IOC Report
A290.dll

loading gif

Files

File Path
Type
Category
Malicious
A290.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_4a2b263a88ec6871bb19ce2ee3f04564bd3fea_82810a17_16e0a0aa\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_4a2b263a88ec6871bb19ce2ee3f04564bd3fea_82810a17_16e8a0e8\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_4a2b263a88ec6871bb19ce2ee3f04564bd3fea_82810a17_1a6cb20f\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_86b3cac39a2cad5204e578b2befa7f9972cac_82810a17_1ae0a1c3\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_86b3cac39a2cad5204e578b2befa7f9972cac_82810a17_1afcb29b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8532.tmp.dmp
Mini DuMP crash report, 14 streams, Tue May 30 23:57:58 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8581.tmp.dmp
Mini DuMP crash report, 14 streams, Tue May 30 23:57:58 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER868B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER86AA.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER86EA.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER86FA.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9A80.tmp.dmp
Mini DuMP crash report, 14 streams, Tue May 30 23:58:04 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9BA9.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9C47.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA9D1.tmp.dmp
Mini DuMP crash report, 14 streams, Tue May 30 23:58:08 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAACB.tmp.dmp
Mini DuMP crash report, 14 streams, Tue May 30 23:58:08 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAC34.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERACC1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERACEF.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERADAC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\YWUEZVG8.htm
HTML document, ASCII text, with very long lines (64945)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\t5[1]
ASCII text, with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
dropped
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\A290.dll"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\A290.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\A290.dll,mv_add_i
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\A290.dll",#1
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 652
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5508 -s 660
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\A290.dll,mv_add_q
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\A290.dll,mv_add_stable
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5616 -s 652
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\A290.dll",mv_add_i
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\A290.dll",mv_add_q
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\A290.dll",mv_add_stable
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\A290.dll",next
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\A290.dll",mvutil_license
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6944 -s 652
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\A290.dll",mvutil_configuration
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5860 -s 652
malicious
C:\Windows\SysWOW64\wermgr.exe
C:\Windows\SysWOW64\wermgr.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://188.28.19.84/t5
188.28.19.84
malicious
https://s.yimg.com/ss/rapid-3.53.38.js
unknown
https://s.yimg.com/aaq/vzm/cs_1.4.0.js
unknown
https://s.yimg.com/uu/api/res/1.2/h64YbbKcO2GsKYAy1QMRMw--~B/Zmk9c3RyaW07aD0zODY7cT04MDt3PTQ0MDthcHB
unknown
https://s.yimg.com/cx/pv/perf-vitals_3.1.0.js
unknown
https://s.yimg.com/uu/api/res/1.2/bgsoedXfbB0Gb9NBLPpSgA--~B/Zmk9c3RyaW07aD0zODY7cT04MDt3PTQ0MDthcHB
unknown
https://s.yimg.com/aaq/spotim/
unknown
https://s.yimg.com/uu/api/res/1.2/IOHHaqoGtz8E_nhSi9n_SA--~B/Zmk9c3RyaW07aD0xNDA7cT05MDt3PTE0MDthcHB
unknown
https://s.yimg.com/uu/api/res/1.2/JB3oERIZNZLPfu6X4e9z6A--~B/Zmk9c3RyaW07aD0yNDY7cT04MDt3PTQ0MDthcHB
