IOC Report
62835e34e60c1.dll

loading gif

Files

File Path
Type
Category
Malicious
62835e34e60c1.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_99e41d792528612ced890929ed2335749e1b7_7cac0383_1936fee1\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_cb7b105113bf417cfd7547dda3de839a49ae23_7cac0383_1942d7b1\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_e912ab21695e486193197883960c42688442ed7_7cac0383_1836ecd0\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD1D5.tmp.dmp
Mini DuMP crash report, 15 streams, Tue May 17 17:46:23 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD4C4.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD67B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE01E.tmp.dmp
Mini DuMP crash report, 15 streams, Tue May 17 17:46:27 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE33B.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE465.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF4BF.tmp.dmp
Mini DuMP crash report, 15 streams, Tue May 17 17:46:32 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF740.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF8A9.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\62835e34e60c1.dll",#1
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\62835e34e60c1.dll"
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\62835e34e60c1.dll",#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6164 -s 400
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6164 -s 408
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6164 -s 412

URLs

Name
IP
Malicious
http://185.18
unknown

Domains

Name
IP
Malicious
l-0007.l-dc-msedge.net
13.107.43.16
malicious

IPs

IP
Domain
Country
Malicious
185.189.151.70
unknown
Switzerland
malicious
185.189.151.28
unknown
Switzerland
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018C005C62C4D85
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
There are 1 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4E68000
heap
page read and write
malicious
4E68000
heap
page read and write
malicious
4E68000
heap
page read and write
malicious
4E68000
heap
page read and write
malicious
4E68000
heap
page read and write
malicious
4E68000
heap
page read and write
malicious
4E68000
heap
page read and write
malicious
4839000
heap
page read and write
malicious
4E68000
heap
page read and write
malicious
4E68000
heap
page read and write
malicious
4490000
direct allocation
page read and write
1CCDBC02000
heap
page read and write
21FA304A000
heap
page read and write
1CCDB7BE000
heap
page read and write
21898C02000
trusted library allocation
page read and write
2189824C000
heap
page read and write
218887E000
stack
page read and write
28760302000
heap
page read and write
1CCDB520000
remote allocation
page read and write
401000
unkown
page execute read
2189823C000
heap
page read and write
1461F280000
trusted library allocation
page read and write
CF359FE000
stack
page read and write
1CCDB7A1000
heap
page read and write
21FA3000000
heap
page read and write
20961229000
heap
page read and write
14619A50000
heap
page read and write
610000
remote allocation
page read and write
1CCDB726000
heap
page read and write
1CCDACF8000
heap
page read and write
1461F320000
trusted library allocation
page read and write
1461F258000
trusted library allocation
page read and write
21FA3113000
heap
page read and write
4490000
direct allocation
page read and write
1CCDB77A000
heap
page read and write
21FA3013000
heap
page read and write
1461F4EC000
heap
page read and write
1CCDAD16000
heap
page read and write
40B000
unkown
page execute read
1CCDABC0000
heap
page read and write
400000
unkown
page readonly
827077B000
stack
page read and write
1CCDB79C000
heap
page read and write
7610D77000
stack
page read and write
4490000
direct allocation
page read and write
2189824B000
heap
page read and write
1461F4AE000
heap
page read and write
1CCDAC4D000
heap
page read and write
220ADF4E000
heap
page read and write
1F13C477000
heap
page read and write
620000
trusted library allocation
page read and write
287612D0000
heap
page readonly
1020000
unkown
page read and write
1461A3F0000
trusted library allocation
page read and write
1CCDB791000
heap
page read and write
29EA000
heap
page read and write
4490000
direct allocation
page read and write
21898277000
heap
page read and write
2189824F000
heap
page read and write
11F0000
trusted library allocation
page read and write
20961264000
heap
page read and write
EE9C8FE000
stack
page read and write
