IOC Report
zzkCIdCoDt.exe

loading gif

Files

File Path
Type
Category
Malicious
zzkCIdCoDt.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\zzkCIdCoDt.dll"
malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\zzkCIdCoDt.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\zzkCIdCoDt.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\zzkCIdCoDt.dll,DllRegisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AmhzcKVtZLl\siQPBMdwCPAb.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\QxWCKZstQphkP\egknjpoziqlzVL.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\CXPSzCIcOMY\wxJWjHQhm.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\BlngRITsHraAEaQWw\tRWuLwwWwn.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\AmhzcKVtZLl\siQPBMdwCPAb.dll
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\UOEgTmwbpKANXEqN\KElhycJrzKCpLgeP.dll"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\zzkCIdCoDt.dll",#1
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://172.105.115.71:8080/xucipr/ysjolf/ncmjlqi/
unknown
https://172.105.115.71:8080/z
unknown

IPs

IP
Domain
Country
Malicious
172.105.115.71
unknown
United States
malicious
188.165.79.151
unknown
France
malicious
196.44.98.190
unknown
Ghana
malicious
174.138.33.49
unknown
United States
malicious
36.67.23.59
unknown
Indonesia
malicious
103.41.204.169
unknown
Indonesia
malicious
85.214.67.203
unknown
Germany
malicious
83.229.80.93
unknown
United Kingdom
malicious
198.199.70.22
unknown
United States
malicious
93.104.209.107
unknown
Germany
malicious
186.250.48.5
unknown
Brazil
malicious
209.239.112.82
unknown
United States
malicious
175.126.176.79
unknown
Korea Republic of
malicious
128.199.242.164
unknown
United Kingdom
malicious
178.238.225.252
unknown
Germany
malicious
46.101.98.60
unknown
Netherlands
malicious
190.145.8.4
unknown
Colombia
malicious
82.98.180.154
unknown
Spain
malicious
103.71.99.57
unknown
India
malicious
87.106.97.83
unknown
Germany
malicious
103.254.12.236
unknown
Viet Nam
malicious
103.85.95.4
unknown
Indonesia
malicious
202.134.4.210
unknown
Indonesia
malicious
165.22.254.236
unknown
United States
malicious
78.47.204.80
unknown
Germany
malicious
118.98.72.86
unknown
Indonesia
malicious
139.59.80.108
unknown
Singapore
malicious
104.244.79.94
unknown
United States
malicious
37.44.244.177
unknown
Germany
malicious
51.75.33.122
unknown
France
malicious
160.16.143.191
unknown
Japan
malicious
103.56.149.105
unknown
Indonesia
malicious
85.25.120.45
unknown
Germany
malicious
139.196.72.155
unknown
China
malicious
115.178.55.22
unknown
Indonesia
malicious
103.126.216.86
unknown
Bangladesh
malicious
128.199.217.206
unknown
United Kingdom
malicious
114.79.130.68
unknown
India
malicious
103.224.241.74
unknown
India
malicious
210.57.209.142
unknown
Indonesia
malicious
202.28.34.99
unknown
Thailand
malicious
80.211.107.116
unknown
Italy
malicious
54.37.228.122
unknown
France
malicious
218.38.121.17
unknown
Korea Republic of
malicious
185.148.169.10
unknown
Germany
malicious
195.77.239.39
unknown
Spain
malicious
178.62.112.199
unknown
European Union
malicious
62.171.178.147
unknown
United Kingdom
malicious
64.227.55.231
unknown
United States
malicious
There are 39 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
siQPBMdwCPAb.dll
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
180001000
direct allocation
page execute read
malicious
B00000
direct allocation
page execute and read and write
malicious
2AB001A0000
direct allocation
page execute and read and write
malicious
CF0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
13B3E6B0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
2D00000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
195A6500000
direct allocation
page execute and read and write
malicious
B70000
trusted library allocation
page read and write
1F539856000
heap
page read and write
1C44CE28000
heap
page read and write
D90000
heap
page read and write
2650000
trusted library allocation
page read and write
177D8EE0000
heap
page read and write
2042AA50000
heap
page read and write
1F53982F000
heap
page read and write
830000
heap
page read and write
2501D640000
heap
page read and write
C08000
heap
page read and write
D98000
heap
