IOC Report
tiiEwuElgl.dll

loading gif

Files

File Path
Type
Category
Malicious
tiiEwuElgl.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_2fe5f38a4f5ae3ed51518cca5baa2e5e637fb76_7522e4b5_64422e78-53cc-46d8-a19d-7baef0af0e5c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_2fe5f38a4f5ae3ed51518cca5baa2e5e637fb76_7522e4b5_d2f2c237-4255-4da5-8098-3eac21645fd8\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_b0cdffbca525ee12a6aa688b50d1504e3557d02a_7522e4b5_063399f1-1e56-4d88-a8ba-4023344517e5\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER12A0.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 29 17:54:24 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER12FE.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 29 17:54:24 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER133E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER13BC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER13DA.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER140A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE576.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 29 17:54:12 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE632.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE662.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll",#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\tiiEwuElgl.dll,BarCreate
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll",#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 8004 -s 648
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\tiiEwuElgl.dll,BarDestroy
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\tiiEwuElgl.dll,BarFreeRec
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll",BarCreate
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll",BarDestroy
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll",BarFreeRec
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll",wkeSetFocus
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll",wkeSetDirty
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll",wkeResize
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll",wkePaint2
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll",wkeKillFocus
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll",wkeIsDirty
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll",wkeInitialize
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll",wkeGetCaretRect
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll",wkeFireMouseWheelEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll",wkeFireMouseEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll",wkeFireKeyUpEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll",wkeFireKeyPressEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll",wkeFireKeyDownEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll",wkeFireContextMenuEvent
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll",wkeFinalize
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll",wkeDestroyWebView
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll",wkeCreateWebView
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll",dbkFCallWrapperAddr
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll",__dbk_fcall_wrapper
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll",TMethodImplementationIntercept
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\tiiEwuElgl.dll",BarRecognize
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5840 -s 648
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 8020 -s 640
There are 24 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{38076a71-8bc9-90d6-922c-925b75ee5168}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProgramId
\REGISTRY\A\{38076a71-8bc9-90d6-922c-925b75ee5168}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
FileId
\REGISTRY\A\{38076a71-8bc9-90d6-922c-925b75ee5168}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LowerCaseLongPath
\REGISTRY\A\{38076a71-8bc9-90d6-922c-925b75ee5168}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LongPathHash
\REGISTRY\A\{38076a71-8bc9-90d6-922c-925b75ee5168}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Name
\REGISTRY\A\{38076a71-8bc9-90d6-922c-925b75ee5168}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
OriginalFileName
\REGISTRY\A\{38076a71-8bc9-90d6-922c-925b75ee5168}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Publisher
\REGISTRY\A\{38076a71-8bc9-90d6-922c-925b75ee5168}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Version
\REGISTRY\A\{38076a71-8bc9-90d6-922c-925b75ee5168}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinFileVersion
\REGISTRY\A\{38076a71-8bc9-90d6-922c-925b75ee5168}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinaryType
\REGISTRY\A\{38076a71-8bc9-90d6-922c-925b75ee5168}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductName
