IOC Report
62835e34e60c1.dll

loading gif

Files

File Path
Type
Category
Malicious
62835e34e60c1.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_99e41d792528612ced890929ed2335749e1b7_7cac0383_0c9233db\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_b48bc1255c8639c941b68601e9389dc647932d2_7cac0383_190a0077\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_cb7b105113bf417cfd7547dda3de839a49ae23_7cac0383_05f1cc86\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER150A.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER20C3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB41C.tmp.dmp
Mini DuMP crash report, 15 streams, Tue May 17 17:58:04 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB73.tmp.dmp
Mini DuMP crash report, 15 streams, Tue May 17 17:58:26 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBBBE.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC4B8.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE28F.tmp.dmp
Mini DuMP crash report, 15 streams, Tue May 17 17:58:16 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE908.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREF72.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_99e41d792528612ced890929ed2335749e1b7_7cac0383_1936fee1\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_cb7b105113bf417cfd7547dda3de839a49ae23_7cac0383_1942d7b1\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_e912ab21695e486193197883960c42688442ed7_7cac0383_1836ecd0\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD1D5.tmp.dmp
Mini DuMP crash report, 15 streams, Tue May 17 17:46:23 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD4C4.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD67B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE01E.tmp.dmp
Mini DuMP crash report, 15 streams, Tue May 17 17:46:27 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE33B.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE465.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF4BF.tmp.dmp
Mini DuMP crash report, 15 streams, Tue May 17 17:46:32 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF740.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF8A9.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\62835e34e60c1.dll",#1
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\62835e34e60c1.dll"
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\62835e34e60c1.dll",#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7012 -s 400
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7012 -s 408
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7012 -s 436
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6164 -s 400
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6164 -s 408
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6164 -s 412

URLs

Name
IP
Malicious
http://185.189.151.70/drew/aaJEUlLh_/2FLHWWSII4z5Zv8IHOi1/CMWvnEAIAbago4IEJQ4/RXWAE
unknown
malicious
http://185.18
unknown

