IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_c7d966c262eae458e8625727f886cf5c34890_82810a17_17838664\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5A43.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Nov 30 08:33:02 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5E5B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6021.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Serpodtudpwhhta.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_c7d966c262eae458e8625727f886cf5c34890_82810a17_156d127b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2AE.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFE66.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Nov 30 08:23:13 2022, 0x1205a4 type
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
C:\Users\user\Desktop\file.exe
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\system32\rundll32.exe C:\Users\user\AppData\Local\Temp\Serpodtudpwhhta.dll,start
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 668
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5248 -s 668

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
\REGISTRY\A\{569c051a-4535-4efd-974b-63ccd727aefe}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProgramId
\REGISTRY\A\{569c051a-4535-4efd-974b-63ccd727aefe}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
FileId
\REGISTRY\A\{569c051a-4535-4efd-974b-63ccd727aefe}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LowerCaseLongPath
\REGISTRY\A\{569c051a-4535-4efd-974b-63ccd727aefe}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LongPathHash
\REGISTRY\A\{569c051a-4535-4efd-974b-63ccd727aefe}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Name
\REGISTRY\A\{569c051a-4535-4efd-974b-63ccd727aefe}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Publisher
\REGISTRY\A\{569c051a-4535-4efd-974b-63ccd727aefe}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Version
\REGISTRY\A\{569c051a-4535-4efd-974b-63ccd727aefe}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinFileVersion
\REGISTRY\A\{569c051a-4535-4efd-974b-63ccd727aefe}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinaryType
\REGISTRY\A\{569c051a-4535-4efd-974b-63ccd727aefe}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProductName
\REGISTRY\A\{569c051a-4535-4efd-974b-63ccd727aefe}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProductVersion
\REGISTRY\A\{569c051a-4535-4efd-974b-63ccd727aefe}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LinkDate
\REGISTRY\A\{569c051a-4535-4efd-974b-63ccd727aefe}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinProductVersion
\REGISTRY\A\{569c051a-4535-4efd-974b-63ccd727aefe}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Size
\REGISTRY\A\{569c051a-4535-4efd-974b-63ccd727aefe}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Language
\REGISTRY\A\{569c051a-4535-4efd-974b-63ccd727aefe}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
IsPeFile
\REGISTRY\A\{569c051a-4535-4efd-974b-63ccd727aefe}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
00184009E7F3D98C
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
\REGISTRY\A\{a7e87e7e-0e87-aa13-b82e-565665afc261}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProgramId
\REGISTRY\A\{a7e87e7e-0e87-aa13-b82e-565665afc261}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
FileId
\REGISTRY\A\{a7e87e7e-0e87-aa13-b82e-565665afc261}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LowerCaseLongPath
\REGISTRY\A\{a7e87e7e-0e87-aa13-b82e-565665afc261}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LongPathHash
\REGISTRY\A\{a7e87e7e-0e87-aa13-b82e-565665afc261}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Name
\REGISTRY\A\{a7e87e7e-0e87-aa13-b82e-565665afc261}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Publisher
\REGISTRY\A\{a7e87e7e-0e87-aa13-b82e-565665afc261}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Version
\REGISTRY\A\{a7e87e7e-0e87-aa13-b82e-565665afc261}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinFileVersion
\REGISTRY\A\{a7e87e7e-0e87-aa13-b82e-565665afc261}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinaryType
\REGISTRY\A\{a7e87e7e-0e87-aa13-b82e-565665afc261}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProductName
\REGISTRY\A\{a7e87e7e-0e87-aa13-b82e-565665afc261}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProductVersion
\REGISTRY\A\{a7e87e7e-0e87-aa13-b82e-565665afc261}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LinkDate
\REGISTRY\A\{a7e87e7e-0e87-aa13-b82e-565665afc261}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinProductVersion
\REGISTRY\A\{a7e87e7e-0e87-aa13-b82e-565665afc261}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Size
\REGISTRY\A\{a7e87e7e-0e87-aa13-b82e-565665afc261}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Language
\REGISTRY\A\{a7e87e7e-0e87-aa13-b82e-565665afc261}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
IsPeFile
\REGISTRY\A\{a7e87e7e-0e87-aa13-b82e-565665afc261}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
IsOsComponent
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
001840064172BCE4
There are 32 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2518D013000
heap
page read and write
4A24000
direct allocation
page read and write
2518D074000
heap
page read and write
C70000
trusted library allocation
page read and write
10AF000
stack
page read and write
AFC67E000
stack
page read and write
3056000
direct allocation
page read and write
22A08C6A000
heap
page read and write
302A000
direct allocation
page read and write
A7A000
heap
page read and write
21921192000
heap
page read and write
1832003D000
heap
page read and write
2FE7000
direct allocation
page read and write
21920886000
heap
page read and write
1E077532000
heap
page read and write
219209E5000
heap
page read and write
48F4000
unkown
page write copy
4A74000
direct allocation
page read and write
21D85360000
heap
page read and write
1E076BC0000
trusted library allocation
page read and write
76536FF000
stack
page read and write
4A2B000
direct allocation
page read and write
83A000
stack
page read and write
2518D036000
heap
page read and write
AFC7FF000
stack
page read and write
2518D06B000
heap
page read and write
1E15D540000
heap
page read and write
21920863000
heap
page read and write
219211C9000
heap
page read and write
21920858000
heap
page read and write
2518D04E000
heap
page read and write
2393C402000
trusted library allocation
page read and write
30000
heap
page read and write
1318BDB0000
remote allocation
page read and write
4A74000
direct allocation
page read and write
22A09280000
trusted library allocation
page read and write
1318BE5C000
heap
page read and write
A0E000
stack
page read and write
26CD000
trusted library allocation
page execute and read and write
21D85779000
heap
page read and write
1E15D602000
heap
page read and write
1831FEA0000
heap
page read and write
4A58000
direct allocation
page read and write
2518D07A000
heap
page read and write
AD0000
direct allocation
page execute and read and write
D73867E000
stack
page read and write
2393BB60000
trusted library allocation
page read and write
48E9000
unkown
page execute read
4A6D000
direct allocation
page read and write
4908000
unkown
page read and write
4A6D000
direct allocation
page read and write
18320048000
heap
page read and write
3048000
direct allocation
page read and write
4A7C000
direct allocation
page read and write
5F0000
remote allocation
page read and write
21D85438000
heap
page read and write
1318BDB0000
remote allocation
page read and write
2518D802000
trusted library allocation
page read and write
75089FE000
stack
page read and write
DDF000
stack
page read and write
22A08C00000
heap
page read and write
48FA000
unkown
page read and write
21D86070000
trusted library allocation
page read and write
18320047000
heap
page read and write
2518CEE0000
heap
page read and write
2192086C000
heap
page read and write
2393BC27000
heap
page read and write
75081BB000
stack
page read and write
C83297F000
stack
page read and write
319907B000
stack
page read and write
2192086E000
heap
page read and write
76537FF000
stack
page read and write
48F9000
unkown
page write copy
4A91000
direct allocation
page read and write
21920851000
heap
page read and write
2393BC02000
heap
page read and write
48FA000
unkown
page read and write
4A1D000
direct allocation
page read and write
2F50000
direct allocation