\REGISTRY\A\{38076a71-8bc9-90d6-922c-925b75ee5168}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductVersion
\REGISTRY\A\{38076a71-8bc9-90d6-922c-925b75ee5168}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LinkDate
\REGISTRY\A\{38076a71-8bc9-90d6-922c-925b75ee5168}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinProductVersion
\REGISTRY\A\{38076a71-8bc9-90d6-922c-925b75ee5168}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageFullName
\REGISTRY\A\{38076a71-8bc9-90d6-922c-925b75ee5168}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageRelativeId
\REGISTRY\A\{38076a71-8bc9-90d6-922c-925b75ee5168}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Size
\REGISTRY\A\{38076a71-8bc9-90d6-922c-925b75ee5168}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Language
\REGISTRY\A\{38076a71-8bc9-90d6-922c-925b75ee5168}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
IsOsComponent
\REGISTRY\A\{38076a71-8bc9-90d6-922c-925b75ee5168}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018400CF081ADAB
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018400CF081ADAB
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
44A8000
direct allocation
page read and write
44A1000
direct allocation
page read and write
4B08000
direct allocation
page read and write
4EEA000
direct allocation
page read and write
2DB2000
direct allocation
page read and write
12FF000
heap
page read and write
14EF000
stack
page read and write
4DA8000
direct allocation
page read and write
2B10000
heap
page read and write
279F000
stack
page read and write
4EF8000
direct allocation
page read and write
4476000
direct allocation
page read and write
316E000
stack
page read and write
4E78000
direct allocation
page read and write
4CC0000
heap
page read and write
4ECA000
direct allocation
page read and write
2ED0000
heap
page read and write
49F8000
direct allocation
page read and write
4A41000
direct allocation
page read and write
4F14000
direct allocation
page read and write
25E0000
heap
page read and write
26D0000
heap
page read and write
4F0C000
direct allocation
page read and write
29A0000
heap
page read and write
2EF0000
heap
page read and write
42B1000
direct allocation
page read and write
4AED000
direct allocation
page read and write
283C000
stack
page read and write
4DBF000
stack
page read and write
4DD4000
direct allocation
page read and write
2CC0000
heap
page read and write
43A2000
direct allocation
page read and write
2BCB000
stack
page read and write
30BC000
stack
page read and write
12FB000
heap
page read and write
2EE0000
heap
page read and write
31EE000
stack
page read and write
2E80000
heap
page read and write
42A1000
direct allocation
page read and write
44AF000
direct allocation
page read and write
46D2000
direct allocation
page read and write
4DA8000
direct allocation
page read and write
48B8000
direct allocation
page read and write
2660000
heap
page read and write
44CC000
direct allocation
page read and write
307E000
stack
page read and write
2D60000
heap
page read and write
2E20000
heap
page read and write
4DDA000
direct allocation
page read and write
23F0000
heap
page read and write
43CF000
direct allocation
page read and write
32EA000
heap
page read and write
4DA1000
direct allocation
page read and write
4361000
direct allocation
page read and write
3210000
heap
page read and write
47A1000
direct allocation
page read and write
4EE6000
direct allocation
page read and write
4F18000
direct allocation
page read and write
43E4000
direct allocation
page read and write
285A000
heap
page read and write
47EA000
direct allocation
page read and write
24B0000
heap
page read and write
4223000
direct allocation
page read and write
30B0000
heap
page read and write
437F000
direct allocation
page read and write
2880000
heap
page read and write
4DBE000
stack
page read and write
4B94000
direct allocation
page read and write
4B7F000
direct allocation
page read and write
4498000
direct allocation
page read and write
520000
unkown
page write copy
47A8000
direct allocation
page read and write
2EFC000
stack
page read and write
355E000
stack
page read and write
3210000
heap
page read and write
4D4D000
direct allocation
page read and write
4F28000
direct allocation
page read and write
4DCC000
direct allocation
page read and write
4D8A000
direct allocation
page read and write
2FA0000
heap
page read and write
43AA000
direct allocation
page read and write
3510000
heap
page read and write
51F000
unkown
page read and write
2AAC000
stack
page read and write
E7C000
stack
page read and write
32DF000
stack
page read and write
2DED000
direct allocation
page read and write
4378000
direct allocation
page read and write
32CA000
heap
page read and write
4DF1000
direct allocation
page read and write
4238000
direct allocation
page read and write
4AE1000
direct allocation
page read and write
263F000
stack
