IOC Report
OCVOXxB3d1.dll

loading gif

Files

File Path
Type
Category
Malicious
OCVOXxB3d1.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_76b43c6d9c1a2a81832137409fd652e3d2404ae8_7cac0383_17015320\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_bc4dba44e5104f2aa4617139c4a8f4569b60d283_82810a17_16914f67\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_bc4dba44e5104f2aa4617139c4a8f4569b60d283_82810a17_16bd4e9c\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3F2B.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Aug 31 21:47:16 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3F3A.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Aug 31 21:47:16 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4507.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Aug 31 21:47:17 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4575.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4640.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER473B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4806.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER495D.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4B81.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\OCVOXxB3d1.dll"
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\OCVOXxB3d1.dll,_ReflectiveLoader@0
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\OCVOXxB3d1.dll",#1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\OCVOXxB3d1.dll",#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1236 -s 632
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1308 -s 648
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5964 -s 580

URLs

Name
IP
Malicious
http://gandcrab2pie73et.onion/cb44cde56c4e43dc
unknown
malicious
http://www.sfu.ca/jabber/Psi_Jabber_PC.pdf
unknown
https://www.torproject.org/
unknown
https://psi-im.org/download/
unknown
http://sj.ms/register.php
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
\REGISTRY\A\{1a1e7d09-340c-2d0e-c48a-917c89d42600}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProgramId
\REGISTRY\A\{1a1e7d09-340c-2d0e-c48a-917c89d42600}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
FileId
\REGISTRY\A\{1a1e7d09-340c-2d0e-c48a-917c89d42600}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LowerCaseLongPath
\REGISTRY\A\{1a1e7d09-340c-2d0e-c48a-917c89d42600}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LongPathHash
\REGISTRY\A\{1a1e7d09-340c-2d0e-c48a-917c89d42600}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Name
\REGISTRY\A\{1a1e7d09-340c-2d0e-c48a-917c89d42600}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Publisher
\REGISTRY\A\{1a1e7d09-340c-2d0e-c48a-917c89d42600}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Version
\REGISTRY\A\{1a1e7d09-340c-2d0e-c48a-917c89d42600}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinFileVersion
\REGISTRY\A\{1a1e7d09-340c-2d0e-c48a-917c89d42600}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinaryType
\REGISTRY\A\{1a1e7d09-340c-2d0e-c48a-917c89d42600}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProductName
\REGISTRY\A\{1a1e7d09-340c-2d0e-c48a-917c89d42600}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProductVersion
\REGISTRY\A\{1a1e7d09-340c-2d0e-c48a-917c89d42600}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LinkDate
\REGISTRY\A\{1a1e7d09-340c-2d0e-c48a-917c89d42600}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinProductVersion
\REGISTRY\A\{1a1e7d09-340c-2d0e-c48a-917c89d42600}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Size
\REGISTRY\A\{1a1e7d09-340c-2d0e-c48a-917c89d42600}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Language
\REGISTRY\A\{1a1e7d09-340c-2d0e-c48a-917c89d42600}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
IsPeFile
\REGISTRY\A\{1a1e7d09-340c-2d0e-c48a-917c89d42600}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
IsOsComponent
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
707B3000
unkown
page write copy
malicious
707B3000
unkown
page write copy
malicious
707AB000
unkown
page readonly
malicious
707AB000
unkown
page readonly
malicious
146B000
heap
page read and write
malicious
707B3000
unkown
page write copy
malicious
707AB000
unkown
page readonly
malicious
707B3000
unkown
page write copy
malicious
707B3000
unkown
page write copy
malicious
3590000
heap
page read and write
malicious
3590000
heap
page read and write
malicious
707AB000
unkown
page readonly
malicious
3590000
heap
page read and write
malicious
146B000
heap
page read and write
malicious
707AB000
unkown
page readonly
malicious
707B3000
unkown
page write copy
malicious
707AB000
unkown
page readonly
malicious
146B000
heap
page read and write
malicious
35B7000
heap
page read and write
29E4FD7C000
heap
