IOC Report
SecuriteInfo.com.Win32.TrojanX-gen.17997.17145.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.TrojanX-gen.17997.17145.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmpA459.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\PiNLDDmS.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PiNLDDmS.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.TrojanX-gen.17997.17145.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dhdpylyb.wlb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_edbtopfe.5vz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i5obduth.owe.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u0henuvs.j4o.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpB04F.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\PiNLDDmS.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.17997.17145.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.17997.17145.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PiNLDDmS.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PiNLDDmS" /XML "C:\Users\user\AppData\Local\Temp\tmpA459.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\PiNLDDmS.exe
C:\Users\user\AppData\Roaming\PiNLDDmS.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PiNLDDmS" /XML "C:\Users\user\AppData\Local\Temp\tmpB04F.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.12.205
http://r3.o.lencr.org0
unknown
http://mail.satsllc.ae
unknown
https://api.ipify.org
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://r3.i.lencr.org/0
unknown

Domains

Name
IP
Malicious
mail.satsllc.ae
92.205.14.36
malicious
api.ipify.org
104.26.12.205

IPs

IP
Domain
Country
Malicious
92.205.14.36
mail.satsllc.ae
Germany
malicious
104.26.12.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
35D9000
trusted library allocation
page read and write
malicious
32AC000
trusted library allocation
page read and write
malicious
4292000
trusted library allocation
page read and write
malicious
322C000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3683000
trusted library allocation
page read and write
malicious
3281000
trusted library allocation
page read and write
malicious
3201000
trusted library allocation
page read and write
malicious
94D0000
trusted library section
page read and write
1700000
trusted library allocation
page read and write
11B0000
trusted library allocation
page read and write
6AEE000
stack
page read and write
9B1E000
stack
page read and write
5A0C000
stack
page read and write
5430000
heap
page read and write
18F0000
trusted library allocation
page read and write
9DB0000
heap
page read and write
3234000
trusted library allocation
page read and write
3271000
trusted library allocation
page read and write
4950000
heap
page read and write
32A8000
trusted library allocation
page read and write
252B000
trusted library allocation
page read and write
4CC0000
trusted library allocation
page execute and read and write
43FE000
stack
page read and write
2EF0000
trusted library allocation
page read and write
83B0000
heap
page read and write
7FA30000
trusted library allocation
page execute and read and write
6CD2000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page execute and read and write
16E0000
trusted library allocation
page read and write
31AE000
stack
page read and write
C90000
heap
page read and write
1180000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
11B2000
trusted library allocation
page read and write
917B000
heap
page read and write
9CAC000
stack
page read and write
253C000
trusted library allocation
page read and write
345D000
trusted library allocation
page read and write
5420000
heap
page read and write
12F9000
stack
page read and write
23C1000
trusted library allocation
page read and write
58D0000
heap
page read and write
43E000
remote allocation
page execute and read and write
9420000
trusted library allocation
page read and write
1296000
heap
page read and write
4F40000
trusted library allocation
page execute and read and write
7C8E000
stack
page read and write
57B9000
trusted library allocation
page read and write
17A000
stack
page read and write
2833000
trusted library allocation
page read and write
1647000
heap
page read and write
14C0000
trusted library allocation
page read and write
32B4000
trusted library allocation
page read and write
2D7A000
stack
page read and write
1640000
heap
page read and write
3070000
trusted library allocation
page read and write
284B000
trusted library allocation
page read and write
1906000
heap
page read and write
1230000
heap
page read and write
5680000
heap
page read and write
5FA000
stack
page read and write
326F000
trusted library allocation
page read and write
7B0000
trusted library allocation
page read and write
31AF000
stack
page read and write
41B1000
trusted library allocation
page read and write
7DCE000
stack
page read and write
4BA0000
heap
page read and write
3232000
trusted library allocation
page read and write
FF0000
heap
page read and write
3461000
trusted library allocation
page read and write
7172000
trusted library allocation
page read and write
596000
heap
page read and write
16DA000
trusted library allocation
page execute and read and write
7BD000
trusted library allocation
