IOC Report
Xerox-6509.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\Xerox-6509.dll,main
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\Xerox-6509.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\Xerox-6509.dll",main
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\Xerox-6509.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Xerox-6509.dll",#1

URLs

Name
IP
Malicious
https://wpad.ru0994ecs.net/wpad.dat
104.21.62.151
malicious
https://wpad.ru0994ecs.net/(2
unknown
https://wpad.ru0994ecs.net/wpad.datL
unknown
https://wpad.ru0994ecs.net/e
unknown
https://wpad.ru0994ecs.net/wpad.datJ
unknown
https://wpad.ru0994ecs.net/wpad.dat_2
unknown
https://wpad.ru0994ecs.net/wpad.dat)2
unknown
https://wpad.ru0994ecs.net/wpad.datY
unknown
https://wpad.ru0994ecs.net/wpad.dat-3
unknown
https://wpad.ru0994ecs.net/wpad.datT
unknown
https://wpad.ru0994ecs.net/wpad.datg3
unknown
https://wpad.ru0994ecs.net/wpad.datS
unknown
https://wpad.ru0994ecs.net/8.
unknown
https://wpad.ru0994ecs.net/wpad.dat?
unknown
https://wpad.ru0994ecs.net/wpad.datm32
unknown
https://wpad.ru0994ecs.net/wpad.datt2
unknown
https://wpad.ru0994ecs.net/wpad.dat:
unknown
https://wpad.ru0994ecs.net/a
unknown
https://wpad.ru0994ecs.net/wpad.datD
unknown
https://wpad.ru0994ecs.net/wpad.datb2
unknown
https://wpad.ru0994ecs.net/wpad.datq
unknown
https://wpad.ru0994ecs.net/wpad.datn
unknown
https://wpad.ru0994ecs.net/wpad.datE3
unknown
https://wpad.ru0994ecs.net/H
unknown
https://wpad.ru0994ecs.net/wpad.datm
unknown
https://wpad.ru0994ecs.net/S
unknown
https://wpad.ru0994ecs.net/wpad.datx
unknown
https://wpad.ru0994ecs.net/wpad.datw
unknown
https://wpad.ru0994ecs.net/wpad.datt
unknown
https://wpad.ru0994ecs.net/P
unknown
https://wpad.ru0994ecs.net/wpad.datr
unknown
https://wpad.ru0994ecs.net/wpad.data
unknown
https://wpad.ru0994ecs.net/pad.dat
unknown
https://wpad.ru0994ecs.net/5
unknown
https://wpad.ru0994ecs.net/wpad.datZ
unknown
https://wpad.ru0994ecs.net/wpad.datXn
unknown
https://wpad.ru0994ecs.net/wpad.datg
unknown
https://wpad.ru0994ecs.net/wpad.dat=9
unknown
https://wpad.ru0994ecs.net/wpad.datc
unknown
https://wpad.ru0994ecs.net/
unknown
https://wpad.ru0994ecs.net/wpad.dat4ecs.net/wpad.dat
unknown
https://wpad.ru0994ecs.net/wpad.datn2
unknown
https://wpad.ru0994ecs.net/wpad.datt32
unknown
https://wpad.ru0994ecs.net/wpad.datz2
unknown
https://wpad.ru0994ecs.net/wpad.dat4ecs.net/wpad.datx
unknown
https://wpad.ru0994ecs.net/wpad.datU2
unknown
https://wpad.ru0994ecs.net/wpad.dat0
unknown
https://wpad.ru0994ecs.net/wpad.dat.
