IOC Report
nCBC3f6tz1.dll

loading gif

Files

File Path
Type
Category
Malicious
nCBC3f6tz1.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_9d3e772da6c0c3b2ba98571a98f1ccb5316d883_7522e4b5_b13a919c-48d8-47a8-ac20-04e70e997bbc\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_c66a12a3cf7201bf6f31cc259909e9e2c78f020_7522e4b5_7d002d39-5284-4d12-ae4d-a51d443037c3\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_c66a12a3cf7201bf6f31cc259909e9e2c78f020_7522e4b5_8c7c462f-9bf7-41c5-b513-6f865a843684\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1905.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 29 17:51:02 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER19E1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1A11.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4390.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 29 17:51:13 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER43CE.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 29 17:51:13 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER445C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER448B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER449B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER44BA.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\nCBC3f6tz1.dll,BarCreate
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 652
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\nCBC3f6tz1.dll,BarDestroy
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\nCBC3f6tz1.dll,BarFreeRec
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",BarCreate
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",BarDestroy
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",BarFreeRec
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeSetFocus
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeSetDirty
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeResize
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkePaint2
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeKillFocus
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeIsDirty
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeInitialize
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeGetCaretRect
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeFireMouseWheelEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeFireMouseEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeFireKeyUpEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeFireKeyPressEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeFireKeyDownEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeFireContextMenuEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeFinalize
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeDestroyWebView
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeCreateWebView
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",dbkFCallWrapperAddr
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",__dbk_fcall_wrapper
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",TMethodImplementationIntercept
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",BarRecognize
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7428 -s 640
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7464 -s 640
There are 24 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProgramId
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
FileId
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LowerCaseLongPath
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LongPathHash
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Name
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
OriginalFileName
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Publisher
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Version
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinFileVersion
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinaryType
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductName
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductVersion
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LinkDate
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinProductVersion
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageFullName
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageRelativeId
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Size
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Language
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
IsOsComponent
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4CAC000
direct allocation
page read and write
314E000
stack
page read and write
