IOC Report
BJp3aUvrt9

loading gif

Files

File Path
Type
Category
Malicious
BJp3aUvrt9.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_13ec5c98984773435626ad7d5b7558cb4938ccf_7cac0383_1985ef9c\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_61eae61638761e2a39674020347ca413fb22393_7cac0383_19cdd4c1\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_b75bd23440526356a090f9cb45508f9dce6e86_7cac0383_1ada168d\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1046.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB04.tmp.dmp
Mini DuMP crash report, 15 streams, Tue May 17 18:00:35 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCD7E.tmp.dmp
Mini DuMP crash report, 15 streams, Tue May 17 18:00:19 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD06D.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD1D5.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE1F0.tmp.dmp
Mini DuMP crash report, 15 streams, Tue May 17 18:00:25 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE56C.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE732.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE8F.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\BJp3aUvrt9.dll",#1
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\BJp3aUvrt9.dll"
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\BJp3aUvrt9.dll",#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6424 -s 388
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6424 -s 396
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6424 -s 424

URLs

Name
IP
Malicious
http://185.189.151.28/
unknown
malicious
http://185.189.151.28/drew/Gno4E_2Fz/JYCqWA_2FqMmY1RZwoiB/wugIArNn94bFR0HD9u1/3DvnzuRELDO66MgbIMgnTX
unknown
malicious
http://185.189.151.70/?
unknown
malicious
http://185.189.151.70/
unknown
malicious
http://185.18
unknown

IPs

IP
Domain
Country
Malicious
185.189.151.70
unknown
Switzerland
malicious
185.189.151.28
unknown
Switzerland
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018800453F4626F
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
There are 1 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
51A8000
heap
page read and write
malicious
51A8000
heap
page read and write
malicious
51A8000
heap
page read and write
malicious
51A8000
heap
page read and write
malicious
51A8000
heap
page read and write
malicious
51A8000
heap
page read and write
malicious
51A8000
heap
page read and write
malicious
51A8000
heap
page read and write
malicious
51A8000
heap
page read and write
malicious
49C9000
heap
page read and write
malicious
5FD4DFD000
stack
page read and write
21E9AB93000
heap
page read and write
620000
heap
page read and write
1BE57493000
trusted library allocation
page read and write
21E9A2C1000
heap
page read and write
1BE5B908000
trusted library allocation
page read and write
6C0D6AB000
stack
page read and write
1B6027A0000
heap
page read and write
250947B000
stack
page read and write
C30000
direct allocation
page read and write
2500000
trusted library allocation
page read and write
1F2DBC51000
heap
page read and write
21E9A090000
heap
page read and write
1BE5B950000
trusted library allocation
page read and write
25A8AC60000
heap
page read and write
6C0DC7B000
stack
page read and write
5DC000
stack
page read and write
1FCB767E000
heap
page read and write
A60337C000
stack
page read and write
C30000
direct allocation
page read and write
25A8AF08000
heap
page read and write
C30000
direct allocation
page read and write
A20000
heap
page read and write
C30000
direct allocation
page read and write
1BE55F70000
heap
page read and write
21E9AB95000
heap
page read and write
21E9B002000
heap
page read and write
21E9ABBD000
heap
page read and write
C30000
direct allocation
page read and write
C30000
direct allocation
page read and write
C30000
direct allocation
page read and write
21E9ABDB000
heap
page read and write
C1F000
stack
page read and write
21E9A261000
heap
page read and write
1CE0826F000
heap
page read and write
C30000
direct allocation
page read and write
1CE0824B000
heap
page read and write
21E9ABCF000
heap
page read and write
1EDD4B20000
heap
page read and write
A603A7F000
stack
page read and write
25A8ACC0000
heap
page read and write
1BE5B656000
heap
page read and write
21E9A213000
heap
