IOC Report
n57kYr8YQW.dll

loading gif

Files

File Path
Type
Category
Malicious
n57kYr8YQW.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_179c87a774e29d2b1a37a03f881953e6c2ac927_7522e4b5_523f2ff1-0f9d-47c7-a7f5-50d8a8328fc2\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_88e9c7714235511c882c5cf68cc356ed44bb976_7522e4b5_51f7a9c7-1823-4e38-9491-999216950cb2\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_88e9c7714235511c882c5cf68cc356ed44bb976_7522e4b5_9573f0f9-eb1a-4019-862f-b313d4edf902\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7846.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 29 18:10:55 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER78C4.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER78F4.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9F85.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 29 18:11:05 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA070.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA10E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA11B.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 29 18:11:06 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA36E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA3BD.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\n57kYr8YQW.dll,BarCreate
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5212 -s 648
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\n57kYr8YQW.dll,BarDestroy
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\n57kYr8YQW.dll,BarFreeRec
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",BarCreate
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",BarDestroy
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",BarFreeRec
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeSetFocus
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeSetDirty
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeResize
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkePaint2
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeKillFocus
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeIsDirty
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeInitialize
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeGetCaretRect
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireMouseWheelEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireMouseEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireKeyUpEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireKeyPressEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireKeyDownEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireContextMenuEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFinalize
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeDestroyWebView
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeCreateWebView
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",dbkFCallWrapperAddr
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",__dbk_fcall_wrapper
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",TMethodImplementationIntercept
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",BarRecognize
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 640
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 640
There are 24 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProgramId
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
FileId
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LowerCaseLongPath
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LongPathHash
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Name
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
OriginalFileName
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Publisher
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Version
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinFileVersion
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinaryType
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductName
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductVersion
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LinkDate
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinProductVersion
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageFullName
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageRelativeId
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Size
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Language
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
IsOsComponent
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00B8F8B0D2B
