IOC Report
batteryacid.dat.dll

loading gif

Files

File Path
Type
Category
Malicious
batteryacid.dat.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_1771c62af96114fb83baec5ef424ae1819cb3650_82810a17_00d61356\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_1771c62af96114fb83baec5ef424ae1819cb3650_82810a17_1c6e13d3\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_26a6cc57e4ced2c19f09ae278ade2876040a245_82810a17_1c1a1441\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_7ec94696d4f5167a22d8d01ba83c94e0c28d4894_82810a17_1c121402\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1A4.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1D.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Jun 7 06:40:11 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1E4.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER212.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER270.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER34A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3A9.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5B.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Jun 7 06:40:11 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF3D8.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Jun 7 06:40:07 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF56F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF59F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFFEE.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Jun 7 06:40:11 2023, 0x1205a4 type
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\5NRH02A3.htm
HTML document, Unicode text, UTF-8 text, with very long lines (26606)
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
dropped
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\batteryacid.dat.dll"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\batteryacid.dat.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\batteryacid.dat.dll,l_cmsComputeInterpParams@24
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\batteryacid.dat.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\batteryacid.dat.dll,l_cmsFloat2Half@4
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\batteryacid.dat.dll,l_cmsFreeInterpParams@4
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 652
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\batteryacid.dat.dll",l_cmsComputeInterpParams@24
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\batteryacid.dat.dll",l_cmsFloat2Half@4
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\batteryacid.dat.dll",l_cmsFreeInterpParams@4
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\batteryacid.dat.dll",next
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\batteryacid.dat.dll",lmsstrcasecmp
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\batteryacid.dat.dll",lmsfilelength
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5692 -s 652
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 652
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 652
malicious
C:\Windows\SysWOW64\wermgr.exe
C:\Windows\SysWOW64\wermgr.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://home.treasury.gov/footer/no-fear-act
unknown
https://www.linkedin.com/company/irs
unknown
https://s2.go-mpulse.net/boomerang/
unknown
https://sa.www4.irs.gov/irfof/lang/en/irfofgetstatus.jsp
unknown
https://www.twitter.com/IRSnews
unknown
https://www.irs.gov/ht
unknown
https://www.usaspending.gov
unknown
http://upx.sf.net
unknown
https://twitter.com/IRSnews
unknown
https://www.irs.gov/ru
unknown
https://www.irs.gov/pub/image/logo_small.jpg
unknown
https://www.youtube.com/embed/p3mmROYjyYM?autoplay=0&start=0&rel=0
unknown
https://www.youtube.com/user/irsvideos
unknown
https://s.go-mpulse.net/boomerang/
unknown
https://www.irs.gov/zh-hans
unknown
https://www.treasury.gov/tigta/
unknown
https://jobs.irs.gov/
unknown
https://www.irs.gov/zh-hant
unknown
https://www.irs.gov/es
unknown
https://www.treasury.gov/
unknown
https://static.addtoany.com/menu/page.js
unknown
https://www.irs.gov/
unknown
https://www.irs.gov/vi
unknown
https://www.instagram.com/irsnews
unknown
https://www.irs.gov
unknown
https://irs.gov/
152.216.7.110
https://www.irs.gov/ko
unknown
https://www.drupal.org)
unknown
https://www.usa.gov/
unknown
There are 19 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
irs.gov
152.216.7.110
www.irs.gov
unknown

IPs

IP
Domain
Country
Malicious
2.82.8.80
unknown
