IOC Report
y2WSfG9g8W.dll

loading gif

Files

File Path
Type
Category
Malicious
y2WSfG9g8W.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_2129def29827316c53fa9262167235f70c4ed97_7522e4b5_8e2d9f83-882f-46d0-afb1-35170efa58d3\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_e0abdff3bd5dbbcc6e35e11a1c7aa362b1b4caa9_7522e4b5_791ed9c4-594e-4462-b830-7a8b482104f0\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_e0abdff3bd5dbbcc6e35e11a1c7aa362b1b4caa9_7522e4b5_9c1f6d5c-8190-42b3-9ff4-ecf9ba67352f\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9A59.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 29 17:52:22 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9EA0.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9EC0.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC513.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 29 17:52:32 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC551.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 29 17:52:32 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC5FE.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC64C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC65D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC6BA.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\y2WSfG9g8W.dll,BarCreate
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7676 -s 648
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\y2WSfG9g8W.dll,BarDestroy
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\y2WSfG9g8W.dll,BarFreeRec
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",BarCreate
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",BarDestroy
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",BarFreeRec
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeSetFocus
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeSetDirty
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeResize
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkePaint2
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeKillFocus
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeIsDirty
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeInitialize
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeGetCaretRect
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeFireMouseWheelEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeFireMouseEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeFireKeyUpEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeFireKeyPressEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeFireKeyDownEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeFireContextMenuEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeFinalize
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeDestroyWebView
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeCreateWebView
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",dbkFCallWrapperAddr
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",__dbk_fcall_wrapper
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",TMethodImplementationIntercept
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",BarRecognize
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7340 -s 648
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6496 -s 640
There are 24 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Domains

Name
IP
Malicious
time.windows.com
unknown
206.23.85.13.in-addr.arpa
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProgramId
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
FileId
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LowerCaseLongPath
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LongPathHash
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Name
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
OriginalFileName
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Publisher
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Version
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinFileVersion
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinaryType
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductName
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductVersion
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LinkDate
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinProductVersion
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageFullName
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageRelativeId
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Size
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Language
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
IsOsComponent
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4142000
direct allocation
page read and write
43A8000
direct allocation
page read and write
40FF000
direct allocation
page read and write
4BAA000
direct allocation
page read and write
34EC000
direct allocation
page read and write
498A000
direct allocation
page read and write
4744000
direct allocation
page read and write
2ABF000
stack
page read and write
4658000