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00B8F8B0D2B
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
444D000
direct allocation
page read and write
2ADF000
stack
page read and write
45E8000
direct allocation
page read and write
464D000
direct allocation
page read and write
449F000
direct allocation
page read and write
4730000
heap
page read and write
2DF0000
heap
page read and write
518000
unkown
page read and write
2620000
heap
page read and write
46F8000
direct allocation
page read and write
4463000
direct allocation
page read and write
4D4F000
direct allocation
page read and write
4D93000
direct allocation
page read and write
4F00000
heap
page read and write
2950000
heap
page read and write
44DE000
stack
page read and write
47FA000
direct allocation
page read and write
34EA000
heap
page read and write
2E5E000
stack
page read and write
2F40000
heap
page read and write
4D2A000
direct allocation
page read and write
44F0000
heap
page read and write
4C18000
direct allocation
page read and write
4C08000
direct allocation
page read and write
2E7F000
stack
page read and write
2C71000
unkown
page read and write
46DF000
stack
page read and write
2D2A000
heap
page read and write
2980000
heap
page read and write
2840000
heap
page read and write
2C6F000
stack
page read and write
4834000
direct allocation
page read and write
45FF000
direct allocation
page read and write
464C000
direct allocation
page read and write
46EC000
direct allocation
page read and write
474A000
direct allocation
page read and write
463D000
direct allocation
page read and write
4243000
direct allocation
page read and write
41FA000
direct allocation
page read and write
4C53000
direct allocation
page read and write
423C000
direct allocation
page read and write
4610000
heap
page read and write
513000
unkown
page write copy
2D20000
heap
page read and write
27B0000
heap
page read and write
2940000
heap
page read and write
44B4000
direct allocation
page read and write
469F000
stack
page read and write
270B000
stack
page read and write
26EE000
stack
page read and write
48EF000
direct allocation
page read and write
4808000
direct allocation
page read and write
2B5F000
stack
page read and write
2A3B000
stack
page read and write
4B68000
direct allocation
page read and write
309C000
stack
page read and write
273A000
heap
page read and write
4581000
direct allocation
page read and write
4B5A000
direct allocation
page read and write
4793000
direct allocation
page read and write
34E0000
heap
page read and write
41F2000
direct allocation
page read and write
2C7E000
stack
page read and write
4472000
direct allocation
page read and write
48D8000
direct allocation
page read and write
28B0000
heap
page read and write
49AF000
stack
page read and write
27BC000
stack
page read and write
265B000
stack
page read and write
4614000
direct allocation
page read and write
423C000
direct allocation
page read and write
297E000
stack
page read and write
2DC0000
heap
page read and write
463F000
direct allocation
page read and write
2C3C000
stack
page read and write
311A000
heap
page read and write
4B61000
direct allocation
page read and write
421F000
direct allocation
page read and write
2D60000
heap
page read and write
480F000
stack
page read and write
2B30000
heap
page read and write
1357000
heap
page read and write
28B0000
heap
page read and write
2EFA000
heap
page read and write
47A8000
direct allocation
page read and write
50F000
unkown
page read and write
3210000
heap
page read and write
424A000
direct allocation
page read and write
4EA3000
direct allocation
page read and write
4D6C000
direct allocation
page read and write
4D48000
direct allocation
page read and write
2FE0000
heap
page read and write
4522000
direct allocation
page read and write
2B60000
unkown
page readonly
28C0000
heap
page read and write
303C000
stack
page read and write
422D000
direct allocation
page read and write
2F20000
heap
page read and write
247C000
stack
page read and write
4820000
heap
page read and write
2DBE000
stack
page read and write
4C0A000
direct allocation
page read and write
2C5F000
stack
page read and write
2ADA000
heap
page read and write
3300000
heap
page read and write
44D8000
direct allocation
page read and write
271B000
stack
page read and write
44A6000
direct allocation
page read and write
4258000
direct allocation
page read and write
2E3E000
stack
page read and write
261E000
stack
page read and write
24BC000
stack
page read and write
3180000
heap
page read and write
424A000
direct allocation
page read and write
2A20000
heap
page read and write
2C2E000
stack
