IOC Report
2.dll

loading gif

Files

File Path
Type
Category
Malicious
2.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_53e1308958a019487894c36c9c40509d90c1f14e_7522e4b5_b757a58f-6c36-49f5-a16f-63f452ac5681\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_53e1308958a019487894c36c9c40509d90c1f14e_7522e4b5_be529bbd-7f5d-4324-97d9-3e45dca62056\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_831687f7f7938eade7f77ba4ef88496c08766ae_7522e4b5_55440433-290a-4c4a-ba07-bb7dc2e976b8\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_831687f7f7938eade7f77ba4ef88496c08766ae_7522e4b5_72529658-55d3-476e-830d-f70c28ef646f\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_831687f7f7938eade7f77ba4ef88496c08766ae_7522e4b5_ad73f3d2-a52d-4cb4-8262-3cdedee6766d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2A2E.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 3 01:30:13 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2DB9.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2E57.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER774F.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 3 01:31:38 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER781C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER783C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8975.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 3 01:30:37 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8C25.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8D6E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA005.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 3 01:31:48 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA1BC.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA1DC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE541.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 3 01:31:01 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE6E8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE756.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\2.dll"
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\2.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\2.dll,TMethodImplementationIntercept
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\2.dll,__dbk_fcall_wrapper
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\2.dll,dbkFCallWrapperAddr
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\2.dll",TMethodImplementationIntercept
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\2.dll",__dbk_fcall_wrapper
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\2.dll",dbkFCallWrapperAddr
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\2.dll",el60p89r7qlkly4p9bfqh7
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\2.dll",#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7744 -s 700
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 8092 -s 696
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 8020 -s 696
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7736 -s 704
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 8076 -s 696
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.borland.com/namespaces/Types-IWSDLPublish
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf
unknown
http://tools.ietf.org/html/rfc1321
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://www.borland.com/rootpart.xml
unknown
http://www.schneier.com/paper-blowfish-fse.htmlS
unknown
http://tempuri.org/
unknown
http://upx.sf.net
unknown
http://csrc.nist.gov/publications/drafts/800-67-rev1/SP-800-67-rev1-2_July-2011.pdfS
unknown
http://www.indyproject.org/
unknown
http://tools.ietf.org/html/rfc4648S
unknown
http://www.borland.com/namespaces/Types-IAppServerSOAPq
unknown
http://schemas.xmlsoap.org/wsdl/soap12/SV
unknown
http://www.itl.nist.gov/fipspubs/fip180-1.htm
unknown
http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdfS
unknown
http://schemas.xmlsoap.org/wsdl/soap/
unknown
http://www.borland.com/namespaces/TypesA
unknown
http://www.borland.com/namespaces/Types-IAppServerSOAP
unknown
http://www.movable-type.co.uk/scripts/xxtea.pdfS
unknown
http://www.borland.com/namespaces/Types
unknown
http://schemas.xmlsoap.org/soap/http
unknown
http://schemas.xmlsoap.org/wsdl/soap/#
unknown
http://www.schneier.com/paper-twofish-paper.pdfS
unknown
http://schemas.xmlsoap.org/wsdl/http/
unknown
http://tempuri.org/U
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://csrc.nist.gov/publications/drafts/fips180-4/Draft-FIPS180-4_Feb2011.pdfU
unknown
http://www.componentace.com
unknown
http://schemas.xmlsoap.org/wsdl/mime/
unknown
http://www.borland.com/namespaces/Types-IAppServerSOAPU
unknown
http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdfS
unknown
http://www.borland.com/namespaces/Typesa
unknown
http://www.ietf.org/rfc/rfc3447.txtS
unknown
There are 24 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
\REGISTRY\A\{ef55a1ca-4cae-347c-3790-1e9f684c9128}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProgramId
\REGISTRY\A\{ef55a1ca-4cae-347c-3790-1e9f684c9128}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
