IOC Report
libmmd.dll.exe

loading gif

Files

File Path
Type
Category
Malicious
libmmd.dll.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_lib_7fb52cffe21ecd6abfc1c32e247ab46588f99498_0fd03ba9_5097cc39-576f-429e-8e24-a95d50f63d86\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_lib_7fb52cffe21ecd6abfc1c32e247ab46588f99498_0fd03ba9_7f5ebac1-d6d5-4cf2-8be5-db53b231b40a\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_lib_9afd1e816e2885921660f65cfabdd427ac9437d_0fd03ba9_2091bba8-a1b3-45bc-be49-99cc77a1e4cd\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_lib_a3b6957ca019c315fa2e856f651d7b4deeb1dc56_0fd03ba9_e9428bdd-c82c-4b88-bda4-2e7421f6b2a7\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2B3E.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Jul 27 09:33:56 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2B4E.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Jul 27 09:33:56 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2BCC.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2BFC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2C4A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2C99.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER363B.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Jul 27 09:33:59 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER366A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER369A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4389.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Jul 27 09:34:02 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER43C8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER43E9.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\libmmd.dll.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\libmmd.dll.dll",#1
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\libmmd.dll.dll,_LIB_VERSIONIMF
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\libmmd.dll.dll",#1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 5572 -s 328
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 5180 -s 328
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\libmmd.dll.dll,__acosdq
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7212 -s 328
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\libmmd.dll.dll,__acoshq
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7360 -s 320
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\libmmd.dll.dll",_LIB_VERSIONIMF
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\libmmd.dll.dll",__acosdq
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\libmmd.dll.dll",__acoshq
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\libmmd.dll.dll",ynl
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\libmmd.dll.dll",ynf16
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\libmmd.dll.dll",ynf
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\libmmd.dll.dll",yn
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\libmmd.dll.dll",y1l
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\libmmd.dll.dll",y1f16
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\libmmd.dll.dll",y1f
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\libmmd.dll.dll",y1
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\libmmd.dll.dll",y0l
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\libmmd.dll.dll",y0f16
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\libmmd.dll.dll",y0f
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\libmmd.dll.dll",y0
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\libmmd.dll.dll",truncl
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\libmmd.dll.dll",truncf16
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\libmmd.dll.dll",truncf
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\libmmd.dll.dll",trunc
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\libmmd.dll.dll",tgammal
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\libmmd.dll.dll",tgammaf16
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\libmmd.dll.dll",tgammaf
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\libmmd.dll.dll",tgamma
There are 24 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
http://ocsp.sectigo.com0.
unknown
http://upx.sf.net
unknown
https://sectigo.com/CPS0
