IOC Report
KfHeFsr9Ce.dll

loading gif

Files

File Path
Type
Category
Malicious
KfHeFsr9Ce.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_c5d089c8cf748e1b13ba2105216189e689b02e_7522e4b5_13afcf82-ac04-4d3d-a715-aa7139a6a92a\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7334.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 29 18:14:54 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER73C2.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER73F2.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\KfHeFsr9Ce.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\KfHeFsr9Ce.dll",#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\KfHeFsr9Ce.dll,BarCreate
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\KfHeFsr9Ce.dll",#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 968 -s 648
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\KfHeFsr9Ce.dll,BarDestroy
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\KfHeFsr9Ce.dll,BarFreeRec
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\KfHeFsr9Ce.dll",BarCreate
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\KfHeFsr9Ce.dll",BarDestroy
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\KfHeFsr9Ce.dll",BarFreeRec
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\KfHeFsr9Ce.dll",wkeSetFocus
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\KfHeFsr9Ce.dll",wkeSetDirty
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\KfHeFsr9Ce.dll",wkeResize
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\KfHeFsr9Ce.dll",wkePaint2
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\KfHeFsr9Ce.dll",wkeKillFocus
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\KfHeFsr9Ce.dll",wkeIsDirty
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\KfHeFsr9Ce.dll",wkeInitialize
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\KfHeFsr9Ce.dll",wkeGetCaretRect
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\KfHeFsr9Ce.dll",wkeFireMouseWheelEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\KfHeFsr9Ce.dll",wkeFireMouseEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\KfHeFsr9Ce.dll",wkeFireKeyUpEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\KfHeFsr9Ce.dll",wkeFireKeyPressEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\KfHeFsr9Ce.dll",wkeFireKeyDownEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\KfHeFsr9Ce.dll",wkeFireContextMenuEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\KfHeFsr9Ce.dll",wkeFinalize
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\KfHeFsr9Ce.dll",wkeDestroyWebView
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\KfHeFsr9Ce.dll",wkeCreateWebView
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\KfHeFsr9Ce.dll",dbkFCallWrapperAddr
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\KfHeFsr9Ce.dll",__dbk_fcall_wrapper
There are 20 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Domains

Name
IP
Malicious
198.187.3.20.in-addr.arpa
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{3da78a33-81b6-1908-3f8d-406bfd4bf764}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProgramId
\REGISTRY\A\{3da78a33-81b6-1908-3f8d-406bfd4bf764}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
FileId
\REGISTRY\A\{3da78a33-81b6-1908-3f8d-406bfd4bf764}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LowerCaseLongPath
\REGISTRY\A\{3da78a33-81b6-1908-3f8d-406bfd4bf764}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LongPathHash
\REGISTRY\A\{3da78a33-81b6-1908-3f8d-406bfd4bf764}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Name
\REGISTRY\A\{3da78a33-81b6-1908-3f8d-406bfd4bf764}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
OriginalFileName
\REGISTRY\A\{3da78a33-81b6-1908-3f8d-406bfd4bf764}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Publisher
\REGISTRY\A\{3da78a33-81b6-1908-3f8d-406bfd4bf764}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Version
\REGISTRY\A\{3da78a33-81b6-1908-3f8d-406bfd4bf764}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinFileVersion
\REGISTRY\A\{3da78a33-81b6-1908-3f8d-406bfd4bf764}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinaryType
\REGISTRY\A\{3da78a33-81b6-1908-3f8d-406bfd4bf764}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductName
\REGISTRY\A\{3da78a33-81b6-1908-3f8d-406bfd4bf764}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductVersion
\REGISTRY\A\{3da78a33-81b6-1908-3f8d-406bfd4bf764}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LinkDate
\REGISTRY\A\{3da78a33-81b6-1908-3f8d-406bfd4bf764}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinProductVersion
\REGISTRY\A\{3da78a33-81b6-1908-3f8d-406bfd4bf764}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageFullName
\REGISTRY\A\{3da78a33-81b6-1908-3f8d-406bfd4bf764}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageRelativeId
\REGISTRY\A\{3da78a33-81b6-1908-3f8d-406bfd4bf764}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Size
\REGISTRY\A\{3da78a33-81b6-1908-3f8d-406bfd4bf764}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Language
\REGISTRY\A\{3da78a33-81b6-1908-3f8d-406bfd4bf764}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
IsOsComponent
\REGISTRY\A\{3da78a33-81b6-1908-3f8d-406bfd4bf764}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
314E000
stack
page read and write
489D000
direct allocation
page read and write
25B0000
heap
page read and write
2F30000
heap
page read and write
49DF000
stack
page read and write
284A000
heap
page read and write
270F000
stack
page read and write
2DC000
stack
page read and write
435F000
direct allocation
page read and write
48C1000
direct allocation
page read and write
4232000
direct allocation
page read and write
283F000
stack
page read and write
4B9F000
stack
page read and write
2F10000
heap
page read and write
4CB0000
heap
page read and write
47E2000
direct allocation
page read and write
4544000
direct allocation
page read and write
4550000
heap
page read and write
417F000
stack
page read and write
44D3000
direct allocation
page read and write
416E000
stack
page read and write
263C000
stack
page read and write
2AB0000
heap
page read and write
43E8000
direct allocation
page read and write
469D000
direct allocation
page read and write
2740000
heap
page read and write
2E7B000
stack
page read and write
4F98000
direct allocation
page read and write
437C000
direct allocation
page read and write
4696000
direct allocation
page read and write
4B91000
direct allocation
page read and write
4BE3000
direct allocation
page read and write
43DF000
stack
page read and write
501F000
stack
page read and write
4C0E000
stack
page read and write
48C8000
direct allocation
page read and write
4C93000
direct allocation
page read and write
33F6000
direct allocation
page read and write
4FB6000
direct allocation
page read and write
2F30000
heap
page read and write
412F000
stack
page read and write
4F7C000
direct allocation
page read and write
423A000
direct allocation
page read and write
448A000
direct allocation
page read and write
2C7F000
stack
page read and write
44AF000
direct allocation
page read and write
44CC000
direct allocation
page read and write
42D1000
unkown
page read and write
4E0E000
stack
page read and write
2CD0000
heap
page read and write
2740000
heap
page read and write
4871000
direct allocation
page read and write
32BC000
stack
page read and write
3080000
heap
page read and write
30DA000
heap
page read and write
2B5A000
heap
page read and write
47BA000
direct allocation
page read and write
4401000
direct allocation
page read and write
26F0000
heap
page read and write
41AF000
stack
page read and write
86F000
heap
page read and write
4536000
direct allocation
page read and write
4CA8000
direct allocation
page read and write
4211000
direct allocation
page read and write
4341000
direct allocation
page read and write
42D4000
unkown
page readonly
3160000
heap
page read and write
452F000
stack
page read and write
41B1000
unkown
page execute read
466A000
direct allocation
page read and write
2F5F000
stack
page read and write
41BD000
direct allocation
page read and write
513000
unkown
page write copy
310A000
heap
page read and write
4BEA000
direct allocation
page read and write
259F000
stack
page read and write
34B0000
heap
page read and write
4518000
direct allocation
page read and write
4491000
direct allocation
page read and write
44A8000
direct allocation
page read and write
41B6000
direct allocation
page read and write
4A34000
direct allocation
page read and write
2FCE000
stack
page read and write
26B0000
heap
page read and write
2D40000
heap
page read and write
263C000
stack
page read and write