page read and write
C06267C000
stack
page read and write
2042B402000
heap
page read and write
2708B25A000
heap
page read and write
9A3000
heap
page read and write
C0628F9000
stack
page read and write
1E2F2340000
heap
page read and write
60A0000
heap
page read and write
1E2F242A000
heap
page read and write
277E000
stack
page read and write
BC0000
remote allocation
page read and write
7FFC28900000
unkown
page readonly
177D9113000
heap
page read and write
1F539894000
heap
page read and write
2A1D000
stack
page read and write
24DA000
heap
page read and write
262B87F000
stack
page read and write
1187000
heap
page read and write
2708B24E000
heap
page read and write
13B4004C000
heap
page read and write
2042AD02000
heap
page read and write
BDDEEFE000
stack
page read and write
ACE000
heap
page read and write
2B2E7990000
heap
page read and write
A80000
direct allocation
page execute and read and write
1F53A213000
heap
page read and write
11A4000
heap
page read and write
B70000
trusted library allocation
page read and write
C21000
heap
page read and write
1E2F2459000
heap
page read and write
16C93640000
trusted library allocation
page read and write
24DA000
heap
page read and write
13B3E9D0000
trusted library allocation
page read and write
195A7EBC000
heap
page read and write
1E2F245A000
heap
page read and write
2E39000
stack
page read and write
1187000
heap
page read and write
1F53A231000
heap
page read and write
195A6560000
trusted library allocation
page read and write
180000000
direct allocation
page read and write
2708B22A000
heap
page read and write
2708B263000
heap
page read and write
177D9013000
heap
page read and write
929000
heap
page read and write
24DA000
heap
page read and write
2042B532000
heap
page read and write
11DB000
heap
page read and write
A90000
remote allocation
page read and write
1C44CE64000
heap
page read and write
195A6623000
heap
page read and write
2498000
heap
page read and write
B90000
heap
page read and write
2B2E7B02000
heap
page read and write
2590000
heap
page read and write
B21057D000
stack
page read and write
7FFC2897E000
unkown
page read and write
1F539680000
heap
page read and write
8F9000
heap
page read and write
2EF50DC000
stack
page read and write
177D9041000
heap
page read and write
1F5399BA000
heap
page read and write
C52000
heap
page read and write
1000000
heap
page read and write
2501D613000
heap
page read and write
C2E000
heap
page read and write
ACE000
heap
page read and write
195A8480000
heap
page read and write
CD0000
heap
page read and write
16C935E0000
trusted library allocation
page read and write
2501D5D0000
remote allocation
page read and write
1198000
heap
page read and write
DC6000
heap
page read and write
918000
heap
page read and write
18002D000
direct allocation
page readonly
93B000
heap
page read and write
1E2F2434000
heap
page read and write
935000
heap
page read and write
18002D000
direct allocation
page readonly
905000
heap
page read and write
B50000
trusted library allocation
page read and write
F3D000
heap
page read and write
2501D651000
heap
page read and write
987000
heap
page read and write
2708B200000
heap
page read and write
34612FE000
stack
page read and write
1F53A122000
heap
page read and write
16C927D9000
heap
page read and write
982000
heap
page read and write
2B2E7A40000
heap
page read and write
99D000
heap
page read and write
CA3F6FA000
stack
page read and write
982000
heap
page read and write
262B9FE000
stack
page read and write
24DA000
heap
page read and write
905000
heap
page read and write
2EF515E000
stack
page read and write
111A9BB000
stack
page read and write
177D9002000
heap
page read and write
24B34FC000
stack
page read and write
18002D000
direct allocation
page readonly
7294BFE000
stack
page read and write
1E2F2443000
heap
page read and write
C2E000
heap
page read and write
918000
heap
page read and write
949000
heap
page read and write
177D906C000
heap
page read and write
2042A9E0000
heap
page read and write
DBE000
heap
page read and write
2488000
heap
page read and write
BC5000
heap
page read and write
13B40270000
heap
page read and write
2C9F000
stack
page read and write
13B3E740000
heap
page read and write
2501D440000
heap
page read and write
1F53A154000