page read and write
284E000
stack
page read and write
4900000
heap
page read and write
46CF000
direct allocation
page read and write
4654000
direct allocation
page read and write
4818000
direct allocation
page read and write
31D0000
heap
page read and write
4631000
direct allocation
page read and write
27D0000
heap
page read and write
4768000
direct allocation
page read and write
32A0000
heap
page read and write
45A3000
direct allocation
page read and write
4D5D000
direct allocation
page read and write
30A0000
heap
page read and write
4612000
direct allocation
page read and write
4448000
direct allocation
page read and write
27C0000
heap
page read and write
4638000
direct allocation
page read and write
25BE000
stack
page read and write
44AD000
direct allocation
page read and write
334F000
stack
page read and write
2A60000
heap
page read and write
4868000
direct allocation
page read and write
2C3A000
heap
page read and write
2DE6000
direct allocation
page read and write
25DE000
stack
page read and write
421F000
direct allocation
page read and write
4C2F000
direct allocation
page read and write
443A000
direct allocation
page read and write
2C6E000
stack
page read and write
2D3A000
heap
page read and write
5180000
heap
page read and write
46E4000
direct allocation
page read and write
2D50000
heap
page read and write
4BE2000
direct allocation
page read and write
2CAF000
stack
page read and write
4491000
direct allocation
page read and write
4578000
direct allocation
page read and write
4C11000
direct allocation
page read and write
47E1000
direct allocation
page read and write
46E3000
direct allocation
page read and write
4818000
direct allocation
page read and write
4843000
direct allocation
page read and write
4466000
direct allocation
page read and write
4B3D000
direct allocation
page read and write
2B61000
unkown
page execute read
2DED000
direct allocation
page read and write
511000
unkown
page read and write
4E38000
direct allocation
page read and write
2C90000
heap
page read and write
4870000
heap
page read and write
2DD8000
direct allocation
page read and write
265E000
stack
page read and write
44C3000
direct allocation
page read and write
46A2000
direct allocation
page read and write
3200000
heap
page read and write
4586000
direct allocation
page read and write
34C0000
heap
page read and write
27D0000
heap
page read and write
2EF0000
heap
page read and write
2C0E000
stack
page read and write
4811000
direct allocation
page read and write
4E0D000
direct allocation
page read and write
4EB8000
direct allocation
page read and write
4D68000
direct allocation
page read and write
520000
unkown
page write copy
4D7A000
direct allocation
page read and write
522000
unkown
page readonly
2CEF000
stack
page read and write
451F000
stack
page read and write
2F50000
heap
page read and write
478C000
direct allocation
page read and write
4621000
direct allocation
page read and write
4FB0000
heap
page read and write
47DA000
direct allocation
page read and write
263F000
stack
page read and write
4D6F000
direct allocation
page read and write
477D000
direct allocation
page read and write
292C000
stack
page read and write
30D0000
heap
page read and write
4234000
direct allocation
page read and write
48F0000
heap
page read and write
4251000
direct allocation
page read and write
4201000
direct allocation
page read and write
293E000
stack
page read and write
289B000
stack
page read and write
4C36000
direct allocation
page read and write
2B40000
heap
page read and write
3110000
heap
page read and write
2C70000
unkown
page write copy
460D000
direct allocation
page read and write
4B36000
direct allocation
page read and write
322E000
stack
page read and write
4A6F000
stack
page read and write
2CF0000
heap
page read and write
4226000
direct allocation
page read and write
2950000
heap
page read and write
4DE1000
direct allocation
page read and write
24C0000
heap
page read and write
283C000
stack
page read and write
26DE000
stack
page read and write
2FCE000
stack
page read and write
510000
unkown
page write copy
2C8A000
heap
page read and write
2AB0000
heap
page read and write
458D000
direct allocation
page read and write
471E000
stack
page read and write
4D22000
direct allocation
page read and write
4DDA000
direct allocation
page read and write
344E000
stack
page read and write
25A0000
heap
page read and write
2890000
heap
page read and write
4826000
direct allocation
page read and write
29FE000
stack
page read and write
27C0000
heap
page read and write
2BBE000
stack
page read and write
4C33000
direct allocation