page read and write
476F000
direct allocation
page read and write
4442000
direct allocation
page read and write
49EA000
direct allocation
page read and write
447D000
direct allocation
page read and write
299B000
stack
page read and write
41FF000
direct allocation
page read and write
23F0000
heap
page read and write
428C000
direct allocation
page read and write
4EEF000
direct allocation
page read and write
424A000
direct allocation
page read and write
4EF8000
direct allocation
page read and write
33DE000
stack
page read and write
4776000
direct allocation
page read and write
4B68000
direct allocation
page read and write
2D4F000
stack
page read and write
2A7C000
stack
page read and write
2F2C000
stack
page read and write
4EF6000
direct allocation
page read and write
4D92000
direct allocation
page read and write
23B0000
heap
page read and write
4DF8000
direct allocation
page read and write
2FFE000
stack
page read and write
41F8000
direct allocation
page read and write
4D54000
direct allocation
page read and write
4458000
direct allocation
page read and write
495F000
stack
page read and write
2CE0000
heap
page read and write
3260000
heap
page read and write
2E0A000
direct allocation
page read and write
4DF1000
direct allocation
page read and write
333F000
stack
page read and write
2CEA000
heap
page read and write
524000
unkown
page readonly
22DC000
stack
page read and write
2AB0000
heap
page read and write
2AF0000
heap
page read and write
2EEB000
stack
page read and write
327E000
stack
page read and write
4706000
direct allocation
page read and write
4B3C000
direct allocation
page read and write
31AE000
stack
page read and write
45C1000
direct allocation
page read and write
4482000
direct allocation
page read and write
3250000
heap
page read and write
252B000
stack
page read and write
2890000
heap
page read and write
2F90000
heap
page read and write
4484000
direct allocation
page read and write
2A9A000
heap
page read and write
459D000
direct allocation
page read and write
2620000
heap
page read and write
341A000
heap
page read and write
2DFC000
direct allocation
page read and write
4D92000
direct allocation
page read and write
45BA000
direct allocation
page read and write
4A08000
direct allocation
page read and write
3540000
heap
page read and write
487E000
stack
page read and write
42C8000
direct allocation
page read and write
44C4000
direct allocation
page read and write
3700000
heap
page read and write
332A000
heap
page read and write
307C000
stack
page read and write
327F000
stack
page read and write
263C000
stack
page read and write
46E1000
direct allocation
page read and write
2B30000
heap
page read and write
2F60000
heap
page read and write
44E8000
direct allocation
page read and write
31AE000
stack
page read and write
471C000
direct allocation
page read and write
41E1000
direct allocation
page read and write
524000
unkown
page readonly
488F000
stack
page read and write
3080000
heap
page read and write
2E40000
heap
page read and write
4843000
direct allocation
page read and write
2CE0000
heap
page read and write
4858000
direct allocation
page read and write
43B1000
direct allocation
page read and write
42B8000
direct allocation
page read and write
2990000
heap
page read and write
4DEA000
direct allocation
page read and write
4D63000
direct allocation
page read and write
307B000
stack
page read and write
4B1C000
direct allocation
page read and write
427D000
direct allocation
page read and write
4D71000
direct allocation
page read and write
28EB000
stack
page read and write
4CD0000
heap
page read and write
422A000
direct allocation
page read and write
126F000
stack
page read and write
42DD000
direct allocation
page read and write
2FEC000
stack
page read and write
32D0000
heap
page read and write
4D38000
direct allocation
page read and write
266A000
heap
page read and write
2850000
heap
page read and write
4BA3000
direct allocation
page read and write
3420000
heap
page read and write
4386000
direct allocation
page read and write
4EDC000
direct allocation
page read and write
520000
unkown
page write copy
46E8000
direct allocation
page read and write
4DFD000
direct allocation
page read and write
4DFF000
stack
page read and write
4491000
direct allocation
page read and write
510000
unkown
page write copy
421C000
direct allocation
page read and write
4DCA000
direct allocation
page read and write
288A000
heap
page read and write
4401000
direct allocation
page read and write
4F70000
heap
page read and write
4E63000
direct allocation
page read and write
4EC6000
direct allocation
page read and write
4DD3000
direct allocation
page read and write
484B000
direct allocation
page read and write
47E3000
direct allocation
page read and write
4D6A000
direct allocation
page read and write
260E000
stack
page read and write
490E000
stack
page read and write
4E1A000
direct allocation