heap
page read and write
1C44CC20000
heap
page read and write
C4D000
heap
page read and write
180000000
direct allocation
page read and write
92E000
heap
page read and write
1E2F244E000
heap
page read and write
95A000
heap
page read and write
2540000
heap
page read and write
A90000
remote allocation
page read and write
16C92680000
trusted library allocation
page read and write
ADC000
heap
page read and write
2AB002B7000
heap
page read and write
1F53A002000
heap
page read and write
918000
heap
page read and write
CC0000
remote allocation
page read and write
947000
heap
page read and write
251E000
stack
page read and write
1E2F2C02000
trusted library allocation
page read and write
1E2F247F000
heap
page read and write
24B35F9000
stack
page read and write
2EF56FB000
stack
page read and write
2660000
heap
page read and write
2501D4A0000
heap
page read and write
2441000
heap
page read and write
2501D430000
heap
page read and write
2593000
heap
page read and write
2800000
heap
page read and write
C20000
heap
page read and write
262BE7F000
stack
page read and write
C55000
heap
page read and write
99E000
heap
page read and write
8EB000
heap
page read and write
981000
heap
page read and write
B08000
heap
page read and write
23E0000
heap
page read and write
58C0000
trusted library allocation
page read and write
27DE000
stack
page read and write
AD5000
heap
page read and write
13B3E75F000
heap
page read and write
F10000
heap
page read and write
BD0000
heap
page read and write
177D9065000
heap
page read and write
195A6390000
heap
page read and write
7FFC28985000
unkown
page readonly
2650000
trusted library allocation
page read and write
2950000
heap
page read and write
C55000
heap
page read and write
72949FA000
stack
page read and write
1E2F2464000
heap
page read and write
D00000
heap
page read and write
16C935C0000
trusted library allocation
page read and write
850000
heap
page read and write
820000
remote allocation
page read and write
579A1FF000
stack
page read and write
935000
heap
page read and write
2663000
heap
page read and write
18002C000
direct allocation
page read and write
F61000
heap
page read and write
2042AB50000
trusted library allocation
page read and write
195A6663000
heap
page read and write
7FFC28982000
unkown
page readonly
195A6617000
heap
page read and write
DAF000
heap
page read and write
AA0000
heap
page read and write
18002B000
direct allocation
page readonly
16C929B0000
trusted library allocation
page read and write
BC0000
heap
page read and write
2B2E7A52000
heap
page read and write
7FFC2897E000
unkown
page read and write
7FFC28987000
unkown
page readonly
1F53985B000
heap
page read and write
925000
heap
page read and write
2042AC13000
heap
page read and write
2708B313000
heap
page read and write
2708CCB0000
trusted library allocation
page read and write
7FFC28938000
unkown
page readonly
195A6617000
heap
page read and write
195A6603000
heap
page read and write
946000
heap
page read and write
2C0F000
stack
page read and write
3460DFD000
stack
page read and write
ADF000
heap
page read and write
3460AFC000
stack
page read and write
2AB001E0000
heap
page readonly
2AB00299000
heap
page read and write
1E2F2449000
heap
page read and write
7FFC28987000
unkown
page readonly
C0627FE000
stack
page read and write
DBE000
heap
page read and write
949000
heap
page read and write
119E000
heap
page read and write
1C44CF02000
heap
page read and write
2708B213000
heap
page read and write
2B2E7980000
heap
page read and write
DB0000
heap
page read and write
BB5000
heap
page read and write
579A37E000
stack
page read and write
93C000
heap
page read and write
13B40020000
heap
page read and write
DC6000
heap
page read and write
CA3F1AC000
stack
page read and write
1E2F2468000
heap
page read and write
98B000
heap
page read and write
1F539893000
heap
page read and write
1345000
heap
page read and write
F34000
heap
page read and write
91D000
heap
page read and write
180000000
direct allocation
page read and write
B9C000
heap
page read and write
1E2F2434000
heap
page read and write
91D000
heap
page read and write
B80000
remote allocation
page read and write
5799F7C000
stack
page read and write
177D8FE0000
trusted library allocation
page read and write