page execute and read and write
254A000
trusted library allocation
page read and write
4F74000
trusted library allocation
page read and write
6B80000
trusted library allocation
page execute and read and write
323C000
trusted library allocation
page read and write
11A2000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
3625000
trusted library allocation
page read and write
7F2D0000
trusted library allocation
page execute and read and write
3231000
trusted library allocation
page read and write
48E0000
trusted library allocation
page read and write
58D000
heap
page read and write
90E6000
heap
page read and write
2542000
trusted library allocation
page read and write
34B4000
trusted library allocation
page read and write
762E000
stack
page read and write
283B000
trusted library allocation
page read and write
931D000
stack
page read and write
25F0000
trusted library allocation
page read and write
252E000
trusted library allocation
page read and write
6C60000
trusted library allocation
page execute and read and write
7C6000
trusted library allocation
page execute and read and write
14E7000
trusted library allocation
page execute and read and write
2F31000
trusted library allocation
page read and write
5801000
heap
page read and write
5E90000
trusted library allocation
page read and write
119D000
trusted library allocation
page execute and read and write
4F6000
stack
page read and write
153E000
heap
page read and write
5470000
trusted library allocation
page execute and read and write
3034000
trusted library allocation
page read and write
8AE000
unkown
page read and write
7D2000
trusted library allocation
page read and write
5900000
heap
page read and write
1590000
heap
page read and write
1510000
heap
page read and write
48A0000
trusted library allocation
page read and write
11B7000
trusted library allocation
page execute and read and write
322A000
trusted library allocation
page read and write
7560000
trusted library allocation
page execute and read and write
6ACE000
stack
page read and write
14BD000
trusted library allocation
page execute and read and write
3463000
trusted library allocation
page read and write
6980000
trusted library allocation
page read and write
790000
trusted library allocation
page read and write
1460000
heap
page read and write
16D6000
trusted library allocation
page execute and read and write
6CFF000
stack
page read and write
4CD0000
trusted library allocation
page read and write
1670000
heap
page read and write
125E000
heap
page read and write
3451000
trusted library allocation
page read and write
31F0000
trusted library allocation
page read and write
4256000
trusted library allocation
page read and write
AC0000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
5C2000
heap
page read and write
6CD0000
trusted library allocation
page read and write
BE1D000
stack
page read and write
14CD000
trusted library allocation
page execute and read and write
282F000
trusted library allocation
page read and write
9170000
heap
page read and write
2538000
trusted library allocation
page read and write
14EB000
trusted library allocation
page execute and read and write
31EF000
trusted library allocation
page read and write
5D8F000
stack
page read and write
9EE000
stack
page read and write
91C5000
trusted library allocation
page read and write
1720000
heap
page read and write
254E000
trusted library allocation
page read and write
3457000
trusted library allocation
page read and write
2D3D000
stack
page read and write
1277000
heap
page read and write
282D000
trusted library allocation
page read and write
57F0000
heap
page read and write
14B3000
trusted library allocation
page execute and read and write
F56000
stack
page read and write
321D000
trusted library allocation
page read and write
6A8E000
stack
page read and write
6CC0000
trusted library allocation
page execute and read and write
16D0000
trusted library allocation
page read and write
4076000
trusted library allocation
page read and write
AE6000
trusted library allocation
page read and write
5C8E000
stack
page read and write
11BB000
trusted library allocation
page execute and read and write
6970000
trusted library allocation
page read and write
5D6E000
stack
page read and write
31BB000
trusted library allocation
page read and write
118D000
trusted library allocation
page execute and read and write
5790000
trusted library allocation
page read and write
4F65000
heap
page read and write
69AE000
stack
page read and write
7630000
trusted library section
page read and write
1590000
trusted library allocation
page read and write
16BD000
trusted library allocation
page execute and read and write
154A000
heap
page read and write
2851000
trusted library allocation
page read and write
AB0000
trusted library allocation
page execute and read and write
31D1000
trusted library allocation
page read and write
51E000
heap
page read and write
1305000
heap
page read and write
31CA000
trusted library allocation
page read and write
7C0000
trusted library allocation
page read and write
57B0000
trusted library allocation
page execute and read and write
3822000
trusted library allocation
page read and write
4F60000
heap
page read and write
