IOC Report
02.dll.exe

loading gif

Files

File Path
Type
Category
Malicious
02.dll.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_02._cbaa6bb8cd6eed0719b3582c44155bfdd9769a0_0d6cd92f_1df10794-12d3-4aeb-8e12-18077b77d8b2\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_02._cbaa6bb8cd6eed0719b3582c44155bfdd9769a0_0d6cd92f_4c7642fa-6aac-4566-ab6f-477eaee57c2a\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_02._cbaa6bb8cd6eed0719b3582c44155bfdd9769a0_0d6cd92f_78c6e70b-b349-4cf0-8a41-4c90649ff421\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_02._cbaa6bb8cd6eed0719b3582c44155bfdd9769a0_0d6cd92f_86b06d30-c960-47a9-9170-11ab0561e4ea\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7E42.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Apr 18 01:20:00 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7E71.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Apr 18 01:20:00 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7F4D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7F4E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7F8C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER800A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER894E.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Apr 18 01:20:03 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER898E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER89CD.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9516.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Apr 18 01:20:06 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9555.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9576.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\02.dll.dll,bdnimbus_ask
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\02.dll.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\02.dll.dll,bdnimbus_ask_async
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\02.dll.dll,bdnimbus_ask_bin
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_ask
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_ask_async
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_ask_bin
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\02.dll.dll",checkit
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_uninit
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_text
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_set_optionv
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_set_option
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_push_json
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_push_info
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_push_bin
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_mem_upload_async
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_mem_upload
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_type_of
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_string
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_real
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_path
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_object
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_long
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\02.dll.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\02.dll.dll",#1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 3440 -s 424
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 1900 -s 416
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 4124 -s 420
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 1408 -s 416
There are 20 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{2755e50e-17b4-b6dd-d94d-5e22d99d57c2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{2755e50e-17b4-b6dd-d94d-5e22d99d57c2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{2755e50e-17b4-b6dd-d94d-5e22d99d57c2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{2755e50e-17b4-b6dd-d94d-5e22d99d57c2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{2755e50e-17b4-b6dd-d94d-5e22d99d57c2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{2755e50e-17b4-b6dd-d94d-5e22d99d57c2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
OriginalFileName
