Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\8f08\user-PC\user-PC.ocx
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_2bd39bf03e29e03d545b368d7283e7143433c9c5_7522e4b5_15f01157-ca54-48c1-9516-a88aeaad6555\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4710.tmp.dmp
|
Mini DuMP crash report, 14 streams, Sun Oct 6 11:25:13 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER481A.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER483B.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
modified
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\file.dll,CheckLicense
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\file.dll,DllInit
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\file.dll,DllInstall
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",CheckLicense
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",DllInit
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",DllInstall
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",curl_easy_setopt
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",curl_easy_perform
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",curl_easy_init
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",curl_easy_cleanup
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Uninitialize
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",ThreadFunction
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Main
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",InitDll
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",Init
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\file.dll",DllUninitialize
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\System32\regsvr32.exe -e -n -i:"C:\Users\user\8f08\user-PC\user-PC.ocx" "C:\Users\user\8f08\user-PC\user-PC.ocx"
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
-e -n -i:"C:\Users\user\8f08\user-PC\user-PC.ocx" "C:\Users\user\8f08\user-PC\user-PC.ocx"
|
||
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\file.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\file.dll",#1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7588 -s 608
|
||
C:\Program Files\Windows Defender\MpCmdRun.exe
|
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 15 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://vilodeqa.com/detalis.aspx
|
193.109.85.31
|
||
https://semurox.com/account.aspx
|
193.109.85.27
|
||
http://vilodeqa.com/blueoceansite/templates/docs/index.php
|
193.109.85.31
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
semurox.com
|
193.109.85.27
|
||
vilodeqa.com
|
193.109.85.31
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
193.109.85.27
|
semurox.com
|
Russian Federation
|
||
193.109.85.31
|
vilodeqa.com
|
Russian Federation
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\MyApp\TempKey
|
TempValue
|
||
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProgramId
|
||
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
FileId
|
||
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LowerCaseLongPath
|
||
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LongPathHash
|
||
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Name
|
||
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
OriginalFileName
|
||
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Publisher
|
||
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Version
|
||
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinFileVersion
|
||
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinaryType
|
||
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductName
|
||
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductVersion
|
||
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LinkDate
|
||
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinProductVersion
|
||
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageFullName
|
||
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Size
|
||
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Language