page read and write
1BE56114000
heap
page read and write
1FCB7602000
heap
page read and write
1B602AE0000
heap
page read and write
1BE56076000
heap
page read and write
204923D5000
heap
page read and write
1CE08230000
heap
page read and write
20492090000
heap
page read and write
D81CDFF000
stack
page read and write
1FCB7708000
heap
page read and write
21E9A030000
heap
page read and write
21E9B002000
heap
page read and write
1F8716F0000
trusted library allocation
page read and write
C30000
direct allocation
page read and write
1F8726B0000
trusted library allocation
page read and write
4DD000
stack
page read and write
6C0D7AE000
stack
page read and write
8F3000
unkown
page readonly
1BE56902000
heap
page read and write
21E9A313000
heap
page read and write
85F000
unkown
page read and write
A2B000
heap
page read and write
C30000
direct allocation
page read and write
1BE5603F000
heap
page read and write
1B602AC8000
heap
page read and write
C1F000
stack
page read and write
5FD4B7E000
stack
page read and write
25A8AE02000
heap
page read and write
6C0DB7E000
stack
page read and write
1FCB7700000
heap
page read and write
21E9A2E1000
heap
page read and write
1BE56095000
heap
page read and write
1F871AF9000
heap
page read and write
4B5E000
stack
page read and write
24F0000
remote allocation
page read and write
85B000
unkown
page execute read
21E9AB8E000
heap
page read and write
4B1F000
stack
page read and write
C30000
direct allocation
page read and write
960000
direct allocation
page read and write
21E9AB82000
heap
page read and write
1BE56913000
heap
page read and write
2314029B000
heap
page read and write
21E9A8B0000
remote allocation
page read and write
85B000
unkown
page execute read
1F872640000
heap
page readonly
840000
trusted library allocation
page read and write
A2B000
heap
page read and write
C30000
direct allocation
page read and write
A2B000
heap
page read and write
25A8AE00000
heap
page read and write
204920B2000
heap
page read and write
C30000
direct allocation
page read and write
1BE5B6ED000
heap
page read and write
11AC000
stack
page read and write
1BE5B6F5000
heap
page read and write
85B000
unkown
page execute read
24F0000
remote allocation
page read and write
D0FB1F8000
stack
page read and write
1B602A88000
heap
page read and write
C30000
direct allocation
page read and write
21E9ABA6000
heap
page read and write
64970DB000
stack
page read and write
1CE08A02000
trusted library allocation
page read and write
8C0000
heap
page read and write
1F8718D0000
trusted library allocation
page read and write
C30000
direct allocation
page read and write
1FCB7C60000
trusted library allocation
page read and write
1F871910000
heap
page read and write
A1E000
stack
page read and write
24D0000
remote allocation
page read and write
21E9AB86000
heap
page read and write
840000
trusted library allocation
page read and write
1CE08247000
heap
page read and write
C30000
direct allocation
page read and write
21E9B002000
heap
page read and write
C30000
direct allocation
page read and write
25A8AE51000
heap
page read and write
1BE5B970000
trusted library allocation
page read and write
5FD4BFE000
stack
page read and write
C30000
direct allocation
page read and write
867000
unkown
page write copy
1FCB766F000
heap
page read and write
1EDD4C3E000
heap
page read and write
85F000
unkown
page read and write
21E9AB95000
heap
page read and write
B3A66FB000
stack
page read and write
9FD000
stack
page read and write
840000
trusted library allocation
page read and write
C30000
direct allocation
page read and write
23140308000
heap
page read and write
427AD7E000
stack
page read and write
21E9AB71000
heap
page read and write
1BE5B910000
trusted library allocation
page read and write
A60377F000
stack
page read and write
21E9AB50000
heap
page read and write
4B9F000
stack
page read and write
8F0000
unkown
page readonly
1CE081A0000
trusted library allocation
page read and write
21E9A200000
heap
page read and write
840000
trusted library allocation
page read and write
1B602A00000
heap
page read and write
85B000
unkown
page execute read
21E9ABB9000
heap
page read and write
1CE08302000
heap
page read and write
1BE5B520000
trusted library allocation
page read and write
B3A618B000
stack
page read and write
21360813000
heap
page read and write
