IOC Report
pzG0rkIchr.dll

loading gif

Files

File Path
Type
Category
Malicious
pzG0rkIchr.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_pzG_206411b7d18c8b51ef308e99261d801f59953bc0_4f0e5919_15ebd55f\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_pzG_738eef979a666465c6051ddd5fef4b7e70c91a_4f0e5919_15905d59\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER148A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1BBF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCC66.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Nov 24 13:31:29 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCF55.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD021.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDC43.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Nov 24 13:31:09 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_pzG_5df03237c245e7792ae728ba7af47d1bed8c47f7_4f0e5919_16399239\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_pzG_f6b0ff3966a3d6c74191edf638977ebb42334d7_4f0e5919_156d919c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8047.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Nov 24 04:19:45 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER80D3.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Nov 24 04:19:46 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER848E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8588.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8589.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8683.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\pzG0rkIchr.dll"
malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\pzG0rkIchr.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\pzG0rkIchr.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\pzG0rkIchr.dll,DllRegisterServer
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\pzG0rkIchr.dll,ItsnPq5v
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\pzG0rkIchr.dll,QlqYo259k
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pzG0rkIchr.dll",#1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6044 -s 276
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6136 -s 304
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6136 -s 304
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2100 -s 304
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 1308 -s 304
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2100 -s 304
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 1308 -s 304
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://gigimas.xyz
unknown
malicious
https://gigimas.xyz/index.html9Pu/Jl
unknown
malicious
https://gigimas.xyz/index.html5F
unknown
malicious
https://gigimas.xyz/index.html
unknown
malicious
https://gigimas.xyz/index.htmlT
unknown
malicious
https://gigimas.xyzhttps://reaso.xyz
unknown
malicious
https://gigimas.xyz/index.htmlm
unknown
malicious
https://gigimas.xyz/
unknown
malicious
https://gigimas.xyz:443/index.htmlY_
unknown
malicious
https://gigimas.xyz:443/index.html
unknown
malicious
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://sectigo.com/CPS0
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
https://http://Mozilla/5.0
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
https://reaso.xyz
unknown
https://gigimas.xyz/index.html)I6
unknown
https://gigimas.xyz/92
unknown
https://gigimas.xyz/index.htmlr
unknown
https://gigimas.xyz/ic
unknown
https://gigimas.xyz/index.htmluH
unknown
https://gigimas.xyz/index.htmll
unknown
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
gigimas.xyz
185.250.148.35
malicious

IPs

IP
Domain
Country
Malicious
185.250.148.35
gigimas.xyz
Russian Federation
malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{5a15be30-4994-9ade-150c-a3ec62400022}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{5a15be30-4994-9ade-150c-a3ec62400022}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{5a15be30-4994-9ade-150c-a3ec62400022}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{5a15be30-4994-9ade-150c-a3ec62400022}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{5a15be30-4994-9ade-150c-a3ec62400022}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{5a15be30-4994-9ade-150c-a3ec62400022}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{5a15be30-4994-9ade-150c-a3ec62400022}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{5a15be30-4994-9ade-150c-a3ec62400022}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{5a15be30-4994-9ade-150c-a3ec62400022}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{5a15be30-4994-9ade-150c-a3ec62400022}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{5a15be30-4994-9ade-150c-a3ec62400022}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{5a15be30-4994-9ade-150c-a3ec62400022}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{5a15be30-4994-9ade-150c-a3ec62400022}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{5a15be30-4994-9ade-150c-a3ec62400022}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{5a15be30-4994-9ade-150c-a3ec62400022}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{5a15be30-4994-9ade-150c-a3ec62400022}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsPeFile
\REGISTRY\A\{5a15be30-4994-9ade-150c-a3ec62400022}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
00188008FC895625
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
00188008FC895625
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsPeFile
\REGISTRY\A\{a8654e0f-a976-e283-25ad-ac4613afc19f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
00184006417502B9
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
00184006417502B9
There are 34 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1EA8D611000
heap
page read and write
22E737B0000
trusted library allocation
page read and write
1D9EDA13000
heap
page read and write
1EA8D3D0000
unkown
page readonly
7FFC130E0000
unkown
page readonly
17B358E3000
heap
page read and write
1EA8F2F8000
heap
page read and write
1D692A08000
heap
page read and write
22E7384F000
heap
page read and write
22E737D0000
trusted library allocation
page read and write
1BD4463C000
heap
page read and write
27A6BD30000
heap
page read and write
1EA8F331000
heap
page read and write
201A4292000
heap
page read and write
1EA8FE94000
heap
page read and write
1BD44657000
heap
page read and write
20164179000
heap
page read and write
7F9000
heap
page read and write
1D9EDA5A000
heap
page read and write
1EA8F356000
heap
page read and write
DF487B000
stack
page read and write
1EA8F33D000
heap
page read and write
7A9000
heap
page read and write
1BD44674000
heap
page read and write
6F556FF000
stack
page read and write
1EA8F311000
heap
page read and write
6D0000
heap
page read and write
DF4E7E000
stack
page read and write
A10000
heap
page read and write
1EA8D640000
trusted library allocation
page read and write
E88312B000
stack
page read and write
1D692900000
heap
page read and write
1BD44683000
heap
page read and write
1BD44665000
heap
page read and write
7FFC13126000
unkown
page readonly
27A6BDF0000
heap
page read and write
21A0000
heap
page read and write
1EA8D3C0000
unkown
page readonly
201A28D0000
heap
page read and write
22E73780000
heap
page read and write
19D63EF0000
heap
page read and write
7FFC13126000
unkown
page readonly
AE0A0FE000
stack
page read and write
2293BFD000
stack
page read and write
1EA8F2F1000
heap
page read and write
27DD000
stack
page read and write
E8834FD000
stack
page read and write
1EA8F2FE000
heap
page read and write
1D692A00000
heap
page read and write
78E000
heap
page read and write
19D6404E000
heap
page read and write
7FFC13126000
unkown
page readonly
1D692900000
heap
page read and write
1EA8D611000
heap
page read and write
1EA8F356000
heap
page read and write
7A9000
heap
page read and write
22E7382A000
heap
page read and write
148DC513000
heap
page read and write
1EA8D6A0000
heap
page read and write
7A0000
heap
page read and write
1F9D4802000
heap
page read and write
1EA8D627000
heap
page read and write
7C0000
heap
page read and write
1EA8D552000
heap
page read and write
1EA8F33D000
heap
page read and write
E88377C000
stack
page read and write
148DC500000
heap
page read and write
19D64013000
heap
page read and write
7FFC13119000
unkown
page write copy
1EA8D605000
heap
page read and write
20164127000
heap
page read and write
785000
heap
page read and write
201640F0000
heap
page read and write
496C9FF000
stack
page read and write
D7705FF000
stack
page read and write
7CF000
heap
page read and write
1EA8D4E0000
heap
page read and write
496CEFE000
stack
page read and write
DF4C7E000
stack
page read and write
1BD4467B000
heap
page read and write
1F9D40BF000
heap
page read and write
79C000
heap
page read and write
1D694400000
heap
page read and write
27A6BDF8000
heap
page read and write
A45000
heap
page read and write
1D9EDA6E000
heap
page read and write
7FFC130E0000
unkown
page readonly
1EA8D611000
heap
page read and write
1F9D4029000
heap
page read and write
20164410000
heap
page read and write
7FFC13103000
unkown
page readonly
7F9000
heap
page read and write