FileId
\REGISTRY\A\{ef55a1ca-4cae-347c-3790-1e9f684c9128}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LowerCaseLongPath
\REGISTRY\A\{ef55a1ca-4cae-347c-3790-1e9f684c9128}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LongPathHash
\REGISTRY\A\{ef55a1ca-4cae-347c-3790-1e9f684c9128}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Name
\REGISTRY\A\{ef55a1ca-4cae-347c-3790-1e9f684c9128}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
OriginalFileName
\REGISTRY\A\{ef55a1ca-4cae-347c-3790-1e9f684c9128}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Publisher
\REGISTRY\A\{ef55a1ca-4cae-347c-3790-1e9f684c9128}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Version
\REGISTRY\A\{ef55a1ca-4cae-347c-3790-1e9f684c9128}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinFileVersion
\REGISTRY\A\{ef55a1ca-4cae-347c-3790-1e9f684c9128}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinaryType
\REGISTRY\A\{ef55a1ca-4cae-347c-3790-1e9f684c9128}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductName
\REGISTRY\A\{ef55a1ca-4cae-347c-3790-1e9f684c9128}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductVersion
\REGISTRY\A\{ef55a1ca-4cae-347c-3790-1e9f684c9128}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LinkDate
\REGISTRY\A\{ef55a1ca-4cae-347c-3790-1e9f684c9128}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinProductVersion
\REGISTRY\A\{ef55a1ca-4cae-347c-3790-1e9f684c9128}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageFullName
\REGISTRY\A\{ef55a1ca-4cae-347c-3790-1e9f684c9128}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageRelativeId
\REGISTRY\A\{ef55a1ca-4cae-347c-3790-1e9f684c9128}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Size
\REGISTRY\A\{ef55a1ca-4cae-347c-3790-1e9f684c9128}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Language
\REGISTRY\A\{ef55a1ca-4cae-347c-3790-1e9f684c9128}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
IsOsComponent
\REGISTRY\A\{ef55a1ca-4cae-347c-3790-1e9f684c9128}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00B8FA4A2E4
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
48AC000
unkown
page write copy
60F2000
direct allocation
page read and write
6288000
direct allocation
page read and write
5D06000
direct allocation
page read and write
7F4000
heap
page read and write
4D4F000
unkown
page read and write
4771000
unkown
page read and write
4F4000
heap
page read and write
384000
heap
page read and write
7F4000
heap
page read and write
9C0000
heap
page read and write
6071000
heap
page read and write
633A000
direct allocation
page read and write
3C21000
heap
page read and write
3370000
heap
page read and write
384000
heap
page read and write
2F8B000
stack
page read and write
6996000
direct allocation
page read and write
D04000
heap
page read and write
69C1000
direct allocation
page read and write
2DF0000
heap
page read and write
6143000
direct allocation
page read and write
33E4000
heap
page read and write
384000
heap
page read and write
BC4000
heap
page read and write
64DE000
stack
page read and write
384000
heap
page read and write
3C21000
heap
page read and write
4F0000
heap
page read and write
6927000
direct allocation
page read and write
346F000
stack
page read and write
2590000
heap
page read and write
4F4000
heap
page read and write
7F4000
heap
page read and write
6962000
direct allocation
page read and write
60D4000
direct allocation
page read and write
384000
heap
page read and write
33E4000
heap
page read and write
4904000
unkown
page execute read
3310000
heap
page read and write
5D2B000
direct allocation
page read and write
62AD000
direct allocation
page read and write
5D1D000
direct allocation
page read and write
60F000
stack
page read and write
4390000
unkown
page readonly
3C21000
heap
page read and write
D04000
heap
page read and write
2FC0000
heap
page read and write
C6E000
stack
page read and write
8D4000
heap
page read and write
9A4000
heap
page read and write
8D4000
heap
page read and write
5BD0000
heap
page read and write
B70000
trusted library allocation
page read and write
7F4000
heap
page read and write
9A4000
heap
page read and write
3C21000
heap
page read and write
8D4000
heap
page read and write
629F000
direct allocation
page read and write
6521000
heap
page read and write
BC4000
heap
page read and write
5D60000
direct allocation
page read and write
D04000
heap
page read and write
5D84000
direct allocation
page read and write
6246000
direct allocation
page read and write
5157000
unkown
page read and write
6521000
heap
page read and write
33E4000
heap
page read and write
623F000
direct allocation
page read and write
6071000
heap
page read and write
9D0000
heap
page read and write
BC0000
heap
page read and write
472A000
unkown
page write copy
BC4000
heap
page read and write
5B61000
heap
page read and write
97A000
heap
page read and write
33E4000
heap
page read and write
2FB4000
heap
page read and write
8D4000
heap
page read and write
651F000
stack
page read and write
5B61000
heap
page read and write
5FB1000
heap
page read and write
5191000
unkown