42DF000
unkown
page read and write
4475000
unkown
page write copy
4794000
direct allocation
page read and write
D5E000
stack
page read and write
45B6000
direct allocation
page read and write
37C0000
heap
page read and write
478D000
direct allocation
page read and write
4CB3000
direct allocation
page read and write
4698000
direct allocation
page read and write
4408000
direct allocation
page read and write
4C48000
direct allocation
page read and write
4800000
heap
page read and write
750000
heap
page read and write
4C31000
direct allocation
page read and write
50C0000
heap
page read and write
4426000
direct allocation
page read and write
4652000
direct allocation
page read and write
4C38000
direct allocation
page read and write
3648000
direct allocation
page read and write
4538000
direct allocation
page read and write
48D8000
direct allocation
page read and write
4C6C000
direct allocation
page read and write
4C2A000
direct allocation
page read and write
441F000
direct allocation
page read and write
A3E000
stack
page read and write
4641000
direct allocation
page read and write
4BDE000
stack
page read and write
45A8000
direct allocation
page read and write
4840000
heap
page read and write
4C34000
direct allocation
page read and write
4451000
direct allocation
page read and write
70F000
stack
page read and write
D1F000
stack
page read and write
4CAA000
direct allocation
page read and write
4A6D000
direct allocation
page read and write
502D000
direct allocation
page read and write
45E8000
direct allocation
page read and write
780000
heap
page read and write
48C8000
direct allocation
page read and write
4560000
heap
page read and write
4A8A000
direct allocation
page read and write
4758000
direct allocation
page read and write
4BFA000
direct allocation
page read and write
43F2000
direct allocation
page read and write
5C0000
heap
page read and write
43FA000
direct allocation
page read and write
4686000
direct allocation
page read and write
E80000
heap
page read and write
327E000
stack
page read and write
A9A000
heap
page read and write
53C000
stack
page read and write
4683000
direct allocation
page read and write
4418000
direct allocation
page read and write
4F80000
heap
page read and write
33CE000
stack
page read and write
45D3000
direct allocation
page read and write
AC0000
heap
page read and write
443C000
direct allocation
page read and write
4C51000
direct allocation
page read and write
33A0000
heap
page read and write
4434000
direct allocation
page read and write
4E3A000
direct allocation
page read and write
2994000
direct allocation
page read and write
5051000
direct allocation
page read and write
4E4E000
stack
page read and write
504A000
direct allocation
page read and write
B90000
heap
page read and write
D9E000
stack
page read and write
ACF000
stack
page read and write
2978000
direct allocation
page read and write
2968000
direct allocation
page read and write
4732000
direct allocation
page read and write
8BC000
stack
page read and write
2DFF000
stack
page read and write
3060000
heap
page read and write
34AF000
stack
page read and write
4F9E000
stack
page read and write
4CD6000
direct allocation
page read and write
4DA8000
direct allocation
page read and write
29B1000
direct allocation
page read and write
AE0000
heap
page read and write
3660000
heap
page read and write
4CB8000
direct allocation
page read and write
A4E000
stack
page read and write
4CB000
stack
page read and write
3110000
heap
page read and write
A1A000
heap
page read and write
770000
heap
page read and write
C0E000
stack
page read and write
2986000
direct allocation
page read and write
297F000
direct allocation
page read and write
44ED000
direct allocation
page read and write
4FDF000
stack
page read and write
32B0000
heap
page read and write
43FA000
direct allocation
page read and write
ACF000
stack
page read and write
4A48000
direct allocation
page read and write
4720000
heap
page read and write
478A000
direct allocation
page read and write
33F0000
heap
page read and write
323C000
stack
page read and write
4FB000
stack
page read and write
34F0000
heap
page read and write
4CDD000
direct allocation
page read and write
4852000
direct allocation
page read and write
443C000
direct allocation
page read and write
4BB0000
heap
page read and write
4591000
direct allocation
page read and write
30C000
stack
page read and write
5B0000
heap
page read and write
4A32000
direct allocation
page read and write
B90000
heap
page read and write
950000
heap
page read and write
3608000
direct allocation
page read and write
522000
unkown
page readonly
4598000
direct allocation
page read and write
400000
unkown