1D692955000
heap
page read and write
7F5000
heap
page read and write
684C5FE000
stack
page read and write
20E2000
heap
page read and write
E883CFD000
stack
page read and write
201A42B0000
heap
page read and write
1EA8FDB0000
remote allocation
page read and write
7FFC13103000
unkown
page readonly
1FC35229000
heap
page read and write
7273CFF000
stack
page read and write
1EA8D640000
trusted library allocation
page read and write
27A6BDF0000
heap
page read and write
E883BFE000
stack
page read and write
1BD445F0000
trusted library allocation
page read and write
1BD44661000
heap
page read and write
7DD000
heap
page read and write
21BD000
heap
page read and write
1BD44639000
heap
page read and write
2D6DFE13000
heap
page read and write
1EA8F31E000
heap
page read and write
17B374B1000
heap
page read and write
7FFC130E1000
unkown
page execute read
1EA8D637000
heap
page read and write
19D64971000
heap
page read and write
7FFC130E0000
unkown
page readonly
1FC35202000
heap
page read and write
1EA8D60C000
heap
page read and write
80C000
heap
page read and write
D7705FF000
stack
page read and write
275C000
stack
page read and write
201A27D0000
heap
page read and write
1EA8FE97000
heap
page read and write
7FFC13123000
unkown
page read and write
1BD4465B000
heap
page read and write
20164340000
heap
page read and write
17B358B0000
heap
page read and write
1EA8F31E000
heap
page read and write
1EA8F2E4000
heap
page read and write
1BD44600000
heap
page read and write
7FF000
heap
page read and write
1EA8D640000
trusted library allocation
page read and write
201A42C4000
heap
page read and write
1BD44668000
heap
page read and write
1EA8F33E000
heap
page read and write
1BD4467E000
heap
page read and write
148DC47E000
heap
page read and write
20164103000
heap
page read and write
7FFC13118000
unkown
page write copy
A00000
remote allocation
page read and write
1EA8F378000
heap
page read and write
19D64065000
heap
page read and write
19D63FF0000
trusted library allocation
page read and write
201A27A3000
heap
page read and write
20FD000
heap
page read and write
7273C7C000
stack
page read and write
20164342000
heap
page read and write
1BD44679000
heap
page read and write
1D9EDB13000
heap
page read and write
1EA8F2E0000
heap
page read and write
1EA8D609000
heap
page read and write
20164351000
heap
page read and write
17B35910000
heap
page read and write
D7704FC000
stack
page read and write
19D64074000
heap
page read and write
7FFC13118000
unkown
page write copy
27A6BD50000
heap
page read and write
1BD44647000
heap
page read and write
1EA8F6E7000
heap
page read and write
1EA8F324000
heap
page read and write
F351B7E000
stack
page read and write
27A6BD50000
heap
page read and write
7DD000
heap
page read and write
201A27D0000
heap
page read and write
1EA8F371000
heap
page read and write
1EA8F318000
heap
page read and write
26DC000
stack
page read and write
22934EB000
stack
page read and write
1EA8D60F000
heap
page read and write
7FF96FF000
stack
page read and write
7C3000
heap
page read and write
1EA8F30B000
heap
page read and write
9B3AAFC000
stack
page read and write
A40000
heap
page read and write
27A6BD50000
heap
page read and write
1D9EDA02000
heap
page read and write
1EA8F311000
heap
page read and write
1EA8FDB0000
remote allocation
page read and write
1F9D3E20000
heap
page read and write
7FFC130E0000
unkown
page readonly
2D6DFE69000
heap
page read and write
1EA8F305000
heap
page read and write
1D9EDA52000
heap
page read and write
1EA8D563000
heap
page read and write
1EA8F367000
heap
page read and write
1EA8D60F000
heap
page read and write
7DA000
heap
page read and write
1EA8F331000
heap
page read and write
148DC457000
heap
page read and write
1EA8F6E7000
heap
page read and write
27A6C0D0000
heap
page read and write
1EA8D640000
trusted library allocation
page read and write
1EA8FD43000
heap
page read and write
27A6BD30000
heap
page read and write
7FFC13118000
unkown
page read and write
1F9D4900000
heap
page read and write
19D641E5000
heap
page read and write
1FC35030000
heap
page read and write
1EA8F331000
heap
page read and write
7FFC13123000
unkown
page read and write
1EA8D617000
heap
page read and write
2D6DFD90000
heap
page read and write
19D64055000
heap
page read and write
1EA8D4C0000
heap
page read and write
1EA8D640000
trusted library allocation
page read and write
7DC000
heap
page read and write
1EA8D640000
trusted library allocation
page read and write
1EA8D613000
heap
page read and write
7FFC13126000
unkown
page readonly
27A6BCC0000
heap
page read and write
1EA8F6E7000