page read and write
29FE000
stack
page read and write
439C000
direct allocation
page read and write
36A0000
heap
page read and write
2A6B000
stack
page read and write
2C8E000
stack
page read and write
4D78000
direct allocation
page read and write
4B2D000
direct allocation
page read and write
4B86000
direct allocation
page read and write
4B78000
direct allocation
page read and write
520000
unkown
page write copy
4AF4000
direct allocation
page read and write
429A000
direct allocation
page read and write
4B9C000
direct allocation
page read and write
2EAE000
stack
page read and write
32A0000
heap
page read and write
4BB1000
direct allocation
page read and write
301A000
heap
page read and write
4D5F000
stack
page read and write
4E9A000
direct allocation
page read and write
32D0000
heap
page read and write
4368000
direct allocation
page read and write
524000
unkown
page readonly
3590000
heap
page read and write
522000
unkown
page readonly
3290000
heap
page read and write
4206000
direct allocation
page read and write
47A1000
direct allocation
page read and write
4301000
direct allocation
page read and write
513000
unkown
page write copy
400000
unkown
page readonly
4E38000
direct allocation
page read and write
2FAC000
stack
page read and write
4B51000
direct allocation
page read and write
4AE8000
direct allocation
page read and write
2E18000
direct allocation
page read and write
4723000
direct allocation
page read and write
50F000
unkown
page read and write
479A000
direct allocation
page read and write
400000
unkown
page readonly
3320000
heap
page read and write
4AB2000
direct allocation
page read and write
2AC0000
heap
page read and write
43AA000
direct allocation
page read and write
44BD000
direct allocation
page read and write
29BD000
stack
page read and write
12F0000
heap
page read and write
273F000
stack
page read and write
4258000
direct allocation
page read and write
4886000
direct allocation
page read and write
3250000
heap
page read and write
2A20000
heap
page read and write
2BAC000
stack
page read and write
4EBF000
direct allocation
page read and write
303B000
stack
page read and write
4EE1000
direct allocation
page read and write
4768000
direct allocation
page read and write
420D000
direct allocation
page read and write
478C000
direct allocation
page read and write
4DBF000
direct allocation
page read and write
436F000
stack
page read and write
4EC8000
direct allocation
page read and write
2F70000
heap
page read and write
2DF4000
direct allocation
page read and write
401000
unkown
page execute read
47D4000
direct allocation
page read and write
4F50000
heap
page read and write
2F10000
heap
page read and write
2EE0000
heap
page read and write
44B6000
direct allocation
page read and write
4DEF000
direct allocation
page read and write
2A3E000
stack
page read and write
48A0000
heap
page read and write
33FF000
stack
page read and write
474A000
direct allocation
page read and write
29DC000
stack
page read and write
482D000
direct allocation
page read and write
4FBF000
stack
page read and write
518000
unkown
page read and write
51D000
unkown
page read and write
4A50000
heap
page read and write
4596000
direct allocation
page read and write
4AD8000
direct allocation
page read and write
256C000
stack
page read and write
2DD0000
heap
page read and write
4EED000
direct allocation
page read and write
4268000
direct allocation
page read and write
2960000
heap
page read and write
44E1000
direct allocation
page read and write
27FE000
stack
page read and write
5100000
heap
page read and write
2FEC000
stack
page read and write
2FA0000
heap
page read and write
4284000
direct allocation
page read and write
4AE6000
direct allocation
page read and write
47CD000
direct allocation
page read and write
2800000
heap
page read and write
4D6F000
stack
page read and write
4D28000
direct allocation
page read and write
32EE000
stack
page read and write
4DB6000
direct allocation
page read and write
423B000
direct allocation
page read and write
4E92000
direct allocation
page read and write
41E8000
direct allocation
page read and write
42D6000
direct allocation
page read and write
2E10000
heap
page read and write
329C000
stack
page read and write
4D82000
direct allocation
page read and write
511000
unkown
page read and write
521000
unkown
page read and write
4A3A000
direct allocation
page read and write
4ED8000
direct allocation
page read and write
42A8000
direct allocation
page read and write
2CA0000
heap
page read and write
4214000
direct allocation
page read and write
2D70000
heap
page read and write
2490000
heap
page read and write
4B11000
direct allocation
page read and write
349F000
stack
page read and write
4AF8000
direct allocation
page read and write
4DBF000
direct allocation
page read and write
42FA000
direct allocation
page read and write
10F0000
heap
page read and write
2A90000
