IOC Report
cVZ5IwmAMe.dll

loading gif

Files

File Path
Type
Category
Malicious
cVZ5IwmAMe.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_cca756cf3ca542105b493949e775f8b1db5ee_fe4ae974_158939b6\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_dc7d771a9db219da0c9c31413fa668d5ca41a6_fe4ae974_05552e4d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER264E.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Oct 20 21:20:17 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER27E5.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER28A1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER33DA.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Oct 20 21:20:21 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3572.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER363E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\cVZ5IwmAMe.dll"
malicious
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\cVZ5IwmAMe.dll
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\cVZ5IwmAMe.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\cVZ5IwmAMe.dll,DllRegisterServer
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\cVZ5IwmAMe.dll",#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 272
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 276

URLs

Name
IP
Malicious
http://onlinetwork.top/
unknown
malicious
http://linetwork.top/drew/0sQ7G5MK/K3A5th94SczU1K59UFfpeLh/J17DiVhkKW/LyhNewAspCDHUtEas/F0gRR_2BrzDs
unknown
malicious
http://onlinetwork.top/drew/5f_2BEDtM2CrlBj8hi85/PfpslRV80x6hEReBBsC/BgCJ3i1tejkKUVj0skPC_2/FG_2BjUb
unknown
malicious
http://onlinetwork.top/drew/K_2FqA2xbKL/njlOSx6YZxCsC1/NFhl_2FKNwee1I_2FsyQo/3lkzkmpLRl6mAh0d/8NioTP
unknown
malicious
http://linetwork.top/drew/KMMjqoTxziRlJvE/gNQPrvUPxqLNufKLCE/JH3UmHEB_/2B_2BzV_2BvfObx2f9w0/DgM6KzpzkFa0_2B2dRV/pBB0_2FnhSh3B1HrWQggbl/6yr_2BeHM7RhP/EQBdRd5n/WMFWEYQbNncplyS1nZxHquO/Dl0_2FZlCi/H7jS5UTDOVVAj0e_2/BP38A8joa9MI/uVE_2Fo3ECW/1FFJSef9MuZGr_/2B9LknlvHMlh3p6lHoAOu/HpoF5RbVarHLswoW/XhjcRNsVFN_2Faq/1QC22OwanscYLqlevC/p97ADQM6AS8_2FJi/nn82n.jlk
62.173.145.183
malicious
http://linetwork.top/
unknown
malicious
http://linetwork.top/drew/0sQ7G5MK/K3A5th94SczU1K59UFfpeLh/J17DiVhkKW/LyhNewAspCDHUtEas/F0gRR_2BrzDs/iuv6_2F2R2q/VU2O6EJ3EhI5uh/A5C2wRpZF_2FN6Skwj1uH/gsVRqmZs2mqIGO1d/sKRhOCfSSp3MAva/Mxxm2nqzKORinrbeZ3/z67oAItgn/k8VHFWexyUU_2FA_2BPV/QdcdTsvdt_2BKefM9G5/mT6M3zVj_2BfxHgfvoM1Vv/marhfTTPZdwKD/8RgEG4oq/f5httb_2BKiNQuEoUj_2FU4/qo0ljR4FNC0/5q1FSK.jlk
62.173.145.183
malicious
http://linetwork.top/drew/09dgKs_2BbGAUCZtNDfinAe/OBR2Fkwyls/rLfOzEm8taaEOpdgP/DGmX0HEH0YWb/9UgQCY1OoBP/16pWsh4Cy9rMRa/0naMTlH4D0jWSBvaLUMCT/VzfvlLpo6FHUtlJQ/DtpBc7vmn8rOS4k/xe3M0wkxCK5Om9Qsrc/Fu1mpdzkb/E5_2FW9vtCbCxhM8q_2F/YFJvu0mL313E60i9bem/o9T05qm4K45Pkaydjzo9gZ/BS0FXjQKsPhWn/z4GNxY84/_2FhBQGZQz4I6Dv77YbEnq5/_2FeodcjVbE87q/b67.jlk
62.173.145.183
malicious

Domains

Name
IP
Malicious
l-0007.l-dc-msedge.net
13.107.43.16
malicious
linetwork.top
62.173.145.183
malicious
onlinetwork.top
31.41.44.194
malicious

IPs

IP
Domain
Country
Malicious
62.173.145.183
linetwork.top
Russian Federation
malicious
31.41.44.194
onlinetwork.top
Russian Federation
malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018C0073296E1F7
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord

Memdumps

Base Address
Regiontype
Protect
Malicious
4BC8000
heap
page read and write
malicious
58F8000
heap
page read and write
malicious
4BC8000
heap
page read and write
malicious
338A000
heap
page read and write
malicious
112B000
heap
page read and write
malicious
58F8000
heap
page read and write
malicious
315A000
heap
page read and write
malicious
58F8000
heap
page read and write
malicious
52D8000
heap
page read and write
malicious
112B000
heap
page read and write
malicious
58F8000
heap
page read and write
malicious
58F8000
heap
page read and write
malicious
58F8000
heap
page read and write
malicious
4BC8000
heap
page read and write
malicious
263A000
heap
page read and write
malicious
112B000
heap
page read and write
malicious
4BC8000
heap
page read and write
malicious
52A9000
heap
page read and write
malicious
52D8000
heap
page read and write
malicious
52D8000
heap
page read and write
malicious
112B000
heap
page read and write
malicious
58F8000
heap
page read and write
malicious
4BC8000
heap
page read and write
malicious
52D8000
heap
page read and write
malicious
52D8000
heap
page read and write
malicious
4BC8000
heap
page read and write
malicious
52D8000
heap
page read and write
malicious
4BC8000
heap
page read and write
malicious
58F8000
heap
page read and write
malicious
52D8000
heap
page read and write