Portugal
malicious
92.98.55.221
unknown
United Arab Emirates
malicious
70.160.67.203
unknown
United States
malicious
86.208.35.220
unknown
France
malicious
86.195.14.72
unknown
France
malicious
82.36.36.76
unknown
United Kingdom
malicious
184.182.66.109
unknown
United States
malicious
125.99.69.178
unknown
India
malicious
74.14.39.7
unknown
Canada
malicious
174.4.89.3
unknown
Canada
malicious
121.121.108.120
unknown
Malaysia
malicious
116.74.164.17
unknown
India
malicious
213.64.33.92
unknown
Sweden
malicious
114.143.176.236
unknown
India
malicious
24.234.220.88
unknown
United States
malicious
123.3.240.16
unknown
Australia
malicious
78.130.215.67
unknown
Bulgaria
malicious
176.133.4.230
unknown
France
malicious
72.205.104.134
unknown
United States
malicious
217.165.233.122
unknown
United Arab Emirates
malicious
183.87.163.165
unknown
India
malicious
190.75.72.44
unknown
Venezuela
malicious
70.49.205.198
unknown
Canada
malicious
184.181.75.148
unknown
United States
malicious
37.14.229.220
unknown
Spain
malicious
41.227.190.59
unknown
Tunisia
malicious
100.4.163.158
unknown
United States
malicious
103.141.50.43
unknown
India
malicious
165.120.169.171
unknown
United States
malicious
82.131.141.209
unknown
Hungary
malicious
64.121.161.102
unknown
United States
malicious
89.115.200.234
unknown
Portugal
malicious
31.53.29.216
unknown
United Kingdom
malicious
178.175.187.254
unknown
Moldova Republic of
malicious
188.28.19.84
unknown
United Kingdom
malicious
103.87.128.228
unknown
India
malicious
94.59.123.30
unknown
United Arab Emirates
malicious
37.189.89.196
unknown
Portugal
malicious
124.246.122.199
unknown
Singapore
malicious
59.28.84.65
unknown
Korea Republic of
malicious
147.147.30.126
unknown
United Kingdom
malicious
75.109.111.89
unknown
United States
malicious
88.126.94.4
unknown
France
malicious
85.57.212.13
unknown
Spain
malicious
1.221.179.74
unknown
Korea Republic of
malicious
66.241.183.99
unknown
United States
malicious
47.205.25.170
unknown
United States
malicious
95.45.50.93
unknown
Ireland
malicious
81.111.108.123
unknown
United Kingdom
malicious
103.144.201.48
unknown
unknown
malicious
151.62.238.176
unknown
Italy
malicious
92.20.204.198
unknown
United Kingdom
malicious
201.143.215.69
unknown
Mexico
malicious
193.80.73.200
unknown
Austria
malicious
192.143.255.159
unknown
South Africa
malicious
92.239.81.124
unknown
United Kingdom
malicious
41.186.88.38
unknown
Rwanda
malicious
193.253.100.236
unknown
France
malicious
105.184.209.117
unknown
South Africa
malicious
201.244.108.183
unknown
Colombia
malicious
103.42.86.42
unknown
India
malicious
125.63.121.38
unknown
India
malicious
68.227.249.138
unknown
United States
malicious
182.75.189.42
unknown
India
malicious
105.102.10.220
unknown
Algeria
malicious
116.120.145.170
unknown
Korea Republic of
malicious
103.139.242.6
unknown
India
malicious
27.0.48.233
unknown
India
malicious
70.28.50.223
unknown
Canada
malicious
81.229.117.95
unknown
Sweden
malicious
122.186.210.254
unknown
India
malicious
78.159.146.65
unknown
Italy
malicious
92.184.102.115
unknown
France
malicious
79.77.142.22
unknown
United Kingdom
malicious
93.187.148.45
unknown
United Kingdom
malicious
122.184.143.86
unknown
India
malicious
50.68.186.195
unknown
Canada
malicious
45.62.70.33
unknown
Canada
malicious
83.249.198.100
unknown
Sweden
malicious
12.172.173.82
unknown
United States
malicious
79.168.224.165
unknown
Portugal
malicious
199.27.66.213
unknown
United States
malicious
176.142.207.63
unknown
France
malicious
86.173.2.12
unknown
United Kingdom
malicious
74.12.146.221
unknown
Canada
malicious
90.29.86.138
unknown
France
malicious
197.2.173.77
unknown
Tunisia
malicious
174.58.146.57
unknown
United States
malicious
59.88.174.146
unknown
India
malicious
223.166.13.95
unknown
China
malicious
65.95.141.84
unknown
Canada
malicious
49.175.72.188
unknown
Korea Republic of
malicious
75.98.154.19
unknown
United States
malicious
213.91.235.146
unknown
Bulgaria
malicious
77.126.99.230
unknown
Israel
malicious
103.123.223.133
unknown
India
malicious
84.216.198.201
unknown
Sweden
malicious
92.9.45.20
unknown
United Kingdom
malicious
94.207.125.252
unknown
United Arab Emirates
malicious
73.207.160.219
unknown
United States
malicious
There are 90 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
\REGISTRY\A\{f09b9ab7-f5d4-6fd5-310d-b8561f8cd72e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProgramId
\REGISTRY\A\{f09b9ab7-f5d4-6fd5-310d-b8561f8cd72e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
FileId
\REGISTRY\A\{f09b9ab7-f5d4-6fd5-310d-b8561f8cd72e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LowerCaseLongPath
\REGISTRY\A\{f09b9ab7-f5d4-6fd5-310d-b8561f8cd72e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LongPathHash
\REGISTRY\A\{f09b9ab7-f5d4-6fd5-310d-b8561f8cd72e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Name
\REGISTRY\A\{f09b9ab7-f5d4-6fd5-310d-b8561f8cd72e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Publisher
\REGISTRY\A\{f09b9ab7-f5d4-6fd5-310d-b8561f8cd72e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Version
\REGISTRY\A\{f09b9ab7-f5d4-6fd5-310d-b8561f8cd72e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinFileVersion
\REGISTRY\A\{f09b9ab7-f5d4-6fd5-310d-b8561f8cd72e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinaryType
\REGISTRY\A\{f09b9ab7-f5d4-6fd5-310d-b8561f8cd72e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProductName
\REGISTRY\A\{f09b9ab7-f5d4-6fd5-310d-b8561f8cd72e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProductVersion
\REGISTRY\A\{f09b9ab7-f5d4-6fd5-310d-b8561f8cd72e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LinkDate
\REGISTRY\A\{f09b9ab7-f5d4-6fd5-310d-b8561f8cd72e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinProductVersion
\REGISTRY\A\{f09b9ab7-f5d4-6fd5-310d-b8561f8cd72e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Size
\REGISTRY\A\{f09b9ab7-f5d4-6fd5-310d-b8561f8cd72e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Language
\REGISTRY\A\{f09b9ab7-f5d4-6fd5-310d-b8561f8cd72e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
IsPeFile
\REGISTRY\A\{f09b9ab7-f5d4-6fd5-310d-b8561f8cd72e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018C0095C03A1A5
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018C0095C03A1A5
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018C0095C03A1A5
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018C0095C03A1A5
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\Xgeyzuofgy
73499096
HKEY_CURRENT_USER\Software\Microsoft\Xgeyzuofgy
46d640d8
HKEY_CURRENT_USER\Software\Microsoft\Xgeyzuofgy
449760a4
HKEY_CURRENT_USER\Software\Microsoft\Xgeyzuofgy
fc2b07c1
HKEY_CURRENT_USER\Software\Microsoft\Xgeyzuofgy
8123484b
HKEY_CURRENT_USER\Software\Microsoft\Xgeyzuofgy
399f2f2e
HKEY_CURRENT_USER\Software\Microsoft\Xgeyzuofgy
fe6a27bd
HKEY_CURRENT_USER\Software\Microsoft\Xgeyzuofgy
c00ff60
HKEY_CURRENT_USER\Software\Microsoft\Xgeyzuofgy
73499096
HKEY_CURRENT_USER\Software\Microsoft\Xgeyzuofgy
73499096
HKEY_CURRENT_USER\Software\Microsoft\Xgeyzuofgy
73499096
HKEY_CURRENT_USER\Software\Microsoft\Xgeyzuofgy
73499096
There are 37 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4740000
heap
page read and write
malicious
96A000
heap
page read and write
malicious
3320000
heap
page read and write
29375FA0000
heap
page readonly
312A000
heap
page read and write
293751A6000
heap
page read and write
6D43000
heap
page read and write
BC0000
heap
page read and write
6D51000
heap
page read and write
1005D000
unkown
page readonly
65ED000
heap
page read and write
7027000
heap
page read and write
6D4F000
heap
page read and write
8EA000
heap
page read and write
65FC000
heap
page read and write
874000
heap
page read and write
750000
heap
page read and write
DB88CFE000
stack
page read and write
3290000
trusted library allocation
page read and write
33F0000
heap
page read and write
5C60000
heap
page read and write
5BC0000
trusted library allocation
page read and write
1DC3D03A000
unkown
page read and write
BE0000
heap
page read and write
6306000
heap
page read and write
6D43000
heap
page read and write
3060000
heap
page read and write
7A3F000
heap
page read and write
320A000
heap
page read and write
6D31000
heap
page read and write
73C6779000
stack
page read and write
1040000
trusted library allocation
page read and write
A70000
heap
page read and write
5C52000
heap
page read and write
3290000
trusted library allocation
page read and write
1005A000
unkown
page read and write
60EE000
heap
page read and write
6D51000
heap
page read and write
3290000
trusted library allocation
page read and write
AD0000
heap
page read and write
45BF000
stack
page read and write
1005D000
unkown
page readonly
6D4F000
heap
page read and write
4500000
trusted library allocation
page read and write
1005A000
unkown
page read and write
10001000
unkown
page execute read
1DC3D07A000
unkown