heap
page read and write
47DC000
direct allocation
page read and write
4B26000
direct allocation
page read and write
29FF000
stack
page read and write
4F23000
direct allocation
page read and write
2D2E000
stack
page read and write
4DE8000
direct allocation
page read and write
4868000
direct allocation
page read and write
2E7C000
stack
page read and write
308A000
heap
page read and write
2EBB000
stack
page read and write
4468000
direct allocation
page read and write
3120000
heap
page read and write
289F000
stack
page read and write
45AC000
direct allocation
page read and write
292C000
stack
page read and write
456A000
direct allocation
page read and write
4D9A000
direct allocation
page read and write
4B18000
direct allocation
page read and write
43B8000
direct allocation
page read and write
4588000
direct allocation
page read and write
42A2000
direct allocation
page read and write
4F13000
direct allocation
page read and write
448A000
direct allocation
page read and write
4394000
direct allocation
page read and write
4738000
direct allocation
page read and write
4740000
heap
page read and write
4E54000
direct allocation
page read and write
4D91000
direct allocation
page read and write
4EDA000
direct allocation
page read and write
4D9E000
stack
page read and write
2D90000
heap
page read and write
4A1D000
direct allocation
page read and write
42AA000
direct allocation
page read and write
4DA8000
direct allocation
page read and write
33F0000
heap
page read and write
401000
unkown
page execute read
32B0000
heap
page read and write
4E21000
direct allocation
page read and write
352E000
stack
page read and write
2E8A000
heap
page read and write
2690000
heap
page read and write
5070000
heap
page read and write
2880000
heap
page read and write
4E28000
direct allocation
page read and write
3410000
heap
page read and write
3010000
heap
page read and write
310E000
stack
page read and write
32BE000
stack
page read and write
42CF000
direct allocation
page read and write
32AA000
heap
page read and write
4ED4000
direct allocation
page read and write
47C6000
direct allocation
page read and write
4E1A000
direct allocation
page read and write
4AD2000
direct allocation
page read and write
32F0000
heap
page read and write
4EE8000
direct allocation
page read and write
284F000
stack
page read and write
4B03000
direct allocation
page read and write
4308000
direct allocation
page read and write
27BF000
stack
page read and write
329F000
stack
page read and write
FE0000
heap
page read and write
116E000
stack
page read and write
4451000
direct allocation
page read and write
484A000
direct allocation
page read and write
4E28000
direct allocation
page read and write
41DA000
direct allocation
page read and write
2730000
heap
page read and write
32C0000
heap
page read and write
4EC1000
direct allocation
page read and write
511000
unkown
page read and write
4AFC000
direct allocation
page read and write
4B2A000
direct allocation
page read and write
4571000
direct allocation
page read and write
281F000
stack
page read and write
47A8000
direct allocation
page read and write
3590000
heap
page read and write
483C000
direct allocation
page read and write
2A3B000
stack
page read and write
4B61000
direct allocation
page read and write
4A24000
direct allocation
page read and write
444A000
direct allocation
page read and write
48A3000
direct allocation
page read and write
334F000
stack
page read and write
4B5A000
direct allocation
page read and write
3290000
heap
page read and write
2CEF000
stack
page read and write
4DC6000
direct allocation
page read and write
4DDC000
direct allocation
page read and write
4DD8000
direct allocation
page read and write
2EFD000
stack
page read and write
2970000
heap
page read and write
4F03000
direct allocation
page read and write
489C000
direct allocation
page read and write
2EEA000
heap
page read and write
4F2A000
direct allocation
page read and write
4EF1000
direct allocation
page read and write
23FE000
stack
page read and write
4731000
direct allocation
page read and write
4DAE000
stack
page read and write
4D98000
direct allocation
page read and write
21EB000
stack
page read and write
4276000
direct allocation
page read and write
4792000
direct allocation
page read and write
400000
unkown
page readonly
2E1F000
stack
page read and write
4ED2000
direct allocation
page read and write
51D000
unkown
page read and write
234B000
stack
page read and write
4D7E000
stack
page read and write
2E03000
direct allocation
page read and write
33BE000
stack
page read and write
4B0D000
direct allocation
page read and write
4E12000
direct allocation
page read and write
4D3F000
direct allocation
page read and write
4D46000
direct allocation
page read and write
2EC0000
heap
page read and write
275E000
stack
page read and write
2B20000
heap
page read and write
4F06000
direct allocation
