IOC Report
SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Dici.tmp
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\7ZipSfx.000\xBCzEiVyOcVH.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Bel.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Inclina.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\7ZipSfx.000\u (copy)
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop19.61354.18603.9865.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c cmd < Bel.tmp
malicious
C:\Windows\SysWOW64\cmd.exe
cmd
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V /R "^BMFIocnwPbapedepYbhWqofGZurIuQVJxjUhlGSmSVBHSStsfyboyoBzbYJwaQVYCIOPvPZsEOttGIOueLaqzNEjKBPjXRuwqCtptgVmuyDdrvMPlCYGbU$" Dici.tmp
malicious
C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Rarissima.exe.pif
Rarissima.exe.pif u
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Windows\System32\svchost.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist /FI "imagename eq BullGuardCore.exe"
C:\Windows\SysWOW64\find.exe
find /I /N "bullguardcore.exe"
C:\Windows\SysWOW64\tasklist.exe
tasklist /FI "imagename eq PSUAService.exe"
C:\Windows\SysWOW64\find.exe
find /I /N "psuaservice.exe"
C:\Windows\SysWOW64\waitfor.exe
waitfor /t 5 cPJmppTIOgHphOgIZlJIVQpIXRsFPuungjFRADw
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
45.67.231.189:49441
malicious
http://tempuri.org/Entity/Id10Response
unknown
http://tempuri.org/Entity/Id24LR
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possesspropertyx
unknown
http://tempuri.org/Entity/Id16(
unknown
http://tempuri.org/Entity/Id22LR
unknown
http://tempuri.org/Entity/Id20LR
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://tempuri.org/Entity/Id21Response
unknown
https://www.autoitscript.com/autoit3/
unknown
http://tempuri.org/Entity/Id19LR
unknown
http://tempuri.org/Entity/Id23Response
unknown
http://tempuri.org/Entity/Id17LR
unknown
http://tempuri.org/Entity/Id15LR
unknown
http://tempuri.org/Entity/Id9LR
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://tempuri.org/Entity/Id13LR
unknown
http://tempuri.org/Entity/Id7LR
unknown
http://tempuri.org/Entity/Id11LR
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
unknown
http://tempuri.org/Entity/Id17Response
unknown
http://tempuri.org/Entity/Id1LR
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id5LR
unknown
http://tempuri.org/Entity/Id20Response
unknown
http://tempuri.org/Entity/Id3LR
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id13Response
unknown
http://tempuri.org/Entity/Id4Response
unknown
http://tempuri.org/(
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
http://tempuri.org/Entity/Id23LR
unknown
http://tempuri.org/Entity/Id7Response
unknown
http://tempuri.org/Entity/Id21LR
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Entity/Id11Response
unknown
http://tempuri.org/Entity/Id9Response
unknown
http://tempuri.org/Entity/(
unknown
http://tempuri.org/Entity/Id22Response
unknown
http://tempuri.org/Entity/Id24Response
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://tempuri.org/Entity/Id18LR
unknown
http://tempuri.org/Entity/Id16LR
unknown
http://tempuri.org/Entity/Id8LR
unknown
http://tempuri.org/Entity/Id14LR
unknown
http://tempuri.org/Entity/Id6LR
unknown
http://tempuri.org/Entity/Id18Response
unknown
http://tempuri.org/Entity/
unknown
http://tempuri.org/Entity/Id12LR
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://tempuri.org/Entity/Id10LR
unknown
http://tempuri.org/Entity/Id4LR
unknown
http://tempuri.org/Entity/Id2LR
unknown
http://tempuri.org/Entity/Id3Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id14Response
unknown
There are 60 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
xCYuqFZpbOjjkUqkfthcb.xCYuqFZpbOjjkUqkfthcb
unknown
malicious

IPs

IP
Domain
Country
Malicious
45.67.231.189
unknown
Moldova Republic of
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3EAB000
heap
page read and write
malicious
3E38000
heap
page read and write
malicious
3E18000
heap
page read and write
malicious
50F0000
heap
page read and write
malicious
BE2000
remote allocation
page execute and read and write
malicious
3DF0000
heap
page read and write
malicious
F88000
heap
page read and write
245E000
stack
page read and write
BFC000
remote allocation
page execute and read and write
3992000
heap
page read and write