2C00000
heap
page read and write
7FFC28901000
unkown
page execute read
F46000
heap
page read and write
7FFC28985000
unkown
page readonly
CA3F9F9000
stack
page read and write
13B3E640000
heap
page read and write
16C927DE000
heap
page read and write
2501D5D0000
remote allocation
page read and write
A80000
remote allocation
page read and write
2BEF000
stack
page read and write
16C929C5000
heap
page read and write
935000
heap
page read and write
24B7000
heap
page read and write
F45000
heap
page read and write
2AB0036C000
heap
page read and write
24B7000
heap
page read and write
2B2E7A13000
heap
page read and write
2CA0000
heap
page read and write
1C44CE79000
heap
page read and write
1F5397E0000
trusted library allocation
page read and write
93B000
heap
page read and write
13B3E748000
heap
page read and write
2708B170000
heap
page read and write
16C92940000
trusted library allocation
page read and write
13B3E799000
heap
page read and write
2042AD13000
heap
page read and write
2AB002B8000
heap
page read and write
2AB00150000
heap
page read and write
DCC000
heap
page read and write
180000000
direct allocation
page read and write
7FFC28938000
unkown
page readonly
1E2F22E0000
heap
page read and write
2B2E8202000
trusted library allocation
page read and write
2AB0025F000
heap
page read and write
938000
heap
page read and write
10F0000
heap
page read and write
C9A000
stack
page read and write
BDDEA7E000
stack
page read and write
11B8000
heap
page read and write
2E0E000
stack
page read and write
1E2F246E000
heap
page read and write
177D8E70000
heap
page read and write
18002C000
direct allocation
page read and write
C06277F000
stack
page read and write
B21027C000
stack
page read and write
18002B000
direct allocation
page readonly
11AF000
heap
page read and write
C678FE000
stack
page read and write
7FFC28987000
unkown
page readonly
BA0000
heap
page read and write
72944FA000
stack
page read and write
195A65FD000
heap
page read and write
1E2F2400000
heap
page read and write
1F539813000
heap
page read and write
2CF0000
heap
page read and write
2EAC000
heap
page read and write
13B3E7AB000
heap
page read and write
B08000
heap
page read and write
F3D000
heap
page read and write
940000
heap
page read and write
1E2F242F000
heap
page read and write
1F53A100000
heap
page read and write
2708B241000
heap
page read and write
8E0000
heap
page read and write
1E2F2432000
heap
page read and write
16C92700000
heap
page read and write
AE0000
heap
page read and write
2B1F000
stack
page read and write
262BD7C000
stack
page read and write
8F3000
heap
page read and write
BDDEDFF000
stack
page read and write
C44000
heap
page read and write
2AB004B0000
heap
page read and write
920000
heap
page read and write
2708B318000
heap
page read and write
1E2F246B000
heap
page read and write
7FFC28985000
unkown
page readonly
F45000
heap
page read and write
5E90000
heap
page read and write
1E2F2457000
heap
page read and write
B70000
heap
page read and write
7B0000
heap
page read and write
7FFC28938000
unkown
page readonly
1C44CE68000
heap
page read and write
2492000
heap
page read and write
195A7E90000
heap
page read and write
2461000
heap
page read and write
2708B24A000
heap
page read and write
1E2F2485000
heap
page read and write
24B30AB000
stack
page read and write
1330000
direct allocation
page execute and read and write
1E2F2478000
heap
page read and write
111AFFE000
stack
page read and write
13B3E730000
trusted library allocation
page read and write
24B367E000
stack
page read and write
1E2F2413000
heap
page read and write
1F53A1B0000
heap
page read and write
2E40000
trusted library allocation
page read and write
1E2F2431000
heap
page read and write
BDDE73C000
stack
page read and write
F61000
heap
page read and write
1165000
heap
page read and write
8A0000
direct allocation
page execute and read and write
7FFC28987000
unkown
page readonly
13B3E799000
heap
page read and write
24A6000
heap
page read and write
1340000
heap
page read and write
2B2E7A00000
heap
page read and write
C26000
heap
page read and write
7DB000
stack
page read and write
195A65F0000
heap
page read and write
8FF000
heap
page read and write
1F53A1BE000
heap
page read and write
177D9802000
trusted library allocation