3065000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
604000
heap
page read and write
7AD000
trusted library allocation
page execute and read and write
58EE000
heap
page read and write
4910000
trusted library allocation
page read and write
FC0000
heap
page read and write
16C0000
trusted library allocation
page read and write
14A0000
trusted library allocation
page read and write
82F2000
heap
page read and write
3443000
trusted library allocation
page read and write
F89000
stack
page read and write
15DD000
stack
page read and write
41D9000
trusted library allocation
page read and write
4A90000
heap
page read and write
7A10000
trusted library allocation
page read and write
9200000
trusted library allocation
page execute and read and write
4D7C000
trusted library allocation
page read and write
6CCE000
stack
page read and write
2F3D000
trusted library allocation
page read and write
56F0000
heap
page read and write
14E5000
trusted library allocation
page execute and read and write
6570000
heap
page read and write
3040000
trusted library allocation
page read and write
7D7000
trusted library allocation
page execute and read and write
1285000
heap
page read and write
5DA000
heap
page read and write
4F7B000
trusted library allocation
page read and write
550000
heap
page read and write
52AE000
stack
page read and write
5B0E000
stack
page read and write
1468000
heap
page read and write
6D47000
trusted library allocation
page read and write
327D000
trusted library allocation
page read and write
3059000
trusted library allocation
page read and write
11A0000
trusted library allocation
page read and write
95EC000
trusted library allocation
page read and write
56AF000
trusted library allocation
page read and write
1630000
trusted library allocation
page read and write
2F90000
trusted library allocation
page read and write
2F2E000
trusted library allocation
page read and write
2F18000
trusted library allocation
page read and write
916A000
heap
page read and write
58BE000
stack
page read and write
48F0000
trusted library allocation
page read and write
32EF000
stack
page read and write
343D000
trusted library allocation
page read and write
4A30000
trusted library allocation
page execute and read and write
344B000
trusted library allocation
page read and write
3200000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
1270000
heap
page read and write
239E000
stack
page read and write
3267000
trusted library allocation
page read and write
1190000
trusted library allocation
page read and write
8305000
heap
page read and write
253A000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
165F000
stack
page read and write
9FED000
stack
page read and write
6C40000
trusted library allocation
page read and write
2841000
trusted library allocation
page read and write
16D2000
trusted library allocation
page read and write
7B8E000
stack
page read and write
A86F000
stack
page read and write
2827000
trusted library allocation
page read and write
122E000
stack
page read and write
3228000
trusted library allocation
page read and write
1184000
trusted library allocation
page read and write
A90000
heap
page read and write
7CCE000
stack
page read and write
1465000
heap
page read and write
31EE000
trusted library allocation
page read and write
4D6E000
stack
page read and write
8298000
heap
page read and write
7CA000
trusted library allocation
page execute and read and write
7B4E000
stack
page read and write
6C50000
trusted library allocation
page execute and read and write
16EB000
trusted library allocation
page execute and read and write
6AAE000
stack
page read and write
8D0000
heap
page read and write
14DB000
heap
page read and write
2621000
trusted library allocation
page read and write
1170000
trusted library allocation
page read and write
8300000
heap
page read and write
2853000
trusted library allocation
page read and write
59CE000
stack
page read and write
76E000
stack
page read and write
2546000
trusted library allocation
page read and write
1900000
heap
page read and write
4970000
trusted library allocation
page read and write
14D6000
trusted library allocation
page execute and read and write
57AE000
stack
page read and write
2F10000
trusted library allocation
page read and write
11AA000
trusted library allocation
page execute and read and write
2FD1000
trusted library allocation
page read and write
6C3D000
stack
page read and write
359E000
trusted library allocation
page read and write
140E000
stack
page read and write
48E7000
trusted library allocation
page read and write
2534000
trusted library allocation
page read and write
284D000
trusted library allocation
page read and write
9104000
heap
page read and write
91C0000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page read and write
37A6000
trusted library allocation
page read and write
48EC000
trusted library allocation
page read and write
7C2000
trusted library allocation
page read and write
3044000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page read and write
161A000
heap
page read and write
56F5000
heap
page read and write
6E5000
heap
page read and write
8DB000
heap
page read and write
11D0000
heap
page read and write
3455000
trusted library allocation
page read and write
1065000
