IOC Report
SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_1cfbaf5ca3181558ae23b5af2bc325da778f0_7522e4b5_14134091-3833-4e2b-8109-25cb573f144c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_dbcb93d956ac28a5c3196766f9d12867aad21a0_7522e4b5_15e6224a-47ff-4b73-8f65-4223cf6f8bc8\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_dbcb93d956ac28a5c3196766f9d12867aad21a0_7522e4b5_64b4cab0-55cb-4fcf-9c67-4f15a83827f1\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8FDD.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Apr 27 01:31:56 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9099.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER90BA.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB4DA.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Apr 27 01:32:06 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB547.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Apr 27 01:32:06 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB5E4.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB614.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB671.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB6EF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\0304PT[1].zip
ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\vstatic\user
ASCII text, with CRLF line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll,A
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll,ABACULEJOTOTALISTRAZIUNTESNAGANNINIANAX
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll,B
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll",A
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll",ABACULEJOTOTALISTRAZIUNTESNAGANNINIANAX
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll",B
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll",dbkFCallWrapperAddr
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll",__dbk_fcall_wrapper
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll",TMethodImplementationIntercept
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll",F
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll",E
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll",C
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll",#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 672
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7512 -s 652
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7496 -s 656
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://cld.pt/dl/download/5a0d8a94-236d-4a83-b1ba-16bf33ac459c/0304PT.zip?user-English
unknown
http://upx.sf.net
unknown
https://cld.pt/
unknown
https://cld.pt/dl/download/5a0d8a94-236d-4a83-b1ba-16bf33ac459c/0304PT.zip
unknown
https://cld.pt/dl/download/5a0d8a94-236d-4a83-b1ba-16bf33ac459c/0304PT.zip?user-English%20(United%2
unknown
https://cld.pt/dl/download/5a0d8a94-236d-4a83-b1ba-16bf33ac459c/0304PT.zip?user-English%20(United%20Kingdom)
213.13.26.154

Domains

Name
IP
Malicious
cld.pt
213.13.26.154

IPs

IP
Domain
Country
Malicious
213.13.26.154
cld.pt
Portugal

Registry

Path
Value
Malicious
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProgramId
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
FileId
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LowerCaseLongPath
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LongPathHash
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Name
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
OriginalFileName
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Publisher
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Version
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinFileVersion
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinaryType
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductName
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductVersion
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LinkDate
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinProductVersion
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageFullName
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageRelativeId
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Size
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Language
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
IsOsComponent
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
42FF000
direct allocation
page read and write
288A000
heap
page read and write
2B40000
heap
page read and write
2B5E000
stack
page read and write
44CD000
direct allocation
page read and write
447F000
direct allocation
page read and write
4D26000
direct allocation
page read and write
6CD6A000
unkown
page readonly
2A7F000
stack
page read and write
2D3A000
stack
page read and write
4F78000
direct allocation
page read and write
2790000
heap
page read and write
29C0000
heap
page read and write
6CD50000
unkown
page read and write
4930000
trusted library allocation
page read and write
44A8000
direct allocation
page read and write
4B10000
direct allocation
page execute and read and write
