IOC Report
nPSsgqs7aI.dll

loading gif

Files

File Path
Type
Category
Malicious
nPSsgqs7aI.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_4fe5a735f3c962f33a38b504d643f44a7c78b75_7522e4b5_06ff90e2-e6f0-44ef-b625-a2f7a4cbee48\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_4fe5a735f3c962f33a38b504d643f44a7c78b75_7522e4b5_2763e2eb-1d33-43a1-bd9d-45aa672f8944\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_59fcf98f4ce235a4ae89e5da4a4e624a8715c64d_7522e4b5_4c337851-2bf0-4da8-aaf0-4358efc93e59\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER100F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3642.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 29 17:58:14 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER37A9.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 29 17:58:15 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3902.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3980.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER39AE.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER39EE.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF22.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 29 17:58:04 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFC0.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\nPSsgqs7aI.dll,BarCreate
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6512 -s 648
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\nPSsgqs7aI.dll,BarDestroy
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\nPSsgqs7aI.dll,BarFreeRec
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",BarCreate
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",BarDestroy
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",BarFreeRec
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeSetFocus
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeSetDirty
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeResize
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkePaint2
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeKillFocus
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeIsDirty
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeInitialize
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeGetCaretRect
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeFireMouseWheelEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeFireMouseEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeFireKeyUpEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeFireKeyPressEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeFireKeyDownEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeFireContextMenuEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeFinalize
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeDestroyWebView
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeCreateWebView
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",dbkFCallWrapperAddr
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",__dbk_fcall_wrapper
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",TMethodImplementationIntercept
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",BarRecognize
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5480 -s 640
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 528 -s 640
There are 24 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProgramId
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
FileId
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LowerCaseLongPath
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LongPathHash
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Name
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
OriginalFileName
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Publisher
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Version
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinFileVersion
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinaryType
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductName
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductVersion
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LinkDate
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinProductVersion
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageFullName
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageRelativeId
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Size
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Language
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
IsOsComponent
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Usn
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3FE0000
unkown
page readonly
499A000
direct allocation
page read and write
259B000
stack
page read and write
2BA0000
heap
page read and write
510000
unkown
page write copy
4944000
direct allocation
page read and write
434C000
direct allocation
page read and write
4268000
direct allocation
page read and write
4471000
direct allocation
page read and write
45FA000
direct allocation
page read and write
26C000
stack
page read and write
2E3E000
stack
page read and write
2D8F000
stack
page read and write