page read and write
23EB000
stack
page read and write
48B1000
direct allocation
page read and write
4A0F000
direct allocation
page read and write
42EC000
direct allocation
page read and write
513000
unkown
page write copy
2DC8000
direct allocation
page read and write
4DEA000
direct allocation
page read and write
2D90000
heap
page read and write
4EFF000
direct allocation
page read and write
4E04000
direct allocation
page read and write
2C5E000
stack
page read and write
4EA8000
direct allocation
page read and write
4B58000
direct allocation
page read and write
289A000
heap
page read and write
2E80000
heap
page read and write
2D4E000
stack
page read and write
325B000
stack
page read and write
4B4A000
direct allocation
page read and write
46DA000
direct allocation
page read and write
485A000
direct allocation
page read and write
4EE8000
direct allocation
page read and write
4DCD000
direct allocation
page read and write
4808000
direct allocation
page read and write
522000
unkown
page readonly
26F0000
heap
page read and write
4EBA000
direct allocation
page read and write
521000
unkown
page read and write
2DDF000
direct allocation
page read and write
25DB000
stack
page read and write
4EF4000
direct allocation
page read and write
49E2000
direct allocation
page read and write
4DAF000
direct allocation
page read and write
472A000
direct allocation
page read and write
4D2E000
stack
page read and write
4EFD000
direct allocation
page read and write
243C000
stack
page read and write
328E000
stack
page read and write
4DCD000
direct allocation
page read and write
2C1E000
stack
page read and write
4B43000
direct allocation
page read and write
277E000
stack
page read and write
518000
unkown
page read and write
32A0000
heap
page read and write
2DE6000
direct allocation
page read and write
277E000
stack
page read and write
477D000
direct allocation
page read and write
43DD000
direct allocation
page read and write
43B8000
direct allocation
page read and write
229B000
stack
page read and write
4DC4000
direct allocation
page read and write
4B0A000
direct allocation
page read and write
2D0E000
stack
page read and write
2CD0000
heap
page read and write
4DE3000
direct allocation
page read and write
4A16000
direct allocation
page read and write
49DF000
stack
page read and write
4B38000
direct allocation
page read and write
2FAB000
stack
page read and write
4E20000
heap
page read and write
2D7A000
heap
page read and write
51F000
unkown
page read and write
4E46000
direct allocation
page read and write
2FAB000
stack
page read and write
4ADA000
direct allocation
page read and write
477F000
stack
page read and write
4E3F000
direct allocation
page read and write
487F000
direct allocation
page read and write
4D7F000
stack
page read and write
41D2000
direct allocation
page read and write
2E3C000
stack
page read and write
43FA000
direct allocation
page read and write
2550000
heap
page read and write
4231000
direct allocation
page read and write
4751000
direct allocation
page read and write
4ED1000
direct allocation
page read and write
4DEF000
stack
page read and write
448C000
direct allocation
page read and write
4CB0000
heap
page read and write
2DDA000
heap
page read and write
328F000
stack
page read and write
2B60000
heap
page read and write
4D9A000
direct allocation
page read and write
438D000
direct allocation
page read and write
4B01000
direct allocation
page read and write
323E000
stack
page read and write
44DA000
direct allocation
page read and write
4352000
direct allocation
page read and write
47BF000
direct allocation
page read and write
4D1A000
direct allocation
page read and write
4C60000
heap
page read and write
4878000
direct allocation
page read and write
449A000
direct allocation
page read and write
32E0000
heap
page read and write
324E000
stack
page read and write
4E71000
direct allocation
page read and write
243C000
stack
page read and write
4758000
direct allocation
page read and write
27BE000
stack
page read and write
43B1000
direct allocation
page read and write
345E000
stack
page read and write
3200000
heap
page read and write
2E10000
heap
page read and write
2B90000
heap
page read and write
2340000
heap
page read and write
4A1F000
stack
page read and write
51B0000
heap
page read and write
2D60000
heap
page read and write
4EA1000
direct allocation
page read and write
252E000
stack
page read and write
2D80000
heap
page read and write
4F11000
direct allocation
page read and write
4EB2000
direct allocation
page read and write
47F1000
direct allocation
page read and write
4DF6000
direct allocation
page read and write
35F0000
heap
page read and write
2AB0000
heap
page read and write
4EDF000
direct allocation
page read and write
285E000
stack
page read and write
4894000
direct allocation
page read and write
3030000
heap
page read and write
522000
unkown
page readonly
27DE000
stack