page read and write
284DA570000
heap
page read and write
29E4F24A000
heap
page read and write
6790000
trusted library allocation
page read and write
1EA48120000
heap
page read and write
D81817E000
stack
page read and write
AF7431E000
stack
page read and write
29E4F249000
heap
page read and write
1EE15402000
heap
page read and write
169E000
stack
page read and write
2E2A5C3C000
heap
page read and write
29E4FD7C000
heap
page read and write
31BE000
stack
page read and write
707B5000
unkown
page readonly
29E4FDF9000
heap
page read and write
AC4BFEE000
stack
page read and write
35B2000
heap
page read and write
1EE14FE0000
heap
page read and write
29E4F24D000
heap
page read and write
31FF000
stack
page read and write
29E4FD7F000
heap
page read and write
24F15967000
heap
page read and write
1EE15500000
heap
page read and write
29E4F24B000
heap
page read and write
29E4F302000
heap
page read and write
3580000
remote allocation
page read and write
24F15BA0000
heap
page read and write
1EA48302000
heap
page read and write
29E4FD7E000
heap
page read and write
29E4FD9B000
heap
page read and write
EFDD1F7000
stack
page read and write
956B57F000
stack
page read and write
169E000
stack
page read and write
29E4FD8E000
heap
page read and write
284DB002000
trusted library allocation
page read and write
29E4FD6B000
heap
page read and write
6780000
heap
page read and write
1EE15210000
unkown
page read and write
29E4FD7D000
heap
page read and write
29E4FD7D000
heap
page read and write
6784000
heap
page read and write
3200000
unkown
page read and write
3380000
remote allocation
page read and write
13285290000
heap
page read and write
1430000
unclassified section
page read and write
13285320000
trusted library allocation
page read and write
34EF000
stack
page read and write
707A1000
unkown
page execute read
1460000
heap
page read and write
29E4FD7F000
heap
page read and write
33B0000
trusted library allocation
page read and write
29E4FD65000
heap
page read and write
AC4C67F000
stack
page read and write
346E000
stack
page read and write
29E50202000
heap
page read and write
1EE15202000
unkown
page read and write
D818077000
stack
page read and write
2E2A5D13000
heap
page read and write
284DA600000
heap
page read and write
AC4C47B000
stack
page read and write
29E50202000
heap
page read and write
12FB000
stack
page read and write
34A0000
heap
page read and write
35C4000
heap
page read and write
3380000
trusted library allocation
page read and write
1EA48270000
heap
page read and write
D817C7C000
stack
page read and write
3070000
unclassified section
page read and write
F7C000
stack
page read and write
1EA48213000
heap
page read and write
33F0000
trusted library allocation
page read and write
32AB000
stack
page read and write
29E4FDA4000
heap
page read and write
35B7000
heap
page read and write
33E0000
heap
page read and write
1EA48C02000
trusted library allocation
page read and write
132861E0000
trusted library allocation
page read and write
35CA000
heap
page read and write
4416DF9000
stack
page read and write
179F000
stack
page read and write
EFDD3FF000
stack
page read and write
3210000
heap
page read and write
30A2000
heap
page read and write
2DBB000
stack
page read and write
29E4FD99000
heap
page read and write
1EE15315000
trusted library allocation
page read and write
1430000
unclassified section
page read and write
284DA650000
heap
page read and write
35C6000
heap
page read and write
29E4FD9B000
heap
page read and write
1EA48279000
heap
page read and write
29E4FD7E000
heap
page read and write
29E50202000
heap
page read and write
29E4FD7D000
heap
page read and write
30B9000
heap
page read and write
29E50202000
heap
page read and write
13285340000
heap
page read and write
3080000
heap
page read and write
29E4F23C000
heap
page read and write
FE0000
trusted library allocation
page read and write
1EE15513000
heap
page read and write
29E4FD91000
heap
page read and write
1EA48200000
heap
page read and write
29E4FD99000
heap
page read and write
308A000
heap
page read and write
284DA700000
heap
page read and write
284DA624000
heap
page read and write
1EE15413000
heap
page read and write
707B5000
unkown
page readonly
284DA708000
heap
page read and write
179F000
stack
page read and write
35BC000
heap
page read and write
2E2A5D08000
heap
page read and write
352E000
stack
page read and write
356F000
stack
page read and write
35BB000
heap
page read and write
284DA689000
heap
page read and write
2E2A5C5D000
heap
page read and write
132855E0000
heap
page read and write
29E4FD7F000
heap
page read and write
D817E7B000
stack
page read and write
13E0000
heap
page read and write
1460000
heap
page read and write
29E4FD7D000
heap
page read and write
29E50202000
heap
page read and write
3070000
unclassified section