42C8000
direct allocation
page read and write
4E88000
direct allocation
page read and write
2C7C000
stack
page read and write
323B000
stack
page read and write
2FD0000
heap
page read and write
40F0000
unkown
page write copy
2FB0000
heap
page read and write
2DB0000
heap
page read and write
FB0000
heap
page read and write
4F01000
direct allocation
page read and write
49B6000
direct allocation
page read and write
4958000
direct allocation
page read and write
2E7C000
direct allocation
page read and write
491F000
direct allocation
page read and write
2690000
heap
page read and write
4A3F000
direct allocation
page read and write
4102000
unkown
page readonly
430A000
direct allocation
page read and write
45B1000
direct allocation
page read and write
46F6000
direct allocation
page read and write
3280000
heap
page read and write
4CA0000
heap
page read and write
267C000
stack
page read and write
2DB1000
direct allocation
page read and write
2F2B000
stack
page read and write
2E32000
direct allocation
page read and write
435E000
stack
page read and write
43C8000
direct allocation
page read and write
31FA000
heap
page read and write
4E40000
heap
page read and write
2B00000
heap
page read and write
494A000
direct allocation
page read and write
35CF000
stack
page read and write
492F000
direct allocation
page read and write
2300000
heap
page read and write
4104000
unkown
page readonly
1BB000
stack
page read and write
4B4E000
stack
page read and write
2870000
heap
page read and write
F4C000
stack
page read and write
2E41000
direct allocation
page read and write
33F0000
heap
page read and write
498C000
direct allocation
page read and write
341E000
stack
page read and write
28DD000
direct allocation
page read and write
27BE000
stack
page read and write
4F18000
direct allocation
page read and write
23B0000
heap
page read and write
4A71000
direct allocation
page read and write
424A000
direct allocation
page read and write
433D000
direct allocation
page read and write
41FA000
direct allocation
page read and write
4454000
direct allocation
page read and write
40F1000
unkown
page read and write
EB000
stack
page read and write
2EBC000
stack
page read and write
2F20000
heap
page read and write
277A000
heap
page read and write
2A0E000
stack
page read and write
1FC000
stack
page read and write
3060000
heap
page read and write
49C6000
direct allocation
page read and write
46EF000
direct allocation
page read and write
493C000
direct allocation
page read and write
31D0000
heap
page read and write
2E91000
direct allocation
page read and write
29DE000
stack
page read and write
46D1000
direct allocation
page read and write
35F0000
heap
page read and write
412A000
direct allocation
page read and write
2B40000
heap
page read and write
4503000
direct allocation
page read and write
2D20000
heap
page read and write
2ABB000
stack
page read and write
276C000
stack
page read and write
180E000
stack
page read and write
2E00000
heap
page read and write
4951000
direct allocation
page read and write
4A21000
direct allocation
page read and write
2E30000
heap
page read and write
42B2000
direct allocation
page read and write
30EE000
stack
page read and write
51F000
unkown
page read and write
2FB0000
heap
page read and write
43AC000
direct allocation
page read and write
28EE000
stack
page read and write
27C0000
heap
page read and write
40EF000
unkown
page read and write
230000
heap
page read and write
270C000
stack
page read and write
4E1C000
direct allocation
page read and write
144E000
stack
page read and write
4B92000
direct allocation
page read and write
2DD6000
direct allocation
page read and write
422F000
direct allocation
page read and write
350A000
heap
page read and write
465F000
stack
page read and write
2780000
heap
page read and write
2B8C000
stack
page read and write
2E58000
direct allocation
page read and write
2F3A000
heap
page read and write
33C0000
heap
page read and write
27FF000
stack
page read and write
401000
unkown
page execute read
4801000
direct allocation
page read and write
4E14000
direct allocation
page read and write
4ECA000
direct allocation
page read and write
239C000
stack
page read and write
49EA000
direct allocation
page read and write
420A000
direct allocation
page read and write
42D8000
direct allocation
page read and write
4BA0000
heap
page read and write
3420000
heap
page read and write
35F0000
heap
page read and write
45C8000
direct allocation
page read and write
2D00000
heap
page read and write
4228000
direct allocation
page read and write
2F3C000
stack
page read and write
45E4000
direct allocation
page read and write
2920000
heap
page read and write
48F2000
direct allocation
page read and write
2B4B000
stack
page read and write
3228000
direct allocation
page read and write
28AA000
direct allocation
page read and write
400000
unkown
page readonly
2AEB000
stack
page read and write
299E000
stack
page read and write
2FE0000
heap
page read and write
4396000
direct allocation
page read and write
4311000
direct allocation
page read and write
4362000
direct allocation
page read and write
4173000
direct allocation
page read and write
401000