419000
unkown
page write copy
3D2C000
heap
page read and write
47F1000
heap
page read and write
3A10000
heap
page read and write
47F1000
heap
page read and write
3500000
heap
page read and write
545E000
stack
page read and write
3E36000
heap
page read and write
3E0B000
heap
page read and write
1050000
trusted library allocation
page read and write
3148000
trusted library allocation
page read and write
AA0000
heap
page read and write
2410000
heap
page read and write
5640000
trusted library allocation
page execute and read and write
BAC000
stack
page read and write
DEF000
stack
page read and write
47F1000
heap
page read and write
12B8000
heap
page read and write
247F000
stack
page read and write
378C000
heap
page read and write
3C97000
heap
page read and write
11A5000
heap
page read and write
3010000
heap
page read and write
1430000
heap
page read and write
53D0000
trusted library allocation
page read and write
123C000
heap
page read and write
378B000
heap
page read and write
599E000
stack
page read and write
107F000
heap
page read and write
F04000
heap
page read and write
3950000
heap
page read and write
2E30000
trusted library allocation
page read and write
35A9000
heap
page read and write
105B000
trusted library allocation
page execute and read and write
13E0000
trusted library allocation
page execute and read and write
1028000
heap
page read and write
1350000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
F42000
heap
page read and write
103D000
trusted library allocation
page execute and read and write
3913000
heap
page read and write
376C000
heap
page read and write
47F1000
heap
page read and write
3B0C000
heap
page read and write
F22000
heap
page read and write
367D000
heap
page read and write
F99000
heap
page read and write
374B000
heap
page read and write
2730000
heap
page read and write
109F000
heap
page read and write
F17000
heap
page read and write
456E000
stack
page read and write
52D000
heap
page read and write
111F000
heap
page read and write
FFE000
heap
page read and write
332D000
trusted library allocation
page read and write
123C000
heap
page read and write
5480000
trusted library allocation
page execute and read and write
8D0000
heap
page read and write
11FB000
heap
page read and write
25A3000
heap
page read and write
3525000
heap
page read and write
F14000
heap
page read and write
F8A000
heap
page read and write
121A000
heap
page read and write
1007000
heap
page read and write
529000
heap
page read and write
3E16000
heap
page read and write
8BF000
stack
page read and write
378B000
heap
page read and write
1910000
heap
page read and write
37EE000
heap
page read and write
451F000
stack
page read and write
2700000
heap
page read and write
3AE3000
heap
page read and write
2DF1000
trusted library allocation
page read and write
3A10000
heap
page read and write
10B0000
heap
page read and write
3B4F000
heap
page read and write
E6E000
stack
page read and write
37B4000
heap
page read and write
3DD6000
heap
page read and write
5400000
trusted library allocation
page read and write
10F7000
heap
page read and write
3D9C000
heap
page read and write
255F000
heap
page read and write
50EF000
stack
page read and write
2594000
heap
page read and write
1824000
heap
page read and write
F88000
heap
page read and write
54C000
heap
page read and write
26B0000
heap
page read and write
36D3000
heap
page read and write
F3A000
heap
page read and write
3DD6000
heap
page read and write
58C000
heap
page read and write
12BE000
heap
page read and write
100B000
heap
page read and write
3AE3000
heap
page read and write
309F000
stack
page read and write
3575000
heap
page read and write
2F00000
heap
page read and write
2579000
heap
page read and write
1164000
heap
page read and write
FFA000
heap
page read and write
3B0C000
heap
page read and write
53F000
heap
page read and write
EF8000
stack
page read and write
466F000
stack
page read and write
F14000
heap
page read and write
359A000
heap
page read and write
50E000
heap
page read and write
F80000
heap
page read and write
47F1000
heap
page read and write
7CF000
stack
page read and write
F1E000
heap
page read and write
47F1000
heap
page read and write
113F000
heap
page read and write
3CE000
stack
page read and write
1143000
heap
page read and write
1028000
heap
page read and write
3DB7000
heap
page read and write