malicious
58F8000
heap
page read and write
malicious
52D8000
heap
page read and write
malicious
46B9000
heap
page read and write
malicious
4BC8000
heap
page read and write
malicious
4BC8000
heap
page read and write
malicious
4E19000
heap
page read and write
malicious
52D8000
heap
page read and write
malicious
112B000
heap
page read and write
malicious
2B9D33C7000
heap
page read and write
1BC586A7000
heap
page read and write
54FE000
stack
page read and write
210FBB80000
trusted library allocation
page read and write
1520000
heap
page read and write
50DD000
stack
page read and write
33F7000
heap
page read and write
210FBC00000
heap
page read and write
5500000
heap
page read and write
210FD802000
trusted library allocation
page read and write
BD0000
direct allocation
page execute and read and write
254CEE59000
heap
page read and write
1BC586BD000
heap
page read and write
59AD57C000
stack
page read and write
D94757E000
stack
page read and write
10000000
direct allocation
page read and write
131F000
stack
page read and write
210FBC58000
heap
page read and write
1A27AA00000
heap
page read and write
1BC57A9F000
heap
page read and write
2B9D29A0000
heap
page read and write
1A27AAE1000
heap
page read and write
59AD9FD000
stack
page read and write
8773FF000
stack
page read and write
2A07000
heap
page read and write
1BC586AC000
heap
page read and write
1A27AA29000
heap
page read and write
1EED5AC0000
heap
page read and write
10001000
direct allocation
page execute read
2B9D3354000
heap
page read and write
6D55F000
unkown
page readonly
1BC57AEB000
heap
page read and write
59AD8FE000
stack
page read and write
58FB000
heap
page read and write
1ED0FA02000
heap
page read and write
5328000
heap
page read and write
31C9000
heap
page read and write
223657AF000
heap
page read and write
2B9D2A91000
heap
page read and write
4738000
heap
page read and write
5910000
trusted library allocation
page read and write
41D0000
heap
page read and write
1BC5869C000
heap
page read and write
4E98000
heap
page read and write
5FAB0FE000
stack
page read and write
1ED0FB02000
heap
page read and write
5328000
heap
page read and write
6D547000
unkown
page readonly
BD0000
direct allocation
page execute and read and write
4AA0000
heap
page read and write
59AD27C000
stack
page read and write
1570000
heap
page read and write
210FBC02000
heap
page read and write
7CFE7F9000
stack
page read and write
1A27A8C0000
heap
page read and write
100E000
stack
page read and write
1BC586AA000
heap
page read and write
95E2377000
stack
page read and write
1EED5D02000
heap
page read and write
1AAE8E75000
heap
page read and write
BD0000
direct allocation
page execute and read and write
10003000
direct allocation
page readonly
11B2EB40000
trusted library allocation
page read and write
53BC000
stack
page read and write
1BC57A53000
heap
page read and write
52DB000
heap
page read and write
1EED6402000
trusted library allocation
page read and write
E31000
unclassified section
page execute read
1520000
heap
page read and write
1BC58118000
heap
page read and write
5EAE000
stack
page read and write
1BC57A58000
heap
page read and write
D90000
trusted library allocation
page read and write
206E6C13000
heap
page read and write
1050000
remote allocation
page read and write
1AAE8DF0000
trusted library allocation
page read and write
2B9D29D0000
trusted library allocation
page read and write
1AAE8E28000
heap
page read and write
2FE0000
trusted library allocation
page read and write
1CC5105D000
heap
page read and write
1120000
heap
page read and write
206E6C3C000
heap
page read and write
6D541000
unkown
page execute read
206E6C29000
heap
page read and write
1BC586A6000
heap
page read and write
6D55F000
unkown
page readonly
1ED0FFD0000
remote allocation
page read and write
5E9247B000
stack
page read and write
1BC57800000
heap
page read and write
6D55F000
unkown
page readonly
210FBBF0000
remote allocation
page read and write
254CEDD0000
trusted library allocation
page read and write
8771F9000
stack
page read and write
1BC57A3C000
heap
page read and write
E75000
heap
page read and write
1BC586B8000
heap
page read and write
10000000
direct allocation
page read and write
1BC5866B000
heap
page read and write
9B261FF000
stack
page read and write
519F000
stack
page read and write
95E1DDE000
stack
page read and write
1BC586B6000
heap
page read and write
254CEE60000
heap
page read and write
1EED5C73000
heap
page read and write
E1D000
stack
page read and write
10000000
direct allocation
page read and write
5D30000
trusted library allocation
page read and write
1CC51029000
heap
page read and write
FEF16FF000
stack