|
||
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
IsOsComponent
|
||
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 13 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7F330000
|
direct allocation
|
page execute and read and write
|
||
7EE40000
|
direct allocation
|
page execute and read and write
|
||
4910000
|
direct allocation
|
page read and write
|
||
7ED40000
|
direct allocation
|
page execute and read and write
|
||
5763000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
35A0000
|
heap
|
page read and write
|
||
1EB000
|
stack
|
page read and write
|
||
56D1000
|
heap
|
page read and write
|
||
4AA0000
|
heap
|
page read and write
|
||
2E1F000
|
stack
|
page read and write
|
||
50E000
|
stack
|
page read and write
|
||
306A000
|
heap
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
331A000
|
heap
|
page read and write
|
||
6B88F000
|
unkown
|
page read and write
|
||
4F29000
|
heap
|
page read and write
|
||
263A000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
25EF000
|
stack
|
page read and write
|
||
4C3F000
|
heap
|
page read and write
|
||
28AB000
|
stack
|
page read and write
|
||
4F2A000
|
heap
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
4F24000
|
heap
|
page read and write
|
||
54D0000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
4CEF000
|
heap
|
page read and write
|
||
4F25000
|
heap
|
page read and write
|
||
56DB000
|
heap
|
page read and write
|
||
4BA7000
|
heap
|
page read and write
|
||
56D7000
|
heap
|
page read and write
|
||
6D537000
|
unkown
|
page readonly
|
||
3589000
|
heap
|
page read and write
|
||
4F20000
|
heap
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
4BA0000
|
heap
|
page read and write
|
||
585F000
|
heap
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
4C44000
|
heap
|
page read and write
|
||
506F000
|
heap
|
page read and write
|
||
26BF000
|
stack
|
page read and write
|
||
349A000
|
heap
|
page read and write
|
||
4BA2000
|
heap
|
page read and write
|
||
42C0000
|
heap
|
page read and write
|
||
4FDE000
|
heap
|
page read and write
|
||
161F000
|
heap
|
page read and write
|
||
150000
|
heap
|
page read and write
|
||
4DD2000
|
heap
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
5777000
|
heap
|
page read and write
|
||
4F21000
|
heap
|
page read and write
|
||
4BA7000
|
heap
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
2B21000
|
heap
|
page read and write
|
||
53D1000
|
heap
|
page read and write
|
||
56DC000
|
heap
|
page read and write
|
||
74216000
|
unkown
|
page readonly
|
||
505C000
|
heap
|
page read and write
|
||
4FC1000
|
heap
|
page read and write
|
||
12FC000
|
stack
|
page read and write
|
||
2A5A000
|
heap
|
page read and write
|
||
48FE000
|
stack
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
47CF000
|
stack
|
page read and write
|
||
4D32000
|
heap
|
page read and write
|
||
57A2000
|
heap
|
page read and write
|
||
4D1E000
|
heap
|
page read and write
|
||
56D0000
|
heap
|
page read and write
|
||
4FE5000
|
heap
|
page read and write
|
||
144E000
|
stack
|
page read and write
|
||
344C000
|
stack
|
page read and write
|
||
53D0000
|
heap
|
page read and write
|
||
2A93000
|
heap
|
page read and write
|
||
4BA5000
|
heap
|
page read and write
|
||
4F2C000
|
heap
|
page read and write
|
||
4BA8000
|
heap
|
page read and write
|
||
2BEA000
|
heap
|
page read and write
|
||
2F0B000
|
stack
|
page read and write
|
||
3317000
|
heap
|
page read and write
|
||
57AD000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
3332000
|
heap
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
29D0000
|
heap
|
page read and write
|
||
4BA5000
|
heap
|
page read and write
|
||
4FCD000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
33CF000
|
stack
|
page read and write
|
||
32AF000
|
stack
|
page read and write
|
||
267E000
|
stack
|
page read and write
|
||
354F000
|
stack
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
25AF000
|
stack
|
page read and write
|
