IOC Report
https://idverificationz.b-cdn.net/idverificationz.zip

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\Desktop\extract\Setup.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\Desktop\extract\api-ms-win-core-processthreads-l1-1-1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\Desktop\extract\api-ms-win-core-profile-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\Desktop\extract\api-ms-win-core-rtlsupport-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\Desktop\extract\api-ms-win-core-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\Desktop\extract\api-ms-win-core-synch-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\Desktop\extract\api-ms-win-core-synch-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\Desktop\extract\api-ms-win-core-sysinfo-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\Desktop\extract\api-ms-win-core-timezone-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\Desktop\extract\api-ms-win-core-util-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\Desktop\extract\api-ms-win-crt-conio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\Desktop\extract\api-ms-win-crt-convert-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\Desktop\extract\api-ms-win-crt-environment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\Desktop\extract\api-ms-win-crt-filesystem-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\Desktop\extract\api-ms-win-crt-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\Desktop\extract\api-ms-win-crt-locale-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\Desktop\extract\api-ms-win-crt-math-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\Desktop\extract\api-ms-win-crt-multibyte-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\Desktop\extract\api-ms-win-crt-private-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\Desktop\extract\api-ms-win-crt-process-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_api_24a6e77318e0bb5eb29992db4daf9eb8d15327cf_e147a954_86d35f76-f56e-4ffc-bc94-3736a8796053\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_api_6c6a6e6bf6b445970e8ef838c8696bd7b5876e0_e147a954_2d8b9a80-499f-4738-8ce7-7d8647786680\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_api_9df865fded585f94f5f016e71860a3884066_e147a954_57177326-392c-4f9b-955a-5f42c59945a9\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_api_9df865fded585f94f5f016e71860a3884066_e147a954_d0a27185-710b-4546-a743-76e98b285bfe\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB2CA.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Oct 30 00:55:16 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB31A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB349.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC009.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Oct 30 00:55:19 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC087.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC097.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Oct 30 00:55:19 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC103.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Oct 30 00:55:20 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC105.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC172.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC1D1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC1EE.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC23E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\cmdline.out
ASCII text, with CRLF line terminators
modified
C:\Users\user\Desktop\download\idverificationz.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\Desktop\extract\ks_tyres.ini
ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped
There are 32 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\7za.exe
7za x -y -pinfected -o"C:\Users\user\Desktop\extract" "C:\Users\user\Desktop\download\idverificationz.zip"
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\extract\api-ms-win-core-processthreads-l1-1-1.dll"
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\extract\api-ms-win-core-processthreads-l1-1-1.dll,FlushInstructionCache
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\extract\api-ms-win-core-processthreads-l1-1-1.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\extract\api-ms-win-core-processthreads-l1-1-1.dll,GetCurrentProcessorNumber
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\extract\api-ms-win-core-processthreads-l1-1-1.dll,GetCurrentProcessorNumberEx
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\extract\api-ms-win-core-processthreads-l1-1-1.dll",FlushInstructionCache
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\extract\api-ms-win-core-processthreads-l1-1-1.dll",GetCurrentProcessorNumber
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\extract\api-ms-win-core-processthreads-l1-1-1.dll",GetCurrentProcessorNumberEx
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\extract\api-ms-win-core-processthreads-l1-1-1.dll",SetThreadIdealProcessorEx
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\extract\api-ms-win-core-processthreads-l1-1-1.dll",SetThreadContext
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\extract\api-ms-win-core-processthreads-l1-1-1.dll",SetProcessMitigationPolicy
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\extract\api-ms-win-core-processthreads-l1-1-1.dll",OpenProcess
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\extract\api-ms-win-core-processthreads-l1-1-1.dll",IsProcessorFeaturePresent
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\extract\api-ms-win-core-processthreads-l1-1-1.dll",GetThreadTimes
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\extract\api-ms-win-core-processthreads-l1-1-1.dll",GetThreadIdealProcessorEx
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\extract\api-ms-win-core-processthreads-l1-1-1.dll",GetThreadContext
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\extract\api-ms-win-core-processthreads-l1-1-1.dll",GetProcessMitigationPolicy
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\extract\api-ms-win-core-processthreads-l1-1-1.dll",GetProcessHandleCount
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\extract\api-ms-win-core-processthreads-l1-1-1.dll",GetCurrentThreadStackLimits
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://idverificationz.b-cdn.net/idverificationz.zip" > cmdline.out 2>&1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\wget.exe
wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://idverificationz.b-cdn.net/idverificationz.zip"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\extract\api-ms-win-core-processthreads-l1-1-1.dll",#1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2316 -s 316
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6208 -s 312
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6304 -s 316
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7104 -s 316
There are 20 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://idverificationz.b-cdn.net/idverificationz.zip
malicious
http://www.ezbsystems.com/ultraiso/order.php?uilang=ct
unknown
http://www.ezbsystems.com/ultraiso
unknown
http://ocsp.sectigo.com0
unknown
http://www.ezbsystems.com)
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=kr
unknown
http://forum.ezbsystems.com
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=cn
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=gr
unknown
http://www.ultraiso.com
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=de
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=tr
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=pt
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=tw
unknown
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=cz
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=he
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=pl
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=se
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=jp
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=fr
unknown
https://idverificationz.b-cdn.net/idverificationz.zipOC
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=sk
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=by
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=si
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=ar
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=et
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=es
unknown
https://sectigo.com/CPS0
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=my
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=it
unknown
https://idverificationz.b-cdn.net/idverificationz.zip
169.150.247.35
http://www.ezbsystems.com/ultraiso/order.php?uilang=no
unknown
http://upx.sf.net
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=nl
unknown
http://www.ezbsystems.comhttp://www.ezbsystems.com/ultraisohttp://www.ezbsystems.com/ultraiso/order.
