IOC Report
zzkCIdCoDt.dll

loading gif

Files

File Path
Type
Category
Malicious
zzkCIdCoDt.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\zzkCIdCoDt.dll"
malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\zzkCIdCoDt.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\zzkCIdCoDt.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\zzkCIdCoDt.dll,DllRegisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\SIDHQg\JknwdLLw.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\KsqXsqXc\tABZPLVN.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\GOsbahzpfkXJSC\qSNMtEyvyGXhYcu.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZamacVzx\UaCx.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\SIDHQg\JknwdLLw.dll
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\PgYwyLA\tIEsDgbPHpoV.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AmhzcKVtZLl\siQPBMdwCPAb.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\QxWCKZstQphkP\egknjpoziqlzVL.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\CXPSzCIcOMY\wxJWjHQhm.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\BlngRITsHraAEaQWw\tRWuLwwWwn.dll"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\AmhzcKVtZLl\siQPBMdwCPAb.dll
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\UOEgTmwbpKANXEqN\KElhycJrzKCpLgeP.dll"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\zzkCIdCoDt.dll",#1
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://172.105.115.71:8080/
unknown
https://172.105.115.71:8080/xdvebqrzopqg/odedrB8kXKV9
unknown
https://172.105.115.71:8080/xdvebqrzopqg/
unknown
https://172.105.115.71:8080/xucipr/ysjolf/ncmjlqi/
unknown
https://172.105.115.71:8080/z
unknown

IPs

IP
Domain
Country
Malicious
172.105.115.71
unknown
United States
malicious
188.165.79.151
unknown
France
malicious
196.44.98.190
unknown
Ghana
malicious
174.138.33.49
unknown
United States
malicious
36.67.23.59
unknown
Indonesia
malicious
103.41.204.169
unknown
Indonesia
malicious
85.214.67.203
unknown
Germany
malicious
83.229.80.93
unknown
United Kingdom
malicious
198.199.70.22
unknown
United States
malicious
93.104.209.107
unknown
Germany
malicious
186.250.48.5
unknown
Brazil
malicious
209.239.112.82
unknown
United States
malicious
175.126.176.79
unknown
Korea Republic of
malicious
128.199.242.164
unknown
United Kingdom
malicious
178.238.225.252
unknown
Germany
malicious
46.101.98.60
unknown
Netherlands
malicious
190.145.8.4
unknown
Colombia
malicious
82.98.180.154
unknown
Spain
malicious
103.71.99.57
unknown
India
malicious
87.106.97.83
unknown
Germany
malicious
103.254.12.236
unknown
Viet Nam
malicious
103.85.95.4
unknown
Indonesia
malicious
202.134.4.210
unknown
Indonesia
malicious
165.22.254.236
unknown
United States
malicious
78.47.204.80
unknown
Germany
malicious
118.98.72.86
unknown
Indonesia
malicious
139.59.80.108
unknown
Singapore
malicious
104.244.79.94
unknown
United States
malicious
37.44.244.177
unknown
Germany
malicious
51.75.33.122
unknown
France
malicious
160.16.143.191
unknown
Japan
malicious
103.56.149.105
unknown
Indonesia
malicious
85.25.120.45
unknown
Germany
malicious
139.196.72.155
unknown
China
malicious
115.178.55.22
unknown
Indonesia
malicious
103.126.216.86
unknown
Bangladesh
malicious
128.199.217.206
unknown
United Kingdom
malicious
114.79.130.68
unknown
India
malicious
103.224.241.74
unknown
India
malicious
210.57.209.142
unknown
Indonesia
malicious
202.28.34.99
unknown
Thailand
malicious
80.211.107.116
unknown
Italy
malicious
54.37.228.122
unknown
France
malicious
218.38.121.17
unknown
Korea Republic of
malicious
185.148.169.10
unknown
Germany
malicious
195.77.239.39
unknown
Spain
malicious
178.62.112.199
unknown
European Union
malicious
62.171.178.147
unknown
United Kingdom
malicious
64.227.55.231
unknown
United States
malicious
There are 39 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
JknwdLLw.dll
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
siQPBMdwCPAb.dll
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
245A15F0000
direct allocation
page execute and read and write
malicious
1220000
direct allocation
page execute and read and write
malicious