unknown
https://fp-graviton-home-gateway.media.yahoo.com/
unknown
http://upx.sf.net
unknown
https://openweb.jac.yahoosandbox.com
unknown
https://s.yimg.com/uc/sf/0.1.322/js/safe.min.js
unknown
https://s.yimg.com/uu/api/res/1.2/xRSr.LEimIgdYlvzWwz1eg--~B/Zmk9c3RyaW07aD0xNDA7cT05MDt3PTE0MDthcHB
unknown
https://yahoo.com/
98.137.11.163
https://www.yahoo.com/
87.248.100.215
https://www.ad.com/?utm_source=yahoo-home&utm_medium=referral&utm_campaign=ad-feedback"
unknown
https://5.ras.yahoo.com/adcount%7C2.0%7C5113.1%7C4830441%7C0%7C225%7CAdId=11101911;BnId=2;ct=7654416
unknown
https://www.yahoo.com/px.gif
unknown
https://search.yahoo.com/search?p=
unknown
https://s.yimg.com/uu/api/res/1.2/_CIJXKXQDZkVo9bAyJDDdA--~B/Zmk9c3RyaW07aD0yNDY7cT04MDt3PTQ0MDthcHB
unknown
http://schema.org
unknown
http://www.opensource.org/licenses/mit-license.php
unknown
https://legal.yahoo.com/us/en/yahoo/privacy/adinfo/index.html"
unknown
https://streams.videolan.org/upload/
unknown
https://s.yimg.com/aaq/wf/wf-core-1.63.0.js
unknown
https://sb.scorecardresearch.com/p?c1=2&c2=7241469&c5=2023538075&c7=https%3A%2F%2Fwww.yahoo.com%2F&c
unknown
https://s.yimg.com/uu/api/res/1.2/DgW4vH5M_FUgIVI7P1drOg--~B/Zmk9c3RyaW07aD0yNDY7cT04MDt3PTQ0MDthcHB
unknown
https://s.yimg.com/uu/api/res/1.2/_thhUXx96QwnlqajJOOzag--~B/Zmk9c3RyaW07aD0yNDY7cT04MDt3PTQ0MDthcHB
unknown
https://5.ras.yahoo.com/adcount%7C2.0%7C5113.1%7C4830424%7C0%7C0%7CAdId=-41;BnId=0;ct=76544163;st=99
unknown
https://s.yimg.com/uu/api/res/1.2/M7GzoPQf97leZFwCZRF3Kg--~B/Zmk9c3RyaW07aD0xNDA7cT05MDt3PTE0MDthcHB
unknown
https://s.yimg.com/nn/lib/metro/g/myy/advertisement_0.0.19.js
unknown
https://s.yimg.com/aaq/nel/js/spotIm.custom.SpotIMJAC.modal.9d3270fa67932556c75baaed2c09c955.js
unknown
https://s.yimg.com/uu/api/res/1.2/YcilHawp_AKChrUBidk12w--~B/Zmk9c3RyaW07aD0zODg7cT05NTt3PTcyMDthcHB
unknown
https://yep.video.yahoo.com/oath/js/1/oath-player.js?ypv=8.5.43&lang=en-US
unknown
https://s.yimg.com/aaq/hc/homepage-pwa-defer-1.1.6.js
unknown
https://openweb.jac.yahoosandbox.com/1.5.0/jac.js
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
new-fp-shed.wg1.b.yahoo.com
87.248.100.215
yahoo.com
98.137.11.163
www.yahoo.com
unknown

IPs

IP
Domain
Country
Malicious
2.82.8.80
unknown
Portugal
malicious
70.160.67.203
unknown
United States
malicious
75.143.236.149
unknown
United States
malicious
83.110.223.61
unknown
United Arab Emirates
malicious
86.195.14.72
unknown
France
malicious
84.215.202.8
unknown
Norway
malicious
184.182.66.109
unknown
United States
malicious
92.186.69.229
unknown
France
malicious
174.4.89.3
unknown
Canada
malicious
161.142.103.187
unknown
Malaysia
malicious
114.143.176.236
unknown
India
malicious
14.192.241.76
unknown
Malaysia
malicious
173.88.135.179
unknown
United States
malicious
84.108.200.161
unknown
Israel
malicious
47.34.30.133
unknown
United States
malicious
183.87.163.165
unknown
India
malicious
184.181.75.148
unknown
United States
malicious
124.149.143.189
unknown
Australia
malicious
84.35.26.14
unknown
Netherlands
malicious
73.29.92.128
unknown
United States
malicious
68.203.69.96
unknown
United States
malicious
82.131.141.209
unknown
Hungary
malicious
64.121.161.102
unknown
United States
malicious
178.175.187.254
unknown
Moldova Republic of
malicious
96.56.197.26
unknown
United States
malicious
188.28.19.84
unknown
United Kingdom
malicious
186.64.67.30
unknown
Argentina
malicious
125.99.76.102
unknown
India
malicious
81.101.185.146
unknown
United Kingdom
malicious
59.28.84.65
unknown
Korea Republic of
malicious
105.186.128.181
unknown
South Africa
malicious
76.86.31.59
unknown
United States
malicious
147.147.30.126
unknown
United Kingdom
malicious
96.87.28.170
unknown
United States
malicious
75.109.111.89
unknown
United States
malicious
78.92.133.215
unknown
Hungary
malicious
124.122.47.148
unknown
Thailand
malicious
88.126.94.4
unknown
France
malicious
51.14.29.227
unknown
United Kingdom
malicious
85.57.212.13
unknown
Spain
malicious
47.205.25.170
unknown
United States
malicious
95.45.50.93
unknown
Ireland
malicious
80.12.88.148
