IOC Report
mpclient.dll

loading gif

Files

File Path
Type
Category
Malicious
mpclient.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_20f9428fc69f80b8fcc03e3341cbf863e0bcfdc7_7522e4b5_52103b4a-3fcb-4747-9090-aad0eb711ac4\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_20f9428fc69f80b8fcc03e3341cbf863e0bcfdc7_7522e4b5_ab4840ec-f641-4ca3-ac94-4c3332b26cf8\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_9c8c3888a72df77b28b6ce79de7796e2729c18e5_7522e4b5_aae2bca9-da81-47d2-81db-5aabcf737fdc\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1F93.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Feb 21 20:30:55 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER20BD.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER211C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER48A7.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Feb 21 20:31:06 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4B95.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Feb 21 20:31:07 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4DD8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4DF7.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4E18.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4E47.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\mpclient.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\mpclient.dll",#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\mpclient.dll,MpAddDynamicSignatureFile
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\mpclient.dll",#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 696
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\mpclient.dll,MpAllocMemory
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\mpclient.dll,MpCleanOpen
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\mpclient.dll",MpAddDynamicSignatureFile
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\mpclient.dll",MpAllocMemory
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\mpclient.dll",MpCleanOpen
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\mpclient.dll",dbkFCallWrapperAddr
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\mpclient.dll",__dbk_fcall_wrapper
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\mpclient.dll",TMethodImplementationIntercept
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\mpclient.dll",MpWDEnable
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\mpclient.dll",MpUtilsExportFunctions
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\mpclient.dll",MpUpdateTSModeEx
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\mpclient.dll",MpUpdateStartEx
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\mpclient.dll",MpUpdateStart
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\mpclient.dll",MpUpdatePlatform
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7784 -s 688
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\mpclient.dll",MpUnblockSignatures
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\mpclient.dll",MpUnblockPlatform
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\mpclient.dll",MpUnblockEngine
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7820 -s 688
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\mpclient.dll",MpThreatOpen
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\mpclient.dll",MpThreatEnumerate
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\mpclient.dll",MpSetTPState
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\mpclient.dll",MpServiceLogMessage
There are 19 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{99f2de37-044d-a92f-9f08-c398f9044a68}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProgramId
\REGISTRY\A\{99f2de37-044d-a92f-9f08-c398f9044a68}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
FileId
\REGISTRY\A\{99f2de37-044d-a92f-9f08-c398f9044a68}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LowerCaseLongPath
\REGISTRY\A\{99f2de37-044d-a92f-9f08-c398f9044a68}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LongPathHash
\REGISTRY\A\{99f2de37-044d-a92f-9f08-c398f9044a68}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Name
\REGISTRY\A\{99f2de37-044d-a92f-9f08-c398f9044a68}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
OriginalFileName
\REGISTRY\A\{99f2de37-044d-a92f-9f08-c398f9044a68}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Publisher
\REGISTRY\A\{99f2de37-044d-a92f-9f08-c398f9044a68}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Version
\REGISTRY\A\{99f2de37-044d-a92f-9f08-c398f9044a68}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinFileVersion
\REGISTRY\A\{99f2de37-044d-a92f-9f08-c398f9044a68}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinaryType
\REGISTRY\A\{99f2de37-044d-a92f-9f08-c398f9044a68}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductName
\REGISTRY\A\{99f2de37-044d-a92f-9f08-c398f9044a68}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductVersion
\REGISTRY\A\{99f2de37-044d-a92f-9f08-c398f9044a68}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LinkDate
\REGISTRY\A\{99f2de37-044d-a92f-9f08-c398f9044a68}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinProductVersion
\REGISTRY\A\{99f2de37-044d-a92f-9f08-c398f9044a68}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageFullName
\REGISTRY\A\{99f2de37-044d-a92f-9f08-c398f9044a68}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageRelativeId
\REGISTRY\A\{99f2de37-044d-a92f-9f08-c398f9044a68}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Size
\REGISTRY\A\{99f2de37-044d-a92f-9f08-c398f9044a68}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Language
\REGISTRY\A\{99f2de37-044d-a92f-9f08-c398f9044a68}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
IsOsComponent
\REGISTRY\A\{99f2de37-044d-a92f-9f08-c398f9044a68}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00C055FFF0D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00C055FFF0D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
There are 17 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4E68000
direct allocation
page read and write
6A7000
unkown
page read and write
F90000
heap
page read and write
455A000
direct allocation
page read and write
328F000
stack
page read and write
E9E000
stack
page read and write
4B64000
direct allocation
page read and write
8F0000
heap
page read and write
4C78000
direct allocation
page read and write
D6F000
stack
page read and write
45D0000
heap
page read and write
B3E000
stack
page read and write
4C8A000
direct allocation
page read and write
4B04000
direct allocation
page read and write
3070000
heap
page read and write
48D4000
direct allocation
page read and write
4BFC000
direct allocation
page read and write
4AE8000
direct allocation
page read and write
314E000
stack
page read and write
4511000
direct allocation
page read and write
4CDA000
direct allocation
page read and write
6B6000
unkown
page read and write
4AAD000
direct allocation
page read and write
400000
unkown
page readonly
4A04000
direct allocation
page read and write
4CA0000
heap
page read and write
502A000
direct allocation
page read and write
32C0000
heap
page read and write
488B000
direct allocation
page read and write
4918000
direct allocation
page read and write
4A60000
direct allocation
page execute and read and write
A61000
direct allocation
page read and write
4C68000
direct allocation
page read and write
490A000
direct allocation
page read and write
B90000
heap
page read and write
D0B000
stack
page read and write
2DD1000
direct allocation
page read and write
4A64000
direct allocation
page read and write
D90000
direct allocation
page execute and read and write
34D0000
heap
page read and write
31B0000
heap
page read and write
140000
heap
page read and write
4E4C000
direct allocation
page read and write
334E000
stack
page read and write
DCE000
stack
page read and write
190000
heap
page read and write
FBE000
stack
page read and write
3110000
heap
page read and write
5B0000
heap
page read and write
4944000
direct allocation
page read and write
FD0000
heap
page read and write
492F000
direct allocation
page read and write
4CE8000
direct allocation
page read and write
3710000
heap
page read and write
48F8000
direct allocation
page read and write
F4E000
stack
page read and write
DE0000
direct allocation
page execute and read and write
6B2000
unkown
page write copy
450A000
direct allocation
page read and write
3FB000
stack
page read and write
DFA000
heap
page read and write
4C40000
heap
page read and write
360000
heap
page read and write
4B14000
direct allocation
page read and write
6BF000
unkown
page write copy
4868000
direct allocation
page read and write
30D0000
heap
page read and write
4900000
heap
page read and write
4CCC000
direct allocation
page read and write
489A000
direct allocation
page read and write
5120000
heap
page read and write
5014000
direct allocation
page read and write
A28000
direct allocation
page read and write
493D000
direct allocation
page read and write
4914000
direct allocation
page read and write
4ED0000
direct allocation
page execute and read and write
4C18000
direct allocation
page read and write
47ED000
direct allocation
page read and write
4BC1000
direct allocation
page read and write
6C1000
unkown
page read and write
4528000
direct allocation
page read and write
486A000
direct allocation
page read and write
4B31000
direct allocation
page read and write