heap
page read and write
1D9ED910000
heap
page read and write
21B4000
heap
page read and write
1D9EDA65000
heap
page read and write
1EA8D617000
heap
page read and write
2D6DFE00000
heap
page read and write
1EA8F337000
heap
page read and write
1EA8F2EA000
heap
page read and write
1EA8F324000
heap
page read and write
1EA8F371000
heap
page read and write
17B3732D000
heap
page read and write
22E7387E000
heap
page read and write
1BD4464E000
heap
page read and write
1EA8F377000
heap
page read and write
1EA8D60D000
heap
page read and write
17B358BE000
heap
page read and write
7A9000
heap
page read and write
1EA8F797000
heap
page read and write
1EA8F337000
heap
page read and write
1EA8F2F7000
heap
page read and write
7FC000
heap
page read and write
7A9000
heap
page read and write
AE09EFE000
stack
page read and write
2D6DFE2F000
heap
page read and write
1EA8D670000
trusted library allocation
page read and write
7FFC13119000
unkown
page write copy
148DC428000
heap
page read and write
22E73918000
heap
page read and write
1FC357C0000
remote allocation
page read and write
7A0000
heap
page read and write
1EA8F30B000
heap
page read and write
17B35940000
heap
page read and write
1FC35259000
heap
page read and write
1D692A08000
heap
page read and write
19D64A23000
heap
page read and write
1EA8F2EA000
heap
page read and write
19D64902000
heap
page read and write
1D692990000
remote allocation
page read and write
17B35850000
heap
page read and write
7E8000
heap
page read and write
27A6C0D5000
heap
page read and write
1EA8F873000
heap
page read and write
7E8000
heap
page read and write
1EA8F620000
heap
page read and write
1EA8D637000
heap
page read and write
1EA8D3E0000
unkown
page read and write
148DC469000
heap
page read and write
201A29F0000
heap
page read and write
7FFC130E1000
unkown
page execute read
1FC357C0000
remote allocation
page read and write
1EA8D640000
trusted library allocation
page read and write
1BD44677000
heap
page read and write
1EA8D60C000
heap
page read and write
7F9000
heap
page read and write
78D000
heap
page read and write
D77057F000
stack
page read and write
1BD44641000
heap
page read and write
808000
heap
page read and write
2D6DFD40000
heap
page read and write
1EA8D617000
heap
page read and write
19D64922000
heap
page read and write
7FFC13119000
unkown
page write copy
201640C0000
direct allocation
page execute and read and write
9B3A77C000
stack
page read and write
1D692900000
heap
page read and write
AE09D7E000
stack
page read and write
1EA8F358000
heap
page read and write
1EA8F344000
heap
page read and write
148DC350000
heap
page read and write
7C0000
heap
page read and write
27A6BDF8000
heap
page read and write
7FC000
heap
page read and write
2293D7D000
stack
page read and write
1EA8D63E000
heap
page read and write
1EA8D640000
trusted library allocation
page read and write
496CB79000
stack
page read and write
1F9D40E6000
heap
page read and write
1EA8D637000
heap
page read and write
1EA8D650000
heap
page read and write
2D6DFDC0000
trusted library allocation
page read and write
E88397E000
stack
page read and write
1EA8D637000
heap
page read and write
19D64922000
heap
page read and write
9B3A11C000
stack
page read and write
1EA8FD43000
heap
page read and write
1D9EDA00000
heap
page read and write
1D692920000
heap
page read and write
1EA8F378000
heap
page read and write
20164204000
heap
page read and write
22E7385F000
heap
page read and write
1EA8FD21000
heap
page read and write
27A6C0D5000
heap
page read and write
1EA8F2FE000
heap
page read and write
1BD44629000
heap
page read and write
201640A0000
heap
page read and write
7273CFF000
stack
page read and write
17B358CE000
heap
page read and write
19D64954000
heap
page read and write
1BD4466D000
heap
page read and write
1EA8F318000
heap
page read and write
229397F000
stack
page read and write
19D64943000
heap
page read and write
1D9EE070000
trusted library allocation
page read and write
1F9D3F90000
trusted library allocation
page read and write
19D64069000
heap
page read and write
19D64A13000
heap
page read and write
19D64087000
heap
page read and write
1EA8F2FC000
heap
page read and write
1EA8F35C000
heap
page read and write
19D6403C000
heap
page read and write
1EA8F318000
heap
page read and write
1EA8F2FE000
heap
page read and write
1EA8D627000
heap
page read and write
1EA8D380000
heap
page read and write
F351C79000
stack
page read and write
2293AFE000
stack
page read and write
7C0000
heap
page read and write
201A2800000
heap
page read and write
7A2000
heap
page read and write
7E8000
heap