page read and write
625D000
direct allocation
page read and write
4F4000
heap
page read and write
5CE2000
direct allocation
page read and write
CC1000
heap
page read and write
5D7C000
direct allocation
page read and write
31B000
stack
page read and write
730000
heap
page read and write
8D4000
heap
page read and write
3C21000
heap
page read and write
67C6000
direct allocation
page read and write
5EDE000
stack
page read and write
7F4000
heap
page read and write
D04000
heap
page read and write
6521000
heap
page read and write
7F4000
heap
page read and write
33E4000
heap
page read and write
6710000
heap
page read and write
6858000
direct allocation
page read and write
6108000
direct allocation
page read and write
5AAB000
direct allocation
page read and write
BC0000
heap
page read and write
B00000
direct allocation
page execute and read and write
91A000
heap
page read and write
6EA000
heap
page read and write
6791000
heap
page read and write
5190000
unkown
page write copy
2FB4000
heap
page read and write
67F2000
direct allocation
page read and write
679B000
direct allocation
page read and write
5679000
unkown
page execute read
60C6000
direct allocation
page read and write
4830000
unkown
page readonly
DC0000
heap
page read and write
5FB2000
heap
page read and write
2E80000
trusted library allocation
page read and write
8D4000
heap
page read and write
696A000
direct allocation
page read and write
5228000
unkown
page read and write
342E000
stack
page read and write
CC1000
heap
page read and write
5FC7000
unkown
page readonly
6978000
direct allocation
page read and write
5AE0000
direct allocation
page execute and read and write
6282000
direct allocation
page read and write
514B000
unkown
page read and write
2F0B000
stack
page read and write
A60000
heap
page read and write
2FB4000
heap
page read and write
9A4000
heap
page read and write
4CFE000
unkown
page write copy
6843000
direct allocation
page read and write
D04000
heap
page read and write
3DC0000
direct allocation
page read and write
B90000
heap
page read and write
683C000
direct allocation
page read and write
4F4000
heap
page read and write
3C21000
heap
page read and write
2DF1000
heap
page read and write
621B000
direct allocation
page read and write
5D6F000
direct allocation
page read and write
4729000
unkown
page read and write
2DF1000
heap
page read and write
B60000
direct allocation
page execute and read and write
C20000
heap
page read and write
5BD1000
heap
page read and write
4CFC000
unkown
page write copy
5AB2000
direct allocation
page read and write
2FB4000
heap
page read and write
5138000
unkown
page write copy
960000
heap
page read and write
7F4000
heap
page read and write
6791000
heap
page read and write
4BB000
stack
page read and write
D04000
heap
page read and write
5BD1000
heap
page read and write
5F1F000
stack
page read and write
6954000
direct allocation
page read and write
5D98000
direct allocation
page read and write
3D20000
heap
page read and write
4F4000
heap
page read and write
3EE000
stack
page read and write
5EE000
stack
page read and write
3E44000
direct allocation
page read and write
67BF000
direct allocation
page read and write
5F77000
unkown
page readonly
7F4000
heap
page read and write
3DDD000
direct allocation
page read and write
33E4000
heap
page read and write
B70000
trusted library allocation
page read and write
6590000
heap
page read and write
6BA0000
heap
page read and write
4F4000
heap
page read and write
4D59000
unkown
page read and write
5149000
unkown
page read and write
6281000
direct allocation
page read and write
62F8000
direct allocation
page read and write
6E0000
heap
page read and write
D20000
trusted library allocation
page read and write
D04000
heap
page read and write
6780000
heap
page read and write
75F000
heap
page read and write
48CD000
unkown
page read and write
2DF1000
heap
page read and write
750000
heap
page read and write
627B000
direct allocation
page read and write
8D4000
heap
page read and write
75B000
heap
page read and write
6333000
direct allocation
page read and write
4D23000
unkown
page readonly
4742000
unkown
page read and write
2F90000
heap
page read and write
4F4000
heap
page read and write
4F4000
heap
page read and write
5FB1000
heap
page read and write
4D07000
unkown
page write copy
5E08000
direct allocation
page read and write
B40000
heap
page read and write
6B0000
heap
page read and write
4D51000
unkown
page read and write
4DA1000
unkown
page read and write
384000
heap
page read and write
2F80000
heap
page read and write
D04000
heap
page read and write
931000
heap
page read and write
3C21000
heap
page read and write
5141000
unkown
page write copy
C6E000
stack
page read and write
4D4C000
unkown
page write copy
9A4000
heap
page read and write
5D91000
direct allocation
page read and write
2FB4000
heap
page read and write
4F4000
heap
page read and write
3DA2000
direct allocation
page read and write
6092000
direct allocation
page read and write
D04000
heap
page read and write
3390000
direct allocation
page execute and read and write
3C21000
heap
page read and write
CC1000
heap
page read and write