24F464A0000
direct allocation
page execute and read and write
malicious
2580000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
1C3CB390000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
460000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
42E4E7B000
stack
page read and write
1C854E74000
heap
page read and write
24F44A53000
heap
page read and write
7FFC12452000
unkown
page readonly
2A74D47E000
heap
page read and write
25B0000
direct allocation
page execute and read and write
253FBB02000
heap
page read and write
1710363E000
heap
page read and write
3180000
trusted library allocation
page read and write
17103600000
heap
page read and write
31FC000
stack
page read and write
5350000
trusted library allocation
page read and write
17103570000
heap
page read and write
7FFC12457000
unkown
page readonly
7FFC1244E000
unkown
page read and write
4A5000
heap
page read and write
CF3EE7C000
stack
page read and write
17103580000
heap
page read and write
180000000
direct allocation
page read and write
12C2000
heap
page read and write
2CE9000
heap
page read and write
B17000
heap
page read and write
12BC000
heap
page read and write
93D000
heap
page read and write
233ED22F000
heap
page read and write
1C3C98D7000
heap
page read and write
7FFC1244E000
unkown
page read and write
12A5000
heap
page read and write
EF109FC000
stack
page read and write
5380000
trusted library allocation
page read and write
16FC8B80000
trusted library allocation
page read and write
7FFC12457000
unkown
page readonly
961000
heap
page read and write
24F44930000
heap
page read and write
400000
heap
page read and write
1339000
heap
page read and write
42E4A7B000
stack
page read and write
2A74EE70000
trusted library allocation
page read and write
7AF000
heap
page read and write
18002C000
direct allocation
page read and write
1C3CB4D0000
trusted library allocation
page read and write
332C000
stack
page read and write
4B0000
heap
page read and write
233EDBBD000
heap
page read and write
1C854E5A000
heap
page read and write
3C0000
remote allocation
page read and write
1F1F000
stack
page read and write
18002B000
direct allocation
page readonly
247FA913000
heap
page read and write
24F44A50000
heap
page read and write
1100BFE000
stack
page read and write
233EDC02000
heap
page read and write
253FBA78000
heap
page read and write
1C854E13000
heap
page read and write
7FFC12408000
unkown
page readonly
247FA887000
heap
page read and write
679000
stack
page read and write
16FC8BB0000
remote allocation
page read and write
16FC8C29000
heap
page read and write
20B471DF000
heap
page read and write
225F000
stack
page read and write
430000
direct allocation
page execute and read and write
128E000
heap
page read and write
7D534F9000
stack
page read and write
24F463A0000
heap
page read and write
275E000
stack
page read and write
1C3CB540000
heap
page read and write
18002D000
direct allocation
page readonly
A90000
heap
page read and write
2CA1000
heap
page read and write
20B47395000
heap
page read and write
880000
heap
page read and write
24F463CC000
heap
page read and write
18B000
stack
page read and write
1C3C98E7000
heap
page read and write
20B47EA0000
trusted library allocation
page read and write
129E000
heap
page read and write
570000
heap
page read and write
253FB840000
heap
page read and write
233EDB00000
heap
page read and write
BF5000
heap
page read and write
6ADE5DC000
stack
page read and write
4B6000
heap
page read and write
18002D000
direct allocation
page readonly
20B47E90000
heap
page readonly
233ED3E5000
heap
page read and write
24FF000
stack
page read and write
245A1620000
heap
page read and write
129D000
heap
page read and write
127E000
heap
page read and write
49F000
heap
page read and write
25C0000
heap
page read and write
2CF2000
heap
page read and write
DB2DC7B000
stack
page read and write
129D000
heap
page read and write
EF10AFD000
stack
page read and write
253FBA69000
heap
page read and write
1C854E77000
heap
page read and write
1F50000
heap
page read and write
1000000
heap
page read and write
3B7D000
stack
page read and write
590000
heap
page read and write
42E4FFA000
stack
