IOC Report
pzG0rkIchr.exe

loading gif

Files

File Path
Type
Category
Malicious
pzG0rkIchr.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_pzG_5df03237c245e7792ae728ba7af47d1bed8c47f7_4f0e5919_16399239\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_pzG_f6b0ff3966a3d6c74191edf638977ebb42334d7_4f0e5919_156d919c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8047.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Nov 24 04:19:45 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER80D3.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Nov 24 04:19:46 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER848E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8588.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8589.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8683.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\pzG0rkIchr.dll"
malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\pzG0rkIchr.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\pzG0rkIchr.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\pzG0rkIchr.dll,DllRegisterServer
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\pzG0rkIchr.dll,ItsnPq5v
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\pzG0rkIchr.dll,QlqYo259k
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pzG0rkIchr.dll",#1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2100 -s 304
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 1308 -s 304
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2100 -s 304
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 1308 -s 304
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://gigimas.xyz
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://gigimas.xyz/index.html)I6
unknown
https://sectigo.com/CPS0
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
https://gigimas.xyz/92
unknown
https://gigimas.xyz/index.htmlr
unknown
https://gigimas.xyz/ic
unknown
https://gigimas.xyz/index.htmluH
unknown
https://http://Mozilla/5.0
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
https://gigimas.xyz/index.html
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
https://gigimas.xyzhttps://reaso.xyz
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
https://gigimas.xyz/index.htmll
unknown
https://gigimas.xyz/
unknown
https://reaso.xyz
unknown
https://gigimas.xyz:443/index.html
unknown
There are 11 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
gigimas.xyz
185.250.148.35
malicious

IPs

IP
Domain
Country
Malicious
185.250.148.35
gigimas.xyz
Russian Federation
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsPeFile
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
00184006417502B9
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
00184006417502B9
There are 15 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
21DD9228000
heap
page read and write
1DFB52C6000
heap
page read and write
21DDADA1000
heap
page read and write
666000
heap
page read and write
21DD9221000
heap
page read and write
7FF88C0B6000
unkown
page readonly
22FFDB60000
heap
page read and write
21DD9268000
heap
page read and write
1716B9EC000
heap
page read and write
19E3D420000
heap
page read and write
21DD9244000
heap
page read and write
620BFB000
stack
page read and write
1DFB5358000
heap
page read and write
1DFB35E0000
trusted library allocation
page read and write
1DFB37DE000
heap
page read and write
21DD9221000
heap
page read and write
274B6413000
unkown
page read and write
21DD923C000
heap
page read and write
1716D884000
heap
page read and write
274B6462000
heap
page read and write
1716E2C1000
heap
page read and write
1DFB349F000
heap
page read and write
21DD92C0000
heap
page read and write
1716BC20000
trusted library allocation
page read and write
27ED3783000
heap
page read and write
1716D918000
heap
page read and write
1716BAB7000
heap
page read and write
21DD9221000
heap
page read and write
21DD9228000
heap
page read and write
342D4FE000
stack
page read and write
1DFB5D60000
remote allocation
page read and write
25B02710000
trusted library allocation
page read and write
7FF88C093000
unkown
page readonly
1DFB5324000
heap
page read and write
27ED3940000
heap
page read and write
1DFB34BA000
heap
page read and write
1716D8B1000
heap
page read and write
1DFB34AC000
heap
page read and write
21DD9221000
heap
page read and write
27ED37A7000
heap
page read and write
21DD91FE000
heap
page read and write
21DD91ED000
heap
page read and write
1716BA96000
heap
page read and write
1716BA9B000
heap