3404000
direct allocation
page read and write
2BEF000
stack
page read and write
4B9A000
direct allocation
page read and write
2A8F000
stack
page read and write
436E000
stack
page read and write
51F000
unkown
page read and write
33CA000
direct allocation
page read and write
43D2000
direct allocation
page read and write
4760000
heap
page read and write
41D3000
direct allocation
page read and write
4348000
direct allocation
page read and write
4BDC000
direct allocation
page read and write
4F5F000
direct allocation
page read and write
2D30000
heap
page read and write
44BD000
direct allocation
page read and write
4BE8000
direct allocation
page read and write
2DA0000
heap
page read and write
3700000
heap
page read and write
269E000
stack
page read and write
254F000
direct allocation
page read and write
31AE000
stack
page read and write
2FB0000
heap
page read and write
2D9A000
heap
page read and write
2D00000
heap
page read and write
3428000
direct allocation
page read and write
2920000
heap
page read and write
4C4A000
direct allocation
page read and write
29A0000
heap
page read and write
43F3000
direct allocation
page read and write
4BF1000
direct allocation
page read and write
3200000
heap
page read and write
452F000
direct allocation
page read and write
4816000
direct allocation
page read and write
4511000
direct allocation
page read and write
800000
heap
page read and write
2BAE000
stack
page read and write
4F91000
direct allocation
page read and write
4553000
direct allocation
page read and write
4AAE000
stack
page read and write
30FE000
stack
page read and write
4BC8000
direct allocation
page read and write
30D0000
heap
page read and write
3100000
heap
page read and write
33E8000
direct allocation
page read and write
33EF000
direct allocation
page read and write
43F8000
direct allocation
page read and write
2A40000
heap
page read and write
4671000
direct allocation
page read and write
43DD000
direct allocation
page read and write
30D0000
heap
page read and write
4ED0000
heap
page read and write
30E0000
heap
page read and write
4383000
direct allocation
page read and write
310A000
heap
page read and write
2CFB000
stack
page read and write
4B6A000
direct allocation
page read and write
34A0000
heap
page read and write
42BF000
unkown
page read and write
51D000
unkown
page read and write
27DC000
stack
page read and write
262F000
stack
page read and write
4511000
direct allocation
page read and write
4896000
direct allocation
page read and write
4358000
direct allocation
page read and write
41DA000
direct allocation
page read and write
4C76000
direct allocation
page read and write
2C3B000
stack
page read and write
4FA8000
direct allocation
page read and write
426D000
direct allocation
page read and write
2FF0000
heap
page read and write
4688000
direct allocation
page read and write
3200000
heap
page read and write
4498000
direct allocation
page read and write
2581000
direct allocation
page read and write
2DB0000
heap
page read and write
257A000
direct allocation
page read and write
4803000
direct allocation
page read and write
4C93000
direct allocation
page read and write
41B0000
unkown
page readonly
2F10000
heap
page read and write
4536000
direct allocation
page read and write
2AAF000
stack
page read and write
448A000
direct allocation
page read and write
273E000
stack
page read and write
4482000
direct allocation
page read and write
4758000
direct allocation
page read and write
287C000
stack
page read and write
2B9F000
stack
page read and write
4FBD000
direct allocation
page read and write
305B000
stack
page read and write
2AE0000
heap
page read and write
3421000
direct allocation
page read and write
44B6000
direct allocation
page read and write
21DB000
stack
page read and write
41A8000
direct allocation
page read and write
47C8000
direct allocation
page read and write
41D8000
direct allocation
page read and write
4F58000
direct allocation
page read and write
41FC000
direct allocation
page read and write
490F000
stack
page read and write
4C8C000
direct allocation
page read and write
454C000
direct allocation
page read and write
4C58000
direct allocation
page read and write
43CF000
direct allocation
page read and write
2E3B000
stack
page read and write
275B000
stack
page read and write
4B8A000
direct allocation
page read and write