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{3027bbe8-40d1-fb1e-95ec-4d94e3440668}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{3027bbe8-40d1-fb1e-95ec-4d94e3440668}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{3027bbe8-40d1-fb1e-95ec-4d94e3440668}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{3027bbe8-40d1-fb1e-95ec-4d94e3440668}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{3027bbe8-40d1-fb1e-95ec-4d94e3440668}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{3027bbe8-40d1-fb1e-95ec-4d94e3440668}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
OriginalFileName
\REGISTRY\A\{3027bbe8-40d1-fb1e-95ec-4d94e3440668}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{3027bbe8-40d1-fb1e-95ec-4d94e3440668}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{3027bbe8-40d1-fb1e-95ec-4d94e3440668}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{3027bbe8-40d1-fb1e-95ec-4d94e3440668}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{3027bbe8-40d1-fb1e-95ec-4d94e3440668}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{3027bbe8-40d1-fb1e-95ec-4d94e3440668}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{3027bbe8-40d1-fb1e-95ec-4d94e3440668}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{3027bbe8-40d1-fb1e-95ec-4d94e3440668}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{3027bbe8-40d1-fb1e-95ec-4d94e3440668}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
AppxPackageFullName
\REGISTRY\A\{3027bbe8-40d1-fb1e-95ec-4d94e3440668}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
AppxPackageRelativeId
\REGISTRY\A\{3027bbe8-40d1-fb1e-95ec-4d94e3440668}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{3027bbe8-40d1-fb1e-95ec-4d94e3440668}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{3027bbe8-40d1-fb1e-95ec-4d94e3440668}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
\REGISTRY\A\{3027bbe8-40d1-fb1e-95ec-4d94e3440668}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Usn
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
FDCEEFF000
stack
page read and write
191D4BC0000
heap
page read and write
7FFDFB853000
unkown
page readonly
7FFDFB84F000
unkown
page read and write
7FFDFB853000
unkown
page readonly
60AD47F000
stack
page read and write
1BE33360000
heap
page read and write
21764268000
heap
page read and write
7FFDFB638000
unkown
page readonly
219A1AE0000
remote allocation
page read and write
7FFDFB80D000
unkown
page write copy
259D42E0000
heap
page read and write
2AB07240000
heap
page read and write
1F1C3440000
remote allocation
page read and write
233F7605000
heap
page read and write
7FFDFB4B0000
unkown
page readonly
4CCE8FF000
stack
page read and write
1FC7B8B0000
heap
page read and write
20766D15000
heap
page read and write
19D117D0000
heap
page read and write
D0DF19F000
stack
page read and write
1E6FDB20000
heap
page read and write
16AE4050000
heap
page read and write
7FFDFB853000
unkown
page readonly
1A499A20000
heap
page read and write
19D11C40000
heap
page read and write
254293F000
stack
page read and write
7FFDFB80D000
unkown
page write copy
B400E7F000
stack
page read and write
7DE4C7F000
stack
page read and write
217642F6000
heap
page read and write
18D61840000
heap
page read and write
1F9F43B0000
heap
page read and write
7FFDFB84F000
unkown
page read and write
1A499A25000
heap
page read and write
18BFECD0000
heap
page read and write
1F9F4347000
heap
page read and write
1A4996B0000
heap
page read and write
16AE40A0000
heap
page read and write
24564AF8000
heap
page read and write
19D11C45000
heap
page read and write
7FFDFB4B1000
unkown
page execute read
1E6FD830000
heap
page read and write
7FFDFB84F000
unkown
page read and write
E79C7C000
stack
page read and write
7FFDFB4B0000
unkown
page readonly
7FFDFB638000
unkown
page readonly
13CE8406000
heap
page read and write
7FFDFB638000
unkown
page readonly
1F9F4430000
remote allocation
page read and write
27423928000
heap
page read and write
7FFDFB80D000
unkown
page write copy
217640E0000
heap
page read and write
2AB07250000
heap
page read and write
1E8E3738000
heap
page read and write
246E5080000
heap
page read and write
24564D80000
heap
page read and write
7FFDFB853000
unkown
page readonly
245663B0000
remote allocation
page read and write
1FDAEB70000
heap
page read and write
7FFDFB638000
unkown
page readonly
1BE33440000
heap
page read and write
20766C45000
heap