page read and write
47BF000
heap
page read and write
3290000
trusted library allocation
page read and write
2E70000
heap
page read and write
6D31000
heap
page read and write
823F000
heap
page read and write
BFF000
stack
page read and write
B0F000
stack
page read and write
6D31000
heap
page read and write
3290000
trusted library allocation
page read and write
1DC3D200000
heap
page read and write
1005D000
unkown
page readonly
3290000
trusted library allocation
page read and write
6D31000
heap
page read and write
3050000
heap
page read and write
7D25000
heap
page read and write
6D50000
heap
page read and write
47BF000
heap
page read and write
6D51000
heap
page read and write
874000
heap
page read and write
4A6E000
stack
page read and write
710000
heap
page read and write
2C70000
heap
page read and write
29375460000
trusted library allocation
page read and write
BCF000
direct allocation
page read and write
1DC3D029000
heap
page read and write
57B000
stack
page read and write
6D21000
heap
page read and write
43F1000
heap
page read and write
30C0000
heap
page read and write
2DC0000
heap
page read and write
6D51000
heap
page read and write
2E30000
heap
page read and write
6D50000
heap
page read and write
6D50000
heap
page read and write
5C61000
heap
page read and write
6D43000
heap
page read and write
29375459000
heap
page read and write
C00000
heap
page read and write
29375FB0000
trusted library allocation
page read and write
BD2000
direct allocation
page readonly
753F000
heap
page read and write
61A0000
heap
page read and write
1DC3CF20000
heap
page read and write
874000
heap
page read and write
702A000
heap
page read and write
3290000
trusted library allocation
page read and write
780000
heap
page read and write
874000
heap
page read and write
3290000
trusted library allocation
page read and write
4AAF000
stack
page read and write
6D4F000
heap
page read and write
63B2000
heap
page read and write
3290000
trusted library allocation
page read and write
1DC3D031000
heap
page read and write
7521000
heap
page read and write
6D50000
heap
page read and write
1030000
heap
page read and write
3290000
trusted library allocation
page read and write
45F1000
heap
page read and write
5E0000
heap
page read and write
330E000
stack
page read and write
10055000
unkown
page write copy
8236000
heap
page read and write
7BC000
stack
page read and write
2DAE000
stack
page read and write
874000
heap
page read and write
6D51000
heap
page read and write
457E000
stack
page read and write
10055000
unkown
page write copy
6BC000
stack
page read and write
3290000
trusted library allocation
page read and write
6D21000
heap
page read and write
BA0000
heap
page read and write
BCA000
direct allocation
page readonly
6D50000
heap
page read and write
2CD0000
heap
page read and write
5C41000
heap
page read and write
293751EC000
heap
page read and write
2F20000
heap
page read and write
6D51000
heap
page read and write
7C0000
heap
page read and write
10055000
unkown
page write copy
DB88A7B000
stack
page read and write
1DC3D08B000
heap
page read and write
6D4F000
heap
page read and write
B30000
heap
page read and write
4790000
heap
page read and write
1DC3D300000
heap
page read and write
2C8E000
stack
page read and write
6D50000
heap
page read and write
3150000
heap
page read and write
3290000
trusted library allocation
page read and write
293751E4000
heap
page read and write
10000000
unkown
page readonly
73C627D000
stack
page read and write
1DC3D000000
unkown
page read and write
D9B000
heap
page read and write
6D4F000
heap
page read and write
3290000
trusted library allocation
page read and write
1DC3D07A000
heap
page read and write
10054000
unkown
page read and write
6D50000
heap
page read and write
6FB000
stack
page read and write
5BC0000
trusted library allocation
page read and write
DB88BFB000
stack
page read and write
83E000
stack
page read and write
2C90000
heap
page read and write
10001000
unkown
page execute read
3290000
trusted library allocation
page read and write
960000
heap
page read and write
29375FC0000
trusted library allocation
page read and write
1005A000
unkown
page read and write
874000
heap
page read and write
6D51000
heap
page read and write
4830000
heap
page read and write
C00000
heap
page read and write
3540000
heap
page read and write
33B0000
heap
page read and write
1005A000
unkown
page read and write
2D80000
heap
page read and write
6D50000
heap
page read and write
10054000
unkown