unkown
page execute read
2FA0000
heap
page read and write
4B42000
direct allocation
page read and write
4E9F000
direct allocation
page read and write
4EC3000
direct allocation
page read and write
43BA000
direct allocation
page read and write
450A000
direct allocation
page read and write
4A4D000
direct allocation
page read and write
4993000
direct allocation
page read and write
27CF000
stack
page read and write
47A2000
direct allocation
page read and write
4991000
direct allocation
page read and write
27E0000
heap
page read and write
2AC0000
heap
page read and write
41EF000
stack
page read and write
2B90000
heap
page read and write
2BB0000
heap
page read and write
47EC000
direct allocation
page read and write
450D000
direct allocation
page read and write
2A60000
heap
page read and write
23F0000
heap
page read and write
2AAE000
stack
page read and write
26E0000
heap
page read and write
3530000
heap
page read and write
2AFB000
stack
page read and write
44E6000
direct allocation
page read and write
42C1000
direct allocation
page read and write
4236000
direct allocation
page read and write
49B8000
direct allocation
page read and write
29D0000
heap
page read and write
4518000
direct allocation
page read and write
4E2A000
direct allocation
page read and write
34BF000
stack
page read and write
51D000
unkown
page read and write
2B2C000
stack
page read and write
2770000
heap
page read and write
4138000
direct allocation
page read and write
2A90000
heap
page read and write
497D000
direct allocation
page read and write
493D000
direct allocation
page read and write
312F000
stack
page read and write
2E7F000
stack
page read and write
2D1B000
stack
page read and write
2BC0000
heap
page read and write
46F0000
heap
page read and write
4A38000
direct allocation
page read and write
4478000
direct allocation
page read and write
2890000
heap
page read and write
521000
unkown
page read and write
4244000
direct allocation
page read and write
50E0000
heap
page read and write
4378000
direct allocation
page read and write
270F000
stack
page read and write
268E000
stack
page read and write
34EE000
stack
page read and write
329F000
stack
page read and write
31DA000
heap
page read and write
4EB4000
direct allocation
page read and write
4AB0000
heap
page read and write
358A000
heap
page read and write
520000
unkown
page write copy
314E000
stack
page read and write
2A4E000
stack
page read and write
2DB8000
direct allocation
page read and write
4911000
direct allocation
page read and write
2A9A000
heap
page read and write
2FF0000
heap
page read and write
27FA000
heap
page read and write
2E30000
heap
page read and write
2E10000
heap
page read and write
2BF0000
heap
page read and write
4984000
direct allocation
page read and write
33A0000
heap
page read and write
4218000
direct allocation
page read and write
2FBA000
heap
page read and write
42FF000
stack
page read and write
415D000
direct allocation
page read and write
31E1000
direct allocation
page read and write
321C000
direct allocation
page read and write
49E0000
heap
page read and write
2B9A000
heap
page read and write
2C3B000
stack
page read and write
494A000
direct allocation
page read and write
286B000
stack
page read and write
230A000
heap
page read and write
4412000
direct allocation
page read and write
42ED000
direct allocation
page read and write
44E1000
direct allocation
page read and write
51F000
unkown
page read and write
511000
unkown
page read and write
49A8000
direct allocation
page read and write
44C8000
direct allocation
page read and write
4538000
direct allocation
page read and write
2E7B000
stack
page read and write
443F000
direct allocation
page read and write
48FA000
direct allocation
page read and write
2DCE000
stack
page read and write
2B60000
heap
page read and write
423D000
direct allocation
page read and write
264D000
stack
page read and write
44F4000
direct allocation
page read and write
4BD4000
direct allocation
page read and write
4226000
direct allocation
page read and write
4601000
direct allocation
page read and write
4506000
direct allocation
page read and write
2910000
heap
page read and write
4961000
direct allocation
page read and write
337F000
stack
page read and write
4860000
heap
page read and write
2AFF000
stack
page read and write
444D000
direct allocation
page read and write
409E000
stack
page read and write
4A10000
heap
page read and write
2E74000
direct allocation
page read and write
4F3C000
direct allocation
page read and write
2FF0000
heap
page read and write
327C000
stack
page read and write
45AA000
direct allocation
page read and write
47B1000
direct allocation
page read and write
31F8000
direct allocation
page read and write
27E0000
heap
page read and write
2CBC000
stack
page read and write
494C000
direct allocation
page read and write
4850000
heap
page read and write
4148000
direct allocation
page read and write
2990000
heap
page read and write
4BC6000
direct allocation
page read and write
2E98000
direct allocation
page read and write
2E7F000
stack
page read and write
4F58000
direct allocation
page read and write
4302000
direct allocation
page read and write