page readonly
7D0000
heap
page read and write
295A000
direct allocation
page read and write
35E2000
direct allocation
page read and write
4C88000
direct allocation
page read and write
4D4F000
stack
page read and write
48DF000
direct allocation
page read and write
4918000
direct allocation
page read and write
31AA000
heap
page read and write
4C8D000
direct allocation
page read and write
5E0000
heap
page read and write
299C000
direct allocation
page read and write
2DFE000
stack
page read and write
45E8000
direct allocation
page read and write
4451000
direct allocation
page read and write
2CB000
stack
page read and write
92E000
stack
page read and write
AFF000
heap
page read and write
D20000
heap
page read and write
4482000
unkown
page readonly
4CEC000
direct allocation
page read and write
520000
unkown
page write copy
4434000
direct allocation
page read and write
51F000
unkown
page read and write
33D0000
heap
page read and write
4A98000
direct allocation
page read and write
43FA000
direct allocation
page read and write
4D9A000
direct allocation
page read and write
C80000
heap
page read and write
4DA1000
direct allocation
page read and write
4C7F000
direct allocation
page read and write
D9F000
stack
page read and write
44B2000
direct allocation
page read and write
45B6000
direct allocation
page read and write
489C000
direct allocation
page read and write
4C9D000
direct allocation
page read and write
4F18000
direct allocation
page read and write
4D0A000
direct allocation
page read and write
4FFA000
direct allocation
page read and write
5110000
heap
page read and write
48A3000
direct allocation
page read and write
47A3000
direct allocation
page read and write
8FC000
stack
page read and write
3100000
heap
page read and write
4774000
direct allocation
page read and write
310A000
heap
page read and write
465F000
direct allocation
page read and write
4786000
direct allocation
page read and write
4458000
direct allocation
page read and write
306B000
stack
page read and write
D70000
heap
page read and write
4C01000
direct allocation
page read and write
4632000
direct allocation
page read and write
2DFC000
stack
page read and write
A8E000
stack
page read and write
34B0000
heap
page read and write
45CC000
direct allocation
page read and write
42E5000
unkown
page write copy
4B0E000
stack
page read and write
2EEA000
heap
page read and write
4648000
direct allocation
page read and write
4C4F000
direct allocation
page read and write
A4F000
stack
page read and write
446F000
unkown
page read and write
84A000
heap
page read and write
D1B000
stack
page read and write
441F000
direct allocation
page read and write
4531000
direct allocation
page read and write
6DC000
stack
page read and write
475A000
direct allocation
page read and write
4678000
direct allocation
page read and write
3FE000
stack
page read and write
465F000
direct allocation
page read and write
CDE000
stack
page read and write
4C5A000
direct allocation
page read and write
46B1000
direct allocation
page read and write
900000
heap
page read and write
C7B000
stack
page read and write
890000
heap
page read and write
4573000
direct allocation
page read and write
4E24000
direct allocation
page read and write
3F0000
heap
page read and write
334E000
stack
page read and write
4D90000
heap
page read and write
45CC000
direct allocation
page read and write
4691000
direct allocation
page read and write
44C8000
direct allocation
page read and write
44BA000
direct allocation
page read and write
4C22000
direct allocation
page read and write
6F0000
heap
page read and write
8C0000
heap
page read and write
44D8000
direct allocation
page read and write
4CC8000
direct allocation
page read and write
4D76000
direct allocation
page read and write
B00000
heap
page read and write
52C000
stack
page read and write
9B0000
heap
page read and write
2DFA000
heap
page read and write
510000
unkown
page write copy
3100000
heap
page read and write
A0E000
stack
page read and write
468D000
direct allocation
page read and write
475F000
direct allocation
page read and write
42F0000
unkown
page write copy
C6F000
stack
page read and write
457A000
direct allocation
page read and write
4476000
unkown
page read and write
2FC000
stack
page read and write
3380000
heap
page read and write
4401000
direct allocation
page read and write
AF0000
heap
page read and write
AB0000
heap
page read and write
920000
heap
page read and write
4A74000
direct allocation
page read and write
31A0000
heap
page read and write
4480000
unkown
page write copy
33AE000
stack
page read and write
4C56000
direct allocation
page read and write
4401000
direct allocation
page read and write
34DF000