29A0000
heap
page read and write
2820000
heap
page read and write
4B6E000
stack
page read and write
316A000
heap
page read and write
28A6000
heap
page read and write
4486000
direct allocation
page read and write
6CD4E000
unkown
page read and write
448B000
direct allocation
page read and write
4C3F000
direct allocation
page read and write
468A000
direct allocation
page read and write
4AD6000
direct allocation
page read and write
28C0000
heap
page read and write
6C7C1000
unkown
page execute read
4C44000
direct allocation
page read and write
4282000
direct allocation
page read and write
4F63000
direct allocation
page read and write
4499000
direct allocation
page read and write
432E000
stack
page read and write
4C22000
direct allocation
page read and write
6CD67000
unkown
page read and write
4691000
direct allocation
page read and write
2E94000
direct allocation
page read and write
2A5F000
stack
page read and write
4494000
direct allocation
page read and write
3430000
heap
page read and write
139E000
stack
page read and write
4AF3000
direct allocation
page read and write
6CD4E000
unkown
page read and write
4C78000
direct allocation
page read and write
2AEF000
stack
page read and write
2E74000
direct allocation
page read and write
2E3D000
heap
page read and write
1160000
heap
page read and write
27A0000
heap
page read and write
4B01000
direct allocation
page read and write
4F54000
heap
page read and write
444D000
direct allocation
page read and write
6CD59000
unkown
page write copy
4649000
direct allocation
page read and write
4C63000
direct allocation
page read and write
6C7C0000
unkown
page readonly
4ADD000
direct allocation
page read and write
4470000
direct allocation
page read and write
4430000
direct allocation
page read and write
45F0000
direct allocation
page read and write
432A000
direct allocation
page read and write
4B70000
heap
page read and write
4910000
heap
page read and write
580000
heap
page read and write
2EBF000
direct allocation
page read and write
43F8000
direct allocation
page read and write
34FF000
stack
page read and write
445B000
direct allocation
page read and write
6CD6A000
unkown
page readonly
4B10000
remote allocation
page read and write
6CD6A000
unkown
page readonly
4A27000
direct allocation
page read and write
4438000
direct allocation
page read and write
4330000
heap
page read and write
66C0000
trusted library allocation
page read and write
6CD5B000
unkown
page read and write
4F5C000
direct allocation
page read and write
2FA0000
direct allocation
page execute and read and write
446D000
direct allocation
page read and write
2E9B000
direct allocation
page read and write
4548000
direct allocation
page read and write
4A9E000
stack
page read and write
4C0B000
direct allocation
page read and write
4410000
direct allocation
page read and write
4462000
direct allocation
page read and write
6CD50000
unkown
page read and write
4C86000
direct allocation
page read and write
2C9F000
stack
page read and write
43B8000
direct allocation
page read and write
4F46000
direct allocation
page read and write
6CD68000
unkown
page readonly
44A0000
direct allocation
page read and write
4C4B000
direct allocation
page read and write
2B10000
heap
page read and write
29AA000
heap
page read and write
6CD53000
unkown
page write copy
58A000
stack
page read and write
6CD5B000
unkown
page read and write
6CD56000
unkown
page read and write
2DD0000
heap
page read and write
4F22000
direct allocation
page read and write
4C78000
direct allocation
page read and write
28E0000
heap
page read and write
2A3E000
stack
page read and write
443F000
direct allocation
page read and write
431C000
direct allocation
page read and write
2F0B000
stack
page read and write
4278000
direct allocation
page read and write
1140000
direct allocation
page execute and read and write
6CD5B000
unkown
page read and write
45A4000
direct allocation
page read and write
6C7C1000
unkown
page execute read
6CD59000
unkown
page write copy
4560000
heap
page read and write
6CD4F000
unkown
page write copy
4C70000
direct allocation
page read and write
6CD5B000
unkown
page read and write
2E37000
heap
page read and write
2E2A000
heap
page read and write
44B0000
direct allocation
page read and write
4469000
direct allocation
page read and write
585000
heap
page read and write
343E000
stack
page read and write
2965000
heap
page read and write
520000
heap
page read and write
4A31000
direct allocation
page read and write
2A7A000
heap
page read and write
51A0000
heap
page read and write
4A7D000
direct allocation
page read and write
6C7DE000
unkown
page execute read
28DA000
direct allocation
page read and write
2A1E000
stack
page read and write
2F50000
heap
page read and write
4314000
direct allocation
page read and write
54B000
stack
page read and write
3040000
heap
page read and write
29C5000
heap
page read and write
2EDC000
direct allocation
page read and write
2ADE000
stack
page read and write
287B000
direct allocation
page read and write
44AA000
direct allocation