||
57A1000
|
heap
|
page read and write
|
||
6D0B7000
|
unkown
|
page readonly
|
||
4C42000
|
heap
|
page read and write
|
||
4C73000
|
heap
|
page read and write
|
||
56D3000
|
heap
|
page read and write
|
||
2680000
|
heap
|
page read and write
|
||
74201000
|
unkown
|
page execute read
|
||
3620000
|
heap
|
page read and write
|
||
25AE000
|
stack
|
page read and write
|
||
4A87000
|
stack
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
504E000
|
heap
|
page read and write
|
||
4FFA000
|
heap
|
page read and write
|
||
180000
|
heap
|
page read and write
|
||
6B810000
|
unkown
|
page readonly
|
||
2E7E000
|
stack
|
page read and write
|
||
4F22000
|
heap
|
page read and write
|
||
4F23000
|
heap
|
page read and write
|
||
297E000
|
stack
|
page read and write
|
||
4BA7000
|
heap
|
page read and write
|
||
4E4F000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
2C6F000
|
stack
|
page read and write
|
||
56D2000
|
heap
|
page read and write
|
||
4C76000
|
heap
|
page read and write
|
||
4BA4000
|
heap
|
page read and write
|
||
28EC000
|
stack
|
page read and write
|
||
4C90000
|
heap
|
page read and write
|
||
4FE9000
|
heap
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
4BA3000
|
heap
|
page read and write
|
||
7421F000
|
unkown
|
page readonly
|
||
4F23000
|
heap
|
page read and write
|
||
74201000
|
unkown
|
page execute read
|
||
2D0F000
|
stack
|
page read and write
|
||
509D000
|
heap
|
page read and write
|
||
28F7000
|
heap
|
page read and write
|
||
56D2000
|
heap
|
page read and write
|
||
4D20000
|
heap
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
4FF2000
|
heap
|
page read and write
|
||
2B5F000
|
heap
|
page read and write
|
||
53F000
|
stack
|
page read and write
|
||
1FE000
|
stack
|
page read and write
|
||
3345000
|
heap
|
page read and write
|
||
6D0CF000
|
unkown
|
page read and write
|
||
478E000
|
stack
|
page read and write
|
||
2A7E000
|
heap
|
page read and write
|
||
6D0CF000
|
unkown
|
page read and write
|
||
26F0000
|
heap
|
page read and write
|
||
2B9B000
|
stack
|
page read and write
|
||
4C32000
|
heap
|
page read and write
|
||
2B91000
|
heap
|
page read and write
|
||
5869000
|
heap
|
page read and write
|
||
33DA000
|
heap
|
page read and write
|
||
56DB000
|
heap
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
3567000
|
heap
|
page read and write
|
||
4C36000
|
heap
|
page read and write
|
||
26FA000
|
heap
|
page read and write
|
||
7EFF5000
|
direct allocation
|
page execute and read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
4C94000
|
heap
|
page read and write
|
||
4FB5000
|
heap
|
page read and write
|
||
525000
|
heap
|
page read and write
|
||
4FDC000
|
heap
|
page read and write
|
||
4B90000
|
remote allocation
|
page read and write
|
||
578B000
|
heap
|
page read and write
|
||
4C8F000
|
heap
|
page read and write
|
||
2F38000
|
stack
|
page read and write
|
||
581C000
|
heap
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
5769000
|
heap
|
page read and write
|
||
7F5E5000
|
direct allocation
|
page execute and read and write
|
||
56DE000
|
heap
|
page read and write
|
||
56D5000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
4C64000
|
heap
|
page read and write
|
||
4BA9000
|
heap
|
page read and write
|
||
263F000
|
stack
|
page read and write
|
||
274E000
|
stack
|
page read and write
|
||
4BA8000
|
heap
|
page read and write
|
||
56DD000
|
heap
|
page read and write
|
||
25AE000
|
stack
|
page read and write
|
||
43C000
|
stack
|
page read and write
|
||
DC000
|
stack
|
page read and write
|
||
29AB000
|
stack
|
page read and write
|
||
4C45000
|
heap
|
page read and write
|
||
500E000
|
heap
|
page read and write
|
||
4BA3000
|
heap
|
page read and write
|
||
4BAC000
|
heap
|
page read and write
|
||
4BAA000
|
heap
|
page read and write
|
||
35D0000
|
heap
|
page read and write
|
||
5200000
|
heap
|
page read and write
|
||
57CA000
|
heap
|
page read and write
|
||
4C8A000
|
heap
|
page read and write
|
||
4FE9000
|