unknown
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=bg
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=jphttp://www.ezbsystems.com/ultraiso/order.php?u
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=fi
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=ru
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=vn
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=ro
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
http://www.ezbsystems.com/ultraiso/order.htm
unknown
http://www.ezbsystems.comDVarFileInfo$
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=lt
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=dk
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=hu
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=ua
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=hr
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=lv
unknown
http://www.ezbsystems.com
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=mk
unknown
http://www.ezbsystems.com/easyboot
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=yu
unknown
http://www.ezbsystems.com/ultraiso/order.php?uilang=id
unknown
There are 47 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
idverificationz.b-cdn.net
169.150.247.35
malicious

IPs

IP
Domain
Country
Malicious
169.150.247.35
idverificationz.b-cdn.net
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{f8bbfc5a-6806-ba07-e26c-b52a4c29ca81}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{f8bbfc5a-6806-ba07-e26c-b52a4c29ca81}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{f8bbfc5a-6806-ba07-e26c-b52a4c29ca81}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{f8bbfc5a-6806-ba07-e26c-b52a4c29ca81}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{f8bbfc5a-6806-ba07-e26c-b52a4c29ca81}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{f8bbfc5a-6806-ba07-e26c-b52a4c29ca81}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
OriginalFileName
\REGISTRY\A\{f8bbfc5a-6806-ba07-e26c-b52a4c29ca81}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{f8bbfc5a-6806-ba07-e26c-b52a4c29ca81}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{f8bbfc5a-6806-ba07-e26c-b52a4c29ca81}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{f8bbfc5a-6806-ba07-e26c-b52a4c29ca81}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{f8bbfc5a-6806-ba07-e26c-b52a4c29ca81}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{f8bbfc5a-6806-ba07-e26c-b52a4c29ca81}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{f8bbfc5a-6806-ba07-e26c-b52a4c29ca81}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{f8bbfc5a-6806-ba07-e26c-b52a4c29ca81}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{f8bbfc5a-6806-ba07-e26c-b52a4c29ca81}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
AppxPackageFullName
\REGISTRY\A\{f8bbfc5a-6806-ba07-e26c-b52a4c29ca81}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
AppxPackageRelativeId
\REGISTRY\A\{f8bbfc5a-6806-ba07-e26c-b52a4c29ca81}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{f8bbfc5a-6806-ba07-e26c-b52a4c29ca81}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{f8bbfc5a-6806-ba07-e26c-b52a4c29ca81}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
\REGISTRY\A\{f8bbfc5a-6806-ba07-e26c-b52a4c29ca81}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Usn
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
AB4E17F000
stack
page read and write
15952235000
heap
page read and write
1BB507B0000
heap
page read and write
68D050E000
stack
page read and write
2F00000
heap
page read and write
15951FA8000
heap
page read and write
284501C5000
heap
page read and write
186E1C90000
heap
page read and write
1DD228D0000
heap
page read and write
2122E1E0000
heap
page read and write
A0E000
stack
page read and write
1BB50840000
heap
page read and write
1E9E68E0000
heap
page read and write
29948CC0000
heap
page read and write
2E55C970000
heap
page read and write
1ACC451E000
heap
page read and write
9D8872C000
stack
page read and write
D0000
heap
page read and write
262E8B10000
heap
page read and write
5243D2F000
stack
page read and write
197A68B5000
heap
page read and write
1E9E6820000
heap
page read and write
2122E269000
heap
page read and write
1160000
heap
page read and write
2122E5A0000
heap
page read and write
18462898000
heap
page read and write
68D048C000
stack
page read and write
186E1D10000