4B82000
direct allocation
page read and write
2A4F000
stack
page read and write
4BCD000
direct allocation
page read and write
4C68000
direct allocation
page read and write
2CE0000
heap
page read and write
26BC000
stack
page read and write
4544000
direct allocation
page read and write
42C1000
unkown
page read and write
2350000
heap
page read and write
4291000
direct allocation
page read and write
2660000
heap
page read and write
283B000
stack
page read and write
43EC000
direct allocation
page read and write
26A0000
heap
page read and write
2C6A000
heap
page read and write
48DE000
stack
page read and write
2ECE000
stack
page read and write
2B80000
heap
page read and write
4BBA000
direct allocation
page read and write
303E000
stack
page read and write
4748000
direct allocation
page read and write
425F000
direct allocation
page read and write
23DB000
stack
page read and write
29AB000
stack
page read and write
349F000
stack
page read and write
3340000
heap
page read and write
49FA000
direct allocation
page read and write
41F4000
direct allocation
page read and write
2590000
heap
page read and write
4553000
direct allocation
page read and write
4FAF000
direct allocation
page read and write
23FC000
stack
page read and write
315E000
stack
page read and write
4C7D000
direct allocation
page read and write
252A000
direct allocation
page read and write
244E000
stack
page read and write
680000
heap
page read and write
2D4A000
heap
page read and write
43E4000
direct allocation
page read and write
4F66000
direct allocation
page read and write
4CD0000
heap
page read and write
2DC0000
heap
page read and write
41DF000
direct allocation
page read and write
2850000
heap
page read and write
26CE000
stack
page read and write
454C000
direct allocation
page read and write
2ABF000
stack
page read and write
341A000
direct allocation
page read and write
2F7A000
heap
page read and write
44BD000
direct allocation
page read and write
4F83000
direct allocation
page read and write
2F70000
heap
page read and write
2588000
direct allocation
page read and write
5110000
heap
page read and write
4C68000
direct allocation
page read and write
23EE000
stack
page read and write
455A000
direct allocation
page read and write
4C51000
direct allocation
page read and write
44DA000
direct allocation
page read and write
2F60000
heap
page read and write
343E000
stack
page read and write
303B000
stack
page read and write
499F000
stack
page read and write
2560000
heap
page read and write
41E6000
direct allocation
page read and write
42D2000
unkown
page readonly
28EB000
stack
page read and write
33F0000
heap
page read and write
30E0000
heap
page read and write
41AF000
direct allocation
page read and write
4BAF000
direct allocation
page read and write
4A4A000
direct allocation
page read and write
2A6E000
stack
page read and write
42C6000
unkown
page read and write
287A000
heap
page read and write
274A000
heap
page read and write
31FA000
heap
page read and write
4B0A000
direct allocation
page read and write
4F3A000
direct allocation
page read and write
4E7F000
stack
page read and write
4F91000
direct allocation
page read and write
4518000
direct allocation
page read and write
42C5000
unkown
page write copy
495E000
stack
page read and write
4B78000
direct allocation
page read and write
448A000
direct allocation
page read and write
42CF000
unkown
page read and write
311E000
stack
page read and write
4ADF000
direct allocation
page read and write
436D000
direct allocation
page read and write
279B000
stack
page read and write
2D90000
heap
page read and write
452F000
direct allocation
page read and write
4F98000
direct allocation
page read and write
46A4000
direct allocation
page read and write
518000
unkown
page read and write
433A000
direct allocation
page read and write
3000000
heap
page read and write
481D000
direct allocation
page read and write
4C51000
direct allocation
page read and write
44AF000
direct allocation
page read and write
4CA1000
direct allocation
page read and write
475F000
direct allocation
page read and write
522000
unkown
page readonly
23BB000
stack
page read and write
283E000
stack
page read and write
7DE000
stack
page read and write
2A7E000
stack
page read and write
33AE000
stack
page read and write
24DC000
stack
page read and write
2E30000
heap
page read and write