heap
page read and write
8260000
heap
page read and write
7F2B0000
trusted library allocation
page execute and read and write
860000
heap
page read and write
30A0000
heap
page read and write
1183000
trusted library allocation
page execute and read and write
2839000
trusted library allocation
page read and write
1553000
heap
page read and write
3453000
trusted library allocation
page read and write
4D70000
trusted library allocation
page read and write
25DE000
trusted library allocation
page read and write
30A4000
trusted library allocation
page read and write
6530000
heap
page read and write
51A000
heap
page read and write
AE0000
trusted library allocation
page read and write
4960000
trusted library allocation
page read and write
1520000
trusted library allocation
page execute and read and write
1233000
heap
page read and write
6700000
heap
page read and write
2532000
trusted library allocation
page read and write
5490000
trusted library section
page readonly
148A000
heap
page read and write
69F0000
trusted library allocation
page execute and read and write
144E000
stack
page read and write
6BEE000
stack
page read and write
4A93000
heap
page read and write
9210000
trusted library allocation
page execute and read and write
591000
heap
page read and write
C3DE000
stack
page read and write
11C0000
heap
page read and write
C4DE000
stack
page read and write
9320000
heap
page read and write
57A0000
heap
page execute and read and write
3441000
trusted library allocation
page read and write
2544000
trusted library allocation
page read and write
839E000
stack
page read and write
2847000
trusted library allocation
page read and write
755B000
trusted library allocation
page read and write
31DD000
trusted library allocation
page read and write
11E0000
trusted library allocation
page read and write
5C8E000
stack
page read and write
12DE000
stack
page read and write
31BE000
trusted library allocation
page read and write
3449000
trusted library allocation
page read and write
2843000
trusted library allocation
page read and write
5B4D000
stack
page read and write
283D000
trusted library allocation
page read and write
5D0E000
stack
page read and write
2552000
trusted library allocation
page read and write
345B000
trusted library allocation
page read and write
AF7000
heap
page read and write
9132000
heap
page read and write
1308000
heap
page read and write
3220000
heap
page execute and read and write
282B000
trusted library allocation
page read and write
1348000
heap
page read and write
C0DE000
stack
page read and write
4D90000
trusted library allocation
page read and write
A22E000
stack
page read and write
91B0000
trusted library allocation
page read and write
31B6000
trusted library allocation
page read and write
14B4000
trusted library allocation
page read and write
31C2000
trusted library allocation
page read and write
343F000
trusted library allocation
page read and write
284F000
trusted library allocation
page read and write
18CC000
stack
page read and write
1410000
heap
page read and write
497E000
trusted library allocation
page read and write
344F000
trusted library allocation
page read and write
7780000
trusted library section
page read and write
2F67000
trusted library allocation
page read and write
AE4000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page read and write
254C000
trusted library allocation
page read and write
5690000
trusted library allocation
page read and write
4EBD000
stack
page read and write
7640000
trusted library allocation
page read and write
7E0000
heap
page read and write
4259000
trusted library allocation
page read and write
105E000
stack
page read and write
1300000
heap
page read and write
2EEE000
stack
page read and write
72E000
stack
page read and write
11A6000
trusted library allocation
page execute and read and write
154E000
stack
page read and write
302C000
stack
page read and write
31D6000
trusted library allocation
page read and write
2540000
trusted library allocation
page read and write
455C000
stack
page read and write
7F3F0000
trusted library allocation
page execute and read and write
6C8D000
stack
page read and write
2F0E000
stack
page read and write
6987000
trusted library allocation
page read and write
12D7000
heap
page read and write
553000
heap
page read and write
2548000
trusted library allocation
page read and write
53CE000
stack
page read and write
158E000
stack
page read and write
C2DC000
stack
page read and write
504E000
stack
page read and write
FD0000
heap
page read and write
4DB0000
heap
page read and write
57C0000
heap
page read and write
577E000
stack
page read and write
3459000
trusted library allocation
page read and write
68FE000
stack
page read and write
5EBD000
trusted library allocation
page read and write
3110000
heap
page read and write
2849000
trusted library allocation
page read and write
5E99000
trusted library allocation
page read and write
5A0E000
stack
page read and write
283F000
trusted library allocation
page read and write
1496000
heap
page read and write
4D2E000
stack
page read and write
1250000
heap
page read and write
9C1E000
stack
page read and write
A0EE000
stack
page read and write
7820000
trusted library allocation
page execute and read and write