page read and write
1C854E44000
heap
page read and write
1D2A8B13000
heap
page read and write
1C3C98D7000
heap
page read and write
253FC002000
trusted library allocation
page read and write
134B000
heap
page read and write
245A3690000
heap
page read and write
750000
heap
page read and write
1C854E5E000
heap
page read and write
1C854E40000
heap
page read and write
B2E000
heap
page read and write
3568000
heap
page read and write
CF3E7FF000
stack
page read and write
CF3E8FF000
stack
page read and write
233EDB71000
heap
page read and write
5C9000
heap
page read and write
5210000
trusted library allocation
page read and write
CF3EB7C000
stack
page read and write
7FFC12408000
unkown
page readonly
2A74D502000
heap
page read and write
180000000
direct allocation
page read and write
233ED23D000
heap
page read and write
250E000
stack
page read and write
1C3CB3C0000
direct allocation
page execute and read and write
6ADEB79000
stack
page read and write
7FFC12457000
unkown
page readonly
12C2000
heap
page read and write
1D2A8B02000
heap
page read and write
570000
remote allocation
page read and write
910000
heap
page read and write
233EDBD5000
heap
page read and write
1C3C9939000
heap
page read and write
DB2E37E000
stack
page read and write
18002D000
direct allocation
page readonly
128A000
heap
page read and write
12A5000
heap
page read and write
1C3C9928000
heap
page read and write
247FA680000
heap
page read and write
131F000
heap
page read and write
18002B000
direct allocation
page readonly
2A74D468000
heap
page read and write
2A74D3E0000
remote allocation
page read and write
233ED229000
heap
page read and write
673000
heap
page read and write
450000
heap
page read and write
1D2A8A13000
heap
page read and write
1C854D80000
heap
page read and write
1C854E59000
heap
page read and write
2150000
trusted library allocation
page read and write
7C5000
heap
page read and write
1C854E84000
heap
page read and write
24F44A28000
heap
page read and write
EF1097F000
stack
page read and write
7FFC12455000
unkown
page readonly
7D531FE000
stack
page read and write
6ADED7F000
stack
page read and write
253FB7E0000
heap
page read and write
CBDD1FB000
stack
page read and write
4EB000
heap
page read and write
1710364B000
heap
page read and write
42B5F7E000
stack
page read and write
32A0000
remote allocation
page read and write
598000
heap
page read and write
42E4EF9000
stack
page read and write
5180000
trusted library allocation
page read and write
1D2A8920000
heap
page read and write
42E52FA000
stack
page read and write
4B5000
heap
page read and write
7FFC123D1000
unkown
page execute read
245A15C0000
heap
page read and write
17103D30000
trusted library allocation
page read and write
245A3150000
heap
page read and write
7FFC123D0000
unkown
page readonly
20B47340000
trusted library allocation
page read and write
127E000
heap
page read and write
245A1653000
heap
page read and write
52FE000
stack
page read and write
8762A7E000
stack
page read and write
245A165B000
heap
page read and write
2CC2000
heap
page read and write
24F44A10000
direct allocation
page execute and read and write
600000
heap
page read and write
1D2A88B0000
heap
page read and write
5C5000
heap
page read and write
16FC9402000
trusted library allocation
page read and write
1C854E67000
heap
page read and write
4AD000
heap
page read and write
16FC8C02000
heap
page read and write
1100AFC000
stack
page read and write
33BF000
stack
page read and write
20B47F00000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
12E5000
heap
page read and write
1C854D90000
heap
page read and write
7FFC123D1000
unkown
page execute read
233ED255000
heap
page read and write
CBDD2FB000
stack
page read and write
2D3A000
heap
page read and write
12E5000
heap
page read and write
1C854E75000
heap
page read and write
5C6000
heap
page read and write
7FFC12457000
unkown
page readonly
42B617E000
stack
page read and write
17103602000
heap
page read and write
3540000
heap
page read and write
253FBA13000
heap
page read and write
131F000
heap
page read and write
AB0000
heap
page read and write
1C854E3B000
heap
page read and write
2D19000
heap
page read and write
