B0521FF000
stack
page read and write
23BBB286000
heap
page read and write
2D4F7220000
trusted library allocation
page read and write
2D4F70CE000
heap
page read and write
1F5BF449000
heap
page read and write
1FA58AD0000
remote allocation
page read and write
1F5BF3A0000
remote allocation
page read and write
2D4F6C10000
trusted library allocation
page read and write
23BBB25F000
heap
page read and write
2449F800000
heap
page read and write
17DAD672000
heap
page read and write
B291AFD000
stack
page read and write
B051FFF000
stack
page read and write
2DCB24C0000
heap
page read and write
2A710635000
heap
page read and write
2D4F6DE0000
trusted library allocation
page read and write
2449F760000
trusted library allocation
page read and write
23BBB300000
heap
page read and write
220E03A0000
heap
page read and write
2DCB0800000
heap
page read and write
2D4F6DBE000
trusted library allocation
page read and write
1DD1046D000
heap
page read and write
DB8249B000
stack
page read and write
C21A27D000
stack
page read and write
1FA582B8000
heap
page read and write
1FA58D19000
heap
page read and write
1FA582C5000
heap
page read and write
B051D7E000
stack
page read and write
1FA58D8D000
heap
page read and write
1F5BF42F000
heap
page read and write
81DF07D000
stack
page read and write
17DAD713000
heap
page read and write
97BC74E000
stack
page read and write
B051CFE000
stack
page read and write
DB82AFF000
stack
page read and write
2A710663000
heap
page read and write
1FA5823C000
heap
page read and write
B08577E000
stack
page read and write
2D4F70F6000
heap
page read and write
2ED307B000
stack
page read and write
B29197F000
stack
page read and write
AB6A97E000
stack
page read and write
1BB0FF60000
remote allocation
page read and write
2449F866000
heap
page read and write
7FFFF00EC000
unkown
page write copy
1DD10500000
heap
page read and write
2DCB242B000
unkown
page execute read
220E03C9000
heap
page read and write
1BB10002000
heap
page read and write
2449F870000
heap
page read and write
7FFFF00E7000
unkown
page execute read
1AE472B000
stack
page read and write
1B764A86000
heap
page read and write
1DD10502000
heap
page read and write
7FFFF019B000
unkown
page read and write
97BCD77000
stack
page read and write
1FA58DB0000
heap
page read and write
2449F600000
heap
page read and write
28802849000
heap
page read and write
97BD07F000
stack
page read and write
2A71065E000
heap
page read and write
268084C0000
heap
page read and write
1FA58D83000
heap
page read and write
2680A200000
trusted library allocation
page read and write
1DD10402000
heap
page read and write
2A7104F0000
heap
page read and write
1FA58D9B000
heap
page read and write
1FA58253000
heap
page read and write
1FA582EE000
heap
page read and write
1FA59220000
heap
page read and write
3A3D7FF000
stack
page read and write
2A710644000
heap
page read and write
1FA58D9F000
heap
page read and write
1FA58DAE000
heap
page read and write
1AE4A7F000
stack
page read and write
2449F660000
heap
page read and write
97BCF7C000
stack
page read and write
26808649000
heap
page read and write
2D4F1829000
heap
page read and write
1B764AB5000
heap
page read and write
2680865A000
heap
page read and write
8D674FE000
stack
page read and write
1FA58316000
heap
page read and write
2D4F7048000
heap
page read and write
2D4F6F10000
trusted library allocation
page read and write
1FA58D25000
heap
page read and write
1FA58DC3000
heap
page read and write
22090EB9000
heap
page read and write
DB82EFE000
stack
page read and write
1FA58DAE000
heap
page read and write
2D4F2118000
heap
page read and write
3A934CA000
stack
page read and write
1B764A00000
heap
page read and write
17DAD700000
heap
page read and write
2D4F2C03000
trusted library allocation
page read and write
B2912CC000
stack
page read and write
22090E6B000
heap
page read and write
2D4F70D1000
heap
page read and write
17DAD708000
heap
page read and write
17DAD600000
heap
page read and write
E2406FA000
stack
page read and write
2880284A000
heap
page read and write
2D4F27E0000
trusted library allocation
page read and write
3A3D2FE000
stack
page read and write
2D4F1876000
heap
page read and write
2ED2B2C000
stack
page read and write
2449F88C000
heap
page read and write
3A9354E000
stack
page read and write
81DEC7C000
stack
page read and write
2D4F6EF0000
trusted library allocation
page read and write
26808677000
heap
page read and write
28803750000
trusted library allocation
page read and write
2A710648000
heap
page read and write
2A71063F000
heap
page read and write
2D4F6DD4000
trusted library allocation
page read and write
22090EC1000
heap
page read and write
1FA58100000
heap
page read and write
2D4F2002000
heap
page read and write
3A935CF000
stack
page read and write
C21A37C000
stack
page read and write
1FA5824C000
heap
page read and write
1FA58254000
heap
page read and write
2D4F6DB0000