page read and write
2EE3000
direct allocation
page read and write
280A000
heap
page read and write
2EC6000
direct allocation
page read and write
4428000
direct allocation
page read and write
42AD000
direct allocation
page read and write
4A84000
direct allocation
page read and write
2892000
direct allocation
page read and write
501E000
stack
page read and write
291D000
heap
page read and write
4331000
direct allocation
page read and write
317E000
stack
page read and write
2828000
direct allocation
page read and write
2EF8000
direct allocation
page read and write
45E2000
direct allocation
page read and write
10F0000
heap
page read and write
2A70000
heap
page read and write
304A000
heap
page read and write
272B000
stack
page read and write
2AF0000
direct allocation
page execute and read and write
4471000
direct allocation
page read and write
2AFB000
stack
page read and write
28E1000
direct allocation
page read and write
6C7DE000
unkown
page execute read
45B2000
direct allocation
page read and write
2E40000
heap
page read and write
2EF0000
heap
page read and write
6CD6A000
unkown
page readonly
3580000
heap
page read and write
6CD68000
unkown
page readonly
4478000
direct allocation
page read and write
48F0000
heap
page read and write
2884000
direct allocation
page read and write
6C7DE000
unkown
page execute read
28A1000
heap
page read and write
45C8000
direct allocation
page read and write
2810000
direct allocation
page execute and read and write
6CD4E000
unkown
page read and write
4AAB000
direct allocation
page read and write
29D0000
heap
page read and write
4C30000
direct allocation
page read and write
42F8000
direct allocation
page read and write
4A5E000
stack
page read and write
4338000
direct allocation
page read and write
323A000
heap
page read and write
44B8000
direct allocation
page read and write
29BE000
stack
page read and write
2CFB000
stack
page read and write
425F000
stack
page read and write
4A0F000
stack
page read and write
315A000
heap
page read and write
441F000
stack
page read and write
4608000
direct allocation
page read and write
4AFA000
direct allocation
page read and write
444B000
direct allocation
page read and write
4584000
direct allocation
page read and write
2A3E000
stack
page read and write
28C4000
direct allocation
page read and write
2B61000
heap
page read and write
45DD000
direct allocation
page read and write
4CE4000
direct allocation
page read and write
34BE000
stack
page read and write
2E33000
heap
page read and write
47F0000
heap
page read and write
4CD4000
direct allocation
page read and write
4C1B000
direct allocation
page read and write
3230000
heap
page read and write
4F29000
direct allocation
page read and write
28A0000
direct allocation
page read and write
4C10000
heap
page read and write
4674000
direct allocation
page read and write
28D3000
direct allocation
page read and write
2874000
direct allocation
page read and write
2EA9000
direct allocation
page read and write
303A000
stack
page read and write
291A000
heap
page read and write
3251000
heap
page read and write
6CD4F000
unkown
page write copy
44A2000
direct allocation
page read and write
4464000
direct allocation
page read and write
116B000
heap
page read and write
29F0000
heap
page read and write
4BED000
direct allocation
page read and write
3160000
heap
page read and write
4CB1000
direct allocation
page read and write
4C14000
direct allocation
page read and write
49C0000
heap
page read and write
4ACF000
direct allocation
page read and write
4F71000
direct allocation
page read and write
2FB5000
heap
page read and write
4463000
direct allocation
page read and write
6CD56000
unkown
page read and write
44AF000
direct allocation
page read and write
287B000
stack
page read and write
44F8000
direct allocation
page read and write
6CD60000
unkown
page read and write
45FA000
direct allocation
page read and write
2EF1000
direct allocation
page read and write
48B000
stack
page read and write
4980000
heap
page read and write
6CD5B000
unkown
page read and write
268F000
stack
page read and write
4EC2000
direct allocation
page read and write
4438000
direct allocation
page read and write
6CD4F000
unkown
page write copy
2B00000
heap
page read and write
4AC8000
direct allocation
page read and write
6CD53000
unkown
page write copy
2899000
direct allocation
page read and write
4C02000
direct allocation
page read and write
4C46000
direct allocation
page read and write
4D43000
direct allocation
page read and write
41DF000
stack
page read and write
6CD59000
unkown
page write copy
2D80000
direct allocation
page execute and read and write
2B70000
heap
page read and write
4C69000
direct allocation
page read and write
4C62000
direct allocation
page read and write
4D1F000
direct allocation
page read and write
4C3D000
direct allocation
page read and write
4624000
direct allocation
page read and write
4A52000
direct allocation
page read and write
28BD000
direct allocation
page read and write
463B000
direct allocation
page read and write
4F0B000
direct allocation
