IOC Report
I6WVogMkrj.dll

loading gif

Files

File Path
Type
Category
Malicious
I6WVogMkrj.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_481a2adff66839ff830cdba352f52481c2a3d3d_7522e4b5_3a1d107d-c25a-427c-9169-83a1edd24c7f\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_481a2adff66839ff830cdba352f52481c2a3d3d_7522e4b5_f54c76dd-3e53-4cc6-9fc1-13f935ef4f37\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_611e6188d1c72fbcea43638d116a458a2e4fe70_7522e4b5_e6a8dc82-f488-4672-a9ec-3b789bbfb76b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB18C.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 29 17:56:38 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB268.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB297.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD8AB.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 29 17:56:48 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD909.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 29 17:56:48 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD997.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDA52.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDAB1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDAC1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\I6WVogMkrj.dll,BarCreate
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6956 -s 648
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\I6WVogMkrj.dll,BarDestroy
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\I6WVogMkrj.dll,BarFreeRec
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",BarCreate
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",BarDestroy
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",BarFreeRec
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeSetFocus
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeSetDirty
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeResize
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkePaint2
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeKillFocus
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeIsDirty
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeInitialize
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeGetCaretRect
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeFireMouseWheelEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeFireMouseEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeFireKeyUpEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeFireKeyPressEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeFireKeyDownEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeFireContextMenuEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeFinalize
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeDestroyWebView
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeCreateWebView
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",dbkFCallWrapperAddr
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",__dbk_fcall_wrapper
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",TMethodImplementationIntercept
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",BarRecognize
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 640
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7256 -s 648
There are 24 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProgramId
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
FileId
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LowerCaseLongPath
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LongPathHash
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Name
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
OriginalFileName
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Publisher
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Version
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinFileVersion
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinaryType
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductName
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductVersion
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LinkDate
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinProductVersion
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageFullName
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageRelativeId
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Size
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Language
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
IsOsComponent
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4A91000
direct allocation
page read and write
2ED0000
heap
page read and write
27EB000
stack
page read and write
2670000
heap
page read and write
19C000
stack
page read and write
28EA000
heap
page read and write
2461000
direct allocation
page read and write
3110000
heap
page read and write
44F8000
direct allocation
page read and write
238C000
stack
page read and write
4A71000
direct allocation
page read and write
44ED000
direct allocation
page read and write
271A000
heap
page read and write
455A000
direct allocation
page read and write
334F000
stack
page read and write
44A8000
direct allocation