page read and write
1EA48313000
heap
page read and write
326C000
stack
page read and write
30AF000
heap
page read and write
165E000
stack
page read and write
707A0000
unkown
page readonly
308A000
heap
page read and write
34A0000
trusted library allocation
page read and write
1C4272C000
stack
page read and write
30CB000
heap
page read and write
29E4FD7D000
heap
page read and write
29E4FDAC000
heap
page read and write
3200000
unkown
page read and write
707A0000
unkown
page readonly
29E4FD9E000
heap
page read and write
29E4FDC5000
heap
page read and write
31A0000
heap
page read and write
13285130000
heap
page read and write
33F0000
trusted library allocation
page read and write
956B07E000
stack
page read and write
24F15980000
heap
page read and write
3080000
heap
page read and write
441699D000
stack
page read and write
29E4FD7D000
heap
page read and write
29E4FD7E000
heap
page read and write
29E4FD99000
heap
page read and write
2E2A6402000
trusted library allocation
page read and write
2D7A000
stack
page read and write
29E4F2EA000
heap
page read and write
1EA48252000
heap
page read and write
356F000
stack
page read and write
284DA63C000
heap
page read and write
29E4F200000
heap
page read and write
29E4FD00000
heap
page read and write
956B0FF000
stack
page read and write
336F000
stack
page read and write
1EE15213000
unkown
page read and write
24F157E0000
heap
page read and write
29E4FD7D000
heap
page read and write
169E000
stack
page read and write
284DA713000
heap
page read and write
AC4C8F9000
stack
page read and write
308A000
heap
page read and write
29E4FDAE000
heap
page read and write
29E50202000
heap
page read and write
29E4FD9C000
heap
page read and write
29E4FD7D000
heap
page read and write
AC4BEEB000
stack
page read and write
29E4F1A0000
trusted library allocation
page read and write
D817F7B000
stack
page read and write
EFDD2FE000
stack
page read and write
2E2A5C74000
heap
page read and write
132855D0000
trusted library allocation
page read and write
707A1000
unkown
page execute read
29E50252000
heap
page read and write
2E2A5CA0000
heap
page read and write
13285FA0000
trusted library allocation
page read and write
29E4FC02000
heap
page read and write
1EE15323000
heap
page read and write
29E4FD1C000
heap
page read and write
30B0000
heap
page read and write
29E4F110000
heap
page read and write
31BE000
stack
page read and write
1EA4823C000
heap
page read and write
1328537D000
heap
page read and write
356E000
stack
page read and write
284DA64B000
heap
page read and write
33B0000
heap
page read and write
2E2A5C13000
heap
page read and write
AF747FA000
stack
page read and write
1EA48229000
heap
page read and write
F10000
unkown
page read and write
29E4FD7E000
heap
page read and write
29E4F170000
heap
page read and write
707A0000
unkown
page readonly
29E4FD7F000
heap
page read and write
1EA48256000
heap
page read and write
44171F9000
stack
page read and write
2E2A5C7C000
heap
page read and write
34EF000
stack
page read and write
29E4FD7D000
heap
page read and write
2E2A5990000
heap
page read and write
34EF000
stack
page read and write
326C000
stack
page read and write
6484000
heap
page read and write
29E4FD7D000
heap
page read and write
29E4FD7F000
heap
page read and write
35C0000
heap
page read and write
29E4FD90000
heap
page read and write
34AA000
heap
page read and write
3390000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write
32AB000
stack
page read and write
18DF000
stack
page read and write
30B7000
heap
page read and write
30AB000
heap
page read and write
29E4FAD0000
remote allocation
page read and write
13E0000
heap
page read and write
24F15A40000
heap
page read and write
33B0000
trusted library allocation
page read and write
165E000
stack
page read and write
29E4F2E1000
heap
page read and write
3200000
heap
page read and write
1C42C79000
stack
page read and write
2DBB000
stack
page read and write
30AC000
heap
page read and write
1450000
remote allocation
page read and write
1EA4824D000
heap
page read and write
29E4FD7D000
heap
page read and write
30A7000
heap
page read and write
132861D0000
heap
page readonly
359A000
heap
page read and write
2E2A5C5A000
heap
page read and write
AC4CAFD000
stack
page read and write
AF74679000
stack
page read and write
13285380000
heap
page read and write
1EE14FF0000
trusted library allocation
page read and write
1EE15513000
heap
page read and write
332E000
stack
page read and write
29E4F2BA000
heap
page read and write
35C1000
heap
page read and write
13285310000
trusted library allocation
page read and write
3580000
remote allocation
page read and write
1EE15248000
heap
page read and write
44170F9000
stack
page read and write
29E4F2C5000
heap
page read and write
352E000
stack
page read and write
956ADBC000
stack