4884000
direct allocation
page read and write
4D90000
heap
page read and write
970000
heap
page read and write
48D0000
heap
page read and write
4B73000
direct allocation
page read and write
6A7000
unkown
page read and write
590000
direct allocation
page execute and read and write
EBC000
stack
page read and write
4821000
direct allocation
page read and write
DB0000
heap
page read and write
F46000
direct allocation
page read and write
494C000
direct allocation
page read and write
481A000
direct allocation
page read and write
A2F000
direct allocation
page read and write
4CD3000
direct allocation
page read and write
FB0000
heap
page read and write
4D80000
heap
page read and write
4AAD000
direct allocation
page read and write
B6B000
stack
page read and write
CC0000
heap
page read and write
4C98000
direct allocation
page read and write
8D0000
direct allocation
page execute and read and write
9B0000
heap
page read and write
3130000
heap
page read and write
4968000
direct allocation
page read and write
489A000
direct allocation
page read and write
8F0000
heap
page read and write
4B0D000
direct allocation
page read and write
DC000
stack
page read and write
4A54000
direct allocation
page read and write
4AFD000
direct allocation
page read and write
4A9F000
direct allocation
page read and write
4A6B000
direct allocation
page read and write
44FB000
direct allocation
page read and write
13B1000
unkown
page read and write
820000
heap
page read and write
4CCB000
direct allocation
page read and write
4A5C000
direct allocation
page read and write
31FE000
stack
page read and write
4CC4000
direct allocation
page read and write
4ABC000
direct allocation
page read and write
495F000
stack
page read and write
4A4D000
direct allocation
page read and write
5C0000
heap
page read and write
4AC3000
direct allocation
page read and write
48C6000
direct allocation
page read and write
54C000
stack
page read and write
6A8000
unkown
page write copy
97F000
stack
page read and write
483F000
direct allocation
page read and write
3210000
heap
page read and write
490D000
direct allocation
page read and write
4610000
heap
page read and write
4821000
direct allocation
page read and write
7CC000
stack
page read and write
F04000
direct allocation
page read and write
B2B000
stack
page read and write
306A000
heap
page read and write
4930000
heap
page read and write
4E90000
heap
page read and write
8BE000
stack
page read and write
484D000
direct allocation
page read and write
4C03000
direct allocation
page read and write
3240000
heap
page read and write
2DBC000
direct allocation
page read and write
48FB000
direct allocation
page read and write
4CE1000
direct allocation
page read and write
9BA000
heap
page read and write
4910000
heap
page read and write
6A9000
unkown
page read and write
FF0000
heap
page read and write
B80000
heap
page read and write
50F000
stack
page read and write
485A000
direct allocation
page read and write
6B2000
unkown
page write copy
4CFF000
direct allocation
page read and write
F71000
direct allocation
page read and write
4536000
direct allocation
page read and write
3310000
heap
page read and write
C00000
heap
page read and write
8FA000
heap
page read and write
AF0000
heap
page read and write
4E58000
direct allocation
page read and write
7AC000
stack
page read and write
E10000
heap
page read and write
8B0000
heap
page read and write
9C0000
heap
page read and write
F9E000
stack
page read and write
33B0000
direct allocation
page execute and read and write
C7C000
stack
page read and write
4568000
direct allocation
page read and write
34CF000
stack
page read and write
4B8D000
direct allocation
page read and write
F21000
direct allocation
page read and write
4B7A000
direct allocation
page read and write
2D6B000
direct allocation
page read and write
48EA000
direct allocation
page read and write
49F0000
heap
page read and write
452F000
direct allocation
page read and write
BB0000
heap
page read and write
4FE1000
direct allocation
page read and write
4A20000
heap
page read and write
790000
heap
page read and write
6AE000
unkown
page read and write
14B000
stack
page read and write
50B000
stack
page read and write
48E1000
direct allocation
page read and write
484B000
direct allocation
page read and write
324E000
stack
page read and write
139D000
unkown
page write copy
48E8000
direct allocation
page read and write
6B1000
unkown
page read and write
4854000
direct allocation
page read and write
488B000
direct allocation
page read and write
10F0000
unkown
page readonly
4553000
direct allocation
page read and write
D6F000
stack
page read and write
EEE000
stack
page read and write
4D0D000
direct allocation
page read and write
A70000
heap