unknown
https://wpad.ru0994ecs.net/y6
unknown
https://wpad.ru0994ecs.net/wpad.dat6
unknown
https://wpad.ru0994ecs.net/wpad.dat5
unknown
https://wpad.ru0994ecs.net/soft
unknown
https://wpad.ru0994ecs.net/wpad.dath2
unknown
https://wpad.ru0994ecs.net/X-
unknown
https://wpad.ru0994ecs.net/wpad.dat32
unknown
https://wpad.ru0994ecs.net/wpad.dat4ecs.net/wpad.datJ
unknown
https://wpad.ru0994ecs.net/m%
unknown
https://wpad.ru0994ecs.net/wpad.dat(
unknown
https://wpad.ru0994ecs.net/wpad.dat&
unknown
https://wpad.ru0994ecs.net/wpad.dat$
unknown
https://wpad.ru0994ecs.net/wpad.dat73
unknown
There are 51 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
wpad.ru0994ecs.net
104.21.62.151
malicious

IPs

IP
Domain
Country
Malicious
104.21.62.151
wpad.ru0994ecs.net
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
C9E000
heap
page read and write
3057000
heap
page read and write
EA8000
heap
page read and write
EA8000
heap
page read and write
CA5000
heap
page read and write
8C9000
heap
page read and write
8C9000
heap
page read and write
C52000
heap
page read and write
EF0000
heap
page read and write
90E000
heap
page read and write
304F000
trusted library allocation
page read and write
304F000
trusted library allocation
page read and write
19C0000
heap
page read and write
4F9F000
trusted library allocation
page read and write
8C9000
heap
page read and write
4930000
heap
page readonly
4BDF000
trusted library allocation
page read and write
4BDF000
trusted library allocation
page read and write
C9E000
heap
page read and write
5130000
heap
page read and write
EAF000
heap
page read and write
E71000
heap
page read and write
CA6000
heap
page read and write
E47000
heap
page read and write
90F000
heap
page read and write
8C9000
heap
page read and write
CA5000
heap
page read and write
4A9C000
stack
page read and write
EB3000
heap
page read and write
E6A000
heap
page read and write
C73000
heap
page read and write
C73000
heap
page read and write
EB3000
heap
page read and write
C73000
heap
page read and write
106D000
stack
page read and write
C5F000
heap
page read and write
4BDF000
trusted library allocation
page read and write
90E000
heap
page read and write
E70000
heap
page read and write
EB3000
heap
page read and write
C5F000
heap
page read and write
523F000
trusted library allocation
page read and write
4BDF000
trusted library allocation
page read and write
CA7000
heap
page read and write
E64000
heap
page read and write
4F9F000
trusted library allocation
page read and write
CA5000
heap
page read and write
E6F000
heap
page read and write
4BDF000
trusted library allocation
page read and write
EAF000
heap
page read and write
EB3000
heap
page read and write
BEA000
heap
page read and write
50A0000
remote allocation
page read and write
E47000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
CA6000
heap
page read and write
4ABF000
stack
page read and write
EA8000
heap
page read and write
650FE000
unkown
page read and write
C5F000
heap
page read and write
4F9F000
trusted library allocation
page read and write
4F9F000
trusted library allocation
page read and write
E6A000
heap
page read and write
E69000
heap
page read and write
C52000
heap
page read and write
C5F000
heap
page read and write
304F000
trusted library allocation
page read and write
CA4000
heap
page read and write
4BDF000
trusted library allocation
page read and write
910000
heap
page read and write
4BDF000
trusted library allocation
page read and write
EA8000
heap
page read and write
4BDF000
trusted library allocation
page read and write
C73000
heap
page read and write
E6A000
heap
page read and write
4CBE000
stack
page read and write
E70000
heap
page read and write
4BDF000
trusted library allocation
page read and write
E46000
heap
page read and write
8A3000
heap
page read and write
E71000
heap
page read and write
EAF000
heap
page read and write
8CE000
heap
page read and write
C73000
heap
page read and write
CE0000
heap
page read and write
EAF000
heap
page read and write
4BDF000
trusted library allocation
page read and write
C5F000
heap
page read and write
4BDF000
trusted library allocation
page read and write
E47000
heap
page read and write
8C9000
heap
page read and write
4F9F000
trusted library allocation
page read and write
910000
heap
page read and write
90E000
heap
page read and write
EA8000
heap
page read and write
EA8000
heap
page read and write
8C9000
heap
page read and write
523F000
stack
page read and write
8A2000
heap
page read and write
43FC000
stack
page read and write
4E00000
remote allocation
page read and write
4432000
stack
page read and write
EA8000
heap