page read and write
3420000
heap
page read and write
3480000
heap
page read and write
267E000
stack
page read and write
511000
unkown
page read and write
2940000
heap
page read and write
291A000
heap
page read and write
46CD000
direct allocation
page read and write
4B71000
direct allocation
page read and write
263E000
stack
page read and write
30A1000
direct allocation
page read and write
48D3000
direct allocation
page read and write
3040000
heap
page read and write
26BF000
stack
page read and write
3170000
heap
page read and write
4D78000
direct allocation
page read and write
45BD000
direct allocation
page read and write
2E80000
heap
page read and write
521000
unkown
page read and write
2EB0000
heap
page read and write
4591000
direct allocation
page read and write
4328000
direct allocation
page read and write
48AE000
stack
page read and write
30E3000
direct allocation
page read and write
4B46000
direct allocation
page read and write
2ECA000
heap
page read and write
33BF000
stack
page read and write
2FCE000
stack
page read and write
435A000
direct allocation
page read and write
4B3F000
direct allocation
page read and write
28E0000
heap
page read and write
488A000
direct allocation
page read and write
4AA8000
direct allocation
page read and write
4A88000
direct allocation
page read and write
4D1A000
direct allocation
page read and write
431F000
direct allocation
page read and write
44F8000
direct allocation
page read and write
51F000
unkown
page read and write
2D30000
heap
page read and write
4361000
direct allocation
page read and write
2E6A000
heap
page read and write
46F8000
direct allocation
page read and write
28E0000
heap
page read and write
4C1F000
direct allocation
page read and write
27DE000
stack
page read and write
520000
unkown
page write copy
15B000
stack
page read and write
4A41000
direct allocation
page read and write
3420000
heap
page read and write
40DF000
stack
page read and write
4D38000
direct allocation
page read and write
2CCE000
stack
page read and write
2A8E000
stack
page read and write
2DA0000
heap
page read and write
4C0F000
stack
page read and write
457F000
direct allocation
page read and write
4433000
direct allocation
page read and write
41F6000
direct allocation
page read and write
2650000
heap
page read and write
433D000
direct allocation
page read and write
4726000
direct allocation
page read and write
2CEA000
heap
page read and write
51D000
unkown
page read and write
48BD000
direct allocation
page read and write
45FF000
stack
page read and write
4976000
direct allocation
page read and write
45E8000
direct allocation
page read and write
2A0F000
stack
page read and write
4516000
direct allocation
page read and write
4F00000
heap
page read and write
4D2C000
direct allocation
page read and write
4692000
direct allocation
page read and write
2AE000
stack
page read and write
266E000
stack
page read and write
2D80000
heap
page read and write
6DF000
heap
page read and write
4623000
direct allocation
page read and write
2FDF000
stack
page read and write
2D80000
heap
page read and write
4D0F000
direct allocation
page read and write
23EC000
stack
page read and write
4F03000
direct allocation
page read and write
4B1A000
direct allocation
page read and write
46F1000
direct allocation
page read and write
25EB000
stack
page read and write
2660000
heap
page read and write
51D000
unkown
page read and write
450D000
direct allocation
page read and write
2A3C000
stack
page read and write
442C000
direct allocation
page read and write
2A10000
heap
page read and write
4D63000
direct allocation
page read and write
4A0C000
direct allocation
page read and write
45E1000
direct allocation
page read and write
2CCF000
stack
page read and write
313F000
stack
page read and write
4D5C000
direct allocation
page read and write
44D8000
direct allocation
page read and write
2BDB000
stack
page read and write
303E000
stack
page read and write
2D10000
heap
page read and write
324F000
stack
page read and write
2494000
direct allocation
page read and write
495F000
stack
page read and write
9B0000
heap
page read and write
2E6A000
heap
page read and write
44F1000
direct allocation
page read and write
46A0000
heap
page read and write
471F000
direct allocation
page read and write
2C20000
heap
page read and write
404E000
stack
page read and write
4708000
direct allocation
page read and write
2F1C000
stack
page read and write
26FA000
heap
page read and write
469E000
stack
page read and write
4448000
direct allocation
page read and write
45DA000
direct allocation
page read and write
4CC0000
heap
page read and write
4A58000
direct allocation
page read and write
2810000
heap
page read and write
4424000
direct allocation
page read and write
4334000
direct allocation
page read and write
4F18000
direct allocation
page read and write
2920000
heap
page read and write
4A5F000
direct allocation
page read and write
41E8000
direct allocation
page read and write
4F11000
direct allocation
page read and write
4353000
direct allocation
page read and write
2CB0000
heap
page read and write
3370000
heap
page read and write
2C0F000
stack
page read and write
4548000
direct allocation