page read and write
DB0000
heap
page read and write
330E000
stack
page read and write
4FA0000
heap
page read and write
B7E000
stack
page read and write
3220000
heap
page read and write
940000
heap
page read and write
4BC8000
direct allocation
page read and write
4CA8000
direct allocation
page read and write
D4C000
stack
page read and write
6B6000
unkown
page read and write
4E3B000
direct allocation
page read and write
32CE000
stack
page read and write
9B0000
heap
page read and write
59C000
stack
page read and write
4938000
direct allocation
page read and write
48BF000
direct allocation
page read and write
8CC000
stack
page read and write
4A81000
direct allocation
page read and write
48F1000
direct allocation
page read and write
F2F000
stack
page read and write
30DE000
stack
page read and write
810000
heap
page read and write
3100000
heap
page read and write
4838000
direct allocation
page read and write
F4C000
stack
page read and write
F1A000
direct allocation
page read and write
4804000
direct allocation
page read and write
B40000
heap
page read and write
48A1000
direct allocation
page read and write
6A7000
unkown
page read and write
4878000
direct allocation
page read and write
F5E000
stack
page read and write
30AB000
stack
page read and write
150000
heap
page read and write
31EE000
stack
page read and write
A53000
direct allocation
page read and write
4B81000
direct allocation
page read and write
4A3F000
direct allocation
page read and write
9DD000
direct allocation
page read and write
CF0000
heap
page read and write
87E000
stack
page read and write
4D06000
direct allocation
page read and write
4B1C000
direct allocation
page read and write
483F000
direct allocation
page read and write
51A0000
heap
page read and write
4A71000
direct allocation
page read and write
350000
heap
page read and write
343F000
stack
page read and write
1399000
unkown
page read and write
6A8000
unkown
page write copy
4CAF000
direct allocation
page read and write
44F4000
direct allocation
page read and write
6A9000
unkown
page read and write
3060000
heap
page read and write
6B2000
unkown
page write copy
4871000
direct allocation
page read and write
F0B000
stack
page read and write
4A6A000
direct allocation
page read and write
481A000
direct allocation
page read and write
FF0000
direct allocation
page execute and read and write
316D000
stack
page read and write
D2E000
stack
page read and write
310A000
heap
page read and write
4518000
direct allocation
page read and write
48CB000
direct allocation
page read and write
4928000
direct allocation
page read and write
48B8000
direct allocation
page read and write
4D20000
heap
page read and write
4C2D000
direct allocation
page read and write
D70000
direct allocation
page execute and read and write
B80000
heap
page read and write
70E000
stack
page read and write
48E3000
direct allocation
page read and write
E80000
heap
page read and write
4A98000
direct allocation
page read and write
6C2000
unkown
page readonly
3180000
heap
page read and write
48F4000
direct allocation
page read and write
B6C000
stack
page read and write
6AC000
unkown
page write copy
B0C000
stack
page read and write
97A000
heap
page read and write
5038000
direct allocation
page read and write
401000
unkown
page execute read
B60000
direct allocation
page execute and read and write
F6E000
stack
page read and write
D70000
heap
page read and write
4B31000
direct allocation
page read and write
BFA000
heap
page read and write
4A0B000
direct allocation
page read and write
4C61000
direct allocation
page read and write
6B6000
unkown
page read and write
FF0000
direct allocation
page execute and read and write
4828000
direct allocation
page read and write
6C2000
unkown
page readonly
6AE000
unkown
page read and write
4A38000
direct allocation
page read and write
4838000
direct allocation
page read and write
34DA000
heap
page read and write
4871000
direct allocation
page read and write
48F1000
direct allocation
page read and write
4FC4000
direct allocation
page read and write
4BD8000
direct allocation
page read and write
D4C000
stack
page read and write
318E000
stack
page read and write
4AB4000
direct allocation
page read and write
9FB000
direct allocation
page read and write
13A2000
unkown
page write copy
CB0000
heap
page read and write
6A0000
heap
page read and write
A4C000
direct allocation
page read and write
3430000
heap
page read and write
4ADE000
stack
page read and write
6B0000
unkown
page write copy
48DA000
direct allocation
page read and write
49D0000
heap
page read and write
4E28000
direct allocation
page read and write
4C74000
direct allocation
page read and write
4CF8000
direct allocation
page read and write
83A000
heap