48BE000
trusted library allocation
page read and write
4231000
trusted library allocation
page read and write
652E000
stack
page read and write
BFDE000
stack
page read and write
4216000
trusted library allocation
page read and write
57E0000
heap
page execute and read and write
30ED000
trusted library allocation
page read and write
83A0000
trusted library allocation
page execute and read and write
6C8E000
stack
page read and write
2FD0000
trusted library allocation
page read and write
4BB0000
heap
page read and write
16E7000
trusted library allocation
page execute and read and write
55F0000
heap
page read and write
3143000
trusted library allocation
page read and write
4B9F000
trusted library section
page readonly
1660000
heap
page read and write
2FC0000
trusted library allocation
page read and write
41AE000
trusted library allocation
page read and write
5C4E000
stack
page read and write
31B1000
trusted library allocation
page read and write
41B5000
trusted library allocation
page read and write
913A000
heap
page read and write
E5A000
stack
page read and write
90FA000
heap
page read and write
7A17000
trusted library allocation
page read and write
7240000
heap
page read and write
32BC000
trusted library allocation
page read and write
301A000
heap
page read and write
4BE0000
heap
page execute and read and write
7670000
trusted library allocation
page execute and read and write
4D75000
trusted library allocation
page read and write
BE5D000
stack
page read and write
105B000
stack
page read and write
6CD7000
trusted library allocation
page read and write
31FD000
trusted library allocation
page read and write
5600000
heap
page read and write
911F000
heap
page read and write
6FFE000
stack
page read and write
B9F000
stack
page read and write
697D000
trusted library allocation
page read and write
5B4D000
stack
page read and write
536000
heap
page read and write
3FD1000
trusted library allocation
page read and write
31B0000
trusted library allocation
page read and write
7A00000
trusted library allocation
page execute and read and write
58F0000
heap
page read and write
2FE0000
heap
page execute and read and write
2550000
trusted library allocation
page read and write
1493000
heap
page read and write
69CD000
stack
page read and write
5610000
heap
page read and write
4CAE000
stack
page read and write
5C6000
heap
page read and write
14F0000
heap
page read and write
2DC0000
heap
page read and write
2530000
trusted library allocation
page read and write
345F000
trusted library allocation
page read and write
162B000
stack
page read and write
572C000
stack
page read and write
5790000
heap
page read and write
98DE000
stack
page read and write
5EB3000
trusted library allocation
page read and write
14E0000
trusted library allocation
page read and write
2F36000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
9DAC000
stack
page read and write
4BDF000
trusted library allocation
page read and write
2831000
trusted library allocation
page read and write
24ED000
trusted library allocation
page read and write
4F70000
trusted library allocation
page read and write
6F70000
heap
page read and write
686E000
stack
page read and write
2837000
trusted library allocation
page read and write
5238000
trusted library allocation
page read and write
6590000
heap
page read and write
14B0000
trusted library allocation
page read and write
A20000
heap
page read and write
322E000
unkown
page read and write
14D1000
heap
page read and write
144E000
stack
page read and write
158E000
stack
page read and write
4F80000
trusted library allocation
page execute and read and write
16B3000
trusted library allocation
page execute and read and write
8EE000
stack
page read and write
3445000
trusted library allocation
page read and write
48C1000
trusted library allocation
page read and write
79B0000
trusted library section
page read and write
7650000
trusted library allocation
page read and write
5903000
heap
page read and write
642B000
stack
page read and write
2FC0000
heap
page read and write
2536000
trusted library allocation
page read and write
1E0000
heap
page read and write
343B000
trusted library allocation
page read and write
6BF7000
trusted library allocation
page read and write
3010000
heap
page read and write
2845000
trusted library allocation
page read and write
3447000
trusted library allocation
page read and write
16B0000
trusted library allocation
page read and write
6E0000
heap
page read and write
6B30000
trusted library allocation
page read and write
9C31000
trusted library allocation
page read and write
A12E000
stack
page read and write
949E000
stack
page read and write
5B0F000
stack
page read and write
A4E000
stack
page read and write
544000
heap
page read and write
12D2000
heap
page read and write
79C0000
trusted library allocation
page execute and read and write
8B0000
heap
page read and write
4A8B000
stack
page read and write
1666000
heap
page read and write
6EFE000
stack
page read and write
B00000
unkown
page readonly
57A0000
trusted library allocation
page execute and read and write
84EE000
stack
page read and write
326F000
unkown
page read and write
14E2000
trusted library allocation
page read and write
5E8E000
stack
page read and write