page read and write
459F000
direct allocation
page read and write
4531000
direct allocation
page read and write
456C000
direct allocation
page read and write
4251000
direct allocation
page read and write
2FB0000
heap
page read and write
2B1E000
stack
page read and write
49EE000
stack
page read and write
4C1D000
direct allocation
page read and write
4928000
direct allocation
page read and write
4913000
direct allocation
page read and write
34A0000
heap
page read and write
48AF000
stack
page read and write
4AF0000
heap
page read and write
4708000
direct allocation
page read and write
4602000
direct allocation
page read and write
4432000
direct allocation
page read and write
2DC1000
direct allocation
page read and write
47B6000
direct allocation
page read and write
2C7F000
unkown
page read and write
47F2000
direct allocation
page read and write
275C000
stack
page read and write
4201000
direct allocation
page read and write
445F000
direct allocation
page read and write
4D64000
direct allocation
page read and write
10FE000
stack
page read and write
483D000
direct allocation
page read and write
4860000
heap
page read and write
2EDE000
stack
page read and write
4208000
direct allocation
page read and write
2CB0000
heap
page read and write
4E86000
direct allocation
page read and write
3230000
heap
page read and write
247B000
stack
page read and write
2BEA000
heap
page read and write
45BF000
stack
page read and write
4C28000
direct allocation
page read and write
1140000
heap
page read and write
4552000
direct allocation
page read and write
2D50000
heap
page read and write
490C000
direct allocation
page read and write
2E50000
heap
page read and write
2660000
heap
page read and write
4844000
direct allocation
page read and write
26AF000
stack
page read and write
4646000
direct allocation
page read and write
4594000
direct allocation
page read and write
4538000
direct allocation
page read and write
2F80000
heap
page read and write
31BE000
stack
page read and write
45D8000
direct allocation
page read and write
2C30000
heap
page read and write
2B5F000
stack
page read and write
45D1000
direct allocation
page read and write
51D000
unkown
page read and write
29BF000
stack
page read and write
4C3D000
direct allocation
page read and write
2BAE000
stack
page read and write
2F40000
heap
page read and write
338E000
stack
page read and write
2B8E000
stack
page read and write
2CE0000
heap
page read and write
400000
unkown
page readonly
448A000
direct allocation
page read and write
2D20000
heap
page read and write
422D000
direct allocation
page read and write
4611000
direct allocation
page read and write
4201000
direct allocation
page read and write
2C60000
heap
page read and write
2A3F000
stack
page read and write
25FB000
stack
page read and write
2F70000
heap
page read and write
4621000
direct allocation
page read and write
44BC000
direct allocation
page read and write
288F000
stack
page read and write
4623000
direct allocation
page read and write
4208000
direct allocation
page read and write
277B000
stack
page read and write
4D58000
direct allocation
page read and write
4628000
direct allocation
page read and write
4D84000
direct allocation
page read and write
33CF000
stack
page read and write
4BF1000
direct allocation
page read and write
4421000
direct allocation
page read and write
2560000
heap
page read and write
303B000
stack
page read and write
462A000
direct allocation
page read and write
4751000
direct allocation
page read and write
4636000
direct allocation
page read and write
29AB000
stack
page read and write
153F000
stack
page read and write
2BEF000
stack
page read and write
2BFF000
stack
page read and write
47BD000
direct allocation
page read and write
45B8000
direct allocation
page read and write
47B2000
direct allocation
page read and write
4C0F000
direct allocation
page read and write
344F000
stack
page read and write
2440000
heap
page read and write
4412000
direct allocation
page read and write
2A30000
heap
page read and write
439E000
stack
page read and write
4CBE000
stack
page read and write
3400000
heap
page read and write
4B0A000
direct allocation
page read and write
518000
unkown
page read and write
4226000
direct allocation
page read and write
2C75000
unkown
page write copy
48FD000
direct allocation
page read and write
469A000
direct allocation
page read and write
2A30000
heap
page read and write
4D9A000
direct allocation
page read and write
307C000
stack
page read and write
2BCF000
stack
page read and write
2B00000
heap
page read and write
2E20000
heap
page read and write
2C80000
heap