page read and write
3186000
heap
page read and write
44A3000
direct allocation
page read and write
4C6A000
direct allocation
page read and write
570000
heap
page read and write
2ABA000
heap
page read and write
3157000
heap
page read and write
6CD68000
unkown
page readonly
6CD65000
unkown
page write copy
4C98000
direct allocation
page read and write
42EF000
stack
page read and write
28C5000
heap
page read and write
4EB8000
direct allocation
page read and write
42E2000
direct allocation
page read and write
2E33000
heap
page read and write
1120000
heap
page read and write
4F04000
direct allocation
page read and write
490000
heap
page read and write
278F000
stack
page read and write
44C0000
heap
page read and write
28B0000
heap
page read and write
2E6D000
direct allocation
page read and write
4698000
direct allocation
page read and write
4A60000
direct allocation
page read and write
4F0000
heap
page read and write
2880000
heap
page read and write
2B30000
heap
page read and write
44A9000
direct allocation
page read and write
4B30000
heap
page read and write
44E3000
direct allocation
page read and write
4C94000
direct allocation
page read and write
2DA0000
heap
page read and write
4A8D000
direct allocation
page read and write
3020000
direct allocation
page execute and read and write
330A000
heap
page read and write
4A9B000
direct allocation
page read and write
4C54000
direct allocation
page read and write
25D0000
heap
page read and write
4658000
direct allocation
page read and write
4770000
heap
page read and write
6C7C0000
unkown
page readonly
44EA000
direct allocation
page read and write
4414000
direct allocation
page read and write
6C7C0000
unkown
page readonly
51F0000
heap
page read and write
45EC000
direct allocation
page read and write
3300000
heap
page read and write
459B000
direct allocation
page read and write
4D58000
direct allocation
page read and write
4306000
direct allocation
page read and write
2840000
heap
page read and write
2D1F000
stack
page read and write
42B4000
direct allocation
page read and write
3181000
heap
page read and write
447B000
direct allocation
page read and write
28AA000
heap
page read and write
2B9B000
stack
page read and write
440B000
direct allocation
page read and write
4492000
direct allocation
page read and write
4BF8000
direct allocation
page read and write
500000
heap
page read and write
44C4000
direct allocation
page read and write
287B000
stack
page read and write
4560000
direct allocation
page read and write
6CD56000
unkown
page read and write
42CB000
direct allocation
page read and write
4454000
direct allocation
page read and write
6CD67000
unkown
page read and write
2E50000
heap
page read and write
48FD000
stack
page read and write
2864000
direct allocation
page read and write
2D80000
heap
page read and write
1140000
heap
page read and write
4450000
direct allocation
page read and write
442D000
direct allocation
page read and write
264E000
stack
page read and write
4EF4000
direct allocation
page read and write
6CD4F000
unkown
page write copy
1177000
heap
page read and write
6CD50000
unkown
page read and write
2740000
heap
page read and write
6C7C1000
unkown
page execute read
4650000
direct allocation
page read and write
2830000
heap
page read and write
4B4E000
stack
page read and write
4B20000
heap
page read and write
4980000
heap
page read and write
46A0000
heap
page read and write
2E8B000
direct allocation
page read and write
43D0000
direct allocation
page read and write
4D0000
heap
page read and write
466D000
direct allocation
page read and write
4F6A000
direct allocation
page read and write
6CD56000
unkown
page read and write
2ECE000
stack
page read and write
2A50000
direct allocation
page execute and read and write
4C7F000
direct allocation
page read and write
6CD67000
unkown
page read and write
4601000
direct allocation
page read and write
4474000
direct allocation
page read and write
457D000
direct allocation
page read and write
2D3C000
stack
page read and write
4C4D000
direct allocation
page read and write
4D3C000
direct allocation
page read and write
4900000
heap
page read and write
4B08000
direct allocation
page read and write
4454000
direct allocation
page read and write
2EA2000
direct allocation
page read and write
4BF4000
direct allocation
page read and write
285D000
direct allocation
page read and write
497E000
stack
page read and write
4AB2000
direct allocation
page read and write
4CAA000
direct allocation
page read and write
DAB000
stack
page read and write
4C5B000
direct allocation
page read and write
4474000
direct allocation
page read and write
6CD59000
unkown
page write copy
4BE0000
heap
page read and write
446A000
direct allocation
page read and write
2CDE000
stack
page read and write
2ECD000
direct allocation
page read and write
44D4000
direct allocation
page read and write
347E000
stack
page read and write
6CD50000
unkown
page read and write
4484000
direct allocation
page read and write
2990000
heap
page read and write
445D000
direct allocation
page read and write