44B1000
unclassified section
page execute read
4490000
direct allocation
page read and write
557F000
stack
page read and write
1CCDB7CC000
heap
page read and write
159F000
stack
page read and write
1CCDBC02000
heap
page read and write
21FA308B000
heap
page read and write
1CCDB7AD000
heap
page read and write
21FA302A000
heap
page read and write
4490000
direct allocation
page read and write
1461F320000
trusted library allocation
page read and write
1F13C502000
heap
page read and write
1CCDB775000
heap
page read and write
4490000
direct allocation
page read and write
49CC000
stack
page read and write
620000
heap
page read and write
1F13C402000
heap
page read and write
4490000
direct allocation
page read and write
40B000
unkown
page execute read
2188BFA000
stack
page read and write
1CCDBC02000
heap
page read and write
218981E0000
heap
page read and write
1CCDB77F000
heap
page read and write
1461F45F000
heap
page read and write
123E000
stack
page read and write
1461F449000
heap
page read and write
123E000
stack
page read and write
1CCDAC27000
heap
page read and write
1CCDACC3000
heap
page read and write
20961302000
heap
page read and write
210867C000
stack
page read and write
1461F400000
heap
page read and write
610000
remote allocation
page read and write
13A0000
heap
page read and write
1461F25E000
trusted library allocation
page read and write
14619CAB000
heap
page read and write
159F000
stack
page read and write
1CCDBC02000
heap
page read and write
545F000
stack
page read and write
44C0000
heap
page read and write
E1FEE79000
stack
page read and write
218819E000
stack
page read and write
1CCDB77F000
heap
page read and write
4490000
direct allocation
page read and write
135E000
stack
page read and write
123E000
stack
page read and write
640000
remote allocation
page read and write
21FA304C000
heap
page read and write
21FA3054000
heap
page read and write
40D000
unkown
page readonly
21898250000
heap
page read and write
1CCDACE9000
heap
page read and write
40B000
unkown
page execute read
2108A7E000
stack
page read and write
1461A402000
heap
page read and write
4490000
direct allocation
page read and write
4490000
direct allocation
page read and write
28760510000
heap
page read and write
21898256000
heap
page read and write
1461F270000
trusted library allocation
page read and write
1F13C451000
heap
page read and write
1CCDB520000
remote allocation
page read and write
417000
unkown
page write copy
21898281000
heap
page read and write
1CCDBC02000
heap
page read and write
4490000
direct allocation
page read and write
417000
unkown
page write copy
4490000
direct allocation
page read and write
82704FE000
stack
page read and write
1461F43C000
heap
page read and write
11F0000
trusted library allocation
page read and write
1CCDB7A6000
heap
page read and write
4A50000
heap
page read and write
209610A0000
heap
page read and write
4490000
direct allocation
page read and write
2A37AFE000
stack
page read and write
401000
unkown
page execute read
1CCDB7A4000
heap
page read and write
21898252000
heap
page read and write
4490000
direct allocation
page read and write
4490000
direct allocation
page read and write
1CCDB790000
heap
page read and write
1CCDB78C000
heap
page read and write
EE9C87E000
stack
page read and write
401000
unkown
page execute read
4490000
direct allocation
page read and write
4490000
direct allocation
page read and write
1CCDB779000
heap
page read and write
21898257000
heap
page read and write
4490000
direct allocation
page read and write
14619BB0000
trusted library allocation
page read and write
445E000
stack
page read and write
1CCDB79E000
heap
page read and write
4A0B000
stack
page read and write
2800000
heap
page read and write
1CCDAC55000
heap
page read and write
1240000
heap
page read and write
123E000
stack
page read and write
4490000
direct allocation
page read and write
4490000
direct allocation
page read and write
14619D02000
heap
page read and write
159F000
stack
page read and write
1020000
unkown
page read and write
8270877000
stack
page read and write
14619CFE000
heap
page read and write
13A0000
heap
page read and write
1CCDAC3C000
heap
page read and write
40F000
unkown
page write copy
4490000
direct allocation
page read and write
1CCDAC48000
heap
page read and write
761068B000
stack
page read and write
1CCDB700000
heap
page read and write
40F000
unkown
page write copy
4490000
direct allocation
page read and write
1CCDB779000
heap
page read and write
1CCDB79D000
heap
page read and write
2910000
trusted library allocation