page read and write
463F000
direct allocation
page read and write
513000
unkown
page write copy
47C1000
direct allocation
page read and write
4588000
direct allocation
page read and write
44CA000
direct allocation
page read and write
4438000
direct allocation
page read and write
44D1000
direct allocation
page read and write
28DC000
stack
page read and write
2CAA000
heap
page read and write
2890000
heap
page read and write
2BBE000
stack
page read and write
2C9C000
stack
page read and write
4380000
heap
page read and write
465E000
stack
page read and write
4D4A000
direct allocation
page read and write
457A000
direct allocation
page read and write
33DE000
stack
page read and write
4E61000
direct allocation
page read and write
4DA1000
direct allocation
page read and write
4828000
direct allocation
page read and write
46D0000
heap
page read and write
4548000
direct allocation
page read and write
134F000
heap
page read and write
4E1C000
direct allocation
page read and write
305B000
stack
page read and write
462F000
direct allocation
page read and write
4D31000
direct allocation
page read and write
4218000
direct allocation
page read and write
4B11000
direct allocation
page read and write
4C24000
direct allocation
page read and write
4C16000
direct allocation
page read and write
3050000
heap
page read and write
272F000
stack
page read and write
1300000
heap
page read and write
4880000
heap
page read and write
2C8A000
heap
page read and write
4851000
direct allocation
page read and write
2F9C000
stack
page read and write
481F000
direct allocation
page read and write
4BC0000
heap
page read and write
4258000
direct allocation
page read and write
1340000
heap
page read and write
2F80000
heap
page read and write
2AE0000
heap
page read and write
258C000
stack
page read and write
2A7E000
stack
page read and write
4E4B000
direct allocation
page read and write
2F40000
heap
page read and write
47B0000
heap
page read and write
270B000
stack
page read and write
480A000
direct allocation
page read and write
2DC8000
direct allocation
page read and write
465C000
direct allocation
page read and write
401000
unkown
page execute read
259C000
stack
page read and write
4921000
direct allocation
page read and write
2C3F000
stack
page read and write
4B00000
heap
page read and write
400000
unkown
page readonly
3100000
heap
page read and write
2ECC000
stack
page read and write
30EE000
stack
page read and write
274C000
stack
page read and write
445C000
direct allocation
page read and write
3460000
heap
page read and write
4782000
direct allocation
page read and write
4488000
direct allocation
page read and write
46B8000
direct allocation
page read and write
2DFF000
stack
page read and write
482F000
direct allocation
page read and write
494E000
stack
page read and write
4836000
direct allocation
page read and write
30F0000
heap
page read and write
2590000
heap
page read and write
4DA8000
direct allocation
page read and write
4BF8000
direct allocation
page read and write
461C000
direct allocation
page read and write
4598000
direct allocation
page read and write
2A30000
heap
page read and write
2A50000
heap
page read and write
2F5B000
stack
page read and write
2BE0000
heap
page read and write
2DFC000
direct allocation
page read and write
41F2000
direct allocation
page read and write
4E14000
direct allocation
page read and write
4D88000
direct allocation
page read and write
4861000
direct allocation
page read and write
10BE000
stack
page read and write
520000
unkown
page write copy
32AA000
heap
page read and write
4D42000
direct allocation
page read and write
2CD0000
heap
page read and write
4B53000
direct allocation
page read and write
45A6000
direct allocation
page read and write
2AD0000
heap
page read and write
4E68000
direct allocation
page read and write
30C0000
heap
page read and write
2800000
heap
page read and write
3120000
heap
page read and write
4C2C000
direct allocation
page read and write
4BEA000
direct allocation
page read and write
4E5A000
direct allocation
page read and write
2C82000
unkown
page readonly
33CF000
stack
page read and write
45DA000
direct allocation
page read and write
4853000
direct allocation
page read and write
4E8D000
direct allocation
page read and write
4478000
direct allocation
page read and write
4858000
direct allocation
page read and write
27EC000
stack
page read and write
3110000
heap
page read and write
25FB000
stack
page read and write
41FA000
direct allocation
page read and write
2B6F000
stack
page read and write
2E03000
direct allocation
page read and write
4D8C000
direct allocation