12BE000
heap
page read and write
355B000
heap
page read and write
26E0000
heap
page read and write
3676000
heap
page read and write
1105000
heap
page read and write
549F000
trusted library allocation
page read and write
5120000
heap
page read and write
35ED000
heap
page read and write
3C2C000
heap
page read and write
37E0000
heap
page read and write
384D000
heap
page read and write
2550000
heap
page read and write
47F1000
heap
page read and write
343E000
stack
page read and write
3588000
heap
page read and write
F56000
heap
page read and write
107B000
heap
page read and write
10C5000
heap
page read and write
391C000
heap
page read and write
3BB2000
heap
page read and write
47AE000
stack
page read and write
F1A000
heap
page read and write
EF5000
heap
page read and write
FBD000
heap
page read and write
EF1000
heap
page read and write
3AE3000
heap
page read and write
1830000
trusted library allocation
page read and write
3C9E000
heap
page read and write
107B000
heap
page read and write
47F1000
heap
page read and write
12BE000
heap
page read and write
2DEB000
trusted library allocation
page read and write
3510000
heap
page read and write
33CE000
stack
page read and write
3DC7000
heap
page read and write
74E000
heap
page read and write
104A000
trusted library allocation
page execute and read and write
392F000
heap
page read and write
3AD2000
heap
page read and write
1223000
heap
page read and write
F61000
heap
page read and write
1014000
heap
page read and write
35AF000
heap
page read and write
2704000
heap
page read and write
47F1000
heap
page read and write
3AE4000
heap
page read and write
35D1000
heap
page read and write
1810000
direct allocation
page execute and read and write
10B7000
heap
page read and write
47F1000
heap
page read and write
3D8B000
heap
page read and write
47F1000
heap
page read and write
31C0000
heap
page read and write
3E32000
heap
page read and write
F3D000
heap
page read and write
3D36000
heap
page read and write
34C1000
heap
page read and write
2599000
heap
page read and write
2DF6000
trusted library allocation
page read and write
8BF000
stack
page read and write
109E000
heap
page read and write
549F000
stack
page read and write
1103000
heap
page read and write
3E36000
heap
page read and write
11DB000
heap
page read and write
3560000
heap
page read and write
18CE000
stack
page read and write
54A0000
heap
page read and write
39D5000
heap
page read and write
47F1000
heap
page read and write
3BC1000
heap
page read and write
8FE000
stack
page read and write
33CB000
trusted library allocation
page read and write
2870000
heap
page read and write
3BA1000
heap
page read and write
3AC0000
heap
page read and write
3B71000
heap
page read and write
270E000
stack
page read and write
8D8000
heap
page read and write
3525000
heap
page read and write
112E000
heap
page read and write
2E40000
heap
page read and write
106F000
heap
page read and write
630000
heap
page read and write
3800000
heap
page read and write
1018000
heap
page read and write
20F0000
heap
page read and write
26CE000
stack
page read and write
690000
heap
page read and write
114A000
heap
page read and write
47F1000
heap
page read and write
11E2000
heap
page read and write
32DE000
trusted library allocation
page read and write
525000
heap
page read and write
3A41000
heap
page read and write
1196000
heap
page read and write
ECF000
heap
page read and write
2FE0000
heap
page read and write
5650000
heap
page read and write
33D0000
heap
page read and write
114D000
heap
page read and write
E0C000
stack
page read and write
45DE000
stack
page read and write
3BBB000
heap
page read and write
3597000
heap
page read and write
100A000
heap
page read and write
1010000
heap
page read and write
47F1000
heap
page read and write
11FB000
heap
page read and write
F61000
heap
page read and write
F68000
heap
page read and write
F88000
heap
page read and write
31A2000
trusted library allocation
page read and write
38D000
stack
page read and write
461F000
stack
page read and write
1015000
heap
page read and write
2DDE000
stack
page read and write
384C000
heap
page read and write
120C000
heap
page read and write
E2C000
stack
page read and write
47F1000
heap
page read and write
3B81000
heap
page read and write
10B0000
heap
page read and write
1028000
heap
page read and write
500000
heap
page read and write