page read and write
1716BA98000
heap
page read and write
740C1FC000
stack
page read and write
1716D892000
heap
page read and write
1DFB5500000
heap
page read and write
1716D89F000
heap
page read and write
7C1657F000
stack
page read and write
21B0000
heap
page read and write
21DD9268000
heap
page read and write
21DD926B000
heap
page read and write
21DD923C000
heap
page read and write
21DD9228000
heap
page read and write
25B02751000
heap
page read and write
3D0000
direct allocation
page execute and read and write
1DFB37D0000
heap
page read and write
25B028C0000
trusted library allocation
page read and write
1716D886000
heap
page read and write
1DFB531E000
heap
page read and write
7FF88C093000
unkown
page readonly
6CF000
heap
page read and write
1716BA8A000
heap
page read and write
7FF88C093000
unkown
page readonly
1716DC88000
heap
page read and write
21DD926B000
heap
page read and write
1F71CC80000
heap
page read and write
21DD921D000
heap
page read and write
1716D916000
heap
page read and write
21CD000
heap
page read and write
22FFC030000
heap
page read and write
1DFB52CA000
heap
page read and write
7C164FF000
stack
page read and write
1F71B193000
heap
page read and write
7FF88C070000
unkown
page readonly
1DFB5777000
heap
page read and write
1716BA8F000
heap
page read and write
1716DC87000
heap
page read and write
1716D89E000
heap
page read and write
1716D911000
heap
page read and write
342D104000
stack
page read and write
27ED371E000
direct allocation
page execute and read and write
1DFB5359000
heap
page read and write
1716D8B0000
heap
page read and write
1F71B0C0000
heap
page read and write
274B640D000
unkown
page read and write
22FFBFC0000
unkown
page read and write
1DFB52D3000
heap
page read and write
7FF88C093000
unkown
page readonly
1716D8B0000
heap
page read and write
25B029A9000
heap
page read and write
1716D8D0000
heap
page read and write
1DFB5324000
heap
page read and write
1DFB52C4000
heap
page read and write
1DFB5354000
heap
page read and write
27ED3974000
heap
page read and write
1F71B168000
heap
page read and write
69F000
heap
page read and write
1716D910000
heap
page read and write
1DFB56C8000
heap
page read and write
21DDAD90000
heap
page read and write
22FFDB60000
heap
page read and write
1DFB56C7000
heap
page read and write
1DFB52FE000
heap
page read and write
1716D8BD000
heap
page read and write
21DD923C000
heap
page read and write
1F71CC94000
heap
page read and write
22FFC030000
heap
page read and write
21DD9246000
heap
page read and write
274B6462000
heap
page read and write
1DFB5D23000
heap
page read and write
274B6515000
trusted library allocation
page read and write
21DD925E000
heap
page read and write
1716B9E7000
heap
page read and write
1DFB5E17000
heap
page read and write
1DFB5351000
heap
page read and write
27ED36F0000
heap
page read and write
7FF88C0B6000
unkown
page readonly
21DD9248000
heap
page read and write
1716D8BD000
heap
page read and write
21DD9228000
heap
page read and write
4079CEC000
stack
page read and write
1DFB52D7000
heap
page read and write
25B027A1000
heap
page read and write
21DD9220000
heap
page read and write
1DFB5D23000
heap
page read and write
7FF88C0B6000
unkown
page readonly
19E3EE90000
heap
page read and write
21DD926B000
heap
page read and write
274B6700000
heap
page read and write
21DD9252000
heap
page read and write
1716BC0A000
heap
page read and write
BFC0AFF000
stack
page read and write
1716D900000
heap
page read and write
1716B9C8000
heap
page read and write
7FF88C0B3000
unkown
page read and write
62097E000
stack
page read and write
1F71B17E000
heap
page read and write
21DD91F4000
heap
page read and write
1716D8EB000
heap
page read and write
1DFB52DE000
heap
page read and write
1DFB52F1000
heap
page read and write
7FF88C0B6000
unkown
page readonly
2102000
heap
page read and write
1DFB34A3000
heap
page read and write
1DFB5324000
heap
page read and write
1716BC20000
trusted library allocation
page read and write
1716B9A0000
unkown
page read and write
1DFB566F000
heap
page read and write
1DFB35E0000
trusted library allocation
page read and write
21DD9218000
heap
page read and write
1DFB35E0000
trusted library allocation
page read and write
7FF88C0A9000
unkown
page write copy
1716D8CA000
heap
page read and write
1DFB5357000
heap
page read and write
21DD9248000
heap
page read and write
21DD9255000
heap
page read and write
7FF88C0A8000
unkown
page read and write
1716E477000
heap
page read and write
1716D896000
heap
page read and write
1716D880000
heap
page read and write