3090000
heap
page read and write
327B000
stack
page read and write
33D8000
direct allocation
page read and write
263F000
stack
page read and write
4B71000
direct allocation
page read and write
27C0000
heap
page read and write
4B40000
heap
page read and write
4B88000
direct allocation
page read and write
4ABA000
direct allocation
page read and write
4808000
direct allocation
page read and write
43B1000
direct allocation
page read and write
26E0000
heap
page read and write
285A000
heap
page read and write
640000
heap
page read and write
4498000
direct allocation
page read and write
2A0E000
stack
page read and write
79E000
stack
page read and write
4482000
direct allocation
page read and write
650000
heap
page read and write
316A000
heap
page read and write
441C000
direct allocation
page read and write
4C9A000
direct allocation
page read and write
4406000
direct allocation
page read and write
2F70000
heap
page read and write
4BC1000
direct allocation
page read and write
25EE000
stack
page read and write
401000
unkown
page execute read
2573000
direct allocation
page read and write
43AE000
stack
page read and write
2F8F000
stack
page read and write
2A70000
heap
page read and write
4F74000
direct allocation
page read and write
4A1F000
direct allocation
page read and write
4366000
direct allocation
page read and write
2940000
heap
page read and write
3380000
heap
page read and write
42D0000
unkown
page write copy
2480000
heap
page read and write
2580000
heap
page read and write
4491000
direct allocation
page read and write
4BA8000
direct allocation
page read and write
4774000
direct allocation
page read and write
41C4000
direct allocation
page read and write
2B8B000
stack
page read and write
27B0000
heap
page read and write
2580000
heap
page read and write
4B5F000
stack
page read and write
323C000
stack
page read and write
4F8A000
direct allocation
page read and write
43FF000
direct allocation
page read and write
4B96000
direct allocation
page read and write
365F000
stack
page read and write
2B30000
heap
page read and write
336F000
stack
page read and write
2E7B000
stack
page read and write
427C000
direct allocation
page read and write
4A3C000
direct allocation
page read and write
2EEE000
stack
page read and write
328E000
stack
page read and write
4A18000
direct allocation
page read and write
46AC000
direct allocation
page read and write
263B000
stack
page read and write
32E0000
heap
page read and write
40FF000
stack
page read and write
33D1000
direct allocation
page read and write
2540000
heap
page read and write
47B2000
direct allocation
page read and write
2FFB000
stack
page read and write
2B50000
heap
page read and write
49F2000
direct allocation
page read and write
2340000
heap
page read and write
4BD3000
direct allocation
page read and write
25CE000
stack
page read and write
3210000
heap
page read and write
4870000
heap
page read and write
41C1000
direct allocation
page read and write
2D0B000
stack
page read and write
2EFF000
stack
page read and write
279C000
stack
page read and write
25D0000
heap
page read and write
2D4C000
stack
page read and write
4B5E000
stack
page read and write
33C0000
heap
page read and write
4960000
heap
page read and write
29EC000
stack
page read and write
3330000
heap
page read and write
47ED000
direct allocation
page read and write
2F20000
heap
page read and write
2720000
heap
page read and write
453D000
direct allocation
page read and write
4502000
direct allocation
page read and write
294A000
heap
page read and write
2C60000
heap
page read and write
440D000
direct allocation
page read and write
29CF000
stack
page read and write
2564000
direct allocation
page read and write
4203000
direct allocation
page read and write
41E8000
direct allocation
page read and write
47FC000
direct allocation
page read and write
4BB3000
direct allocation
page read and write
4CFF000
stack
page read and write
4431000
direct allocation
page read and write
482C000
direct allocation
page read and write
4FC4000
direct allocation
page read and write
4414000
direct allocation
page read and write
292C000
stack
page read and write
4258000
direct allocation
page read and write
46D0000
heap
page read and write
4408000
direct allocation
page read and write
4C6F000
direct allocation
page read and write
2880000
heap
page read and write