unknown
France
malicious
69.133.162.35
unknown
United States
malicious
86.132.236.117
unknown
United Kingdom
malicious
151.62.238.176
unknown
Italy
malicious
70.112.206.5
unknown
United States
malicious
205.237.67.69
unknown
Canada
malicious
102.159.188.125
unknown
Tunisia
malicious
151.65.167.77
unknown
Italy
malicious
76.178.148.107
unknown
United States
malicious
89.36.206.69
unknown
Italy
malicious
69.242.31.249
unknown
United States
malicious
193.253.100.236
unknown
France
malicious
76.16.49.134
unknown
United States
malicious
94.207.104.225
unknown
United Arab Emirates
malicious
201.244.108.183
unknown
Colombia
malicious
103.42.86.42
unknown
India
malicious
78.18.105.11
unknown
Ireland
malicious
80.6.50.34
unknown
United Kingdom
malicious
103.144.201.56
unknown
unknown
malicious
27.0.48.233
unknown
India
malicious
70.28.50.223
unknown
Canada
malicious
98.145.23.67
unknown
United States
malicious
47.149.134.231
unknown
United States
malicious
82.125.44.236
unknown
France
malicious
81.229.117.95
unknown
Sweden
malicious
89.129.109.27
unknown
Spain
malicious
122.186.210.254
unknown
India
malicious
79.77.142.22
unknown
United Kingdom
malicious
90.78.147.141
unknown
France
malicious
122.184.143.86
unknown
India
malicious
186.75.95.6
unknown
Panama
malicious
50.68.186.195
unknown
Canada
malicious
12.172.173.82
unknown
United States
malicious
213.64.33.61
unknown
Sweden
malicious
86.97.55.89
unknown
United Arab Emirates
malicious
79.168.224.165
unknown
Portugal
malicious
176.142.207.63
unknown
France
malicious
92.154.17.149
unknown
France
malicious
174.58.146.57
unknown
United States
malicious
78.160.146.127
unknown
Turkey
malicious
58.186.75.42
unknown
Viet Nam
malicious
223.166.13.95
unknown
China
malicious
65.95.141.84
unknown
Canada
malicious
50.68.204.71
unknown
Canada
malicious
71.38.155.217
unknown
United States
malicious
104.35.24.154
unknown
United States
malicious
220.240.164.182
unknown
Australia
malicious
103.123.223.133
unknown
India
malicious
24.198.114.130
unknown
United States
malicious
2.36.64.159
unknown
Italy
malicious
198.2.51.242
unknown
United States
malicious
92.9.45.20
unknown
United Kingdom
malicious
113.11.92.30
unknown
Bangladesh
malicious
69.119.123.159
unknown
United States
malicious
69.123.4.221
unknown
United States
malicious
172.115.17.50
unknown
United States
malicious
98.137.11.163
yahoo.com
United States
87.248.100.215
new-fp-shed.wg1.b.yahoo.com
United Kingdom
There are 90 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018C0094A94BB2A
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProgramId
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
FileId
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LowerCaseLongPath
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LongPathHash
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Name
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Publisher
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Version
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinFileVersion
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinaryType
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProductName
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProductVersion
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LinkDate
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinProductVersion
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Size
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Language
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
IsPeFile
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018C0094A94BB2A
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\Ccaxunpk
bc6cfb72
HKEY_CURRENT_USER\Software\Microsoft\Ccaxunpk
89f32b3c
HKEY_CURRENT_USER\Software\Microsoft\Ccaxunpk
8bb20b40
HKEY_CURRENT_USER\Software\Microsoft\Ccaxunpk
330e6c25
HKEY_CURRENT_USER\Software\Microsoft\Ccaxunpk
4e0623af
HKEY_CURRENT_USER\Software\Microsoft\Ccaxunpk
f6ba44ca
HKEY_CURRENT_USER\Software\Microsoft\Ccaxunpk
314f4c59
HKEY_CURRENT_USER\Software\Microsoft\Ccaxunpk