page read and write
4B6C000
direct allocation
page read and write
970000
heap
page read and write
4B2A000
direct allocation
page read and write
4B48000
direct allocation
page read and write
338F000
stack
page read and write
4E0A000
direct allocation
page read and write
4B70000
heap
page read and write
2EC000
stack
page read and write
4E18000
direct allocation
page read and write
7FE000
stack
page read and write
4BE6000
direct allocation
page read and write
6A8000
unkown
page write copy
730000
heap
page read and write
930000
heap
page read and write
FFE000
stack
page read and write
348E000
stack
page read and write
5AA000
heap
page read and write
4C94000
direct allocation
page read and write
4FDA000
direct allocation
page read and write
D7B000
stack
page read and write
71E000
stack
page read and write
47ED000
direct allocation
page read and write
6B1000
unkown
page read and write
6CB000
stack
page read and write
2AB000
stack
page read and write
4C11000
direct allocation
page read and write
4A78000
direct allocation
page read and write
4C7B000
direct allocation
page read and write
4B1B000
direct allocation
page read and write
DBA000
heap
page read and write
3160000
heap
page read and write
48C4000
direct allocation
page read and write
A18000
direct allocation
page read and write
3050000
heap
page read and write
4720000
heap
page read and write
3310000
heap
page read and write
48DD000
direct allocation
page read and write
4A7A000
direct allocation
page read and write
48AD000
direct allocation
page read and write
328E000
stack
page read and write
482D000
direct allocation
page read and write
4CB8000
direct allocation
page read and write
4B2A000
direct allocation
page read and write
31B0000
heap
page read and write
483F000
direct allocation
page read and write
4FFF000
direct allocation
page read and write
F50000
heap
page read and write
4E5A000
direct allocation
page read and write
486A000
direct allocation
page read and write
6AC000
unkown
page write copy
A50000
heap
page read and write
4B30000
heap
page read and write
10F1000
unkown
page execute read
484D000
direct allocation
page read and write
48BF000
direct allocation
page read and write
4C91000
direct allocation
page read and write
950000
heap
page read and write
4FE8000
direct allocation
page read and write
305F000
stack
page read and write
4940000
heap
page read and write
400000
unkown
page readonly
48C6000
direct allocation
page read and write
4D31000
direct allocation
page read and write
9B000
stack
page read and write
6B0000
unkown
page write copy
477F000
stack
page read and write
4E6F000
direct allocation
page read and write
800000
heap
page read and write
3300000
heap
page read and write
AFF000
stack
page read and write
4D23000
direct allocation
page read and write
4E76000
direct allocation
page read and write
454C000
direct allocation
page read and write
2DCA000
direct allocation
page read and write
A36000
direct allocation
page read and write
E9A000
heap
page read and write
A11000
direct allocation
page read and write
4E11000
direct allocation
page read and write
A68000
direct allocation
page read and write
4ACA000
direct allocation
page read and write
6B0000
unkown
page write copy
4AA6000
direct allocation
page read and write
F3F000
direct allocation
page read and write
2D4D000
direct allocation
page read and write
F9E000
stack
page read and write
48A8000
direct allocation
page read and write
4A46000
direct allocation
page read and write
31D0000
heap
page read and write
4D60000
heap
page read and write
EA0000
heap
page read and write
4E36000
direct allocation
page read and write
3520000
heap
page read and write
5AA000
heap
page read and write
4B5D000
direct allocation
page read and write
484D000
direct allocation
page read and write
4BED000
direct allocation
page read and write
4906000
direct allocation
page read and write
4C8D000
direct allocation
page read and write
F28000
direct allocation
page read and write
312E000
stack
page read and write
4863000
direct allocation
page read and write
3440000
direct allocation
page execute and read and write
D3E000
stack
page read and write
4A21000
direct allocation
page read and write
30EC000
stack
page read and write
88E000
stack
page read and write
5006000
direct allocation
page read and write
DF0000
heap
page read and write
4D38000
direct allocation
page read and write
3100000
heap
page read and write
3150000
heap
page read and write
4846000
direct allocation
page read and write
352A000
heap
page read and write
55B000
stack
page read and write
3480000
heap
page read and write
31EE000
stack
page read and write
44DD000
direct allocation
page read and write
D0B000
stack
page read and write
93E000
stack