page read and write
2016411C000
heap
page read and write
1EA900A0000
heap
page read and write
7FFC13126000
unkown
page readonly
1FC35200000
heap
page read and write
AE0A1FF000
stack
page read and write
1EA8D613000
heap
page read and write
27A6BDF8000
heap
page read and write
1EA8F35C000
heap
page read and write
D77057F000
stack
page read and write
17B374A2000
heap
page read and write
148DC413000
heap
page read and write
6F554FE000
stack
page read and write
815000
heap
page read and write
1BD44420000
heap
page read and write
1EA8D606000
heap
page read and write
17B35910000
heap
page read and write
278029C000
stack
page read and write
9B3A87C000
stack
page read and write
1D9EDA29000
heap
page read and write
A00000
remote allocation
page read and write
760000
heap
page read and write
1EA8F2E6000
heap
page read and write
6F558FF000
stack
page read and write
2D6E0602000
trusted library allocation
page read and write
17B358B7000
heap
page read and write
1EA8F32B000
heap
page read and write
19D64A02000
heap
page read and write
1D6927C0000
heap
page read and write
1EA8F745000
heap
page read and write
148DCC02000
trusted library allocation
page read and write
1EA8D619000
heap
page read and write
1F9D4113000
heap
page read and write
1F9D3E30000
heap
page read and write
19D649B3000
heap
page read and write
6F555FF000
stack
page read and write
1EA8D640000
trusted library allocation
page read and write
1EA8F358000
heap
page read and write
1EA8D640000
trusted library allocation
page read and write
1EA8D640000
trusted library allocation
page read and write
17B35710000
heap
page read and write
1EA8F2FE000
heap
page read and write
1EA8D61B000
heap
page read and write
2D6DFF02000
heap
page read and write
1EA8D640000
trusted library allocation
page read and write
E883A7E000
stack
page read and write
22E75330000
remote allocation
page read and write
1EA8D60A000
heap
page read and write
1EA8FE9A000
heap
page read and write
1D692A00000
heap
page read and write
1EA8D6A5000
heap
page read and write
80F000
heap
page read and write
1BD4467A000
heap
page read and write
2293DFE000
stack
page read and write
1D692920000
heap
page read and write
19D64670000
trusted library allocation
page read and write
1EA8F371000
heap
page read and write
1BD44643000
heap
page read and write
19D6408C000
heap
page read and write
1BD44663000
heap
page read and write
1D692955000
heap
page read and write
496C67C000
stack
page read and write
1EA8F30B000
heap
page read and write
1EA8F371000
heap
page read and write
1BD44613000
heap
page read and write
1EA8F371000
heap
page read and write
7FFC13118000
unkown
page read and write
808000
heap
page read and write
1F9D406E000
heap
page read and write
7E8000
heap
page read and write
1EA8D620000
heap
page read and write
9B3ADFE000
stack
page read and write
1BD44656000
heap
page read and write
201640CE000
direct allocation
page execute and read and write
1EA8D62E000
heap
page read and write
1EA8F305000
heap
page read and write
19D64113000
heap
page read and write
201A2600000
heap
page read and write
7FFC130E0000
unkown
page readonly
148DC481000
heap
page read and write
1D6927C0000
unkown
page read and write
1EA8D637000
heap
page read and write
22E73710000
heap
page read and write
148DC2F0000
heap
page read and write
1EA8F319000
heap
page read and write
684C3FE000
stack
page read and write
1EA8F344000
heap
page read and write
1EA8FE90000
heap
page read and write
17B359E0000
direct allocation
page execute and read and write
1EA8F2F8000
heap
page read and write
1D9EDA57000
heap
page read and write
7FFC13103000
unkown
page readonly
19D6405C000
heap
page read and write
27A6BDF0000
heap
page read and write
201A278E000
heap
page read and write
1BD4466F000
heap
page read and write
17B374A0000
heap
page read and write
496CF7E000
stack
page read and write
1F9D4000000
heap
page read and write
78D000
heap
page read and write
2D6DFE3C000
heap
page read and write
AE09C7B000
stack
page read and write
27A6D990000
heap
page read and write
7FFC13118000
unkown
page read and write
1EA8F2F1000
heap
page read and write
17B35A60000
heap
page read and write
2D6DFD30000
heap
page read and write
684BF0E000
unkown
page read and write
148DC440000
heap
page read and write
1EA8D603000
heap
page read and write
201A42A1000
heap
page read and write
1EA8D637000
heap
page read and write
19D64996000
heap
page read and write
7273CFF000
stack
page read and write
1EA8D603000
heap
page read and write
1EA8D5FE000
heap
page read and write
7FFC13123000
unkown
page read and write
1FC34FC0000
heap
page read and write