1716D886000
heap
page read and write
7FF88C070000
unkown
page readonly
21DD9227000
heap
page read and write
1716BA7D000
heap
page read and write
1716BAA4000
heap
page read and write
7FF88C0B6000
unkown
page readonly
1F71B1C0000
heap
page read and write
21DD923C000
heap
page read and write
1DFB35E0000
trusted library allocation
page read and write
655000
heap
page read and write
1DFB34A3000
heap
page read and write
1DFB5304000
heap
page read and write
21DD9226000
heap
page read and write
1716D916000
heap
page read and write
1DFB3660000
heap
page read and write
1DFB5D60000
remote allocation
page read and write
1716D8DD000
heap
page read and write
1716D89E000
heap
page read and write
1716BABD000
heap
page read and write
21DD9365000
heap
page read and write
1DFB34A1000
heap
page read and write
1716D896000
heap
page read and write
22FFC305000
heap
page read and write
1DFB35E0000
trusted library allocation
page read and write
21DD9268000
heap
page read and write
1DFB5D60000
remote allocation
page read and write
7FF88C0B3000
unkown
page read and write
1716D897000
heap
page read and write
1716D88C000
heap
page read and write
1DFB37DB000
heap
page read and write
1DFB34AB000
heap
page read and write
21DD91C8000
heap
page read and write
1DFB530B000
heap
page read and write
25B034A0000
trusted library allocation
page read and write
7FF88C071000
unkown
page execute read
1DFB52E5000
heap
page read and write
C1308F9000
stack
page read and write
7FF88C0B3000
unkown
page read and write
7FF88C0B3000
unkown
page read and write
1DFB52CC000
heap
page read and write
740C2FB000
stack
page read and write
1DFB35E0000
trusted library allocation
page read and write
1716BC20000
trusted library allocation
page read and write
1DFB56C7000
heap
page read and write
1716BC20000
trusted library allocation
page read and write
274B6438000
heap
page read and write
21DD923C000
heap
page read and write
4079CEC000
stack
page read and write
1716D910000
heap
page read and write
1716BB90000
heap
page read and write
1716D8EF000
heap
page read and write
1DFB349C000
heap
page read and write
21DD9220000
heap
page read and write
7FF88C093000
unkown
page readonly
1DFB5351000
heap
page read and write
1F71B1F0000
heap
page read and write
21DDAB20000
remote allocation
page read and write
1716D910000
heap
page read and write
7FF88C0A8000
unkown
page write copy
1DFB535A000
heap
page read and write
1DFB52FE000
heap
page read and write
21A0000
heap
page read and write
21DD9360000
heap
page read and write
1716BA82000
heap
page read and write
1F71B510000
heap
page read and write
21C4000
heap
page read and write
1716B9EC000
heap
page read and write
7FF88C071000
unkown
page execute read
1716D890000
heap
page read and write
740C27C000
stack
page read and write
25B026A0000
heap
page read and write
1DFB5311000
heap
page read and write
1DFB52EB000
heap
page read and write
1716BBB0000
heap
page read and write
1DFB52E1000
heap
page read and write
22FFC305000
heap
page read and write
1716D8AA000
heap
page read and write
1DFB52E5000
heap
page read and write
1DFB34A7000
heap
page read and write
1DFB34A1000
heap
page read and write
1DFB5D00000
heap
page read and write
1716E380000
remote allocation
page read and write
21DD91EE000
heap
page read and write
1716DDC0000
heap
page read and write
21DD9221000
heap
page read and write
27ED37F9000
heap
page read and write
21DD9228000
heap
page read and write
1716BC20000
trusted library allocation
page read and write
1716BAB7000
heap
page read and write
1716D8E3000
heap
page read and write
21DD9330000
direct allocation
page execute and read and write
25B029A0000
heap
page read and write
274B6240000
heap
page read and write
620AFF000
stack
page read and write
19E3D420000
heap
page read and write
19E3D488000
heap
page read and write
21DD9268000
heap
page read and write
209F000
stack
page read and write
25B028D0000
heap
page readonly
C1304CD000
stack
page read and write
19E3EE10000
remote allocation
page read and write
1716BAB7000
heap
page read and write
22FFC200000
heap
page read and write
620C7E000
stack
page read and write
7FF88C071000
unkown
page execute read
22FFC038000
heap
page read and write
1716DAC2000
heap
page read and write
1DFB3370000
unkown
page readonly
1DFB6100000
heap
page read and write
1716D8D0000
heap
page read and write
1DFB35E0000
trusted library allocation
page read and write
BFC0AFF000
stack
page read and write
21DD9220000
heap
page read and write
22FFC200000
heap
page read and write
1716D8D0000
heap
page read and write