8D4000
heap
page read and write
5997000
unkown
page readonly
5D14000
direct allocation
page read and write
48A8000
unkown
page write copy
62C4000
direct allocation
page read and write
97B000
stack
page read and write
5FB1000
heap
page read and write
48BA000
unkown
page write copy
90B000
stack
page read and write
3C21000
heap
page read and write
47E0000
unkown
page readonly
353A000
heap
page read and write
60BF000
direct allocation
page read and write
5E01000
direct allocation
page read and write
631D000
direct allocation
page read and write
5139000
unkown
page read and write
5B61000
heap
page read and write
62AF000
direct allocation
page read and write
6791000
heap
page read and write
515D000
unkown
page read and write
33E4000
heap
page read and write
4D6D000
unkown
page read and write
D00000
heap
page read and write
33E4000
heap
page read and write
B40000
heap
page read and write
384000
heap
page read and write
8D4000
heap
page read and write
60B0000
direct allocation
page read and write
4D22000
unkown
page read and write
3DB2000
direct allocation
page read and write
BC4000
heap
page read and write
3C21000
heap
page read and write
471E000
unkown
page write copy
6620000
trusted library allocation
page read and write
6134000
direct allocation
page read and write
991000
heap
page read and write
8D4000
heap
page read and write
47E1000
unkown
page execute read
669F000
stack
page read and write
CC1000
heap
page read and write
612D000
direct allocation
page read and write
6936000
direct allocation
page read and write
6341000
direct allocation
page read and write
8D4000
heap
page read and write
2FB4000
heap
page read and write
9A4000
heap
page read and write
3A0000
heap
page read and write
BC4000
heap
page read and write
7F4000
heap
page read and write
6988000
direct allocation
page read and write
4F4000
heap
page read and write
D04000
heap
page read and write
7F4000
heap
page read and write
AB0000
trusted library allocation
page read and write
5099000
unkown
page execute read
518E000
unkown
page read and write
384000
heap
page read and write
6521000
heap
page read and write
67EB000
direct allocation
page read and write
6521000
heap
page read and write
4717000
unkown
page read and write
6126000
direct allocation
page read and write
D04000
heap
page read and write
5AB8000
unkown
page read and write
3C21000
heap
page read and write
91F000
stack
page read and write
4D40000
unkown
page execute read
3C00000
heap
page read and write
384000
heap
page read and write
62A6000
direct allocation
page read and write
695B000
direct allocation
page read and write
630F000
direct allocation
page read and write
D04000
heap
page read and write
5147000
unkown
page write copy
76D000
heap
page read and write
AE0000
heap
page read and write
8D4000
heap
page read and write
3C21000
heap
page read and write
628B000
direct allocation
page read and write
384000
heap
page read and write
62CA000
direct allocation
page read and write
6A0000
heap
page read and write
4D0B000
unkown
page read and write
5D32000
direct allocation
page read and write
4F4000
heap
page read and write
513E000
unkown
page write copy
33E4000
heap
page read and write
BC4000
heap
page read and write
3DFB000
direct allocation
page read and write
513D000
unkown
page read and write
665E000
stack
page read and write
690B000
direct allocation
page read and write
6190000
heap
page read and write
4FC000
stack
page read and write
5098000
unkown
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
8D4000
heap
page read and write
4CF8000
unkown
page write copy
5D7D000
direct allocation
page read and write
60CD000
direct allocation
page read and write
48B9000
unkown
page read and write
62EA000
direct allocation
page read and write
384000
heap
page read and write
6118000
direct allocation
page read and write
64E000
stack
page read and write
5CCB000
direct allocation
page read and write
3C20000
heap
page read and write
682D000
direct allocation
page read and write
9BC000
stack
page read and write
5CF7000
direct allocation
page read and write
62A7000
direct allocation
page read and write
5D5F000
direct allocation
page read and write
5FA0000
heap
page read and write
6791000
heap
page read and write
6971000
direct allocation
page read and write
2FB4000
heap
page read and write
4743000
unkown
page readonly
34FF000
stack
page read and write
7BB000
stack
page read and write
5BD1000
heap
page read and write
D10000
heap
page read and write
5D74000
direct allocation
page read and write
6791000
heap
page read and write
67D4000
direct allocation
page read and write
5DEC000
direct allocation
page read and write
8D4000
heap
page read and write
4D51000
unkown
page write copy
3C21000
heap
page read and write
5B40000
heap
page read and write
3D9B000
direct allocation
page read and write
62DB000
direct allocation
page read and write
BC4000
heap
page read and write
7F4000
heap
page read and write
BC4000
heap
page read and write
620B000
direct allocation
page read and write
5CFF000
direct allocation
page read and write
7F4000
heap
page read and write
5D52000
direct allocation