23140264000
heap
page read and write
1EDD4C41000
heap
page read and write
1CE0823A000
heap
page read and write
8F1000
unkown
page execute read
A2B000
heap
page read and write
1BE5B6F8000
heap
page read and write
867000
unkown
page write copy
23140290000
heap
page read and write
1CE08244000
heap
page read and write
21E9AB71000
heap
page read and write
4DD000
stack
page read and write
D81CCF7000
stack
page read and write
1CE08229000
heap
page read and write
250907B000
stack
page read and write
C30000
direct allocation
page read and write
21E9ABCF000
heap
page read and write
1F871AF5000
heap
page read and write
8B2000
unkown
page readonly
A20000
heap
page read and write
21E9ABB9000
heap
page read and write
D0FB47E000
unkown
page read and write
1F2DBC75000
heap
page read and write
1F871820000
heap
page read and write
9DE000
stack
page read and write
A60327F000
stack
page read and write
8C0000
heap
page read and write
25A8AE65000
heap
page read and write
C30000
direct allocation
page read and write
21E9A2F9000
heap
page read and write
1F2DB9F0000
heap
page read and write
470000
heap
page read and write
4DD000
stack
page read and write
1EDD4C59000
heap
page read and write
204920A1000
heap
page read and write
C30000
direct allocation
page read and write
21E9A2D4000
heap
page read and write
21E9AA02000
heap
page read and write
10087E000
stack
page read and write
1BE56000000
heap
page read and write
21E9A2AB000
heap
page read and write
1BE5606E000
heap
page read and write
C30000
direct allocation
page read and write
1BE56073000
heap
page read and write
C30000
direct allocation
page read and write
B4E000
stack
page read and write
21E9AB90000
heap
page read and write
1BE5B550000
trusted library allocation
page read and write
C30000
direct allocation
page read and write
1BE5B623000
heap
page read and write
1BE5608B000
heap
page read and write
C30000
direct allocation
page read and write
A1E000
stack
page read and write
21E9AB86000
heap
page read and write
21E9B000000
heap
page read and write
1B602A6F000
heap
page read and write
470000
unkown
page read and write
85D000
unkown
page readonly
1F871967000
heap
page read and write
204920D5000
heap
page read and write
1F2DBD00000
heap
page read and write
21E9AB95000
heap
page read and write
C30000
direct allocation
page read and write
21E9B021000
heap
page read and write
D81C8FE000
stack
page read and write
1B603132000
heap
page read and write
6C0D72E000
stack
page read and write
5FD46DB000
stack
page read and write
A20000
heap
page read and write
1BE57490000
trusted library allocation
page read and write
C30000
direct allocation
page read and write
A88000
heap
page read and write
1BE5B4B0000
trusted library allocation
page read and write
4DD000
stack
page read and write
D81CA7B000
stack
page read and write
21E9AB95000
heap
page read and write
8F5000
unkown
page read and write
23140130000
heap
page read and write
1CE08267000
heap
page read and write
D81C97E000
stack
page read and write
B3A67FE000
stack
page read and write
23140A02000
trusted library allocation
page read and write
1BE5B6F3000
heap
page read and write
D0FAFF8000
stack
page read and write
64971DE000
stack
page read and write
A60387E000
stack
page read and write
10F9000
unclassified section
page readonly
C30000
direct allocation
page read and write
C30000
direct allocation
page read and write
C30000
direct allocation
page read and write
1BE55FE0000
heap
page read and write
21E9AB95000
heap
page read and write
1F2DBA60000
heap
page read and write
9DE000
stack
page read and write
D81CBFE000
stack
page read and write
5FD4E7E000
stack
page read and write
85D000
unkown
page readonly
25A8AE54000
heap
page read and write
A20000
heap
page read and write
C30000
direct allocation
page read and write
109C000
stack
page read and write
B02AAF8000
stack
page read and write
1CE0822D000
heap
page read and write
1CE08030000
heap
page read and write
1B603002000
heap
page read and write
1EDD4C00000
heap
page read and write
68C000
stack
page read and write
C30000
direct allocation
page read and write
A20000
heap
page read and write
C30000
direct allocation
page read and write
1BE56904000
heap
page read and write
1FCB7627000
heap
page read and write
100CFF000
stack
page read and write
213606E0000
heap
page read and write