\REGISTRY\A\{2755e50e-17b4-b6dd-d94d-5e22d99d57c2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{2755e50e-17b4-b6dd-d94d-5e22d99d57c2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{2755e50e-17b4-b6dd-d94d-5e22d99d57c2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{2755e50e-17b4-b6dd-d94d-5e22d99d57c2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{2755e50e-17b4-b6dd-d94d-5e22d99d57c2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{2755e50e-17b4-b6dd-d94d-5e22d99d57c2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{2755e50e-17b4-b6dd-d94d-5e22d99d57c2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{2755e50e-17b4-b6dd-d94d-5e22d99d57c2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{2755e50e-17b4-b6dd-d94d-5e22d99d57c2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
AppxPackageFullName
\REGISTRY\A\{2755e50e-17b4-b6dd-d94d-5e22d99d57c2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
AppxPackageRelativeId
\REGISTRY\A\{2755e50e-17b4-b6dd-d94d-5e22d99d57c2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{2755e50e-17b4-b6dd-d94d-5e22d99d57c2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{2755e50e-17b4-b6dd-d94d-5e22d99d57c2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
\REGISTRY\A\{2755e50e-17b4-b6dd-d94d-5e22d99d57c2}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Usn
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1A41A0D0000
direct allocation
page execute and read and write
malicious
1A41B901000
direct allocation
page execute and read and write
malicious
1A41A104000
direct allocation
page read and write
malicious
1A41A101000
direct allocation
page execute read
malicious
1A41BB06000
heap
page read and write
malicious
17C5E7C000
stack
page read and write
2580F750000
heap
page read and write
180252000
unkown
page readonly
180252000
unkown
page readonly
2203A230000
heap
page read and write
AEDB2FE000
stack
page read and write
180000000
unkown
page readonly
2CC53CF0000
heap
page read and write
180001000
unkown
page execute read
1A41B950000
heap
page read and write
259A3470000
heap
page read and write
180331000
unkown
page read and write
18032D000
unkown
page read and write
4C7439F000
stack
page read and write
1BBBB4D5000
heap
page read and write
129E3970000
heap
page read and write
2CC53D80000
remote allocation
page read and write
28822620000
heap
page read and write
1AE3F130000
heap
page read and write
180001000
unkown
page execute read
1D00C3A0000
heap
page read and write
18032D000
unkown
page read and write
21B39EED000
heap
page read and write
1A41A103000
direct allocation
page readonly
1CBD6560000
heap
page read and write
1A419F50000
heap
page read and write
180252000
unkown
page readonly
2C68B3B0000
heap
page read and write
1F4BAD40000
heap
page read and write
259A1AF0000
heap
page read and write
180252000
unkown
page readonly
202AECC0000
heap
page read and write
180001000
unkown
page execute read
180252000
unkown
page readonly
1D00C3B0000
heap
page read and write
180328000
unkown
page write copy
180000000
unkown
page readonly
134A3030000
heap
page read and write
2203A490000
heap
page read and write
1F4BAE70000
heap
page read and write
D1EF57F000
stack
page read and write
1CF00BC5000
heap
page read and write
35DC3FF000
stack
page read and write
180001000
unkown
page execute read
EC74A7F000
stack
page read and write
180335000
unkown
page readonly
180326000
unkown
page write copy
AEDB37F000
stack
page read and write
C86407F000
stack
page read and write
16D03CE0000
heap
page read and write
180326000
unkown
page write copy
180335000
unkown
page readonly
C863D2C000
stack
page read and write
180001000
unkown
page execute read
180327000
unkown
page read and write
180335000
unkown
page readonly
18032D000
unkown
page read and write
1DAB7110000
heap
page read and write
180331000
unkown
page read and write
180328000
unkown
page write copy
1BBBB470000
heap
page read and write
129E3AA0000
heap
page read and write
129E3C75000
heap
page read and write
134A2F10000
heap
page read and write
1D00DE40000
heap
page read and write
743BBDF000
stack
page read and write
180331000
unkown
page read and write
134A3010000
heap
page read and write
16D03CF0000
heap
page read and write
35DC37E000
stack
page read and write
180001000
unkown
page execute read
180327000
unkown
page read and write
314F5FE000
stack
page read and write
28822520000
heap
page read and write
E3D8AC000
stack
page read and write
180331000
unkown
page read and write
180252000
unkown
page readonly
180328000
unkown
page write copy
C325E8C000
stack
page read and write
21B14F90000
remote allocation
page read and write
6A9427C000
stack
page read and write
180327000
unkown
page read and write
16D03D40000
heap
page read and write
E3D92E000
stack
page read and write
180000000
unkown