283B000
stack
page read and write
43A0000
heap
page read and write
2ECB000
stack
page read and write
30F0000
heap
page read and write
270E000
stack
page read and write
6CD53000
unkown
page write copy
4A9F000
stack
page read and write
4446000
direct allocation
page read and write
28A0000
heap
page read and write
3220000
heap
page read and write
28AF000
direct allocation
page read and write
6C7DE000
unkown
page execute read
45D8000
direct allocation
page read and write
2AE0000
heap
page read and write
283B000
stack
page read and write
2AD0000
direct allocation
page execute and read and write
48BD000
stack
page read and write
6C7C0000
unkown
page readonly
2904000
heap
page read and write
43ED000
direct allocation
page read and write
2910000
heap
page read and write
2E84000
direct allocation
page read and write
2BD0000
heap
page read and write
6C7C1000
unkown
page execute read
2E3A000
heap
page read and write
6CD4E000
unkown
page read and write
6CD60000
unkown
page read and write
4BAF000
stack
page read and write
4BD0000
direct allocation
page read and write
288B000
direct allocation
page read and write
2E50000
direct allocation
page read and write
2820000
heap
page read and write
2E00000
heap
page read and write
45CF000
direct allocation
page read and write
6C7C0000
unkown
page readonly
449C000
direct allocation
page read and write
493D000
stack
page read and write
4F30000
direct allocation
page read and write
26B0000
heap
page read and write
31FE000
stack
page read and write
4429000
direct allocation
page read and write
42E9000
direct allocation
page read and write
4B10000
remote allocation
page read and write
3290000
heap
page read and write
4C34000
direct allocation
page read and write
44DC000
direct allocation
page read and write
4D2D000
direct allocation
page read and write
26EB000
stack
page read and write
441B000
direct allocation
page read and write
6CD53000
unkown
page write copy
2E34000
heap
page read and write
449B000
direct allocation
page read and write
2B4A000
heap
page read and write
4B8F000
stack
page read and write
4444000
direct allocation
page read and write
CAB000
stack
page read and write
129E000
stack
page read and write
6CD59000
unkown
page write copy
2B66000
heap
page read and write
436F000
stack
page read and write
2AB0000
heap
page read and write
4A94000
direct allocation
page read and write
2F80000
heap
page read and write
4614000
direct allocation
page read and write
4F50000
heap
page read and write
4CB0000
direct allocation
page read and write
42DB000
direct allocation
page read and write
6CD65000
unkown
page write copy
45B9000
direct allocation
page read and write
4494000
direct allocation
page read and write
4940000
trusted library allocation
page read and write
4CF4000
direct allocation
page read and write
47B000
stack
page read and write
44C6000
direct allocation
page read and write
4CB8000
direct allocation
page read and write
6CD68000
unkown
page readonly
2DA0000
heap
page read and write
44B6000
direct allocation
page read and write
6CD67000
unkown
page read and write
42F0000
direct allocation
page read and write
28A8000
direct allocation
page read and write
4640000
heap
page read and write
4F1B000
direct allocation
page read and write
31BF000
stack
page read and write
6CD53000
unkown
page write copy
4ED0000
direct allocation
page read and write
3150000
heap
page read and write
4D4A000
direct allocation
page read and write
13DD000
stack
page read and write
6CD65000
unkown
page write copy
32E0000
direct allocation
page execute and read and write
1125000
heap
page read and write
4323000
direct allocation
page read and write
4D02000
direct allocation
page read and write
4C04000
direct allocation
page read and write
44B000
stack
page read and write
4E30000
heap
page read and write
2ACE000
stack
page read and write
2E37000
heap
page read and write
6CD50000
unkown
page read and write
2710000
direct allocation
page execute and read and write
453F000
stack
page read and write
460D000
direct allocation
page read and write
42C4000
direct allocation
page read and write
4AEC000
direct allocation
page read and write
4C10000
direct allocation
page read and write
283B000
stack
page read and write
4AC0000
direct allocation
page read and write
4AB9000
direct allocation
page read and write
4CCD000
direct allocation
page read and write
4D10000
direct allocation
page read and write
6CD67000
unkown
page read and write
4D51000
direct allocation
page read and write
42B000
stack
page read and write
4C29000
direct allocation
page read and write
4478000
direct allocation
page read and write
4D34000
direct allocation
page read and write
4B10000
remote allocation
page read and write
2840000
direct allocation
page read and write
44B8000
direct allocation
page read and write
421E000
stack
page read and write
2EB8000
direct allocation
page read and write
4EED000
direct allocation
page read and write
2960000
heap
page read and write
32D0000
heap
page read and write
6C7DE000
unkown
page execute read
430D000
direct allocation