page read and write
5FB1000
heap
page read and write
9A4000
heap
page read and write
4D17000
unkown
page read and write
684A000
direct allocation
page read and write
D04000
heap
page read and write
2FB4000
heap
page read and write
4D72000
unkown
page read and write
3DC7000
direct allocation
page read and write
471D000
unkown
page read and write
7F4000
heap
page read and write
6826000
direct allocation
page read and write
5F30000
heap
page read and write
33E0000
heap
page read and write
33E4000
heap
page read and write
4722000
unkown
page read and write
7F4000
heap
page read and write
4D47000
unkown
page read and write
2DF1000
heap
page read and write
4CFF000
unkown
page read and write
CA1000
heap
page read and write
6792000
direct allocation
page read and write
62CD000
direct allocation
page read and write
6520000
heap
page read and write
6791000
heap
page read and write
5DFA000
direct allocation
page read and write
692F000
direct allocation
page read and write
9A4000
heap
page read and write
7F4000
heap
page read and write
5DA2000
direct allocation
page read and write
34BE000
stack
page read and write
2FB0000
heap
page read and write
384000
heap
page read and write
3C21000
heap
page read and write
4F4000
heap
page read and write
BC4000
heap
page read and write
CC1000
heap
page read and write
4F4000
heap
page read and write
7F4000
heap
page read and write
CB0000
heap
page read and write
3C21000
heap
page read and write
624D000
direct allocation
page read and write
5D48000
direct allocation
page read and write
9A4000
heap
page read and write
3E0A000
direct allocation
page read and write
9A4000
heap
page read and write
5D41000
direct allocation
page read and write
D04000
heap
page read and write
5FB1000
heap
page read and write
626B000
direct allocation
page read and write
6230000
direct allocation
page read and write
513C000
unkown
page write copy
2FB4000
heap
page read and write
2EE0000
direct allocation
page execute and read and write
33E4000
heap
page read and write
5137000
unkown
page read and write
4C21000
unkown
page execute read
2FB4000
heap
page read and write
5CF0000
direct allocation
page read and write
D04000
heap
page read and write
632C000
direct allocation
page read and write
5FB1000
heap
page read and write
9A4000
heap
page read and write
5AC0000
trusted library allocation
page read and write
609B000
direct allocation
page read and write
6521000
heap
page read and write
2FCC000
stack
page read and write
4CF0000
unkown
page execute read
6070000
heap
page read and write
3E53000
direct allocation
page read and write
4D9E000
unkown
page read and write
4719000
unkown
page read and write
D04000
heap
page read and write
3C21000
heap
page read and write
2ED0000
heap
page read and write
5B61000
heap
page read and write
48B2000
unkown
page read and write
5D8A000
direct allocation
page read and write
5D9B000
direct allocation
page read and write
5B27000
unkown
page readonly
67A2000
direct allocation
page read and write
5B60000
heap
page read and write
2FB4000
heap
page read and write
3C21000
heap
page read and write
3C21000
heap
page read and write
5E10000
heap
page read and write
BC4000
heap
page read and write
33E4000
heap
page read and write
6521000
heap
page read and write
7F4000
heap
page read and write
4901000
unkown
page read and write
6790000
heap
page read and write
3E4C000
direct allocation
page read and write
73E000
stack
page read and write
63E0000
heap
page read and write
6521000
heap
page read and write
5FB1000
heap
page read and write
48AD000
unkown
page read and write
4F4000
heap
page read and write
2FB4000
heap
page read and write
6237000
direct allocation
page read and write
2E3E000
stack
page read and write
698F000
direct allocation
page read and write
48B1000
unkown
page write copy
4D5B000
unkown
page read and write
513F000
unkown
page read and write
4D6E000
unkown
page write copy
67B0000
direct allocation
page read and write
5BD1000
heap
page read and write
5FB1000
heap
page read and write
63B7000
unkown
page readonly
67DD000
direct allocation
page read and write
5BD1000
heap
page read and write
6791000
heap
page read and write
4391000
unkown
page execute read
9A4000
heap
page read and write
94C000
stack
page read and write
613C000
direct allocation
page read and write
3230000
heap
page read and write
8D4000
heap
page read and write
BC4000
heap
page read and write
8D4000
heap
page read and write
D04000
heap
page read and write
3C21000
heap
page read and write
5ABF000
stack
page read and write
5F20000
trusted library allocation
page read and write
3C21000
heap
page read and write
4F4000
heap
page read and write
7C0000
heap
page read and write
4CFD000
unkown
page read and write
514A000
unkown
page write copy
910000
heap
page read and write
5D66000
direct allocation
page read and write
68FB000
direct allocation
page read and write
2FB4000
heap
page read and write
62B4000
direct allocation
page read and write
9A4000
heap
page read and write
6791000
heap
page read and write
62BD000
direct allocation
page read and write
515E000
unkown
page write copy
7F4000
heap
page read and write