page read and write
1BC586B4000
heap
page read and write
1BC586A6000
heap
page read and write
1ED0FA23000
heap
page read and write
11B2EE40000
trusted library allocation
page read and write
22365530000
heap
page read and write
26C7000
heap
page read and write
10006000
direct allocation
page readonly
1BC57AD4000
heap
page read and write
2B9D3302000
heap
page read and write
1AAE8E73000
heap
page read and write
505D000
stack
page read and write
210FBD13000
heap
page read and write
4BCB000
heap
page read and write
6D540000
unkown
page readonly
1BC58560000
remote allocation
page read and write
59AD67E000
stack
page read and write
10003000
direct allocation
page readonly
5C8D000
stack
page read and write
210FBC2A000
heap
page read and write
4020000
heap
page read and write
1BC57A5C000
heap
page read and write
1120000
heap
page read and write
1A27A860000
heap
page read and write
1BC58652000
heap
page read and write
1CC51067000
heap
page read and write
1AAE8E13000
heap
page read and write
4F2D000
stack
page read and write
DD0000
direct allocation
page execute and read and write
10001000
direct allocation
page execute read
877279000
stack
page read and write
6D547000
unkown
page readonly
33C000
stack
page read and write
1BC58102000
heap
page read and write
AF0000
unkown
page read and write
254CEE63000
heap
page read and write
1ED0FFD0000
remote allocation
page read and write
6D540000
unkown
page readonly
210FBC47000
heap
page read and write
BC0000
trusted library allocation
page read and write
210FBAD0000
heap
page read and write
12014FE000
stack
page read and write
41BA000
unclassified section
page read and write
2630000
heap
page read and write
1BC58102000
heap
page read and write
1BC57A70000
heap
page read and write
11B2EE00000
trusted library allocation
page read and write
223657AF000
heap
page read and write
4E98000
heap
page read and write
52DB000
heap
page read and write
2B9D3130000
trusted library allocation
page read and write
10001000
direct allocation
page execute read
1ED0FFD0000
remote allocation
page read and write
4BCB000
heap
page read and write
6D548000
unkown
page write copy
1CC51081000
heap
page read and write
100E000
stack
page read and write
2B9D3430000
heap
page read and write
210FBC48000
heap
page read and write
1BC57A4E000
heap
page read and write
1BC5868C000
heap
page read and write
308C000
stack
page read and write
4E98000
heap
page read and write
1CC51108000
heap
page read and write
11B2F840000
trusted library allocation
page read and write
206E6C52000
heap
page read and write
1120000
heap
page read and write
6D55F000
unkown
page readonly
2B9D2A3C000
heap
page read and write
1BC586C1000
heap
page read and write
2B9D3413000
heap
page read and write
2795000
heap
page read and write
11B2EB30000
heap
page read and write
223657A7000
heap
page read and write
10006000
direct allocation
page readonly
1BC586A2000
heap
page read and write
1BC58694000
heap
page read and write
D9474FE000
stack
page read and write
95E1CDB000
stack
page read and write
1BC5869C000
heap
page read and write
254CEF02000
heap
page read and write
6D540000
unkown
page readonly
4738000
heap
page read and write
5D10000
heap
page read and write
210FBC82000
heap
page read and write
5FAAEFE000
stack
page read and write
1050000
remote allocation
page read and write
57EF000
stack
page read and write
1BC57790000
heap
page read and write
2F7B000
stack
page read and write
1CC50F50000
trusted library allocation
page read and write
131F000
stack
page read and write
52C0000
trusted library allocation
page read and write
D9476FE000
stack
page read and write
5A0C77E000
stack
page read and write
210FBC13000
heap
page read and write
419D000
stack
page read and write
EFC000
stack
page read and write
6D541000
unkown
page execute read
6D547000
unkown
page readonly
2F3C000
stack
page read and write
5CCE000
stack
page read and write
1200DFE000
stack
page read and write
1CC50E50000
heap
page read and write
31DB000
heap
page read and write
10003000
direct allocation
page readonly
6D547000
unkown
page readonly
2B9D336D000
heap
page read and write
1BC586DC000
heap
page read and write
B5C000
stack
page read and write
1CC5103C000
heap
page read and write
2236578B000
heap
page read and write
59AD7FD000
stack
page read and write
2B9D2A8C000
heap
page read and write
4EE0000
heap
page read and write
586E000
stack
page read and write
1ED0FA29000
heap
page read and write
1BC586A9000
heap
page read and write
1060000
heap
page read and write
1BC586B9000
heap
page read and write
2B9D3395000
heap
page read and write
1EED5C67000
heap
page read and write
2B9D3430000
heap
page read and write
670E67C000