page readonly
180335000
unkown
page readonly
16D03D58000
heap
page read and write
314F4FE000
stack
page read and write
259A19F4000
heap
page read and write
134A2E30000
heap
page read and write
1A41A150000
heap
page read and write
180327000
unkown
page read and write
1A41B900000
direct allocation
page read and write
180000000
unkown
page readonly
1A419FA1000
heap
page read and write
1A419F80000
heap
page read and write
2580F670000
heap
page read and write
1D00C7F5000
heap
page read and write
180335000
unkown
page readonly
1F4BAF00000
heap
page read and write
18032D000
unkown
page read and write
180328000
unkown
page write copy
161CD9F000
stack
page read and write
1D00C470000
heap
page read and write
20E9E690000
heap
page read and write
202AEB30000
heap
page read and write
1CBD6250000
heap
page read and write
180001000
unkown
page execute read
1BBBB4D0000
heap
page read and write
84B38C000
stack
page read and write
F50087F000
stack
page read and write
180327000
unkown
page read and write
21B14C08000
heap
page read and write
180335000
unkown
page readonly
E1724CC000
stack
page read and write
1F4BAEF0000
remote allocation
page read and write
180327000
unkown
page read and write
180331000
unkown
page read and write
180326000
unkown
page write copy
1CF00A20000
heap
page read and write
180335000
unkown
page readonly
140B7A40000
heap
page read and write
129E3C20000
remote allocation
page read and write
21B39E40000
heap
page read and write
129E3C70000
heap
page read and write
180000000
unkown
page readonly
1AE3EE30000
heap
page read and write
18032D000
unkown
page read and write
18032D000
unkown
page read and write
180001000
unkown
page execute read
180252000
unkown
page readonly
E3D9AF000
stack
page read and write
18032D000
unkown
page read and write
180335000
unkown
page readonly
180327000
unkown
page read and write
2C68B1C7000
heap
page read and write
180001000
unkown
page execute read
1D00C7D0000
remote allocation
page read and write
4C7429C000
stack
page read and write
1BBBB358000
heap
page read and write
EC74AFF000
stack
page read and write
202AECC5000
heap
page read and write
18032D000
unkown
page read and write
16D03D45000
heap
page read and write
180252000
unkown
page readonly
291ACC55000
heap
page read and write
1CF00B00000
heap
page read and write
84B67F000
stack
page read and write
AEDB27C000
stack
page read and write
680087C000
stack
page read and write
22130530000
remote allocation
page read and write
180328000
unkown
page write copy
291AC8F0000
heap
page read and write
1D00C478000
heap
page read and write
180328000
unkown
page write copy
20E9E460000
heap
page read and write
1CF02580000
heap
page read and write
2580F985000
heap
page read and write
180335000
unkown
page readonly
180326000
unkown
page write copy
180001000
unkown
page execute read
18032D000
unkown
page read and write
1DAB7120000
heap
page read and write
2E888CC000
stack
page read and write
180326000
unkown
page write copy
134A30D0000
heap
page read and write
1CBD6290000
heap
page read and write
2212EAE0000
heap
page read and write
259A1BB0000
heap
page read and write
180328000
unkown
page write copy
1DAB719E000
heap
page read and write
95A357F000
stack
page read and write
405127C000
stack
page read and write
291AC8D0000
heap
page read and write
180326000
unkown
page write copy
180001000
unkown
page execute read
18032D000
unkown
page read and write
DE5A7CF000
stack
page read and write
180331000
unkown
page read and write
180335000
unkown
page readonly
1A419F88000
heap
page read and write
140B77D0000
heap
page read and write
1CBD6230000
heap
page read and write
202AECB0000
remote allocation
page read and write
180331000
unkown
page read and write
21B3B870000
heap
page read and write
180331000
unkown
page read and write
1A419E50000
heap
page read and write
1A41BB00000
heap
page read and write
180000000
unkown
page readonly
259A19D8000
heap
page read and write
6A942FF000
stack
page read and write
1CF00BC0000
heap
page read and write
95A347C000
stack
page read and write
129E3A50000
heap
page read and write
C43307C000
stack
page read and write
C43317E000
stack
page read and write
2CC53B00000
heap
page read and write
180326000
unkown
page write copy
A68DC7C000
stack
page read and write
2C68B2C0000
heap
page read and write
180000000
unkown
page readonly
180252000
unkown
page readonly
743BE7F000
stack
page read and write
2212EAE8000
heap
page read and write
2580F7B8000
heap
page read and write
180326000
unkown
page write copy