page read and write
1EA48300000
heap
page read and write
142E000
stack
page read and write
29E4FD99000
heap
page read and write
132855E5000
heap
page read and write
346E000
stack
page read and write
29E4FD7D000
heap
page read and write
1EE15248000
heap
page read and write
359A000
heap
page read and write
34A7000
heap
page read and write
17DE000
stack
page read and write
F7C000
stack
page read and write
29E4FD7F000
heap
page read and write
2D7D000
stack
page read and write
24F15971000
heap
page read and write
29E4FD8C000
heap
page read and write
30B7000
heap
page read and write
29E4F286000
heap
page read and write
707A0000
unkown
page readonly
24F15956000
heap
page read and write
31FF000
stack
page read and write
29E4F229000
heap
page read and write
326A000
stack
page read and write
3020000
trusted library allocation
page read and write
F7C000
stack
page read and write
29E50200000
heap
page read and write
2E2A5C62000
heap
page read and write
EFDCE7E000
stack
page read and write
2D10000
unkown
page read and write
FE0000
trusted library allocation
page read and write
1328537D000
heap
page read and write
6490000
trusted library allocation
page read and write
707A1000
unkown
page execute read
68A0000
trusted library allocation
page read and write
29E50202000
heap
page read and write
1EE15400000
heap
page read and write
13285376000
heap
page read and write
FE0000
trusted library allocation
page read and write
24F15956000
heap
page read and write
31BE000
stack
page read and write
29E4F213000
heap
page read and write
1328537F000
heap
page read and write
1EA48130000
heap
page read and write
AC4BF6F000
stack
page read and write
29E4FD7E000
heap
page read and write
3020000
trusted library allocation
page read and write
30AF000
heap
page read and write
29E4FD7D000
heap
page read and write
13285300000
trusted library allocation
page read and write
17DE000
stack
page read and write
29E4FD4E000
heap
page read and write
29E4FD7C000
heap
page read and write
2E2A5C5C000
heap
page read and write
31FF000
stack
page read and write
12FB000
stack
page read and write
1EA48286000
heap
page read and write
29E4F2A5000
heap
page read and write
29E4FD91000
heap
page read and write
29E4F24F000
heap
page read and write
956B67F000
stack
page read and write
29E4F316000
heap
page read and write
2E2A5C5F000
heap
page read and write
13285330000
heap
page read and write
332E000
stack
page read and write
1EE15229000
heap
page read and write
132855F0000
trusted library allocation
page read and write
33BA000
heap
page read and write
24F1597D000
heap
page read and write
352E000
stack
page read and write
284DA670000
heap
page read and write
2E2A5C9A000
heap
page read and write
29E4FD9E000
heap
page read and write
956B37B000
stack
page read and write
1EE15302000
trusted library allocation
page read and write
30AF000
heap
page read and write
707A1000
unkown
page execute read
13285140000
trusted library allocation
page read and write
35D5000
heap
page read and write
29E4F2F6000
heap
page read and write
142E000
stack
page read and write
24F15968000
heap
page read and write
284DA64D000
heap
page read and write
17DE000
stack
page read and write
284DA500000
heap
page read and write
707A0000
unkown
page readonly
2E2A5C74000
heap
page read and write
2E2A5C00000
heap
page read and write
32AB000
stack
page read and write
3380000
remote allocation
page read and write
1328537E000
heap
page read and write
2E2A5C67000
heap
page read and write
13286240000
trusted library allocation
page read and write
332E000
stack
page read and write
179F000
stack
page read and write
3020000
trusted library allocation
page read and write
956B27F000
stack
page read and write
1EA481C0000
trusted library allocation
page read and write
29E4F27E000
heap
page read and write
956B477000
stack
page read and write
3210000
heap
page read and write
6B50000
trusted library allocation
page read and write
F10000
heap
page read and write
29E4FDB1000
heap
page read and write
24F15BA5000
heap
page read and write
AC4C9FD000
stack
page read and write
132861F0000
trusted library allocation
page read and write
1C42AF9000
stack
page read and write
29E4FAD0000
remote allocation
page read and write
29E4FD91000
heap
page read and write
29E4F100000
heap
page read and write
142E000
stack
page read and write
2D7D000
stack
page read and write
29E4FD99000
heap
page read and write
35C0000
heap
page read and write
284DA67E000
heap
page read and write
13E0000
heap
page read and write
29E4F24E000
heap
page read and write
D817D7E000
stack
page read and write
29E4FDC2000
heap
page read and write
12FB000
stack
page read and write
284DA510000
heap
page read and write
24F15951000
heap
page read and write
2E2A5C29000
heap
page read and write
29E4FD7D000
heap
page read and write
