IOC Report
file.dll

loading gif

Files

File Path
Type
Category
Malicious
file.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\8f08\user-PC\user-PC.ocx
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_2bd39bf03e29e03d545b368d7283e7143433c9c5_7522e4b5_15f01157-ca54-48c1-9516-a88aeaad6555\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4710.tmp.dmp
Mini DuMP crash report, 14 streams, Sun Oct 6 11:25:13 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER481A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER483B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\file.dll,CheckLicense
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\file.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\file.dll,DllInit
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\file.dll,DllInstall
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\file.dll",CheckLicense
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\file.dll",DllInit
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\file.dll",DllInstall
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\file.dll",curl_easy_setopt
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\file.dll",curl_easy_perform
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\file.dll",curl_easy_init
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\file.dll",curl_easy_cleanup
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\file.dll",Uninitialize
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\file.dll",ThreadFunction
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\file.dll",Main
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\file.dll",InitDll
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\file.dll",Init
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\file.dll",DllUninitialize
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe -e -n -i:"C:\Users\user\8f08\user-PC\user-PC.ocx" "C:\Users\user\8f08\user-PC\user-PC.ocx"
malicious
C:\Windows\SysWOW64\regsvr32.exe
-e -n -i:"C:\Users\user\8f08\user-PC\user-PC.ocx" "C:\Users\user\8f08\user-PC\user-PC.ocx"
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\file.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\file.dll",#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7588 -s 608
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 15 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://vilodeqa.com/detalis.aspx
193.109.85.31
malicious
https://semurox.com/account.aspx
193.109.85.27
malicious
http://vilodeqa.com/blueoceansite/templates/docs/index.php
193.109.85.31
malicious

Domains

Name
IP
Malicious
semurox.com
193.109.85.27
malicious
vilodeqa.com
193.109.85.31
malicious

IPs

IP
Domain
Country
Malicious
193.109.85.27
semurox.com
Russian Federation
malicious
193.109.85.31
vilodeqa.com
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\MyApp\TempKey
TempValue
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProgramId
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
FileId
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LowerCaseLongPath
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LongPathHash
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Name
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
OriginalFileName
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Publisher
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Version
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinFileVersion
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinaryType
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductName
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductVersion
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LinkDate
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinProductVersion
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageFullName
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageRelativeId
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Size
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Language
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
IsOsComponent
\REGISTRY\A\{11ac3362-e31e-f6e9-85bf-527c330ad638}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7F330000
direct allocation
page execute and read and write
malicious
7EE40000
direct allocation
page execute and read and write
malicious
4910000
direct allocation
page read and write
malicious
7ED40000
direct allocation
page execute and read and write
malicious
5763000
heap
page read and write
4D21000
heap
page read and write
35A0000
heap
page read and write
1EB000
stack
page read and write
56D1000
heap
page read and write
4AA0000
heap
page read and write