page read and write
45B4000
direct allocation
page read and write
4498000
direct allocation
page read and write
46B8000
direct allocation
page read and write
486E000
stack
page read and write
2EFF000
stack
page read and write
51D000
unkown
page read and write
266A000
heap
page read and write
46A1000
direct allocation
page read and write
4D7D000
direct allocation
page read and write
4F7F000
stack
page read and write
2E8B000
stack
page read and write
46F1000
direct allocation
page read and write
48CA000
direct allocation
page read and write
4243000
direct allocation
page read and write
521000
unkown
page read and write
2860000
heap
page read and write
2C80000
unkown
page write copy
328E000
stack
page read and write
4654000
direct allocation
page read and write
4E78000
direct allocation
page read and write
2F30000
heap
page read and write
46DC000
direct allocation
page read and write
2C5A000
heap
page read and write
46CD000
direct allocation
page read and write
29A0000
heap
page read and write
4C4C000
direct allocation
page read and write
4EAA000
direct allocation
page read and write
48BF000
stack
page read and write
2CEE000
stack
page read and write
2DB2000
direct allocation
page read and write
422D000
direct allocation
page read and write
4692000
direct allocation
page read and write
4904000
direct allocation
page read and write
49B0000
heap
page read and write
2BB0000
heap
page read and write
47A1000
direct allocation
page read and write
2720000
heap
page read and write
482D000
direct allocation
page read and write
4784000
direct allocation
page read and write
2BD0000
heap
page read and write
2A60000
heap
page read and write
2A20000
heap
page read and write
4E94000
direct allocation
page read and write
47BA000
direct allocation
page read and write
5030000
heap
page read and write
2C90000
heap
page read and write
47F4000
direct allocation
page read and write
4481000
direct allocation
page read and write
46BF000
direct allocation
page read and write
2530000
heap
page read and write
272A000
heap
page read and write
47E6000
direct allocation
page read and write
2EB0000
heap
page read and write
4471000
direct allocation
page read and write
4CFF000
stack
page read and write
2A7C000
stack
page read and write
452A000
direct allocation
page read and write
2EDC000
stack
page read and write
522000
unkown
page readonly
484C000
direct allocation
page read and write
484A000
direct allocation
page read and write
31C0000
heap
page read and write
424A000
direct allocation
page read and write
465C000
direct allocation
page read and write
243B000
stack
page read and write
4458000
direct allocation
page read and write
4251000
direct allocation
page read and write
2E8B000
stack
page read and write
340E000
stack
page read and write
4F90000
heap
page read and write
4850000
heap
page read and write
45C3000
direct allocation
page read and write
421F000
direct allocation
page read and write
2ECC000
stack
page read and write
51F000
unkown
page read and write
45AA000
direct allocation
page read and write
47C8000
direct allocation
page read and write
2C84000
unkown
page readonly
2A6A000
heap
page read and write
2AFF000
stack
page read and write
340F000
stack
page read and write
2B30000
heap
page read and write
4D76000
direct allocation
page read and write
4C41000
direct allocation
page read and write
4D73000
direct allocation
page read and write
460A000
direct allocation
page read and write
2C1E000
stack
page read and write
459C000
direct allocation
page read and write
2DBA000
direct allocation
page read and write
4C3A000
direct allocation
page read and write
271F000
stack
page read and write
4DCB000
direct allocation
page read and write
401000
unkown
page execute read
45BC000
direct allocation
page read and write
2B80000
heap
page read and write
4556000
direct allocation
page read and write
4776000
direct allocation
page read and write
48EE000
stack
page read and write
461F000
stack
page read and write
31CA000
heap
page read and write
32A0000
heap
page read and write
4646000
direct allocation
page read and write
47D8000
direct allocation
page read and write
2C7D000
unkown
page read and write
4483000
direct allocation
page read and write
2D30000
heap
page read and write
2C7E000
stack
page read and write
483C000
direct allocation
page read and write
4218000
direct allocation
page read and write
2F3F000
stack
page read and write
1070000
heap
page read and write
47D3000
direct allocation
page read and write
4606000
direct allocation
page read and write
2BA0000
heap
page read and write
457A000
direct allocation