page read and write
EAB000
heap
page read and write
4F9F000
trusted library allocation
page read and write
E17000
heap
page read and write
4CF0000
heap
page read and write
C73000
heap
page read and write
4BDF000
trusted library allocation
page read and write
8CF000
heap
page read and write
4BDF000
trusted library allocation
page read and write
8C9000
heap
page read and write
4F9F000
trusted library allocation
page read and write
C73000
heap
page read and write
8C9000
heap
page read and write
8A3000
heap
page read and write
65101000
unkown
page readonly
C66000
heap
page read and write
8CF000
heap
page read and write
C5F000
heap
page read and write
8C9000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
911000
heap
page read and write
C5F000
heap
page read and write
304F000
trusted library allocation
page read and write
E14000
heap
page read and write
C9D000
heap
page read and write
EB1000
heap
page read and write
911000
heap
page read and write
909000
heap
page read and write
EB3000
heap
page read and write
5097000
stack
page read and write
4F9F000
trusted library allocation
page read and write
EB3000
heap
page read and write
3050000
heap
page read and write
E70000
heap
page read and write
CE5000
heap
page read and write
EB3000
heap
page read and write
4BDF000
trusted library allocation
page read and write
E66000
heap
page read and write
EB3000
heap
page read and write
EB3000
heap
page read and write
CA3000
heap
page read and write
4A20000
direct allocation
page read and write
8C9000
heap
page read and write
C73000
heap
page read and write
89C000
heap
page read and write
304F000
trusted library allocation
page read and write
E70000
heap
page read and write
C73000
heap
page read and write
912000
heap
page read and write
EA8000
heap
page read and write
116D000
stack
page read and write
E6E000
heap
page read and write
E70000
heap
page read and write
909000
heap
page read and write
8C9000
heap
page read and write
4CDF000
stack
page read and write
EA8000
heap
page read and write
760000
heap
page read and write
EAF000
heap
page read and write
EB3000
heap
page read and write
EAF000
heap
page read and write
EAF000
heap
page read and write
C73000
heap
page read and write
EAF000
heap
page read and write
4BDF000
trusted library allocation
page read and write
4B5C000
stack
page read and write
4F9F000
trusted library allocation
page read and write
B25000
heap
page read and write
E47000
heap
page read and write
EB4000
heap
page read and write
EAF000
heap
page read and write
8C9000
heap
page read and write
8C9000
heap
page read and write
910000
heap
page read and write
522F000
trusted library allocation
page read and write
C9F000
heap
page read and write
C1D000
heap
page read and write
522F000
trusted library allocation
page read and write
EA8000
heap
page read and write
E47000
heap
page read and write
304F000
trusted library allocation
page read and write
C9D000
heap
page read and write
EB3000
heap
page read and write
304F000
trusted library allocation
page read and write
C5F000
heap
page read and write
16FB000
heap
page read and write
EAF000
heap
page read and write
EB3000
heap
page read and write
E69000
heap
page read and write
C5F000
heap
page read and write
4F9F000
trusted library allocation
page read and write
4BDF000
trusted library allocation
page read and write
4BDF000
trusted library allocation
page read and write
509F000
stack
page read and write
4F9F000
trusted library allocation
page read and write
C73000
heap
page read and write
C5F000
heap
page read and write
304F000
trusted library allocation
page read and write
90B000
heap
page read and write
C73000
heap
page read and write
650FB000
unkown
page readonly
4F9F000
trusted library allocation
page read and write
4E00000
remote allocation
page read and write
B20000
heap
page read and write
EB3000
heap
page read and write
4F9F000
trusted library allocation
page read and write
CA5000
heap
page read and write
C73000
heap
page read and write
912000
heap
page read and write
C73000
heap
page read and write
C73000
heap
page read and write
CA4000
heap
page read and write
917000
heap
page read and write
4BDF000
trusted library allocation
page read and write
C5F000
heap
page read and write
EA8000
heap
page read and write
4F9F000
trusted library allocation
page read and write
C9F000
heap
page read and write
CA4000
heap
page read and write
304F000
trusted library allocation
page read and write
CA5000
heap
page read and write
C73000
heap
page read and write
4B1D000
stack
page read and write
4F9F000
trusted library allocation
page read and write
EA8000
heap
page read and write