stack
page read and write
4D11000
direct allocation
page read and write
32A0000
heap
page read and write
29AA000
direct allocation
page read and write
A7C000
stack
page read and write
305B000
stack
page read and write
52C000
stack
page read and write
4D6F000
direct allocation
page read and write
31F0000
heap
page read and write
4A41000
direct allocation
page read and write
3230000
heap
page read and write
4720000
heap
page read and write
C70000
heap
page read and write
9EE000
stack
page read and write
31EA000
heap
page read and write
43F2000
direct allocation
page read and write
A8E000
stack
page read and write
4886000
direct allocation
page read and write
AFB000
heap
page read and write
4741000
direct allocation
page read and write
4C1F000
direct allocation
page read and write
A8E000
stack
page read and write
4C4A000
direct allocation
page read and write
4894000
direct allocation
page read and write
479E000
stack
page read and write
503C000
direct allocation
page read and write
7A0000
heap
page read and write
487F000
direct allocation
page read and write
4D18000
direct allocation
page read and write
45D3000
direct allocation
page read and write
454F000
direct allocation
page read and write
349E000
stack
page read and write
8DA000
heap
page read and write
4C7A000
direct allocation
page read and write
51D000
unkown
page read and write
45BD000
direct allocation
page read and write
4EED000
direct allocation
page read and write
3040000
heap
page read and write
3100000
heap
page read and write
4768000
direct allocation
page read and write
303C000
stack
page read and write
3624000
direct allocation
page read and write
2DFB000
stack
page read and write
444A000
direct allocation
page read and write
4D4A000
direct allocation
page read and write
452A000
direct allocation
page read and write
C90000
heap
page read and write
327B000
stack
page read and write
45A8000
direct allocation
page read and write
4A7C000
direct allocation
page read and write
3180000
heap
page read and write
370000
heap
page read and write
4B8F000
stack
page read and write
467C000
direct allocation
page read and write
477C000
direct allocation
page read and write
2FFB000
stack
page read and write
36EF000
stack
page read and write
4EE6000
direct allocation
page read and write
335A000
heap
page read and write
4CC1000
direct allocation
page read and write
4C96000
direct allocation
page read and write
4564000
direct allocation
page read and write
33DA000
heap
page read and write
4E48000
direct allocation
page read and write
458A000
direct allocation
page read and write
4890000
heap
page read and write
4C86000
direct allocation
page read and write
AE0000
heap
page read and write
740000
heap
page read and write
4C3C000
direct allocation
page read and write
331F000
stack
page read and write
89A000
heap
page read and write
73C000
stack
page read and write
46B8000
direct allocation
page read and write
2870000
heap
page read and write
4443000
direct allocation
page read and write
2E8F000
stack
page read and write
332E000
stack
page read and write
4D68000
direct allocation
page read and write
3A0000
heap
page read and write
48C1000
direct allocation
page read and write
4E80000
heap
page read and write
4EB2000
direct allocation
page read and write
590000
heap
page read and write
485A000
direct allocation
page read and write
45A8000
direct allocation
page read and write
7E0000
heap
page read and write
4911000
direct allocation
page read and write
45CC000
direct allocation
page read and write
D2E000
stack
page read and write
35EA000
direct allocation
page read and write
3330000
heap
page read and write
4401000
direct allocation
page read and write
3110000
heap
page read and write
338F000
stack
page read and write
36F0000
heap
page read and write
468A000
direct allocation
page read and write
318E000
stack
page read and write
45B6000
direct allocation
page read and write
48AA000
direct allocation
page read and write
45E1000
direct allocation
page read and write
C00000
heap
page read and write
48F4000
direct allocation
page read and write
3420000
heap
page read and write
65B000
stack
page read and write
69B000
stack
page read and write
CBC000
stack
page read and write
45DA000
direct allocation
page read and write
D10000
heap
page read and write
79C000
stack
page read and write
351E000
stack
page read and write
4F03000
direct allocation
page read and write
45D3000
direct allocation
page read and write
444F000
stack
page read and write
A00000
heap
page read and write
4EF4000
direct allocation
page read and write
5D0000
heap
page read and write
355F000
stack
page read and write
4D7D000
direct allocation
page read and write