5DDD000
direct allocation
page read and write
48BB000
unkown
page read and write
3C21000
heap
page read and write
6298000
direct allocation
page read and write
5AB9000
unkown
page execute read
3C21000
heap
page read and write
C80000
heap
page read and write
D04000
heap
page read and write
60FA000
direct allocation
page read and write
471F000
unkown
page read and write
6071000
heap
page read and write
69B3000
direct allocation
page read and write
CCF000
stack
page read and write
AAF000
stack
page read and write
384000
heap
page read and write
6222000
direct allocation
page read and write
678B000
direct allocation
page read and write
62F1000
direct allocation
page read and write
9A4000
heap
page read and write
BC4000
heap
page read and write
D5F000
stack
page read and write
775000
heap
page read and write
384000
heap
page read and write
3E11000
direct allocation
page read and write
4D54000
unkown
page execute read
5D6D000
direct allocation
page read and write
C8A000
heap
page read and write
BC0000
heap
page read and write
CC1000
heap
page read and write
5B61000
heap
page read and write
5D94000
direct allocation
page read and write
3470000
trusted library allocation
page read and write
970000
heap
page read and write
62B6000
direct allocation
page read and write
6071000
heap
page read and write
2DF1000
heap
page read and write
90F000
stack
page read and write
384000
heap
page read and write
BC4000
heap
page read and write
3C21000
heap
page read and write
6264000
direct allocation
page read and write
2FB4000
heap
page read and write
6902000
direct allocation
page read and write
384000
heap
page read and write
5BD1000
heap
page read and write
3C21000
heap
page read and write
380000
heap
page read and write
7F4000
heap
page read and write
DCF000
stack
page read and write
4D02000
unkown
page read and write
48D5000
unkown
page execute read
4DA4000
unkown
page execute read
62D4000
direct allocation
page read and write
3E68000
direct allocation
page read and write
2FB4000
heap
page read and write
5B61000
heap
page read and write
7F4000
heap
page read and write
2F4C000
stack
page read and write
BC4000
heap
page read and write
2DF1000
heap
page read and write
33E4000
heap
page read and write
3E36000
direct allocation
page read and write
6212000
direct allocation
page read and write
5CDB000
direct allocation
page read and write
4D1E000
unkown
page write copy
4D73000
unkown
page readonly
9A4000
heap
page read and write
4737000
unkown
page read and write
2DF1000
heap
page read and write
5FB1000
heap
page read and write
D04000
heap
page read and write
5BD1000
heap
page read and write
8D4000
heap
page read and write
1CC000
stack
page read and write
BC4000
heap
page read and write
6834000
direct allocation
page read and write
627A000
direct allocation
page read and write
7BE000
stack
page read and write
2EB0000
heap
page read and write
33E4000
heap
page read and write
2FB4000
heap
page read and write
5D42000
direct allocation
page read and write
BC4000
heap
page read and write
2F40000
heap
page read and write
4F4000
heap
page read and write
4F4000
heap
page read and write
6791000
heap
page read and write
67B7000
direct allocation
page read and write
8D4000
heap
page read and write
3250000
heap
page read and write
8D4000
heap
page read and write
3E3D000
direct allocation
page read and write
5D83000
direct allocation
page read and write
2FB4000
heap
page read and write
7F4000
heap
page read and write
6071000
heap
page read and write
2E7F000
stack
page read and write
3DF4000
direct allocation
page read and write
67FA000
direct allocation
page read and write
4D1D000
unkown
page read and write
6316000
direct allocation
page read and write
33E4000
heap
page read and write
7F4000
heap
page read and write
384000
heap
page read and write
D04000
heap
page read and write
95E000
stack
page read and write
3390000
trusted library allocation
page read and write
3DD6000
direct allocation
page read and write
6CC000
stack
page read and write
6071000
heap
page read and write
473E000
unkown
page write copy
D04000
heap
page read and write
6851000
direct allocation
page read and write
6200000
heap
page read and write
3DCF000
direct allocation
page read and write
6521000
heap
page read and write
3C10000
heap
page read and write
5D3B000
direct allocation
page read and write
5163000
unkown
page readonly
9A4000
heap
page read and write
384000
heap
page read and write
384000
heap
page read and write
4F4000
heap
page read and write
D10000
heap
page read and write
440000
heap
page read and write
5DB8000
direct allocation
page read and write
3C21000
heap
page read and write
2F4A000
heap
page read and write
4D49000
unkown
page read and write
5D8D000
direct allocation
page read and write
5194000
unkown
page execute read
6292000
direct allocation
page read and write
384000
heap
page read and write
4721000
unkown
page write copy
4200000
unkown
page readonly
CC1000
heap
page read and write
6521000
heap
page read and write
2FB4000
heap
page read and write
68F000
stack
page read and write
5F50000
direct allocation
page execute and read and write