stack
page read and write
2B9D2A68000
heap
page read and write
6D548000
unkown
page write copy
5D8E000
stack
page read and write
10005000
direct allocation
page read and write
E67000
heap
page read and write
1BC58694000
heap
page read and write
1A27AA6D000
heap
page read and write
1BC5869D000
heap
page read and write
EFC000
stack
page read and write
1BC58684000
heap
page read and write
1ED0F7D0000
heap
page read and write
1A7F000
stack
page read and write
529A000
stack
page read and write
254CEE7B000
heap
page read and write
11B2EE10000
trusted library allocation
page read and write
1BC586B0000
heap
page read and write
12010FD000
stack
page read and write
41B1000
unclassified section
page execute read
210FBC48000
heap
page read and write
E60000
heap
page read and write
7CFE6FF000
stack
page read and write
5D0F000
stack
page read and write
1BC57AA6000
heap
page read and write
1BC586AE000
heap
page read and write
670E97C000
stack
page read and write
1BC57B16000
heap
page read and write
1BC5869F000
heap
page read and write
254CEE44000
heap
page read and write
1A27AAC5000
heap
page read and write
1BC586A7000
heap
page read and write
95E20FB000
stack
page read and write
2A00000
heap
page read and write
1BC586A2000
heap
page read and write
2B9D3400000
heap
page read and write
4DEA000
trusted library allocation
page read and write
6D541000
unkown
page execute read
1A27AACB000
heap
page read and write
1BC586B6000
heap
page read and write
E30000
unclassified section
page read and write
6D548000
unkown
page write copy
1BC586A6000
heap
page read and write
4A70000
heap
page read and write
1BC58118000
heap
page read and write
1BC586AE000
heap
page read and write
EFC000
stack
page read and write
1EED5C29000
heap
page read and write
11B2EBA0000
heap
page read and write
BD0000
direct allocation
page execute and read and write
2B9D2A00000
heap
page read and write
254CEE41000
heap
page read and write
1ED0FA40000
heap
page read and write
B5C000
stack
page read and write
1A27AA65000
heap
page read and write
1BC586A6000
heap
page read and write
22365680000
heap
page read and write
1AAE9602000
trusted library allocation
page read and write
3275000
heap
page read and write
1060000
heap
page read and write
95E26F9000
stack
page read and write
1A27AB13000
heap
page read and write
1CC50DE0000
heap
page read and write
1BC586A6000
heap
page read and write
1BC586A8000
heap
page read and write
8772FE000
stack
page read and write
FEF15FB000
stack
page read and write
223659A0000
heap
page read and write
5328000
heap
page read and write
D946DFC000
stack
page read and write
5A0C47B000
stack
page read and write
1BC57A78000
heap
page read and write
1BC586B2000
heap
page read and write
12012FF000
stack
page read and write
670E47E000
stack
page read and write
572E000
stack
page read and write
304C000
stack
page read and write
95E247E000
stack
page read and write
1AAE8F02000
heap
page read and write
10001000
direct allocation
page execute read
1AAE8E00000
heap
page read and write
1A27B300000
heap
page read and write
6D547000
unkown
page readonly
1BC5811B000
heap
page read and write
1BC57A4D000
heap
page read and write
BD0000
direct allocation
page execute and read and write
1BC57AF6000
heap
page read and write
95E27FC000
stack
page read and write
1120000
heap
page read and write
1BC586B5000
heap
page read and write
11B2EC00000
heap
page read and write
254CEE68000
heap
page read and write
6D540000
unkown
page readonly
FEF197E000
stack
page read and write
206E6AC0000
heap
page read and write
26D0000
heap
page read and write
10000000
direct allocation
page read and write
1BC57A81000
heap
page read and write
135F000
trusted library allocation
page read and write
3250000
heap
page read and write
1BC57B02000
heap
page read and write
10005000
direct allocation
page read and write
26C9000
heap
page read and write
670E1FD000
stack
page read and write
1570000
heap
page read and write
515E000
stack
page read and write
1BC586A2000
heap
page read and write
254CEE29000
heap
page read and write
FEF1A7A000
stack
page read and write
58FB000
heap
page read and write
104E000
stack
page read and write
1BC57ACC000
heap
page read and write
37B000
stack
page read and write
1BC586DC000
heap
page read and write
1BC586A6000
heap
page read and write
95E227E000
stack
page read and write
58AE000
stack
page read and write
11B2FB00000
trusted library allocation
page read and write
11B2EBC0000
heap
page read and write
1BC57AE5000
heap
page read and write
2B9D2BB9000
heap
page read and write
206E6C00000
heap
page read and write
2B9D2A2A000
heap
page read and write
6D547000
unkown
page readonly
1ED0FA13000