page read and write
1E15D66B000
heap
page read and write
5F0000
remote allocation
page read and write
AFC3FE000
stack
page read and write
C70000
direct allocation
page execute and read and write
8D0000
heap
page read and write
2518D045000
heap
page read and write
48E5000
unkown
page execute and read and write
1E15D4D0000
heap
page read and write
A9B000
heap
page read and write
319997F000
stack
page read and write
7F2B0000
direct allocation
page read and write
93F9CFB000
stack
page read and write
4A1D000
direct allocation
page read and write
22A08C74000
heap
page read and write
2518D102000
heap
page read and write
2518D067000
heap
page read and write
A70000
heap
page read and write
22A08AC0000
heap
page read and write
48F9000
unkown
page write copy
4501000
unkown
page execute read
1E076B20000
heap
page read and write
4906000
unkown
page write copy
7FDEEFF000
stack
page read and write
4AD0000
heap
page read and write
1831FF00000
heap
page read and write
1E076C00000
heap
page read and write
106E000
stack
page read and write
2043D7C000
stack
page read and write
2393BC43000
heap
page read and write
319987E000
stack
page read and write
2192088F000
heap
page read and write
4A41000
direct allocation
page read and write
2393BC4D000
heap
page read and write
8D0000
heap
page read and write
219206D0000
heap
page read and write
1E076D02000
heap
page read and write
D73857E000
stack
page read and write
2518D040000
heap
page read and write
4A48000
direct allocation
page read and write
C97000
heap
page read and write
18320058000
heap
page read and write
21D86330000
trusted library allocation
page read and write
18321C40000
trusted library allocation
page read and write
2043E7E000
stack
page read and write
93F9EFE000
stack
page read and write
C9A000
heap
page read and write
1E15D613000
heap
page read and write
22A08C28000
heap
page read and write
3031000
direct allocation
page read and write
83C000
stack
page read and write
21D853D0000
heap
page read and write
C832BFC000
stack
page read and write
10C0000
remote allocation
page read and write
1318BE00000
heap
page read and write
2393BA00000
heap
page read and write
1E076C88000
heap
page read and write
2FFD000
direct allocation
page read and write
2A60000
unkown
page execute and read and write
4A3A000
direct allocation
page read and write
4906000
unkown
page write copy
4A48000
direct allocation
page read and write
1318BF02000
heap
page read and write
2518D000000
heap
page read and write
1E15D665000
heap
page read and write
8B0000
unkown
page execute and read and write
305D000
direct allocation
page read and write
C832D7C000
stack
page read and write
2518D079000
heap
page read and write
6700000
trusted library allocation
page read and write
410000
unkown
page execute read
4A66000
direct allocation
page read and write
1E15D686000
heap
page read and write
75087FC000
stack
page read and write
1318C602000
trusted library allocation
page read and write
8B9000
unkown
page execute and read and write
21D853F9000
heap
page read and write
2518CFE0000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
CDF000
stack
page read and write
4A0D000
direct allocation
page read and write
4A24000
direct allocation
page read and write
21D85780000
trusted library allocation
page read and write
1E15D670000
heap
page read and write
7FDEFF9000
stack
page read and write
26B0000
heap
page read and write
C832F7D000
stack
page read and write
1318BE40000
heap
page read and write
1E076CCE000
heap
page read and write
1E15D676000
heap
page read and write
48F3000
unkown
page read and write
4A98000
direct allocation
page read and write
10AF000
stack
page read and write
9F0000
heap
page read and write
21920800000
heap
page read and write
2393BA10000
heap
page read and write
18320077000
heap
page read and write
1E15D570000
trusted library allocation
page read and write
AFC77D000
stack
page read and write
1E076B30000
heap
page read and write
A7A000
heap
page read and write
219209B9000
heap
page read and write
21D85439000
heap
page read and write
4A74000
direct allocation
page read and write
31994FA000
stack
page read and write
1E15DE02000
trusted library allocation
page read and write
4909000
unkown
page readonly
21921202000
heap
page read and write