AF746FE000
stack
page read and write
29E4FD7D000
heap
page read and write
707A1000
unkown
page execute read
29E4FD16000
heap
page read and write
284DA613000
heap
page read and write
30CB000
heap
page read and write
284DA702000
heap
page read and write
33E0000
heap
page read and write
31A0000
trusted library allocation
page read and write
24F15910000
heap
page read and write
29E4FDD2000
heap
page read and write
AC4C37E000
stack
page read and write
AC4CBFF000
stack
page read and write
29E4FDA2000
heap
page read and write
2E2A5D00000
heap
page read and write
346E000
stack
page read and write
2E2A5A00000
heap
page read and write
EFDD0FE000
stack
page read and write
29E4F313000
heap
page read and write
29E4FD7F000
heap
page read and write
13285270000
heap
page read and write
1C42B79000
stack
page read and write
1450000
remote allocation
page read and write
29E4FD7D000
heap
page read and write
707B5000
unkown
page readonly
29E4FD8C000
heap
page read and write
1EE15300000
trusted library allocation
page read and write
29E4F2E7000
heap
page read and write
2E2A59A0000
heap
page read and write
29E4F26F000
heap
page read and write
29E4FD90000
heap
page read and write
29E4FD7D000
heap
page read and write
29E4FD7C000
heap
page read and write
29E4FD7F000
heap
page read and write
24F15971000
heap
page read and write
336F000
stack
page read and write
3580000
trusted library allocation
page read and write
D817CFE000
stack
page read and write
AF7439F000
stack
page read and write
D81827F000
stack
page read and write
165E000
stack
page read and write
4F20000
trusted library allocation
page read and write
3480000
unclassified section
page read and write
3080000
heap
page read and write
18DF000
stack
page read and write
33F0000
trusted library allocation
page read and write
359A000
heap
page read and write
35B4000
heap
page read and write
AC4C777000
stack
page read and write
29E4FD91000
heap
page read and write
29E4F2EB000
heap
page read and write
AF7477E000
stack
page read and write
3210000
heap
page read and write
F10000
unkown
page read and write
29E4FD86000
heap
page read and write
29E4FD7E000
heap
page read and write
29E4FD7D000
heap
page read and write
2E2A5D02000
heap
page read and write
284DA5A0000
trusted library allocation
page read and write
33B7000
heap
page read and write
707A1000
unkown
page execute read
30AF000
heap
page read and write
707A0000
unkown
page readonly
29E4FD7D000
heap
page read and write
2D10000
heap
page read and write
13285338000
heap
page read and write
34A0000
trusted library allocation
page read and write
AC4C577000
stack
page read and write
EFDD07B000
stack
page read and write
24F15940000
heap
page read and write
29E4FDAA000
heap
page read and write
1EE15200000
unkown
page read and write
29E4FD8D000
heap
page read and write
1EA48308000
heap
page read and write
1460000
heap
page read and write
29E4F29E000
heap
page read and write
29E4F2AF000
heap
page read and write
29E4FAD0000
remote allocation
page read and write
29E4FD7F000
heap
page read and write
29E4FDDA000
heap
page read and write
1EE15502000
heap
page read and write
30C3000
heap
page read and write
EFDCB7B000
stack
page read and write
29E4FD9A000
heap
page read and write
1EA48190000
heap
page read and write
33E0000
heap
page read and write
EFDCBFD000
stack
page read and write
29E4F308000
heap
page read and write
1C42BFE000
stack
page read and write
2E2A5C56000
heap
page read and write
29E50203000
heap
page read and write
284DA652000
heap
page read and write
29E4FD99000
heap
page read and write
AF7429A000
stack
page read and write
29E4FD81000
heap
page read and write
132855E9000
heap
page read and write
6480000
heap
page read and write
18DF000
stack
page read and write
29E4FD88000
heap
page read and write
29E50220000
heap
page read and write
29E4FD80000
heap
page read and write
30A7000
heap
page read and write
1EA4822D000
heap
page read and write
29E4F2D5000
heap
page read and write
1EE15050000
heap
page read and write
29E4FD9E000
heap
page read and write
2DBB000
stack
page read and write
336F000
stack
page read and write
29E4FD81000
heap
page read and write
29E4FD9B000
heap
page read and write
29E4F2A6000
heap
page read and write
35DB000
heap
page read and write
3480000
unclassified section
page read and write
29E4FD9B000
heap
page read and write
1EE15248000
heap
page read and write
707B5000
unkown
page readonly
2D10000
unkown
page read and write
29E4FD7F000
heap
page read and write
707B5000
unkown
page readonly
2E2A5B00000
trusted library allocation
page read and write
1EE15502000
heap
page read and write
24F15971000
heap
page read and write
707B5000
unkown
page readonly
29E4FD7F000
heap
page read and write
AC4C7FE000
stack
page read and write
There are 510 hidden memdumps, click here to show them.