page read and write
4ACC000
direct allocation
page read and write
452A000
direct allocation
page read and write
2A5E000
stack
page read and write
2A60000
heap
page read and write
4503000
direct allocation
page read and write
43F1000
direct allocation
page read and write
48E1000
direct allocation
page read and write
510000
unkown
page write copy
6DB000
heap
page read and write
43F8000
direct allocation
page read and write
2C30000
heap
page read and write
4ABA000
direct allocation
page read and write
4383000
direct allocation
page read and write
4A98000
direct allocation
page read and write
28CE000
stack
page read and write
24B1000
direct allocation
page read and write
3200000
heap
page read and write
4598000
direct allocation
page read and write
425F000
stack
page read and write
520000
unkown
page write copy
2AFB000
stack
page read and write
518000
unkown
page read and write
4A62000
direct allocation
page read and write
325E000
stack
page read and write
2F9E000
stack
page read and write
25D0000
heap
page read and write
2E90000
heap
page read and write
521000
unkown
page read and write
4A7C000
direct allocation
page read and write
2E1E000
stack
page read and write
2C3C000
stack
page read and write
4578000
direct allocation
page read and write
4891000
direct allocation
page read and write
2F90000
heap
page read and write
4B21000
direct allocation
page read and write
30B8000
direct allocation
page read and write
3000000
heap
page read and write
30D4000
direct allocation
page read and write
4554000
direct allocation
page read and write
25DE000
stack
page read and write
4336000
direct allocation
page read and write
6ED000
heap
page read and write
2FD0000
heap
page read and write
437C000
direct allocation
page read and write
2970000
heap
page read and write
26F0000
heap
page read and write
530000
heap
page read and write
4D46000
direct allocation
page read and write
2C5F000
stack
page read and write
2BB0000
heap
page read and write
4A88000
direct allocation
page read and write
44BF000
direct allocation
page read and write
2D8A000
heap
page read and write
438A000
direct allocation
page read and write
2F90000
heap
page read and write
45F8000
direct allocation
page read and write
522000
unkown
page readonly
29D0000
heap
page read and write
49A8000
direct allocation
page read and write
4A82000
direct allocation
page read and write
4533000
direct allocation
page read and write
2E7F000
stack
page read and write
4B30000
heap
page read and write
23B0000
heap
page read and write
EC000
stack
page read and write
2D0C000
stack
page read and write
51D000
unkown
page read and write
4D16000
direct allocation
page read and write
314F000
stack
page read and write
460D000
direct allocation
page read and write
410F000
stack
page read and write
2E10000
heap
page read and write
2920000
heap
page read and write
2550000
heap
page read and write
442F000
stack
page read and write
4C9E000
stack
page read and write
4EC1000
direct allocation
page read and write
284A000
heap
page read and write
25E0000
heap
page read and write
4C90000
heap
page read and write
33C0000
heap
page read and write
2E7E000
stack
page read and write
450F000
direct allocation
page read and write
2930000
heap
page read and write
2F1A000
heap
page read and write
2840000
heap
page read and write
466F000
stack
page read and write
4A8A000
direct allocation
page read and write
494E000
stack
page read and write
44D2000
direct allocation
page read and write
50F000
unkown
page read and write
245A000
direct allocation
page read and write
49D1000
direct allocation
page read and write
4A74000
direct allocation
page read and write
24B8000
direct allocation
page read and write
46DC000
direct allocation
page read and write
4AA4000
direct allocation
page read and write
2D70000
heap
page read and write
28D0000
heap
page read and write
2840000
heap
page read and write
2B8F000
stack
page read and write
433A000
direct allocation
page read and write
2A70000
heap
page read and write
4A96000
direct allocation
page read and write
49E8000
direct allocation
page read and write
2D80000
heap
page read and write
2AA0000
heap
page read and write
45CC000
direct allocation
page read and write
2E50000
heap
page read and write
524000
unkown
page readonly
46B8000
direct allocation
page read and write
268A000
heap
page read and write
49F6000
direct allocation
page read and write
4AA6000
direct allocation
page read and write
4AB4000
direct allocation
page read and write
44E1000
direct allocation
page read and write
45BF000
stack
page read and write
27FB000
stack
page read and write
319E000
stack
page read and write
4D33000
direct allocation
page read and write
2486000
direct allocation
page read and write
2AAE000
stack
page read and write
46DF000
stack
page read and write
4301000
direct allocation
page read and write
247F000
direct allocation
page read and write
2CC0000
heap
page read and write
23E0000
heap
page read and write
4A21000
direct allocation
page read and write
4538000
direct allocation
page read and write
441D000
direct allocation
page read and write
4512000
direct allocation
page read and write
4BFA000
direct allocation
page read and write