c3259484
HKEY_CURRENT_USER\Software\Microsoft\Ccaxunpk
bc6cfb72
HKEY_CURRENT_USER\Software\Microsoft\Ccaxunpk
bc6cfb72
HKEY_CURRENT_USER\Software\Microsoft\Ccaxunpk
bc6cfb72
There are 33 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5DA000
heap
page read and write
malicious
DC0000
heap
page read and write
malicious
101E3000
unkown
page write copy
10C0000
heap
page readonly
E1D1E7C000
stack
page read and write
539B000
heap
page read and write
5330000
heap
page read and write
710000
heap
page read and write
52FC000
heap
page read and write
536D000
heap
page read and write
7013000
heap
page read and write
DBC000
stack
page read and write
539D000
heap
page read and write
52FC000
heap
page read and write
101FE000
unkown
page readonly
1CB000
stack
page read and write
5330000
heap
page read and write
538F000
heap
page read and write
5330000
heap
page read and write
1F2C6800000
unkown
page read and write
AF0000
heap
page read and write
1F2C6887000
heap
page read and write
1F8EDFA9000
heap
page read and write
E61000
heap
page read and write
1F2C6847000
heap
page read and write
5330000
heap
page read and write
F0F000
stack
page read and write
52F8000
heap
page read and write
16CE000
stack
page read and write
AF2000
direct allocation
page readonly
574000
heap
page read and write
52F8000
heap
page read and write
6B09000
heap
page read and write
574000
heap
page read and write
536C000
heap
page read and write
122E000
stack
page read and write
1F2C6885000
heap
page read and write
5330000
heap
page read and write
101DF000
unkown
page read and write
3370000
heap
page readonly
5330000
heap
page read and write
ACC000
stack
page read and write
AD0000
direct allocation
page read and write
6244000
heap
page read and write
E3F000
heap
page read and write
101DF000
unkown
page read and write
1290000
heap
page read and write
538F000
heap
page read and write
A0E000
stack
page read and write
3D0000
heap
page read and write
103F000
stack
page read and write
101E0000
unkown
page write copy
5330000
heap
page read and write
1F2C6D13000
heap
page read and write
E5C000
stack
page read and write
E1D1BF9000
stack
page read and write
5330000
heap
page read and write
F00000
heap
page read and write
C7F000
stack
page read and write
52F8000
heap
page read and write
52FC000
heap
page read and write
7309000
heap
page read and write
433C000
heap
page read and write
67B000
stack
page read and write
AEA000
direct allocation
page readonly
10AF000
stack
page read and write
1F2C67B0000
heap
page read and write
FFC000
stack
page read and write
1F2C6C00000
heap
page read and write
6244000
heap
page read and write
539B000
heap
page read and write
1090000
heap
page read and write
1F8EDB60000
trusted library allocation
page read and write
434C000
heap
page read and write
51E0000
trusted library allocation
page read and write
F20000
heap
page read and write
1F8EDC48000
heap
page read and write
1F2C6D02000
heap
page read and write
91C000
stack
page read and write
820000
heap
page read and write
101E0000
unkown
page write copy
1F2C6923000
heap
page read and write
10000000
unkown
page readonly
5330000
heap
page read and write
1F2C6D17000
heap
page read and write
10000000
unkown
page readonly
538F000
heap
page read and write
1F8EEC60000
trusted library allocation
page read and write
342A000
heap
page read and write
3400000
heap
page read and write
D50000
heap
page read and write
5330000
heap
page read and write
6B0B000
heap
page read and write
4270000
trusted library allocation
page read and write
100AE000
unkown
page readonly
10F0000
heap
page read and write
5330000
heap
page read and write
127B000
stack
page read and write
5330000
heap
page read and write
FC0000
heap
page read and write
52FC000
heap
page read and write
101DA000
unkown
page readonly
1170000
heap
page read and write
F90000
heap
page read and write
3310000
heap
page read and write
DE3000
heap
page read and write
500000
heap
page read and write
4270000
trusted library allocation
page read and write
101E3000
unkown
page write copy
9C0000
heap
page read and write