page read and write
135E000
stack
page read and write
1461F250000
trusted library allocation
page read and write
28760480000
heap
page read and write
1CCDB790000
heap
page read and write
40D000
unkown
page readonly
14619C7B000
heap
page read and write
14619A40000
heap
page read and write
21FA303C000
heap
page read and write
54BE000
stack
page read and write
1CCDACD4000
heap
page read and write
1F13C400000
heap
page read and write
1CCDB79E000
heap
page read and write
1CCDBC00000
heap
page read and write
14619CA8000
heap
page read and write
462000
unkown
page readonly
48B8000
heap
page read and write
1CCDB77D000
heap
page read and write
4490000
direct allocation
page read and write
220ADF61000
heap
page read and write
405000
unkown
page read and write
1CCDAC29000
heap
page read and write
2A377FA000
stack
page read and write
1240000
heap
page read and write
220ADF67000
heap
page read and write
414000
unkown
page read and write
400000
unkown
page readonly
2A373FB000
stack
page read and write
4490000
direct allocation
page read and write
400000
unkown
page readonly
1CCDB79A000
heap
page read and write
1461A500000
heap
page read and write
1CCDB79A000
heap
page read and write
20961200000
heap
page read and write
4490000
direct allocation
page read and write
1461F370000
trusted library allocation
page read and write
462000
unkown
page readonly
4490000
direct allocation
page read and write
108C000
stack
page read and write
1CCDACB5000
heap
page read and write
1F13C479000
heap
page read and write
4490000
direct allocation
page read and write
640000
remote allocation
page read and write
2096126E000
heap
page read and write
4490000
direct allocation
page read and write
1461F4FF000
heap
page read and write
2189825A000
heap
page read and write
1CCDB791000
heap
page read and write
1CCDAC53000
heap
page read and write
1CCDB779000
heap
page read and write
4490000
direct allocation
page read and write
1461F410000
heap
page read and write
1461F3B0000
remote allocation
page read and write
1CCDB721000
heap
page read and write
1CCDB781000
heap
page read and write
21898180000
heap
page read and write
4490000
direct allocation
page read and write
13A0000
heap
page read and write
1CCDAC51000
heap
page read and write
44BC000
unclassified section
page readonly
2AAF000
stack
page read and write
761070E000
stack
page read and write
4490000
direct allocation
page read and write
1461F290000
trusted library allocation
page read and write
1CCDB77B000
heap
page read and write
2940000
heap
page read and write
28760515000
heap
page read and write
401000
unkown
page execute read
2AAF000
stack
page read and write
1CCDB791000
heap
page read and write
4490000
direct allocation
page read and write
1CCDACEB000
heap
page read and write
401000
unkown
page execute read
14619C13000
heap
page read and write
1461A504000
heap
page read and write
1CCDB777000
heap
page read and write
1CCDAD08000
heap
page read and write
1F13C3C0000
heap
page read and write
159F000
stack
page read and write
4490000
direct allocation
page read and write
1CCDB777000
heap
page read and write
620000
heap
page read and write
220ADEB0000
heap
page read and write
220ADF40000
heap
page read and write
1461F3B0000
remote allocation
page read and write
1CCDB775000
heap
page read and write
1CCDB773000
heap
page read and write
123E000
stack
page read and write
287602FA000
heap
page read and write
1CCDB752000
heap
page read and write
4490000
direct allocation
page read and write
4490000
direct allocation
page read and write
1F13C350000
heap
page read and write
21FA2F70000
heap
page read and write
13A0000
heap
page read and write
1461A559000
heap
page read and write
28AB000
stack
page read and write
4490000
direct allocation
page read and write
1020000
unkown
page read and write
541E000
stack
page read and write
40B000
unkown
page execute read
118C000
stack
page read and write
4E6B000
heap
page read and write
2188A7C000
stack
page read and write
220ADF68000
heap
page read and write
1CCDB775000
heap
page read and write
1CCDB79A000
heap
page read and write
1020000
unkown
page read and write
21FA2F60000
heap
page read and write
21898302000
heap
page read and write
218811B000
stack
page read and write
1F13CE02000
trusted library allocation
page read and write
4A70000
heap
page read and write
620000
trusted library allocation
page read and write
1F13C3F0000
trusted library allocation
page read and write
2096125D000
heap
page read and write
14619AB0000
heap
page read and write
220ADF81000
heap