1C3C98DC000
heap
page read and write
5A10000
heap
page read and write
A7B000
stack
page read and write
245A30C0000
trusted library allocation
page read and write
1C3C98E0000
heap
page read and write
1C3C9BE5000
heap
page read and write
16FC8C58000
heap
page read and write
EF10F7F000
stack
page read and write
26D0000
heap
page readonly
7FFC1244E000
unkown
page read and write
42B5BDE000
stack
page read and write
945000
heap
page read and write
1C854E60000
heap
page read and write
253FBA02000
heap
page read and write
171035D0000
heap
page read and write
18002B000
direct allocation
page readonly
DB2E67F000
stack
page read and write
5A0000
heap
page read and write
1295000
heap
page read and write
7FFC1244E000
unkown
page read and write
BF0000
heap
page read and write
233ED244000
heap
page read and write
7FFC12408000
unkown
page readonly
12BC000
heap
page read and write
670000
heap
page read and write
7FFC12452000
unkown
page readonly
2CF8000
heap
page read and write
D004577000
stack
page read and write
3744000
heap
page read and write
5B5000
heap
page read and write
CBDD4FE000
stack
page read and write
12BF000
heap
page read and write
180000000
direct allocation
page read and write
490000
heap
page read and write
4E1000
heap
page read and write
42B5B5E000
stack
page read and write
12A5000
heap
page read and write
1100CFE000
stack
page read and write
233ED040000
heap
page read and write
D00414C000
stack
page read and write
A60000
heap
page read and write
20B47090000
heap
page read and write
358F000
heap
page read and write
2A74D360000
heap
page read and write
6B0000
heap
page read and write
2A74D447000
heap
page read and write
7FFC123D1000
unkown
page execute read
1C854E42000
heap
page read and write
1298000
heap
page read and write
2A74D488000
heap
page read and write
18002D000
direct allocation
page readonly
935000
heap
page read and write
131F000
heap
page read and write
DB2E27D000
stack
page read and write
253FBFA0000
trusted library allocation
page read and write
93D000
heap
page read and write
2CF0000
heap
page read and write
7A0000
heap
page read and write
2E40000
trusted library allocation
page read and write
CF3ED7E000
stack
page read and write
233ED313000
heap
page read and write
507000
heap
page read and write
12B8000
heap
page read and write
247FA829000
heap
page read and write
8762C79000
stack
page read and write
1100E7D000
stack
page read and write
245A1647000
heap
page read and write
24F449A0000
heap
page read and write
8762B79000
stack
page read and write
20B473A0000
trusted library allocation
page read and write
16FC8AF0000
heap
page read and write
B48000
heap
page read and write
4DD000
heap
page read and write
1D2A8A02000
heap
page read and write
1296000
heap
page read and write
4B5000
heap
page read and write
1D2A8B00000
heap
page read and write
8762BFE000
stack
page read and write
34BB000
stack
page read and write
17103E02000
trusted library allocation
page read and write
7FFC123D0000
unkown
page readonly
2BA0000
trusted library allocation
page read and write
12C2000
heap
page read and write
233EDB96000
heap
page read and write
12CA000
heap
page read and write
4E6000
heap
page read and write
7B5000
heap
page read and write
B17000
heap
page read and write
1C854E00000
heap
page read and write
42B627F000
stack
page read and write
247FA83E000
heap
page read and write
7FFC12452000
unkown
page readonly
7FFC12408000
unkown
page readonly
7BD000
heap
page read and write
7FFC12455000
unkown
page readonly
20B472D0000
trusted library allocation
page read and write
7D530FC000
stack
page read and write
247FA8BC000
heap
page read and write
1C3C98B8000
heap
page read and write
233ED284000
heap
page read and write
48B000
heap
page read and write
253FBA00000
heap
page read and write
1F1E000
stack
page read and write
1C3C9908000
heap
page read and write
245A1666000
heap
page read and write
18002B000
direct allocation
page readonly
247FA7F0000
trusted library allocation
page read and write
5DB000
heap
page read and write
1100D7E000
stack
page read and write
1B9000
stack
page read and write
517000
heap
page read and write
1258000
heap
page read and write