page read and write
1EBC4880000
heap
page read and write
16AE4080000
heap
page read and write
7FFDFB853000
unkown
page readonly
80F9DF000
stack
page read and write
6783DBF000
stack
page read and write
2AB07316000
heap
page read and write
7FFDFB80D000
unkown
page write copy
D0DF47F000
stack
page read and write
C5C767C000
stack
page read and write
27423B95000
heap
page read and write
7FFDFB84F000
unkown
page read and write
233F7600000
heap
page read and write
6C590FF000
stack
page read and write
1A499848000
heap
page read and write
7FFDFB853000
unkown
page readonly
1E6FDA30000
heap
page read and write
15ACFE000
stack
page read and write
1FC7B6A0000
heap
page read and write
1F9F4450000
heap
page read and write
501FD8F000
stack
page read and write
19D11988000
heap
page read and write
7FFDFB80D000
unkown
page write copy
1EBC2D60000
heap
page read and write
274238A0000
heap
page read and write
1BE33780000
heap
page read and write
259D2A90000
remote allocation
page read and write
58BFFDF000
stack
page read and write
E23339C000
stack
page read and write
1FE97FB0000
remote allocation
page read and write
7FFDFB638000
unkown
page readonly
20766BE0000
heap
page read and write
7FFDFB80D000
unkown
page write copy
1168F988000
heap
page read and write
18BFD1C0000
heap
page read and write
22F01470000
heap
page read and write
7FFDFB4B1000
unkown
page execute read
7FFDFB853000
unkown
page readonly
1168FC75000
heap
page read and write
217641C0000
heap
page read and write
7FFDFB80D000
unkown
page write copy
7FFDFB4B1000
unkown
page execute read
219A1840000
heap
page read and write
7FFDFB84F000
unkown
page read and write
1168FA16000
heap
page read and write
1FDAD110000
heap
page read and write
1A499840000
heap
page read and write
1FDAD3E5000
heap
page read and write
E79CFF000
stack
page read and write
7FFDFB4B1000
unkown
page execute read
18BFD1F0000
heap
page read and write
1FE97EE6000
heap
page read and write
24564AF0000
heap
page read and write
7FFDFB4B1000
unkown
page execute read
1E8E37C6000
heap
page read and write
1FDAD0D0000
heap
page read and write
7FFDFB638000
unkown
page readonly
7FFDFB853000
unkown
page readonly
1BE33537000
heap
page read and write
7FFDFB4B1000
unkown
page execute read
7FFDFB80E000
unkown
page write copy
7FFDFB853000
unkown
page readonly
F2DC8FC000
stack
page read and write
7FFDFB4B0000
unkown
page readonly
1FC7B7B0000
heap
page read and write
1F97E2C0000
heap
page read and write
1BE334A0000
heap
page read and write
FDCEE7F000
stack
page read and write
E23367F000
stack
page read and write
B400BCF000
stack
page read and write
219A1950000
heap
page read and write
16AE4390000
heap
page read and write
7FFDFB4B1000
unkown
page execute read
1EBC2D68000
heap
page read and write
1168FBB0000
heap
page read and write
191D4BE0000
heap
page read and write
246E51E9000
heap
page read and write
B400B4C000
stack
page read and write
1FE97D10000
heap
page read and write
7FFDFB80D000
unkown
page write copy
8E2432C000
stack
page read and write
7FFDFB853000
unkown
page readonly
7FFDFB84F000
unkown
page read and write
1E8E5090000
heap
page read and write
1EBC2F80000
remote allocation
page read and write
1F1C33A0000
heap
page read and write
13CE8378000
heap
page read and write
7FFDFB638000
unkown
page readonly
7FFDFB853000
unkown
page readonly
7FFDFB4B1000
unkown
page execute read
18D61845000
heap
page read and write
19D118B0000
heap
page read and write
7FFDFB4B0000
unkown
page readonly
4CCE5BC000
stack
page read and write
60AD1AC000
stack
page read and write
1FDAD1A5000
heap
page read and write
7FFDFB80E000
unkown
page write copy
501FC8C000
stack
page read and write
20766C40000
heap
page read and write
7FFDFB4B1000
unkown
page execute read
20766BC0000
heap
page read and write
13CE82B0000
heap
page read and write
C5C76FF000
stack
page read and write
7FFDFB638000
unkown
page readonly
7FFDFB638000
unkown
page readonly
1F9F42B8000
heap
page read and write
1E6FD868000
heap
page read and write
2AB07288000
heap
page read and write
259D2AD0000
heap
page read and write
7FFDFB853000
unkown
page readonly
E79D7F000
stack
page read and write
1F1C34D0000
heap
page read and write
274254E0000
heap
page read and write
7FFDFB84F000
unkown
page read and write
24566480000
heap
page read and write
3A7267F000
stack
page read and write
259D2670000
heap
page read and write
21765CE0000