direct allocation
page read and write
261A000
heap
page read and write
30AA000
heap
page read and write
285B000
stack
page read and write
40E8000
direct allocation
page read and write
4C88000
direct allocation
page read and write
2D90000
heap
page read and write
2F4A000
heap
page read and write
289C000
stack
page read and write
25BF000
stack
page read and write
2BC0000
heap
page read and write
C50000
heap
page read and write
48AD000
direct allocation
page read and write
47FD000
direct allocation
page read and write
32FE000
stack
page read and write
4C56000
direct allocation
page read and write
2BE1000
direct allocation
page read and write
486C000
direct allocation
page read and write
266A000
heap
page read and write
49A0000
heap
page read and write
21C0000
heap
page read and write
3F1F000
stack
page read and write
4418000
direct allocation
page read and write
41C8000
direct allocation
page read and write
42B6000
unkown
page read and write
4DC8000
direct allocation
page read and write
4558000
direct allocation
page read and write
4AC2000
direct allocation
page read and write
44FA000
direct allocation
page read and write
440C000
direct allocation
page read and write
2C8E000
stack
page read and write
2BAF000
direct allocation
page read and write
522000
unkown
page readonly
2E0E000
stack
page read and write
F7E000
stack
page read and write
4888000
direct allocation
page read and write
C30000
heap
page read and write
2D20000
heap
page read and write
487A000
direct allocation
page read and write
4D88000
direct allocation
page read and write
4AF6000
direct allocation
page read and write
43B2000
direct allocation
page read and write
4711000
direct allocation
page read and write
2C0E000
stack
page read and write
4C08000
direct allocation
page read and write
21B0000
heap
page read and write
451A000
direct allocation
page read and write
4C73000
direct allocation
page read and write
4804000
direct allocation
page read and write
2D9A000
heap
page read and write
4AD3000
direct allocation
page read and write
4BC8000
direct allocation
page read and write
4991000
direct allocation
page read and write
2B91000
direct allocation
page read and write
4428000
direct allocation
page read and write
4DC1000
direct allocation
page read and write
4528000
direct allocation
page read and write
260E000
stack
page read and write
4848000
direct allocation
page read and write
41C2000
direct allocation
page read and write
4680000
heap
page read and write
4E4F000
stack
page read and write
32BA000
heap
page read and write
455C000
direct allocation
page read and write
2F6E000
stack
page read and write
4BEC000
direct allocation
page read and write
455F000
direct allocation
page read and write
3160000
heap
page read and write
2EBE000
stack
page read and write
2E1E000
stack
page read and write
450E000
stack
page read and write
46FA000
direct allocation
page read and write
34F3000
direct allocation
page read and write
2E40000
heap
page read and write
4D8F000
direct allocation
page read and write
449E000
stack
page read and write
524000
unkown
page readonly
4551000
direct allocation
page read and write
4702000
direct allocation
page read and write
487A000
direct allocation
page read and write
24CB000
stack
page read and write
24C0000
heap
page read and write
4E20000
heap
page read and write
4734000
direct allocation
page read and write
50F000
unkown
page read and write
43DD000
direct allocation
page read and write
2D50000
heap
page read and write
30E8000
direct allocation
page read and write
2BB0000
heap
page read and write
42BD000
unkown
page read and write
4534000
direct allocation
page read and write
2C7C000
stack
page read and write
2DF0000
heap
page read and write
4563000
direct allocation
page read and write
4B28000
direct allocation
page read and write
43C2000
direct allocation
page read and write
272F000
stack
page read and write
4540000
heap
page read and write
4344000
direct allocation
page read and write
43FE000
stack
page read and write
3380000
heap
page read and write
314E000
stack
page read and write
4E0E000
stack
page read and write
303A000
heap
page read and write
295F000
stack
page read and write
4B1A000
direct allocation
page read and write
43FD000
direct allocation
page read and write
268B000
stack
page read and write
276F000
stack
page read and write
234C000
stack
page read and write
2B8B000
stack
page read and write
4404000
direct allocation
page read and write
214B000
stack
page read and write
2BCC000
stack
page read and write
43F4000
direct allocation
page read and write
4718000
direct allocation
page read and write
34A2000
direct allocation
page read and write
2D90000
heap
page read and write
4541000
direct allocation
page read and write
2C00000
heap
page read and write
290A000
heap
page read and write
4BB8000
direct allocation
page read and write
47E8000
direct allocation
page read and write
4ADA000
direct allocation
page read and write
520000
unkown
page write copy
27AC000
stack
page read and write
34D6000
direct allocation
page read and write
4641000
direct allocation
page read and write