4511000
direct allocation
page read and write
4A91000
direct allocation
page read and write
D20000
heap
page read and write
42F4000
unkown
page readonly
4D4C000
direct allocation
page read and write
3330000
heap
page read and write
4694000
direct allocation
page read and write
4DF1000
direct allocation
page read and write
4591000
direct allocation
page read and write
4598000
direct allocation
page read and write
95A000
heap
page read and write
850000
heap
page read and write
C9F000
stack
page read and write
4CCF000
direct allocation
page read and write
45BD000
direct allocation
page read and write
44C1000
direct allocation
page read and write
8BA000
heap
page read and write
3320000
heap
page read and write
A60000
heap
page read and write
310F000
stack
page read and write
41D1000
unkown
page execute read
4CBA000
direct allocation
page read and write
5090000
heap
page read and write
4D53000
direct allocation
page read and write
B0F000
stack
page read and write
5B0000
heap
page read and write
31BE000
stack
page read and write
50A0000
heap
page read and write
4D44000
direct allocation
page read and write
D10000
heap
page read and write
A40000
heap
page read and write
4518000
direct allocation
page read and write
3270000
heap
page read and write
3633000
direct allocation
page read and write
4C78000
direct allocation
page read and write
45E8000
direct allocation
page read and write
7FE000
stack
page read and write
810000
heap
page read and write
C80000
heap
page read and write
8B0000
heap
page read and write
A7F000
stack
page read and write
CAC000
stack
page read and write
BEB000
stack
page read and write
700000
heap
page read and write
43F2000
direct allocation
page read and write
A30000
heap
page read and write
45C4000
direct allocation
page read and write
D7E000
stack
page read and write
4D2F000
direct allocation
page read and write
3140000
heap
page read and write
4798000
direct allocation
page read and write
4878000
direct allocation
page read and write
2ED0000
heap
page read and write
C40000
heap
page read and write
5018000
direct allocation
page read and write
4CFA000
direct allocation
page read and write
3770000
heap
page read and write
C2C000
stack
page read and write
50C000
stack
page read and write
4D28000
direct allocation
page read and write
4A5F000
direct allocation
page read and write
353A000
heap
page read and write
3370000
heap
page read and write
370000
heap
page read and write
45E8000
direct allocation
page read and write
4471000
unkown
page read and write
4481000
unkown
page read and write
4641000
direct allocation
page read and write
4A83000
direct allocation
page read and write
A7E000
stack
page read and write
A3E000
stack
page read and write
4591000
direct allocation
page read and write
3070000
heap
page read and write
32E0000
heap
page read and write
43DF000
stack
page read and write
C2E000
stack
page read and write
35F8000
direct allocation
page read and write
45AF000
direct allocation
page read and write
442D000
direct allocation
page read and write
29B8000
direct allocation
page read and write
458A000
direct allocation
page read and write
4B4F000
stack
page read and write
2DFF000
stack
page read and write
A2F000
stack
page read and write
4ED8000
direct allocation
page read and write
4C1F000
stack
page read and write
3520000
heap
page read and write
4EC8000
direct allocation
page read and write
4D01000
direct allocation
page read and write
32BC000
stack
page read and write
439E000
stack
page read and write
83B000
stack
page read and write
3290000
heap
page read and write
4E41000
direct allocation
page read and write
45AF000
direct allocation
page read and write
363A000
direct allocation
page read and write
4D02000
direct allocation
page read and write
4426000
direct allocation
page read and write
69C000
stack
page read and write
456C000
direct allocation
page read and write
8F0000
heap
page read and write
48B8000
direct allocation
page read and write
356A000
heap
page read and write
5034000
direct allocation
page read and write
30AC000
stack
page read and write
2EE0000
heap
page read and write
4766000
direct allocation
page read and write
4434000
direct allocation
page read and write
4EC1000
direct allocation
page read and write
4598000
direct allocation
page read and write
2FEC000
stack
page read and write
DEE000
stack
page read and write
307A000
heap
page read and write
AFF000
stack
page read and write
3641000
direct allocation
page read and write
C6B000
stack
page read and write
45C0000
heap
page read and write
103F000
stack
page read and write
D9E000
stack
page read and write
8AE000
stack
page read and write
3280000
heap