C2670FE000
stack
page read and write
1CE0825F000
heap
page read and write
8B2000
unkown
page readonly
5DC000
stack
page read and write
1BE5B960000
trusted library allocation
page read and write
840000
trusted library allocation
page read and write
C30000
direct allocation
page read and write
1EDD4C02000
heap
page read and write
C30000
direct allocation
page read and write
85D000
unkown
page readonly
1F871AE0000
trusted library allocation
page read and write
851000
unkown
page execute read
1CE08261000
heap
page read and write
1B602790000
heap
page read and write
1F871840000
heap
page read and write
1FCB7600000
heap
page read and write
25A8AE60000
heap
page read and write
850000
unkown
page readonly
5DC000
stack
page read and write
D0FAEFE000
stack
page read and write
B02A7BE000
stack
page read and write
24D0000
remote allocation
page read and write
1F8718C0000
trusted library allocation
page read and write
1EDD4BC0000
trusted library allocation
page read and write
A1A000
heap
page read and write
2500000
heap
page read and write
250937A000
stack
page read and write
1BE560B2000
heap
page read and write
C30000
direct allocation
page read and write
25A8AF00000
heap
page read and write
A1E000
stack
page read and write
21E9ABBD000
heap
page read and write
1F2DBB60000
trusted library allocation
page read and write
25A8ADC0000
trusted library allocation
page read and write
C30000
direct allocation
page read and write
C30000
direct allocation
page read and write
21E9A23C000
heap
page read and write
21E9AB1E000
heap
page read and write
D1F000
stack
page read and write
21E9A8B0000
remote allocation
page read and write
1FCB764E000
heap
page read and write
1BE56057000
heap
page read and write
64974FB000
stack
page read and write
8C0000
heap
page read and write
9DE000
stack
page read and write
21E9AB87000
heap
page read and write
A10000
heap
page read and write
9DE000
stack
page read and write
1BE5BAB0000
trusted library allocation
page read and write
1FCB7500000
heap
page read and write
851000
unkown
page execute read
21E9B002000
heap
page read and write
2314025E000
heap
page read and write
21E9A229000
heap
page read and write
10F0000
unclassified section
page read and write
B3A68FF000
stack
page read and write
21360829000
heap
page read and write
1BE5B910000
trusted library allocation
page read and write
427AE7E000
stack
page read and write
4DD000
stack
page read and write
204920CD000
heap
page read and write
851000
unkown
page execute read
23140254000
heap
page read and write
204920B7000
heap
page read and write
D0FACFE000
stack
page read and write
C30000
direct allocation
page read and write
2049209B000
heap
page read and write
9DE000
stack
page read and write
1F2DC402000
trusted library allocation
page read and write
21E9AB95000
heap
page read and write
4A9F000
stack
page read and write
1EDD4C65000
heap
page read and write
1004FC000
stack
page read and write
1009FD000
stack
page read and write
2136083D000
heap
page read and write
21360E70000
remote allocation
page read and write
C266E7E000
stack
page read and write
1BE5608E000
heap
page read and write
C30000
direct allocation
page read and write
4650000
heap
page read and write
1B602ABD000
heap
page read and write
23140302000
heap
page read and write
1BE5B90E000
trusted library allocation
page read and write
851000
unkown
page execute read
850000
unkown
page readonly
A60367F000
stack
page read and write
21E9AB00000
heap
page read and write
C30000
direct allocation
page read and write
1F871B00000
trusted library allocation
page read and write
A2B000
heap
page read and write
21E9AB68000
heap
page read and write
21E9ABA6000
heap
page read and write
1B602B13000
heap
page read and write
D81CEFF000
stack
page read and write
C30000
direct allocation
page read and write
1EDD4B90000
heap
page read and write
C30000
direct allocation
page read and write
C30000
direct allocation
page read and write
1BE56102000
heap
page read and write
C30000
direct allocation
page read and write
1BE560FE000
heap
page read and write
1F2DBC79000
heap
page read and write
21E9B002000
heap
page read and write
4A48000
heap
page read and write
6497777000
stack
page read and write
21E9ABAE000
heap
page read and write
2508AFB000
stack
page read and write
23140120000
heap
page read and write