27A0000
heap
page read and write
2BE0000
heap
page read and write
2F3E000
stack
page read and write
2E30000
heap
page read and write
471F000
direct allocation
page read and write
2AAE000
stack
page read and write
462B000
direct allocation
page read and write
4D9D000
direct allocation
page read and write
2A9C000
stack
page read and write
417D000
direct allocation
page read and write
4400000
heap
page read and write
4C22000
direct allocation
page read and write
32AE000
stack
page read and write
4336000
direct allocation
page read and write
42AF000
unkown
page read and write
34AA000
direct allocation
page read and write
4DBA000
direct allocation
page read and write
34DD000
direct allocation
page read and write
297A000
heap
page read and write
3160000
heap
page read and write
412A000
direct allocation
page read and write
4106000
direct allocation
page read and write
4D40000
heap
page read and write
295B000
stack
page read and write
2F2E000
stack
page read and write
21EC000
stack
page read and write
2730000
heap
page read and write
41BA000
direct allocation
page read and write
4342000
direct allocation
page read and write
2B1B000
stack
page read and write
27EF000
stack
page read and write
4538000
direct allocation
page read and write
31B0000
heap
page read and write
2CA0000
heap
page read and write
2B20000
heap
page read and write
452D000
direct allocation
page read and write
474A000
direct allocation
page read and write
4590000
heap
page read and write
4AC4000
direct allocation
page read and write
25D0000
heap
page read and write
400000
unkown
page readonly
30EF000
direct allocation
page read and write
DA0000
heap
page read and write
492E000
stack
page read and write
4526000
direct allocation
page read and write
263B000
stack
page read and write
23C0000
heap
page read and write
453C000
direct allocation
page read and write
451E000
stack
page read and write
434C000
direct allocation
page read and write
2E4F000
stack
page read and write
308F000
stack
page read and write
41C1000
direct allocation
page read and write
2FC0000
heap
page read and write
2740000
heap
page read and write
4C50000
heap
page read and write
41A1000
direct allocation
page read and write
2DFC000
stack
page read and write
310C000
direct allocation
page read and write
249C000
stack
page read and write
413E000
stack
page read and write
4831000
direct allocation
page read and write
4114000
direct allocation
page read and write
34B1000
direct allocation
page read and write
473C000
direct allocation
page read and write
27BA000
heap
page read and write
2CD0000
heap
page read and write
2900000
heap
page read and write
4168000
direct allocation
page read and write
4ACA000
direct allocation
page read and write
25CE000
stack
page read and write
4151000
direct allocation
page read and write
4B0E000
stack
page read and write
4838000
direct allocation
page read and write
327F000
stack
page read and write
21F0000
heap
page read and write
438C000
direct allocation
page read and write
23DC000
stack
page read and write
456D000
direct allocation
page read and write
270E000
stack
page read and write
2BC4000
direct allocation
page read and write
2580000
heap
page read and write
4BE4000
direct allocation
page read and write
43B1000
direct allocation
page read and write
307F000
stack
page read and write
458F000
stack
page read and write
30D0000
heap
page read and write
2570000
heap
page read and write
45D0000
heap
page read and write
230B000
stack
page read and write
454D000
direct allocation
page read and write
4302000
direct allocation
page read and write
32EF000
stack
page read and write
2F10000
heap
page read and write
3320000
heap
page read and write
4574000
direct allocation
page read and write
2A50000
heap
page read and write
2FB0000
heap
page read and write
2530000
heap
page read and write
4B04000
direct allocation
page read and write
48C3000
direct allocation
page read and write
4158000
direct allocation
page read and write
2F70000
heap
page read and write
30C2000
direct allocation
page read and write
418C000
direct allocation
page read and write
42C1000
unkown
page read and write
2970000
heap
page read and write
43FC000
direct allocation
page read and write
2FA0000
heap
page read and write
49BD000
direct allocation
page read and write
4FD0000
heap
page read and write
4B2A000
direct allocation
page read and write
34B8000
direct allocation
page read and write
4728000
direct allocation
page read and write
4881000
direct allocation
page read and write
3140000
heap
page read and write
4872000
direct allocation
page read and write
2F10000
heap
page read and write
2AF0000
heap
page read and write
2F7E000
stack
page read and write
51F000
unkown
page read and write
4701000
direct allocation
page read and write
30D1000
direct allocation
page read and write
4DB3000
direct allocation
page read and write
44DF000
stack
page read and write
40D2000
direct allocation
page read and write
2B10000
heap
page read and write
4C38000
direct allocation
page read and write
34C8000
direct allocation
page read and write
4850000
heap