2E1F000
stack
page read and write
50E000
stack
page read and write
306A000
heap
page read and write
1350000
heap
page read and write
14E0000
heap
page read and write
331A000
heap
page read and write
6B88F000
unkown
page read and write
4F29000
heap
page read and write
263A000
heap
page read and write
3200000
heap
page read and write
25EF000
stack
page read and write
4C3F000
heap
page read and write
28AB000
stack
page read and write
4F2A000
heap
page read and write
1160000
heap
page read and write
2FF0000
heap
page read and write
4F24000
heap
page read and write
54D0000
heap
page read and write
2FB0000
heap
page read and write
4CEF000
heap
page read and write
4F25000
heap
page read and write
56DB000
heap
page read and write
4BA7000
heap
page read and write
56D7000
heap
page read and write
6D537000
unkown
page readonly
3589000
heap
page read and write
4F20000
heap
page read and write
27D0000
heap
page read and write
4BA0000
heap
page read and write
585F000
heap
page read and write
2720000
heap
page read and write
2FD0000
heap
page read and write
4C44000
heap
page read and write
506F000
heap
page read and write
26BF000
stack
page read and write
349A000
heap
page read and write
4BA2000
heap
page read and write
42C0000
heap
page read and write
4FDE000
heap
page read and write
161F000
heap
page read and write
150000
heap
page read and write
4DD2000
heap
page read and write
190000
heap
page read and write
5777000
heap
page read and write
4F21000
heap
page read and write
4BA7000
heap
page read and write
324E000
stack
page read and write
2B21000
heap
page read and write
53D1000
heap
page read and write
56DC000
heap
page read and write
74216000
unkown
page readonly
505C000
heap
page read and write
4FC1000
heap
page read and write
12FC000
stack
page read and write
2A5A000
heap
page read and write
48FE000
stack
page read and write
2BE0000
heap
page read and write
400000
heap
page read and write
47CF000
stack
page read and write
4D32000
heap
page read and write
57A2000
heap
page read and write
4D1E000
heap
page read and write
56D0000
heap
page read and write
4FE5000
heap
page read and write
144E000
stack
page read and write
344C000
stack
page read and write
53D0000
heap
page read and write
2A93000
heap
page read and write
4BA5000
heap
page read and write
4F2C000
heap
page read and write
4BA8000
heap
page read and write
2BEA000
heap
page read and write
2F0B000
stack
page read and write
3317000
heap
page read and write
57AD000
heap
page read and write
2FD0000
heap
page read and write
3332000
heap
page read and write
32BE000
stack
page read and write
29D0000
heap
page read and write
4BA5000
heap
page read and write
4FCD000
heap
page read and write
500000
heap
page read and write
33CF000
stack
page read and write
32AF000
stack
page read and write
267E000
stack
page read and write
354F000
stack
page read and write
3190000
heap
page read and write
25AF000
stack
page read and write
57A1000
heap
page read and write
6D0B7000
unkown
page readonly
4C42000
heap
page read and write
4C73000
heap
page read and write
56D3000
heap
page read and write
2680000
heap
page read and write
74201000
unkown
page execute read
3620000
heap
page read and write
25AE000
stack
page read and write
4A87000
stack
page read and write
326E000
stack
page read and write
504E000
heap
page read and write
4FFA000
heap
page read and write
180000
heap
page read and write
6B810000
unkown
page readonly
2E7E000
stack
page read and write
4F22000
heap
page read and write
4F23000
heap
page read and write
297E000
stack
page read and write
4BA7000
heap
page read and write
4E4F000
stack
page read and write
4C71000
heap
page read and write
2C6F000
stack
page read and write
56D2000
heap
page read and write
4C76000
heap
page read and write
4BA4000
heap
page read and write
28EC000
stack
page read and write
4C90000
heap
page read and write
4FE9000
heap
page read and write
2840000
heap
page read and write
520000
heap
page read and write
4BA3000
heap
page read and write
7421F000
unkown
page readonly
4F23000
heap
page read and write
74201000
unkown
page execute read
2D0F000
stack
page read and write
509D000
heap
page read and write
28F7000
heap
page read and write
56D2000
heap
page read and write
4D20000
heap
page read and write
2940000
heap
page read and write
4FF2000
heap
page read and write
2B5F000
heap
page read and write
53F000
stack
page read and write
1FE000
stack
page read and write
3345000
heap
page read and write
6D0CF000
unkown
page read and write
478E000
stack
page read and write
2A7E000
heap
page read and write
6D0CF000
unkown
page read and write
26F0000
heap
page read and write
2B9B000
stack
page read and write
4C32000
heap
page read and write