26AA000
heap
page read and write
44B6000
direct allocation
page read and write
43B8000
direct allocation
page read and write
35DF000
stack
page read and write
340C000
direct allocation
page read and write
28E0000
heap
page read and write
4AC8000
direct allocation
page read and write
2D60000
heap
page read and write
2390000
heap
page read and write
489F000
stack
page read and write
4BAC000
direct allocation
page read and write
44E8000
direct allocation
page read and write
33D0000
heap
page read and write
4833000
direct allocation
page read and write
520000
unkown
page write copy
4A2D000
direct allocation
page read and write
480F000
direct allocation
page read and write
2548000
direct allocation
page read and write
4B62000
direct allocation
page read and write
B5F000
stack
page read and write
4BF8000
direct allocation
page read and write
2A20000
heap
page read and write
307C000
stack
page read and write
2570000
heap
page read and write
4BB6000
direct allocation
page read and write
307F000
stack
page read and write
307E000
stack
page read and write
2ED0000
heap
page read and write
4FDE000
stack
page read and write
A5F000
stack
page read and write
420A000
direct allocation
page read and write
3413000
direct allocation
page read and write
453D000
direct allocation
page read and write
298E000
stack
page read and write
4A51000
direct allocation
page read and write
3040000
heap
page read and write
31EF000
stack
page read and write
2FE0000
heap
page read and write
4766000
direct allocation
page read and write
4862000
direct allocation
page read and write
3F8F000
stack
page read and write
2F4E000
stack
page read and write
40BE000
stack
page read and write
FB000
stack
page read and write
317A000
heap
page read and write
4A08000
direct allocation
page read and write
278A000
heap
page read and write
4741000
direct allocation
page read and write
447B000
direct allocation
page read and write
4B03000
direct allocation
page read and write
280E000
stack
page read and write
4568000
direct allocation
page read and write
30CF000
stack
page read and write
860000
heap
page read and write
4561000
direct allocation
page read and write
400000
unkown
page readonly
4C42000
direct allocation
page read and write
2800000
heap
page read and write
43AF000
stack
page read and write
287E000
stack
page read and write
4B18000
direct allocation
page read and write
2B5E000
stack
page read and write
4BBD000
direct allocation
page read and write
4FD3000
direct allocation
page read and write
2780000
heap
page read and write
4B11000
direct allocation
page read and write
4CA8000
direct allocation
page read and write
2870000
heap
page read and write
34BA000
heap
page read and write
33FD000
direct allocation
page read and write
43E1000
direct allocation
page read and write
4A58000
direct allocation
page read and write
2E7C000
stack
page read and write
2360000
heap
page read and write
488F000
direct allocation
page read and write
450A000
direct allocation
page read and write
229B000
stack
page read and write
2F0F000
stack
page read and write
26BA000
heap
page read and write
4AF4000
direct allocation
page read and write
4241000
direct allocation
page read and write
4AC1000
direct allocation
page read and write
4E80000
heap
page read and write
4BB8000
direct allocation
page read and write
43C0000
heap
page read and write
4BDA000
direct allocation
page read and write
4BD4000
direct allocation
page read and write
4248000
direct allocation
page read and write
4662000
direct allocation
page read and write
4824000
direct allocation
page read and write
21D0000
heap
page read and write
2D0E000
stack
page read and write
256C000
direct allocation
page read and write
4C76000
direct allocation
page read and write
4BCC000
direct allocation
page read and write
26D0000
heap
page read and write
2690000
heap
page read and write
48B3000
direct allocation
page read and write
25F0000
heap
page read and write
4F82000
direct allocation
page read and write
491F000
stack
page read and write
4C8C000
direct allocation
page read and write
47D8000
direct allocation
page read and write
303E000
stack
page read and write
2531000
direct allocation
page read and write
44A8000
direct allocation
page read and write
4491000
direct allocation
page read and write
2CC0000
heap
page read and write
255D000