page read and write
43D8000
direct allocation
page read and write
2F90000
heap
page read and write
4720000
heap
page read and write
D8E000
stack
page read and write
276E000
stack
page read and write
480C000
direct allocation
page read and write
4ABD000
direct allocation
page read and write
10BF000
stack
page read and write
44F2000
direct allocation
page read and write
4C81000
direct allocation
page read and write
8CC000
stack
page read and write
2DD0000
heap
page read and write
4C01000
direct allocation
page read and write
40FE000
stack
page read and write
4828000
direct allocation
page read and write
40F8000
direct allocation
page read and write
4AD1000
direct allocation
page read and write
239B000
stack
page read and write
437D000
direct allocation
page read and write
521000
unkown
page read and write
472F000
direct allocation
page read and write
2460000
heap
page read and write
524000
unkown
page readonly
2840000
heap
page read and write
34FA000
direct allocation
page read and write
C5F000
heap
page read and write
27B0000
heap
page read and write
32B0000
heap
page read and write
42C0000
unkown
page write copy
41AC000
direct allocation
page read and write
475A000
direct allocation
page read and write
26B0000
heap
page read and write
4AA8000
direct allocation
page read and write
274E000
stack
page read and write
3501000
direct allocation
page read and write
30AF000
stack
page read and write
30D8000
direct allocation
page read and write
2960000
heap
page read and write
4708000
direct allocation
page read and write
2650000
heap
page read and write
520000
unkown
page write copy
4554000
direct allocation
page read and write
32EA000
heap
page read and write
4D40000
heap
page read and write
41CA000
direct allocation
page read and write
2D4B000
stack
page read and write
283A000
heap
page read and write
25FE000
stack
page read and write
4B14000
direct allocation
page read and write
2C7B000
stack
page read and write
4413000
direct allocation
page read and write
2D70000
heap
page read and write
2BD3000
direct allocation
page read and write
2B8A000
direct allocation
page read and write
495F000
stack
page read and write
245B000
stack
page read and write
250E000
stack
page read and write
4761000
direct allocation
page read and write
4AE8000
direct allocation
page read and write
40EF000
stack
page read and write
4DA4000
direct allocation
page read and write
2660000
heap
page read and write
4361000
direct allocation
page read and write
2A00000
heap
page read and write
4558000
direct allocation
page read and write
4751000
direct allocation
page read and write
43C0000
heap
page read and write
2B00000
heap
page read and write
48D1000
direct allocation
page read and write
463A000
direct allocation
page read and write
48BC000
direct allocation
page read and write
419D000
direct allocation
page read and write
4D3F000
stack
page read and write
43CF000
direct allocation
page read and write
43AA000
direct allocation
page read and write
511000
unkown
page read and write
2E3B000
stack
page read and write
4898000
direct allocation
page read and write
48B4000
direct allocation
page read and write
4384000
direct allocation
page read and write
48CA000
direct allocation
page read and write
4B21000
direct allocation
page read and write
250C000
stack
page read and write
C5B000
heap
page read and write
291E000
stack
page read and write
473D000
direct allocation
page read and write
4123000
direct allocation
page read and write
4196000
direct allocation
page read and write
2EDF000
stack
page read and write
2E30000
heap
page read and write
30F6000
direct allocation
page read and write
2B60000
heap
page read and write
4753000
direct allocation
page read and write
40AE000
stack
page read and write
2B6E000
stack
page read and write
3200000
heap
page read and write
2CE0000
heap
page read and write
48D8000
direct allocation
page read and write
43A2000
direct allocation
page read and write
30A0000
heap
page read and write
4A1F000
stack
page read and write
23B0000
heap
page read and write
304E000
stack
page read and write
4B4F000
stack
page read and write
4358000
direct allocation
page read and write
4C48000
direct allocation
page read and write
27D0000
heap
page read and write
2CB0000
heap
page read and write
28FA000
heap
page read and write
40E1000
direct allocation
page read and write
2880000
heap
page read and write
2D1B000
stack
page read and write
3300000
heap
page read and write
2CEA000
heap
page read and write
32DA000
heap
page read and write
49DE000
stack
page read and write
24D0000
heap
page read and write
4B9B000
direct allocation
page read and write
4B23000
direct allocation
page read and write
3110000
heap
page read and write
294F000
stack
page read and write
4D78000
direct allocation
page read and write
42B5000
unkown
page write copy
4AEF000
direct allocation
page read and write
2830000
heap
page read and write
4AD0000
heap
page read and write
4460000
heap
page read and write
4D6A000
direct allocation
page read and write
46DE000
stack
page read and write
FBE000
stack
page read and write
26C0000