page read and write
7A0000
heap
page read and write
2492000
heap
page read and write
7FFC28900000
unkown
page readonly
B80000
remote allocation
page read and write
7FFC28901000
unkown
page execute read
1F539800000
heap
page read and write
11A6000
heap
page read and write
2CF0000
heap
page read and write
177D905B000
heap
page read and write
11A6000
heap
page read and write
D05000
heap
page read and write
5960000
trusted library allocation
page read and write
2AB004A0000
heap
page read and write
2042ACBB000
heap
page read and write
9E0000
heap
page read and write
C06297C000
stack
page read and write
729467E000
stack
page read and write
10CE000
stack
page read and write
195A65C0000
heap
page read and write
195A6560000
trusted library allocation
page read and write
1C44CBC0000
heap
page read and write
2D30000
heap
page readonly
98B000
heap
page read and write
9A3000
heap
page read and write
7FFC2897E000
unkown
page read and write
2042AC29000
heap
page read and write
8FE000
heap
page read and write
2AB00220000
trusted library allocation
page read and write
2AB00266000
heap
page read and write
18002C000
direct allocation
page read and write
1E2F245D000
heap
page read and write
D25000
heap
page read and write
1E2F2461000
heap
page read and write
2AB00130000
heap
page read and write
AA8000
heap
page read and write
1C44CE02000
heap
page read and write
2501D602000
heap
page read and write
2B2E8140000
trusted library allocation
page read and write
DC6000
heap
page read and write
2488000
heap
page read and write
1E2F247B000
heap
page read and write
BDDE7BE000
stack
page read and write
2501D600000
heap
page read and write
270E000
stack
page read and write
AE4000
heap
page read and write
1187000
heap
page read and write
257C000
heap
page read and write
1E2F2458000
heap
page read and write
16C92670000
heap
page read and write
195A64D0000
heap
page read and write
ED0000
heap
page read and write
18002D000
direct allocation
page readonly
2042ACCC000
heap
page read and write
262B18C000
stack
page read and write
2042AC88000
heap
page read and write
AF3000
heap
page read and write
926000
heap
page read and write
2787000
stack
page read and write
2AB002B0000
heap
page read and write
2E40000
trusted library allocation
page read and write
5FB000
stack
page read and write
2B2E7A37000
heap
page read and write
7294B7F000
stack
page read and write
2488000
heap
page read and write
2B2E7A3E000
heap
page read and write
DC6000
heap
page read and write
2AB00278000
heap
page read and write
1F539913000
heap
page read and write
1C44CE13000
heap
page read and write
B95000
heap
page read and write
1C44CE40000
heap
page read and write
2AB00240000
heap
page read and write
2AB002C1000
heap
page read and write
B40000
trusted library allocation
page read and write
1F539829000
heap
page read and write
B21037C000
stack
page read and write
1F539670000
heap
page read and write
9A2000
heap
page read and write
5799EFE000
stack
page read and write
7FFC28985000
unkown
page readonly
111AEFB000
stack
page read and write
2708B1F0000
remote allocation
page read and write
1F539843000
heap
page read and write
B80000
remote allocation
page read and write
13B3E660000
heap
page read and write
255C000
stack
page read and write
2DCF000
stack
page read and write
2B2E7A45000
heap
page read and write
BC0000
remote allocation
page read and write
1C44CF00000
heap
page read and write
2BF0000
heap
page read and write
935000
heap
page read and write
AFF000
heap
page read and write
2AB002DC000
heap
page read and write
2AB002AA000
heap
page read and write
1F53988D000
heap
page read and write
7FFC28900000
unkown
page readonly
918000
heap
page read and write
7FFC28985000
unkown
page readonly
16C927BD000
heap
page read and write
C6752C000
stack
page read and write
2501D5D0000
remote allocation
page read and write
CA3F8FE000
stack
page read and write
16C927BD000
heap
page read and write
820000
remote allocation
page read and write
C4D000
heap
page read and write
2EF547F000
stack
page read and write
2EF54FC000
stack
page read and write
1E2F2446000
heap
page read and write
326E000
stack
page read and write
1F539888000
heap
page read and write
18002C000
direct allocation
page read and write
11C9000
heap