2B91000
heap
page read and write
5869000
heap
page read and write
33DA000
heap
page read and write
56DB000
heap
page read and write
27F0000
heap
page read and write
3567000
heap
page read and write
4C36000
heap
page read and write
26FA000
heap
page read and write
7EFF5000
direct allocation
page execute and read and write
2CD0000
heap
page read and write
4C94000
heap
page read and write
4FB5000
heap
page read and write
525000
heap
page read and write
4FDC000
heap
page read and write
4B90000
remote allocation
page read and write
578B000
heap
page read and write
4C8F000
heap
page read and write
2F38000
stack
page read and write
581C000
heap
page read and write
32F0000
heap
page read and write
2D40000
heap
page read and write
5769000
heap
page read and write
7F5E5000
direct allocation
page execute and read and write
56DE000
heap
page read and write
56D5000
heap
page read and write
510000
heap
page read and write
11B0000
heap
page read and write
4C64000
heap
page read and write
4BA9000
heap
page read and write
263F000
stack
page read and write
274E000
stack
page read and write
4BA8000
heap
page read and write
56DD000
heap
page read and write
25AE000
stack
page read and write
43C000
stack
page read and write
DC000
stack
page read and write
29AB000
stack
page read and write
4C45000
heap
page read and write
500E000
heap
page read and write
4BA3000
heap
page read and write
4BAC000
heap
page read and write
4BAA000
heap
page read and write
35D0000
heap
page read and write
5200000
heap
page read and write
57CA000
heap
page read and write
4C8A000
heap
page read and write
4FE9000
heap
page read and write
4FE0000
heap
page read and write
3310000
heap
page read and write
4C69000
heap
page read and write
4F26000
heap
page read and write
4C69000
heap
page read and write
2860000
heap
page read and write
4F2C000
heap
page read and write
5005000
heap
page read and write
4CC8000
heap
page read and write
4C60000
heap
page read and write
4F23000
heap
page read and write
6D050000
unkown
page readonly
4FDB000
heap
page read and write
56D4000
heap
page read and write
5011000
heap
page read and write
2A48000
heap
page read and write
4F2B000
heap
page read and write
5786000
heap
page read and write
3521000
heap
page read and write
282F000
stack
page read and write
53D0000
remote allocation
page read and write
2E20000
heap
page read and write
4F2F000
heap
page read and write
271B000
stack
page read and write
4C31000
heap
page read and write
2630000
heap
page read and write
390000
heap
page read and write
28F0000
heap
page read and write
74200000
unkown
page readonly
2920000
heap
page read and write
2910000
heap
page read and write
1628000
heap
page read and write
4F21000
heap
page read and write
4D21000
heap
page read and write
4BAB000
heap
page read and write
2D30000
heap
page read and write
10C000
stack
page read and write
2DD0000
heap
page read and write
4C9F000
heap
page read and write
30F0000
heap
page read and write
348C000
stack
page read and write
3160000
heap
page read and write
4BAD000
heap
page read and write
4F26000
heap
page read and write
4BA8000
heap
page read and write
4D4C000
heap
page read and write
4F26000
heap
page read and write
577A000
heap
page read and write
4FB2000
heap
page read and write
4C87000
heap
page read and write
9B000
stack
page read and write
4BA4000
heap
page read and write
36E0000
heap
page read and write
57B3000
heap
page read and write
2FA0000
heap
page read and write
4D5D000
heap
page read and write
2E80000
heap
page read and write
54D1000
heap
page read and write
500D000
heap
page read and write
4BAF000
heap
page read and write
74216000
unkown
page readonly
25AB000
stack
page read and write
579B000
heap
page read and write
4D7E000
heap
page read and write
4A4B000
stack
page read and write
6D0B7000
unkown
page readonly
29C0000
heap
page read and write
2AF1000
heap
page read and write
6B811000
unkown
page execute read
29E0000
heap
page read and write
4C49000
heap
page read and write
579D000
heap
page read and write
56D0000
heap
page read and write
6BCF6000
unkown
page read and write
5015000
heap
page read and write
497F000
stack
page read and write
51FA000
stack
page read and write
30EF000
stack
page read and write
2830000
heap
page read and write
4BA4000
heap
page read and write
327F000
stack
page read and write
50AB000
heap
page read and write
4F23000
heap
page read and write
48BE000
stack
page read and write
44B0000
heap
page read and write
4880000
remote allocation
page read and write
5081000
heap
page read and write
7F0F5000
direct allocation
page execute and read and write
4BA7000
heap
page read and write
33F0000
heap
page read and write
4FF1000
heap
page read and write