page read and write
31DE000
stack
page read and write
482E000
stack
page read and write
305F000
stack
page read and write
4C8A000
direct allocation
page read and write
315A000
heap
page read and write
A5A000
direct allocation
page read and write
4821000
direct allocation
page read and write
4871000
direct allocation
page read and write
8FF000
stack
page read and write
4931000
direct allocation
page read and write
E90000
heap
page read and write
9BF000
stack
page read and write
DC0000
heap
page read and write
4C44000
direct allocation
page read and write
F10000
heap
page read and write
4CE8000
direct allocation
page read and write
FE0000
direct allocation
page execute and read and write
4544000
direct allocation
page read and write
4A4D000
direct allocation
page read and write
9A0000
heap
page read and write
4E4A000
direct allocation
page read and write
FF0000
heap
page read and write
F54000
direct allocation
page read and write
323F000
stack
page read and write
4EF0000
heap
page read and write
BCF000
stack
page read and write
D60000
heap
page read and write
481A000
direct allocation
page read and write
343F000
stack
page read and write
F5C000
direct allocation
page read and write
4CC4000
direct allocation
page read and write
4C98000
direct allocation
page read and write
32F0000
heap
page read and write
F9F000
stack
page read and write
5023000
direct allocation
page read and write
BE0000
heap
page read and write
760000
direct allocation
page execute and read and write
90B000
stack
page read and write
2D88000
direct allocation
page read and write
830000
heap
page read and write
2D64000
direct allocation
page read and write
6B1000
unkown
page read and write
2D9F000
direct allocation
page read and write
501C000
direct allocation
page read and write
4B38000
direct allocation
page read and write
4804000
direct allocation
page read and write
305C000
stack
page read and write
4ACB000
direct allocation
page read and write
4911000
direct allocation
page read and write
4E34000
direct allocation
page read and write
EF0000
heap
page read and write
D4F000
stack
page read and write
DA0000
heap
page read and write
31CE000
stack
page read and write
4C30000
heap
page read and write
56D000
stack
page read and write
76B000
stack
page read and write
EA0000
heap
page read and write
EFF000
heap
page read and write
319E000
stack
page read and write
32AE000
stack
page read and write
F4D000
direct allocation
page read and write
4AE1000
direct allocation
page read and write
4846000
direct allocation
page read and write
F3B000
stack
page read and write
1397000
unkown
page read and write
400000
unkown
page readonly
3150000
heap
page read and write
480B000
direct allocation
page read and write
320E000
stack
page read and write
4CAA000
direct allocation
page read and write
E3F000
stack
page read and write
4863000
direct allocation
page read and write
F6A000
direct allocation
page read and write
480B000
direct allocation
page read and write
4863000
direct allocation
page read and write
4561000
direct allocation
page read and write
E90000
heap
page read and write
4A1A000
direct allocation
page read and write
4AC4000
direct allocation
page read and write
3070000
heap
page read and write
4E61000
direct allocation
page read and write
D80000
heap
page read and write
DD0000
heap
page read and write
13AF000
unkown
page write copy
486D000
direct allocation
page read and write
47ED000
direct allocation
page read and write
486D000
direct allocation
page read and write
4828000
direct allocation
page read and write
6C2000
unkown
page readonly
FEE000
stack
page read and write
6C4000
unkown
page readonly
4CAF000
direct allocation
page read and write
4CE1000
direct allocation
page read and write
4B88000
direct allocation
page read and write
4B4F000
direct allocation
page read and write
400000
heap
page read and write
FF0000
heap
page read and write
BFE000
stack
page read and write
6BF000
unkown
page write copy
4DFB000
direct allocation
page read and write
A3E000
stack
page read and write
307A000
heap
page read and write
FC0000
heap
page read and write
C3B000
stack
page read and write
4BF4000
direct allocation
page read and write
2D54000
direct allocation
page read and write
DBC000
stack
page read and write
D00000
heap
page read and write
48E3000
direct allocation
page read and write
450000
heap
page read and write
4B06000
direct allocation
page read and write
4E2F000
direct allocation
page read and write
F0B000
direct allocation
page read and write
4878000
direct allocation
page read and write
4EF0000
heap
page read and write
4CDA000
direct allocation
page read and write
F0E000
stack
page read and write
4D2A000
direct allocation
page read and write
3240000