1BE5B930000
trusted library allocation
page read and write
85D000
unkown
page readonly
C30000
direct allocation
page read and write
1FCB7613000
heap
page read and write
4CF0000
heap
page read and write
51AB000
heap
page read and write
1BE56740000
trusted library allocation
page read and write
C30000
direct allocation
page read and write
1CE0822E000
heap
page read and write
D1F000
stack
page read and write
10FA000
unclassified section
page read and write
100AFE000
stack
page read and write
1CE0826D000
heap
page read and write
21E9A25D000
heap
page read and write
C30000
direct allocation
page read and write
25A8B602000
trusted library allocation
page read and write
D81CB7B000
stack
page read and write
1F872660000
trusted library allocation
page read and write
1EDD4D13000
heap
page read and write
A49000
heap
page read and write
24F0000
remote allocation
page read and write
1BE56802000
heap
page read and write
1FCB7490000
heap
page read and write
C1F000
stack
page read and write
21E9ABAF000
heap
page read and write
21E9A316000
heap
page read and write
C30000
direct allocation
page read and write
A1E000
stack
page read and write
1BE5B530000
trusted library allocation
page read and write
25A8AE13000
heap
page read and write
C2672FF000
stack
page read and write
1F2DBC00000
heap
page read and write
D0FAC7B000
stack
page read and write
1B6029D0000
trusted library allocation
page read and write
21E9B002000
heap
page read and write
20492040000
heap
page read and write
C1F000
stack
page read and write
1BE5B924000
trusted library allocation
page read and write
C30000
direct allocation
page read and write
213607E0000
trusted library allocation
page read and write
C30000
direct allocation
page read and write
250927E000
stack
page read and write
21E9ABAB000
heap
page read and write
1BE560BC000
heap
page read and write
1B602A44000
heap
page read and write
1EDD4C75000
heap
page read and write
1BE56918000
heap
page read and write
25A8AE53000
heap
page read and write
20491FE0000
heap
page read and write
85D000
unkown
page readonly
D0FB2FF000
stack
page read and write
1F872650000
trusted library allocation
page read and write
C30000
direct allocation
page read and write
23140229000
heap
page read and write
C1F000
stack
page read and write
C30000
direct allocation
page read and write
1CE08255000
heap
page read and write
8D0000
direct allocation
page execute and read and write
1BE5B9A0000
remote allocation
page read and write
2509179000
stack
page read and write
9A3000
direct allocation
page read and write
21E9A2B0000
heap
page read and write
1F871AF0000
heap
page read and write
A60357D000
stack
page read and write
851000
unkown
page execute read
1BE5B700000
heap
page read and write
C30000
direct allocation
page read and write
D1F000
stack
page read and write
C30000
direct allocation
page read and write
23140200000
heap
page read and write
21E9B01A000
heap
page read and write
204923D0000
heap
page read and write
21E9A25A000
heap
page read and write
1CE080A0000
heap
page read and write
8B2000
unkown
page readonly
1BE56918000
heap
page read and write
21E9A2A4000
heap
page read and write
25A8AC50000
heap
page read and write
4DD000
stack
page read and write
4DB0000
heap
page read and write
21E9AB86000
heap
page read and write
21E9ABB8000
heap
page read and write
21E9AB8E000
heap
page read and write
1F2DBC02000
heap
page read and write
C30000
direct allocation
page read and write
21E9AB90000
heap
page read and write
1CE08263000
heap
page read and write
2314028A000
heap
page read and write
867000
unkown
page write copy
1EDD4C13000
heap
page read and write
21E9ABA8000
heap
page read and write
1B602ACE000
heap
page read and write
1BE5B9A0000
remote allocation
page read and write
C30000
direct allocation
page read and write
21E9A2EA000
heap
page read and write
C30000
direct allocation
page read and write
800000
trusted library allocation
page read and write
1F87195F000
heap
page read and write
C30000
direct allocation
page read and write
1CE0824E000
heap
page read and write
10F1000
unclassified section
page execute read
C2671FE000
stack
page read and write
1CE08040000
heap
page read and write
5DC000
stack
page read and write
D0FB3F7000
stack
page read and write
840000
trusted library allocation
page read and write
C30000
direct allocation