51F000
unkown
page read and write
2560000
heap
page read and write
2B70000
heap
page read and write
4A48000
direct allocation
page read and write
4B6A000
direct allocation
page read and write
2A20000
heap
page read and write
4ABD000
direct allocation
page read and write
4A81000
direct allocation
page read and write
4D08000
direct allocation
page read and write
2C7C000
stack
page read and write
26F0000
heap
page read and write
2680000
heap
page read and write
401000
unkown
page execute read
2610000
heap
page read and write
4D71000
direct allocation
page read and write
451D000
direct allocation
page read and write
2E40000
heap
page read and write
2670000
heap
page read and write
2A10000
heap
page read and write
4630000
heap
page read and write
34E0000
heap
page read and write
4958000
direct allocation
page read and write
30F8000
direct allocation
page read and write
4620000
heap
page read and write
48CC000
direct allocation
page read and write
4332000
direct allocation
page read and write
4CF8000
direct allocation
page read and write
44C6000
direct allocation
page read and write
2468000
direct allocation
page read and write
2620000
heap
page read and write
430A000
direct allocation
page read and write
4B12000
direct allocation
page read and write
B10000
heap
page read and write
33FE000
stack
page read and write
4BAF000
stack
page read and write
510000
unkown
page write copy
2EAA000
heap
page read and write
421E000
stack
page read and write
4EC8000
direct allocation
page read and write
520000
unkown
page write copy
2DBE000
stack
page read and write
4358000
direct allocation
page read and write
4A6A000
direct allocation
page read and write
305B000
stack
page read and write
267F000
stack
page read and write
4F0A000
direct allocation
page read and write
4968000
direct allocation
page read and write
232B000
stack
page read and write
4C01000
direct allocation
page read and write
4B38000
direct allocation
page read and write
267A000
heap
page read and write
458A000
direct allocation
page read and write
2C0E000
stack
page read and write
4AAD000
direct allocation
page read and write
4A3A000
direct allocation
page read and write
6D0000
heap
page read and write
4B4D000
direct allocation
page read and write
30CD000
direct allocation
page read and write
51F000
unkown
page read and write
28AC000
stack
page read and write
3040000
heap
page read and write
44FF000
direct allocation
page read and write
4AC1000
direct allocation
page read and write
513000
unkown
page write copy
2EDB000
stack
page read and write
2BC0000
heap
page read and write
4326000
direct allocation
page read and write
4523000
direct allocation
page read and write
2EA0000
heap
page read and write
45D3000
direct allocation
page read and write
290F000
stack
page read and write
2790000
heap
page read and write
46A8000
direct allocation
page read and write
2D70000
heap
page read and write
2D50000
heap
page read and write
2A3C000
stack
page read and write
31F0000
heap
page read and write
4CDF000
stack
page read and write
3480000
heap
page read and write
2F80000
heap
page read and write
4D21000
direct allocation
page read and write
434C000
direct allocation
page read and write
2C90000
heap
page read and write
48EF000
stack
page read and write
49A1000
direct allocation
page read and write
2940000
heap
page read and write
2F10000
heap
page read and write
2D70000
heap
page read and write
472D000
direct allocation
page read and write
4541000
direct allocation
page read and write
4A1A000
direct allocation
page read and write
41D1000
direct allocation
page read and write
4ED8000
direct allocation
page read and write
45BE000
stack
page read and write
2710000
heap
page read and write
4AB3000
direct allocation
page read and write
440F000
direct allocation
page read and write
4606000
direct allocation
page read and write
2CEB000
stack
page read and write
48C4000
direct allocation
page read and write
200000
heap
page read and write
2B0E000
stack
page read and write
2990000
heap
page read and write
4EDF000
direct allocation
page read and write
4C34000
direct allocation
page read and write
255B000
stack
page read and write
2EBA000
heap
page read and write
297B000
stack
page read and write
44EA000
direct allocation
page read and write
49D8000
direct allocation
page read and write
44DA000
direct allocation
page read and write
2A3F000
stack
page read and write
2A6A000
heap
page read and write
23AB000
stack
page read and write
449A000
direct allocation
page read and write
42FA000
direct allocation
page read and write
30C6000
direct allocation
page read and write
3160000
heap
page read and write
42AF000
stack
page read and write
2DFE000
stack
page read and write
46EA000
direct allocation
page read and write
2E3E000
stack
page read and write
44E2000
direct allocation
page read and write
3092000
direct allocation
page read and write
2ACF000
stack
page read and write
50F000
unkown
page read and write
29E0000
heap
page read and write
30EA000
direct allocation
page read and write
4528000
direct allocation
page read and write
4391000
direct allocation
page read and write
3190000
heap
page read and write
287B000
stack