heap
|
page read and write
|
||
4FE0000
|
heap
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
4C69000
|
heap
|
page read and write
|
||
4F26000
|
heap
|
page read and write
|
||
4C69000
|
heap
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
4F2C000
|
heap
|
page read and write
|
||
5005000
|
heap
|
page read and write
|
||
4CC8000
|
heap
|
page read and write
|
||
4C60000
|
heap
|
page read and write
|
||
4F23000
|
heap
|
page read and write
|
||
6D050000
|
unkown
|
page readonly
|
||
4FDB000
|
heap
|
page read and write
|
||
56D4000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
2A48000
|
heap
|
page read and write
|
||
4F2B000
|
heap
|
page read and write
|
||
5786000
|
heap
|
page read and write
|
||
3521000
|
heap
|
page read and write
|
||
282F000
|
stack
|
page read and write
|
||
53D0000
|
remote allocation
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
4F2F000
|
heap
|
page read and write
|
||
271B000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
2630000
|
heap
|
page read and write
|
||
390000
|
heap
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
74200000
|
unkown
|
page readonly
|
||
2920000
|
heap
|
page read and write
|
||
2910000
|
heap
|
page read and write
|
||
1628000
|
heap
|
page read and write
|
||
4F21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4BAB000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
10C000
|
stack
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
4C9F000
|
heap
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
348C000
|
stack
|
page read and write
|
||
3160000
|
heap
|
page read and write
|
||
4BAD000
|
heap
|
page read and write
|
||
4F26000
|
heap
|
page read and write
|
||
4BA8000
|
heap
|
page read and write
|
||
4D4C000
|
heap
|
page read and write
|
||
4F26000
|
heap
|
page read and write
|
||
577A000
|
heap
|
page read and write
|
||
4FB2000
|
heap
|
page read and write
|
||
4C87000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
4BA4000
|
heap
|
page read and write
|
||
36E0000
|
heap
|
page read and write
|
||
57B3000
|
heap
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
4D5D000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
54D1000
|
heap
|
page read and write
|
||
500D000
|
heap
|
page read and write
|
||
4BAF000
|
heap
|
page read and write
|
||
74216000
|
unkown
|
page readonly
|
||
25AB000
|
stack
|
page read and write
|
||
579B000
|
heap
|
page read and write
|
||
4D7E000
|
heap
|
page read and write
|
||
4A4B000
|
stack
|
page read and write
|
||
6D0B7000
|
unkown
|
page readonly
|
||
29C0000
|
heap
|
page read and write
|
||
2AF1000
|
heap
|
page read and write
|
||
6B811000
|
unkown
|
page execute read
|
||
29E0000
|
heap
|
page read and write
|
||
4C49000
|
heap
|
page read and write
|
||
579D000
|
heap
|
page read and write
|
||
56D0000
|
heap
|
page read and write
|
||
6BCF6000
|
unkown
|
page read and write
|
||
5015000
|
heap
|
page read and write
|
||
497F000
|
stack
|
page read and write
|
||
51FA000
|
stack
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
4BA4000
|
heap
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
50AB000
|
heap
|
page read and write
|
||
4F23000
|
heap
|
page read and write
|
||
48BE000
|
stack
|
page read and write
|
||
44B0000
|
heap
|
page read and write
|
||
4880000
|
remote allocation
|
page read and write
|
||
5081000
|
heap
|
page read and write
|
||
7F0F5000
|
direct allocation
|
page execute and read and write
|
||
4BA7000
|
heap
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
4FF1000
|
heap
|
page read and write
|
||
107B000
|
stack
|
page read and write
|
||
56D7000
|
heap
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
4A1F000
|
stack
|
page read and write
|
||
354F000
|
stack
|
page read and write
|
||
35D0000
|
heap
|
page read and write
|
||
4C5E000
|
heap
|
page read and write
|
||
4BA4000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
4F26000
|
heap
|
page read and write
|
||
577B000
|
heap
|
page read and write
|
||