31FF000
direct allocation
page read and write
3214000
direct allocation
page read and write
4BF8000
direct allocation
page read and write
35FA000
heap
page read and write
4208000
direct allocation
page read and write
2A5E000
stack
page read and write
437F000
stack
page read and write
2F6E000
stack
page read and write
28D6000
direct allocation
page read and write
4F4A000
direct allocation
page read and write
490A000
direct allocation
page read and write
27D0000
heap
page read and write
2A3F000
stack
page read and write
4F08000
direct allocation
page read and write
40F5000
unkown
page write copy
21E000
stack
page read and write
524000
unkown
page readonly
27E0000
heap
page read and write
4DFF000
direct allocation
page read and write
4910000
heap
page read and write
518000
unkown
page read and write
43C1000
direct allocation
page read and write
4428000
direct allocation
page read and write
45A2000
direct allocation
page read and write
44ED000
direct allocation
page read and write
4251000
direct allocation
page read and write
4E72000
direct allocation
page read and write
4BA1000
direct allocation
page read and write
42DF000
direct allocation
page read and write
4DE1000
direct allocation
page read and write
2E3A000
direct allocation
page read and write
1A0000
heap
page read and write
46C2000
direct allocation
page read and write
4258000
direct allocation
page read and write
44BA000
direct allocation
page read and write
330E000
stack
page read and write
26F0000
heap
page read and write
4E23000
direct allocation
page read and write
43BE000
stack
page read and write
2FAF000
stack
page read and write
513000
unkown
page write copy
4DDA000
direct allocation
page read and write
190000
heap
page read and write
2FEE000
stack
page read and write
49A1000
direct allocation
page read and write
4998000
direct allocation
page read and write
161F000
heap
page read and write
43FF000
stack
page read and write
4B2F000
stack
page read and write
4514000
direct allocation
page read and write
29D0000
heap
page read and write
28AA000
heap
page read and write
47DE000
stack
page read and write
12FC000
stack
page read and write
4243000
direct allocation
page read and write
4B4A000
direct allocation
page read and write
4328000
direct allocation
page read and write
2D4E000
stack
page read and write
40FF000
unkown
page read and write
28B8000
direct allocation
page read and write
51D000
unkown
page read and write
4610000
heap
page read and write
43B3000
direct allocation
page read and write
524000
unkown
page readonly
4E81000
direct allocation
page read and write
33BE000
stack
page read and write
50F000
unkown
page read and write
481F000
stack
page read and write
285E000
stack
page read and write
421F000
direct allocation
page read and write
45CF000
direct allocation
page read and write
4E0D000
direct allocation
page read and write
272B000
stack
page read and write
4EB4000
direct allocation
page read and write
4523000
direct allocation
page read and write
323D000
direct allocation
page read and write
445C000
direct allocation
page read and write
2D0A000
heap
page read and write
22B000
stack
page read and write
4353000
direct allocation
page read and write
328A000
heap
page read and write
4BE3000
direct allocation
page read and write
4A5C000
direct allocation
page read and write
451C000
direct allocation
page read and write
4ED8000
direct allocation
page read and write
4A54000
direct allocation
page read and write
4B51000
direct allocation
page read and write
49CD000
direct allocation
page read and write
3FCF000
stack
page read and write
291A000
heap
page read and write
2F00000
heap
page read and write
28A0000
heap
page read and write
28A0000
heap
page read and write
2FFA000
heap
page read and write
49F8000
direct allocation
page read and write
4A2F000
stack
page read and write
2B3C000
stack
page read and write
4B7D000
direct allocation
page read and write
4943000
direct allocation
page read and write
424C000
direct allocation
page read and write
2B90000
heap
page read and write
334F000
stack
page read and write
521000
unkown
page read and write
4EA6000
direct allocation
page read and write
26DE000
stack
page read and write
44DA000
direct allocation
page read and write
4908000
direct allocation
page read and write
239C000
stack
page read and write
470C000
direct allocation
page read and write
2990000
heap
page read and write
2B90000
heap
page read and write
48E0000
heap
page read and write
46FD000
direct allocation
page read and write
4D60000
heap
page read and write
49DE000
stack
page read and write
4410000
heap
page read and write
4131000
direct allocation
page read and write
4BDC000
direct allocation
page read and write
27C0000
heap
page read and write
4438000
direct allocation
page read and write
318F000
stack
page read and write
4EFA000
direct allocation
page read and write
4936000
direct allocation
page read and write
46E8000
direct allocation
page read and write
28DB000
stack
page read and write
23D0000
heap
page read and write
31D2000
direct allocation
page read and write
4F43000
direct allocation
page read and write
47B8000
direct allocation