4DD000
heap
page read and write
1C3C9AA0000
heap
page read and write
247FA825000
heap
page read and write
EF10E7C000
stack
page read and write
580000
heap
page read and write
2210000
heap
page read and write
20B471DF000
heap
page read and write
1D2A8A00000
heap
page read and write
7FFC12408000
unkown
page readonly
128C000
heap
page read and write
7FFC123D0000
unkown
page readonly
18002D000
direct allocation
page readonly
131F000
heap
page read and write
2CE9000
heap
page read and write
1C3CB4D0000
trusted library allocation
page read and write
961000
heap
page read and write
7FFC12455000
unkown
page readonly
353E000
stack
page read and write
BA0000
heap
page read and write
B17000
heap
page read and write
5CC000
heap
page read and write
245A162D000
heap
page read and write
1C854E29000
heap
page read and write
490000
trusted library allocation
page read and write
1C3C9AE0000
heap
page read and write
2A74D413000
heap
page read and write
EF10C7E000
stack
page read and write
16FC8B50000
heap
page read and write
B36000
heap
page read and write
17103647000
heap
page read and write
18002C000
direct allocation
page read and write
2CF8000
heap
page read and write
1E0000
heap
page read and write
F0000
remote allocation
page read and write
1E9E000
stack
page read and write
8C007E000
stack
page read and write
247FA902000
heap
page read and write
DB2DE7B000
stack
page read and write
245A30C0000
trusted library allocation
page read and write
233ED1D0000
trusted library allocation
page read and write
1C3C9908000
heap
page read and write
517000
heap
page read and write
EF10B7B000
stack
page read and write
AD5000
heap
page read and write
42E4BFE000
stack
page read and write
54A000
stack
page read and write
CF3E2DC000
stack
page read and write
5BD000
heap
page read and write
245A2FBC000
heap
page read and write
7FFC123D0000
unkown
page readonly
8C0179000
stack
page read and write
245A3155000
heap
page read and write
245A1647000
heap
page read and write
180000000
direct allocation
page read and write
2C79000
heap
page read and write
245A164E000
heap
page read and write
7FFC123D1000
unkown
page execute read
3D0000
heap
page read and write
247FA813000
heap
page read and write
5B0000
heap
page read and write
1C854E5D000
heap
page read and write
5E1000
heap
page read and write
3180000
trusted library allocation
page read and write
10000
heap
page read and write
247FB100000
heap
page read and write
BFC000
heap
page read and write
24F44A79000
heap
page read and write
253FB7D0000
heap
page read and write
11D0000
heap
page read and write
128F000
heap
page read and write
5FE000
stack
page read and write
4F0000
heap
page read and write
2263000
heap
page read and write
2147000
stack
page read and write
253FBA76000
heap
page read and write
5DB000
heap
page read and write
2BB0000
heap
page read and write
20B47390000
heap
page read and write
263B000
stack
page read and write
1283000
heap
page read and write
1C3CB3D0000
heap
page readonly
480000
heap
page read and write
1C3C9908000
heap
page read and write
233EDB54000
heap
page read and write
245A30A0000
heap
page read and write
247FA8C7000
heap
page read and write
1C3C9908000
heap
page read and write
1C854E32000
heap
page read and write
1C854E46000
heap
page read and write
129E000
heap
page read and write
1C3C9926000
heap
page read and write
10D0000
remote allocation
page read and write
1D2A8A28000
heap
page read and write
1710363B000
heap
page read and write
16FC8AE0000
heap
page read and write
16FC8BB0000
remote allocation
page read and write
2260000
heap
page read and write
2A74D447000
heap
page read and write
2CC0000
heap
page read and write
20B46F40000
trusted library allocation
page read and write
7FFC1244E000
unkown
page read and write
7FFC12452000
unkown
page readonly
20B46F30000
heap
page read and write
537E000
stack
page read and write
1C0000
heap
page read and write
B48000
heap
page read and write
2C6C000
heap
page read and write
32A0000
remote allocation
page read and write
1C854E4E000
heap
page read and write
253FBA57000
heap
page read and write
1C854E7E000
heap
page read and write
20B47190000
heap
page read and write