1E076C29000
heap
page read and write
1E15D629000
heap
page read and write
4501000
unkown
page execute read
A7A000
heap
page read and write
76530FD000
stack
page read and write
4A66000
direct allocation
page read and write
4A5F000
direct allocation
page read and write
2518D03D000
heap
page read and write
A94000
heap
page read and write
21D85370000
trusted library allocation
page read and write
412000
unkown
page write copy
21D85770000
heap
page read and write
1318BCE0000
heap
page read and write
A4F000
stack
page read and write
4A3A000
direct allocation
page read and write
7FDEB8D000
stack
page read and write
490B000
unkown
page readonly
A4F000
stack
page read and write
1318BD80000
trusted library allocation
page read and write
48E9000
unkown
page execute read
C8323EC000
stack
page read and write
7652B5C000
stack
page read and write
2043B7F000
stack
page read and write
18320113000
heap
page read and write
C90000
heap
page read and write
31995FA000
stack
page read and write
21D855C0000
heap
page read and write
7FC20000
direct allocation
page read and write
8D0000
heap
page read and write
3088000
direct allocation
page read and write
21D8543F000
heap
page read and write
4A3A000
direct allocation
page read and write
21920866000
heap
page read and write
A3E000
stack
page read and write
30A0000
heap
page read and write
1E076CC5000
heap
page read and write
76535FE000
stack
page read and write
22A08C79000
heap
page read and write
7CC000
unkown
page readonly
4AD0000
heap
page read and write
93F97FC000
stack
page read and write
4A8A000
direct allocation
page read and write
401000
unkown
page execute read
21D8543F000
heap
page read and write
22A08D00000
heap
page read and write
7FDEF7A000
stack
page read and write
3081000
direct allocation
page read and write
4A83000
direct allocation
page read and write
4A1D000
direct allocation
page read and write
5A0000
unkown
page read and write
22A08C02000
heap
page read and write
2518D064000
heap
page read and write
21920813000
heap
page read and write
87B000
stack
page read and write
8B0000
trusted library allocation
page read and write
AA6000
heap
page read and write
22A08D02000
heap
page read and write
21D862B0000
trusted library allocation
page read and write
31996FF000
stack
page read and write
5F0000
remote allocation
page read and write
1E15D675000
heap
page read and write
A70000
heap
page read and write
19B000
stack
page read and write
4A41000
direct allocation
page read and write
1E15D675000
heap
page read and write
2192085F000
heap
page read and write
3022000
direct allocation
page read and write
183219A0000
trusted library allocation
page read and write
8B0000
trusted library allocation
page read and write
7FDEE7E000
stack
page read and write
1F0000
trusted library allocation
page read and write
2518D047000
heap
page read and write
21920843000
heap
page read and write
22A08C59000
heap
page read and write
AA0000
heap
page read and write
93F9DFB000
stack
page read and write
4A83000
direct allocation
page read and write
2393BD02000
heap
page read and write
AA6000
heap
page read and write
76538FE000
stack
page read and write
C832C7B000
stack
page read and write
21920829000
heap
page read and write
2518D042000
heap
page read and write
1E15D65A000
heap
page read and write
2518D046000
heap
page read and write
48F3000
unkown
page read and write
4BE0000
trusted library allocation
page read and write
AFBE8B000
stack
page read and write
48E5000
unkown
page execute and read and write
307A000
direct allocation
page read and write
2393BC13000
heap
page read and write
21920843000
heap
page read and write
183219C0000
trusted library allocation
page read and write
18321A02000
trusted library allocation
page read and write
2518D062000
heap
page read and write
21D85401000
heap
page read and write
C90000
heap
page read and write
2393BC52000
heap
page read and write
21921002000
heap
page read and write
18320062000
heap
page read and write
319927A000
stack
page read and write
1832002A000
heap
page read and write
10AE000
stack
page read and write
4A8A000
direct allocation
page read and write
9C000
stack
page read and write
4A6D000
direct allocation
page read and write
21920740000
heap
page read and write
21D85710000