page read and write
441A000
direct allocation
page read and write
4B84000
direct allocation
page read and write
4918000
direct allocation
page read and write
4446000
direct allocation
page read and write
2D0000
heap
page read and write
4B9A000
direct allocation
page read and write
4ECA000
direct allocation
page read and write
2908000
direct allocation
page read and write
2970000
heap
page read and write
4336000
direct allocation
page read and write
4608000
direct allocation
page read and write
2E0F000
stack
page read and write
2F0A000
heap
page read and write
2F6C000
stack
page read and write
1610000
heap
page read and write
4E38000
direct allocation
page read and write
3202000
direct allocation
page read and write
2B00000
heap
page read and write
34A0000
heap
page read and write
520000
unkown
page write copy
2C1E000
stack
page read and write
28C8000
direct allocation
page read and write
4EBC000
direct allocation
page read and write
2920000
heap
page read and write
47C8000
direct allocation
page read and write
4511000
direct allocation
page read and write
49D4000
direct allocation
page read and write
4B6F000
direct allocation
page read and write
4253000
direct allocation
page read and write
2E8E000
stack
page read and write
30AF000
stack
page read and write
461E000
stack
page read and write
2EF0000
heap
page read and write
4976000
direct allocation
page read and write
45EC000
direct allocation
page read and write
270E000
stack
page read and write
2DE000
stack
page read and write
4A78000
direct allocation
page read and write
49A1000
direct allocation
page read and write
49BD000
direct allocation
page read and write
40FD000
unkown
page read and write
28F000
stack
page read and write
4A1A000
direct allocation
page read and write
33BE000
stack
page read and write
2E6D000
direct allocation
page read and write
495A000
direct allocation
page read and write
44E8000
direct allocation
page read and write
4F26000
direct allocation
page read and write
2E5F000
direct allocation
page read and write
2ECA000
heap
page read and write
260A000
heap
page read and write
2B0F000
stack
page read and write
32C0000
heap
page read and write
4421000
direct allocation
page read and write
2BE0000
heap
page read and write
3253000
direct allocation
page read and write
3290000
heap
page read and write
439F000
stack
page read and write
4BBF000
direct allocation
page read and write
4902000
direct allocation
page read and write
310F000
stack
page read and write
47E4000
direct allocation
page read and write
42BE000
stack
page read and write
2B5B000
stack
page read and write
4156000
direct allocation
page read and write
4BEF000
stack
page read and write
304E000
stack
page read and write
2980000
heap
page read and write
4953000
direct allocation
page read and write
2EC0000
heap
page read and write
2A5E000
stack
page read and write
2CD0000
heap
page read and write
4101000
unkown
page read and write
4164000
direct allocation
page read and write
4704000
direct allocation
page read and write
4520000
heap
page read and write
3236000
direct allocation
page read and write
2FE0000
heap
page read and write
2B4A000
heap
page read and write
4EF2000
direct allocation
page read and write
3250000
heap
page read and write
31DA000
direct allocation
page read and write
3206000
direct allocation
page read and write
425A000
direct allocation
page read and write
4E88000
direct allocation
page read and write
3330000
heap
page read and write
43A4000
direct allocation
page read and write
2EE0000
heap
page read and write
417A000
direct allocation
page read and write
4BB8000
direct allocation
page read and write
433E000
stack
page read and write
436A000
direct allocation
page read and write
28AC000
stack
page read and write
423C000
direct allocation
page read and write
452A000
direct allocation
page read and write
47D6000
direct allocation
page read and write
250000
heap
page read and write
3244000
direct allocation
page read and write
4EAD000
direct allocation
page read and write
4EA6000
direct allocation
page read and write
49BF000
direct allocation
page read and write
4344000
direct allocation
page read and write
44F8000
direct allocation
page read and write
435A000
direct allocation
page read and write
28E4000
direct allocation
page read and write
2DCF000
direct allocation
page read and write
4C00000
heap
page read and write
4100000
unkown
page write copy
2EFB000
stack
page read and write
2F3C000
stack
page read and write
235B000
stack
page read and write
2B3E000
stack
page read and write
44D8000
direct allocation
page read and write
330E000
stack
page read and write
2D5F000
stack
page read and write
2BD0000
heap
page read and write
325A000
direct allocation
page read and write
325E000
stack
page read and write
456F000
stack
page read and write
522000
unkown
page readonly
2E3E000
stack
page read and write
4A0B000
direct allocation
page read and write
308F000
stack
page read and write
4958000
direct allocation
page read and write
438F000
direct allocation
page read and write
346F000
stack
page read and write
157E000
stack
page read and write
4E98000
direct allocation
page read and write