page read and write
4718000
direct allocation
page read and write
400000
unkown
page readonly
300F000
stack
page read and write
4480000
heap
page read and write
4A28000
direct allocation
page read and write
24AB000
stack
page read and write
3110000
heap
page read and write
57E000
stack
page read and write
513000
unkown
page write copy
436E000
stack
page read and write
44AE000
stack
page read and write
3280000
heap
page read and write
2E3C000
stack
page read and write
420C000
direct allocation
page read and write
328A000
heap
page read and write
453F000
direct allocation
page read and write
44DC000
direct allocation
page read and write
46C6000
direct allocation
page read and write
4A78000
direct allocation
page read and write
299A000
heap
page read and write
24EC000
stack
page read and write
2E5F000
stack
page read and write
4A91000
direct allocation
page read and write
2F80000
heap
page read and write
2820000
heap
page read and write
44C1000
direct allocation
page read and write
4358000
direct allocation
page read and write
4A8F000
direct allocation
page read and write
43AF000
stack
page read and write
451C000
direct allocation
page read and write
30BF000
direct allocation
page read and write
524000
unkown
page readonly
4B78000
direct allocation
page read and write
408E000
stack
page read and write
29EB000
stack
page read and write
338E000
stack
page read and write
24AA000
direct allocation
page read and write
319E000
stack
page read and write
4870000
heap
page read and write
2BA0000
heap
page read and write
2920000
heap
page read and write
436D000
direct allocation
page read and write
45B6000
direct allocation
page read and write
2E3C000
stack
page read and write
450000
heap
page read and write
4EB2000
direct allocation
page read and write
4DB0000
heap
page read and write
37C0000
heap
page read and write
284A000
heap
page read and write
4578000
direct allocation
page read and write
45E0000
heap
page read and write
4531000
direct allocation
page read and write
304A000
heap
page read and write
44FC000
direct allocation
page read and write
319A000
heap
page read and write
45A8000
direct allocation
page read and write
4BF2000
direct allocation
page read and write
49EF000
direct allocation
page read and write
45E0000
heap
page read and write
2EA0000
heap
page read and write
2B80000
heap
page read and write
283B000
stack
page read and write
2BCF000
stack
page read and write
234B000
stack
page read and write
4C50000
heap
page read and write
4A04000
direct allocation
page read and write
461C000
direct allocation
page read and write
456A000
direct allocation
page read and write
498F000
stack
page read and write
45DA000
direct allocation
page read and write
4441000
direct allocation
page read and write
2A30000
heap
page read and write
2C3B000
stack
page read and write
4A10000
heap
page read and write
33FE000
stack
page read and write
4C51000
direct allocation
page read and write
522000
unkown
page readonly
4CEA000
direct allocation
page read and write
42F2000
direct allocation
page read and write
2CD0000
heap
page read and write
236B000
stack
page read and write
400000
unkown
page readonly
4B63000
direct allocation
page read and write
41C2000
direct allocation
page read and write
310F000
stack
page read and write
4984000
direct allocation
page read and write
524000
unkown
page readonly
46F2000
direct allocation
page read and write
2600000
heap
page read and write
434A000
direct allocation
page read and write
451A000
direct allocation
page read and write
281F000
stack
page read and write
43EF000
stack
page read and write
29FE000
stack
page read and write
2D90000
heap
page read and write
4D4D000
direct allocation
page read and write
48E8000
direct allocation
page read and write
4508000
direct allocation
page read and write
236C000
stack
page read and write
4EE6000
direct allocation
page read and write
4A70000
heap
page read and write
2BDC000
stack
page read and write
45A0000
heap
page read and write
432D000
direct allocation
page read and write
498C000
direct allocation
page read and write
4AC3000
direct allocation
page read and write
4B6E000
stack
page read and write
521000
unkown
page read and write
4343000
direct allocation
page read and write
44BA000
direct allocation
page read and write
4344000
direct allocation
page read and write
2B9B000
stack
page read and write
4AC8000
direct allocation
page read and write
34EA000
heap
page read and write
2B2A000
heap
page read and write
23AC000
stack
page read and write
400000
unkown
page readonly
4366000
direct allocation
page read and write
25CC000
stack
page read and write
3100000
heap
page read and write
4A32000
direct allocation
page read and write
4A83000
direct allocation
page read and write
48B6000
direct allocation
page read and write
304A000
heap
page read and write
4ACA000
direct allocation
page read and write
4701000
direct allocation
page read and write
4A9D000
direct allocation
page read and write
2B9C000
stack
page read and write
45FF000
direct allocation
page read and write
2C90000
heap
page read and write
340F000
stack
page read and write
29DA000
heap
page read and write
286B000
stack
page read and write