heap
page read and write
1520000
heap
page read and write
1CC51061000
heap
page read and write
210FD670000
trusted library allocation
page read and write
210FBC3D000
heap
page read and write
210FBC57000
heap
page read and write
2B9D3300000
heap
page read and write
1BC57A56000
heap
page read and write
58FB000
heap
page read and write
1BC586BA000
heap
page read and write
1CC51102000
heap
page read and write
5FAACFE000
stack
page read and write
10001000
direct allocation
page execute read
1CC51113000
heap
page read and write
AF0000
unkown
page read and write
BE0000
remote allocation
page read and write
1BC58682000
heap
page read and write
5FAAFFE000
stack
page read and write
10000000
direct allocation
page read and write
1BC586D3000
heap
page read and write
1BC57ACF000
heap
page read and write
11B2FA80000
trusted library allocation
page read and write
135F000
trusted library allocation
page read and write
210FBC58000
heap
page read and write
670E37F000
stack
page read and write
1BC57A52000
heap
page read and write
432F000
stack
page read and write
5409000
unclassified section
page readonly
254CEC60000
heap
page read and write
210FBC63000
heap
page read and write
566D000
stack
page read and write
1BC58102000
heap
page read and write
6D55F000
unkown
page readonly
12013FF000
stack
page read and write
1BC586BB000
heap
page read and write
BC0000
trusted library allocation
page read and write
11B2EE30000
heap
page read and write
FEF1879000
stack
page read and write
104E000
stack
page read and write
10001000
direct allocation
page execute read
254CEE3B000
heap
page read and write
11B2FA90000
heap
page readonly
3150000
heap
page read and write
1CC51049000
heap
page read and write
254CEE75000
heap
page read and write
E40000
heap
page read and write
5400000
unclassified section
page read and write
E70000
heap
page read and write
223659A5000
heap
page read and write
9B0000
heap
page read and write
254CEE6A000
heap
page read and write
6D55F000
unkown
page readonly
254CEE42000
heap
page read and write
2D0000
heap
page read and write
31B2000
heap
page read and write
1BC58695000
heap
page read and write
5328000
heap
page read and write
1BC58698000
heap
page read and write
1A7F000
stack
page read and write
D94727E000
stack
page read and write
254CECD0000
heap
page read and write
1CC51802000
trusted library allocation
page read and write
1BC5868A000
heap
page read and write
1BC58671000
heap
page read and write
1200EFD000
stack
page read and write
4738000
heap
page read and write
1BC586C1000
heap
page read and write
2B9D2940000
heap
page read and write
10003000
direct allocation
page readonly
1EED5D13000
heap
page read and write
4738000
heap
page read and write
26A4000
heap
page read and write
1BC57A55000
heap
page read and write
10005000
direct allocation
page read and write
2B9D2A43000
heap
page read and write
1EED5C13000
heap
page read and write
C3C000
stack
page read and write
59AD07B000
stack
page read and write
2B9D2A22000
heap
page read and write
210FBC7F000
heap
page read and write
1AAE8E02000
heap
page read and write
1BC586B2000
heap
page read and write
254CEE58000
heap
page read and write
1ED0F840000
heap
page read and write
4E98000
heap
page read and write
1EED5C79000
heap
page read and write
1A27AACD000
heap
page read and write
2B9D2A75000
heap
page read and write
7CFE77F000
stack
page read and write
210FBC89000
heap
page read and write
1BC58100000
heap
page read and write
254CEE32000
heap
page read and write
1ED0FA00000
heap
page read and write
223657A6000
heap
page read and write
10006000
direct allocation
page readonly
1BC586AE000
heap
page read and write
4E98000
heap
page read and write
2B9D3202000
heap
page read and write
1EED5C57000
heap
page read and write
1BC586AB000
heap
page read and write
11B2FAB0000
trusted library allocation
page read and write
95E25FE000
stack
page read and write
57AE000
stack
page read and write
11B2EC3C000
heap
page read and write
52DB000
heap
page read and write
1BC586A8000
heap
page read and write
FEF1BFF000
stack
page read and write
BC0000
trusted library allocation
page read and write
1570000
heap
page read and write
210FBB30000
heap
page read and write
2B9D2A65000
heap
page read and write
1BC586A0000
heap
page read and write
1A27AA3D000
heap
page read and write
1BC586DA000
heap
page read and write
10003000
direct allocation
page readonly
2B9D3402000
heap
page read and write
1BC586A9000
heap
page read and write
10000000
direct allocation
page read and write
3270000
heap
page read and write
11B2EC3E000
heap
page read and write
AF0000
unkown
page read and write
2B9D2A13000
heap
page read and write
5A0BF2C000