direct allocation
page execute and read and write
1398000
unkown
page write copy
4DDD000
direct allocation
page read and write
48B8000
direct allocation
page read and write
DF0000
heap
page read and write
3230000
heap
page read and write
4EE0000
heap
page read and write
F7C000
stack
page read and write
49ED000
direct allocation
page read and write
32A0000
direct allocation
page execute and read and write
DB0000
heap
page read and write
6A0000
direct allocation
page execute and read and write
C7C000
stack
page read and write
4C20000
direct allocation
page execute and read and write
820000
heap
page read and write
343A000
heap
page read and write
4E51000
direct allocation
page read and write
4C9C000
direct allocation
page read and write
F5E000
stack
page read and write
BF0000
heap
page read and write
48EA000
direct allocation
page read and write
F38000
direct allocation
page read and write
4FF8000
direct allocation
page read and write
4DF4000
direct allocation
page read and write
331A000
heap
page read and write
4CE8000
direct allocation
page read and write
94C000
stack
page read and write
FD0000
heap
page read and write
305E000
stack
page read and write
1DE000
stack
page read and write
9C0000
heap
page read and write
30A0000
heap
page read and write
E7B000
stack
page read and write
48DC000
direct allocation
page read and write
326E000
stack
page read and write
BAC000
stack
page read and write
3060000
direct allocation
page execute and read and write
2D7A000
direct allocation
page read and write
93C000
stack
page read and write
780000
heap
page read and write
4CCC000
direct allocation
page read and write
13B2000
unkown
page readonly
4E3D000
direct allocation
page read and write
B8E000
stack
page read and write
EF0000
heap
page read and write
6C1000
unkown
page read and write
4CB6000
direct allocation
page read and write
4936000
direct allocation
page read and write
E8F000
stack
page read and write
4C91000
direct allocation
page read and write
4BA4000
direct allocation
page read and write
63C000
stack
page read and write
4BAB000
direct allocation
page read and write
3040000
heap
page read and write
31AE000
stack
page read and write
4ADA000
direct allocation
page read and write
320D000
stack
page read and write
E20000
heap
page read and write
4C5D000
direct allocation
page read and write
D0E000
stack
page read and write
770000
heap
page read and write
47FF000
stack
page read and write
A0A000
direct allocation
page read and write
4AF0000
heap
page read and write
495A000
direct allocation
page read and write
4C86000
direct allocation
page read and write
4C5A000
direct allocation
page read and write
990000
direct allocation
page execute and read and write
2DD8000
direct allocation
page read and write
4AB4000
direct allocation
page read and write
48A8000
direct allocation
page read and write
FCE000
stack
page read and write
48F8000
direct allocation
page read and write
A5A000
heap
page read and write
31FE000
stack
page read and write
2D81000
direct allocation
page read and write
4CA3000
direct allocation
page read and write
4C7F000
direct allocation
page read and write
51F0000
heap
page read and write
4961000
direct allocation
page read and write
491C000
direct allocation
page read and write
5A0000
heap
page read and write
CE0000
heap
page read and write
4A28000
direct allocation
page read and write
4854000
direct allocation
page read and write
3020000
heap
page read and write
4CD3000
direct allocation
page read and write
6C4000
unkown
page readonly
A10000
heap
page read and write
FEE000
stack
page read and write
322F000
stack
page read and write
6C4000
unkown
page readonly
4AFF000
direct allocation
page read and write
8FB000
stack
page read and write
3200000
heap
page read and write
A44000
direct allocation
page read and write
4AD1000
direct allocation
page read and write
4878000
direct allocation
page read and write
FE0000
heap
page read and write
485C000
direct allocation
page read and write
830000
heap
page read and write
401000
unkown
page execute read
2DC3000
direct allocation
page read and write
2D98000
direct allocation
page read and write
6BB000
unkown
page read and write
4CAD000
direct allocation
page read and write
4CBD000
direct allocation
page read and write
4C5D000
direct allocation
page read and write
4B56000
direct allocation
page read and write
3430000
heap
page read and write
1F0000
heap
page read and write
48CD000
direct allocation
page read and write
48F8000
direct allocation
page read and write
4844000
direct allocation
page read and write
4CE1000
direct allocation
page read and write
330E000
stack
page read and write
4D14000
direct allocation
page read and write
4BBA000
direct allocation