4EC3000
direct allocation
page read and write
47CF000
direct allocation
page read and write
2AFC000
stack
page read and write
271F000
stack
page read and write
4951000
direct allocation
page read and write
4A6A000
direct allocation
page read and write
5100000
heap
page read and write
324C000
direct allocation
page read and write
47AA000
direct allocation
page read and write
513000
unkown
page write copy
4E31000
direct allocation
page read and write
291C000
stack
page read and write
2840000
heap
page read and write
2B70000
heap
page read and write
2D60000
heap
page read and write
23A0000
heap
page read and write
28EC000
direct allocation
page read and write
343E000
stack
page read and write
4300000
heap
page read and write
4DE8000
direct allocation
page read and write
4E98000
direct allocation
page read and write
3230000
heap
page read and write
320A000
direct allocation
page read and write
264A000
heap
page read and write
2600000
heap
page read and write
49E3000
direct allocation
page read and write
34A0000
heap
page read and write
3280000
heap
page read and write
30AE000
stack
page read and write
276E000
stack
page read and write
32A0000
heap
page read and write
235B000
stack
page read and write
2E00000
heap
page read and write
277F000
stack
page read and write
312F000
stack
page read and write
4DD2000
direct allocation
page read and write
2FD0000
heap
page read and write
2ADF000
stack
page read and write
4A28000
direct allocation
page read and write
4992000
direct allocation
page read and write
2E3A000
heap
page read and write
2770000
heap
page read and write
432F000
direct allocation
page read and write
320D000
direct allocation
page read and write
4A46000
direct allocation
page read and write
4EAD000
direct allocation
page read and write
4361000
direct allocation
page read and write
498A000
direct allocation
page read and write
277B000
stack
page read and write
4318000
direct allocation
page read and write
499A000
direct allocation
page read and write
522000
unkown
page readonly
23E0000
heap
page read and write
2DAA000
direct allocation
page read and write
351F000
stack
page read and write
25EB000
stack
page read and write
29B0000
heap
page read and write
446A000
direct allocation
page read and write
49A8000
direct allocation
page read and write
4BCD000
direct allocation
page read and write
2DB0000
heap
page read and write
2BA0000
heap
page read and write
400000
unkown
page readonly
27BC000
stack
page read and write
31E8000
direct allocation
page read and write
44B2000
direct allocation
page read and write
4901000
direct allocation
page read and write
4DF8000
direct allocation
page read and write
49DC000
direct allocation
page read and write
288F000
stack
page read and write
416C000
direct allocation
page read and write
2D00000
heap
page read and write
50F000
unkown
page read and write
140E000
stack
page read and write
3280000
heap
page read and write
23E0000
heap
page read and write
2DA2000
direct allocation
page read and write
4ED1000
direct allocation
page read and write
240000
heap
page read and write
4BEA000
direct allocation
page read and write
3211000
direct allocation
page read and write
28FA000
direct allocation
page read and write
4261000
direct allocation
page read and write
27F0000
heap
page read and write
4926000
direct allocation
page read and write
33BF000
stack
page read and write
2DD0000
heap
page read and write
46CA000
direct allocation
page read and write
2910000
heap
page read and write
44FF000
direct allocation
page read and write
2610000
heap
page read and write
2FA0000
heap
page read and write
511000
unkown
page read and write
45F3000
direct allocation
page read and write
3FE1000
unkown
page execute read
233C000
stack
page read and write
4F51000
direct allocation
page read and write
19B000
stack
page read and write
4B9E000
stack
page read and write
46C0000
heap
page read and write
44FC000
direct allocation
page read and write
4531000
direct allocation
page read and write
4918000
direct allocation
page read and write
1DC000
stack
page read and write
2DC8000
direct allocation
page read and write
49F1000
direct allocation
page read and write
4982000
direct allocation
page read and write
4218000
direct allocation
page read and write
44D2000
direct allocation
page read and write
411B000
direct allocation
page read and write
2EFB000
stack
page read and write
2D30000
heap
page read and write
306E000
stack
page read and write
4BF1000
direct allocation
page read and write
47F3000
direct allocation
page read and write
283C000
stack
page read and write
45D6000
direct allocation
page read and write
4F34000
direct allocation
page read and write
492D000
direct allocation
page read and write
45B8000
direct allocation
page read and write
510000
unkown
page write copy
2830000
heap
page read and write
33FF000
stack
page read and write
2A0000
heap
page read and write
4E7A000
direct allocation
page read and write
4EBC000
direct allocation
page read and write
4201000
direct allocation
page read and write
3090000
heap
page read and write
414F000
direct allocation
page read and write
4C80000
heap
page read and write
47FA000