page read and write
4C71000
direct allocation
page read and write
333A000
heap
page read and write
4674000
direct allocation
page read and write
4458000
direct allocation
page read and write
495F000
stack
page read and write
CFE000
stack
page read and write
443C000
direct allocation
page read and write
30A0000
heap
page read and write
69C000
stack
page read and write
5FE000
stack
page read and write
4D58000
direct allocation
page read and write
CEF000
stack
page read and write
466D000
direct allocation
page read and write
4581000
direct allocation
page read and write
344F000
stack
page read and write
45E1000
direct allocation
page read and write
4E2C000
direct allocation
page read and write
8CE000
stack
page read and write
4470000
unkown
page write copy
4522000
direct allocation
page read and write
4361000
unkown
page execute read
4484000
unkown
page readonly
4C08000
direct allocation
page read and write
4CB1000
direct allocation
page read and write
D30000
heap
page read and write
4C81000
direct allocation
page read and write
4A00000
heap
page read and write
5A0000
heap
page read and write
303E000
stack
page read and write
45AF000
direct allocation
page read and write
4D84000
direct allocation
page read and write
4658000
direct allocation
page read and write
ABE000
stack
page read and write
4CB1000
direct allocation
page read and write
4666000
direct allocation
page read and write
4443000
direct allocation
page read and write
3260000
heap
page read and write
4408000
direct allocation
page read and write
45E1000
direct allocation
page read and write
50F000
unkown
page read and write
AE0000
heap
page read and write
4CA2000
direct allocation
page read and write
518000
unkown
page read and write
3616000
direct allocation
page read and write
4B7F000
stack
page read and write
45C4000
direct allocation
page read and write
401000
unkown
page execute read
710000
heap
page read and write
4582000
direct allocation
page read and write
4810000
heap
page read and write
4658000
direct allocation
page read and write
75B000
stack
page read and write
44F4000
direct allocation
page read and write
4418000
direct allocation
page read and write
4761000
direct allocation
page read and write
8D0000
heap
page read and write
570000
heap
page read and write
D6F000
stack
page read and write
323C000
stack
page read and write
4CA3000
direct allocation
page read and write
4C94000
direct allocation
page read and write
441F000
direct allocation
page read and write
444A000
direct allocation
page read and write
B8F000
stack
page read and write
96E000
stack
page read and write
468A000
direct allocation
page read and write
4752000
direct allocation
page read and write
D5F000
stack
page read and write
467C000
direct allocation
page read and write
314E000
stack
page read and write
48A0000
heap
page read and write
840000
heap
page read and write
4582000
direct allocation
page read and write
360000
heap
page read and write
4E08000
direct allocation
page read and write
4588000
direct allocation
page read and write
2EE0000
heap
page read and write
4458000
direct allocation
page read and write
4CE4000
direct allocation
page read and write
45AF000
direct allocation
page read and write
4E90000
heap
page read and write
467F000
direct allocation
page read and write
4791000
direct allocation
page read and write
780000
heap
page read and write
4CB8000
direct allocation
page read and write
4691000
direct allocation
page read and write
4C58000
direct allocation
page read and write
B5E000
stack
page read and write
4598000
direct allocation
page read and write
4CAA000
direct allocation
page read and write
45BD000
direct allocation
page read and write
4E33000
direct allocation
page read and write
83E000
stack
page read and write
360F000
direct allocation
page read and write
6F0000
heap
page read and write
4C62000
direct allocation
page read and write
5DC000
stack
page read and write
B90000
heap
page read and write
4683000
direct allocation
page read and write
447F000
unkown
page read and write
488D000
direct allocation
page read and write
910000
heap
page read and write
4880000
heap
page read and write
46AA000
direct allocation
page read and write
4443000
direct allocation
page read and write
463A000
direct allocation
page read and write
CCF000
stack
page read and write
31D0000
heap
page read and write
31E0000
heap
page read and write
2EA0000
heap
page read and write
4C26000
direct allocation
page read and write
44DF000
direct allocation
page read and write
33EF000
stack
page read and write
458A000
direct allocation
page read and write
5008000
direct allocation
page read and write
340F000
stack
page read and write