page read and write
5C61000
heap
page read and write
10001000
unkown
page execute read
4A6F000
stack
page read and write
760000
heap
page read and write
10000000
unkown
page readonly
2DEF000
stack
page read and write
5C57000
heap
page read and write
B3C000
stack
page read and write
33BA000
heap
page read and write
3290000
trusted library allocation
page read and write
6D50000
heap
page read and write
6D50000
heap
page read and write
8C0000
heap
page read and write
10001000
unkown
page execute read
6D50000
heap
page read and write
6D43000
heap
page read and write
5BC0000
trusted library allocation
page read and write
874000
heap
page read and write
1DC3D123000
heap
page read and write
3200000
heap
page read and write
73C677E000
stack
page read and write
45F1000
heap
page read and write
10054000
unkown
page read and write
3340000
heap
page read and write
10000000
unkown
page readonly
6D4F000
heap
page read and write
5C41000
heap
page read and write
3290000
trusted library allocation
page read and write
319F000
stack
page read and write
1DC3D02E000
heap
page read and write
D90000
heap
page read and write
10043000
unkown
page readonly
6D31000
heap
page read and write
1005D000
unkown
page readonly
BF0000
heap
page read and write
30CA000
heap
page read and write
3290000
trusted library allocation
page read and write
7D22000
heap
page read and write
4DF0000
heap
page read and write
7BB000
stack
page read and write
8E0000
heap
page read and write
3290000
trusted library allocation
page read and write
293753E0000
trusted library allocation
page read and write
DAE000
heap
page read and write
29375D40000
trusted library allocation
page read and write
293753F0000
trusted library allocation
page read and write
3290000
trusted library allocation
page read and write
303E000
stack
page read and write
1005D000
unkown
page readonly
29375180000
heap
page read and write
6D21000
heap
page read and write
1DC3D013000
unkown
page read and write
4B50000
heap
page read and write
2DDF000
stack
page read and write
BC0000
heap
page read and write
3290000
trusted library allocation
page read and write
2C50000
heap
page read and write
73C6479000
stack
page read and write
1DC3D31B000
heap
page read and write
10043000
unkown
page readonly
7FB000
stack
page read and write
6D43000
heap
page read and write
3290000
trusted library allocation
page read and write
6D50000
heap
page read and write
5BC0000
trusted library allocation
page read and write
7026000
heap
page read and write
AAA000
heap
page read and write
1DC3D03A000
heap
page read and write
2F3B000
stack
page read and write
10054000
unkown
page read and write
BB0000
heap
page read and write
2DE0000
heap
page read and write
C1F000
stack
page read and write
1DC3D102000
trusted library allocation
page read and write
5C41000
heap
page read and write
2DCA000
heap
page read and write
29375455000
heap
page read and write
6D21000
heap
page read and write
6D4F000
heap
page read and write
A20000
heap
page read and write
10001000
unkown
page execute read
2FA0000
heap
page read and write
6D31000
heap
page read and write
1DC3D100000
trusted library allocation
page read and write
7022000
heap
page read and write
6D50000
heap
page read and write
1DC3D115000
trusted library allocation
page read and write
53C000
stack
page read and write
10000000
unkown
page readonly
B60000
heap
page read and write
6D50000
heap
page read and write
5B0000
heap
page read and write
45E0000
heap
page read and write
2DB0000
heap
page read and write
AB0000
heap
page read and write
6D21000
heap
page read and write
6D21000
heap
page read and write
1DC3D037000
heap
page read and write
3160000
heap
page read and write
6D51000
heap
page read and write
D30000
heap
page read and write
4A0000
heap
page read and write
3290000
trusted library allocation
page read and write
1DC3D213000
heap
page read and write
6D4F000
heap
page read and write
3290000
trusted library allocation
page read and write
4D0000
heap
page read and write
85E000
stack
page read and write
3290000
trusted library allocation
page read and write
31E0000
heap
page read and write
293752A0000
heap
page read and write
6D4F000
heap
page read and write
3290000
trusted library allocation
page read and write
A3D000
stack
page read and write
B1C000
stack
page read and write
6D43000
heap
page read and write
87F000
stack
page read and write
2D3C000
stack
page read and write
6D21000
heap
page read and write
6D50000
heap
page read and write