page read and write
29BE000
stack
page read and write
51D0000
heap
page read and write
4CAF000
stack
page read and write
42E4000
direct allocation
page read and write
4B31000
direct allocation
page read and write
43D6000
direct allocation
page read and write
4DE1000
direct allocation
page read and write
4B18000
direct allocation
page read and write
32DE000
stack
page read and write
4834000
direct allocation
page read and write
27DF000
stack
page read and write
43C8000
direct allocation
page read and write
48BF000
stack
page read and write
4F1A000
direct allocation
page read and write
4F21000
direct allocation
page read and write
33FF000
stack
page read and write
479A000
direct allocation
page read and write
4714000
direct allocation
page read and write
35EE000
stack
page read and write
279E000
stack
page read and write
4826000
direct allocation
page read and write
432E000
stack
page read and write
510000
unkown
page write copy
4DD4000
direct allocation
page read and write
2C10000
heap
page read and write
4A48000
direct allocation
page read and write
4D12000
direct allocation
page read and write
305B000
stack
page read and write
45B3000
direct allocation
page read and write
4A33000
direct allocation
page read and write
4E21000
direct allocation
page read and write
3330000
heap
page read and write
2DDE000
stack
page read and write
4F1C000
direct allocation
page read and write
4B23000
direct allocation
page read and write
43A3000
direct allocation
page read and write
4F0D000
direct allocation
page read and write
510000
unkown
page write copy
426F000
direct allocation
page read and write
47B8000
direct allocation
page read and write
316E000
stack
page read and write
327C000
stack
page read and write
2CBB000
stack
page read and write
25D0000
heap
page read and write
2A8B000
stack
page read and write
275F000
stack
page read and write
47F2000
direct allocation
page read and write
26A0000
heap
page read and write
4A2C000
direct allocation
page read and write
4F04000
direct allocation
page read and write
2E7C000
stack
page read and write
4D5C000
direct allocation
page read and write
2580000
heap
page read and write
4EE3000
direct allocation
page read and write
32FE000
stack
page read and write
4D3E000
stack
page read and write
50F0000
heap
page read and write
4493000
direct allocation
page read and write
3120000
heap
page read and write
24A0000
heap
page read and write
499E000
stack
page read and write
237C000
stack
page read and write
4780000
heap
page read and write
29FE000
stack
page read and write
4960000
heap
page read and write
2F6B000
stack
page read and write
470D000
direct allocation
page read and write
271E000
stack
page read and write
4AFF000
direct allocation
page read and write
4B14000
direct allocation
page read and write
44A8000
direct allocation
page read and write
2350000
heap
page read and write
29B0000
heap
page read and write
4DDC000
direct allocation
page read and write
2590000
heap
page read and write
4360000
heap
page read and write
35FA000
heap
page read and write
2FA0000
heap
page read and write
4DA1000
direct allocation
page read and write
4E5C000
direct allocation
page read and write
238C000
stack
page read and write
4ABA000
direct allocation
page read and write
4818000
direct allocation
page read and write
2CA0000
heap
page read and write
43EC000
direct allocation
page read and write
446F000
direct allocation
page read and write
3170000
heap
page read and write
255A000
heap
page read and write
21DB000
stack
page read and write
1120000
heap
page read and write
4DBD000
direct allocation
page read and write
45FF000
stack
page read and write
50F000
unkown
page read and write
2B10000
heap
page read and write
4DF8000
direct allocation
page read and write
3250000
heap
page read and write
51F000
unkown
page read and write
12AE000
stack
page read and write
2D60000
heap
page read and write
49DE000
stack
page read and write
2A5A000
heap
page read and write
518000
unkown
page read and write
2EC0000
heap
page read and write
4578000
direct allocation
page read and write
2DD8000
direct allocation
page read and write
331F000
stack
page read and write
4AC1000
direct allocation
page read and write
48CD000
stack
page read and write
4E6A000
direct allocation
page read and write
4E13000
direct allocation
page read and write
2DC1000
direct allocation
page read and write
36DE000
stack
page read and write
45B0000
heap
page read and write
511000
unkown
page read and write
2D70000
heap
page read and write
4861000
direct allocation
page read and write
50F000
unkown
page read and write
513000
unkown
page write copy
4784000
direct allocation
page read and write
2FB0000
heap
page read and write
481F000
direct allocation
page read and write
3410000
heap
page read and write
3220000
heap
page read and write
4BAA000
direct allocation
page read and write
2660000
heap
page read and write