24F449C0000
heap
page read and write
7C5000
heap
page read and write
24F44D85000
heap
page read and write
1100FFE000
stack
page read and write
16FC8C40000
heap
page read and write
2A74D2F0000
heap
page read and write
233EDC30000
heap
page read and write
201E000
stack
page read and write
A80000
heap
page read and write
570000
remote allocation
page read and write
7D533FE000
stack
page read and write
7FFC12455000
unkown
page readonly
4DD000
heap
page read and write
1C854E45000
heap
page read and write
253FBA7A000
heap
page read and write
B28000
heap
page read and write
DB2E77E000
stack
page read and write
1C854F02000
heap
page read and write
C80000
heap
page read and write
24F44A3F000
heap
page read and write
17103629000
heap
page read and write
16FC8D02000
heap
page read and write
6BC000
heap
page read and write
180000000
direct allocation
page read and write
2D3D000
heap
page read and write
534E000
stack
page read and write
24F464D0000
heap
page readonly
AE0000
heap
page read and write
14F5000
heap
page read and write
2A74D518000
heap
page read and write
4AD000
heap
page read and write
262E000
stack
page read and write
5BD000
heap
page read and write
B17000
heap
page read and write
2A74D43D000
heap
page read and write
1C3C9A80000
heap
page read and write
1C854E6A000
heap
page read and write
27E0000
trusted library allocation
page read and write
233EDC23000
heap
page read and write
D0000
heap
page read and write
1C3C98DF000
heap
page read and write
5C5000
heap
page read and write
127E000
heap
page read and write
4AD000
heap
page read and write
945000
heap
page read and write
1C855602000
trusted library allocation
page read and write
10BB000
stack
page read and write
1C854E61000
heap
page read and write
12CE000
heap
page read and write
24F44A20000
heap
page read and write
233EDA02000
heap
page read and write
245A1693000
heap
page read and write
24F44A3F000
heap
page read and write
1D0000
heap
page read and write
23A3000
heap
page read and write
7FFC123D1000
unkown
page execute read
EF1087E000
stack
page read and write
257F000
stack
page read and write
129D000
heap
page read and write
11B0000
heap
page read and write
1C3C994B000
heap
page read and write
3C0000
remote allocation
page read and write
1C3C9908000
heap
page read and write
233EDB22000
heap
page read and write
D0044FC000
stack
page read and write
233EDC00000
heap
page read and write
1C855550000
trusted library allocation
page read and write
233ED251000
heap
page read and write
930000
heap
page read and write
CF3EC7D000
stack
page read and write
440000
heap
page readonly
7D535FD000
stack
page read and write
2A74D402000
heap
page read and write
5DB000
heap
page read and write
245A2F90000
heap
page read and write
1298000
heap
page read and write
2DBC000
stack
page read and write
946000
heap
page read and write
245A2FBC000
heap
page read and write
DB2DF7E000
stack
page read and write
8BFD2C000
stack
page read and write
1E0000
remote allocation
page read and write
B36000
heap
page read and write
2C0F000
stack
page read and write
12BC000
heap
page read and write
7FFC1244E000
unkown
page read and write
B17000
heap
page read and write
233EDB43000
heap
page read and write
20B47399000
heap
page read and write
12A5000
heap
page read and write
233ED0B0000
heap
page read and write
24F44A64000
heap
page read and write
20B47070000
heap
page read and write
7FFC123D0000
unkown
page readonly
253FBA29000
heap
page read and write
1298000
heap
page read and write
E60000
heap
page read and write
CBDD3FE000
stack
page read and write
79B000
heap
page read and write
7FFC12452000
unkown
page readonly
12E5000
heap
page read and write
7D532FE000
stack
page read and write
EF102EC000
stack
page read and write
245A1550000
heap
page read and write
245A1681000
heap
page read and write
10D0000
remote allocation
page read and write
128E000
heap
page read and write
1D2A9080000
trusted library allocation
page read and write
129D000
heap
page read and write
B6B000
heap
page read and write
2A74D400000
heap
page read and write
2A74D446000
heap
page read and write
2A74D457000
heap
page read and write
1250000
heap
page read and write