2EB0000
heap
page read and write
3150000
heap
page read and write
2A20000
heap
page read and write
283C000
stack
page read and write
4A98000
direct allocation
page read and write
41EF000
direct allocation
page read and write
518000
unkown
page read and write
2BD0000
heap
page read and write
4348000
direct allocation
page read and write
292A000
heap
page read and write
44B2000
direct allocation
page read and write
2C8E000
stack
page read and write
4A72000
direct allocation
page read and write
4521000
direct allocation
page read and write
454B000
direct allocation
page read and write
307C000
stack
page read and write
443A000
direct allocation
page read and write
450A000
direct allocation
page read and write
4898000
direct allocation
page read and write
4204000
direct allocation
page read and write
2EBF000
stack
page read and write
580000
heap
page read and write
4AB6000
direct allocation
page read and write
4586000
direct allocation
page read and write
44DF000
direct allocation
page read and write
3210000
heap
page read and write
433C000
direct allocation
page read and write
2DD0000
heap
page read and write
2D00000
heap
page read and write
43EE000
stack
page read and write
518000
unkown
page read and write
26C0000
heap
page read and write
494A000
direct allocation
page read and write
2EC0000
heap
page read and write
4970000
heap
page read and write
4514000
direct allocation
page read and write
4A9F000
direct allocation
page read and write
522000
unkown
page readonly
48A8000
direct allocation
page read and write
259C000
stack
page read and write
343F000
stack
page read and write
4571000
direct allocation
page read and write
44C8000
direct allocation
page read and write
4ABC000
direct allocation
page read and write
2AEF000
stack
page read and write
44F1000
direct allocation
page read and write
2CE0000
heap
page read and write
1EC000
stack
page read and write
28BC000
stack
page read and write
45D2000
direct allocation
page read and write
4311000
direct allocation
page read and write
496F000
direct allocation
page read and write
2890000
heap
page read and write
45C4000
direct allocation
page read and write
26DE000
stack
page read and write
4614000
direct allocation
page read and write
4B54000
direct allocation
page read and write
43E2000
direct allocation
page read and write
4C3C000
direct allocation
page read and write
2A60000
heap
page read and write
452C000
direct allocation
page read and write
4C2D000
direct allocation
page read and write
3490000
heap
page read and write
330E000
stack
page read and write
46E3000
direct allocation
page read and write
30DC000
direct allocation
page read and write
4318000
direct allocation
page read and write
309C000
stack
page read and write
287C000
stack
page read and write
23F0000
heap
page read and write
432F000
direct allocation
page read and write
2B10000
heap
page read and write
4638000
direct allocation
page read and write
4AAC000
direct allocation
page read and write
30E0000
heap
page read and write
4D6A000
direct allocation
page read and write
44A1000
direct allocation
page read and write
45AF000
direct allocation
page read and write
2B5B000
stack
page read and write
303B000
stack
page read and write
469A000
direct allocation
page read and write
46FA000
direct allocation
page read and write
2A9E000
stack
page read and write
46D0000
heap
page read and write
29A0000
heap
page read and write
453E000
stack
page read and write
40CF000
stack
page read and write
4563000
direct allocation
page read and write
4D10000
heap
page read and write
31B0000
heap
page read and write
4D54000
direct allocation
page read and write
50F000
unkown
page read and write
4351000
direct allocation
page read and write
4341000
direct allocation
page read and write
4A98000
direct allocation
page read and write
49C2000
direct allocation
page read and write
2830000
heap
page read and write
4510000
heap
page read and write
2C1E000
stack
page read and write
4942000
direct allocation
page read and write
510000
unkown
page write copy
4750000
heap
page read and write
2FDA000
heap
page read and write
4A6D000
direct allocation
page read and write
2C4F000
stack
page read and write
23DF000
stack
page read and write
408E000
stack
page read and write
2E3F000
stack
page read and write
4A13000
direct allocation
page read and write
49CA000
direct allocation
page read and write
4506000
direct allocation
page read and write
4AAF000
direct allocation
page read and write
44E6000
direct allocation
page read and write
4D12000
direct allocation
page read and write
4318000
direct allocation
page read and write
8CF000
stack
page read and write
30FE000
stack
page read and write
6E8000
heap
page read and write
33BF000
stack
page read and write
4B5C000
direct allocation
page read and write
2452000
direct allocation
page read and write
44EA000
direct allocation
page read and write
4EF4000
direct allocation
page read and write
4CBF000
stack
page read and write
4A8A000
direct allocation
page read and write
248D000
direct allocation
page read and write
310E000
stack
page read and write
4D3F000
direct allocation
page read and write
2FDE000
stack
page read and write
2CCB000
stack