heap
page read and write
7FFDFB84F000
unkown
page read and write
274239B6000
heap
page read and write
7FFDFB4B1000
unkown
page execute read
E034C8C000
stack
page read and write
7FFDFB84F000
unkown
page read and write
7FFDFB853000
unkown
page readonly
7FFDFB80D000
unkown
page write copy
1EBC2F95000
heap
page read and write
7FFDFB80D000
unkown
page write copy
191D4B56000
heap
page read and write
7FFDFB84F000
unkown
page read and write
3A7231C000
stack
page read and write
1FE97E10000
heap
page read and write
18BFD240000
heap
page read and write
24564A40000
heap
page read and write
1FE97E58000
heap
page read and write
2AB07280000
heap
page read and write
7FFDFB4B0000
unkown
page readonly
7FFDFB4B0000
unkown
page readonly
7FFDFB4B1000
unkown
page execute read
7FFDFB638000
unkown
page readonly
25428BC000
stack
page read and write
19D11A16000
heap
page read and write
C5C777F000
stack
page read and write
233F7430000
heap
page read and write
1FE97DF0000
heap
page read and write
1A0450F000
stack
page read and write
7FFDFB4B0000
unkown
page readonly
7FFDFB80D000
unkown
page read and write
1EBC2D10000
heap
page read and write
7FFDFB80D000
unkown
page write copy
8E243AF000
stack
page read and write
1168FBF0000
remote allocation
page read and write
7FFDFB4B0000
unkown
page readonly
191D4BE5000
heap
page read and write
246E51D0000
heap
page read and write
1A499790000
heap
page read and write
2AB08C60000
heap
page read and write
7FFDFB84F000
unkown
page read and write
191D6440000
heap
page read and write
7FFDFB853000
unkown
page readonly
18D63110000
heap
page read and write
7FFDFB853000
unkown
page readonly
219A1A50000
heap
page read and write
7FFDFB638000
unkown
page readonly
16AE4395000
heap
page read and write
18D61550000
heap
page read and write
24564A60000
heap
page read and write
18BFD1F5000
heap
page read and write
13CE8325000
heap
page read and write
1A49B2F0000
heap
page read and write
62AA4FF000
stack
page read and write
1168F980000
heap
page read and write
1F9F4290000
heap
page read and write
62AA47C000
stack
page read and write
7FFDFB4B0000
unkown
page readonly
1BE334A8000
heap
page read and write
1FC7B7B8000
heap
page read and write
191D4AC8000
heap
page read and write
80F95C000
stack
page read and write
7FFDFB80D000
unkown
page write copy
7FFDFB4B0000
unkown
page readonly
7FFDFB638000
unkown
page readonly
7FFDFB638000
unkown
page readonly
19D118D0000
heap
page read and write
1E6FD8F6000
heap
page read and write
18D617C0000
remote allocation
page read and write
7FFDFB4B1000
unkown
page execute read
1BE33785000
heap
page read and write
6C5907C000
stack
page read and write
1F97E3C8000
heap
page read and write
7FFDFB853000
unkown
page readonly
18BFD0C0000
heap
page read and write
7FFDFB84F000
unkown
page read and write
2AB07495000
heap
page read and write
7FFDFB4B1000
unkown
page execute read
27423890000
heap
page read and write
7FFDFB80D000
unkown
page write copy
6C5917F000
stack
page read and write
7FFDFB4B0000
unkown
page readonly
1A0448C000
stack
page read and write
7DE499F000
stack
page read and write
13CE82C0000
heap
page read and write
7FFDFB84F000
unkown
page read and write
D79ABCF000
stack
page read and write
1EBC2DF6000
heap
page read and write
7FFDFB4B0000
unkown
page readonly
1F1C31B0000
heap
page read and write
7FFDFB853000
unkown
page readonly
1FDAEB10000
remote allocation
page read and write
7FFDFB4B1000
unkown
page execute read
7FFDFB853000
unkown
page readonly
12F47F000
stack
page read and write
20766AE0000
heap
page read and write
191D4AC0000
heap
page read and write
1A0458F000
stack
page read and write
7FFDFB4B1000
unkown
page execute read
1F1C3450000
heap
page read and write
1EBC2CF0000
heap
page read and write
1FDAD3E0000
heap
page read and write
13CE8320000
heap
page read and write
19D11980000
heap
page read and write
7FFDFB4B0000
unkown
page readonly
7FFDFB638000
unkown
page readonly
1FC7B8D5000
heap
page read and write
1F97E3C0000
heap
page read and write
7FFDFB4B0000
unkown
page readonly
7FFDFB638000
unkown
page readonly
1F9F42B0000
heap
page read and write
22F018A0000
remote allocation
page read and write
16AE4137000
heap
page read and write
1E6FD860000
heap
page read and write
5F3E7DF000
stack
page read and write
27423B90000
heap
page read and write
7FFDFB638000
unkown
page readonly
7FFDFB80D000
unkown
page write copy
7FFDFB4B0000