107B000
stack
page read and write
56D7000
heap
page read and write
27C0000
heap
page read and write
4A1F000
stack
page read and write
354F000
stack
page read and write
35D0000
heap
page read and write
4C5E000
heap
page read and write
4BA4000
heap
page read and write
520000
heap
page read and write
4F26000
heap
page read and write
577B000
heap
page read and write
49DE000
stack
page read and write
29E0000
heap
page read and write
2B06000
heap
page read and write
2E40000
heap
page read and write
56D1000
heap
page read and write
57AE000
heap
page read and write
4FD3000
heap
page read and write
4F28000
heap
page read and write
7421F000
unkown
page readonly
4F28000
heap
page read and write
584D000
heap
page read and write
323E000
stack
page read and write
6D051000
unkown
page execute read
4F2C000
heap
page read and write
2A7E000
stack
page read and write
4FCE000
heap
page read and write
1A0000
heap
page read and write
4F27000
heap
page read and write
4D38000
heap
page read and write
2AAA000
heap
page read and write
4F2B000
heap
page read and write
3020000
heap
page read and write
74216000
unkown
page readonly
2DCE000
stack
page read and write
4F21000
heap
page read and write
CB000
stack
page read and write
56D2000
heap
page read and write
140000
heap
page read and write
44E0000
heap
page read and write
4FC4000
heap
page read and write
56D0000
heap
page read and write
56D7000
heap
page read and write
4BA3000
heap
page read and write
5764000
heap
page read and write
6D536000
unkown
page read and write
4BA3000
heap
page read and write
268A000
heap
page read and write
6D050000
unkown
page readonly
4FC2000
heap
page read and write
56D1000
heap
page read and write
4FC8000
heap
page read and write
2700000
heap
page read and write
56D1000
heap
page read and write
2C50000
heap
page read and write
56DD000
heap
page read and write
56DA000
heap
page read and write
5792000
heap
page read and write
4F2A000
heap
page read and write
3040000
heap
page read and write
2F4C000
stack
page read and write
329A000
heap
page read and write
4C8A000
heap
page read and write
2AC2000
heap
page read and write
578E000
heap
page read and write
4C69000
heap
page read and write
4BA4000
heap
page read and write
2F5A000
heap
page read and write
4BA6000
heap
page read and write
4BA6000
heap
page read and write
4A90000
heap
page read and write
2A6A000
heap
page read and write
4C56000
heap
page read and write
5805000
heap
page read and write
5773000
heap
page read and write
7421D000
unkown
page read and write
53D0000
remote allocation
page read and write
59C7000
stack
page read and write
56DA000
heap
page read and write
2BDC000
stack
page read and write
500C000
heap
page read and write
4D16000
heap
page read and write
36C0000
heap
page read and write
3040000
heap
page read and write
3490000
heap
page read and write
275C000
stack
page read and write
6B877000
unkown
page readonly
2DEE000
stack
page read and write
4BCE000
stack
page read and write
57B3000
heap
page read and write
57A1000
heap
page read and write
12C000
stack
page read and write
4BA9000
heap
page read and write
53D0000
remote allocation
page read and write
4BA1000
heap
page read and write
4C95000
heap
page read and write
2F5C000
stack
page read and write
5008000
heap
page read and write
4BAE000
heap
page read and write
2EFB000
stack
page read and write
501C000
heap
page read and write
50F000
stack
page read and write
57B4000
heap
page read and write
7F0F0000
direct allocation
page execute and read and write
4C76000
heap
page read and write
4FF2000
heap
page read and write
4CF7000
heap
page read and write
74200000
unkown
page readonly
FE0000
heap
page read and write
4C45000
heap
page read and write
328F000
stack
page read and write
2F8C000
stack
page read and write
577F000
heap
page read and write
4FF0000
heap
page read and write
2D7F000
stack
page read and write
4C81000
heap
page read and write
7421D000
unkown
page read and write
2B3E000
stack
page read and write
5798000
heap
page read and write
F6C000
stack
page read and write
3310000
heap
page read and write
4F2C000
heap
page read and write
4BA1000
heap
page read and write
28BE000
stack
page read and write
4BA1000
heap
page read and write
6D536000
unkown
page read and write
4FCA000
heap
page read and write
4F2A000
heap
page read and write
6D050000
unkown
page readonly
25EF000
stack
page read and write
2E2A000
heap
page read and write
4FF7000
heap
page read and write
53D1000
heap
page read and write
2960000
heap
page read and write
4E8D000
stack
page read and write
4BA1000
heap
page read and write
4130000
heap
page read and write
5820000
heap
page read and write
57B8000
heap
page read and write
5014000
heap