heap
page read and write
4C6C000
direct allocation
page read and write
2B5C000
stack
page read and write
47F6000
direct allocation
page read and write
2C90000
heap
page read and write
2CE0000
heap
page read and write
51D000
unkown
page read and write
4D62000
direct allocation
page read and write
4421000
direct allocation
page read and write
2AD0000
heap
page read and write
2DF0000
heap
page read and write
3060000
heap
page read and write
4BCF000
direct allocation
page read and write
484F000
direct allocation
page read and write
414A000
direct allocation
page read and write
4743000
direct allocation
page read and write
27AE000
stack
page read and write
42C4000
unkown
page readonly
47D1000
direct allocation
page read and write
49AE000
stack
page read and write
2BB6000
direct allocation
page read and write
31CE000
stack
page read and write
3080000
heap
page read and write
4ACF000
stack
page read and write
2D30000
heap
page read and write
43D8000
direct allocation
page read and write
430A000
direct allocation
page read and write
2A10000
heap
page read and write
436F000
direct allocation
page read and write
30FD000
direct allocation
page read and write
472D000
direct allocation
page read and write
4184000
direct allocation
page read and write
2F4C000
stack
page read and write
47EF000
direct allocation
page read and write
456A000
direct allocation
page read and write
43CA000
direct allocation
page read and write
4ACC000
direct allocation
page read and write
258F000
stack
page read and write
455F000
stack
page read and write
2DFA000
heap
page read and write
310E000
stack
page read and write
4368000
direct allocation
page read and write
451F000
direct allocation
page read and write
481A000
direct allocation
page read and write
2B40000
heap
page read and write
4543000
direct allocation
page read and write
2E9E000
stack
page read and write
2E5B000
stack
page read and write
34CF000
direct allocation
page read and write
21EB000
stack
page read and write
43BF000
stack
page read and write
2500000
heap
page read and write
3150000
heap
page read and write
4AFD000
direct allocation
page read and write
26CC000
stack
page read and write
522000
unkown
page readonly
4193000
direct allocation
page read and write
2E5F000
stack
page read and write
3550000
heap
page read and write
2EC0000
heap
page read and write
270E000
stack
page read and write
43EF000
direct allocation
page read and write
2BA8000
direct allocation
page read and write
9CC000
stack
page read and write
42BF000
unkown
page read and write
4AE8000
direct allocation
page read and write
41A1000
unkown
page execute read
26EE000
stack
page read and write
51D000
unkown
page read and write
42B0000
unkown
page write copy
3220000
heap
page read and write
43ED000
direct allocation
page read and write
4856000
direct allocation
page read and write
4578000
direct allocation
page read and write
282A000
heap
page read and write
4B0D000
direct allocation
page read and write
4368000
direct allocation
page read and write
4BDD000
direct allocation
page read and write
25E0000
heap
page read and write
2E9C000
stack
page read and write
47CA000
direct allocation
page read and write
2A70000
heap
page read and write
4376000
direct allocation
page read and write
410D000
direct allocation
page read and write
518000
unkown
page read and write
2E70000
heap
page read and write
2F00000
heap
page read and write
42B1000
unkown
page read and write
30CA000
direct allocation
page read and write
4131000
direct allocation
page read and write
4512000
direct allocation
page read and write
2A8E000
stack
page read and write
45B0000
heap
page read and write
4BB1000
direct allocation
page read and write
49AF000
direct allocation
page read and write
4C31000
direct allocation
page read and write
31E0000
heap
page read and write
4AAF000
direct allocation
page read and write
2E40000
heap
page read and write
27C0000
heap
page read and write
485D000
direct allocation
page read and write
21AB000
stack
page read and write
4873000
direct allocation
page read and write
433D000
direct allocation
page read and write
27B0000
heap
page read and write
454A000
direct allocation
page read and write
2DA0000
heap
page read and write
48A6000
direct allocation
page read and write
4548000
direct allocation
page read and write
417F000
stack
page read and write
411C000
direct allocation
page read and write
43D1000
direct allocation
page read and write
4162000
direct allocation
page read and write
4C2A000
direct allocation
page read and write
27DA000
heap
page read and write
269F000
stack
page read and write
267C000
stack
page read and write
23FC000
stack
page read and write
2BD0000
heap
page read and write
47D8000
direct allocation
page read and write
43C8000
direct allocation
page read and write
295E000
stack
page read and write
479F000
stack
page read and write
4566000
direct allocation
page read and write
4583000
direct allocation
page read and write
4C7A000
direct allocation
page read and write
2F40000
heap
page read and write
2E7C000
stack
page read and write
2F40000
heap
page read and write