Domains

Name
IP
Malicious
l-0007.l-dc-msedge.net
13.107.43.16
malicious

IPs

IP
Domain
Country
Malicious
185.189.151.70
unknown
Switzerland
malicious
185.189.151.28
unknown
Switzerland
malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
001840064172BCE4
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018C005C62C4D85
There are 2 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4ED8000
heap
page read and write
malicious
4ED8000
heap
page read and write
malicious
4ED8000
heap
page read and write
malicious
4ED8000
heap
page read and write
malicious
4ED8000
heap
page read and write
malicious
4ED8000
heap
page read and write
malicious
4ED8000
heap
page read and write
malicious
49E9000
heap
page read and write
malicious
4ED8000
heap
page read and write
malicious
4ED8000
heap
page read and write
malicious
1F8AD870000
heap
page read and write
1B46F9C0000
heap
page readonly
AA0000
direct allocation
page read and write
6C7000
unkown
page write copy
1B46F780000
trusted library allocation
page read and write
6B0000
unkown
page readonly
46D000
stack
page read and write
1B46E930000
trusted library allocation
page read and write
5175DCE000
stack
page read and write
7C13FB000
stack
page read and write
8CF000
stack
page read and write
207D4100000
trusted library allocation
page read and write
6A0000
trusted library allocation
page read and write
AA0000
direct allocation
page read and write
AA0000
direct allocation
page read and write
16C1E713000
heap
page read and write
276F1E8A000
heap
page read and write
AA0000
direct allocation
page read and write
13829229000
heap
page read and write
6BD000
unkown
page readonly
CB9000
unclassified section
page readonly
13829227000
heap
page read and write
AA0000
direct allocation
page read and write
D00000
heap
page read and write
8CF000
stack
page read and write
8E0000
heap
page read and write
3EEC55B000
stack
page read and write
7C0000
heap
page read and write
1F8AD84F000
heap
page read and write
1B46EB20000
heap
page read and write
1B46EB6F000
heap
page read and write
6BD000
unkown
page readonly
5175CCC000
stack
page read and write
75E000
stack
page read and write
7841E77000
stack
page read and write
AA0000
direct allocation
page read and write
5175D4E000
stack
page read and write
401000
unkown
page execute read
985000
heap
page read and write
13829313000
heap
page read and write
B14000
heap
page read and write
1678ED13000
heap
page read and write
AA0000
direct allocation
page read and write
CBC000
unclassified section
page readonly
1B46EE15000
heap
page read and write
B05000
heap
page read and write
9CB000
heap
page read and write
16C1E560000
trusted library allocation
page read and write
1B46E920000
heap
page read and write
1678ED08000
heap
page read and write
7841A7D000
stack
page read and write
6A0000
trusted library allocation
page read and write
1678ED02000
heap
page read and write
16C1E666000
heap
page read and write
79E000
stack
page read and write
7C0000
heap
page read and write
712000
unkown
page readonly
212C7B000
stack
page read and write
212A7C000
stack
page read and write
AB0000
heap
page read and write
7841BFC000
stack
page read and write
3EECD7F000
stack
page read and write
7C16FE000
stack
page read and write
D0125BD000
stack
page read and write
276F1CB0000
heap
page read and write
13829213000
heap
page read and write
75E000
stack
page read and write
7C0000
heap
page read and write
6B0000
unkown
page readonly
7841F7F000
stack
page read and write
AA0000
direct allocation
page read and write
2131979000
stack
page read and write
1B46FA30000
trusted library allocation
page read and write
712000
unkown
page readonly
6B0000
unkown
page readonly
1678EC00000
heap
page read and write
79E000
stack
page read and write
56C000
stack
page read and write
207D4513000
heap
page read and write
1678EC3C000
heap
page read and write
6B1000
unkown
page execute read
8CF000
stack
page read and write
6BF000
unkown
page read and write
6BB000
unkown
page execute read
538E000
stack
page read and write
9C0000
heap
page read and write
16C1E600000
heap
page read and write
276F1C50000
heap
page read and write
13829190000
heap
page read and write
56C000
stack
page read and write
212DFB000
stack
page read and write
AA0000
direct allocation
page read and write
52C000
stack
page read and write
1F8AD610000
heap
page read and write
51763FE000
stack
page read and write
1678EC81000
heap
page read and write
6B1000
unkown
page execute read
8E0000
heap
page read and write
207D4413000
heap
page read and write
7C17FB000
stack
page read and write
AA0000
direct allocation
page read and write
16C1E655000
heap
page read and write
400000
unkown
page read and write
8E0000
heap
page read and write
16C1E702000
heap
page read and write
AA0000
direct allocation
page read and write
D012E7F000
stack
page read and write
13829270000
heap
page read and write
AA0000
direct allocation
page read and write
8F0000
remote allocation
page read and write
1678EC4E000
heap
page read and write
CAF000
stack
page read and write
5400000
trusted library allocation
page read and write
1382927E000
heap
page read and write
980000
heap
page read and write
1F8AD856000
heap
page read and write
9C0000
heap
page read and write
9CB000
heap
page read and write
AA0000
direct allocation
page read and write
6C7000
unkown
page write copy
AA0000
direct allocation
page read and write
6B1000
unkown
page execute read
466D000
stack
page read and write
207D4000000
unkown
page read and write
7B0000
remote allocation
page read and write
8CF000
stack
page read and write
D01297B000
stack
page read and write
1678EC51000
heap
page read and write
6BD000
unkown
page readonly
6A0000
trusted library allocation
page read and write
400000
unkown
page read and write
13829249000
heap
page read and write
AA0000
direct allocation
page read and write
AA0000
direct allocation
page read and write
AA0000
direct allocation
page read and write
AA0000