stack
page read and write
1BC5860D000
heap
page read and write
1A27AA13000
heap
page read and write
10006000
direct allocation
page readonly
1BC5860F000
heap
page read and write
E8A000
trusted library allocation
page read and write
4738000
heap
page read and write
254CEE6F000
heap
page read and write
5E928F7000
stack
page read and write
6D55F000
unkown
page readonly
E39000
unclassified section
page readonly
254CEE62000
heap
page read and write
10005000
direct allocation
page read and write
FEF1CFF000
stack
page read and write
54BA000
stack
page read and write
6D541000
unkown
page execute read
670DD9B000
stack
page read and write
2790000
heap
page read and write
1BC586B5000
heap
page read and write
11B2EE20000
trusted library allocation
page read and write
4BCB000
heap
page read and write
254CEE45000
heap
page read and write
1BC57A4F000
heap
page read and write
2B9D33B1000
heap
page read and write
10006000
direct allocation
page readonly
9B262FF000
stack
page read and write
B5C000
stack
page read and write
1BC586E8000
heap
page read and write
1A27AB02000
heap
page read and write
540C000
unclassified section
page readonly
1BC57A13000
heap
page read and write
135F000
trusted library allocation
page read and write
254CEE67000
heap
page read and write
1BC5861D000
heap
page read and write
254CEE65000
heap
page read and write
206E6BC0000
trusted library allocation
page read and write
2B9D2B8E000
heap
page read and write
9B25FFE000
stack
page read and write
1EED5C02000
heap
page read and write
210FBD18000
heap
page read and write
511D000
stack
page read and write
5328000
heap
page read and write
AF0000
unkown
page read and write
1BC57A49000
heap
page read and write
1200C7B000
stack
page read and write
131F000
stack
page read and write
1A27AA88000
heap
page read and write
1BC5868A000
heap
page read and write
1060000
heap
page read and write
6D548000
unkown
page write copy
1BC586B8000
heap
page read and write
56EA000
stack
page read and write
4BCB000
heap
page read and write
1570000
trusted library allocation
page read and write
11B2EC3C000
heap
page read and write
1ED10002000
trusted library allocation
page read and write
95E1D5E000
stack
page read and write
1520000
heap
page read and write
1BC586C3000
heap
page read and write
1BC5868A000
heap
page read and write
5F20000
trusted library allocation
page read and write
59ADAFF000
stack
page read and write
576F000
stack
page read and write
3257000
heap
page read and write
254CEE47000
heap
page read and write
59AD6FB000
stack
page read and write
E3C000
unclassified section
page readonly
4738000
heap
page read and write
2B9D2930000
heap
page read and write
254CEE74000
heap
page read and write
6D540000
unkown
page readonly
1BC58560000
remote allocation
page read and write
254CEE5C000
heap
page read and write
59AD3FE000
stack
page read and write
2B9D2B13000
heap
page read and write
10003000
direct allocation
page readonly
206E6C45000
heap
page read and write
1BC577A0000
heap
page read and write
1BC586BB000
heap
page read and write
1520000
heap
page read and write
11B2EBF0000
heap
page read and write
254CEC70000
heap
page read and write
206E6A70000
heap
page read and write
41E9000
trusted library allocation
page read and write
1BC586AA000
heap
page read and write
254CEE46000
heap
page read and write
3411000
heap
page read and write
4738000
heap
page read and write
135F000
trusted library allocation
page read and write
6D547000
unkown
page readonly
1CC51060000
heap
page read and write
210FBAC0000
heap
page read and write
1BC57B08000
heap
page read and write
1BC586A7000
heap
page read and write
131F000
stack
page read and write
540A000
unclassified section
page read and write
5328000
heap
page read and write
537E000
stack
page read and write
10006000
direct allocation
page readonly
1A27B202000
heap
page read and write
1EED5C5B000
heap
page read and write
5E9267B000
stack
page read and write
D9472FC000
stack
page read and write
1BC57A50000
heap
page read and write
104E000
stack
page read and write
104E000
stack
page read and write
95E21F7000
stack
page read and write
254CEE3D000
heap
page read and write
2ED0000
heap
page read and write
1BC58600000
heap
page read and write
1BC586AA000
heap
page read and write
AF0000
heap
page read and write
670E57F000
stack
page read and write
2B9D33BD000
heap
page read and write
1BC5861C000
heap
page read and write
670E77C000
stack
page read and write
1BC57A00000
heap
page read and write
22365796000
heap
page read and write
582E000
stack
page read and write
EFC000
stack
page read and write
547D000
stack
page read and write
1A27A9C0000
trusted library allocation