page read and write
108C000
stack
page read and write
414000
unkown
page read and write
1CCDB718000
heap
page read and write
2108877000
stack
page read and write
4490000
direct allocation
page read and write
220ADF4A000
heap
page read and write
1461F330000
trusted library allocation
page read and write
537E000
stack
page read and write
1461F42B000
heap
page read and write
620000
heap
page read and write
1CCDB7AB000
heap
page read and write
1CCDB792000
heap
page read and write
14619C79000
heap
page read and write
118C000
stack
page read and write
2945000
heap
page read and write
2A372FE000
stack
page read and write
28761340000
trusted library allocation
page read and write
82705FC000
stack
page read and write
4490000
direct allocation
page read and write
1CCDB77D000
heap
page read and write
4490000
direct allocation
page read and write
1461A518000
heap
page read and write
21898308000
heap
page read and write
14619D02000
heap
page read and write
2188678000
stack
page read and write
462000
unkown
page readonly
1CCDB71A000
heap
page read and write
4490000
direct allocation
page read and write
2188977000
stack
page read and write
2A371FA000
stack
page read and write
13AB000
heap
page read and write
1CCDB7A4000
heap
page read and write
1CCDB775000
heap
page read and write
1CCDB602000
heap
page read and write
2AAF000
stack
page read and write
827067E000
stack
page read and write
4490000
direct allocation
page read and write
4490000
direct allocation
page read and write
1CCDB7A4000
heap
page read and write
1CCDB79E000
heap
page read and write
1CCDAD13000
heap
page read and write
CF35AFE000
stack
page read and write
4E6B000
heap
page read and write
14619D26000
heap
page read and write
E1FEF79000
stack
page read and write
135E000
stack
page read and write
1CCDB775000
heap
page read and write
1CCDB77A000
heap
page read and write
1020000
heap
page read and write
21898A80000
trusted library allocation
page read and write
4490000
direct allocation
page read and write
4490000
direct allocation
page read and write
1CCDB7A3000
heap
page read and write
403000
unkown
page readonly
2A370FB000
stack
page read and write
220ADF70000
heap
page read and write
4490000
direct allocation
page read and write
220ADD80000
heap
page read and write
11F0000
trusted library allocation
page read and write
4490000
direct allocation
page read and write
401000
unkown
page execute read
123E000
stack
page read and write
4490000
direct allocation
page read and write
4490000
direct allocation
page read and write
4490000
direct allocation
page read and write
1F13C413000
heap
page read and write
108C000
stack
page read and write
1461A415000
heap
page read and write
414000
unkown
page read and write
220ADED0000
heap
page read and write
1CCDAC88000
heap
page read and write
400000
unkown
page readonly
28760302000
heap
page read and write
1461F274000
trusted library allocation
page read and write
462000
unkown
page readonly
1CCDB726000
heap
page read and write
1CCDB775000
heap
page read and write
4490000
direct allocation
page read and write
1461F502000
heap
page read and write
1461B0C0000
trusted library allocation
page read and write
4490000
direct allocation
page read and write
287602B8000
heap
page read and write
CF358FB000
stack
page read and write
EE9C9FF000
stack
page read and write
527D000
stack
page read and write
21898300000
heap
page read and write
1CCDB773000
heap
page read and write
218847E000
stack
page read and write
40F000
unkown
page write copy
1CCDAC70000
heap
page read and write
640000
remote allocation
page read and write
44B9000
unclassified section
page readonly
210897F000
stack
page read and write
21898213000
heap
page read and write
1461F140000
trusted library allocation
page read and write
21FA307E000
heap
page read and write
52BA000
stack
page read and write
1CCDACC7000
heap
page read and write
4490000
direct allocation
page read and write
21898259000
heap
page read and write
1240000
heap
page read and write
1CCDB7C7000
heap
page read and write
1461F4B1000
heap
page read and write
1CCDB7B2000
heap
page read and write
135E000
stack
page read and write
44B0000
unclassified section
page read and write
EE9CA7C000
stack
page read and write
4490000
direct allocation
page read and write
40D000
unkown
page readonly
1F13C440000
heap
page read and write
1CCDBC02000
heap
page read and write
1CCDB77F000
heap
page read and write
11F0000
trusted library allocation
page read and write
2A53000
heap
page read and write
1CCDB781000
heap
page read and write
220ADF52000
heap