69A4000
direct allocation
page read and write
6101000
direct allocation
page read and write
5DAA000
direct allocation
page read and write
4D48000
unkown
page write copy
2DF1000
heap
page read and write
4831000
unkown
page execute read
611F000
direct allocation
page read and write
9A4000
heap
page read and write
384000
heap
page read and write
384000
heap
page read and write
5DD6000
direct allocation
page read and write
8D4000
heap
page read and write
3D30000
trusted library allocation
page read and write
4727000
unkown
page write copy
5B61000
heap
page read and write
33E4000
heap
page read and write
326A000
heap
page read and write
4D09000
unkown
page read and write
62A0000
direct allocation
page read and write
5B50000
heap
page read and write
BC4000
heap
page read and write
4D67000
unkown
page read and write
4770000
unkown
page write copy
4F4000
heap
page read and write
8D4000
heap
page read and write
7F4000
heap
page read and write
6912000
direct allocation
page read and write
CC0000
heap
page read and write
3E18000
direct allocation
page read and write
4D25000
unkown
page execute read
4CF9000
unkown
page read and write
48C7000
unkown
page read and write
7F4000
heap
page read and write
5FB1000
heap
page read and write
C80000
heap
page read and write
67E4000
direct allocation
page read and write
33E4000
heap
page read and write
5BD1000
heap
page read and write
9A4000
heap
page read and write
67CD000
direct allocation
page read and write
9A4000
heap
page read and write
384000
heap
page read and write
4F4000
heap
page read and write
62C3000
direct allocation
page read and write
33E4000
heap
page read and write
6151000
direct allocation
page read and write
5B61000
heap
page read and write
4F4000
heap
page read and write
8D4000
heap
page read and write
2FB4000
heap
page read and write
BC4000
heap
page read and write
D04000
heap
page read and write
560000
heap
page read and write
C20000
heap
page read and write
48B7000
unkown
page write copy
6324000
direct allocation
page read and write
2F9A000
heap
page read and write
699D000
direct allocation
page read and write
4D50000
unkown
page write copy
5D3A000
direct allocation
page read and write
5ABB000
direct allocation
page read and write
BB0000
heap
page read and write
60B7000
direct allocation
page read and write
5FB1000
heap
page read and write
2DF1000
heap
page read and write
48A7000
unkown
page read and write
D04000
heap
page read and write
5678000
unkown
page read and write
33E4000
heap
page read and write
BC4000
heap
page read and write
693D000
direct allocation
page read and write
2FB4000
heap
page read and write
5B61000
heap
page read and write
CC1000
heap
page read and write
3C21000
heap
page read and write
3520000
heap
page read and write
33E4000
heap
page read and write
48AE000
unkown
page write copy
3E5A000
direct allocation
page read and write
3E02000
direct allocation
page read and write
6808000
direct allocation
page read and write
6272000
direct allocation
page read and write
6071000
heap
page read and write
BC4000
heap
page read and write
BC4000
heap
page read and write
384000
heap
page read and write
7FC000
stack
page read and write
2FB4000
heap
page read and write
4CF7000
unkown
page read and write
48A9000
unkown
page read and write
614A000
direct allocation
page read and write
BC4000
heap
page read and write
3E28000
direct allocation
page read and write
5DCF000
direct allocation
page read and write
4745000
unkown
page execute read
6AF0000
heap
page read and write
5AC0000
heap
page read and write
471C000
unkown
page write copy
608B000
direct allocation
page read and write
6920000
direct allocation
page read and write
CC1000
heap
page read and write
B20000
trusted library allocation
page read and write
56C8000
unkown
page read and write
A1F000
stack
page read and write
3E2F000
direct allocation
page read and write
681F000
direct allocation
page read and write
4BD0000
direct allocation
page execute and read and write
9A4000
heap
page read and write
5BD1000
heap
page read and write
5CD2000
direct allocation
page read and write
4D57000
unkown
page write copy
60E4000
direct allocation
page read and write
4201000
unkown
page execute read
2DF1000
heap
page read and write
48FE000
unkown
page read and write
D04000
heap
page read and write
2FB4000
heap
page read and write
9A4000
heap
page read and write
62D8000
direct allocation
page read and write
62E2000
direct allocation
page read and write
33E4000
heap
page read and write
4718000
unkown
page write copy
6158000
direct allocation
page read and write
5BD1000
heap
page read and write
5DF3000
direct allocation
page read and write
48CE000
unkown
page write copy
5162000
unkown
page read and write
CC1000
heap
page read and write
D04000
heap
page read and write
8D4000
heap
page read and write
9A0000
heap
page read and write
4F4000
heap
page read and write
69BA000
direct allocation
page read and write
430000
heap
page read and write
3DAB000
direct allocation
page read and write
384000
heap
page read and write
7F4000
heap
page read and write
5A7E000
stack
page read and write
5DB1000