EA8000
heap
page read and write
EA8000
heap
page read and write
650C0000
unkown
page readonly
8C9000
heap
page read and write
EB3000
heap
page read and write
522F000
trusted library allocation
page read and write
EA8000
heap
page read and write
EA8000
heap
page read and write
522F000
trusted library allocation
page read and write
4F9F000
trusted library allocation
page read and write
EB3000
heap
page read and write
C73000
heap
page read and write
4380000
direct allocation
page read and write
D10000
heap
page read and write
650FB000
unkown
page readonly
EA8000
heap
page read and write
304F000
trusted library allocation
page read and write
C1D000
heap
page read and write
EB3000
heap
page read and write
304F000
trusted library allocation
page read and write
304F000
trusted library allocation
page read and write
EB3000
heap
page read and write
304F000
trusted library allocation
page read and write
E64000
heap
page read and write
E64000
heap
page read and write
EAF000
heap
page read and write
4A40000
remote allocation
page read and write
EA8000
heap
page read and write
4BDF000
trusted library allocation
page read and write
4950000
heap
page read and write
877000
heap
page read and write
4BDF000
trusted library allocation
page read and write
4F9F000
trusted library allocation
page read and write
EB3000
heap
page read and write
4BDF000
trusted library allocation
page read and write
C2A000
heap
page read and write
8A3000
heap
page read and write
CA5000
heap
page read and write
EAF000
heap
page read and write
8C9000
heap
page read and write
4F9F000
trusted library allocation
page read and write
EB3000
heap
page read and write
8CF000
heap
page read and write
85A000
heap
page read and write
C73000
heap
page read and write
497C000
stack
page read and write
4BDF000
trusted library allocation
page read and write
EA8000
heap
page read and write
C73000
heap
page read and write
4BDF000
trusted library allocation
page read and write
4BDF000
trusted library allocation
page read and write
EA8000
heap
page read and write
4BDF000
trusted library allocation
page read and write
4BDF000
trusted library allocation
page read and write
C1C000
heap
page read and write
C52000
heap
page read and write
8C9000
heap
page read and write
E70000
heap
page read and write
C5F000
heap
page read and write
C9D000
heap
page read and write
C52000
heap
page read and write
E70000
heap
page read and write
8C9000
heap
page read and write
C73000
heap
page read and write
4F9F000
trusted library allocation
page read and write
C5F000
heap
page read and write
8C9000
heap
page read and write
E43000
heap
page read and write
4BDF000
trusted library allocation
page read and write
650FE000
unkown
page read and write
4F9F000
trusted library allocation
page read and write
EB3000
heap
page read and write
C73000
heap
page read and write
C9F000
heap
page read and write
CA5000
heap
page read and write
EA8000
heap
page read and write
CA4000
heap
page read and write
C2A000
heap
page read and write
EA8000
heap
page read and write
CA5000
heap
page read and write
E70000
heap
page read and write
E6A000
heap
page read and write
8C9000
heap
page read and write
EA8000
heap
page read and write
CA5000
heap
page read and write
E64000
heap
page read and write
4BDF000
trusted library allocation
page read and write
EB3000
heap
page read and write
C05000
heap
page read and write
C73000
heap
page read and write
CA5000
heap
page read and write
912000
heap
page read and write
4BDF000
trusted library allocation
page read and write
EAF000
heap
page read and write
CA5000
heap
page read and write
909000
heap
page read and write
C73000
heap
page read and write
EA8000
heap
page read and write
8A2000
heap
page read and write
EB3000
heap
page read and write
EB3000
heap
page read and write
8C9000
heap
page read and write
1707000
heap
page read and write
770000
heap
page read and write
910000
heap
page read and write
CA4000
heap
page read and write
650C0000
unkown
page readonly
304F000
trusted library allocation
page read and write
90E000
heap
page read and write
8C9000
heap
page read and write
EAF000
heap
page read and write
CA5000
heap
page read and write
EB1000
heap
page read and write
C66000
heap
page read and write
304F000
trusted library allocation
page read and write
EAF000
heap
page read and write
CA7000
heap
page read and write
4BDF000
trusted library allocation
page read and write
EA8000
heap
page read and write
90E000
heap
page read and write
EAF000
heap
page read and write
48BE000
stack
page read and write
4BDF000
trusted library allocation
page read and write
E47000
heap
page read and write