25B0278E000
heap
page read and write
1716BA82000
heap
page read and write
1716DBC0000
heap
page read and write
1DFB52F1000
heap
page read and write
21DD9252000
heap
page read and write
1DFB33E2000
heap
page read and write
1716B990000
unkown
page readonly
1716D8B7000
heap
page read and write
1716BA8E000
heap
page read and write
1716D8E3000
heap
page read and write
21DD9248000
heap
page read and write
7FF88C070000
unkown
page readonly
21DD91A0000
heap
page read and write
19E3D430000
heap
page read and write
21DD9228000
heap
page read and write
1716BC20000
trusted library allocation
page read and write
1716D8D6000
heap
page read and write
1716BA98000
heap
page read and write
1DFB5358000
heap
page read and write
7FF88C070000
unkown
page readonly
21DDADAD000
heap
page read and write
274B6702000
heap
page read and write
27ED397D000
heap
page read and write
25B02730000
trusted library allocation
page read and write
1716D8CA000
heap
page read and write
1DFB34C7000
heap
page read and write
25B029A5000
heap
page read and write
27ED3942000
heap
page read and write
1DFB35E0000
trusted library allocation
page read and write
21DD921D000
heap
page read and write
7FF88C0A8000
unkown
page read and write
21DD9246000
heap
page read and write
21DD9200000
heap
page read and write
1716BC00000
heap
page read and write
6209FE000
stack
page read and write
19E3D425000
heap
page read and write
7FF88C070000
unkown
page readonly
1DFB5305000
heap
page read and write
6CF000
heap
page read and write
7FF88C0B3000
unkown
page read and write
BEFD97E000
stack
page read and write
C4B27FF000
stack
page read and write
1716BC20000
trusted library allocation
page read and write
7FF88C071000
unkown
page execute read
C4B26FE000
stack
page read and write
342D6FE000
stack
page read and write
1716B980000
unkown
page readonly
1716D8E3000
heap
page read and write
1F71B130000
heap
page read and write
1DFB5351000
heap
page read and write
1DFB530B000
heap
page read and write
21DDAB40000
heap
page read and write
1DFB52D7000
heap
page read and write
1716DD8C000
heap
page read and write
1DFB3493000
heap
page read and write
1DFB5304000
heap
page read and write
1716D8B7000
heap
page read and write
1716B980000
unkown
page readonly
21DD9250000
heap
page read and write
1DFB5317000
heap
page read and write
1DFB52D1000
heap
page read and write
22FFC2B0000
remote allocation
page read and write
21DD91C0000
heap
page read and write
7FF88C093000
unkown
page readonly
274B6473000
heap
page read and write
1716D8D0000
heap
page read and write
27ED37F9000
heap
page read and write
1716BC20000
trusted library allocation
page read and write
342D18E000
unkown
page read and write
1DFB5317000
heap
page read and write
620A7C000
stack
page read and write
7FF88C071000
unkown
page execute read
21DD923C000
heap
page read and write
BEFD8FA000
stack
page read and write
7FF88C0A9000
unkown
page write copy
1716D8EB000
heap
page read and write
1716BC9B000
heap
page read and write
1DFB34A7000
heap
page read and write
21DD925F000
heap
page read and write
1716BC20000
trusted library allocation
page read and write
1DFB52F1000
heap
page read and write
1DFB52DE000
heap
page read and write
1DFB34CE000
heap
page read and write
1716BC20000
trusted library allocation
page read and write
1716D8E3000
heap
page read and write
22FFC220000
heap
page read and write
1716D8BD000
heap
page read and write
1DFB5324000
heap
page read and write
1F71B1F0000
heap
page read and write
BFC0A7C000
stack
page read and write
25B0278E000
heap
page read and write
1716D914000
heap
page read and write
1DFB52F8000
heap
page read and write
1DFB5324000
heap
page read and write
1716BC20000
trusted library allocation
page read and write
1DFB35E0000
trusted library allocation
page read and write
1DFB52D1000
heap
page read and write
1716BC50000
trusted library allocation
page read and write
21DD9214000
heap
page read and write
1DFB35E0000
trusted library allocation
page read and write
1DFB3610000
trusted library allocation
page read and write
22FFDB60000
heap
page read and write
1DFB531D000
heap
page read and write
21DD923C000
heap
page read and write
274B6502000
trusted library allocation
page read and write
1DFB52F8000
heap
page read and write
1DFB5725000
heap
page read and write
274B6400000
unkown
page read and write
1DFB3360000
unkown
page readonly
7FF88C0A8000
unkown
page write copy
1716D8B7000
heap
page read and write
1716D8B9000
heap
page read and write
21DD9246000
heap
page read and write
22FFC200000
heap
page read and write
21DD926B000
heap