page read and write
2DFB000
stack
page read and write
48E8000
direct allocation
page read and write
2CBA000
heap
page read and write
2810000
heap
page read and write
476F000
direct allocation
page read and write
46AA000
direct allocation
page read and write
2EF0000
heap
page read and write
2C3E000
stack
page read and write
2520000
heap
page read and write
4791000
direct allocation
page read and write
46EA000
direct allocation
page read and write
4568000
direct allocation
page read and write
4663000
direct allocation
page read and write
2AB0000
heap
page read and write
46A8000
direct allocation
page read and write
4E2A000
direct allocation
page read and write
254B000
stack
page read and write
4801000
direct allocation
page read and write
44EF000
stack
page read and write
277B000
stack
page read and write
4742000
direct allocation
page read and write
2C50000
heap
page read and write
328F000
stack
page read and write
328F000
stack
page read and write
2D2E000
stack
page read and write
4446000
direct allocation
page read and write
29DC000
stack
page read and write
269E000
stack
page read and write
30FF000
stack
page read and write
319E000
stack
page read and write
33BF000
stack
page read and write
21DC000
stack
page read and write
25B0000
heap
page read and write
27C0000
heap
page read and write
2DE0000
heap
page read and write
3490000
heap
page read and write
4811000
direct allocation
page read and write
2B40000
heap
page read and write
4618000
direct allocation
page read and write
4818000
direct allocation
page read and write
2BB0000
heap
page read and write
2CB0000
heap
page read and write
4A90000
heap
page read and write
47AF000
direct allocation
page read and write
2A3A000
heap
page read and write
4638000
direct allocation
page read and write
4DE8000
direct allocation
page read and write
41F2000
direct allocation
page read and write
2FBA000
heap
page read and write
28EB000
stack
page read and write
2A9E000
stack
page read and write
4E23000
direct allocation
page read and write
4644000
direct allocation
page read and write
45D2000
direct allocation
page read and write
4EB1000
direct allocation
page read and write
4454000
direct allocation
page read and write
2F7E000
stack
page read and write
2890000
heap
page read and write
2C81000
unkown
page read and write
31E0000
heap
page read and write
2990000
heap
page read and write
45F8000
direct allocation
page read and write
4628000
direct allocation
page read and write
283C000
stack
page read and write
48F6000
direct allocation
page read and write
4DFF000
direct allocation
page read and write
46D4000
direct allocation
page read and write
45B1000
direct allocation
page read and write
4E31000
direct allocation
page read and write
3290000
heap
page read and write
134B000
heap
page read and write
2DD0000
heap
page read and write
46B1000
direct allocation
page read and write
341F000
stack
page read and write
45E1000
direct allocation
page read and write
46D6000
direct allocation
page read and write
29CE000
stack
page read and write
F90000
heap
page read and write
4498000
direct allocation
page read and write
2520000
heap
page read and write
4573000
direct allocation
page read and write
2E9F000
stack
page read and write
46C6000
direct allocation
page read and write
4803000
direct allocation
page read and write
27BC000
stack
page read and write
4638000
direct allocation
page read and write
47C4000
direct allocation
page read and write
475F000
stack
page read and write
4D38000
direct allocation
page read and write
446D000
direct allocation
page read and write
324E000
stack
page read and write
4B28000
direct allocation
page read and write
4561000
direct allocation
page read and write
2DF4000
direct allocation
page read and write
2C6F000
unkown
page read and write
3420000
heap
page read and write
455D000
direct allocation
page read and write
299B000
stack
page read and write
4DF8000
direct allocation
page read and write
4C02000
direct allocation
page read and write
F3C000
stack
page read and write
46C8000
direct allocation
page read and write
47ED000
direct allocation
page read and write
2A6A000
heap
page read and write
2DDF000
direct allocation
page read and write
446A000
direct allocation
page read and write
492F000
stack
page read and write
4D81000
direct allocation
page read and write
2BD0000
heap
page read and write
E3C000
stack
page read and write
461A000
direct allocation
page read and write
4612000
direct allocation
page read and write
479A000
direct allocation
page read and write
4B4C000
direct allocation
page read and write
524000
unkown
page readonly