49DE000
|
stack
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
2B06000
|
heap
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
56D1000
|
heap
|
page read and write
|
||
57AE000
|
heap
|
page read and write
|
||
4FD3000
|
heap
|
page read and write
|
||
4F28000
|
heap
|
page read and write
|
||
7421F000
|
unkown
|
page readonly
|
||
4F28000
|
heap
|
page read and write
|
||
584D000
|
heap
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
6D051000
|
unkown
|
page execute read
|
||
4F2C000
|
heap
|
page read and write
|
||
2A7E000
|
stack
|
page read and write
|
||
4FCE000
|
heap
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
4F27000
|
heap
|
page read and write
|
||
4D38000
|
heap
|
page read and write
|
||
2AAA000
|
heap
|
page read and write
|
||
4F2B000
|
heap
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
74216000
|
unkown
|
page readonly
|
||
2DCE000
|
stack
|
page read and write
|
||
4F21000
|
heap
|
page read and write
|
||
CB000
|
stack
|
page read and write
|
||
56D2000
|
heap
|
page read and write
|
||
140000
|
heap
|
page read and write
|
||
44E0000
|
heap
|
page read and write
|
||
4FC4000
|
heap
|
page read and write
|
||
56D0000
|
heap
|
page read and write
|
||
56D7000
|
heap
|
page read and write
|
||
4BA3000
|
heap
|
page read and write
|
||
5764000
|
heap
|
page read and write
|
||
6D536000
|
unkown
|
page read and write
|
||
4BA3000
|
heap
|
page read and write
|
||
268A000
|
heap
|
page read and write
|
||
6D050000
|
unkown
|
page readonly
|
||
4FC2000
|
heap
|
page read and write
|
||
56D1000
|
heap
|
page read and write
|
||
4FC8000
|
heap
|
page read and write
|
||
2700000
|
heap
|
page read and write
|
||
56D1000
|
heap
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
56DD000
|
heap
|
page read and write
|
||
56DA000
|
heap
|
page read and write
|
||
5792000
|
heap
|
page read and write
|
||
4F2A000
|
heap
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
2F4C000
|
stack
|
page read and write
|
||
329A000
|
heap
|
page read and write
|
||
4C8A000
|
heap
|
page read and write
|
||
2AC2000
|
heap
|
page read and write
|
||
578E000
|
heap
|
page read and write
|
||
4C69000
|
heap
|
page read and write
|
||
4BA4000
|
heap
|
page read and write
|
||
2F5A000
|
heap
|
page read and write
|
||
4BA6000
|
heap
|
page read and write
|
||
4BA6000
|
heap
|
page read and write
|
||
4A90000
|
heap
|
page read and write
|
||
2A6A000
|
heap
|
page read and write
|
||
4C56000
|
heap
|
page read and write
|
||
5805000
|
heap
|
page read and write
|
||
5773000
|
heap
|
page read and write
|
||
7421D000
|
unkown
|
page read and write
|
||
53D0000
|
remote allocation
|
page read and write
|
||
59C7000
|
stack
|
page read and write
|
||
56DA000
|
heap
|
page read and write
|
||
2BDC000
|
stack
|
page read and write
|
||
500C000
|
heap
|
page read and write
|
||
4D16000
|
heap
|
page read and write
|
||
36C0000
|
heap
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
3490000
|
heap
|
page read and write
|
||
275C000
|
stack
|
page read and write
|
||
6B877000
|
unkown
|
page readonly
|
||
2DEE000
|
stack
|
page read and write
|
||
4BCE000
|
stack
|
page read and write
|
||
57B3000
|
heap
|
page read and write
|
||
57A1000
|
heap
|
page read and write
|
||
12C000
|
stack
|
page read and write
|
||
4BA9000
|
heap
|
page read and write
|
||
53D0000
|
remote allocation
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
4C95000
|
heap
|
page read and write
|
||
2F5C000
|
stack
|
page read and write
|
||
5008000
|
heap
|
page read and write
|
||
4BAE000
|
heap
|
page read and write
|
||
2EFB000
|
stack
|
page read and write
|
||
501C000
|
heap
|
page read and write
|
||
50F000
|
stack
|
page read and write
|
||
57B4000
|
heap
|
page read and write
|
||
7F0F0000
|
direct allocation
|
page execute and read and write
|
||
4C76000
|
heap
|
page read and write
|
||
4FF2000
|
heap
|
page read and write
|
||
4CF7000
|
heap
|
page read and write
|
||
74200000
|
unkown
|
page readonly
|
||