page read and write
4A67000
direct allocation
page read and write
2810000
heap
page read and write
4404000
direct allocation
page read and write
4C9C000
direct allocation
page read and write
3080000
heap
page read and write
2E34000
heap
page read and write
4AE4000
direct allocation
page read and write
4CEB000
direct allocation
page read and write
2AE0000
direct allocation
page execute and read and write
4F4D000
direct allocation
page read and write
2DB0000
heap
page read and write
29C0000
heap
page read and write
2E3A000
heap
page read and write
4C8D000
direct allocation
page read and write
28B6000
direct allocation
page read and write
2920000
heap
page read and write
6CD60000
unkown
page read and write
49CE000
stack
page read and write
2ED4000
direct allocation
page read and write
4F3F000
direct allocation
page read and write
28E8000
direct allocation
page read and write
6CD6A000
unkown
page readonly
44BD000
direct allocation
page read and write
42BD000
direct allocation
page read and write
6CD60000
unkown
page read and write
467C000
direct allocation
page read and write
14DE000
stack
page read and write
6C7C1000
unkown
page execute read
4290000
direct allocation
page read and write
4C2D000
direct allocation
page read and write
58E000
stack
page read and write
445C000
direct allocation
page read and write
57B000
stack
page read and write
3EB000
stack
page read and write
4642000
direct allocation
page read and write
4632000
direct allocation
page read and write
2E38000
direct allocation
page read and write
2936000
heap
page read and write
4A5E000
stack
page read and write
4F54000
direct allocation
page read and write
465F000
direct allocation
page read and write
2EEA000
direct allocation
page read and write
4BB8000
direct allocation
page read and write
4F38000
direct allocation
page read and write
2DDB000
stack
page read and write
6CD4F000
unkown
page write copy
2B9F000
stack
page read and write
45AB000
direct allocation
page read and write
2AB7000
stack
page read and write
4CFB000
direct allocation
page read and write
310E000
stack
page read and write
6CD56000
unkown
page read and write
6CD4E000
unkown
page read and write
4422000
direct allocation
page read and write
462B000
direct allocation
page read and write
2B80000
heap
page read and write
3400000
heap
page read and write
43F4000
direct allocation
page read and write
116F000
heap
page read and write
6CD65000
unkown
page write copy
44F1000
direct allocation
page read and write
4C71000
direct allocation
page read and write
25E0000
direct allocation
page execute and read and write
30E0000
heap
page read and write
28CC000
direct allocation
page read and write
2FD0000
heap
page read and write
2D7E000
stack
page read and write
2AF0000
heap
page read and write
43B000
stack
page read and write
29C6000
heap
page read and write
2B60000
heap
page read and write
44B1000
direct allocation
page read and write
6CD60000
unkown
page read and write
2E30000
heap
page read and write
1610000
heap
page read and write
45D6000
direct allocation
page read and write
4434000
direct allocation
page read and write
4F12000
direct allocation
page read and write
4C52000
direct allocation
page read and write
448D000
direct allocation
page read and write
45C0000
direct allocation
page read and write
2E0A000
heap
page read and write
300F000
stack
page read and write
1010000
heap
page read and write
6CD65000
unkown
page write copy
4A59000
direct allocation
page read and write
461D000
direct allocation
page read and write
4A48000
direct allocation
page read and write
2BDB000
stack
page read and write
314F000
stack
page read and write
4C38000
direct allocation
page read and write
2AD0000
heap
page read and write
27A0000
heap
page read and write
2FB0000
heap
page read and write
2EB0000
direct allocation
page read and write
4AB0000
direct allocation
page execute and read and write
4D09000
direct allocation
page read and write
4594000
direct allocation
page read and write
6CD68000
unkown
page readonly
4666000
direct allocation
page read and write
4FDF000
stack
page read and write
4CA3000
direct allocation
page read and write
3090000
heap
page read and write
4440000
direct allocation
page read and write
4484000
direct allocation
page read and write
2F70000
heap
page read and write
505F000
stack
page read and write
45F3000
direct allocation
page read and write
45E4000
direct allocation
page read and write
4683000
direct allocation
page read and write
448B000
direct allocation
page read and write
42D2000
direct allocation
page read and write
2800000
heap
page read and write
4D18000
direct allocation
page read and write
2DB0000
heap
page read and write
4AA2000
direct allocation
page read and write
4B0F000
stack
page read and write
2826000
heap
page read and write
4F9E000
stack
page read and write
44BF000
direct allocation
page read and write
4EFD000
direct allocation
page read and write
28EB000
heap
page read and write
4C5C000
direct allocation
page read and write
There are 633 hidden memdumps, click here to show them.