342A000
heap
page read and write
455A000
direct allocation
page read and write
480A000
direct allocation
page read and write
4A2F000
stack
page read and write
2870000
heap
page read and write
4B02000
direct allocation
page read and write
295A000
heap
page read and write
4572000
direct allocation
page read and write
4474000
direct allocation
page read and write
2E9B000
stack
page read and write
2800000
heap
page read and write
4490000
heap
page read and write
3170000
heap
page read and write
45CA000
direct allocation
page read and write
2C80000
heap
page read and write
46DD000
direct allocation
page read and write
524000
unkown
page readonly
2CAE000
stack
page read and write
4258000
direct allocation
page read and write
255B000
stack
page read and write
2C76000
unkown
page read and write
346A000
heap
page read and write
511000
unkown
page read and write
46F3000
direct allocation
page read and write
25F0000
heap
page read and write
47E8000
direct allocation
page read and write
457F000
direct allocation
page read and write
2C50000
heap
page read and write
4D56000
direct allocation
page read and write
2CB0000
heap
page read and write
274C000
stack
page read and write
47CE000
stack
page read and write
2C80000
heap
page read and write
4208000
direct allocation
page read and write
2730000
heap
page read and write
2C10000
heap
page read and write
266E000
stack
page read and write
2CE0000
heap
page read and write
26F0000
heap
page read and write
4B18000
direct allocation
page read and write
51F000
unkown
page read and write
41FA000
direct allocation
page read and write
4C44000
direct allocation
page read and write
447C000
direct allocation
page read and write
2FBE000
stack
page read and write
2990000
heap
page read and write
47FC000
direct allocation
page read and write
2B3A000
heap
page read and write
27AB000
stack
page read and write
4234000
direct allocation
page read and write
4564000
direct allocation
page read and write
4701000
direct allocation
page read and write
287A000
heap
page read and write
4B44000
direct allocation
page read and write
423C000
direct allocation
page read and write
29EC000
stack
page read and write
29DB000
stack
page read and write
47DF000
direct allocation
page read and write
4226000
direct allocation
page read and write
269C000
stack
page read and write
4802000
direct allocation
page read and write
4218000
direct allocation
page read and write
498F000
stack
page read and write
447A000
direct allocation
page read and write
2AD0000
heap
page read and write
46FA000
direct allocation
page read and write
4441000
direct allocation
page read and write
29B0000
heap
page read and write
45AD000
direct allocation
page read and write
124E000
stack
page read and write
4798000
direct allocation
page read and write
48D1000
direct allocation
page read and write
4E06000
direct allocation
page read and write
2CA0000
heap
page read and write
4653000
direct allocation
page read and write
2CEA000
heap
page read and write
2BF0000
heap
page read and write
4758000
direct allocation
page read and write
2B8E000
stack
page read and write
4E10000
heap
page read and write
4234000
direct allocation
page read and write
4C5A000
direct allocation
page read and write
464D000
direct allocation
page read and write
521000
unkown
page read and write
43DF000
stack
page read and write
443F000
direct allocation
page read and write
4428000
direct allocation
page read and write
3360000
heap
page read and write
50F000
unkown
page read and write
4E7F000
direct allocation
page read and write
25F0000
heap
page read and write
478A000
direct allocation
page read and write
510000
unkown
page write copy
4B2F000
direct allocation
page read and write
2D6F000
stack
page read and write
4E9C000
direct allocation
page read and write
219B000
stack
page read and write
2A0E000
stack
page read and write
441A000
direct allocation
page read and write
48C2000
direct allocation
page read and write
454F000
direct allocation
page read and write
485A000
direct allocation
page read and write
4243000
direct allocation
page read and write
461A000
direct allocation
page read and write
4628000
direct allocation
page read and write
2A60000
heap
page read and write
2C5B000
stack
page read and write
47CC000
direct allocation
page read and write
2F30000
heap
page read and write
4D51000
direct allocation
page read and write
47A8000
direct allocation
page read and write
491A000
direct allocation
page read and write
314E000
stack
page read and write
27B0000
heap
page read and write
There are 798 hidden memdumps, click here to show them.