2E70000
heap
page read and write
303E000
stack
page read and write
323E000
stack
page read and write
46FF000
direct allocation
page read and write
4408000
direct allocation
page read and write
3380000
heap
page read and write
31D0000
heap
page read and write
2F30000
heap
page read and write
4851000
direct allocation
page read and write
4DB8000
direct allocation
page read and write
4B8D000
direct allocation
page read and write
32B0000
heap
page read and write
5050000
heap
page read and write
49FF000
stack
page read and write
45C8000
direct allocation
page read and write
4AF2000
direct allocation
page read and write
4560000
heap
page read and write
4E4D000
direct allocation
page read and write
4793000
direct allocation
page read and write
3300000
heap
page read and write
2E3B000
stack
page read and write
247A000
heap
page read and write
3550000
heap
page read and write
3370000
heap
page read and write
4DC2000
direct allocation
page read and write
233B000
stack
page read and write
2CAA000
heap
page read and write
2DBA000
direct allocation
page read and write
4DE8000
direct allocation
page read and write
4ED8000
direct allocation
page read and write
4B52000
direct allocation
page read and write
2A70000
heap
page read and write
2DDE000
stack
page read and write
2C9E000
stack
page read and write
2DB0000
heap
page read and write
521000
unkown
page read and write
3050000
heap
page read and write
4742000
direct allocation
page read and write
4B34000
direct allocation
page read and write
41CF000
stack
page read and write
4C3F000
stack
page read and write
3340000
heap
page read and write
45A4000
direct allocation
page read and write
4BB8000
direct allocation
page read and write
2CDF000
stack
page read and write
4B06000
direct allocation
page read and write
342A000
heap
page read and write
44D3000
direct allocation
page read and write
2DAF000
stack
page read and write
2A50000
heap
page read and write
4E0C000
direct allocation
page read and write
283F000
stack
page read and write
4DD1000
direct allocation
page read and write
28A0000
heap
page read and write
4801000
direct allocation
page read and write
4EB8000
direct allocation
page read and write
2C40000
heap
page read and write
488D000
direct allocation
page read and write
4251000
direct allocation
page read and write
4F31000
direct allocation
page read and write
47FA000
direct allocation
page read and write
3190000
heap
page read and write
4EC2000
direct allocation
page read and write
3340000
heap
page read and write
29FE000
stack
page read and write
35E0000
heap
page read and write
32C0000
heap
page read and write
43F3000
direct allocation
page read and write
2E11000
direct allocation
page read and write
331E000
stack
page read and write
2840000
heap
page read and write
2470000
heap
page read and write
334A000
heap
page read and write
4F38000
direct allocation
page read and write
31EF000
stack
page read and write
4AC8000
direct allocation
page read and write
2DFE000
stack
page read and write
30F0000
heap
page read and write
314E000
stack
page read and write
3300000
heap
page read and write
4B1F000
direct allocation
page read and write
51D000
unkown
page read and write
4ADF000
direct allocation
page read and write
435A000
direct allocation
page read and write
42F3000
direct allocation
page read and write
4DB8000
direct allocation
page read and write
4D21000
direct allocation
page read and write
4AFA000
direct allocation
page read and write
46D0000
heap
page read and write
48AA000
direct allocation
page read and write
303A000
heap
page read and write
2E3B000
stack
page read and write
323B000
stack
page read and write
F7C000
stack
page read and write
309C000
stack
page read and write
31F0000
heap
page read and write
2B6B000
stack
page read and write
2870000
heap
page read and write
4562000
direct allocation
page read and write
33F0000
heap
page read and write
4293000
direct allocation
page read and write
4DE3000
direct allocation
page read and write
47F8000
direct allocation
page read and write
23E0000
heap
page read and write
4ECD000
direct allocation
page read and write
33FA000
heap
page read and write
46F8000
direct allocation
page read and write
4DC6000
direct allocation
page read and write
4F0A000
direct allocation
page read and write
31F0000
heap
page read and write
2ACC000
stack
page read and write
49F1000
direct allocation
page read and write
2D50000
heap
page read and write
2C50000
heap
page read and write
338A000
heap
page read and write
4CF0000
heap
page read and write
458F000
direct allocation
page read and write
4EFC000
direct allocation
page read and write
2CFC000
stack
page read and write
4DDF000
stack
page read and write
2EFA000
heap
page read and write
2D0E000
stack
page read and write
341F000
stack
page read and write
401000
unkown
page execute read
There are 819 hidden memdumps, click here to show them.