direct allocation
page read and write
4AFC000
direct allocation
page read and write
2640000
heap
page read and write
4E30000
heap
page read and write
4191000
direct allocation
page read and write
44C4000
direct allocation
page read and write
4790000
heap
page read and write
2B2E000
stack
page read and write
4A43000
direct allocation
page read and write
2AE0000
heap
page read and write
2D90000
heap
page read and write
4374000
direct allocation
page read and write
2D3C000
stack
page read and write
48AC000
direct allocation
page read and write
2840000
heap
page read and write
32A0000
heap
page read and write
4BA4000
direct allocation
page read and write
3100000
heap
page read and write
4A80000
heap
page read and write
4182000
direct allocation
page read and write
26CA000
heap
page read and write
2CEA000
heap
page read and write
361E000
stack
page read and write
42C0000
unkown
page write copy
41BA000
direct allocation
page read and write
4CA1000
direct allocation
page read and write
4561000
direct allocation
page read and write
2C50000
heap
page read and write
521000
unkown
page read and write
476D000
direct allocation
page read and write
2B60000
heap
page read and write
4F6D000
direct allocation
page read and write
477C000
direct allocation
page read and write
44BD000
direct allocation
page read and write
3450000
heap
page read and write
42CD000
unkown
page read and write
44DA000
direct allocation
page read and write
4DA0000
heap
page read and write
486A000
direct allocation
page read and write
307F000
stack
page read and write
4283000
direct allocation
page read and write
4BA8000
direct allocation
page read and write
4F8A000
direct allocation
page read and write
47DF000
direct allocation
page read and write
47C1000
direct allocation
page read and write
44CC000
direct allocation
page read and write
450A000
direct allocation
page read and write
4AB2000
direct allocation
page read and write
4678000
direct allocation
page read and write
4274000
direct allocation
page read and write
44D3000
direct allocation
page read and write
4B9D000
direct allocation
page read and write
243C000
stack
page read and write
413E000
stack
page read and write
4BBF000
direct allocation
page read and write
24CB000
stack
page read and write
30B0000
heap
page read and write
33BB000
direct allocation
page read and write
315F000
stack
page read and write
43FA000
direct allocation
page read and write
4878000
direct allocation
page read and write
43AA000
direct allocation
page read and write
2BE0000
heap
page read and write
2A40000
heap
page read and write
47F1000
direct allocation
page read and write
2680000
heap
page read and write
3290000
heap
page read and write
267B000
stack
page read and write
2EE0000
heap
page read and write
4498000
direct allocation
page read and write
4BE1000
direct allocation
page read and write
4888000
direct allocation
page read and write
2B20000
heap
page read and write
2522000
direct allocation
page read and write
41B2000
direct allocation
page read and write
4E50000
heap
page read and write
2556000
direct allocation
page read and write
2538000
direct allocation
page read and write
468F000
direct allocation
page read and write
4502000
direct allocation
page read and write
5170000
heap
page read and write
43A2000
direct allocation
page read and write
48BA000
direct allocation
page read and write
4C4F000
stack
page read and write
4C6F000
direct allocation
page read and write
4C58000
direct allocation
page read and write
4BC4000
direct allocation
page read and write
44E1000
direct allocation
page read and write
480A000
direct allocation
page read and write
2F00000
heap
page read and write
2EBC000
stack
page read and write
3DC000
stack
page read and write
3170000
heap
page read and write
310D000
stack
page read and write
2FAE000
stack
page read and write
4D20000
heap
page read and write
442A000
direct allocation
page read and write
44E1000
direct allocation
page read and write
4A26000
direct allocation
page read and write
2DB0000
heap
page read and write
4F32000
direct allocation
page read and write
47F8000
direct allocation
page read and write
4818000
direct allocation
page read and write
4BA1000
direct allocation
page read and write
249B000
stack
page read and write
309C000
stack
page read and write
4B8F000
direct allocation