page read and write
521F000
stack
page read and write
1BC5868C000
heap
page read and write
1BC5866C000
heap
page read and write
1BC58002000
heap
page read and write
478C000
stack
page read and write
2B9D3322000
heap
page read and write
4340000
heap
page read and write
12011FE000
stack
page read and write
3360000
heap
page read and write
206E6C3E000
heap
page read and write
210FBBF0000
remote allocation
page read and write
BC0000
trusted library allocation
page read and write
1BC57A4B000
heap
page read and write
6D540000
unkown
page readonly
1BC5866C000
heap
page read and write
210FBD02000
heap
page read and write
135F000
trusted library allocation
page read and write
3350000
direct allocation
page execute and read and write
7CFE8FE000
stack
page read and write
4ED0000
trusted library allocation
page read and write
1AAE8E3C000
heap
page read and write
1BC586B0000
heap
page read and write
254CEE57000
heap
page read and write
47D0000
heap
page read and write
1BC586BB000
heap
page read and write
254CEE40000
heap
page read and write
254CEE7D000
heap
page read and write
1A7F000
stack
page read and write
3380000
heap
page read and write
31C9000
heap
page read and write
10003000
direct allocation
page readonly
6D548000
unkown
page write copy
1BC586D9000
heap
page read and write
5EEF000
stack
page read and write
1AAE8C90000
heap
page read and write
3414000
heap
page read and write
6D540000
unkown
page readonly
5E9277B000
stack
page read and write
4E98000
heap
page read and write
58EF000
stack
page read and write
56AD000
stack
page read and write
BC0000
trusted library allocation
page read and write
10005000
direct allocation
page read and write
1BC57A5B000
heap
page read and write
2B9D2A84000
heap
page read and write
210FBBB0000
trusted library allocation
page read and write
4E98000
heap
page read and write
51DE000
stack
page read and write
5E924FE000
stack
page read and write
100E000
stack
page read and write
5DCF000
stack
page read and write
1AAE8F00000
heap
page read and write
1EED5B60000
trusted library allocation
page read and write
2B9D3427000
heap
page read and write
B5C000
stack
page read and write
6D548000
unkown
page write copy
1BC57ADC000
heap
page read and write
E3A000
unclassified section
page read and write
2B9D2A59000
heap
page read and write
95E28FA000
stack
page read and write
1AAE8E57000
heap
page read and write
4E98000
heap
page read and write
4150000
direct allocation
page execute and read and write
254CEE6D000
heap
page read and write
525D000
stack
page read and write
5A0C67E000
stack
page read and write
1CC51000000
heap
page read and write
59AD4FF000
stack
page read and write
52DB000
heap
page read and write
1BC586B2000
heap
page read and write
254CEE00000
heap
page read and write
223657AF000
heap
page read and write
1CC51013000
heap
page read and write
5328000
heap
page read and write
1BC586C3000
heap
page read and write
1BC586A9000
heap
page read and write
1BC586B2000
heap
page read and write
1BC586B8000
heap
page read and write
210FBB60000
trusted library allocation
page read and write
1ED0F7E0000
heap
page read and write
210FBD00000
heap
page read and write
BE0000
remote allocation
page read and write
FEF118B000
stack
page read and write
6D541000
unkown
page execute read
5328000
heap
page read and write
1BC57B13000
heap
page read and write
1BC58699000
heap
page read and write
1A7F000
stack
page read and write
206E6C48000
heap
page read and write
1BC57A29000
heap
page read and write
1ED0FFA0000
trusted library allocation
page read and write
4738000
heap
page read and write
1A27AA67000
heap
page read and write
254CEE64000
heap
page read and write
26B1000
heap
page read and write
10005000
direct allocation
page read and write
254CF602000
trusted library allocation
page read and write
254CEE84000
heap
page read and write
254CEE6B000
heap
page read and write
1AAE8F13000
heap
page read and write
1BC586AC000
heap
page read and write
1BC5868F000
heap
page read and write
5FAAD7E000
stack
page read and write
1A27AABC000
heap
page read and write
1BC58690000
heap
page read and write
1ED0FA5C000
heap
page read and write
254CEE61000
heap
page read and write
10005000
direct allocation
page read and write
6D547000
unkown
page readonly
6D540000
unkown
page readonly
6D541000
unkown
page execute read
EFC000
stack
page read and write
10005000
direct allocation
page read and write
254CEE5F000
heap
page read and write
206E7402000
trusted library allocation
page read and write
BE0000
unclassified section
page read and write
1EED5AD0000
heap
page read and write
7CFE3DA000
stack
page read and write
5E6A000
stack
page read and write
53FC000
stack