7A2000
heap
page read and write
27A6BDE0000
remote allocation
page read and write
1FC3523D000
heap
page read and write
2190000
heap
page read and write
201A278E000
heap
page read and write
7A0000
heap
page read and write
2D6DFE02000
heap
page read and write
D7705FF000
stack
page read and write
E88367C000
stack
page read and write
1EA8D3D0000
unkown
page readonly
1EA8F33D000
heap
page read and write
1BD4465F000
heap
page read and write
1D692990000
remote allocation
page read and write
7FFC13123000
unkown
page read and write
1F9D4040000
heap
page read and write
1EA8D670000
trusted library allocation
page read and write
17B35870000
heap
page read and write
1EA8F2F7000
heap
page read and write
1EA8D3E0000
unkown
page read and write
1EA8F311000
heap
page read and write
1F9D3E90000
heap
page read and write
1EA8F378000
heap
page read and write
798000
heap
page read and write
6F553FD000
stack
page read and write
2293C7F000
stack
page read and write
278031F000
stack
page read and write
201A2800000
heap
page read and write
1D692A08000
heap
page read and write
27A6BCC0000
unkown
page read and write
1EA8D640000
trusted library allocation
page read and write
1EA8D61B000
heap
page read and write
148DC380000
trusted library allocation
page read and write
1EA8D540000
heap
page read and write
2016420D000
heap
page read and write
1F9D40E3000
heap
page read and write
22E73885000
heap
page read and write
79C000
heap
page read and write
1D9EDB02000
heap
page read and write
19D6402A000
heap
page read and write
1EA8F32B000
heap
page read and write
73E000
direct allocation
page execute and read and write
27A6C0D5000
heap
page read and write
20164149000
heap
page read and write
1BD44660000
heap
page read and write
1EA8FE97000
heap
page read and write
79C000
heap
page read and write
7DD000
heap
page read and write
1EA8D608000
heap
page read and write
2016410E000
heap
page read and write
1EA8F311000
heap
page read and write
148DC2E0000
heap
page read and write
76B000
heap
page read and write
7FFC130E1000
unkown
page execute read
22E7383D000
heap
page read and write
1EA8D637000
heap
page read and write
7FFC13123000
unkown
page read and write
1EA8D637000
heap
page read and write
7FFC13123000
unkown
page read and write
1EA8F388000
heap
page read and write
1BD44658000
heap
page read and write
1EA8F371000
heap
page read and write
9B3A9FB000
stack
page read and write
1EA8FE91000
heap
page read and write
278039F000
stack
page read and write
7FF977F000
stack
page read and write
22E73913000
heap
page read and write
22E752B0000
trusted library allocation
page read and write
1EA8D640000
trusted library allocation
page read and write
1EA8FD31000
heap
page read and write
17B35940000
heap
page read and write
310000
heap
page read and write
7F9000
heap
page read and write
684BE83000
stack
page read and write
17B37324000
heap
page read and write
798000
heap
page read and write
1FC35302000
heap
page read and write
410E5FE000
stack
page read and write
F3513AB000
stack
page read and write
7FC000
heap
page read and write
1EA90170000
heap
page read and write
1BD44675000
heap
page read and write
201A2778000
heap
page read and write
22E7384F000
heap
page read and write
17B35AA5000
heap
page read and write
7E8000
heap
page read and write
1EA8F371000
heap
page read and write
217C000
stack
page read and write
F3517FF000
stack
page read and write
1EA8F525000
heap
page read and write
7FFC13119000
unkown
page write copy
1EA8D61C000
heap
page read and write
19D6407A000
heap
page read and write
17B358E3000
heap
page read and write
20F1000
heap
page read and write
1EA8FDB0000
remote allocation
page read and write
1EA8F311000
heap
page read and write
1EA8D6AA000
heap
page read and write
7F9000
heap
page read and write
201642F0000
heap
page read and write
27A6D990000
heap
page read and write
80C000
heap
page read and write
201A2870000
heap
page read and write
1BD443B0000
heap
page read and write
1D9ED8B0000
heap
page read and write
19D6406A000
heap
page read and write
1EA8F520000
heap
page read and write
17B359EE000
direct allocation
page execute and read and write
2D6DFE25000
heap
page read and write
20164179000
heap
page read and write
A00000
remote allocation
page read and write
1EA8F621000
heap
page read and write
1BD44702000
heap
page read and write
1EA8D548000
heap
page read and write
1D692950000
heap
page read and write
1EA8F2E6000
heap
page read and write
22E7385F000
heap
page read and write
79C000
heap
page read and write
1D692A00000
heap
page read and write
1FC35213000
heap
page read and write
496CE7E000