direct allocation
page read and write
1F8AD5A0000
heap
page read and write
207D400D000
unkown
page read and write
2130FF000
stack
page read and write
1B46EAF0000
trusted library allocation
page read and write
6B1000
unkown
page execute read
1678EC13000
heap
page read and write
207D406A000
heap
page read and write
AA0000
direct allocation
page read and write
276F1E00000
heap
page read and write
1B46EB00000
trusted library allocation
page read and write
13829180000
heap
page read and write
1678EC49000
heap
page read and write
1B46EB10000
trusted library allocation
page read and write
207D4115000
trusted library allocation
page read and write
7C197E000
stack
page read and write
1678F402000
trusted library allocation
page read and write
56C000
stack
page read and write
276F1E81000
heap
page read and write
212AFE000
stack
page read and write
9CB000
heap
page read and write
400000
heap
page read and write
1B46EB59000
heap
page read and write
6B1000
unkown
page execute read
6C7000
unkown
page write copy
7C1A77000
stack
page read and write
CAF000
stack
page read and write
A2D000
stack
page read and write
6BF000
unkown
page read and write
B2E000
heap
page read and write
10A0000
heap
page read and write
A6E000
stack
page read and write
212EF7000
stack
page read and write
1F8AD900000
heap
page read and write
7C18FB000
stack
page read and write
4C0000
heap
page read and write
1B46EA80000
heap
page read and write
1F8AD87E000
heap
page read and write
16C1E400000
heap
page read and write
212FFF000
stack
page read and write
276F1E27000
heap
page read and write
4ABA000
stack
page read and write
79E000
stack
page read and write
1B46EE19000
heap
page read and write
712000
unkown
page readonly
207D4102000
trusted library allocation
page read and write
56B000
stack
page read and write
AA0000
direct allocation
page read and write
16C1E68A000
heap
page read and write
1F8AD710000
trusted library allocation
page read and write
6BB000
unkown
page execute read
6A0000
trusted library allocation
page read and write
CAC000
stack
page read and write
8E0000
heap
page read and write
5D0000
trusted library allocation
page read and write
9C0000
heap
page read and write
6A0000
trusted library allocation
page read and write
406000
unkown
page readonly
6BB000
unkown
page execute read
1B46EE10000
heap
page read and write
16C1E700000
heap
page read and write
6B1000
unkown
page execute read
4EDB000
heap
page read and write
276F1F13000
heap
page read and write
AA0000
direct allocation
page read and write
8F0000
remote allocation
page read and write
7C0000
heap
page read and write
51762F7000
stack
page read and write
712000
unkown
page readonly
6C7000
unkown
page write copy
207D4037000
heap
page read and write
1F8AD813000
heap
page read and write
2131A7E000
stack
page read and write
8CF000
stack
page read and write
9C0000
heap
page read and write
990000
direct allocation
page read and write
1678E9A0000
heap
page read and write
1B46EA60000
heap
page read and write
1B46F9E0000
trusted library allocation
page read and write
CB0000
unclassified section
page read and write
1F8AD913000
heap
page read and write
207D4513000
heap
page read and write
1678EC48000
heap
page read and write
AA0000
direct allocation
page read and write
712000
unkown
page readonly
1B46EE20000
trusted library allocation
page read and write
276F1E29000
heap
page read and write
207D4123000
heap
page read and write
6B0000
unkown
page readonly
207D3F80000
trusted library allocation
page read and write
1F8AD88B000
heap
page read and write
276F1F02000
heap
page read and write
1678EC02000
heap
page read and write
13829308000
heap
page read and write
1B46EB8D000
heap
page read and write
207D4402000
heap
page read and write
52AF000
stack
page read and write
8CF000
stack
page read and write
138291F0000
heap
page read and write
1F8AD83C000
heap
page read and write
400000
unkown
page read and write
21315FB000
stack
page read and write
75E000
stack
page read and write
7B0000
remote allocation
page read and write
276F2602000
trusted library allocation
page read and write
1678EC50000
heap
page read and write
1678EC4D000
heap
page read and write
AA0000
direct allocation
page read and write
AA0000
direct allocation
page read and write
1F8AD926000
heap
page read and write
AA0000
direct allocation
page read and write
6C7000
unkown
page write copy
16C1EE02000
trusted library allocation
page read and write
CB1000
unclassified section
page execute read
8CF000
stack
page read and write
56C000
stack
page read and write
276F1C40000
heap
page read and write
75E000
stack
page read and write
6BB000
unkown
page execute read
46D000
stack
page read and write
56C000
stack
page read and write
1678EC60000
heap
page read and write
9CB000
heap
page read and write
AA0000
direct allocation
page read and write
AA0000
direct allocation
page read and write
7C1C7E000
stack
page read and write
46D000
stack
page read and write
400000
unkown
page readonly
D012D79000
stack
page read and write
AA0000
direct allocation
page read and write
56C000
stack
page read and write
AA0000
direct allocation
page read and write
405000
unkown
page read and write
1678EC45000
heap
page read and write
8F0000
remote allocation
page read and write
6BF000
unkown
page read and write
1B46EB6F000
heap
page read and write
207D4400000
heap
page read and write
207D403A000
heap
page read and write
8E0000
trusted library allocation
page read and write
207D4013000
unkown
page read and write
207D4502000
heap
page read and write
276F1E3C000
heap
page read and write
13829253000
heap
page read and write
CAF000
stack
page read and write
16C1E628000
heap
page read and write
6B1000
unkown
page execute read
AA0000
direct allocation
page read and write
462C000
stack
page read and write
6BB000
unkown
page execute read
16C1E613000
heap
page read and write
1F8AD865000
heap
page read and write
16C1E3F0000
heap
page read and write
AA0000
direct allocation