page read and write
22365660000
heap
page read and write
10006000
direct allocation
page readonly
87707C000
stack
page read and write
2B9D3322000
heap
page read and write
1BC586A7000
heap
page read and write
4A6D000
stack
page read and write
341D000
heap
page read and write
FEF17FB000
stack
page read and write
5E9257E000
stack
page read and write
1BC57ABB000
heap
page read and write
1BC58560000
remote allocation
page read and write
1CC50DF0000
heap
page read and write
10006000
direct allocation
page readonly
2B9D3343000
heap
page read and write
6D55F000
unkown
page readonly
1BC58613000
heap
page read and write
1A7F000
stack
page read and write
1EED5C76000
heap
page read and write
BE0000
unclassified section
page read and write
11B2EE39000
heap
page read and write
877479000
stack
page read and write
1060000
heap
page read and write
1CC51100000
heap
page read and write
10000000
direct allocation
page read and write
5A0C57B000
stack
page read and write
2770000
trusted library allocation
page read and write
206E6C02000
heap
page read and write
9B25BFB000
stack
page read and write
10003000
direct allocation
page readonly
206E6A60000
heap
page read and write
1BC57ACF000
heap
page read and write
1BC57A4A000
heap
page read and write
6D548000
unkown
page write copy
5328000
heap
page read and write
5E927FF000
stack
page read and write
5E92AFE000
stack
page read and write
11B2FAA0000
trusted library allocation
page read and write
11B2EBF8000
heap
page read and write
1BC57AC3000
heap
page read and write
FCE000
stack
page read and write
B5C000
stack
page read and write
41B9000
unclassified section
page readonly
95E2578000
stack
page read and write
1120000
heap
page read and write
58FB000
heap
page read and write
2B9D2BE5000
heap
page read and write
7CFE87F000
stack
page read and write
5E2D000
stack
page read and write
1BC586B7000
heap
page read and write
6D541000
unkown
page execute read
1BC58694000
heap
page read and write
1BC5811B000
heap
page read and write
1BC58102000
heap
page read and write
4F30000
heap
page read and write
254CEE5A000
heap
page read and write
5E929FE000
stack
page read and write
2B9D3423000
heap
page read and write
1AAE8C80000
heap
page read and write
22365791000
heap
page read and write
5401000
unclassified section
page execute read
1BC586B8000
heap
page read and write
1BC579D0000
trusted library allocation
page read and write
131F000
stack
page read and write
FEF1B7E000
stack
page read and write
41BC000
unclassified section
page readonly
10000000
direct allocation
page read and write
1BC5869F000
heap
page read and write
1BC586AD000
heap
page read and write
1EED5C40000
heap
page read and write
2B9D2A92000
heap
page read and write
11B2EE35000
heap
page read and write
C7B000
stack
page read and write
1CC51064000
heap
page read and write
100E000
stack
page read and write
1BC586D9000
heap
page read and write
104E000
stack
page read and write
31E0000
heap
page read and write
7CFE67E000
stack
page read and write
10001000
direct allocation
page execute read
206E6D02000
heap
page read and write
1AAE8CF0000
heap
page read and write
1BC586A6000
heap
page read and write
4738000
heap
page read and write
12015FF000
stack
page read and write
10001000
direct allocation
page execute read
5FAAC7C000
stack
page read and write
254CEE4E000
heap
page read and write
1BC58663000
heap
page read and write
254CEE7E000
heap
page read and write
210FBBF0000
remote allocation
page read and write
1BC586BB000
heap
page read and write
1CC51027000
heap
page read and write
41B0000
unclassified section
page read and write
1EED5C00000
heap
page read and write
1A27A850000
heap
page read and write
D94767D000
stack
page read and write
5FAB1FE000
stack
page read and write
9B260FA000
stack
page read and write
6D541000
unkown
page execute read
100E000
stack
page read and write
1BC5869C000
heap
page read and write
1060000
heap
page read and write
509D000
stack
page read and write
22365780000
heap
page read and write
4E98000
heap
page read and write
254CEE13000
heap
page read and write
1CC51052000
heap
page read and write
2B9D2A77000
heap
page read and write
1AAE8E79000
heap
page read and write
6D548000
unkown
page write copy
1EED5B30000
heap
page read and write
1570000
trusted library allocation
page read and write
11B2EC3C000
heap
page read and write
1BC586BB000
heap
page read and write
2600000
trusted library allocation
page read and write
47CC000
stack
page read and write
206E6C2F000
heap
page read and write
3414000
heap
page read and write
31DD000
heap
page read and write
1200A7B000
stack
page read and write
There are 866 hidden memdumps, click here to show them.