page read and write
2670000
heap
page read and write
44B6000
direct allocation
page read and write
4266000
direct allocation
page read and write
4FDA000
direct allocation
page read and write
50F000
unkown
page read and write
33BE000
stack
page read and write
4360000
heap
page read and write
483A000
direct allocation
page read and write
4811000
direct allocation
page read and write
4C4A000
direct allocation
page read and write
4AE6000
direct allocation
page read and write
2C7C000
stack
page read and write
4C9A000
direct allocation
page read and write
23CB000
stack
page read and write
4C84000
direct allocation
page read and write
2DBA000
heap
page read and write
2EBE000
stack
page read and write
2C3E000
stack
page read and write
2460000
heap
page read and write
2A00000
heap
page read and write
28CF000
stack
page read and write
4C84000
direct allocation
page read and write
4423000
direct allocation
page read and write
4298000
direct allocation
page read and write
43C8000
direct allocation
page read and write
4C42000
direct allocation
page read and write
428A000
direct allocation
page read and write
41E1000
direct allocation
page read and write
2DD0000
heap
page read and write
2AD0000
heap
page read and write
43D6000
direct allocation
page read and write
4B92000
direct allocation
page read and write
47EA000
direct allocation
page read and write
36B0000
heap
page read and write
2DA0000
heap
page read and write
418A000
direct allocation
page read and write
3450000
heap
page read and write
22DC000
stack
page read and write
29C0000
heap
page read and write
4BC6000
direct allocation
page read and write
33DA000
heap
page read and write
31F0000
heap
page read and write
30EA000
heap
page read and write
473A000
direct allocation
page read and write
44AF000
direct allocation
page read and write
2F20000
heap
page read and write
47F4000
direct allocation
page read and write
2A60000
heap
page read and write
2750000
heap
page read and write
41CC000
direct allocation
page read and write
44C4000
direct allocation
page read and write
86B000
heap
page read and write
250C000
stack
page read and write
284F000
stack
page read and write
2F30000
heap
page read and write
442F000
stack
page read and write
32F0000
heap
page read and write
44A8000
direct allocation
page read and write
4848000
direct allocation
page read and write
4332000
direct allocation
page read and write
2680000
heap
page read and write
13C000
stack
page read and write
21C0000
heap
page read and write
2650000
heap
page read and write
4438000
direct allocation
page read and write
4841000
direct allocation
page read and write
4783000
direct allocation
page read and write
4568000
direct allocation
page read and write
347F000
stack
page read and write
3500000
heap
page read and write
4C7D000
direct allocation
page read and write
4528000
direct allocation
page read and write
510000
unkown
page write copy
267C000
stack
page read and write
44C0000
heap
page read and write
4FCC000
direct allocation
page read and write
450E000
stack
page read and write
268E000
stack
page read and write
4A01000
direct allocation
page read and write
4AD8000
direct allocation
page read and write
4198000
direct allocation
page read and write
2EBC000
stack
page read and write
485E000
stack
page read and write
2690000
heap
page read and write
524000
unkown
page readonly
4F41000
direct allocation
page read and write
48A4000
direct allocation
page read and write
4F48000
direct allocation
page read and write
511000
unkown
page read and write
26C0000
heap
page read and write
2BCC000
stack
page read and write
2AB0000
heap
page read and write
43DA000
direct allocation
page read and write
2990000
heap
page read and write
2D7F000
stack
page read and write
4AED000
direct allocation
page read and write
2550000
heap
page read and write
454F000
stack
page read and write
47E6000
direct allocation
page read and write
41ED000
direct allocation
page read and write
4B98000
direct allocation
page read and write
343E000
stack
page read and write
455A000
direct allocation
page read and write
246A000
heap
page read and write
4528000
direct allocation
page read and write
4732000
direct allocation
page read and write
4520000
heap
page read and write
41C8000
direct allocation
page read and write
There are 728 hidden memdumps, click here to show them.