page read and write
207D4502000
heap
page read and write
9CB000
heap
page read and write
400000
unkown
page read and write
AA0000
direct allocation
page read and write
1678EC29000
heap
page read and write
1382928E000
heap
page read and write
1F8AE002000
trusted library allocation
page read and write
1678EC60000
heap
page read and write
6C7000
unkown
page write copy
AA0000
direct allocation
page read and write
1B46EB6F000
heap
page read and write
6BB000
unkown
page execute read
970000
direct allocation
page execute and read and write
AA0000
direct allocation
page read and write
712000
unkown
page readonly
7841AFF000
stack
page read and write
784179B000
stack
page read and write
6A0000
trusted library allocation
page read and write
1678EB10000
trusted library allocation
page read and write
46D000
stack
page read and write
276F1E70000
heap
page read and write
46D000
stack
page read and write
13829289000
heap
page read and write
13829C02000
trusted library allocation
page read and write
207D4002000
unkown
page read and write
9C0000
heap
page read and write
3EECB7E000
stack
page read and write
AA0000
direct allocation
page read and write
1382924E000
heap
page read and write
AA0000
direct allocation
page read and write
52EE000
stack
page read and write
6BF000
unkown
page read and write
6BD000
unkown
page readonly
AA0000
direct allocation
page read and write
6BD000
unkown
page readonly
CAF000
stack
page read and write
400000
unkown
page read and write
207D4500000
heap
page read and write
3EECC7B000
stack
page read and write
51764FF000
stack
page read and write
AA0000
direct allocation
page read and write
75E000
stack
page read and write
1382923C000
heap
page read and write
79E000
stack
page read and write
AA0000
direct allocation
page read and write
6BF000
unkown
page read and write
7C0000
heap
page read and write
1F8AD5B0000
heap
page read and write
1678EA10000
heap
page read and write
207D406A000
heap
page read and write
53CF000
stack
page read and write
207D3F70000
heap
page read and write
2131B79000
stack
page read and write
207D403A000
heap
page read and write
AA0000
direct allocation
page read and write
CAF000
stack
page read and write
400000
unkown
page read and write
1B46F9B0000
trusted library allocation
page read and write
ABA000
heap
page read and write
712000
unkown
page readonly
1B46EB29000
heap
page read and write
6BF000
unkown
page read and write
9CB000
heap
page read and write
4AC0000
trusted library allocation
page read and write
1678EC71000
heap
page read and write
7C0000
heap
page read and write
7841C7E000
stack
page read and write
1678EC46000
heap
page read and write
403000
unkown
page readonly
CE0000
heap
page read and write
532F000
stack
page read and write
46D000
stack
page read and write
46D000
stack
page read and write
7841D7A000
stack
page read and write
1382924C000
heap
page read and write
3EECA7B000
stack
page read and write
13829302000
heap
page read and write
1F8AD865000
heap
page read and write
AA0000
direct allocation
page read and write
16C1E63C000
heap
page read and write
1678E9B0000
heap
page read and write
6B0000
unkown
page readonly
AA0000
direct allocation
page read and write
6BB000
unkown
page execute read
276F1DB0000
trusted library allocation
page read and write
1B46EB67000
heap
page read and write
4AE0000
heap
page read and write
1B46EB31000
heap
page read and write
1F8AD902000
heap
page read and write
6A0000
trusted library allocation
page read and write
1F8AD802000
heap
page read and write
CBA000
unclassified section
page read and write
AA0000
direct allocation
page read and write
207D403A000
heap
page read and write
56C000
stack
page read and write
13829300000
heap
page read and write
7C167E000
stack
page read and write
21319FA000
stack
page read and write
AA0000
direct allocation
page read and write
9C0000
heap
page read and write
51761FB000
stack
page read and write
16C1E460000
heap
page read and write
13829200000
heap
page read and write
526E000
stack
page read and write
AA0000
direct allocation
page read and write
6B0000
unkown
page readonly
4EDB000
heap
page read and write
4670000
heap
page read and write
79E000
stack
page read and write
13829A90000
trusted library allocation
page read and write
AA0000
direct allocation
page read and write
AA0000
direct allocation
page read and write
1F8AD800000
heap
page read and write
212B7D000
stack
page read and write
212CFE000
stack
page read and write
1678EC8C000
heap
page read and write
CAF000
stack
page read and write
784217E000
stack
page read and write
6BF000
unkown
page read and write
6C7000
unkown
page write copy
1F8AD908000
heap
page read and write
9CB000
heap
page read and write
79E000
stack
page read and write
4A68000
heap
page read and write
452B000
stack
page read and write
75E000
stack
page read and write
AA0000
direct allocation
page read and write
75E000
stack
page read and write
CAF000
stack
page read and write
6BD000
unkown
page readonly
AA0000
direct allocation
page read and write
8F0000
remote allocation
page read and write
1B46F9D0000
trusted library allocation
page read and write
7C1B7E000
stack
page read and write
9C0000
heap
page read and write
8E0000
heap
page read and write
7C0000
heap
page read and write
AA0000
direct allocation
page read and write
9D3000
direct allocation
page read and write
207D3FE0000
heap
page read and write
1678ED00000
heap
page read and write
1F8AD829000
heap
page read and write
276F1E13000
heap
page read and write
AA0000
direct allocation
page read and write
207D4028000
heap
page read and write
6BD000
unkown
page readonly
1678EC4B000
heap
page read and write
276F1E5E000
heap
page read and write
D07000
heap
page read and write
784207A000
stack
page read and write
45EE000
stack
page read and write
8E0000
trusted library allocation
page read and write
79E000
stack
page read and write
6B0000
unkown
page readonly
There are 443 hidden memdumps, click here to show them.