page read and write
A2B000
heap
page read and write
25A8AF02000
heap
page read and write
21E9AB99000
heap
page read and write
23140213000
heap
page read and write
4ADE000
stack
page read and write
25A8AF13000
heap
page read and write
C30000
direct allocation
page read and write
25A8AE7B000
heap
page read and write
D1F000
stack
page read and write
1CE0824F000
heap
page read and write
1F871918000
heap
page read and write
867000
unkown
page write copy
6C0DAFB000
stack
page read and write
C1F000
stack
page read and write
1BE5B702000
heap
page read and write
21360800000
heap
page read and write
1BE5B540000
trusted library allocation
page read and write
C47000
heap
page read and write
1BE5B662000
heap
page read and write
4C1A000
stack
page read and write
1CE08213000
heap
page read and write
1BE5B617000
heap
page read and write
867000
unkown
page write copy
C30000
direct allocation
page read and write
1BE5B600000
heap
page read and write
23140300000
heap
page read and write
21E9A8B0000
remote allocation
page read and write
A60317B000
stack
page read and write
204920A6000
heap
page read and write
6CB000
stack
page read and write
204920CE000
heap
page read and write
2500000
trusted library allocation
page read and write
6C0DD77000
stack
page read and write
1B602800000
heap
page read and write
1CE0823D000
heap
page read and write
1BE56959000
heap
page read and write
5DC000
stack
page read and write
1CE0827E000
heap
page read and write
10007B000
stack
page read and write
851000
unkown
page execute read
25A8AE2A000
heap
page read and write
11B0000
trusted library allocation
page read and write
21360902000
heap
page read and write
1B602A13000
heap
page read and write
1BE574A0000
trusted library allocation
page read and write
21E9ABAA000
heap
page read and write
8B2000
unkown
page readonly
21E9AB90000
heap
page read and write
1F2DBD13000
heap
page read and write
21E9AB95000
heap
page read and write
1008FB000
stack
page read and write
649787F000
stack
page read and write
4DD000
stack
page read and write
2500000
heap
page read and write
C30000
direct allocation
page read and write
4BDD000
stack
page read and write
21360670000
heap
page read and write
24F0000
remote allocation
page read and write
8C0000
heap
page read and write
C30000
direct allocation
page read and write
C30000
direct allocation
page read and write
1FCB74A0000
heap
page read and write
1001FE000
stack
page read and write
1BE5B6FB000
heap
page read and write
1FCB7653000
heap
page read and write
C30000
direct allocation
page read and write
1FCB768C000
heap
page read and write
1BE56FF0000
trusted library allocation
page read and write
A1E000
stack
page read and write
1BE5B580000
trusted library allocation
page read and write
1BE56029000
heap
page read and write
649767E000
stack
page read and write
427AEF9000
stack
page read and write
C30000
direct allocation
page read and write
21E9AB99000
heap
page read and write
21E9A190000
trusted library allocation
page read and write
C30000
direct allocation
page read and write
1F2DBD02000
heap
page read and write
C30000
direct allocation
page read and write
C266BEE000
stack
page read and write
1BE5B6DC000
heap
page read and write
21E9AB95000
heap
page read and write
840000
trusted library allocation
page read and write
21E9AB25000
heap
page read and write
21E9AB1C000
heap
page read and write
25A8AE5A000
heap
page read and write
21E9B018000
heap
page read and write
1EDD4C6F000
heap
page read and write
1BE560A1000
heap
page read and write
C30000
direct allocation
page read and write
D1F000
stack
page read and write
1CE0827B000
heap
page read and write
5DC000
stack
page read and write
1F87195F000
heap
page read and write
1F871967000
heap
page read and write
850000
unkown
page readonly
C30000
direct allocation
page read and write
204920B4000
heap
page read and write
21E9A25E000
heap
page read and write
C30000
direct allocation
page read and write
8C0000
heap
page read and write
21E9ABB5000
heap
page read and write
1CE0826B000
heap
page read and write
427ADF9000
stack
page read and write
1CE08239000
heap
page read and write
A20000
heap
page read and write
C30000
direct allocation
page read and write
C30000
direct allocation
page read and write
85B000
unkown
page execute read
21E9A302000
heap
page read and write