4783000
direct allocation
page read and write
48E6000
direct allocation
page read and write
4E8F000
stack
page read and write
4C5D000
direct allocation
page read and write
4C9C000
direct allocation
page read and write
315F000
stack
page read and write
4B4E000
stack
page read and write
442D000
direct allocation
page read and write
70C000
stack
page read and write
A0E000
stack
page read and write
440E000
stack
page read and write
513000
unkown
page write copy
81A000
heap
page read and write
D5C000
stack
page read and write
840000
heap
page read and write
59B000
stack
page read and write
ABE000
stack
page read and write
4E4F000
stack
page read and write
329A000
heap
page read and write
3300000
heap
page read and write
4EDF000
direct allocation
page read and write
490A000
direct allocation
page read and write
4A66000
direct allocation
page read and write
47B8000
direct allocation
page read and write
473A000
direct allocation
page read and write
45DA000
direct allocation
page read and write
4426000
direct allocation
page read and write
B5E000
stack
page read and write
32EE000
stack
page read and write
D90000
heap
page read and write
45C4000
direct allocation
page read and write
4DE2000
direct allocation
page read and write
580000
heap
page read and write
4C78000
direct allocation
page read and write
4648000
direct allocation
page read and write
7C0000
heap
page read and write
4D5A000
direct allocation
page read and write
462F000
stack
page read and write
4EB000
stack
page read and write
2E4E000
stack
page read and write
309C000
stack
page read and write
45D3000
direct allocation
page read and write
48FC000
direct allocation
page read and write
33C0000
heap
page read and write
4582000
direct allocation
page read and write
2DF0000
heap
page read and write
C9F000
stack
page read and write
9CB000
stack
page read and write
4698000
direct allocation
page read and write
730000
heap
page read and write
44E6000
direct allocation
page read and write
7EE000
stack
page read and write
4850000
heap
page read and write
361D000
direct allocation
page read and write
479C000
direct allocation
page read and write
5026000
direct allocation
page read and write
4A3A000
direct allocation
page read and write
4F60000
heap
page read and write
380000
heap
page read and write
AB0000
heap
page read and write
4D36000
direct allocation
page read and write
45E1000
direct allocation
page read and write
65B000
stack
page read and write
4C88000
direct allocation
page read and write
5043000
direct allocation
page read and write
4668000
direct allocation
page read and write
86F000
stack
page read and write
3350000
heap
page read and write
4674000
direct allocation
page read and write
4C2D000
direct allocation
page read and write
2952000
direct allocation
page read and write
4C68000
direct allocation
page read and write
298D000
direct allocation
page read and write
47AA000
direct allocation
page read and write
469C000
direct allocation
page read and write
318F000
stack
page read and write
45CC000
direct allocation
page read and write
45DA000
direct allocation
page read and write
42F1000
unkown
page read and write
3220000
heap
page read and write
B4E000
stack
page read and write
4C6A000
direct allocation
page read and write
4748000
direct allocation
page read and write
4C64000
direct allocation
page read and write
6FB000
stack
page read and write
A00000
heap
page read and write
4BF2000
direct allocation
page read and write
4591000
direct allocation
page read and write
D4F000
stack
page read and write
48B1000
direct allocation
page read and write
4D3B000
direct allocation
page read and write
D8B000
stack
page read and write
4930000
heap
page read and write
4E1D000
direct allocation
page read and write
A4E000
stack
page read and write
4C8F000
direct allocation
page read and write
48ED000
direct allocation
page read and write
311E000
stack
page read and write
447D000
unkown
page read and write
521000
unkown
page read and write
4DEA000
direct allocation
page read and write
4E16000
direct allocation
page read and write
A90000
heap
page read and write
47B1000
direct allocation
page read and write
B1E000
stack
page read and write
4408000
direct allocation
page read and write
C7A000
heap
page read and write
42E1000
unkown
page read and write
5C0000
heap
page read and write
3530000
heap
page read and write
32A0000
heap
page read and write
30F0000
heap
page read and write
4CA4000
direct allocation
page read and write
6CB000
stack
page read and write
4D70000
heap
page read and write
D30000
heap
page read and write
9C0000
heap
page read and write
4D3D000
direct allocation
page read and write
4E0F000
direct allocation