page read and write
1DFB5324000
heap
page read and write
22FFC220000
heap
page read and write
BFC0AFF000
stack
page read and write
69F000
heap
page read and write
1716BC05000
heap
page read and write
1DFB5502000
heap
page read and write
342D87E000
stack
page read and write
1716DD37000
heap
page read and write
1DFB3670000
heap
page read and write
1DFB3360000
unkown
page readonly
1F71B1F0000
heap
page read and write
7FF88C093000
unkown
page readonly
1716D890000
heap
page read and write
1DFB52EB000
heap
page read and write
1DFB35E0000
trusted library allocation
page read and write
1716E380000
remote allocation
page read and write
274B6402000
unkown
page read and write
274B61D0000
heap
page read and write
1DFB34AE000
heap
page read and write
1DFB3495000
heap
page read and write
25B02540000
heap
page read and write
25B02940000
trusted library allocation
page read and write
7FF88C070000
unkown
page readonly
21DD9228000
heap
page read and write
21DD924B000
heap
page read and write
1DFB5601000
heap
page read and write
2100000
heap
page read and write
1DFB3320000
heap
page read and write
67D000
heap
page read and write
1716DAC4000
heap
page read and write
27ED379C000
heap
page read and write
1DFB5351000
heap
page read and write
21DD9248000
heap
page read and write
21DDAC30000
heap
page read and write
1F71B330000
heap
page read and write
1DFB52FE000
heap
page read and write
1716D8DD000
heap
page read and write
22FFC038000
heap
page read and write
1DFB5317000
heap
page read and write
25B029B0000
trusted library allocation
page read and write
22FFC220000
heap
page read and write
1DFB52D8000
heap
page read and write
BEFD49C000
stack
page read and write
1716D8C4000
heap
page read and write
BFC0B7F000
stack
page read and write
1DFB52EB000
heap
page read and write
1DFB35E0000
trusted library allocation
page read and write
21DD9214000
heap
page read and write
1716E360000
heap
page read and write
19E3D480000
heap
page read and write
1716BC20000
trusted library allocation
page read and write
1F71CC60000
heap
page read and write
2111000
heap
page read and write
1DFB534D000
heap
page read and write
1DFB530B000
heap
page read and write
1716D910000
heap
page read and write
25B02740000
heap
page read and write
342D67C000
stack
page read and write
21DD9221000
heap
page read and write
4079D6F000
stack
page read and write
274B6523000
heap
page read and write
1DFB349D000
heap
page read and write
7FF88C070000
unkown
page readonly
1716E470000
heap
page read and write
19E3D480000
heap
page read and write
1DFB52CA000
heap
page read and write
21DDAC44000
heap
page read and write
1716DC87000
heap
page read and write
27ED3730000
heap
page read and write
1716DC2F000
heap
page read and write
21DD9246000
heap
page read and write
1DFB52D8000
heap
page read and write
21DDAD92000
heap
page read and write
1716D88A000
heap
page read and write
1DFB367A000
heap
page read and write
27ED3B60000
heap
page read and write
22FFC305000
heap
page read and write
7FF88C070000
unkown
page readonly
21DD926B000
heap
page read and write
21DD9268000
heap
page read and write
1DFB5335000
heap
page read and write
1716BABD000
heap
page read and write
1DFB5324000
heap
page read and write
1716DC87000
heap
page read and write
1716DCE5000
heap
page read and write
1DFB5800000
heap
page read and write
1DFB5E10000
heap
page read and write
1DFB34AB000
heap
page read and write
4079D6F000
stack
page read and write
1716BC20000
trusted library allocation
page read and write
19E3D425000
heap
page read and write
19E3D430000
heap
page read and write
1716BA89000
heap
page read and write
1716BC20000
trusted library allocation
page read and write
274B6602000
heap
page read and write
1716D89E000
heap
page read and write
1716D8D6000
heap
page read and write
1DFB5311000
heap
page read and write
1716D900000
heap
page read and write
665000
heap
page read and write
1716BAB7000
heap
page read and write
1716D88A000
heap
page read and write
7FF88C0A9000
unkown
page write copy
63B000
heap
page read and write
19E3D3F0000
heap
page read and write
1716D904000
heap
page read and write
630000
heap
page read and write
21DDAB20000
remote allocation
page read and write
1716BA91000
heap
page read and write
7FF88C0A8000
unkown
page write copy
1DFB5D11000
heap
page read and write
BFC0B7F000
stack
page read and write
7FF88C071000
unkown
page execute read
21DD9250000
heap
page read and write
19E3D2B0000
heap
page read and write
1DFB35E0000
trusted library allocation
page read and write
1F71CC62000
heap
page read and write