page read and write
6D422000
unkown
page read and write
493E000
stack
page read and write
3590000
heap
page read and write
4C5B000
heap
page read and write
6BBE2000
unkown
page read and write
4C47000
heap
page read and write
57CE000
heap
page read and write
1355000
heap
page read and write
4BA2000
heap
page read and write
4BAA000
heap
page read and write
293F000
stack
page read and write
4C79000
heap
page read and write
56D0000
heap
page read and write
4C65000
heap
page read and write
5796000
heap
page read and write
EB000
stack
page read and write
490000
heap
page read and write
50CF000
heap
page read and write
6D051000
unkown
page execute read
5075000
heap
page read and write
328000
stack
page read and write
6D537000
unkown
page readonly
51BB000
stack
page read and write
6D0B7000
unkown
page readonly
56D0000
heap
page read and write
1610000
heap
page read and write
15B000
stack
page read and write
2A5E000
stack
page read and write
48BE000
stack
page read and write
34DA000
heap
page read and write
5823000
heap
page read and write
4C4A000
heap
page read and write
5015000
heap
page read and write
2840000
heap
page read and write
32C0000
heap
page read and write
4F24000
heap
page read and write
56DB000
heap
page read and write
4D67000
heap
page read and write
7421D000
unkown
page read and write
4F25000
heap
page read and write
2FC0000
heap
page read and write
4C20000
heap
page read and write
51F7000
stack
page read and write
2A93000
heap
page read and write
2CB0000
heap
page read and write
2F1B000
stack
page read and write
74201000
unkown
page execute read
589D000
heap
page read and write
287B000
stack
page read and write
5001000
heap
page read and write
5828000
heap
page read and write
11BB000
heap
page read and write
4FDB000
heap
page read and write
301F000
stack
page read and write
5785000
heap
page read and write
50A9000
heap
page read and write
4FE5000
heap
page read and write
2770000
heap
page read and write
4BA8000
heap
page read and write
4F29000
heap
page read and write
4F28000
heap
page read and write
2A95000
heap
page read and write
534E000
stack
page read and write
2A90000
heap
page read and write
2A60000
heap
page read and write
350E000
stack
page read and write
4C78000
heap
page read and write
57CC000
heap
page read and write
4BA4000
heap
page read and write
52DF000
stack
page read and write
6D536000
unkown
page read and write
74200000
unkown
page readonly
4C21000
heap
page read and write
27BF000
stack
page read and write
2FC0000
heap
page read and write
27A0000
heap
page read and write
2B40000
heap
page read and write
4F20000
heap
page read and write
2A9B000
heap
page read and write
56D9000
heap
page read and write
4F27000
heap
page read and write
6BCF7000
unkown
page readonly
4DB0000
heap
page read and write
2B7F000
stack
page read and write
4F25000
heap
page read and write
2A5A000
heap
page read and write
7EFF0000
direct allocation
page execute and read and write
56D3000
heap
page read and write
56D7000
heap
page read and write
4880000
remote allocation
page read and write
296C000
stack
page read and write
509E000
heap
page read and write
4C5D000
heap
page read and write
3060000
heap
page read and write
4CC3000
heap
page read and write
5779000
heap
page read and write
2A98000
heap
page read and write
2F40000
heap
page read and write
4AA1000
heap
page read and write
56D4000
heap
page read and write
5761000
heap
page read and write
56D4000
heap
page read and write
2950000
heap
page read and write
161B000
heap
page read and write
2ABF000
stack
page read and write
4E4D000
heap
page read and write
3080000
heap
page read and write
5773000
heap
page read and write
5014000
heap
page read and write
4FDD000
heap
page read and write
25F0000
heap
page read and write
15EE000
stack
page read and write
303C000
stack
page read and write
4FB0000
heap
page read and write
3290000
heap
page read and write
2F20000
heap
page read and write
4F26000
heap
page read and write
292B000
stack
page read and write
6D051000
unkown
page execute read
26D0000
heap
page read and write
56D6000
heap
page read and write
2A3C000
heap
page read and write
487F000
stack
page read and write
28BC000
stack
page read and write
4BA0000
heap
page read and write
2920000
heap
page read and write
4AA0000
heap
page read and write
483E000
stack
page read and write
56D8000
heap
page read and write
4BA3000
heap
page read and write
2FB0000
heap
page read and write
2A27000
heap
page read and write
4BA0000
heap
page read and write
56DF000
heap
page read and write
56D3000
heap
page read and write
57B9000
heap
page read and write
29DA000
heap
page read and write
4C0F000
stack
page read and write
4F22000
heap
page read and write