FE0000
|
heap
|
page read and write
|
||
4C45000
|
heap
|
page read and write
|
||
328F000
|
stack
|
page read and write
|
||
2F8C000
|
stack
|
page read and write
|
||
577F000
|
heap
|
page read and write
|
||
4FF0000
|
heap
|
page read and write
|
||
2D7F000
|
stack
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
7421D000
|
unkown
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
5798000
|
heap
|
page read and write
|
||
F6C000
|
stack
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
4F2C000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
28BE000
|
stack
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
6D536000
|
unkown
|
page read and write
|
||
4FCA000
|
heap
|
page read and write
|
||
4F2A000
|
heap
|
page read and write
|
||
6D050000
|
unkown
|
page readonly
|
||
25EF000
|
stack
|
page read and write
|
||
2E2A000
|
heap
|
page read and write
|
||
4FF7000
|
heap
|
page read and write
|
||
53D1000
|
heap
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
4E8D000
|
stack
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
4130000
|
heap
|
page read and write
|
||
5820000
|
heap
|
page read and write
|
||
57B8000
|
heap
|
page read and write
|
||
5014000
|
heap
|
page read and write
|
||
6D422000
|
unkown
|
page read and write
|
||
493E000
|
stack
|
page read and write
|
||
3590000
|
heap
|
page read and write
|
||
4C5B000
|
heap
|
page read and write
|
||
6BBE2000
|
unkown
|
page read and write
|
||
4C47000
|
heap
|
page read and write
|
||
57CE000
|
heap
|
page read and write
|
||
1355000
|
heap
|
page read and write
|
||
4BA2000
|
heap
|
page read and write
|
||
4BAA000
|
heap
|
page read and write
|
||
293F000
|
stack
|
page read and write
|
||
4C79000
|
heap
|
page read and write
|
||
56D0000
|
heap
|
page read and write
|
||
4C65000
|
heap
|
page read and write
|
||
5796000
|
heap
|
page read and write
|
||
EB000
|
stack
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
50CF000
|
heap
|
page read and write
|
||
6D051000
|
unkown
|
page execute read
|
||
5075000
|
heap
|
page read and write
|
||
328000
|
stack
|
page read and write
|
||
6D537000
|
unkown
|
page readonly
|
||
51BB000
|
stack
|
page read and write
|
||
6D0B7000
|
unkown
|
page readonly
|
||
56D0000
|
heap
|
page read and write
|
||
1610000
|
heap
|
page read and write
|
||
15B000
|
stack
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
48BE000
|
stack
|
page read and write
|
||
34DA000
|
heap
|
page read and write
|
||
5823000
|
heap
|
page read and write
|
||
4C4A000
|
heap
|
page read and write
|
||
5015000
|
heap
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
4F24000
|
heap
|
page read and write
|
||
56DB000
|
heap
|
page read and write
|
||
4D67000
|
heap
|
page read and write
|
||
7421D000
|
unkown
|
page read and write
|
||
4F25000
|
heap
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
4C20000
|
heap
|
page read and write
|
||
51F7000
|
stack
|
page read and write
|
||
2A93000
|
heap
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
2F1B000
|
stack
|
page read and write
|
||
74201000
|
unkown
|
page execute read
|
||
589D000
|
heap
|
page read and write
|
||
287B000
|
stack
|
page read and write
|
||
5001000
|
heap
|
page read and write
|
||
5828000
|
heap
|
page read and write
|
||
11BB000
|
heap
|
page read and write
|
||
4FDB000
|
heap
|
page read and write
|
||
301F000
|
stack
|
page read and write
|
||
5785000
|
heap
|
page read and write
|
||
50A9000
|
heap
|
page read and write
|
||
4FE5000
|
heap
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
4BA8000
|
heap
|
page read and write
|
||
4F29000
|
heap
|
page read and write
|
||
4F28000
|
heap
|
page read and write
|
||
2A95000
|
heap
|
page read and write
|
||
534E000
|
stack
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
350E000
|
stack
|
page read and write
|
||
4C78000
|
heap
|
page read and write
|
||
57CC000
|
heap
|
page read and write
|
||
4BA4000
|
heap
|
page read and write
|
||
52DF000
|
stack
|
page read and write