page read and write
406000
unkown
page readonly
E1FEEFE000
stack
page read and write
1CCDB7AE000
heap
page read and write
4490000
direct allocation
page read and write
1461F502000
heap
page read and write
118C000
stack
page read and write
1461F3A0000
trusted library allocation
page read and write
4490000
direct allocation
page read and write
287602E1000
heap
page read and write
1CCDB79A000
heap
page read and write
20961A02000
trusted library allocation
page read and write
1461F0C0000
trusted library allocation
page read and write
4490000
direct allocation
page read and write
2AAF000
stack
page read and write
40F000
unkown
page write copy
553E000
stack
page read and write
1CCDB77F000
heap
page read and write
4490000
direct allocation
page read and write
21FA3102000
heap
page read and write
28760520000
trusted library allocation
page read and write
13A0000
heap
page read and write
21FA307C000
heap
page read and write
28761010000
trusted library allocation
page read and write
40B000
unkown
page execute read
21898272000
heap
page read and write
108C000
stack
page read and write
220ADF60000
heap
page read and write
7610BFB000
stack
page read and write
4490000
direct allocation
page read and write
1F13C513000
heap
page read and write
1CCDAC4A000
heap
page read and write
400000
unkown
page readonly
4490000
direct allocation
page read and write
4A20000
heap
page read and write
4490000
direct allocation
page read and write
21898200000
heap
page read and write
13AB000
heap
page read and write
4490000
direct allocation
page read and write
1461F3B0000
trusted library allocation
page read and write
2D50000
direct allocation
page execute and read and write
220ADF82000
heap
page read and write
414000
unkown
page read and write
220ADF63000
heap
page read and write
4490000
direct allocation
page read and write
1461F4AA000
heap
page read and write
20961100000
heap
page read and write
1CCDB76E000
heap
page read and write
210857E000
stack
page read and write
21FA3056000
heap
page read and write
1CCDB79C000
heap
page read and write
13AB000
heap
page read and write
118C000
stack
page read and write
4490000
direct allocation
page read and write
2096126E000
heap
page read and write
40B000
unkown
page execute read
4490000
direct allocation
page read and write
52FD000
stack
page read and write
1240000
heap
page read and write
4490000
direct allocation
page read and write
108C000
stack
page read and write
4490000
direct allocation
page read and write
4490000
direct allocation
page read and write
4490000
direct allocation
page read and write
55B0000
trusted library allocation
page read and write
11F0000
trusted library allocation
page read and write
220ADF57000
heap
page read and write
1461F41D000
heap
page read and write
4490000
direct allocation
page read and write
1CCDB79A000
heap
page read and write
21FA3052000
heap
page read and write
14619CFE000
heap
page read and write
1CCDB7D1000
heap
page read and write
417000
unkown
page write copy
417000
unkown
page write copy
21FA3108000
heap
page read and write
414000
unkown
page read and write
20961308000
heap
page read and write
2AAF000
stack
page read and write
40F000
unkown
page write copy
4490000
direct allocation
page read and write
441D000
stack
page read and write
4490000
direct allocation
page read and write
1CCDAC4E000
heap
page read and write
21898313000
heap
page read and write
220ADF83000
heap
page read and write
1CCDB520000
remote allocation
page read and write
417000
unkown
page write copy
4E6B000
heap
page read and write
1CCDAD02000
heap
page read and write
1CCDB7A7000
heap
page read and write
1CCDAC82000
heap
page read and write
123E000
stack
page read and write
21FA3100000
heap
page read and write
1CCDB77B000
heap
page read and write
220ADF64000
heap
page read and write
28760302000
heap
page read and write
14619D07000
heap
page read and write
2A47000
heap
page read and write
1461F3B0000
remote allocation
page read and write
1CCDACE1000
heap
page read and write
21FA304F000
heap
page read and write
159F000
stack
page read and write
4490000
direct allocation
page read and write
28760519000
heap
page read and write
4490000
direct allocation
page read and write
14619C8C000
heap
page read and write
1461F320000
trusted library allocation
page read and write
21FA3057000
heap
page read and write
4490000
direct allocation
page read and write
220ADF47000
heap
page read and write
7610E7F000
stack
page read and write
400000
unkown
page readonly
401000
unkown
page execute read
159F000
stack