stack
page read and write
1EA8D640000
trusted library allocation
page read and write
813000
heap
page read and write
6F551FC000
stack
page read and write
1F9D4013000
heap
page read and write
1D9ED8A0000
heap
page read and write
1EA8F378000
heap
page read and write
27A6BCC0000
unkown
page read and write
22E73720000
heap
page read and write
19D64802000
heap
page read and write
D7704FC000
stack
page read and write
6F557FF000
stack
page read and write
19D64900000
heap
page read and write
7C0000
heap
page read and write
808000
heap
page read and write
17B37310000
heap
page read and write
19D6402C000
heap
page read and write
2D6DFE29000
heap
page read and write
27A6C0D0000
heap
page read and write
7C0000
heap
page read and write
148DC465000
heap
page read and write
1FC35802000
trusted library allocation
page read and write
22E73900000
heap
page read and write
1EA8F371000
heap
page read and write
1EA8F325000
heap
page read and write
1D692950000
heap
page read and write
17B35AA0000
heap
page read and write
1D694400000
heap
page read and write
7CF000
heap
page read and write
201A2800000
heap
page read and write
17B358CE000
heap
page read and write
20164149000
heap
page read and write
201641F0000
heap
page read and write
1EA8F374000
heap
page read and write
1EA8D619000
heap
page read and write
7FF000
heap
page read and write
19D64043000
heap
page read and write
201A2800000
heap
page read and write
1FC357C0000
remote allocation
page read and write
1FC35260000
heap
page read and write
1BD44C02000
trusted library allocation
page read and write
1D692920000
heap
page read and write
1BD44626000
heap
page read and write
7FFC130E0000
unkown
page readonly
27A6D990000
heap
page read and write
1EA8F337000
heap
page read and write
684C37F000
stack
page read and write
DF4B7B000
stack
page read and write
1EA8F6E9000
heap
page read and write
19D64077000
heap
page read and write
6F54F7A000
stack
page read and write
148DC400000
heap
page read and write
19D63E90000
heap
page read and write
9B3ACFC000
stack
page read and write
AE09FFE000
stack
page read and write
201A29F5000
heap
page read and write
7C6000
heap
page read and write
19D64000000
heap
page read and write
1D9EDA3F000
heap
page read and write
7FFC130E0000
unkown
page readonly
1D9EE202000
trusted library allocation
page read and write
7FFC13126000
unkown
page readonly
7FFC13126000
unkown
page readonly
7FFC13103000
unkown
page readonly
19D64094000
heap
page read and write
7DA000
heap
page read and write
813000
heap
page read and write
7A0000
heap
page read and write
1EA8F337000
heap
page read and write
201A2770000
heap
page read and write
1EA8D60F000
heap
page read and write
148DC402000
heap
page read and write
1EA8F37C000
heap
page read and write
1EA8F33D000
heap
page read and write
19D649BF000
heap
page read and write
496CAFB000
stack
page read and write
1EA8D640000
trusted library allocation
page read and write
1EA8F388000
heap
page read and write
1EA8D613000
heap
page read and write
808000
heap
page read and write
201A29AE000
direct allocation
page execute and read and write
2D6DFE54000
heap
page read and write
1EA8D600000
heap
page read and write
1EA8F821000
heap
page read and write
1EA8D637000
heap
page read and write
22E75330000
remote allocation
page read and write
22E75270000
trusted library allocation
page read and write
1EA8D619000
heap
page read and write
1EA8D7FB000
heap
page read and write
19D649CA000
heap
page read and write
684C2FB000
stack
page read and write
E88387E000
stack
page read and write
7FFC13103000
unkown
page readonly
7FF000
heap
page read and write
D7704FC000
stack
page read and write
17B35940000
heap
page read and write
1EA8F371000
heap
page read and write
20E0000
heap
page read and write
19D64A27000
heap
page read and write
22E7384B000
heap
page read and write
1D692955000
heap
page read and write
1EA8F797000
heap
page read and write
7FFC13123000
unkown
page read and write
1BD4467D000
heap
page read and write
7FF000
heap
page read and write
1EA8F344000
heap
page read and write
684C47E000
stack
page read and write
D77057F000
stack
page read and write
79C000
heap
page read and write
7C6000
heap
page read and write
1EA8F305000
heap
page read and write
1EA8D605000
heap
page read and write
1EA8D7C0000
heap
page read and write
27A6BDE0000
remote allocation
page read and write
1EA8D608000
heap
page read and write
1BD4465D000
heap
page read and write
1BD44630000
heap
page read and write
201640FD000
heap
page read and write
7FFC13118000
unkown
page read and write
1EA8F68F000
heap
page read and write