page read and write
8EF000
heap
page read and write
2610000
heap
page read and write
2708B1F0000
remote allocation
page read and write
7FFC28982000
unkown
page readonly
D20000
heap
page read and write
7FFC28900000
unkown
page readonly
195A661E000
heap
page read and write
8F9000
heap
page read and write
C3F000
heap
page read and write
2440000
heap
page read and write
1F53998F000
heap
page read and write
254E000
stack
page read and write
2708B25E000
heap
page read and write
91D000
heap
page read and write
2AB0026C000
heap
page read and write
2803000
heap
page read and write
262B77F000
stack
page read and write
DC6000
heap
page read and write
1F5399E6000
heap
page read and write
AD2000
heap
page read and write
B20F9DC000
stack
page read and write
949000
heap
page read and write
2042AC6C000
heap
page read and write
BCC000
heap
page read and write
3E3E000
stack
page read and write
2501D702000
heap
page read and write
CC0000
remote allocation
page read and write
16C93380000
trusted library allocation
page read and write
729477B000
stack
page read and write
5799C7C000
stack
page read and write
7FFC28938000
unkown
page readonly
13B3E6F0000
heap
page readonly
7FFC28900000
unkown
page readonly
177D9102000
heap
page read and write
2AB00440000
trusted library allocation
page read and write
9A3000
heap
page read and write
2501D62A000
heap
page read and write
116C000
heap
page read and write
7FFC28982000
unkown
page readonly
18002C000
direct allocation
page read and write
1C44CBB0000
heap
page read and write
2B6F000
stack
page read and write
2042B500000
heap
page read and write
1040000
heap
page read and write
A79000
stack
page read and write
2708B100000
heap
page read and write
DE1000
heap
page read and write
2708B25D000
heap
page read and write
1F53A1C9000
heap
page read and write
93F000
heap
page read and write
568E000
stack
page read and write
2EF567E000
stack
page read and write
BDDECFE000
stack
page read and write
2042A9F0000
heap
page read and write
262B8FC000
stack
page read and write
2708B1C0000
trusted library allocation
page read and write
7FFC28987000
unkown
page readonly
918000
heap
page read and write
2492000
heap
page read and write
B21017E000
stack
page read and write
1187000
heap
page read and write
1E2F243C000
heap
page read and write
B90000
heap
page read and write
18002B000
direct allocation
page readonly
2DBE000
stack
page read and write
13B3E75F000
heap
page read and write
2B4E000
stack
page read and write
2492000
heap
page read and write
7FFC28901000
unkown
page execute read
1F53A200000
heap
page read and write
1E2F2502000
heap
page read and write
1C44CDF0000
trusted library allocation
page read and write
2B9C000
stack
page read and write
1120000
heap
page read and write
111B1FB000
stack
page read and write
B21007E000
stack
page read and write
8F6000
heap
page read and write
9A2000
heap
page read and write
8FE000
heap
page read and write
949000
heap
page read and write
1043000
heap
page read and write
C67AFE000
stack
page read and write
58A0000
trusted library allocation
page read and write
949000
heap
page read and write
2B2E7A24000
heap
page read and write
2501DE02000
trusted library allocation
page read and write
F2F000
heap
page read and write
2EF5577000
stack
page read and write
1E2F245B000
heap
page read and write
16C929D0000
trusted library allocation
page read and write
195A6651000
heap
page read and write
579A17E000
stack
page read and write
2680000
heap
page read and write
2AB00273000
heap
page read and write
560F000
stack
page read and write
F3D000
heap
page read and write
579A2FD000
stack
page read and write
1E2F2460000
heap
page read and write
1F53A202000
heap
page read and write
93B000
heap
page read and write
16C935D0000
heap
page readonly
2AB001D0000
direct allocation
page execute and read and write
C36000
heap
page read and write
C06287E000
stack
page read and write
2AB00340000
heap
page read and write
2D39000
heap
page read and write
25DB000
stack
page read and write
1F53A190000
heap
page read and write
8F6000
heap
page read and write
935000
heap
page read and write
13B3E770000
heap
page read and write
F61000
heap
page read and write
1E2F2463000
heap
page read and write
8EF000
heap
page read and write
2AB00299000
heap