5330000
heap
page read and write
C18000
heap
page read and write
1010000
heap
page readonly
B8457F9000
stack
page read and write
5330000
heap
page read and write
1F2C6900000
trusted library allocation
page read and write
101E3000
unkown
page write copy
100AD000
unkown
page read and write
5330000
heap
page read and write
8AF000
stack
page read and write
5330000
heap
page read and write
1F8EDBC0000
heap
page read and write
5330000
heap
page read and write
B8453ED000
stack
page read and write
1F2C6828000
heap
page read and write
800000
heap
page readonly
5330000
heap
page read and write
3420000
heap
page read and write
5330000
heap
page read and write
1F2C6D02000
heap
page read and write
C3E000
stack
page read and write
E61000
heap
page read and write
539D000
heap
page read and write
5330000
heap
page read and write
1F2C6821000
unkown
page read and write
52EC000
heap
page read and write
5C60000
heap
page read and write
A60000
heap
page read and write
536D000
heap
page read and write
5330000
heap
page read and write
5330000
heap
page read and write
4270000
trusted library allocation
page read and write
5330000
heap
page read and write
4314000
heap
page read and write
1F8EE990000
trusted library allocation
page read and write
BEE000
stack
page read and write
54B000
stack
page read and write
AC0000
direct allocation
page execute read
6220000
heap
page read and write
5330000
heap
page read and write
5330000
heap
page read and write
50E1000
heap
page read and write
5330000
heap
page read and write
100AE000
unkown
page readonly
ECA000
heap
page read and write
100AD000
unkown
page read and write
54CC000
heap
page read and write
BEF000
stack
page read and write
5330000
heap
page read and write
AEF000
direct allocation
page read and write
10D0000
heap
page read and write
101FE000
unkown
page readonly
6220000
heap
page read and write
5CF1000
heap
page read and write
B70000
heap
page read and write
E1D1A7C000
stack
page read and write
100AD000
unkown
page read and write
4270000
trusted library allocation
page read and write
5330000
heap
page read and write
1F2C684C000
heap
page read and write
101FE000
unkown
page readonly
6604000
heap
page read and write
1F8EDC47000
heap
page read and write
6B15000
heap
page read and write
436F000
heap
page read and write
52F0000
heap
page read and write
4DA0000
heap
page read and write
33C0000
heap
page read and write
120000
heap
page read and write
52F8000
heap
page read and write
5330000
heap
page read and write
5330000
heap
page read and write
574000
heap
page read and write
10000000
unkown
page readonly
5B0000
heap
page read and write
5330000
heap
page read and write
940000
heap
page read and write
48A0000
heap
page read and write
539B000
heap
page read and write
1F8EDB50000
heap
page read and write
14D0000
heap
page read and write
4379000
heap
page read and write
FFE000
stack
page read and write
E1D1C79000
stack
page read and write
6604000
heap
page read and write
5330000
heap
page read and write
101E3000
unkown
page write copy
536D000
heap
page read and write
101DF000
unkown
page read and write
101FE000
unkown
page readonly
14BF000
stack
page read and write
101DA000
unkown
page readonly
5330000
heap
page read and write
101FE000
unkown
page readonly
101DA000
unkown
page readonly
1F8EDC4F000
heap
page read and write
7B0F000
heap
page read and write
B40000
heap
page read and write
AB0000
heap
page readonly
539D000
heap
page read and write
6244000
heap
page read and write
5330000
heap
page read and write
660F000
heap
page read and write
1F8EE920000
trusted library allocation
page read and write
14E6000
heap
page read and write
117A000
heap
page read and write
E1D1CFE000
stack
page read and write
AD1000
direct allocation
page execute read
32C0000
heap
page read and write
116C000
stack
page read and write
6244000
heap
page read and write
436F000
heap
page read and write
10001000
unkown
page execute read
1F8EEBF0000
heap
page readonly
14EC000
heap
page read and write
12A0000
heap
page read and write
6607000
heap
page read and write
539D000
heap