|
||
6D536000
|
unkown
|
page read and write
|
||
74200000
|
unkown
|
page readonly
|
||
4C21000
|
heap
|
page read and write
|
||
27BF000
|
stack
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
4F20000
|
heap
|
page read and write
|
||
2A9B000
|
heap
|
page read and write
|
||
56D9000
|
heap
|
page read and write
|
||
4F27000
|
heap
|
page read and write
|
||
6BCF7000
|
unkown
|
page readonly
|
||
4DB0000
|
heap
|
page read and write
|
||
2B7F000
|
stack
|
page read and write
|
||
4F25000
|
heap
|
page read and write
|
||
2A5A000
|
heap
|
page read and write
|
||
7EFF0000
|
direct allocation
|
page execute and read and write
|
||
56D3000
|
heap
|
page read and write
|
||
56D7000
|
heap
|
page read and write
|
||
4880000
|
remote allocation
|
page read and write
|
||
296C000
|
stack
|
page read and write
|
||
509E000
|
heap
|
page read and write
|
||
4C5D000
|
heap
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
4CC3000
|
heap
|
page read and write
|
||
5779000
|
heap
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
56D4000
|
heap
|
page read and write
|
||
5761000
|
heap
|
page read and write
|
||
56D4000
|
heap
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
161B000
|
heap
|
page read and write
|
||
2ABF000
|
stack
|
page read and write
|
||
4E4D000
|
heap
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
5773000
|
heap
|
page read and write
|
||
5014000
|
heap
|
page read and write
|
||
4FDD000
|
heap
|
page read and write
|
||
25F0000
|
heap
|
page read and write
|
||
15EE000
|
stack
|
page read and write
|
||
303C000
|
stack
|
page read and write
|
||
4FB0000
|
heap
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
4F26000
|
heap
|
page read and write
|
||
292B000
|
stack
|
page read and write
|
||
6D051000
|
unkown
|
page execute read
|
||
26D0000
|
heap
|
page read and write
|
||
56D6000
|
heap
|
page read and write
|
||
2A3C000
|
heap
|
page read and write
|
||
487F000
|
stack
|
page read and write
|
||
28BC000
|
stack
|
page read and write
|
||
4BA0000
|
heap
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
4AA0000
|
heap
|
page read and write
|
||
483E000
|
stack
|
page read and write
|
||
56D8000
|
heap
|
page read and write
|
||
4BA3000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
2A27000
|
heap
|
page read and write
|
||
4BA0000
|
heap
|
page read and write
|
||
56DF000
|
heap
|
page read and write
|
||
56D3000
|
heap
|
page read and write
|
||
57B9000
|
heap
|
page read and write
|
||
29DA000
|
heap
|
page read and write
|
||
4C0F000
|
stack
|
page read and write
|
||
4F22000
|
heap
|
page read and write
|
||
48FF000
|
stack
|
page read and write
|
||
4C75000
|
heap
|
page read and write
|
||
4F50000
|
heap
|
page read and write
|
||
140E000
|
stack
|
page read and write
|
||
56D7000
|
heap
|
page read and write
|
||
579D000
|
heap
|
page read and write
|
||
4A8A000
|
stack
|
page read and write
|
||
7421F000
|
unkown
|
page readonly
|
||
4C86000
|
heap
|
page read and write
|
||
4C5B000
|
heap
|
page read and write
|
||
4C64000
|
heap
|
page read and write
|
||
467F000
|
stack
|
page read and write
|
||
4F21000
|
heap
|
page read and write
|
||
267F000
|
stack
|
page read and write
|
||
50FA000
|
heap
|
page read and write
|
||
6D422000
|
unkown
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
56D5000
|
heap
|
page read and write
|
||
57A5000
|
heap
|
page read and write
|
||
6D537000
|
unkown
|
page readonly
|
||
47F0000
|
heap
|
page read and write
|
||
29BC000
|
stack
|
page read and write
|
||
5879000
|
heap
|
page read and write
|
||
4CD8000
|
heap
|
page read and write
|
||
4F3E000
|
stack
|
page read and write
|
||
357B000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
4F28000
|
heap
|
page read and write
|
||
54E000
|
stack
|
page read and write
|
||
47B0000
|
heap
|
page read and write
|
||
33DE000
|
stack
|
page read and write
|
||
4F21000
|
heap
|
page read and write
|
||
3580000
|
heap
|
page read and write
|
||
4E0E000
|
stack
|
page read and write