180001000
unkown
page execute read
2203BCB0000
heap
page read and write
1DAB73C0000
heap
page read and write
68008FF000
stack
page read and write
180335000
unkown
page readonly
161CC9C000
stack
page read and write
2212EBE0000
heap
page read and write
1A41A100000
direct allocation
page read and write
17C5F7F000
stack
page read and write
180328000
unkown
page write copy
21B39EE0000
heap
page read and write
1CBD6570000
heap
page read and write
180001000
unkown
page execute read
1AE3EF00000
heap
page read and write
1DAB7140000
heap
page read and write
134A4880000
remote allocation
page read and write
140B77F0000
heap
page read and write
259A18F0000
heap
page read and write
28822625000
heap
page read and write
180327000
unkown
page read and write
180000000
unkown
page readonly
18032D000
unkown
page read and write
F50050C000
stack
page read and write
180327000
unkown
page read and write
2C68B3F5000
heap
page read and write
161CD1F000
stack
page read and write
180328000
unkown
page write copy
140B79C0000
heap
page read and write
21B14FA5000
heap
page read and write
180000000
unkown
page readonly
28822280000
heap
page read and write
180252000
unkown
page readonly
1CBD6150000
heap
page read and write
1AE3F135000
heap
page read and write
134A30D5000
heap
page read and write
1A41A155000
heap
page read and write
405137F000
stack
page read and write
180331000
unkown
page read and write
180335000
unkown
page readonly
180328000
unkown
page write copy
314F1EC000
stack
page read and write
180328000
unkown
page write copy
1BBBB270000
heap
page read and write
2CC53DC5000
heap
page read and write
1CF00B20000
heap
page read and write
680097F000
stack
page read and write
180327000
unkown
page read and write
180331000
unkown
page read and write
21B14E00000
heap
page read and write
21B14C00000
heap
page read and write
2203A210000
heap
page read and write
180000000
unkown
page readonly
180326000
unkown
page write copy
1BBBCDC0000
remote allocation
page read and write
2212EAC0000
heap
page read and write
2CC53B08000
heap
page read and write
291ACB60000
remote allocation
page read and write
28822290000
heap
page read and write
1BBBB350000
heap
page read and write
180328000
unkown
page write copy
20E9E685000
heap
page read and write
180000000
unkown
page readonly
180252000
unkown
page readonly
291AC978000
heap
page read and write
2580F980000
heap
page read and write
20E9E488000
heap
page read and write
180335000
unkown
page readonly
6A9437F000
stack
page read and write
291AC970000
heap
page read and write
20E9FFB0000
remote allocation
page read and write
18032D000
unkown
page read and write
21B3B7E0000
heap
page read and write
F50058F000
stack
page read and write
1BBBB450000
heap
page read and write
2E8894F000
stack
page read and write
180000000
unkown
page readonly
18032D000
unkown
page read and write
180252000
unkown
page readonly
21B39D60000
heap
page read and write
2C68B3F0000
heap
page read and write
140B7B65000
heap
page read and write
E1725CF000
stack
page read and write
180327000
unkown
page read and write
1AE3EE10000
heap
page read and write
180001000
unkown
page execute read
18032D000
unkown
page read and write
21B39EF9000
heap
page read and write
180326000
unkown
page write copy
1DAB7190000
heap
page read and write
1A41A12E000
direct allocation
page readonly
288222B0000
heap
page read and write
129E3A70000
heap
page read and write
180331000
unkown
page read and write
2212EC90000
heap
page read and write
2CC53DC0000
heap
page read and write
1D00C7F0000
heap
page read and write
180001000
unkown
page execute read
129E3BF0000
heap
page read and write
35DC2FC000
stack
page read and write
180326000
unkown
page write copy
180328000
unkown
page write copy
180327000
unkown
page read and write
D1EF4FF000
stack
page read and write
180327000
unkown
page read and write
180331000
unkown
page read and write
140B77F8000
heap
page read and write
1AE3ED30000
heap
page read and write
16D03D50000
heap
page read and write
180252000
unkown
page readonly
1CF00C08000
heap
page read and write
1F4BAE20000
heap
page read and write
1DAB73C5000
heap
page read and write
A68DCFE000
stack
page read and write
180000000
unkown
page readonly
180335000
unkown
page readonly
202AEA10000
heap
page read and write
259A1AD0000
heap
page read and write
180000000
unkown
page readonly
1F4BAE75000
heap
page read and write
2C68B2E0000
heap
page read and write
259A1BB5000
heap
page read and write
180000000
unkown
page readonly
2CC55640000