page read and write
830000
heap
page read and write
2DA6000
direct allocation
page read and write
321A000
heap
page read and write
B70000
heap
page read and write
5A0000
heap
page read and write
A3D000
direct allocation
page read and write
C3B000
stack
page read and write
4CA8000
direct allocation
page read and write
F63000
direct allocation
page read and write
DC0000
heap
page read and write
4923000
direct allocation
page read and write
F20000
heap
page read and write
75F000
stack
page read and write
4CBD000
direct allocation
page read and write
3360000
heap
page read and write
4E1D000
direct allocation
page read and write
4E68000
direct allocation
page read and write
4CB6000
direct allocation
page read and write
D2E000
stack
page read and write
4861000
direct allocation
page read and write
4A63000
direct allocation
page read and write
4FCB000
direct allocation
page read and write
4A88000
direct allocation
page read and write
D50000
heap
page read and write
950000
direct allocation
page execute and read and write
93E000
stack
page read and write
32AF000
stack
page read and write
48F0000
heap
page read and write
485C000
direct allocation
page read and write
54E000
stack
page read and write
F2E000
stack
page read and write
BD0000
heap
page read and write
4846000
direct allocation
page read and write
4B14000
direct allocation
page read and write
139E000
unkown
page read and write
4CC4000
direct allocation
page read and write
CE0000
heap
page read and write
FDE000
stack
page read and write
486A000
direct allocation
page read and write
4B90000
heap
page read and write
3320000
direct allocation
page execute and read and write
4CB1000
direct allocation
page read and write
13A4000
unkown
page read and write
6BB000
unkown
page read and write
4C74000
direct allocation
page read and write
2DB4000
direct allocation
page read and write
6BF000
unkown
page write copy
6AE000
unkown
page read and write
2DAD000
direct allocation
page read and write
9F4000
direct allocation
page read and write
48A1000
direct allocation
page read and write
48D4000
direct allocation
page read and write
4AD8000
direct allocation
page read and write
331A000
heap
page read and write
401000
unkown
page execute read
31F0000
heap
page read and write
3DE000
stack
page read and write
9B0000
heap
page read and write
4CDA000
direct allocation
page read and write
48DC000
direct allocation
page read and write
18C000
stack
page read and write
840000
heap
page read and write
58F000
stack
page read and write
4E53000
direct allocation
page read and write
4854000
direct allocation
page read and write
31C0000
heap
page read and write
DDB000
stack
page read and write
5031000
direct allocation
page read and write
48CD000
direct allocation
page read and write
4804000
direct allocation
page read and write
4B23000
direct allocation
page read and write
32B0000
direct allocation
page execute and read and write
48FF000
direct allocation
page read and write
500D000
direct allocation
page read and write
4838000
direct allocation
page read and write
74E000
stack
page read and write
13AB000
unkown
page read and write
9FE000
stack
page read and write
4953000
direct allocation
page read and write
4B38000
direct allocation
page read and write
4C7B000
direct allocation
page read and write
6C1000
unkown
page read and write
88B000
stack
page read and write
4C4B000
direct allocation
page read and write
336A000
heap
page read and write
6AC000
unkown
page write copy
485C000
direct allocation
page read and write
4D1C000
direct allocation
page read and write
4884000
direct allocation
page read and write
6BB000
unkown
page read and write
4E7D000
direct allocation
page read and write
8E0000
heap
page read and write
ACB000
stack
page read and write
6A9000
unkown
page read and write
6DE000
stack
page read and write
960000
heap
page read and write
4B40000
heap
page read and write
4E44000
direct allocation
page read and write
EAA000
heap
page read and write
4AF8000
direct allocation
page read and write
453D000
direct allocation
page read and write
31AE000
stack
page read and write
492A000
direct allocation
page read and write
FB0000
heap
page read and write
3100000
heap
page read and write
4BDF000
direct allocation
page read and write
7BF000
stack
page read and write
3180000
heap
page read and write
3080000
direct allocation
page execute and read and write
EFB000
heap
page read and write
F78000
direct allocation
page read and write
480B000
direct allocation
page read and write
13B4000
unkown
page readonly
4C0A000
direct allocation
page read and write
4B94000
direct allocation
page read and write
4828000
direct allocation
page read and write
There are 785 hidden memdumps, click here to show them.