F0000
remote allocation
page read and write
A8C000
heap
page read and write
7FFC12452000
unkown
page readonly
253FBA3D000
heap
page read and write
1D2A8A59000
heap
page read and write
245A165D000
heap
page read and write
D0046FB000
stack
page read and write
E65000
heap
page read and write
247FA800000
heap
page read and write
24F44A6D000
heap
page read and write
25D0000
heap
page read and write
14F0000
heap
page read and write
26AF000
stack
page read and write
253FBA5A000
heap
page read and write
7FFC12457000
unkown
page readonly
5B9000
heap
page read and write
C9000
stack
page read and write
2CFC000
heap
page read and write
1C3C9BE0000
heap
page read and write
233EDBB1000
heap
page read and write
1F53000
heap
page read and write
1C854E6B000
heap
page read and write
131F000
heap
page read and write
233ED27B000
heap
page read and write
245A3090000
direct allocation
page execute and read and write
87627DF000
stack
page read and write
2A74D390000
trusted library allocation
page read and write
233ED292000
heap
page read and write
16FC8C00000
heap
page read and write
18002C000
direct allocation
page read and write
24F44A8B000
heap
page read and write
1C3C991F000
heap
page read and write
1D2A8A7B000
heap
page read and write
180000000
direct allocation
page read and write
1C854DF0000
heap
page read and write
247FB112000
heap
page read and write
25BE000
stack
page read and write
18002C000
direct allocation
page read and write
790000
heap
page read and write
4BB000
heap
page read and write
247FB132000
heap
page read and write
233ED1B0000
trusted library allocation
page read and write
7FFC12455000
unkown
page readonly
2A74D3B0000
trusted library allocation
page read and write
1C3C9916000
heap
page read and write
100000
heap
page read and write
24F465E0000
trusted library allocation
page read and write
1D2A88C0000
heap
page read and write
5BD000
heap
page read and write
949000
heap
page read and write
3590000
heap
page read and write
233ED25B000
heap
page read and write
1FFC000
heap
page read and write
253FBA72000
heap
page read and write
6B5000
heap
page read and write
7FFC12408000
unkown
page readonly
247FA690000
heap
page read and write
DB2E57F000
stack
page read and write
24F44A79000
heap
page read and write
20B471DF000
heap
page read and write
1C854E41000
heap
page read and write
20B471A0000
heap
page read and write
93D000
heap
page read and write
7FFC123D0000
unkown
page readonly
2A74D457000
heap
page read and write
18002B000
direct allocation
page readonly
4FC000
heap
page read and write
1332000
heap
page read and write
42E4C7F000
stack
page read and write
1D2A8A3C000
heap
page read and write
7C6000
heap
page read and write
134B000
heap
page read and write
DB2E07D000
stack
page read and write
20B47198000
heap
page read and write
233EDBD3000
heap
page read and write
247FA8CD000
heap
page read and write
1FC0000
heap
page read and write
1C854E3D000
heap
page read and write
A85000
heap
page read and write
1D2A9202000
trusted library allocation
page read and write
2A74F002000
trusted library allocation
page read and write
17103613000
heap
page read and write
8BFDAE000
stack
page read and write
1C3C9919000
heap
page read and write
2A74D500000
heap
page read and write
233EDC27000
heap
page read and write
1C854E62000
heap
page read and write
1C3C9830000
heap
page read and write
1C854E58000
heap
page read and write
CBDCCDC000
stack
page read and write
247FA86C000
heap
page read and write
B3F000
heap
page read and write
876275C000
stack
page read and write
7BD000
heap
page read and write
D00447E000
stack
page read and write
245A1681000
heap
page read and write
529000
heap
page read and write
23A0000
heap
page read and write
2A74D462000
heap
page read and write
12BC000
heap
page read and write
24F44A3F000
heap
page read and write
2B90000
heap
page readonly
EF106FB000
stack
page read and write
2A74D456000
heap
page read and write
961000
heap
page read and write
939000
heap
page read and write
20B47380000
trusted library allocation
page read and write
1C3C9930000
heap
page read and write
1F9E000
stack
page read and write
209E000
stack
page read and write
2A74D300000
heap