heap
page read and write
180326000
unkown
page write copy
A68DD7E000
stack
page read and write
129E3AA8000
heap
page read and write
180326000
unkown
page write copy
180328000
unkown
page write copy
18032D000
unkown
page read and write
4C7431E000
stack
page read and write
291ACBC0000
heap
page read and write
1A41BA90000
trusted library allocation
page read and write
20E9E650000
heap
page read and write
180252000
unkown
page readonly
180326000
unkown
page write copy
17C5EFE000
stack
page read and write
180328000
unkown
page write copy
21B14D00000
heap
page read and write
2203A480000
remote allocation
page read and write
180326000
unkown
page write copy
DE5A74F000
stack
page read and write
2CC53CD0000
heap
page read and write
70D527C000
stack
page read and write
180335000
unkown
page readonly
2212EC80000
heap
page read and write
70D537F000
stack
page read and write
18032D000
unkown
page read and write
EC747DC000
stack
page read and write
1F4BAF08000
heap
page read and write
180331000
unkown
page read and write
180328000
unkown
page write copy
1A419F30000
heap
page read and write
180001000
unkown
page execute read
DE5A6CC000
stack
page read and write
180331000
unkown
page read and write
134A2F18000
heap
page read and write
180331000
unkown
page read and write
25811200000
heap
page read and write
20E9E680000
heap
page read and write
180331000
unkown
page read and write
2E889CF000
stack
page read and write
180326000
unkown
page write copy
2203A238000
heap
page read and write
1F4BAE40000
heap
page read and write
180335000
unkown
page readonly
134A4920000
heap
page read and write
20E9FF90000
heap
page read and write
180335000
unkown
page readonly
2203A1E0000
heap
page read and write
D1EF47C000
stack
page read and write
1CBD6575000
heap
page read and write
180000000
unkown
page readonly
291AC8C0000
heap
page read and write
95A34FF000
stack
page read and write
2203A1F0000
heap
page read and write
180252000
unkown
page readonly
743BB5C000
stack
page read and write
1A419FAF000
heap
page read and write
202AEB10000
heap
page read and write
16D05820000
remote allocation
page read and write
180001000
unkown
page execute read
C863DAE000
stack
page read and write
180326000
unkown
page write copy
259A19D0000
heap
page read and write
70D52FF000
stack
page read and write
180000000
unkown
page readonly
1DAB7198000
heap
page read and write
2CC53AE0000
heap
page read and write
180001000
unkown
page execute read
C4330FF000
stack
page read and write
21B14FA0000
heap
page read and write
84B6FF000
stack
page read and write
21B39E70000
heap
page read and write
180331000
unkown
page read and write
16D058F0000
heap
page read and write
202B0590000
heap
page read and write
180252000
unkown
page readonly
1D00C3D0000
heap
page read and write
18032D000
unkown
page read and write
2C68B1C0000
heap
page read and write
140B7B60000
heap
page read and write
180326000
unkown
page write copy
2C68B0D0000
heap
page read and write
2580F770000
heap
page read and write
1A41A140000
trusted library allocation
page read and write
180328000
unkown
page write copy
21B14DE0000
heap
page read and write
20E9E480000
heap
page read and write
180328000
unkown
page write copy
21B168E0000
heap
page read and write
21B39E70000
heap
page read and write
18032D000
unkown
page read and write
180327000
unkown
page read and write
1AE3F0B0000
heap
page read and write
202AEB38000
heap
page read and write
180252000
unkown
page readonly
2212EC95000
heap
page read and write
180327000
unkown
page read and write
1AE3EF08000
heap
page read and write
1BBBCD90000
heap
page read and write
28822328000
heap
page read and write
1DAB8CD0000
heap
page read and write
180327000
unkown
page read and write
2580F7B0000
heap
page read and write
1A41B990000
heap
page read and write
202AEAF0000
heap
page read and write
180327000
unkown
page read and write
291ACC50000
heap
page read and write
1F4BC900000
heap
page read and write
180000000
unkown
page readonly
1CBD6298000
heap
page read and write
2203A495000
heap
page read and write
180252000
unkown
page readonly
180335000
unkown
page readonly
2212E9E0000
heap
page read and write
180331000
unkown
page read and write
40512FF000
stack
page read and write
180327000
unkown
page read and write
16D03D10000
heap
page read and write
E17254F000
stack
page read and write
140B79E0000
heap
page read and write
28822320000
heap
page read and write
1CF00C00000
heap
page read and write
There are 445 hidden memdumps, click here to show them.