1DC3D302000
heap
page read and write
1DC3D313000
heap
page read and write
6D31000
heap
page read and write
1DC3D302000
heap
page read and write
2CA0000
heap
page read and write
10055000
unkown
page write copy
B90000
heap
page read and write
BA0000
direct allocation
page execute read
5BC0000
trusted library allocation
page read and write
1040000
trusted library allocation
page read and write
4730000
heap
page read and write
AA0000
heap
page read and write
2C8A000
heap
page read and write
2C80000
heap
page read and write
1DC3D038000
heap
page read and write
10055000
unkown
page write copy
3410000
heap
page read and write
46C0000
heap
page read and write
1040000
trusted library allocation
page read and write
6D50000
heap
page read and write
29375050000
trusted library allocation
page read and write
50C000
stack
page read and write
3290000
trusted library allocation
page read and write
6D21000
heap
page read and write
5C52000
heap
page read and write
752A000
heap
page read and write
2D1B000
stack
page read and write
BB1000
direct allocation
page execute read
BDE000
stack
page read and write
6D50000
heap
page read and write
B20000
heap
page read and write
BCB000
stack
page read and write
338E000
stack
page read and write
3190000
heap
page read and write
B8B000
stack
page read and write
293751B1000
heap
page read and write
6D50000
heap
page read and write
AEE000
stack
page read and write
6D51000
heap
page read and write
6D31000
heap
page read and write
A9F000
stack
page read and write
4763000
heap
page read and write
6D43000
heap
page read and write
312E000
stack
page read and write
9A8000
heap
page read and write
3290000
trusted library allocation
page read and write
3290000
trusted library allocation
page read and write
BBE000
stack
page read and write
3290000
trusted library allocation
page read and write
4850000
heap
page read and write
6D31000
heap
page read and write
3290000
trusted library allocation
page read and write
3290000
trusted library allocation
page read and write
6D50000
heap
page read and write
10043000
unkown
page readonly
B5B000
stack
page read and write
5C41000
heap
page read and write
54B000
stack
page read and write
1005A000
unkown
page read and write
29375450000
heap
page read and write
6D21000
heap
page read and write
1DC3D313000
heap
page read and write
3120000
heap
page read and write
DB88C79000
stack
page read and write
650000
heap
page read and write
65EB000
heap
page read and write
5C60000
heap
page read and write
1DC3CEC0000
trusted library allocation
page read and write
1DC3D202000
heap
page read and write
681C000
heap
page read and write
5E00000
trusted library allocation
page read and write
7EE000
stack
page read and write
3110000
heap
page read and write
10000000
unkown
page readonly
2CDC000
stack
page read and write
2EFC000
stack
page read and write
10043000
unkown
page readonly
6D43000
heap
page read and write
29375F90000
trusted library allocation
page read and write
2CAA000
heap
page read and write
293751EC000
heap
page read and write
29375D50000
trusted library allocation
page read and write
29376010000
trusted library allocation
page read and write
73C6879000
stack
page read and write
45F0000
heap
page read and write
6D50000
heap
page read and write
2E90000
heap
page read and write
6D51000
heap
page read and write
4CA0000
heap
page read and write
293751A0000
heap
page read and write
BB0000
direct allocation
page read and write
33FE000
stack
page read and write
DA9000
heap
page read and write
10054000
unkown
page read and write
5BC0000
trusted library allocation
page read and write
6D4F000
heap
page read and write
DB88D79000
stack
page read and write
29375040000
heap
page read and write
1DC3CEB0000
heap
page read and write
4940000
heap
page read and write
6D31000
heap
page read and write
2D7B000
stack
page read and write
10043000
unkown
page readonly
B2F000
stack
page read and write
6D43000
heap
page read and write
5BC0000
trusted library allocation
page read and write
6D43000
heap
page read and write
870000
heap
page read and write
874000
heap
page read and write
4A60000
heap
page read and write
1DC3D302000
heap
page read and write
293751EC000
heap
page read and write
4BB0000
heap
page read and write
77C000
stack
page read and write
30AF000
stack
page read and write
1DC3D037000
heap
page read and write
6D21000
heap
page read and write
1DC3D07A000
heap
page read and write
There are 397 hidden memdumps, click here to show them.