page read and write
1C3C98DC000
heap
page read and write
233ED050000
heap
page read and write
42E51FE000
stack
page read and write
42E50FF000
stack
page read and write
1C854E7A000
heap
page read and write
233EDB22000
heap
page read and write
1C854E47000
heap
page read and write
455000
heap
page read and write
DB2E47F000
stack
page read and write
1C3C9928000
heap
page read and write
1C854E7B000
heap
page read and write
233ED288000
heap
page read and write
2A74D42A000
heap
page read and write
1298000
heap
page read and write
6ADEC7E000
stack
page read and write
233ED38E000
heap
page read and write
2A74EEB0000
trusted library allocation
page read and write
7FFC12455000
unkown
page readonly
24F465D0000
heap
page read and write
4D0000
heap
page read and write
8C01FE000
stack
page read and write
4B5000
heap
page read and write
12D4000
heap
page read and write
24F44A79000
heap
page read and write
3541000
heap
page read and write
5C5000
heap
page read and write
18002D000
direct allocation
page readonly
233ED200000
heap
page read and write
253FBB13000
heap
page read and write
12B8000
heap
page read and write
1100A7E000
stack
page read and write
1C3C98B0000
heap
page read and write
2CA0000
heap
page read and write
7BD000
heap
page read and write
35D9000
heap
page read and write
B25000
heap
page read and write
B17000
heap
page read and write
17103702000
heap
page read and write
D0041CE000
stack
page read and write
20B471D7000
heap
page read and write
2CF8000
heap
page read and write
1E0000
remote allocation
page read and write
B34000
heap
page read and write
7C5000
heap
page read and write
233EDC13000
heap
page read and write
32A0000
remote allocation
page read and write
12A3000
heap
page read and write
2CE9000
heap
page read and write
16FC8C13000
heap
page read and write
42B607E000
stack
page read and write
1C854E6D000
heap
page read and write
247FA6F0000
heap
page read and write
42E4D7E000
stack
page read and write
20B47EB0000
trusted library allocation
page read and write
88C000
heap
page read and write
2CED000
heap
page read and write
CF3E9FE000
stack
page read and write
27D9000
stack
page read and write
360000
heap
page read and write
18002B000
direct allocation
page readonly
247FA8E0000
heap
page read and write
945000
heap
page read and write
2C40000
heap
page read and write
20B47C80000
trusted library allocation
page read and write
CF3E6FE000
stack
page read and write
ABB000
heap
page read and write
D0045FC000
stack
page read and write
247FB002000
heap
page read and write
2A74D3E0000
remote allocation
page read and write
8762AF9000
stack
page read and write
245A1633000
heap
page read and write
24F44D80000
heap
page read and write
885000
heap
page read and write
233ED278000
heap
page read and write
7FFC123D1000
unkown
page execute read
5B50000
heap
page read and write
B59000
heap
page read and write
16FC8BB0000
remote allocation
page read and write
233ED3B9000
heap
page read and write
245A1647000
heap
page read and write
1339000
heap
page read and write
14E0000
direct allocation
page execute and read and write
11005BC000
stack
page read and write
1295000
heap
page read and write
20B472E0000
trusted library allocation
page read and write
42B5ADC000
stack
page read and write
2E3B000
stack
page read and write
233EDB02000
heap
page read and write
8C00FF000
stack
page read and write
2A74D513000
heap
page read and write
1C854E57000
heap
page read and write
327D000
stack
page read and write
D00467F000
stack
page read and write
918000
heap
page read and write
1710362F000
heap
page read and write
2A74D3E0000
remote allocation
page read and write
7FFC12457000
unkown
page readonly
17103655000
heap
page read and write
2210000
heap
page read and write
24F465E0000
trusted library allocation
page read and write
EF10D7E000
stack
page read and write
18002C000
direct allocation
page read and write
18002C000
direct allocation
page read and write
233EDBC9000
heap
page read and write
1FD0000
heap
page read and write
94C000
heap
page read and write
233ED213000
heap
page read and write
245A1655000
heap
page read and write
There are 771 hidden memdumps, click here to show them.