page read and write
21898254000
heap
page read and write
533C000
stack
page read and write
1F13C47C000
heap
page read and write
21898229000
heap
page read and write
1461AC40000
trusted library allocation
page read and write
1CCDB726000
heap
page read and write
EE9C5CE000
stack
page read and write
28761070000
trusted library allocation
page read and write
2189824D000
heap
page read and write
287602B0000
heap
page read and write
28761080000
trusted library allocation
page read and write
1461F4FD000
heap
page read and write
220ADF81000
heap
page read and write
40F000
unkown
page write copy
29E0000
heap
page read and write
13AB000
heap
page read and write
40F000
unkown
page write copy
2A378FC000
stack
page read and write
4490000
direct allocation
page read and write
4490000
direct allocation
page read and write
1CCDAB60000
heap
page read and write
414000
unkown
page read and write
1461F294000
trusted library allocation
page read and write
1CCDB760000
heap
page read and write
135E000
stack
page read and write
14619CBC000
heap
page read and write
13AB000
heap
page read and write
4490000
direct allocation
page read and write
417000
unkown
page write copy
1CCDB775000
heap
page read and write
400000
unkown
page readonly
118C000
stack
page read and write
1CCDB7A6000
heap
page read and write
1461F130000
trusted library allocation
page read and write
1461F271000
trusted library allocation
page read and write
20961259000
heap
page read and write
1461A518000
heap
page read and write
2D60000
heap
page read and write
40D000
unkown
page readonly
1CCDB77F000
heap
page read and write
1CCDB726000
heap
page read and write
4490000
direct allocation
page read and write
2096123C000
heap
page read and write
4490000
direct allocation
page read and write
1CCDACEC000
heap
page read and write
220ADF70000
heap
page read and write
1CCDACAC000
heap
page read and write
4490000
direct allocation
page read and write
4490000
direct allocation
page read and write
159F000
stack
page read and write
827047F000
stack
page read and write
1CCDB7A8000
heap
page read and write
1CCDAB50000
heap
page read and write
1461A400000
heap
page read and write
1CCDB792000
heap
page read and write
1CCDAC49000
heap
page read and write
7610C7E000
stack
page read and write
209619A0000
trusted library allocation
page read and write
CF353BB000
stack
page read and write
1461F508000
heap
page read and write
462000
unkown
page readonly
1461F250000
trusted library allocation
page read and write
EE9C54A000
stack
page read and write
44BA000
unclassified section
page read and write
1461F6E0000
trusted library allocation
page read and write
28760230000
heap
page read and write
4490000
direct allocation
page read and write
4490000
direct allocation
page read and write
220AE190000
heap
page read and write
1CCDB773000
heap
page read and write
13AB000
heap
page read and write
4490000
direct allocation
page read and write
14619C76000
heap
page read and write
53C0000
trusted library allocation
page read and write
28760500000
trusted library allocation
page read and write
401000
unkown
page execute read
210877B000
stack
page read and write
1020000
unkown
page read and write
4490000
direct allocation
page read and write
118C000
stack
page read and write
4490000
direct allocation
page read and write
EE9C978000
stack
page read and write
287604A0000
heap
page read and write
2A36FF8000
stack
page read and write
13AB000
heap
page read and write
40D000
unkown
page readonly
1461F380000
trusted library allocation
page read and write
1CCDB77B000
heap
page read and write
620000
heap
page read and write
8270A7E000
stack
page read and write
20961313000
heap
page read and write
1CCDB726000
heap
page read and write
1461A3E0000
trusted library allocation
page read and write
E1FEDFA000
stack
page read and write
220ADF57000
heap
page read and write
1461A502000
heap
page read and write
21FA3071000
heap
page read and write
4480000
direct allocation
page read and write
2188777000
stack
page read and write
287612E0000
trusted library allocation
page read and write
20961252000
heap
page read and write
20961202000
heap
page read and write
2189826F000
heap
page read and write
1CCDB79E000
heap
page read and write
1461F500000
heap
page read and write
1CCDB7A3000
heap
page read and write
4490000
direct allocation
page read and write
1461F390000
trusted library allocation
page read and write
21FA3A02000
trusted library allocation
page read and write
43C3000
direct allocation
page read and write
4490000
direct allocation
page read and write