page read and write
7FFC28987000
unkown
page readonly
7FFC28982000
unkown
page readonly
24A7000
heap
page read and write
180000000
direct allocation
page read and write
16C929C0000
heap
page read and write
AEE000
heap
page read and write
195A662E000
heap
page read and write
DE1000
heap
page read and write
C00000
heap
page read and write
7FFC2897E000
unkown
page read and write
1150000
heap
page read and write
111B0FE000
stack
page read and write
C67DFD000
stack
page read and write
72947F9000
stack
page read and write
2AB00299000
heap
page read and write
7FFC28901000
unkown
page execute read
BDDEBFE000
stack
page read and write
B20FDFC000
stack
page read and write
2B2E7A02000
heap
page read and write
195A6540000
heap
page read and write
925000
heap
page read and write
2E4E000
stack
page read and write
1E2F2445000
heap
page read and write
1F539875000
heap
page read and write
177D9076000
heap
page read and write
DBE000
heap
page read and write
16C92950000
trusted library allocation
page read and write
8F6000
heap
page read and write
1C44CE56000
heap
page read and write
7FFC28938000
unkown
page readonly
13B3E6E0000
direct allocation
page execute and read and write
2708B202000
heap
page read and write
C67CFE000
stack
page read and write
98B000
heap
page read and write
2AB00000000
heap
page read and write
10BB000
stack
page read and write
7FFC28901000
unkown
page execute read
C56000
heap
page read and write
2042ACE6000
heap
page read and write
11B8000
heap
page read and write
10E0000
heap
page read and write
34605DC000
stack
page read and write
7FFC28938000
unkown
page readonly
937000
heap
page read and write
987000
heap
page read and write
2EF55FE000
stack
page read and write
18002C000
direct allocation
page read and write
13B3EA05000
heap
page read and write
2AB002B8000
heap
page read and write
C51000
heap
page read and write
16C926E0000
heap
page read and write
16C927BD000
heap
page read and write
2708CE02000
trusted library allocation
page read and write
2B2E7A3C000
heap
page read and write
96C000
heap
page read and write
16C927D8000
heap
page read and write
1F53A228000
heap
page read and write
299C000
stack
page read and write
2042AC3E000
heap
page read and write
1F53983D000
heap
page read and write
2708CC70000
trusted library allocation
page read and write
13B3E500000
heap
page read and write
2AB002A7000
heap
page read and write
2492000
heap
page read and write
16C927BF000
heap
page read and write
8B0000
heap
page read and write
3460EFE000
stack
page read and write
1F539878000
heap
page read and write
A90000
heap
page readonly
2AB00276000
heap
page read and write
C55000
heap
page read and write
C2A000
heap
page read and write
2B2E79E0000
heap
page read and write
7FFC28901000
unkown
page execute read
2B2E7A2F000
heap
page read and write
AE4000
heap
page read and write
2550000
heap
page read and write
195A6625000
heap
page read and write
AED000
heap
page read and write
180000000
direct allocation
page read and write
2708B300000
heap
page read and write
262BA7B000
stack
page read and write
275F000
stack
page read and write
949000
heap
page read and write
2708B1F0000
remote allocation
page read and write
ACE000
heap
page read and write
F45000
heap
page read and write
949000
heap
page read and write
D10000
heap
page read and write
1F53988A000
heap
page read and write
91D000
heap
page read and write
2AB00299000
heap
page read and write
B60000
heap
page read and write
195A6651000
heap
page read and write
C3D000
heap
page read and write
1C44CF13000
heap
page read and write
18002B000
direct allocation
page readonly
C4D000
heap
page read and write
1E2F22D0000
heap
page read and write
A80000
remote allocation
page read and write
1195000
heap
page read and write
935000
heap
page read and write
16C935F0000
trusted library allocation
page read and write
7FFC28982000
unkown
page readonly
1E2F247C000
heap
page read and write
C2E000
heap
page read and write
195A6637000
heap
page read and write
24DA000
heap
page read and write
16C92779000
heap
page read and write
3460FFF000
stack
page read and write
13B3E75F000
heap
page read and write
DBE000
heap
page read and write
8B8000
heap
page read and write
8FE000
heap
page read and write
2AB002CA000
heap