heap
page read and write
29948EA5000
heap
page read and write
1E9E6740000
heap
page read and write
39144FF000
stack
page read and write
29948CC8000
heap
page read and write
18462B40000
heap
page read and write
22308AA5000
heap
page read and write
2AEA000
heap
page read and write
220460D0000
heap
page read and write
1E9E6840000
heap
page read and write
AB4E07C000
stack
page read and write
29948BD0000
heap
page read and write
117E000
stack
page read and write
9D887AF000
stack
page read and write
1ACC4480000
heap
page read and write
47DEEFF000
stack
page read and write
2B20000
heap
page read and write
23E6CE95000
heap
page read and write
118B000
heap
page read and write
6E813DF000
stack
page read and write
11D8000
heap
page read and write
1E25D600000
heap
page read and write
262E8E95000
heap
page read and write
1E9E68F0000
heap
page read and write
1BB505E0000
heap
page read and write
151E000
stack
page read and write
28484A70000
heap
page read and write
1BB505E7000
heap
page read and write
B0A859F000
stack
page read and write
18462860000
heap
page read and write
22046320000
heap
page read and write
1170000
heap
page read and write
110000
heap
page read and write
2B1E000
heap
page read and write
262E8B30000
heap
page read and write
23E6CC10000
heap
page read and write
186E1CC0000
heap
page read and write
1185000
heap
page read and write
1CD42FC5000
heap
page read and write
11C5000
heap
page read and write
186E2005000
heap
page read and write
1F0000
heap
page read and write
1CD42D90000
heap
page read and write
29948BF0000
heap
page read and write
15951F70000
heap
page read and write
B0A851C000
stack
page read and write
2230A520000
heap
page read and write
A60000
heap
page read and write
175F000
stack
page read and write
1E25D2B0000
heap
page read and write
23E6CBE0000
heap
page read and write
2994A790000
heap
page read and write
1DD225A0000
heap
page read and write
22308990000
heap
page read and write
1ACC4785000
heap
page read and write
83626FF000
stack
page read and write
118C000
heap
page read and write
1E25D655000
heap
page read and write
1E25D650000
heap
page read and write
1BB50800000
unkown
page readonly
1E9E68F8000
heap
page read and write
5243DAF000
stack
page read and write
23E6CBF0000
heap
page read and write
15951FA0000
heap
page read and write
2844FEF0000
heap
page read and write
1E25D480000
heap
page read and write
FE4BE7F000
stack
page read and write
197A6670000
heap
page read and write
118D000
heap
page read and write
1DD225C0000
heap
page read and write
15952230000
heap
page read and write
99929EC000
stack
page read and write
220461A8000
heap
page read and write
262E8AF0000
heap
page read and write
14DE000
stack
page read and write
3020000
trusted library allocation
page read and write
DAF000
stack
page read and write
18462B45000
heap
page read and write
28484970000
heap
page read and write
2844FE90000
heap
page read and write
5AE2BDF000
stack
page read and write
29948CCE000
heap
page read and write
22308B58000
heap
page read and write
2122E250000
heap
page read and write
28484B80000
heap
page read and write
A14DE7C000
stack
page read and write
9E1594C000
stack
page read and write
23E6CE90000
heap
page read and write
220461A0000
heap
page read and write
23E6CE70000
heap
page read and write
23E6CC40000
heap
page read and write
15951F60000
heap
page read and write
D6000
heap
page read and write
161F000
stack
page read and write
391457F000
stack
page read and write
186E38B0000
heap
page read and write
2E55C790000
heap
page read and write
1180000
heap
page read and write
1F6636C000
stack
page read and write
186E1CA0000
heap
page read and write
2844FE70000
heap
page read and write
165E000
stack
page read and write
10FD000
stack
page read and write
2844FEC0000
unkown
page readonly
AB8000
heap
page read and write
2B1A000
heap
page read and write
1CD42FC0000
heap
page read and write
2B16000
heap
page read and write
28484B85000
heap
page read and write
197A6870000
heap
page read and write
A70000
heap
page read and write
1BB52000000
heap
page read and write
18462990000
unkown
page readonly
197A6758000
heap
page read and write
1BB507D0000
heap
page read and write
1E9E6B65000
heap
page read and write
18462840000
heap
page read and write
18464360000
heap
page read and write
FAF000
stack
page read and write
1BB505D0000
heap
page read and write
197A68B0000
heap
page read and write
11A0000
heap