trusted library allocation
page read and write
1831FE90000
heap
page read and write
319947C000
stack
page read and write
A9C000
heap
page read and write
ABB000
heap
page read and write
3064000
direct allocation
page read and write
106E000
stack
page read and write
4A41000
direct allocation
page read and write
18320002000
heap
page read and write
A97000
heap
page read and write
4908000
unkown
page read and write
22A08C40000
heap
page read and write
18320057000
heap
page read and write
3073000
direct allocation
page read and write
2518D04C000
heap
page read and write
AFC5FD000
stack
page read and write
106E000
stack
page read and write
21D853F0000
heap
page read and write
4A5F000
direct allocation
page read and write
301B000
direct allocation
page read and write
18320058000
heap
page read and write
48F5000
unkown
page read and write
21921143000
heap
page read and write
C8327FB000
stack
page read and write
1318BCF0000
heap
page read and write
219206E0000
heap
page read and write
21921122000
heap
page read and write
1E076C44000
heap
page read and write
21D862C0000
heap
page readonly
2518D076000
heap
page read and write
2043C7D000
stack
page read and write
2518D032000
heap
page read and write
AFC4FF000
stack
page read and write
2518D05F000
heap
page read and write
5A0000
heap
page read and write
10B0000
trusted library allocation
page read and write
C70000
direct allocation
page execute and read and write
21921122000
heap
page read and write
3343000
heap
page read and write
304F000
direct allocation
page read and write
7FDEB0C000
stack
page read and write
C832E7E000
stack
page read and write
4A2B000
direct allocation
page read and write
1318BE2A000
heap
page read and write
4AD0000
heap
page read and write
21D862D0000
trusted library allocation
page read and write
D737F8C000
stack
page read and write
2393BC00000
heap
page read and write
A7E000
stack
page read and write
D73847E000
stack
page read and write
3240000
heap
page read and write
1E15D600000
heap
page read and write
4500000
unkown
page readonly
4A5F000
direct allocation
page read and write
A0E000
stack
page read and write
1318BD50000
heap
page read and write
1E077402000
heap
page read and write
20437FD000
stack
page read and write
D7382FE000
stack
page read and write
400000
unkown
page readonly
4909000
unkown
page readonly
1E15D702000
heap
page read and write
21921227000
heap
page read and write
2393BC49000
heap
page read and write
1E076D13000
heap
page read and write
21921200000
heap
page read and write
21921213000
heap
page read and write
7F700000
direct allocation
page read and write
2518D039000
heap
page read and write
21920854000
heap
page read and write
2518D078000
heap
page read and write
21920889000
heap
page read and write
1318BDB0000
remote allocation
page read and write
7FDF07F000
stack
page read and write
4A98000
direct allocation
page read and write
4A83000
direct allocation
page read and write
75088FF000
stack
page read and write
AA3000
heap
page read and write
4A0D000
direct allocation
page read and write
7652F7B000
stack
page read and write
1E076CBD000
heap
page read and write
219211B1000
heap
page read and write
25E0000
heap
page read and write
2393BC29000
heap
page read and write
75086F9000
stack
page read and write
2518D052000
heap
page read and write
75085FF000
stack
page read and write
1E076CE2000
heap
page read and write
22A08B20000
heap
page read and write
2518D07D000
heap
page read and write
48F5000
unkown
page read and write
C70000
direct allocation
page execute and read and write
1E077500000
heap
page read and write
41A000
unkown
page execute and read and write
4A48000
direct allocation
page read and write
319937E000
stack
page read and write
18320048000
heap
page read and write
A97000
heap
page read and write
2518CE80000
heap
page read and write
2518D05D000
heap
page read and write
21921154000
heap
page read and write
1E15D688000
heap
page read and write
3340000
heap
page read and write
2518D073000
heap
page read and write
2393BC0B000
heap
page read and write
490B000
unkown
page readonly
83C000
stack
page read and write
87B000
stack
page read and write
D73827E000
stack
page read and write
2192098E000
heap
page read and write
18320000000
heap
page read and write