trusted library allocation
page read and write
1FA58D91000
heap
page read and write
2D4F7000000
heap
page read and write
2DCB2450000
unkown
page read and write
1BB10000000
heap
page read and write
B0859FA000
stack
page read and write
1FA58D8F000
heap
page read and write
2D4F7102000
heap
page read and write
26808713000
heap
page read and write
288029A0000
trusted library allocation
page read and write
B085DFA000
stack
page read and write
B085CF9000
stack
page read and write
1F5BF45E000
heap
page read and write
1FA59202000
heap
page read and write
22090EE2000
heap
page read and write
2D4F18B7000
heap
page read and write
2D4F6CA0000
trusted library allocation
page read and write
220E1EAB000
unkown
page execute read
2C49CF13000
heap
page read and write
1BB0FF30000
trusted library allocation
page read and write
1FA58D50000
heap
page read and write
1FA58D92000
heap
page read and write
1FA58D65000
heap
page read and write
1B764E05000
heap
page read and write
2A710640000
heap
page read and write
1FA58DA1000
heap
page read and write
2D4F18AB000
heap
page read and write
2D4F1800000
heap
page read and write
2A710642000
heap
page read and write
1FA58239000
heap
page read and write
B2919FC000
stack
page read and write
1FA58308000
heap
page read and write
C219F6B000
stack
page read and write
220E01B0000
heap
page read and write
1BB10036000
heap
page read and write
1FA58D8D000
heap
page read and write
C219FEE000
stack
page read and write
2449F85D000
heap
page read and write
AB6A77E000
stack
page read and write
2D4F1907000
heap
page read and write
1F5BF429000
heap
page read and write
8D6747D000
stack
page read and write
2449F859000
heap
page read and write
28802851000
heap
page read and write
2D4F2000000
heap
page read and write
2D4F2C10000
trusted library allocation
page read and write
2DCB0780000
heap
page read and write
1FA58D7C000
heap
page read and write
26808702000
heap
page read and write
1FA58281000
heap
page read and write
23BBB020000
heap
page read and write
7FFFF01A1000
unkown
page readonly
1FA58D52000
heap
page read and write
2449F881000
heap
page read and write
2D4F6ED0000
trusted library allocation
page read and write
2A710590000
trusted library allocation
page read and write
8D675F9000
stack
page read and write
1F5BF402000
heap
page read and write
DB829FC000
stack
page read and write
2A710657000
heap
page read and write
2C49CE02000
heap
page read and write
2DCB0813000
heap
page read and write
2D4F7200000
trusted library allocation
page read and write
2A710677000
heap
page read and write
1FA58AD0000
remote allocation
page read and write
1B764ABA000
heap
page read and write
2449F5F0000
heap
page read and write
2D4F1925000
heap
page read and write
2D4F70E2000
heap
page read and write
1FA58249000
heap
page read and write
1AE47AE000
stack
page read and write
1B764A86000
heap
page read and write
B085E7E000
unkown
page read and write
1FA58D61000
heap
page read and write
1FA58D9B000
heap
page read and write
2A710626000
heap
page read and write
1B764A95000
heap
page read and write
1F5BFE02000
trusted library allocation
page read and write
7FFFF00E1000
unkown
page execute read
1FA58D55000
heap
page read and write
1B764A70000
heap
page read and write
1FA59200000
heap
page read and write
2D4F70F8000
heap
page read and write
26808666000
heap
page read and write
1FA58250000
heap
page read and write
1FA58D9B000
heap
page read and write
22090C90000
heap
page read and write
1DD10428000
heap
page read and write
22091700000
heap
page read and write
22090E87000
heap
page read and write
2A71063A000
heap
page read and write
2C49CE29000
heap
page read and write
81DEEFE000
stack
page read and write
2C49CE13000
heap
page read and write
2D4F70A0000
heap
page read and write
17DAD62A000
heap
page read and write
22091602000
heap
page read and write
1FA58D9F000
heap
page read and write
1F5BF380000
trusted library allocation
page read and write
1DD10360000
heap
page read and write
3A3D8FF000
stack
page read and write
1F5BF3A0000
remote allocation
page read and write
7FFFF016C000
unkown
page write copy
288029B9000
heap
page read and write
1BB10802000
trusted library allocation
page read and write
1FA58D72000
heap
page read and write
1B764AA0000
heap
page read and write
7FFFF00E0000
unkown
page readonly
1B764E00000
heap
page read and write
2C49CE50000
heap
page read and write
AB6A87E000
stack
page read and write
3A3CFDB000
stack
page read and write
1B764A94000
heap
page read and write
28802640000
heap
page read and write
1FA58D00000
heap
page read and write
DB82CFD000
stack
page read and write
2D4F6F10000
remote allocation
page read and write
23BBB24E000
heap
page read and write
1FA58D8F000
heap
page read and write
1FA58D8D000
heap
page read and write
23BBB229000
heap
page read and write
17DAD664000
heap
page read and write
1F5BF400000
heap
page read and write
2D4F6EC0000
trusted library allocation