direct allocation
page read and write
5130000
unkown
page execute read
4710000
unkown
page execute read
5DE4000
direct allocation
page read and write
3E61000
direct allocation
page read and write
5B61000
heap
page read and write
6071000
heap
page read and write
60DD000
direct allocation
page read and write
BD0000
direct allocation
page execute and read and write
9A4000
heap
page read and write
4D4E000
unkown
page read and write
62BC000
direct allocation
page read and write
33E4000
heap
page read and write
8D4000
heap
page read and write
4D01000
unkown
page write copy
D04000
heap
page read and write
390000
heap
page read and write
33E4000
heap
page read and write
2FB4000
heap
page read and write
6FC000
stack
page read and write
384000
heap
page read and write
4D52000
unkown
page read and write
9A4000
heap
page read and write
56C9000
unkown
page execute read
9A4000
heap
page read and write
6792000
heap
page read and write
3C22000
heap
page read and write
5FB1000
heap
page read and write
D04000
heap
page read and write
CC1000
heap
page read and write
5FB0000
heap
page read and write
740000
heap
page read and write
6490000
heap
page read and write
384000
heap
page read and write
4D4E000
unkown
page write copy
33E4000
heap
page read and write
9A4000
heap
page read and write
9A4000
heap
page read and write
7F4000
heap
page read and write
62D1000
direct allocation
page read and write
B1F000
stack
page read and write
BC4000
heap
page read and write
6801000
direct allocation
page read and write
33E4000
heap
page read and write
5229000
unkown
page execute read
5D67000
direct allocation
page read and write
5142000
unkown
page read and write
384000
heap
page read and write
3260000
heap
page read and write
D0E000
stack
page read and write
3530000
heap
page read and write
48D2000
unkown
page read and write
69C8000
direct allocation
page read and write
8D4000
heap
page read and write
5F50000
trusted library allocation
page read and write
33E4000
heap
page read and write
2DF1000
heap
page read and write
BC4000
heap
page read and write
C20000
heap
page read and write
8D4000
heap
page read and write
68B000
stack
page read and write
60A2000
direct allocation
page read and write
3C21000
heap
page read and write
CC1000
heap
page read and write
BC4000
heap
page read and write
3DED000
direct allocation
page read and write
BC4000
heap
page read and write
48D3000
unkown
page readonly
6308000
direct allocation
page read and write
48A0000
unkown
page execute read
4F4000
heap
page read and write
4F4000
heap
page read and write
4D75000
unkown
page execute read
BC4000
heap
page read and write
7F4000
heap
page read and write
5DC8000
direct allocation
page read and write
570000
heap
page read and write
476E000
unkown
page read and write
5D0D000
direct allocation
page read and write
4D4D000
unkown
page read and write
2FB4000
heap
page read and write
5BD1000
heap
page read and write
6071000
heap
page read and write
6254000
direct allocation
page read and write
5D24000
direct allocation
page read and write
8D4000
heap
page read and write
6370000
heap
page read and write
8D0000
heap
page read and write
4900000
unkown
page write copy
6791000
heap
page read and write
5D4B000
direct allocation
page read and write
473D000
unkown
page read and write
6348000
direct allocation
page read and write
6791000
heap
page read and write
5D76000
direct allocation
page read and write
3230000
heap
page read and write
4C20000
unkown
page readonly
69AC000
direct allocation
page read and write
D04000
heap
page read and write
33E4000
heap
page read and write
8D4000
heap
page read and write
6D0000
direct allocation
page execute and read and write
48AF000
unkown
page read and write
18B000
stack
page read and write
2FD0000
heap
page read and write
6521000
heap
page read and write
60EB000
direct allocation
page read and write
BC4000
heap
page read and write
4D0A000
unkown
page write copy
9A4000
heap
page read and write
CC1000
heap
page read and write
472B000
unkown
page read and write
6791000
heap
page read and write
5D58000
direct allocation
page read and write
7F0000
heap
page read and write
BA0000
heap
page read and write
4D5A000
unkown
page write copy
7F4000
heap
page read and write
9A4000
heap
page read and write
6071000
heap
page read and write
5FB1000
heap
page read and write
3C21000
heap
page read and write
6071000
heap
page read and write
D8E000
stack
page read and write
767000
heap
page read and write
33E4000
heap
page read and write
6818000
direct allocation
page read and write
CC2000
heap
page read and write
4BE000
stack
page read and write
9A4000
heap
page read and write
5B61000
heap
page read and write
6944000
direct allocation
page read and write
694D000
direct allocation
page read and write
DBF000
stack
page read and write
5165000
unkown
page execute read
6791000
heap
page read and write
66C0000
heap
page read and write
2FB4000
heap
page read and write
4DA0000
unkown
page write copy
4774000
unkown
page execute read
384000
heap
page read and write
2FB4000
heap
page read and write
There are 910 hidden memdumps, click here to show them.