220ADF70000
heap
page read and write
1F13C428000
heap
page read and write
1461F360000
trusted library allocation
page read and write
1CCDB7B2000
heap
page read and write
1CCDACB1000
heap
page read and write
21898248000
heap
page read and write
761078D000
stack
page read and write
2096128A000
heap
page read and write
21FA2FD0000
heap
page read and write
13A0000
heap
page read and write
CF35BFF000
stack
page read and write
1CCDAC4B000
heap
page read and write
4490000
direct allocation
page read and write
54FF000
stack
page read and write
4490000
direct allocation
page read and write
2096125F000
heap
page read and write
1CCDBC20000
heap
page read and write
1CCDAC47000
heap
page read and write
1F13C500000
heap
page read and write
21084FE000
stack
page read and write
14619C93000
heap
page read and write
287602E6000
heap
page read and write
1CCDACAB000
heap
page read and write
1CCDAC13000
heap
page read and write
40B000
unkown
page execute read
118C000
stack
page read and write
82701CB000
stack
page read and write
20961213000
heap
page read and write
14619C00000
heap
page read and write
1020000
unkown
page read and write
7610F7E000
stack
page read and write
20961300000
heap
page read and write
135E000
stack
page read and write
21FA3870000
trusted library allocation
page read and write
14619C58000
heap
page read and write
2AAF000
stack
page read and write
4490000
direct allocation
page read and write
14619C3F000
heap
page read and write
20961090000
heap
page read and write
2AAF000
stack
page read and write
1461F50B000
heap
page read and write
1CCDB781000
heap
page read and write
14619C71000
heap
page read and write
1240000
heap
page read and write
1461F280000
trusted library allocation
page read and write
1240000
heap
page read and write
462000
unkown
page readonly
4490000
direct allocation
page read and write
1461F4E7000
heap
page read and write
7610AFC000
stack
page read and write
4490000
direct allocation
page read and write
1461A559000
heap
page read and write
1CCDB77B000
heap
page read and write
220ADF51000
heap
page read and write
4490000
direct allocation
page read and write
220AE195000
heap
page read and write
4490000
direct allocation
page read and write
4490000
direct allocation
page read and write
1461A3E3000
trusted library allocation
page read and write
1CCDAC00000
heap
page read and write
2A36BFC000
stack
page read and write
1CCDABF0000
trusted library allocation
page read and write
40D000
unkown
page readonly
1240000
heap
page read and write
1461F506000
heap
page read and write
4490000
direct allocation
page read and write
1CCDAC56000
heap
page read and write
21898170000
heap
page read and write
218857B000
stack
page read and write
640000
remote allocation
page read and write
4380000
direct allocation
page read and write
1CCDB79C000
heap
page read and write
620000
heap
page read and write
400000
unkown
page readonly
14619C29000
heap
page read and write
1CCDB795000
heap
page read and write
28760240000
trusted library allocation
page read and write
462000
unkown
page readonly
53BF000
stack
page read and write
286C000
stack
page read and write
2D67000
heap
page read and write
1CCDBC03000
heap
page read and write
21FA3088000
heap
page read and write
11F0000
trusted library allocation
page read and write
14619D14000
heap
page read and write
1461A513000
heap
page read and write
4490000
direct allocation
page read and write
1461F4A6000
heap
page read and write
11F0000
trusted library allocation
page read and write
14619C9E000
heap
page read and write
21898249000
heap
page read and write
108C000
stack
page read and write
13A0000
heap
page read and write
2188AFE000
unkown
page read and write
1CCDB7C2000
heap
page read and write
1461F6A0000
trusted library allocation
page read and write
1CCDB784000
heap
page read and write
4490000
direct allocation
page read and write
287612F0000
trusted library allocation
page read and write
1CCDACA4000
heap
page read and write
220ADF81000
heap
page read and write
287612C0000
trusted library allocation
page read and write
135E000
stack
page read and write
1CCDB798000
heap
page read and write
827097F000
stack
page read and write
108C000
stack
page read and write
2096127C000
heap
page read and write
1461F452000
heap
page read and write
E1FE99C000
stack
page read and write
40D000
unkown
page readonly
210847C000
stack
page read and write
417000
unkown
page write copy
414000
unkown
page read and write
1F13C360000
heap
page read and write
There are 741 hidden memdumps, click here to show them.