page read and write
2961000
direct allocation
page read and write
4418000
direct allocation
page read and write
4C73000
direct allocation
page read and write
A10000
heap
page read and write
4C18000
direct allocation
page read and write
4D51000
direct allocation
page read and write
86E000
stack
page read and write
9AE000
stack
page read and write
463A000
direct allocation
page read and write
4E0E000
stack
page read and write
459E000
stack
page read and write
318A000
heap
page read and write
4903000
direct allocation
page read and write
A80000
heap
page read and write
4D61000
direct allocation
page read and write
476D000
direct allocation
page read and write
42ED000
unkown
page read and write
46A3000
direct allocation
page read and write
340E000
stack
page read and write
45A8000
direct allocation
page read and write
501F000
direct allocation
page read and write
45B6000
direct allocation
page read and write
45DF000
stack
page read and write
B60000
heap
page read and write
4632000
direct allocation
page read and write
5058000
direct allocation
page read and write
444A000
direct allocation
page read and write
45DA000
direct allocation
page read and write
4556000
direct allocation
page read and write
4DF8000
direct allocation
page read and write
42E6000
unkown
page read and write
4F11000
direct allocation
page read and write
4C43000
direct allocation
page read and write
4D93000
direct allocation
page read and write
4D68000
direct allocation
page read and write
4D0E000
stack
page read and write
3480000
heap
page read and write
5A0000
heap
page read and write
4F0A000
direct allocation
page read and write
32DE000
stack
page read and write
4CC8000
direct allocation
page read and write
4778000
direct allocation
page read and write
B80000
heap
page read and write
44FC000
direct allocation
page read and write
4EFC000
direct allocation
page read and write
35F1000
direct allocation
page read and write
A70000
heap
page read and write
4EBA000
direct allocation
page read and write
328A000
heap
page read and write
2BB000
stack
page read and write
4A58000
direct allocation
page read and write
5001000
direct allocation
page read and write
87C000
stack
page read and write
42E0000
unkown
page write copy
30B0000
heap
page read and write
4503000
direct allocation
page read and write
465A000
direct allocation
page read and write
450A000
direct allocation
page read and write
4582000
direct allocation
page read and write
3190000
heap
page read and write
CCE000
stack
page read and write
87B000
stack
page read and write
511000
unkown
page read and write
3560000
heap
page read and write
4548000
direct allocation
page read and write
4FF2000
direct allocation
page read and write
455D000
direct allocation
page read and write
2EB0000
heap
page read and write
A3B000
stack
page read and write
C3C000
stack
page read and write
458A000
direct allocation
page read and write
8AF000
stack
page read and write
42EF000
unkown
page read and write
C70000
heap
page read and write
45BD000
direct allocation
page read and write
42F2000
unkown
page readonly
8E0000
heap
page read and write
2FEB000
stack
page read and write
45C4000
direct allocation
page read and write
4FC0000
heap
page read and write
ACA000
heap
page read and write
8FA000
heap
page read and write
29A3000
direct allocation
page read and write
2FAB000
stack
page read and write
4CF3000
direct allocation
page read and write
D00000
heap
page read and write
442D000
direct allocation
page read and write
B0A000
heap
page read and write
48BA000
direct allocation
page read and write
4360000
unkown
page readonly
477F000
direct allocation
page read and write
4861000
direct allocation
page read and write
4868000
direct allocation
page read and write
C8F000
stack
page read and write
7B0000
heap
page read and write
4C52000
direct allocation
page read and write
47DF000
stack
page read and write
3290000
heap
page read and write
82E000
stack
page read and write
4451000
direct allocation
page read and write
41D0000
unkown
page readonly
3250000
heap
page read and write
6FA000
heap
page read and write
4D8C000
direct allocation
page read and write
466D000
direct allocation
page read and write
332E000
stack
page read and write
2EEA000
heap
page read and write
362C000
direct allocation
page read and write
2DF0000
heap
page read and write
48AB000
direct allocation
page read and write
730000
heap
page read and write
4C61000
direct allocation
page read and write
4661000
direct allocation
page read and write
524000
unkown
page readonly
4666000
direct allocation
page read and write
2DE0000
heap
page read and write
There are 818 hidden memdumps, click here to show them.