3646000
trusted library allocation
page read and write
48CD000
trusted library allocation
page read and write
91E0000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
90B0000
heap
page read and write
4CE0000
trusted library allocation
page execute and read and write
1602000
heap
page read and write
7DB000
trusted library allocation
page execute and read and write
125B000
heap
page read and write
260D000
trusted library allocation
page read and write
12E0000
heap
page read and write
BCDE000
stack
page read and write
58CC000
stack
page read and write
6D0E000
stack
page read and write
3360000
heap
page read and write
567B000
stack
page read and write
C1DC000
stack
page read and write
1530000
trusted library allocation
page read and write
253E000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
32AA000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
5BD000
stack
page read and write
1521000
heap
page read and write
1294000
heap
page read and write
6572000
heap
page read and write
6FB0000
heap
page read and write
58C0000
heap
page read and write
4F78000
trusted library allocation
page read and write
A56D000
trusted library allocation
page read and write
1240000
trusted library allocation
page execute and read and write
4CB0000
trusted library allocation
page read and write
4028000
trusted library allocation
page read and write
65AD000
heap
page read and write
91D0000
trusted library allocation
page read and write
1710000
trusted library allocation
page execute and read and write
14DA000
trusted library allocation
page execute and read and write
5EB8000
trusted library allocation
page read and write
1460000
heap
page read and write
14D2000
trusted library allocation
page read and write
B5E000
stack
page read and write
1551000
heap
page read and write
510000
heap
page read and write
6D40000
trusted library allocation
page read and write
AD0000
heap
page read and write
6B40000
trusted library allocation
page read and write
4BD0000
trusted library allocation
page read and write
5E4D000
stack
page read and write
7A0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
574C000
stack
page read and write
23B0000
heap
page execute and read and write
6DFE000
stack
page read and write
5CCD000
stack
page read and write
23A0000
trusted library allocation
page read and write
696E000
stack
page read and write
3200000
trusted library allocation
page read and write
600000
heap
page read and write
1159000
stack
page read and write
54A0000
heap
page read and write
15C4000
heap
page read and write
5700000
heap
page execute and read and write
2F50000
trusted library allocation
page read and write
50CC000
stack
page read and write
56EE000
stack
page read and write
33C1000
trusted library allocation
page read and write
AF0000
heap
page read and write
31E6000
trusted library allocation
page read and write
15C7000
heap
page read and write
4F50000
trusted library allocation
page execute and read and write
101E000
stack
page read and write
1320000
heap
page read and write
A8B000
stack
page read and write
344D000
trusted library allocation
page read and write
6B4A000
trusted library allocation
page read and write
444D000
stack
page read and write
2835000
trusted library allocation
page read and write
18D0000
heap
page read and write
4296000
trusted library allocation
page read and write
4B90000
trusted library section
page readonly
14D0000
trusted library allocation
page read and write
1634000
heap
page read and write
1598000
heap
page read and write
4DA0000
trusted library allocation
page execute and read and write
48C6000
trusted library allocation
page read and write
2DD0000
heap
page read and write
2FD6000
trusted library allocation
page read and write
2494000
trusted library allocation
page read and write
5C4E000
stack
page read and write
15BA000
heap
page read and write
2F6C000
trusted library allocation
page read and write
166E000
heap
page read and write
32AE000
stack
page read and write
7A4000
trusted library allocation
page read and write
31F4000
trusted library allocation
page read and write
A0F000
unkown
page read and write
91F0000
trusted library allocation
page execute and read and write
40C4000
trusted library allocation
page read and write
777E000
stack
page read and write
1F0000
heap
page read and write
1318000
heap
page read and write
1060000
heap
page read and write
79A0000
trusted library section
page read and write
1345000
heap
page read and write
B02000
unkown
page readonly
1500000
trusted library allocation
page read and write
16E5000
trusted library allocation
page execute and read and write
31CE000
trusted library allocation
page read and write
1310000
heap
page read and write
16E2000
trusted library allocation
page read and write
2FD4000
trusted library allocation
page read and write
7A3000
trusted library allocation
page execute and read and write
4D80000
trusted library allocation
page read and write
2F00000
heap
page execute and read and write
2554000
trusted library allocation
page read and write
16B4000
trusted library allocation
page read and write
1540000
heap
page read and write
56A0000
trusted library allocation
page read and write
There are 643 hidden memdumps, click here to show them.