A10000
heap
page read and write
523F000
trusted library allocation
page read and write
C73000
heap
page read and write
C73000
heap
page read and write
EA8000
heap
page read and write
C5F000
heap
page read and write
C9F000
heap
page read and write
C73000
heap
page read and write
EA8000
heap
page read and write
EB3000
heap
page read and write
C0B000
heap
page read and write
C5F000
heap
page read and write
EB3000
heap
page read and write
E19000
heap
page read and write
4BDE000
stack
page read and write
CA5000
heap
page read and write
EA8000
heap
page read and write
C73000
heap
page read and write
C73000
heap
page read and write
EAF000
heap
page read and write
CA4000
heap
page read and write
C5F000
heap
page read and write
4BDF000
trusted library allocation
page read and write
C5F000
heap
page read and write
9A0000
heap
page read and write
CA5000
heap
page read and write
8C9000
heap
page read and write
CA3000
heap
page read and write
DFA000
heap
page read and write
4F9F000
trusted library allocation
page read and write
CA5000
heap
page read and write
4F9F000
trusted library allocation
page read and write
E46000
heap
page read and write
E6F000
heap
page read and write
CA5000
heap
page read and write
EAF000
heap
page read and write
C73000
heap
page read and write
877000
heap
page read and write
87A000
heap
page read and write
C9E000
heap
page read and write
911000
heap
page read and write
EAF000
heap
page read and write
EB3000
heap
page read and write
E45000
heap
page read and write
C5F000
heap
page read and write
C5F000
heap
page read and write
C5F000
heap
page read and write
304F000
trusted library allocation
page read and write
EA8000
heap
page read and write
E70000
heap
page read and write
4690000
direct allocation
page read and write
EAF000
heap
page read and write
304F000
trusted library allocation
page read and write
EAF000
heap
page read and write
522F000
trusted library allocation
page read and write
E64000
heap
page read and write
CA4000
heap
page read and write
C1D000
heap
page read and write
EAF000
heap
page read and write
4BDF000
trusted library allocation
page read and write
6C5000
heap
page read and write
49A0000
heap
page read and write
EB3000
heap
page read and write
EB3000
heap
page read and write
304F000
trusted library allocation
page read and write
C52000
heap
page read and write
C5F000
heap
page read and write
C5F000
heap
page read and write
C5F000
heap
page read and write
4A40000
remote allocation
page read and write
C9D000
heap
page read and write
4A7E000
stack
page read and write
C5F000
heap
page read and write
C73000
heap
page read and write
16FF000
heap
page read and write
4BDF000
trusted library allocation
page read and write
E46000
heap
page read and write
E47000
heap
page read and write
C5F000
heap
page read and write
4F9F000
trusted library allocation
page read and write
4BDF000
trusted library allocation
page read and write
C66000
heap
page read and write
E64000
heap
page read and write
C5F000
heap
page read and write
EAF000
heap
page read and write
C5F000
heap
page read and write
65101000
unkown
page readonly
650C1000
unkown
page execute read
C2A000
heap
page read and write
918000
heap
page read and write
4BDF000
trusted library allocation
page read and write
C66000
heap
page read and write
4D00000
heap
page read and write
912000
heap
page read and write
EB3000
heap
page read and write
CA6000
heap
page read and write
E47000
heap
page read and write
522F000
trusted library allocation
page read and write
470C000
stack
page read and write
48FF000
stack
page read and write
C5F000
heap
page read and write
EB3000
heap
page read and write
4F9F000
trusted library allocation
page read and write
4BDF000
trusted library allocation
page read and write
4A40000
remote allocation
page read and write
C73000
heap
page read and write
C5F000
heap
page read and write
6AC000
stack
page read and write
E3D000
heap
page read and write
C9F000
heap
page read and write
E64000
heap
page read and write
CA5000
heap
page read and write
304F000
trusted library allocation
page read and write
C9E000
heap
page read and write
C5F000
heap
page read and write
E64000
heap
page read and write
E64000
heap
page read and write
E45000
heap
page read and write
CA5000
heap
page read and write
E64000
heap
page read and write
8D0000
heap
page read and write
523F000
trusted library allocation
page read and write
5237000
stack
page read and write
47D0000
heap
page read and write
EB3000
heap
page read and write
850000
heap
page read and write
304F000
trusted library allocation
page read and write
CA3000
heap
page read and write