1716BA91000
heap
page read and write
21DD9060000
heap
page read and write
1716DC89000
heap
page read and write
1DFB56C7000
heap
page read and write
1716BA8E000
heap
page read and write
280000
heap
page read and write
21DD9221000
heap
page read and write
27ED378E000
heap
page read and write
21DD923C000
heap
page read and write
274B6428000
heap
page read and write
21DD9255000
heap
page read and write
1716D8AA000
heap
page read and write
1716BC50000
trusted library allocation
page read and write
19E3D3F0000
heap
page read and write
3DE000
direct allocation
page execute and read and write
1DFB5E14000
heap
page read and write
1DFB349F000
heap
page read and write
21DD9250000
heap
page read and write
1DFB34C7000
heap
page read and write
1DFB3380000
unkown
page read and write
21DD9268000
heap
page read and write
19E3D488000
heap
page read and write
1716BA84000
heap
page read and write
4079D6F000
stack
page read and write
1DFB52E5000
heap
page read and write
1716D910000
heap
page read and write
1DFB3390000
heap
page read and write
1DFB34A9000
heap
page read and write
1DFB5E17000
heap
page read and write
1716D8D6000
heap
page read and write
7FF88C070000
unkown
page readonly
1716D8DD000
heap
page read and write
1DFB52EB000
heap
page read and write
21DDAB20000
remote allocation
page read and write
21DD9221000
heap
page read and write
22FFC038000
heap
page read and write
1F71B1F0000
heap
page read and write
1716D8D0000
heap
page read and write
1716D90D000
heap
page read and write
BEFD9F9000
stack
page read and write
1716D8CA000
heap
page read and write
21DD9248000
heap
page read and write
21DD9252000
heap
page read and write
27ED3770000
heap
page read and write
BFC0B7F000
stack
page read and write
19E3D2B0000
unkown
page read and write
274B6717000
heap
page read and write
1DFB5311000
heap
page read and write
274B6713000
heap
page read and write
21DD9268000
heap
page read and write
7FF88C071000
unkown
page execute read
7FF88C093000
unkown
page readonly
1DFB35E0000
trusted library allocation
page read and write
1DFB52FE000
heap
page read and write
1716B9D2000
heap
page read and write
1716BC9E000
heap
page read and write
19E3D420000
heap
page read and write
1DFB35E0000
trusted library allocation
page read and write
1F71CC9D000
heap
page read and write
19E3D3F0000
heap
page read and write
21DD91E6000
heap
page read and write
7FF88C071000
unkown
page execute read
7FF88C0A8000
unkown
page read and write
1DFB3675000
heap
page read and write
1DFB348E000
heap
page read and write
1716D8BD000
heap
page read and write
22FFC030000
heap
page read and write
1DFB530B000
heap
page read and write
1DFB3498000
heap
page read and write
65D000
heap
page read and write
875000
heap
page read and write
1716DD8C000
heap
page read and write
7FF88C0B6000
unkown
page readonly
4079DEF000
stack
page read and write
1716D8CA000
heap
page read and write
342D47F000
stack
page read and write
C130BF9000
stack
page read and write
1DFB52DF000
heap
page read and write
27ED3951000
heap
page read and write
1716BC20000
trusted library allocation
page read and write
1DFB35E0000
trusted library allocation
page read and write
1716D916000
heap
page read and write
1DFB531D000
heap
page read and write
1DFB33B0000
heap
page read and write
1DFB52DE000
heap
page read and write
25B02786000
heap
page read and write
21DD9218000
heap
page read and write
22FFC300000
heap
page read and write
274B6702000
heap
page read and write
274B61E0000
trusted library allocation
page read and write
1DFB5353000
heap
page read and write
274B6500000
trusted library allocation
page read and write
1716BA87000
heap
page read and write
27ED3960000
heap
page read and write
21DD9250000
heap
page read and write
1DFB5304000
heap
page read and write
7FF88C0A9000
unkown
page write copy
1716D8A4000
heap
page read and write
1F71CC71000
heap
page read and write
1DFB5317000
heap
page read and write
1716BC90000
heap
page read and write
1DFB5311000
heap
page read and write
21DD9246000
heap
page read and write
1DFB5777000
heap
page read and write
6CF000
heap
page read and write
21DD923C000
heap
page read and write
21DD9268000
heap
page read and write
1DFB5E11000
heap
page read and write
1716BA8C000
heap
page read and write
7FF88C0B3000
unkown
page read and write
7FF88C0A8000
unkown
page write copy
21DD9255000
heap
page read and write
21DD926B000
heap
page read and write
1716BA9B000
heap
page read and write
342D7FC000
stack
page read and write
1716B9E4000
heap
page read and write
1DFB5304000
heap
page read and write