page read and write
72940EC000
stack
page read and write
2419000
heap
page read and write
1E2F243E000
heap
page read and write
DC6000
heap
page read and write
B30000
heap
page readonly
720000
heap
page read and write
C28000
heap
page read and write
177D8E80000
heap
page read and write
2EF51DF000
stack
page read and write
3460BFF000
stack
page read and write
1F53A122000
heap
page read and write
34610FF000
stack
page read and write
7294AFE000
stack
page read and write
24B3479000
stack
page read and write
2501D663000
heap
page read and write
2708B1A0000
trusted library allocation
page read and write
2708B269000
heap
page read and write
C679FE000
stack
page read and write
CEE000
stack
page read and write
2AB004B5000
heap
page read and write
1F53A143000
heap
page read and write
987000
heap
page read and write
925000
heap
page read and write
918000
heap
page read and write
1E2F2442000
heap
page read and write
A30000
heap
page read and write
1E2F2466000
heap
page read and write
C67BF9000
stack
page read and write
5690000
trusted library allocation
page read and write
1F5396E0000
heap
page read and write
34611FF000
stack
page read and write
2501D636000
heap
page read and write
1160000
heap
page read and write
2D18000
heap
page read and write
7FFC2897E000
unkown
page read and write
1F53A223000
heap
page read and write
1E2F2370000
trusted library allocation
page read and write
18002D000
direct allocation
page readonly
540000
heap
page read and write
7FFC28985000
unkown
page readonly
B99000
stack
page read and write
D0C000
heap
page read and write
12F0000
heap
page read and write
2042ACC4000
heap
page read and write
B60000
heap
page read and write
A79000
stack
page read and write
2C8B000
stack
page read and write
2708B110000
heap
page read and write
177D9000000
heap
page read and write
B1A000
heap
page read and write
996000
heap
page read and write
1187000
heap
page read and write
7FFC28900000
unkown
page readonly
34609FB000
stack
page read and write
13B3EA00000
heap
page read and write
1E2F246C000
heap
page read and write
177D9066000
heap
page read and write
262BB7D000
stack
page read and write
1E2F2441000
heap
page read and write
F18000
heap
page read and write
2501D5A0000
trusted library allocation
page read and write
13B3E795000
heap
page read and write
2042AC00000
heap
page read and write
C0626FF000
stack
page read and write
6160000
heap
page read and write
1C44CE00000
heap
page read and write
DB5000
heap
page read and write
195A6530000
direct allocation
page execute and read and write
195A65C5000
heap
page read and write
8FE000
heap
page read and write
16C92770000
heap
page read and write
18002B000
direct allocation
page readonly
1C44D402000
trusted library allocation
page read and write
2AB00248000
heap
page read and write
99E000
heap
page read and write
937000
heap
page read and write
DD0000
heap
page read and write
8F7000
heap
page read and write
925000
heap
page read and write
262BC7E000
stack
page read and write
B20FF7F000
stack
page read and write
7FFC28982000
unkown
page readonly
24B357F000
stack
page read and write
2AB00299000
heap
page read and write
262B5FC000
stack
page read and write
F61000
heap
page read and write
BB0000
heap
page read and write
177D902A000
heap
page read and write
18002D000
direct allocation
page readonly
24D9000
heap
page read and write
DBA000
heap
page read and write
24A8000
heap
page read and write
195A7EBC000
heap
page read and write
112B000
heap
page read and write
1F539E60000
trusted library allocation
page read and write
2D39000
heap
page read and write
935000
heap
page read and write
1F53A16F000
heap
page read and write
72948FF000
stack
page read and write
CA3F7FF000
stack
page read and write
18002B000
direct allocation
page readonly
DB5000
heap
page read and write
1187000
heap
page read and write
7FFC2897E000
unkown
page read and write
A10000
heap
page read and write
16C929C9000
heap
page read and write
195A6617000
heap
page read and write
1F53A231000
heap
page read and write
2708B302000
heap
page read and write
2708B24D000
heap
page read and write
2780000
heap
page read and write
1F53A102000
heap
page read and write
1F53987F000
heap
page read and write
There are 811 hidden memdumps, click here to show them.