page read and write
A20000
heap
page read and write
5330000
heap
page read and write
10F0000
heap
page read and write
6244000
heap
page read and write
4270000
trusted library allocation
page read and write
7B0000
heap
page read and write
1F8EEC10000
trusted library allocation
page read and write
10000000
unkown
page readonly
5330000
heap
page read and write
89F000
stack
page read and write
54C4000
heap
page read and write
CC0000
heap
page read and write
5330000
heap
page read and write
6244000
heap
page read and write
5330000
heap
page read and write
52FC000
heap
page read and write
5330000
heap
page read and write
C90000
heap
page readonly
52FC000
heap
page read and write
536D000
heap
page read and write
101FE000
unkown
page readonly
4A80000
heap
page read and write
1F8EDC09000
heap
page read and write
C60000
heap
page read and write
52F8000
heap
page read and write
52EC000
heap
page read and write
1F2C684B000
heap
page read and write
52EC000
heap
page read and write
101E0000
unkown
page write copy
AC0000
heap
page read and write
101DF000
unkown
page read and write
1F8EDFA5000
heap
page read and write
5330000
heap
page read and write
5BE000
stack
page read and write
101E0000
unkown
page write copy
539D000
heap
page read and write
539D000
heap
page read and write
1F8EEC00000
trusted library allocation
page read and write
1F8EEBE0000
trusted library allocation
page read and write
574000
heap
page read and write
52EC000
heap
page read and write
52EC000
heap
page read and write
5330000
heap
page read and write
8D0000
heap
page read and write
1F2C6D13000
heap
page read and write
3360000
heap
page read and write
36C0000
heap
page read and write
574000
heap
page read and write
100AE000
unkown
page readonly
8B0000
heap
page read and write
10001000
unkown
page execute read
52EC000
heap
page read and write
86E000
stack
page read and write
4270000
trusted library allocation
page read and write
6244000
heap
page read and write
4270000
trusted library allocation
page read and write
50F1000
heap
page read and write
B0B000
stack
page read and write
E1D1D79000
stack
page read and write
14F1000
heap
page read and write
5330000
heap
page read and write
4D5F000
stack
page read and write
1000000
heap
page read and write
10001000
unkown
page execute read
1F2C6D00000
heap
page read and write
F40000
heap
page read and write
BE0000
heap
page read and write
1000000
heap
page read and write
F10000
heap
page readonly
1F8EDFA0000
heap
page read and write
5330000
heap
page read and write
1020000
heap
page read and write
4F80000
heap
page read and write
5330000
heap
page read and write
6220000
heap
page read and write
6220000
heap
page read and write
106E000
stack
page read and write
5330000
heap
page read and write
10001000
unkown
page execute read
4321000
heap
page read and write
5330000
heap
page read and write
100AE000
unkown
page readonly
1120000
heap
page read and write
14DB000
heap
page read and write
1F8EDFB0000
trusted library allocation
page read and write
574000
heap
page read and write
50C000
stack
page read and write
B00000
trusted library allocation
page read and write
437C000
heap
page read and write
101E0000
unkown
page write copy
3030000
heap
page read and write
1F8EDC4E000
heap
page read and write
437C000
heap
page read and write
101DF000
unkown
page read and write
539B000
heap
page read and write
1F2C6750000
trusted library allocation
page read and write
539D000
heap
page read and write
5330000
heap
page read and write
5330000
heap
page read and write
52FC000
heap
page read and write
A4F000
stack
page read and write
5304000
heap
page read and write
100AD000
unkown
page read and write
8A0000
heap
page read and write
A60000
heap
page readonly
6220000
heap
page read and write
63C000
stack
page read and write
101E3000
unkown
page write copy
E60000
heap
page read and write
5330000
heap
page read and write
1F8EE9A0000
trusted library allocation
page read and write
5330000
heap
page read and write
100AE000
unkown
page readonly
100AD000
unkown
page read and write
10001000
unkown
page execute read
1F2C6C02000