1716B9E7000
heap
page read and write
1DFB5357000
heap
page read and write
27ED37C9000
heap
page read and write
6208FE000
stack
page read and write
1716D8C3000
heap
page read and write
21DD9268000
heap
page read and write
7FF88C0B6000
unkown
page readonly
1716B940000
heap
page read and write
1716BA98000
heap
page read and write
19E3EE10000
remote allocation
page read and write
1DFB530B000
heap
page read and write
19E3D430000
heap
page read and write
1716D8A4000
heap
page read and write
1716D903000
heap
page read and write
21DD923C000
heap
page read and write
1716D8E3000
heap
page read and write
1DFB5351000
heap
page read and write
1716E2D1000
heap
page read and write
342D5FB000
stack
page read and write
1DFB52DE000
heap
page read and write
21DD921D000
heap
page read and write
1DFB5351000
heap
page read and write
25B028E0000
trusted library allocation
page read and write
7C1647C000
stack
page read and write
1DFB35E0000
trusted library allocation
page read and write
7FF88C0B6000
unkown
page readonly
33B000
stack
page read and write
21DD9252000
heap
page read and write
1DFB5E1A000
heap
page read and write
1716DAC0000
heap
page read and write
1716D8AA000
heap
page read and write
7FF88C0B3000
unkown
page read and write
1716BA96000
heap
page read and write
21DD9218000
heap
page read and write
1F71CC40000
heap
page read and write
7FF88C0B3000
unkown
page read and write
1DFB3490000
heap
page read and write
370000
heap
page read and write
1716E610000
heap
page read and write
21DD925F000
heap
page read and write
1716D910000
heap
page read and write
1DFB35E0000
trusted library allocation
page read and write
655000
heap
page read and write
1716BA94000
heap
page read and write
21DD91E7000
heap
page read and write
1DFB5351000
heap
page read and write
25B02749000
heap
page read and write
22FFBFC0000
heap
page read and write
6CF000
heap
page read and write
1716BC20000
trusted library allocation
page read and write
1716E1C0000
heap
page read and write
1716E2C0000
heap
page read and write
1716BAA4000
heap
page read and write
1DFB5351000
heap
page read and write
1716D8D6000
heap
page read and write
1DFB3650000
heap
page read and write
7FF88C0B6000
unkown
page readonly
1716D8B7000
heap
page read and write
1DFB3380000
unkown
page read and write
274B6600000
heap
page read and write
1716D916000
heap
page read and write
1DFB5311000
heap
page read and write
19E3D2B0000
unkown
page read and write
1716E474000
heap
page read and write
7FF88C0B3000
unkown
page read and write
69F000
heap
page read and write
1DFB52C6000
heap
page read and write
1716E380000
remote allocation
page read and write
1716D910000
heap
page read and write
21DD9252000
heap
page read and write
1DFB3610000
trusted library allocation
page read and write
1716B9A0000
unkown
page read and write
21DD9248000
heap
page read and write
1DFB52F8000
heap
page read and write
27ED3790000
heap
page read and write
22FFC300000
heap
page read and write
27ED377D000
heap
page read and write
1DFB3370000
unkown
page readonly
7FF88C093000
unkown
page readonly
1F71B160000
heap
page read and write
1716E2E3000
heap
page read and write
1716E471000
heap
page read and write
1DFB34CE000
heap
page read and write
1716BC20000
trusted library allocation
page read and write
650000
heap
page read and write
21DD9218000
heap
page read and write
1DFB5338000
heap
page read and write
BFC0A7C000
stack
page read and write
1716DD8C000
heap
page read and write
390000
heap
page read and write
21DD91F4000
heap
page read and write
21DD9268000
heap
page read and write
1DFB35E0000
trusted library allocation
page read and write
1716B990000
unkown
page readonly
7FF88C070000
unkown
page readonly
21DD9239000
heap
page read and write
1DFB35E0000
trusted library allocation
page read and write
1716D90D000
heap
page read and write
25B02550000
trusted library allocation
page read and write
4079CEC000
stack
page read and write
1DFB52C0000
heap
page read and write
1716D8C3000
heap
page read and write
342D57F000
stack
page read and write
1DFB5777000
heap
page read and write
1716BC20000
trusted library allocation
page read and write
BEFD879000
stack
page read and write
22FFC2B0000
remote allocation
page read and write
7FF88C071000
unkown
page execute read
1F71B17E000
heap
page read and write
1DFB34A9000
heap
page read and write
1716BA8C000
heap
page read and write
62087E000
unkown
page read and write
1716E477000
heap
page read and write
1716D8C3000
heap
page read and write
21DD9221000
heap
page read and write
1716D910000
heap
page read and write