48FF000
stack
page read and write
4C75000
heap
page read and write
4F50000
heap
page read and write
140E000
stack
page read and write
56D7000
heap
page read and write
579D000
heap
page read and write
4A8A000
stack
page read and write
7421F000
unkown
page readonly
4C86000
heap
page read and write
4C5B000
heap
page read and write
4C64000
heap
page read and write
467F000
stack
page read and write
4F21000
heap
page read and write
267F000
stack
page read and write
50FA000
heap
page read and write
6D422000
unkown
page read and write
3340000
heap
page read and write
56D5000
heap
page read and write
57A5000
heap
page read and write
6D537000
unkown
page readonly
47F0000
heap
page read and write
29BC000
stack
page read and write
5879000
heap
page read and write
4CD8000
heap
page read and write
4F3E000
stack
page read and write
357B000
heap
page read and write
19C000
stack
page read and write
500000
heap
page read and write
4F28000
heap
page read and write
54E000
stack
page read and write
47B0000
heap
page read and write
33DE000
stack
page read and write
4F21000
heap
page read and write
3580000
heap
page read and write
4E0E000
stack
page read and write
4BA5000
heap
page read and write
581B000
stack
page read and write
26BE000
stack
page read and write
322F000
stack
page read and write
2BA0000
heap
page read and write
4BAB000
heap
page read and write
56D0000
heap
page read and write
180F000
stack
page read and write
5838000
heap
page read and write
40A000
heap
page read and write
DD0000
heap
page read and write
470000
heap
page read and write
56D7000
heap
page read and write
2AC0000
heap
page read and write
4F26000
heap
page read and write
43C0000
heap
page read and write
2DDB000
stack
page read and write
4FCF000
heap
page read and write
7F5E0000
direct allocation
page execute and read and write
350E000
stack
page read and write
4C3A000
heap
page read and write
4ECE000
stack
page read and write
538F000
stack
page read and write
29DE000
stack
page read and write
4940000
heap
page read and write
4470000
heap
page read and write
4FCD000
heap
page read and write
56DE000
heap
page read and write
4B90000
remote allocation
page read and write
57C6000
heap
page read and write
3FE0000
heap
page read and write
2D4A000
heap
page read and write
584D000
heap
page read and write
29D0000
heap
page read and write
4F2B000
heap
page read and write
6D0CF000
unkown
page read and write
2AA0000
heap
page read and write
4C4B000
heap
page read and write
56D0000
heap
page read and write
4A0000
heap
page read and write
4F0000
heap
page read and write
4BAA000
heap
page read and write
56DB000
heap
page read and write
34D0000
heap
page read and write
291A000
heap
page read and write
4D5A000
heap
page read and write
4C4D000
heap
page read and write
579A000
heap
page read and write
300E000
stack
page read and write
5784000
heap
page read and write
57F8000
heap
page read and write
2F4B000
stack
page read and write
2D80000
heap
page read and write
6D422000
unkown
page read and write
FD0000
heap
page read and write
57B1000
heap
page read and write
2FAE000
stack
page read and write
2EB000
stack
page read and write
31EE000
stack
page read and write
327E000
stack
page read and write
4C5B000
heap
page read and write
2A4E000
heap
page read and write
5792000
heap
page read and write
2EBF000
stack
page read and write
2A00000
heap
page read and write
4880000
remote allocation
page read and write
32C0000
heap
page read and write
4FFE000
heap
page read and write
357F000
heap
page read and write
4F2D000
heap
page read and write
35CE000
heap
page read and write
578D000
heap
page read and write
4BA0000
heap
page read and write
29EC000
stack
page read and write
4FE9000
heap
page read and write
4FFD000
heap
page read and write
29C5000
heap
page read and write
497C000
stack
page read and write
DE0000
heap
page read and write
57C0000
heap
page read and write
1638000
heap
page read and write
577D000
heap
page read and write
493E000
stack
page read and write
2F50000
heap
page read and write
5766000
heap
page read and write
2D3E000
stack
page read and write
56D2000
heap
page read and write
4BA3000
heap
page read and write
4F23000
heap
page read and write
25EE000
stack
page read and write
4CC2000
heap
page read and write
4B90000
remote allocation
page read and write
170000
heap
page read and write
25E9000
stack
page read and write
56D0000
heap
page read and write
56D5000
heap
page read and write
1CE000
stack
page read and write
4C63000
heap
page read and write
4F28000
heap
page read and write
4C21000
heap
page read and write
33D0000
heap
page read and write
4FBF000
heap
page read and write
There are 695 hidden memdumps, click here to show them.