direct allocation
page read and write
4B68000
direct allocation
page read and write
1470000
heap
page read and write
29E0000
heap
page read and write
439D000
direct allocation
page read and write
27D0000
heap
page read and write
2C7B000
stack
page read and write
2ECF000
stack
page read and write
2A6A000
heap
page read and write
2B0A000
heap
page read and write
2E30000
heap
page read and write
4713000
direct allocation
page read and write
28CF000
direct allocation
page read and write
47DD000
direct allocation
page read and write
12C000
stack
page read and write
4E81000
direct allocation
page read and write
4202000
direct allocation
page read and write
44DF000
direct allocation
page read and write
42BA000
direct allocation
page read and write
422D000
direct allocation
page read and write
2E10000
heap
page read and write
260000
heap
page read and write
4463000
direct allocation
page read and write
42E6000
direct allocation
page read and write
4AEE000
stack
page read and write
FC0000
heap
page read and write
4968000
direct allocation
page read and write
2770000
heap
page read and write
3000000
heap
page read and write
291A000
heap
page read and write
2B9C000
stack
page read and write
50C0000
heap
page read and write
2A20000
heap
page read and write
30C0000
heap
page read and write
2EE0000
heap
page read and write
2EB0000
heap
page read and write
2DC0000
heap
page read and write
2DB000
stack
page read and write
2A1F000
stack
page read and write
26CB000
stack
page read and write
28AF000
stack
page read and write
274F000
stack
page read and write
4E72000
direct allocation
page read and write
44C1000
direct allocation
page read and write
2C5F000
stack
page read and write
1627000
heap
page read and write
518000
unkown
page read and write
2ED0000
heap
page read and write
27D0000
heap
page read and write
2640000
heap
page read and write
4E06000
direct allocation
page read and write
4B8F000
stack
page read and write
4540000
heap
page read and write
4371000
direct allocation
page read and write
3580000
heap
page read and write
27BE000
stack
page read and write
4234000
direct allocation
page read and write
263B000
stack
page read and write
5120000
heap
page read and write
28B1000
direct allocation
page read and write
2D5C000
stack
page read and write
2F30000
heap
page read and write
2CE000
stack
page read and write
46D8000
direct allocation
page read and write
45DD000
direct allocation
page read and write
2E48000
direct allocation
page read and write
4E9F000
direct allocation
page read and write
2DAE000
stack
page read and write
3470000
heap
page read and write
2ECF000
stack
page read and write
2E8A000
direct allocation
page read and write
40F6000
unkown
page read and write
27FE000
stack
page read and write
3190000
heap
page read and write
49A8000
direct allocation
page read and write
3218000
direct allocation
page read and write
4808000
direct allocation
page read and write
28E0000
heap
page read and write
2BBF000
stack
page read and write
2901000
direct allocation
page read and write
4211000
direct allocation
page read and write
161B000
heap
page read and write
284E000
stack
page read and write
2B7E000
stack
page read and write
2A90000
heap
page read and write
4B58000
direct allocation
page read and write
4ED1000
direct allocation
page read and write
322F000
direct allocation
page read and write
4368000
direct allocation
page read and write
4E7A000
direct allocation
page read and write
352F000
stack
page read and write
4BA8000
direct allocation
page read and write
4B76000
direct allocation
page read and write
3268000
direct allocation
page read and write
28F3000
direct allocation
page read and write
260000
heap
page read and write
31F0000
heap
page read and write
3500000
heap
page read and write
2910000
heap
page read and write
4928000
direct allocation
page read and write
3261000
direct allocation
page read and write
41F2000
direct allocation
page read and write
496F000
direct allocation
page read and write
4934000
direct allocation
page read and write
49AF000
direct allocation
page read and write
2E83000
direct allocation
page read and write
25DC000
stack
page read and write
4181000
direct allocation
page read and write
4A63000
direct allocation
page read and write
4188000
direct allocation
page read and write
270000
heap
page read and write
2E66000
direct allocation
page read and write
4F2D000
direct allocation
page read and write
4510000
heap
page read and write
30EE000
stack
page read and write
4B00000
heap
page read and write
2FB0000
heap
page read and write
28A2000
direct allocation
page read and write
4968000
direct allocation
page read and write
34DE000
stack
page read and write
2EBA000
heap
page read and write
40DF000
stack
page read and write
4930000
heap
page read and write
2E3A000
heap
page read and write
263E000
stack
page read and write
405F000
stack
page read and write
29A0000
heap
page read and write
4388000
direct allocation
page read and write
4942000
direct allocation
page read and write
2D0000
heap
page read and write
4F1F000
direct allocation
page read and write
There are 784 hidden memdumps, click here to show them.