22A08D13000
heap
page read and write
1E15D63D000
heap
page read and write
4BE0000
heap
page read and write
1318BE36000
heap
page read and write
AA0000
heap
page read and write
A9D000
heap
page read and write
4A58000
direct allocation
page read and write
22A09402000
trusted library allocation
page read and write
C832AFC000
stack
page read and write
4902000
unkown
page read and write
D73877F000
stack
page read and write
2518D04B000
heap
page read and write
18320089000
heap
page read and write
1E076C13000
heap
page read and write
21921223000
heap
page read and write
21921102000
heap
page read and write
1E15D67C000
heap
page read and write
1318BE02000
heap
page read and write
4A66000
direct allocation
page read and write
4A58000
direct allocation
page read and write
1E076C6D000
heap
page read and write
18320100000
heap
page read and write
2393BC32000
heap
page read and write
4A7C000
direct allocation
page read and write
AAA000
heap
page read and write
4902000
unkown
page read and write
18320118000
heap
page read and write
21920825000
heap
page read and write
AFC37C000
stack
page read and write
22A08AB0000
heap
page read and write
18321C00000
trusted library allocation
page read and write
21D85700000
trusted library allocation
page read and write
20433AB000
stack
page read and write
6340000
trusted library allocation
page read and write
76533FD000
stack
page read and write
21920913000
heap
page read and write
18320013000
heap
page read and write
2518D029000
heap
page read and write
21921100000
heap
page read and write
4A91000
direct allocation
page read and write
A4F000
stack
page read and write
219211BF000
heap
page read and write
76534FF000
stack
page read and write
93F9FFF000
stack
page read and write
87B000
stack
page read and write
4A7C000
direct allocation
page read and write
1E076B90000
heap
page read and write
4A8A000
direct allocation
page read and write
2518D049000
heap
page read and write
AE0000
heap
page read and write
A0E000
stack
page read and write
1E15D4E0000
heap
page read and write
21920892000
heap
page read and write
21920790000
trusted library allocation
page read and write
3014000
direct allocation
page read and write
4A98000
direct allocation
page read and write
2393BA60000
heap
page read and write
2518D082000
heap
page read and write
AEA000
heap
page read and write
18320102000
heap
page read and write
183219F0000
remote allocation
page read and write
183219F0000
remote allocation
page read and write
2192083C000
heap
page read and write
4BE4000
heap
page read and write
2043F7C000
stack
page read and write
76531FD000
stack
page read and write
21D85775000
heap
page read and write
AC0000
trusted library allocation
page read and write
21D86060000
trusted library allocation
page read and write
21921230000
heap
page read and write
21D85440000
heap
page read and write
2518D07C000
heap
page read and write
9F5000
heap
page read and write
2192116F000
heap
page read and write
2043A7F000
stack
page read and write
4500000
unkown
page readonly
AA0000
heap
page read and write
1318BE13000
heap
page read and write
2518CE70000
heap
page read and write
5A0000
unkown
page read and write
22A08C13000
heap
page read and write
31997FE000
stack
page read and write
21920770000
trusted library allocation
page read and write
21D862E0000
trusted library allocation
page read and write
183219F0000
remote allocation
page read and write
2393BC3C000
heap
page read and write
306C000
direct allocation
page read and write
10C0000
remote allocation
page read and write
A70000
heap
page read and write
4A91000
direct allocation
page read and write
4BE0000
trusted library allocation
page read and write
C83307E000
stack
page read and write
48F4000
unkown
page write copy
8B0000
trusted library allocation
page read and write
C832A7F000
stack
page read and write
204397F000
stack
page read and write
1E15D713000
heap
page read and write
2FEF000
direct allocation
page read and write
21921230000
heap
page read and write
2518D030000
heap
page read and write
4A24000
direct allocation
page read and write
2518D061000
heap
page read and write
C90000
heap
page read and write
7FDF0F9000
stack
page read and write
There are 498 hidden memdumps, click here to show them.