page read and write
49FD000
direct allocation
page read and write
210000
heap
page read and write
4951000
direct allocation
page read and write
457F000
stack
page read and write
2BCE000
stack
page read and write
40CE000
stack
page read and write
2AB0000
heap
page read and write
31DF000
stack
page read and write
43AE000
stack
page read and write
2940000
heap
page read and write
30F1000
direct allocation
page read and write
4561000
direct allocation
page read and write
454D000
direct allocation
page read and write
4D28000
direct allocation
page read and write
309A000
direct allocation
page read and write
318E000
stack
page read and write
45E8000
direct allocation
page read and write
4C43000
direct allocation
page read and write
4882000
direct allocation
page read and write
2C5F000
stack
page read and write
4A7A000
direct allocation
page read and write
497D000
direct allocation
page read and write
2E00000
heap
page read and write
6CE000
stack
page read and write
44F8000
direct allocation
page read and write
23F0000
heap
page read and write
258B000
stack
page read and write
2840000
heap
page read and write
4368000
direct allocation
page read and write
44E3000
direct allocation
page read and write
31BA000
heap
page read and write
4631000
direct allocation
page read and write
2C80000
heap
page read and write
2478000
direct allocation
page read and write
315F000
stack
page read and write
4C26000
direct allocation
page read and write
4538000
direct allocation
page read and write
2B20000
heap
page read and write
4CF1000
direct allocation
page read and write
44CD000
direct allocation
page read and write
29BC000
stack
page read and write
314E000
stack
page read and write
48DA000
direct allocation
page read and write
462E000
stack
page read and write
446E000
stack
page read and write
2A90000
heap
page read and write
44F4000
direct allocation
page read and write
41FD000
direct allocation
page read and write
44D4000
direct allocation
page read and write
4AC4000
direct allocation
page read and write
4408000
direct allocation
page read and write
2DFF000
stack
page read and write
30C0000
heap
page read and write
2A80000
heap
page read and write
511000
unkown
page read and write
513000
unkown
page write copy
511000
unkown
page read and write
4C18000
direct allocation
page read and write
462A000
direct allocation
page read and write
455C000
direct allocation
page read and write
4582000
direct allocation
page read and write
2E60000
heap
page read and write
44B8000
direct allocation
page read and write
401000
unkown
page execute read
287B000
stack
page read and write
4511000
direct allocation
page read and write
453A000
direct allocation
page read and write
44E8000
direct allocation
page read and write
2BEB000
stack
page read and write
2D2C000
stack
page read and write
4398000
direct allocation
page read and write
2930000
heap
page read and write
4546000
direct allocation
page read and write
41CA000
direct allocation
page read and write
45E1000
direct allocation
page read and write
31C0000
heap
page read and write
28BC000
stack
page read and write
2910000
heap
page read and write
4C08000
direct allocation
page read and write
4568000
direct allocation
page read and write
4302000
direct allocation
page read and write
4D1D000
direct allocation
page read and write
4D24000
direct allocation
page read and write
30A8000
direct allocation
page read and write
4650000
heap
page read and write
4C4A000
direct allocation
page read and write
4308000
direct allocation
page read and write
4A66000
direct allocation
page read and write
68F000
stack
page read and write
46D4000
direct allocation
page read and write
4CB0000
heap
page read and write
4C58000
direct allocation
page read and write
4C30000
heap
page read and write
48AF000
direct allocation
page read and write
43EA000
direct allocation
page read and write
2DB0000
heap
page read and write
435F000
direct allocation
page read and write
2E60000
heap
page read and write
311E000
stack
page read and write
46A1000
direct allocation
page read and write
260000
heap
page read and write
4EFC000
direct allocation
page read and write
448B000
direct allocation
page read and write
4D50000
heap
page read and write
2B3C000
stack
page read and write
4B28000
direct allocation
page read and write
4524000
direct allocation
page read and write
2E7F000
stack
page read and write
2FF0000
heap
page read and write
4993000
direct allocation
page read and write
46BF000
direct allocation
page read and write
401000
unkown
page execute read
4EBA000
direct allocation
page read and write
2CE0000
heap
page read and write
4EED000
direct allocation
page read and write
2FD0000
heap
page read and write
4CE2000
direct allocation
page read and write
24A3000
direct allocation
page read and write
499A000
direct allocation
page read and write
4416000
direct allocation
page read and write
249C000
direct allocation
page read and write
2870000
heap
page read and write
2EC0000
heap
page read and write
2E3E000
stack
page read and write
41D8000
direct allocation
page read and write
4374000
direct allocation
page read and write
There are 790 hidden memdumps, click here to show them.