heap
page read and write
E9B000
stack
page read and write
7BB000
stack
page read and write
437C000
heap
page read and write
1F2C6813000
unkown
page read and write
C6A000
heap
page read and write
6B0B000
heap
page read and write
4A0000
heap
page read and write
126F000
stack
page read and write
1F8EDC00000
heap
page read and write
1770000
heap
page read and write
1F2C684B000
heap
page read and write
10FA000
heap
page read and write
1F8EDC71000
heap
page read and write
1F8EDBE0000
heap
page read and write
33CF000
stack
page read and write
1060000
heap
page read and write
52F8000
heap
page read and write
1F8EDC4E000
heap
page read and write
1F2C6915000
trusted library allocation
page read and write
5330000
heap
page read and write
5330000
heap
page read and write
106C000
stack
page read and write
660E000
heap
page read and write
6B17000
heap
page read and write
3380000
heap
page read and write
574000
heap
page read and write
5330000
heap
page read and write
6220000
heap
page read and write
660D000
heap
page read and write
52FC000
heap
page read and write
5330000
heap
page read and write
5330000
heap
page read and write
6220000
heap
page read and write
1F2C6887000
heap
page read and write
33F0000
heap
page readonly
13B0000
heap
page read and write
8DA000
heap
page read and write
8C0000
heap
page read and write
5330000
heap
page read and write
539D000
heap
page read and write
52EC000
heap
page read and write
123B000
stack
page read and write
FA0000
heap
page read and write
101DA000
unkown
page readonly
5330000
heap
page read and write
101DA000
unkown
page readonly
10000000
unkown
page readonly
6244000
heap
page read and write
18C000
stack
page read and write
4D20000
heap
page read and write
42F1000
heap
page read and write
E3F000
heap
page read and write
5C0000
heap
page read and write
114A000
heap
page read and write
B845AF9000
stack
page read and write
4D1E000
stack
page read and write
6220000
heap
page read and write
431F000
heap
page read and write
550000
heap
page readonly
10000000
unkown
page readonly
1F2C6C13000
heap
page read and write
1140000
heap
page read and write
1F8EE930000
trusted library allocation
page read and write
5330000
heap
page read and write
5330000
heap
page read and write
5330000
heap
page read and write
6B1B000
heap
page read and write
101E3000
unkown
page write copy
4270000
trusted library allocation
page read and write
4348000
heap
page read and write
5330000
heap
page read and write
1F2C6740000
heap
page read and write
A9E000
stack
page read and write
4270000
trusted library allocation
page read and write
52F8000
heap
page read and write
100AE000
unkown
page readonly
6224000
heap
page read and write
5330000
heap
page read and write
5330000
heap
page read and write
132E000
stack
page read and write
5330000
heap
page read and write
59B0000
heap
page read and write
100AD000
unkown
page read and write
1F2C684B000
heap
page read and write
5D0000
heap
page read and write
101DA000
unkown
page readonly
538F000
heap
page read and write
12EE000
stack
page read and write
52F8000
heap
page read and write
548C000
heap
page read and write
DFB000
stack
page read and write
1F2C6902000
trusted library allocation
page read and write
1F2C6D02000
heap
page read and write
101E0000
unkown
page write copy
574000
heap
page read and write
539D000
heap
page read and write
5330000
heap
page read and write
57E5000
heap
page read and write
334E000
stack
page read and write
10001000
unkown
page execute read
101DF000
unkown
page read and write
5330000
heap
page read and write
340A000
heap
page read and write
77C000
stack
page read and write
437C000
heap
page read and write
95B000
stack
page read and write
570000
heap
page read and write
AD0000
heap
page read and write
3400000
heap
page read and write
5330000
heap
page read and write
94A000
heap
page read and write
52EC000
heap
page read and write
123C000
stack
page read and write
52FC000
heap
page read and write
EC0000
heap
page read and write
1110000
heap
page read and write
There are 450 hidden memdumps, click here to show them.