304F000
trusted library allocation
page read and write
C5F000
heap
page read and write
4743000
stack
page read and write
EAF000
heap
page read and write
EA8000
heap
page read and write
4BDF000
trusted library allocation
page read and write
CA4000
heap
page read and write
E64000
heap
page read and write
522F000
trusted library allocation
page read and write
37B000
stack
page read and write
9C0000
heap
page read and write
4F9F000
trusted library allocation
page read and write
EAF000
heap
page read and write
EA8000
heap
page read and write
49FC000
stack
page read and write
3BC000
stack
page read and write
650FE000
unkown
page read and write
11E0000
heap
page read and write
11D0000
heap
page read and write
CA5000
heap
page read and write
4BDF000
trusted library allocation
page read and write
C5F000
heap
page read and write
EAF000
heap
page read and write
4B6C000
stack
page read and write
304F000
trusted library allocation
page read and write
4BDF000
trusted library allocation
page read and write
EB3000
heap
page read and write
C5F000
heap
page read and write
50A0000
remote allocation
page read and write
4F1D000
stack
page read and write
4C7D000
stack
page read and write
EAF000
heap
page read and write
EB3000
heap
page read and write
4F9F000
trusted library allocation
page read and write
8C8000
heap
page read and write
C73000
heap
page read and write
CA5000
heap
page read and write
C5F000
heap
page read and write
C2A000
heap
page read and write
4F9F000
trusted library allocation
page read and write
16F0000
heap
page read and write
C73000
heap
page read and write
EA8000
heap
page read and write
E71000
heap
page read and write
C08000
heap
page read and write
CA3000
heap
page read and write
50DE000
stack
page read and write
4F9F000
trusted library allocation
page read and write
EAF000
heap
page read and write
EB3000
heap
page read and write
4FDF000
stack
page read and write
4F9F000
trusted library allocation
page read and write
910000
heap
page read and write
CA5000
heap
page read and write
EB4000
heap
page read and write
C5F000
heap
page read and write
493D000
stack
page read and write
E6A000
heap
page read and write
8C8000
heap
page read and write
EAF000
heap
page read and write
C9C000
stack
page read and write
C1E000
heap
page read and write
E65000
heap
page read and write
8C8000
heap
page read and write
90E000
heap
page read and write
EB3000
heap
page read and write
CA5000
heap
page read and write
8CF000
heap
page read and write
C08000
heap
page read and write
304F000
trusted library allocation
page read and write
CA5000
heap
page read and write
4F9F000
trusted library allocation
page read and write
CA5000
heap
page read and write
4BDF000
trusted library allocation
page read and write
EAF000
heap
page read and write
C5F000
heap
page read and write
304F000
trusted library allocation
page read and write
304F000
trusted library allocation
page read and write
EAF000
heap
page read and write
4BDF000
trusted library allocation
page read and write
E70000
heap
page read and write
C73000
heap
page read and write
E70000
heap
page read and write
EB3000
heap
page read and write
C9E000
heap
page read and write
C9F000
heap
page read and write
447D000
stack
page read and write
44BE000
stack
page read and write
8CF000
heap
page read and write
304F000
trusted library allocation
page read and write
304F000
trusted library allocation
page read and write
304F000
trusted library allocation
page read and write
CA5000
heap
page read and write
C5F000
heap
page read and write
E47000
heap
page read and write
511F000
stack
page read and write
C5B000
stack
page read and write
E80000
direct allocation
page execute read
4BDF000
trusted library allocation
page read and write
E46000
heap
page read and write
E64000
heap
page read and write
EB3000
heap
page read and write
EA9000
heap
page read and write
4BDF000
trusted library allocation
page read and write
522F000
trusted library allocation
page read and write
8C9000
heap
page read and write
304F000
trusted library allocation
page read and write
4F9F000
trusted library allocation
page read and write
C5F000
heap
page read and write
EB3000
heap
page read and write
87A000
heap
page read and write
910000
heap
page read and write
C73000
heap
page read and write
8C9000
heap
page read and write
C5F000
heap
page read and write
4F9F000
trusted library allocation
page read and write
E1A000
heap
page read and write
E6A000
heap
page read and write
4E00000
remote allocation
page read and write
E64000
heap
page read and write
EB3000
heap
page read and write
4E80000
heap
page read and write
8CF000
heap