unkown
page readonly
20766C88000
heap
page read and write
1F1C3380000
heap
page read and write
1E8E5010000
remote allocation
page read and write
1168F940000
heap
page read and write
1F97E1E0000
heap
page read and write
7FFDFB4B0000
unkown
page readonly
7FFDFB853000
unkown
page readonly
7FFDFB638000
unkown
page readonly
1F97E2E0000
heap
page read and write
7FFDFB853000
unkown
page readonly
6783D3F000
stack
page read and write
259D2690000
heap
page read and write
219A33F0000
heap
page read and write
7FFDFB853000
unkown
page readonly
7FFDFB80D000
unkown
page read and write
1C0298F000
stack
page read and write
1A499950000
remote allocation
page read and write
1FC7B846000
heap
page read and write
18D615D0000
heap
page read and write
7FFDFB4B0000
unkown
page readonly
7FFDFB80D000
unkown
page write copy
233F7510000
heap
page read and write
191D4BF0000
heap
page read and write
7FFDFB4B1000
unkown
page execute read
19D11940000
heap
page read and write
7FFDFB638000
unkown
page readonly
1BE34EA0000
remote allocation
page read and write
18D61570000
heap
page read and write
7FFDFB80D000
unkown
page write copy
1F1C34D5000
heap
page read and write
1F1C3246000
heap
page read and write
24564B86000
heap
page read and write
1037B3F000
stack
page read and write
7FFDFB853000
unkown
page readonly
58C6C7C000
stack
page read and write
219A1B40000
heap
page read and write
7FFDFB80D000
unkown
page write copy
7FFDFB638000
unkown
page readonly
1FC7D170000
heap
page read and write
219A1958000
heap
page read and write
E2336FF000
stack
page read and write
7FFDFB638000
unkown
page readonly
1E8E36C0000
heap
page read and write
1C02C7F000
stack
page read and write
7FFDFB84F000
unkown
page read and write
7FFDFB638000
unkown
page readonly
1FC7D0D0000
remote allocation
page read and write
7FFDFB84F000
unkown
page read and write
5F3E75C000
stack
page read and write
7FFDFB84F000
unkown
page read and write
7FFDFB84F000
unkown
page read and write
219A1920000
heap
page read and write
8E2467F000
stack
page read and write
7FFDFB4B1000
unkown
page execute read
7FFDFB4B1000
unkown
page execute read
7FFDFB4B1000
unkown
page execute read
1A4997B0000
heap
page read and write
1E6FD840000
heap
page read and write
1FC7B8D0000
heap
page read and write
7FFDFB4B0000
unkown
page readonly
5F3EA7F000
stack
page read and write
1F97E5C5000
heap
page read and write
7FFDFB80D000
unkown
page write copy
7FFDFB80D000
unkown
page write copy
1168F950000
heap
page read and write
16AE4060000
heap
page read and write
D79AB4C000
stack
page read and write
233F75D0000
remote allocation
page read and write
7FFDFB4B0000
unkown
page readonly
7FFDFB80E000
unkown
page write copy
246E51EC000
heap
page read and write
22F01696000
heap
page read and write
22F03030000
heap
page read and write
191D49E0000
heap
page read and write
1BE33460000
heap
page read and write
22F01550000
heap
page read and write
27423920000
heap
page read and write
7FFDFB80D000
unkown
page read and write
2AB07450000
heap
page read and write
6783CBC000
stack
page read and write
1F97FEE0000
heap
page read and write
191D6430000
remote allocation
page read and write
7FFDFB80D000
unkown
page write copy
18BFD2D6000
heap
page read and write
24564D85000
heap
page read and write
24564960000
heap
page read and write
15A9EC000
stack
page read and write
25429BF000
stack
page read and write
18BFD1A0000
heap
page read and write
16AE40A8000
heap
page read and write
7FFDFB4B1000
unkown
page execute read
1E8E3720000
heap
page read and write
62AA57F000
stack
page read and write
18D61666000
heap
page read and write
1F97E456000
heap
page read and write
7FFDFB638000
unkown
page readonly
1E8E36A0000
heap
page read and write
1F1C31B8000
heap
page read and write
259D2720000
heap
page read and write
7FFDFB80D000
unkown
page write copy
21764200000
heap
page read and write
1E8E3725000
heap
page read and write
13CE82E0000
heap
page read and write
12F13C000
stack
page read and write
1BE34F20000
heap
page read and write
1FDACFD0000
heap
page read and write
7FFDFB853000
unkown
page readonly
7FFDFB4B0000
unkown
page readonly
22F01600000
heap
page read and write
1FC7B780000
heap
page read and write
58C6CFF000
stack
page read and write
7FFDFB4B0000
unkown
page readonly
7FFDFB4B1000
unkown
page execute read
2AB07490000
heap
page read and write
1EBC2CE0000
heap
page read and write
1037BBF000