201A27A3000
heap
page read and write
6F54B2B000
stack
page read and write
7FFC130E1000
unkown
page execute read
9B3A97E000
stack
page read and write
1F9D4102000
heap
page read and write
7C6000
heap
page read and write
1EA8F377000
heap
page read and write
7FF967C000
stack
page read and write
2D6DFE37000
heap
page read and write
22E73800000
heap
page read and write
22E73813000
heap
page read and write
7273C7C000
stack
page read and write
1EA8F344000
heap
page read and write
20164110000
heap
page read and write
1EA8D640000
trusted library allocation
page read and write
1EA8D60A000
heap
page read and write
1D6927C0000
unkown
page read and write
9B3ABFF000
stack
page read and write
730000
direct allocation
page execute and read and write
1EA8F368000
heap
page read and write
1D9EDA86000
heap
page read and write
1EA8D63E000
heap
page read and write
410E6FF000
stack
page read and write
9B3A57E000
stack
page read and write
1BD443C0000
heap
page read and write
19D64A30000
heap
page read and write
2293EFD000
stack
page read and write
19D63E80000
heap
page read and write
19D64093000
heap
page read and write
1D692950000
heap
page read and write
7FFC13118000
unkown
page write copy
496CC7A000
stack
page read and write
1EA8FD20000
heap
page read and write
7FFC130E1000
unkown
page execute read
1EA8F2F3000
heap
page read and write
1EA8F30B000
heap
page read and write
1EA8D7F0000
heap
page read and write
1EA8D603000
heap
page read and write
1EA8D640000
trusted library allocation
page read and write
813000
heap
page read and write
22E75402000
trusted library allocation
page read and write
2D6DFE3A000
heap
page read and write
1EA8F337000
heap
page read and write
1EA8D7FE000
heap
page read and write
F351A7C000
stack
page read and write
1EA8F324000
heap
page read and write
DF4D7F000
stack
page read and write
1EA8F344000
heap
page read and write
1D694400000
heap
page read and write
1EA8F2EC000
heap
page read and write
27A6C0D0000
heap
page read and write
1EA8F31E000
heap
page read and write
27A6BD30000
heap
page read and write
1EA8D61B000
heap
page read and write
1EA8F820000
heap
page read and write
7FFC130E1000
unkown
page execute read
1F9D40B9000
heap
page read and write
1EA8D640000
trusted library allocation
page read and write
3CB000
stack
page read and write
410E2FD000
stack
page read and write
7E8000
heap
page read and write
1EA8F33D000
heap
page read and write
7DC000
heap
page read and write
22E73902000
heap
page read and write
1EA8D600000
heap
page read and write
7273C7C000
stack
page read and write
78D000
heap
page read and write
201A2740000
heap
page read and write
1F9D40CA000
heap
page read and write
F35197A000
stack
page read and write
1EA8D63E000
heap
page read and write
1BD4466C000
heap
page read and write
1EA8F305000
heap
page read and write
1BD44659000
heap
page read and write
1EA8D640000
trusted library allocation
page read and write
22939FC000
stack
page read and write
7FF000
heap
page read and write
496C87A000
stack
page read and write
17B35940000
heap
page read and write
684BF8D000
stack
page read and write
19D64A00000
heap
page read and write
201A42CD000
heap
page read and write
1EA8D3C0000
unkown
page readonly
1EA8F344000
heap
page read and write
2D6DFE47000
heap
page read and write
1EA8F379000
heap
page read and write
22E75330000
remote allocation
page read and write
148DC502000
heap
page read and write
7A9000
heap
page read and write
9B3A7FF000
stack
page read and write
7A0000
heap
page read and write
6F0000
heap
page read and write
7FFC130E1000
unkown
page execute read
1EA8F30B000
heap
page read and write
1EA8F32B000
heap
page read and write
7FFC13103000
unkown
page readonly
19D641B9000
heap
page read and write
20163F60000
heap
page read and write
7FFC13103000
unkown
page readonly
1FC35790000
trusted library allocation
page read and write
6F550FF000
stack
page read and write
684C57B000
stack
page read and write
1EA8D61B000
heap
page read and write
19D6418E000
heap
page read and write
201A29A0000
direct allocation
page execute and read and write
1FC34FD0000
heap
page read and write
AE09CFE000
stack
page read and write
201A4290000
heap
page read and write
684C27E000
stack
page read and write
22E7385B000
heap
page read and write
1EA8F344000
heap
page read and write
1EA8FC20000
heap
page read and write
1EA8F344000
heap
page read and write
496CD7F000
stack
page read and write
1EA8D640000
trusted library allocation
page read and write
1EA8D611000
heap
page read and write
7C6000
heap
page read and write
There are 794 hidden memdumps, click here to show them.