21E9B002000
heap
page read and write
C30000
direct allocation
page read and write
21360E70000
remote allocation
page read and write
25A8AE85000
heap
page read and write
21E9AB99000
heap
page read and write
20492060000
heap
page read and write
21E9AB95000
heap
page read and write
850000
unkown
page readonly
470000
unkown
page read and write
B02AB7E000
stack
page read and write
1CE08240000
heap
page read and write
100BFC000
stack
page read and write
1F8716E0000
heap
page read and write
1CE08242000
heap
page read and write
21E9ABDE000
heap
page read and write
21E9AB97000
heap
page read and write
1EDD4B30000
heap
page read and write
A1E000
stack
page read and write
851000
unkown
page execute read
21361002000
trusted library allocation
page read and write
1CE08248000
heap
page read and write
204920C1000
heap
page read and write
C30000
direct allocation
page read and write
10DC000
stack
page read and write
2314023C000
heap
page read and write
1EDD4C53000
heap
page read and write
C30000
direct allocation
page read and write
1F2DBC40000
heap
page read and write
1F872430000
trusted library allocation
page read and write
21E9A2C7000
heap
page read and write
10FC000
unclassified section
page readonly
21E9A264000
heap
page read and write
1BE5B9A0000
remote allocation
page read and write
1BE5B921000
trusted library allocation
page read and write
21360E70000
remote allocation
page read and write
1BE5B570000
trusted library allocation
page read and write
C30000
direct allocation
page read and write
21E9AB82000
heap
page read and write
1FCB7648000
heap
page read and write
1BE5B64C000
heap
page read and write
21E9A308000
heap
page read and write
1EDD4C29000
heap
page read and write
85F000
unkown
page read and write
21E9AB5D000
heap
page read and write
21E9AB90000
heap
page read and write
21E9AB97000
heap
page read and write
1F87195F000
heap
page read and write
85D000
unkown
page readonly
1BE5B584000
trusted library allocation
page read and write
9DE000
stack
page read and write
1EDD5402000
trusted library allocation
page read and write
B3A69FB000
stack
page read and write
B02AA7E000
stack
page read and write
C30000
direct allocation
page read and write
C1F000
stack
page read and write
1F2DBC70000
heap
page read and write
470000
unkown
page read and write
1F2DBC13000
heap
page read and write
1BE5B62E000
heap
page read and write
1BE56102000
heap
page read and write
64975FB000
stack
page read and write
21360680000
heap
page read and write
1FCB7629000
heap
page read and write
1BE5B63F000
heap
page read and write
204920C1000
heap
page read and write
1BE5B4A0000
trusted library allocation
page read and write
C30000
direct allocation
page read and write
1BE5B6D6000
heap
page read and write
850000
unkown
page readonly
649797F000
stack
page read and write
1B602A29000
heap
page read and write
C30000
direct allocation
page read and write
1F8718B0000
trusted library allocation
page read and write
51AB000
heap
page read and write
21E9A2EC000
heap
page read and write
1BE5BA90000
trusted library allocation
page read and write
1CE08241000
heap
page read and write
1FCB763C000
heap
page read and write
21E9A256000
heap
page read and write
1CE08284000
heap
page read and write
21E9ABD0000
heap
page read and write
1BE55F80000
heap
page read and write
463E000
stack
page read and write
21E9AB9D000
heap
page read and write
C30000
direct allocation
page read and write
1BE5B6A2000
heap
page read and write
21E9AB94000
heap
page read and write
C266FFE000
stack
page read and write
6C0DE7E000
stack
page read and write
1BE5B540000
trusted library allocation
page read and write
8F6000
unkown
page readonly
C30000
direct allocation
page read and write
C30000
direct allocation
page read and write
C30000
direct allocation
page read and write
85F000
unkown
page read and write
1BE5B900000
trusted library allocation
page read and write
D81C87B000
stack
page read and write
A2B000
heap
page read and write
4C70000
trusted library allocation
page read and write
2136085C000
heap
page read and write
A602D5B000
stack
page read and write
85D000
unkown
page readonly
1BE56815000
heap
page read and write
21E9AB71000
heap
page read and write
8B2000
unkown
page readonly
1006FE000
stack
page read and write
C30000
direct allocation
page read and write
A1E000