4AD2000
direct allocation
page read and write
434A000
direct allocation
page read and write
40DA000
direct allocation
page read and write
27EF000
stack
page read and write
2F0F000
stack
page read and write
4138000
direct allocation
page read and write
34E4000
direct allocation
page read and write
489F000
direct allocation
page read and write
4C48000
direct allocation
page read and write
4A70000
heap
page read and write
4C64000
direct allocation
page read and write
43BA000
direct allocation
page read and write
432F000
direct allocation
page read and write
2AC0000
heap
page read and write
4758000
direct allocation
page read and write
2D8C000
stack
page read and write
2F0B000
stack
page read and write
443F000
stack
page read and write
49EF000
stack
page read and write
2640000
heap
page read and write
482A000
direct allocation
page read and write
2BAF000
stack
page read and write
4176000
direct allocation
page read and write
28F0000
heap
page read and write
2EE0000
heap
page read and write
4D71000
direct allocation
page read and write
C40000
heap
page read and write
4C2A000
direct allocation
page read and write
27AE000
stack
page read and write
2DD0000
heap
page read and write
49C0000
heap
page read and write
418F000
direct allocation
page read and write
2BC0000
heap
page read and write
510000
unkown
page write copy
49A8000
direct allocation
page read and write
218C000
stack
page read and write
2660000
heap
page read and write
439A000
direct allocation
page read and write
4411000
direct allocation
page read and write
2EFA000
heap
page read and write
3100000
heap
page read and write
2EF0000
heap
page read and write
457C000
direct allocation
page read and write
400000
unkown
page readonly
338A000
heap
page read and write
2A5B000
stack
page read and write
2780000
heap
page read and write
2B7E000
stack
page read and write
4C5D000
direct allocation
page read and write
4B0C000
direct allocation
page read and write
4532000
direct allocation
page read and write
4A82000
direct allocation
page read and write
2AA0000
heap
page read and write
4E50000
heap
page read and write
4888000
direct allocation
page read and write
27AB000
stack
page read and write
4864000
direct allocation
page read and write
513000
unkown
page write copy
2F8A000
heap
page read and write
4B13000
direct allocation
page read and write
43E6000
direct allocation
page read and write
2A3E000
stack
page read and write
26C0000
heap
page read and write
4403000
direct allocation
page read and write
51F000
unkown
page read and write
32D0000
heap
page read and write
2450000
heap
page read and write
354E000
stack
page read and write
41A0000
unkown
page readonly
4648000
direct allocation
page read and write
30FF000
stack
page read and write
281A000
heap
page read and write
4768000
direct allocation
page read and write
496F000
stack
page read and write
4982000
direct allocation
page read and write
2C4F000
stack
page read and write
2BE8000
direct allocation
page read and write
2A10000
heap
page read and write
2920000
heap
page read and write
511000
unkown
page read and write
427F000
stack
page read and write
3113000
direct allocation
page read and write
2A60000
heap
page read and write
440A000
direct allocation
page read and write
4C4F000
direct allocation
page read and write
4B30000
heap
page read and write
4178000
direct allocation
page read and write
243C000
stack
page read and write
2BBA000
heap
page read and write
41A4000
direct allocation
page read and write
2B98000
direct allocation
page read and write
2B82000
direct allocation
page read and write
2830000
heap
page read and write
2720000
heap
page read and write
470A000
direct allocation
page read and write
47C2000
direct allocation
page read and write
4B1C000
direct allocation
page read and write
4C38000
direct allocation
page read and write
32E0000
heap
page read and write
2990000
heap
page read and write
4508000
direct allocation
page read and write
43E8000
direct allocation
page read and write
2A7E000
stack
page read and write
441A000
direct allocation
page read and write
4BF3000
direct allocation
page read and write
29F0000
heap
page read and write
43A1000
direct allocation
page read and write
2CEB000
stack
page read and write
4DD0000
heap
page read and write
4C22000
direct allocation
page read and write
4501000
direct allocation
page read and write
4C4F000
direct allocation
page read and write
30FE000
stack
page read and write
401000
unkown
page execute read
4AD8000
direct allocation
page read and write
27FE000
stack
page read and write
2EF0000
heap
page read and write
465F000
direct allocation
page read and write
4311000
direct allocation
page read and write
4351000
direct allocation
page read and write
265E000
stack
page read and write
25B0000
heap
page read and write
3670000
heap
page read and write
47D0000
heap
page read and write
31CF000
stack
page read and write
4DAC000
direct allocation
page read and write
43F6000
direct allocation
page read and write
453F000
direct allocation
page read and write
210B000
stack
page read and write
2810000
heap