|
||
4BA5000
|
heap
|
page read and write
|
||
581B000
|
stack
|
page read and write
|
||
26BE000
|
stack
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
4BAB000
|
heap
|
page read and write
|
||
56D0000
|
heap
|
page read and write
|
||
180F000
|
stack
|
page read and write
|
||
5838000
|
heap
|
page read and write
|
||
40A000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
56D7000
|
heap
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
4F26000
|
heap
|
page read and write
|
||
43C0000
|
heap
|
page read and write
|
||
2DDB000
|
stack
|
page read and write
|
||
4FCF000
|
heap
|
page read and write
|
||
7F5E0000
|
direct allocation
|
page execute and read and write
|
||
350E000
|
stack
|
page read and write
|
||
4C3A000
|
heap
|
page read and write
|
||
4ECE000
|
stack
|
page read and write
|
||
538F000
|
stack
|
page read and write
|
||
29DE000
|
stack
|
page read and write
|
||
4940000
|
heap
|
page read and write
|
||
4470000
|
heap
|
page read and write
|
||
4FCD000
|
heap
|
page read and write
|
||
56DE000
|
heap
|
page read and write
|
||
4B90000
|
remote allocation
|
page read and write
|
||
57C6000
|
heap
|
page read and write
|
||
3FE0000
|
heap
|
page read and write
|
||
2D4A000
|
heap
|
page read and write
|
||
584D000
|
heap
|
page read and write
|
||
29D0000
|
heap
|
page read and write
|
||
4F2B000
|
heap
|
page read and write
|
||
6D0CF000
|
unkown
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
4C4B000
|
heap
|
page read and write
|
||
56D0000
|
heap
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
4BAA000
|
heap
|
page read and write
|
||
56DB000
|
heap
|
page read and write
|
||
34D0000
|
heap
|
page read and write
|
||
291A000
|
heap
|
page read and write
|
||
4D5A000
|
heap
|
page read and write
|
||
4C4D000
|
heap
|
page read and write
|
||
579A000
|
heap
|
page read and write
|
||
300E000
|
stack
|
page read and write
|
||
5784000
|
heap
|
page read and write
|
||
57F8000
|
heap
|
page read and write
|
||
2F4B000
|
stack
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
6D422000
|
unkown
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
57B1000
|
heap
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
2EB000
|
stack
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
4C5B000
|
heap
|
page read and write
|
||
2A4E000
|
heap
|
page read and write
|
||
5792000
|
heap
|
page read and write
|
||
2EBF000
|
stack
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
4880000
|
remote allocation
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
4FFE000
|
heap
|
page read and write
|
||
357F000
|
heap
|
page read and write
|
||
4F2D000
|
heap
|
page read and write
|
||
35CE000
|
heap
|
page read and write
|
||
578D000
|
heap
|
page read and write
|
||
4BA0000
|
heap
|
page read and write
|
||
29EC000
|
stack
|
page read and write
|
||
4FE9000
|
heap
|
page read and write
|
||
4FFD000
|
heap
|
page read and write
|
||
29C5000
|
heap
|
page read and write
|
||
497C000
|
stack
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
57C0000
|
heap
|
page read and write
|
||
1638000
|
heap
|
page read and write
|
||
577D000
|
heap
|
page read and write
|
||
493E000
|
stack
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
5766000
|
heap
|
page read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
56D2000
|
heap
|
page read and write
|
||
4BA3000
|
heap
|
page read and write
|
||
4F23000
|
heap
|
page read and write
|
||
25EE000
|
stack
|
page read and write
|
||
4CC2000
|
heap
|
page read and write
|
||
4B90000
|
remote allocation
|
page read and write
|
||
170000
|
heap
|
page read and write
|
||
25E9000
|
stack
|
page read and write
|
||
56D0000
|
heap
|
page read and write
|
||
56D5000
|
heap
|
page read and write
|
||
1CE000
|
stack
|
page read and write
|
||
4C63000
|
heap
|
page read and write
|
||
4F28000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
4FBF000
|
heap
|
page read and write
|
There are 695 hidden memdumps, click here to show them.