stack
page read and write
259D27B6000
heap
page read and write
1FE98000000
heap
page read and write
7FFDFB4B1000
unkown
page execute read
21764260000
heap
page read and write
60AD4FF000
stack
page read and write
1E6FDAE0000
remote allocation
page read and write
1F1C31A0000
heap
page read and write
1E6FDB25000
heap
page read and write
D79AE7F000
stack
page read and write
7FFDFB84F000
unkown
page read and write
1FDAD0B0000
heap
page read and write
1EBC2F90000
heap
page read and write
7FFDFB638000
unkown
page readonly
233F8F80000
heap
page read and write
22F01570000
heap
page read and write
7FFDFB4B1000
unkown
page execute read
1F9F41B0000
heap
page read and write
13CE9EA0000
heap
page read and write
1F9F4455000
heap
page read and write
1F97E5C0000
heap
page read and write
58BFF5F000
stack
page read and write
1168FB50000
heap
page read and write
501FD0F000
stack
page read and write
1037ABC000
stack
page read and write
259D2660000
heap
page read and write
7FFDFB4B0000
unkown
page readonly
7FFDFB853000
unkown
page readonly
219A19E6000
heap
page read and write
13CE9DF0000
remote allocation
page read and write
7FFDFB84F000
unkown
page read and write
7FFDFB84F000
unkown
page read and write
259D2AD5000
heap
page read and write
233F73B6000
heap
page read and write
7FFDFB84F000
unkown
page read and write
7FFDFB853000
unkown
page readonly
7FFDFB4B1000
unkown
page execute read
FDCEBAC000
stack
page read and write
7FFDFB80D000
unkown
page write copy
246E51DD000
heap
page read and write
7FFDFB84F000
unkown
page read and write
1FE98025000
heap
page read and write
1FE97E50000
heap
page read and write
233F7328000
heap
page read and write
7FFDFB84F000
unkown
page read and write
1E8E35C0000
heap
page read and write
274238C0000
heap
page read and write
2AB08D90000
remote allocation
page read and write
18BFD248000
heap
page read and write
1C0290C000
stack
page read and write
7FFDFB4B0000
unkown
page readonly
22F018D5000
heap
page read and write
7FFDFB84F000
unkown
page read and write
1E6FDAA0000
heap
page read and write
22F018D0000
heap
page read and write
233F7320000
heap
page read and write
7FFDFB80D000
unkown
page write copy
7FFDFB84F000
unkown
page read and write
7FFDFB84F000
unkown
page read and write
1F97E380000
remote allocation
page read and write
22F01608000
heap
page read and write
7FFDFB638000
unkown
page readonly
7FFDFB853000
unkown
page readonly
18D61540000
heap
page read and write
7FFDFB4B0000
unkown
page readonly
7FFDFB4B0000
unkown
page readonly
246E5160000
heap
page read and write
7FFDFB853000
unkown
page readonly
7FFDFB853000
unkown
page readonly
7FFDFB80D000
unkown
page read and write
7FFDFB84F000
unkown
page read and write
20766C70000
heap
page read and write
7FFDFB638000
unkown
page readonly
7FFDFB4B1000
unkown
page execute read
217641E0000
heap
page read and write
1A4998D6000
heap
page read and write
7FFDFB638000
unkown
page readonly
233F7530000
heap
page read and write
7FFDFB4B0000
unkown
page readonly
58BFEDC000
stack
page read and write
219A1B45000
heap
page read and write
259D2728000
heap
page read and write
7FFDFB84F000
unkown
page read and write
1FDAD118000
heap
page read and write
13CE8370000
heap
page read and write
E034D0F000
stack
page read and write
7DE491C000
stack
page read and write
7FFDFB4B1000
unkown
page execute read
1F9F5C40000
heap
page read and write
1E8E3730000
heap
page read and write
16AE5CF0000
heap
page read and write
D0DF11C000
stack
page read and write
1FE98020000
heap
page read and write
7FFDFB4B0000
unkown
page readonly
7FFDFB4B0000
unkown
page readonly
7FFDFB638000
unkown
page readonly
7FFDFB80E000
unkown
page write copy
7FFDFB4B1000
unkown
page execute read
21764205000
heap
page read and write
18D615D8000
heap
page read and write
7FFDFB80D000
unkown
page write copy
E034D8F000
stack
page read and write
27423B30000
remote allocation
page read and write
58C6D7F000
stack
page read and write
7FFDFB638000
unkown
page readonly
7FFDFB4B1000
unkown
page execute read
19D11C10000
remote allocation
page read and write
12F1BF000
stack
page read and write
3A7239F000
stack
page read and write
80FC7F000
stack
page read and write
4CCE87E000
stack
page read and write
20766C80000
heap
page read and write
1168FC70000
heap
page read and write
15AC7E000
stack
page read and write
There are 516 hidden memdumps, click here to show them.