page read and write
43B8000
direct allocation
page read and write
32B0000
heap
page read and write
435A000
direct allocation
page read and write
43D6000
direct allocation
page read and write
474C000
direct allocation
page read and write
42EF000
stack
page read and write
2DBB000
stack
page read and write
4353000
direct allocation
page read and write
513000
unkown
page write copy
2C3B000
stack
page read and write
27C0000
heap
page read and write
2CBC000
stack
page read and write
458A000
direct allocation
page read and write
42C0000
heap
page read and write
4328000
direct allocation
page read and write
4AFF000
direct allocation
page read and write
2F80000
heap
page read and write
2540000
heap
page read and write
4AB6000
direct allocation
page read and write
4598000
direct allocation
page read and write
4813000
direct allocation
page read and write
4821000
direct allocation
page read and write
419A000
direct allocation
page read and write
416A000
direct allocation
page read and write
30BE000
stack
page read and write
257E000
stack
page read and write
2AEF000
stack
page read and write
4AE1000
direct allocation
page read and write
4571000
direct allocation
page read and write
3104000
direct allocation
page read and write
42C2000
unkown
page readonly
2F7F000
stack
page read and write
2DC0000
heap
page read and write
4C5D000
direct allocation
page read and write
49B6000
direct allocation
page read and write
31FF000
stack
page read and write
47B0000
heap
page read and write
43C8000
direct allocation
page read and write
4998000
direct allocation
page read and write
4546000
direct allocation
page read and write
4D96000
direct allocation
page read and write
4518000
direct allocation
page read and write
2C3C000
stack
page read and write
46F2000
direct allocation
page read and write
318F000
stack
page read and write
27EC000
stack
page read and write
4A8A000
direct allocation
page read and write
4318000
direct allocation
page read and write
2D2C000
stack
page read and write
3150000
heap
page read and write
276B000
stack
page read and write
2DC0000
heap
page read and write
299C000
stack
page read and write
4B06000
direct allocation
page read and write
4AE1000
direct allocation
page read and write
3090000
heap
page read and write
4C56000
direct allocation
page read and write
2DCF000
stack
page read and write
50F000
unkown
page read and write
4822000
direct allocation
page read and write
401000
unkown
page execute read
475E000
stack
page read and write
4ADA000
direct allocation
page read and write
2C10000
heap
page read and write
510000
unkown
page write copy
4BFA000
direct allocation
page read and write
314F000
stack
page read and write
2ADA000
heap
page read and write
2820000
heap
page read and write
2CCF000
stack
page read and write
4A98000
direct allocation
page read and write
4718000
direct allocation
page read and write
40BE000
stack
page read and write
4188000
direct allocation
page read and write
2490000
heap
page read and write
4AF8000
direct allocation
page read and write
315F000
stack
page read and write
4591000
direct allocation
page read and write
2D5C000
stack
page read and write
2AF0000
heap
page read and write
4C6C000
direct allocation
page read and write
416F000
direct allocation
page read and write
323E000
stack
page read and write
307D000
stack
page read and write
3180000
heap
page read and write
41A8000
direct allocation
page read and write
453A000
direct allocation
page read and write
4393000
direct allocation
page read and write
4AE8000
direct allocation
page read and write
3508000
direct allocation
page read and write
23BB000
stack
page read and write
43DF000
direct allocation
page read and write
41B3000
direct allocation
page read and write
2BBD000
direct allocation
page read and write
43C1000
direct allocation
page read and write
4BD6000
direct allocation
page read and write
4521000
direct allocation
page read and write
521000
unkown
page read and write
284A000
heap
page read and write
4A91000
direct allocation
page read and write
2BCC000
direct allocation
page read and write
264F000
stack
page read and write
2740000
heap
page read and write
2BDA000
direct allocation
page read and write
4171000
direct allocation
page read and write
2570000
heap
page read and write
25EE000
stack
page read and write
214C000
stack
page read and write
4881000
direct allocation
page read and write
4C31000
direct allocation
page read and write
4B40000
heap
page read and write
316A000
heap
page read and write
2D3A000
heap
page read and write
2610000
heap
page read and write
25BA000
heap
page read and write
2770000
heap
page read and write
29EB000
stack
page read and write
3030000
heap
page read and write
299F000
stack
page read and write
31AE000
stack
page read and write
4726000
direct allocation
page read and write
4C64000
direct allocation
page read and write
2D60000
heap
page read and write
2610000
heap
page read and write
518000
unkown
page read and write
2690000
heap
page read and write
4736000
direct allocation
page read and write
There are 772 hidden memdumps, click here to show them.