19E3EE90000
heap
page read and write
21DD921D000
heap
page read and write
1716D8C3000
heap
page read and write
1716D8B0000
heap
page read and write
1716E47A000
heap
page read and write
7FF88C0A8000
unkown
page read and write
1DFB5C00000
heap
page read and write
4079DEF000
stack
page read and write
21DDAB60000
heap
page read and write
1716E430000
heap
page read and write
7FF88C0A8000
unkown
page write copy
1716DBC1000
heap
page read and write
870000
heap
page read and write
27ED37C9000
heap
page read and write
21DD91F0000
heap
page read and write
21DD923C000
heap
page read and write
1DFB35E0000
trusted library allocation
page read and write
7FF88C093000
unkown
page readonly
21DD926B000
heap
page read and write
1716D910000
heap
page read and write
21DD926B000
heap
page read and write
1716B9C0000
heap
page read and write
1DFB34C7000
heap
page read and write
1716DD8C000
heap
page read and write
19E3EE90000
heap
page read and write
1716D8CA000
heap
page read and write
1DFB33D0000
heap
page read and write
1DFB5504000
heap
page read and write
25B02720000
trusted library allocation
page read and write
21DD9246000
heap
page read and write
1716E2E3000
heap
page read and write
1716DD37000
heap
page read and write
1716DD37000
heap
page read and write
1716BC20000
trusted library allocation
page read and write
21DD91F3000
heap
page read and write
1DFB349A000
heap
page read and write
22FFBFC0000
unkown
page read and write
1DFB533C000
heap
page read and write
7FF88C0B3000
unkown
page read and write
1DFB5351000
heap
page read and write
21DD9218000
heap
page read and write
1F71B515000
heap
page read and write
21DD91DE000
heap
page read and write
1DFB35F0000
heap
page read and write
274B6613000
heap
page read and write
1716D8E3000
heap
page read and write
19E3D480000
heap
page read and write
7FF88C071000
unkown
page execute read
21DD9255000
heap
page read and write
6205D3000
stack
page read and write
1DFB349D000
heap
page read and write
672000
heap
page read and write
1716D90D000
heap
page read and write
1716BA80000
heap
page read and write
21DD9255000
heap
page read and write
1DFB5D01000
heap
page read and write
25B027B1000
heap
page read and write
1DFB5801000
heap
page read and write
1716D914000
heap
page read and write
1F71CC00000
direct allocation
page execute and read and write
C4B23CD000
stack
page read and write
27ED35B0000
heap
page read and write
1716BC20000
trusted library allocation
page read and write
21DD9268000
heap
page read and write
1716BA9C000
heap
page read and write
7FF88C0A8000
unkown
page write copy
1DFB52F1000
heap
page read and write
1716BC20000
trusted library allocation
page read and write
19E3D488000
heap
page read and write
1DFB5600000
heap
page read and write
21DD9221000
heap
page read and write
21DD933E000
direct allocation
page execute and read and write
1F71B1C0000
heap
page read and write
21DD923C000
heap
page read and write
21DD925E000
heap
page read and write
1716BC20000
trusted library allocation
page read and write
1DFB34C7000
heap
page read and write
1716DDC1000
heap
page read and write
1716D910000
heap
page read and write
1716D8A4000
heap
page read and write
22FFC300000
heap
page read and write
1DFB35E0000
trusted library allocation
page read and write
1716D8E3000
heap
page read and write
1716D89E000
heap
page read and write
21DD9218000
heap
page read and write
740C07C000
stack
page read and write
1DFB531D000
heap
page read and write
19E3D425000
heap
page read and write
1716D8E3000
heap
page read and write
1F71B193000
heap
page read and write
1716D8AB000
heap
page read and write
BFC0A7C000
stack
page read and write
25B0278E000
heap
page read and write
BEFDA7C000
stack
page read and write
7FF88C0B6000
unkown
page readonly
1F71CC0E000
direct allocation
page execute and read and write
1716BC30000
heap
page read and write
4079DEF000
stack
page read and write
21DD9255000
heap
page read and write
1716DE13000
heap
page read and write
1DFB5359000
heap
page read and write
1716D897000
heap
page read and write
21DDAC4D000
heap
page read and write
1DFB5352000
heap
page read and write
27ED3710000
direct allocation
page execute and read and write
1DFB5853000
heap
page read and write
1DFB33D8000
heap
page read and write
21DD9250000
heap
page read and write
25B02680000
heap
page read and write
1716D8DD000
heap
page read and write
25B028F0000
trusted library allocation
page read and write
1DFB52F8000
heap
page read and write
21DD923C000
heap
page read and write
There are 845 hidden memdumps, click here to show them.