page read and write
C73000
heap
page read and write
1940000
heap
page read and write
EB3000
heap
page read and write
522F000
trusted library allocation
page read and write
CA5000
heap
page read and write
630000
heap
page read and write
650FB000
unkown
page readonly
8C9000
heap
page read and write
EB3000
heap
page read and write
522F000
trusted library allocation
page read and write
917000
heap
page read and write
CA4000
heap
page read and write
4F9F000
trusted library allocation
page read and write
8C9000
heap
page read and write
912000
heap
page read and write
EA8000
heap
page read and write
EB3000
heap
page read and write
EB3000
heap
page read and write
304F000
trusted library allocation
page read and write
E16000
heap
page read and write
E64000
heap
page read and write
E46000
heap
page read and write
4F9F000
trusted library allocation
page read and write
522F000
trusted library allocation
page read and write
EA8000
heap
page read and write
C9F000
heap
page read and write
EB3000
heap
page read and write
C2A000
heap
page read and write
E47000
heap
page read and write
EA8000
heap
page read and write
C73000
heap
page read and write
CA5000
heap
page read and write
304F000
trusted library allocation
page read and write
4F9E000
stack
page read and write
EB3000
heap
page read and write
90E000
heap
page read and write
CA5000
heap
page read and write
4F9F000
trusted library allocation
page read and write
C65000
heap
page read and write
C73000
heap
page read and write
6FC000
stack
page read and write
304F000
trusted library allocation
page read and write
304F000
trusted library allocation
page read and write
304F000
trusted library allocation
page read and write
304F000
trusted library allocation
page read and write
E64000
heap
page read and write
4BDF000
trusted library allocation
page read and write
BE0000
heap
page read and write
304F000
trusted library allocation
page read and write
8CF000
heap
page read and write
C73000
heap
page read and write
C5F000
heap
page read and write
EB3000
heap
page read and write
4E3E000
stack
page read and write
E64000
heap
page read and write
EA8000
heap
page read and write
910000
heap
page read and write
C9F000
heap
page read and write
304F000
trusted library allocation
page read and write
4AD3000
stack
page read and write
4F9F000
trusted library allocation
page read and write
C73000
heap
page read and write
EA8000
heap
page read and write
C9F000
heap
page read and write
C2A000
heap
page read and write
4AC0000
heap
page read and write
E64000
heap
page read and write
522F000
trusted library allocation
page read and write
523F000
trusted library allocation
page read and write
523F000
trusted library allocation
page read and write
304F000
trusted library allocation
page read and write
918000
heap
page read and write
EA8000
heap
page read and write
C5F000
heap
page read and write
E70000
heap
page read and write
C73000
heap
page read and write
C73000
heap
page read and write
4F5E000
stack
page read and write
E70000
heap
page read and write
4BDF000
trusted library allocation
page read and write
EA8000
heap
page read and write
C1C000
heap
page read and write
8D0000
heap
page read and write
4BDF000
trusted library allocation
page read and write
4F9F000
trusted library allocation
page read and write
4BDF000
trusted library allocation
page read and write
EA8000
heap
page read and write
E6A000
heap
page read and write
468D000
stack
page read and write
E71000
heap
page read and write
304F000
trusted library allocation
page read and write
4BDF000
trusted library allocation
page read and write
4E7F000
stack
page read and write
EAF000
heap
page read and write
EA8000
heap
page read and write
EA8000
heap
page read and write
C0B000
heap
page read and write
CA5000
heap
page read and write
C5F000
heap
page read and write
E45000
heap
page read and write
C73000
heap
page read and write
6C0000
heap
page read and write
C5F000
heap
page read and write
CA5000
heap
page read and write
CA5000
heap
page read and write
C73000
heap
page read and write
C5F000
heap
page read and write
C5F000
heap
page read and write
4960000
direct allocation
page execute read
8C5000
heap
page read and write
C73000
heap
page read and write
4BDF000
trusted library allocation
page read and write
4F9F000
trusted library allocation
page read and write
4F9F000
trusted library allocation
page read and write
EB3000
heap
page read and write
E64000
heap
page read and write
4BDF000
trusted library allocation
page read and write
DF0000
heap
page read and write
C5F000
heap
page read and write
90F000
heap
page read and write
E45000
heap
page read and write