page read and write
186E2000000
heap
page read and write
9E15C7F000
stack
page read and write
3CC38FF000
stack
page read and write
AF1000
heap
page read and write
3CC35AC000
stack
page read and write
B0A887F000
stack
page read and write
1DD228D5000
heap
page read and write
2122E220000
heap
page read and write
1DD22678000
heap
page read and write
1CD42DD0000
heap
page read and write
2844FEF8000
heap
page read and write
18462890000
heap
page read and write
9992CFF000
stack
page read and write
1F6667F000
stack
page read and write
262E8E20000
heap
page read and write
47DEF7F000
stack
page read and write
186217F000
stack
page read and write
11B0000
trusted library allocation
page read and write
15953AF0000
heap
page read and write
2122E25D000
heap
page read and write
1ACC4510000
heap
page read and write
5243CAC000
stack
page read and write
FE4BEFF000
stack
page read and write
2E55CB20000
heap
page read and write
2122E259000
heap
page read and write
836267C000
stack
page read and write
1E25D3B0000
heap
page read and write
22045FD0000
heap
page read and write
18462760000
heap
page read and write
11D0000
heap
page read and write
9D88A7F000
stack
page read and write
2122E1D0000
heap
page read and write
391447C000
stack
page read and write
1190000
heap
page read and write
3000000
trusted library allocation
page read and write
2AE0000
heap
page read and write
47DEE7C000
stack
page read and write
118E000
heap
page read and write
22046420000
heap
page read and write
1ACC6040000
heap
page read and write
1DD228A0000
heap
page read and write
28484940000
heap
page read and write
22308A70000
heap
page read and write
1DD224C0000
heap
page read and write
9B000
stack
page read and write
1F663EF000
stack
page read and write
1E25D488000
heap
page read and write
1ACC4518000
heap
page read and write
13DE000
stack
page read and write
D43B07C000
stack
page read and write
9CC000
stack
page read and write
68D058E000
stack
page read and write
1CD42DC0000
unkown
page readonly
262E8E90000
heap
page read and write
15952170000
heap
page read and write
1ACC4780000
heap
page read and write
3CC39FF000
stack
page read and write
262E8AE0000
heap
page read and write
2E55C990000
heap
page read and write
220460B0000
heap
page read and write
2E55CB25000
heap
page read and write
6E8167F000
stack
page read and write
1BB50845000
heap
page read and write
284501C0000
heap
page read and write
197A6850000
heap
page read and write
186E1D18000
heap
page read and write
29948AF0000
heap
page read and write
2E55CAB0000
heap
page read and write
23E6CC48000
heap
page read and write
5AE2B5F000
stack
page read and write
2844FD90000
heap
page read and write
28486460000
heap
page read and write
364567C000
stack
page read and write
9E159CE000
stack
page read and write
197A6750000
heap
page read and write
22046425000
heap
page read and write
262E8B38000
heap
page read and write
9992C7F000
stack
page read and write
A14DF7F000
stack
page read and write
29948EA0000
heap
page read and write
1CD42D70000
heap
page read and write
2E55C7A8000
heap
page read and write
5AE2ADC000
stack
page read and write
22308AB0000
heap
page read and write
284518A0000
heap
page read and write
2DDF000
stack
page read and write
6E8135C000
stack
page read and write
2B22000
heap
page read and write
1CD448C0000
heap
page read and write
36456FF000
stack
page read and write
DFC000
stack
page read and write
1ACC44B0000
heap
page read and write
A4E000
stack
page read and write
2AED000
heap
page read and write
28484977000
heap
page read and write
186207C000
stack
page read and write
22308B50000
heap
page read and write
1CD42C90000
heap
page read and write
11C0000
heap
page read and write
18620FF000
stack
page read and write
1E9E6B60000
heap
page read and write
D43B17F000
stack
page read and write
2E55C7A0000
heap
page read and write
2E30000
heap
page read and write
22308AA0000
heap
page read and write
28484860000
heap
page read and write
A14DEFF000
stack
page read and write
836277F000
stack
page read and write
1DD22670000
heap
page read and write
1CD42DD8000
heap
page read and write
D43B0FF000
stack
page read and write
AB0000
heap
page read and write
FE4BBEC000
stack
page read and write
1E25D390000
heap
page read and write
1ACC4490000
heap
page read and write
197A8140000
heap
page read and write
AB4E0FF000
stack
page read and write
There are 256 hidden memdumps, click here to show them.