page read and write
2ED327F000
stack
page read and write
1B764AA0000
heap
page read and write
3A9397E000
stack
page read and write
2D4F2104000
heap
page read and write
1FA58D9B000
heap
page read and write
1FA59202000
heap
page read and write
1F5BF350000
heap
page read and write
B291B7B000
stack
page read and write
DB831FF000
stack
page read and write
268085C0000
trusted library allocation
page read and write
28802780000
heap
page read and write
1B764AB9000
heap
page read and write
28802910000
trusted library allocation
page read and write
1FA58D91000
heap
page read and write
1BB10102000
heap
page read and write
2A710613000
heap
page read and write
26808648000
heap
page read and write
D46AE7E000
stack
page read and write
DB82DFF000
stack
page read and write
2D4F2113000
heap
page read and write
7FFFF00EA000
unkown
page readonly
2C49CF02000
heap
page read and write
1AE4E7C000
stack
page read and write
2D4F15A0000
heap
page read and write
288034B0000
trusted library allocation
page read and write
1F5BF456000
heap
page read and write
2A710646000
heap
page read and write
2449F870000
heap
page read and write
22090E13000
heap
page read and write
1BB0FDC0000
heap
page read and write
17DAD702000
heap
page read and write
1FA58DC2000
heap
page read and write
2A710702000
heap
page read and write
1BB10040000
heap
page read and write
1DD1045E000
heap
page read and write
2C49CCE0000
heap
page read and write
23BBB308000
heap
page read and write
1B764A9E000
heap
page read and write
7FFFF01A1000
unkown
page readonly
2449F858000
heap
page read and write
26808613000
heap
page read and write
81DEB7C000
stack
page read and write
D46AEFE000
stack
page read and write
1FA58C02000
heap
page read and write
1DD10E02000
trusted library allocation
page read and write
1FA58D97000
heap
page read and write
2D4F1710000
trusted library allocation
page read and write
1F5BF2F0000
heap
page read and write
B051C7B000
stack
page read and write
2D4F6E80000
trusted library allocation
page read and write
2D4F2118000
heap
page read and write
22091714000
heap
page read and write
C21A3FE000
stack
page read and write
1FA5824B000
heap
page read and write
22090F13000
heap
page read and write
D46AB3C000
stack
page read and write
220E0375000
heap
page read and write
B085AF7000
stack
page read and write
7FFFF00E0000
unkown
page readonly
2A711002000
trusted library allocation
page read and write
2C49CCF0000
heap
page read and write
2D4F7084000
heap
page read and write
23BBB24C000
heap
page read and write
2449F83C000
heap
page read and write
1FA58D9D000
heap
page read and write
1FA58256000
heap
page read and write
2D4F186C000
heap
page read and write
28802650000
trusted library allocation
page read and write
E2408FE000
stack
page read and write
2D4F6F00000
trusted library allocation
page read and write
1FA58D69000
heap
page read and write
23BBB200000
heap
page read and write
2A71064E000
heap
page read and write
2C49CE00000
heap
page read and write
B085BFF000
stack
page read and write
2680862A000
heap
page read and write
1B764A92000
heap
page read and write
2449F813000
heap
page read and write
2D4F2015000
heap
page read and write
1FA5824E000
heap
page read and write
B29187F000
stack
page read and write
22090F02000
heap
page read and write
1FA58270000
heap
page read and write
D46AF7E000
stack
page read and write
26809FB0000
trusted library allocation
page read and write
1B764AAA000
heap
page read and write
2D4F6C20000
trusted library allocation
page read and write
2A710683000
heap
page read and write
1F5BF502000
heap
page read and write
17DAD65B000
heap
page read and write
97BCBFB000
stack
page read and write
AB6AB7C000
stack
page read and write
26808450000
heap
page read and write
1FA582E4000
heap
page read and write
1DD10425000
heap
page read and write
2D4F1873000
heap
page read and write
1FA58DA1000
heap
page read and write
1DD1043C000
heap
page read and write
2DCB09D0000
heap
page read and write
288036E0000
heap
page readonly
288027A0000
heap
page read and write
2680A002000
trusted library allocation
page read and write
1FA581A0000
trusted library allocation
page read and write
8D673F9000
stack
page read and write
1FA58D99000
heap
page read and write
81DE78C000
stack
page read and write
220E0310000
heap
page read and write
2D4F70E8000
heap
page read and write
7FFFF00EC000
unkown
page write copy
2A71063D000
heap
page read and write
220E03CF000
heap
page read and write
2D4F18A0000
heap
page read and write
1DD102F0000
heap
page read and write
2C49CE89000
heap
page read and write
1BB10029000
heap
page read and write
26809FF0000
remote allocation
page read and write
2D4F6DB8000
trusted library allocation
page read and write
23BBBA02000
trusted library allocation
page read and write
2D4F6DE0000
trusted library allocation
page read and write
There are 641 hidden memdumps, click here to show them.