8C9000
heap
page read and write
304F000
trusted library allocation
page read and write
4F9F000
trusted library allocation
page read and write
E46000
heap
page read and write
EB3000
heap
page read and write
522F000
trusted library allocation
page read and write
C5F000
heap
page read and write
C33000
heap
page read and write
4BDF000
trusted library allocation
page read and write
E46000
heap
page read and write
EA8000
heap
page read and write
8C9000
heap
page read and write
8D0000
heap
page read and write
4F9F000
trusted library allocation
page read and write
912000
heap
page read and write
E45000
heap
page read and write
C5F000
heap
page read and write
C52000
heap
page read and write
E64000
heap
page read and write
E45000
heap
page read and write
EB3000
heap
page read and write
EAF000
heap
page read and write
4BDF000
trusted library allocation
page read and write
C9D000
heap
page read and write
C73000
heap
page read and write
304F000
trusted library allocation
page read and write
EA8000
heap
page read and write
4BDF000
trusted library allocation
page read and write
910000
heap
page read and write
E47000
heap
page read and write
4CD7000
stack
page read and write
CA5000
heap
page read and write
CA5000
heap
page read and write
4BDF000
trusted library allocation
page read and write
E70000
heap
page read and write
65101000
unkown
page readonly
EA8000
heap
page read and write
7EC000
stack
page read and write
874000
heap
page read and write
C9F000
heap
page read and write
650C0000
unkown
page readonly
4BDF000
trusted library allocation
page read and write
8C9000
heap
page read and write
4F9F000
trusted library allocation
page read and write
4BDF000
trusted library allocation
page read and write
4C1F000
stack
page read and write
C1D000
heap
page read and write
EB3000
heap
page read and write
CA5000
heap
page read and write
522F000
trusted library allocation
page read and write
C9F000
heap
page read and write
EA8000
heap
page read and write
4F9F000
trusted library allocation
page read and write
4F9F000
trusted library allocation
page read and write
C73000
heap
page read and write
E43000
heap
page read and write
9D0000
direct allocation
page execute read
4BDF000
trusted library allocation
page read and write
CA4000
heap
page read and write
EAF000
heap
page read and write
4BDF000
trusted library allocation
page read and write
8C9000
heap
page read and write
E64000
heap
page read and write
CA5000
heap
page read and write
15D0000
heap
page read and write
8CF000
heap
page read and write
4BDF000
trusted library allocation
page read and write
E6A000
heap
page read and write
E69000
heap
page read and write
620000
heap
page read and write
EB3000
heap
page read and write
E46000
heap
page read and write
650C1000
unkown
page execute read
EA8000
heap
page read and write
BD0000
heap
page readonly
4F9F000
trusted library allocation
page read and write
EA8000
heap
page read and write
4F9F000
trusted library allocation
page read and write
50A0000
remote allocation
page read and write
4F9F000
trusted library allocation
page read and write
C73000
heap
page read and write
C5F000
heap
page read and write
4F9F000
trusted library allocation
page read and write
C73000
heap
page read and write
EA8000
heap
page read and write
EB3000
heap
page read and write
C73000
heap
page read and write
EA8000
heap
page read and write
6BB000
stack
page read and write
EB3000
heap
page read and write
EA8000
heap
page read and write
C5F000
heap
page read and write
4640000
heap
page read and write
CA5000
heap
page read and write
8D0000
heap
page read and write
909000
heap
page read and write
C5F000
heap
page read and write
8C9000
heap
page read and write
EAF000
heap
page read and write
CA4000
heap
page read and write
4BDF000
trusted library allocation
page read and write
C73000
heap
page read and write
C73000
heap
page read and write
E69000
heap
page read and write
E6A000
heap
page read and write
522F000
trusted library allocation
page read and write
E70000
heap
page read and write
C5F000
heap
page read and write
90E000
heap
page read and write
EB3000
heap
page read and write
4F9F000
trusted library allocation
page read and write
990000
heap
page readonly
650C1000
unkown
page execute read
304F000
trusted library allocation
page read and write
C33000
heap
page read and write
EA8000
heap
page read and write
EB3000
heap
page read and write
4F9F000
trusted library allocation
page read and write
4BDF000
trusted library allocation
page read and write
8CF000
heap
page read and write
8C9000
heap
page read and write
There are 836 hidden memdumps, click here to show them.