stack
page read and write
C30000
direct allocation
page read and write
1CE08269000
heap
page read and write
C30000
direct allocation
page read and write
427A9EC000
stack
page read and write
C30000
direct allocation
page read and write
21360824000
heap
page read and write
C30000
direct allocation
page read and write
21E9ABC0000
heap
page read and write
1B602B02000
heap
page read and write
1CE08249000
heap
page read and write
85B000
unkown
page execute read
1F2DBA00000
heap
page read and write
6C0DF7F000
stack
page read and write
85F000
unkown
page read and write
1BE5B550000
trusted library allocation
page read and write
1BE5B910000
trusted library allocation
page read and write
1FCB7713000
heap
page read and write
C266B6C000
stack
page read and write
1BE56959000
heap
page read and write
D1F000
stack
page read and write
1BE560FE000
heap
page read and write
D0FAD7E000
stack
page read and write
1EDD4C5B000
heap
page read and write
1FCB764C000
heap
page read and write
85F000
unkown
page read and write
C30000
direct allocation
page read and write
B02A73F000
stack
page read and write
21E9B021000
heap
page read and write
204920C1000
heap
page read and write
1FCB7702000
heap
page read and write
4C50000
heap
page read and write
B02A6BA000
stack
page read and write
1CE0824D000
heap
page read and write
21360802000
heap
page read and write
1BE5B6A4000
heap
page read and write
C30000
direct allocation
page read and write
1BE56013000
heap
page read and write
1FCB7E02000
trusted library allocation
page read and write
2500000
heap
page read and write
C30000
direct allocation
page read and write
204920B6000
heap
page read and write
1CE08262000
heap
page read and write
C30000
direct allocation
page read and write
25A8AE8C000
heap
page read and write
5DC000
stack
page read and write
9DE000
stack
page read and write
1F2DBC28000
heap
page read and write
2508EF8000
stack
page read and write
850000
unkown
page readonly
C30000
direct allocation
page read and write
204920A6000
heap
page read and write
867000
unkown
page write copy
250997E000
stack
page read and write
1CE08200000
heap
page read and write
8C0000
heap
page read and write
2500000
heap
page read and write
8E0000
heap
page read and write
470000
unkown
page read and write
649715E000
stack
page read and write
850000
unkown
page readonly
21E9A020000
heap
page read and write
21E9AB95000
heap
page read and write
1CE08264000
heap
page read and write
B02ABFC000
stack
page read and write
A20000
heap
page read and write
116E000
stack
page read and write
D0FB0F7000
stack
page read and write
21E9AB75000
heap
page read and write
8E5000
heap
page read and write
8B2000
unkown
page readonly
1CE08245000
heap
page read and write
1CE08260000
heap
page read and write
1BE5B980000
trusted library allocation
page read and write
C30000
direct allocation
page read and write
D1F000
stack
page read and write
85B000
unkown
page execute read
8C0000
heap
page read and write
1CE08246000
heap
page read and write
21E9A2E9000
heap
page read and write
1BE56107000
heap
page read and write
8B2000
unkown
page readonly
5FD4F7D000
stack
page read and write
C30000
direct allocation
page read and write
470000
unkown
page read and write
10077C000
stack
page read and write
867000
unkown
page write copy
23140249000
heap
page read and write
C30000
direct allocation
page read and write
C30000
direct allocation
page read and write
1BE56900000
heap
page read and write
25A8AE3C000
heap
page read and write
21E9AB99000
heap
page read and write
1BE5B570000
trusted library allocation
page read and write
A76000
heap
page read and write
1BE56800000
heap
page read and write
23140313000
heap
page read and write
C40000
heap
page read and write
85F000
unkown
page read and write
21E9A28B000
heap
page read and write
21E9A2B5000
heap
page read and write
1EDD4D02000
heap
page read and write
2500000
heap
page read and write
25A8AE59000
heap
page read and write
21E9ABB8000
heap
page read and write
1B603100000
heap
page read and write
470000
unkown
page read and write
23140190000
heap
page read and write
21E9AB97000
heap
page read and write
A60397F000
stack
page read and write
5FD4A7C000
stack
page read and write
231401C0000
trusted library allocation
page read and write
There are 807 hidden memdumps, click here to show them.