3930000
heap
page read and write
305E000
stack
page read and write
1187000
heap
page read and write
47F1000
heap
page read and write
101A000
heap
page read and write
41C000
unkown
page readonly
3ABF000
heap
page read and write
1042000
trusted library allocation
page read and write
3619000
heap
page read and write
FBE000
heap
page read and write
36D8000
heap
page read and write
47F1000
heap
page read and write
34C0000
heap
page read and write
47F1000
heap
page read and write
FE8000
heap
page read and write
67E000
stack
page read and write
F66000
heap
page read and write
366D000
heap
page read and write
3526000
heap
page read and write
3A19000
heap
page read and write
1057000
trusted library allocation
page execute and read and write
F89000
heap
page read and write
3E0000
heap
page read and write
347E000
stack
page read and write
3957000
heap
page read and write
3270000
heap
page read and write
1221000
heap
page read and write
3609000
heap
page read and write
34DE000
heap
page read and write
1070000
heap
page read and write
3E62000
heap
page read and write
3583000
heap
page read and write
1018000
heap
page read and write
301D000
trusted library allocation
page read and write
31CE000
heap
page read and write
102D000
trusted library allocation
page execute and read and write
47F1000
heap
page read and write
114C000
heap
page read and write
385F000
heap
page read and write
374B000
heap
page read and write
31F1000
trusted library allocation
page read and write
1046000
trusted library allocation
page execute and read and write
3A9E000
heap
page read and write
47F0000
heap
page read and write
F65000
heap
page read and write
53A000
heap
page read and write
1071000
heap
page read and write
630000
heap
page read and write
11E0000
heap
page read and write
3100000
heap
page read and write
105F000
heap
page read and write
115A000
heap
page read and write
356D000
heap
page read and write
2FEE000
stack
page read and write
1226000
heap
page read and write
419000
unkown
page read and write
11C0000
heap
page read and write
2E11000
trusted library allocation
page read and write
1028000
heap
page read and write
35BE000
heap
page read and write
3993000
heap
page read and write
F99000
heap
page read and write
FEE000
heap
page read and write
3B50000
heap
page read and write
578E000
stack
page read and write
3720000
heap
page read and write
237E000
stack
page read and write
366D000
heap
page read and write
980000
heap
page read and write
11CF000
heap
page read and write
3D9C000
heap
page read and write
25BC000
stack
page read and write
8D9000
heap
page read and write
53A000
heap
page read and write
3017000
trusted library allocation
page read and write
47F1000
heap
page read and write
415000
unkown
page readonly
11C2000
heap
page read and write
4BE000
stack
page read and write
401000
unkown
page execute read
2E0E000
trusted library allocation
page read and write
5490000
trusted library allocation
page read and write
380000
heap
page read and write
10E6000
heap
page read and write
93F000
stack
page read and write
123A000
heap
page read and write
47F1000
heap
page read and write
3AE3000
heap
page read and write
371A000
heap
page read and write
11DD000
heap
page read and write
354F000
heap
page read and write
20E0000
heap
page read and write
1157000
heap
page read and write
47F1000
heap
page read and write
F99000
heap
page read and write
11F6000
heap
page read and write
47F1000
heap
page read and write
34F1000
heap
page read and write
459F000
stack
page read and write
107B000
heap
page read and write
1014000
heap
page read and write
F66000
heap
page read and write
3B81000
heap
page read and write
39D4000
heap
page read and write
9A000
stack
page read and write
1420000
trusted library allocation
page read and write
33F0000
heap
page read and write
78F000
stack
page read and write
121A000
heap
page read and write
47B0000
heap
page read and write
11FD000
heap
page read and write
430000
heap
page read and write
2E28000
trusted library allocation
page read and write
1126000
heap
page read and write
33F9000
heap
page read and write
F4B000
heap
page read and write
1010000
heap
page read and write
11F8000
heap
page read and write
26C0000
direct allocation
page read and write
3580000
heap
page read and write
F30000
heap
page read and write
10F4000
heap
page read and write
47F1000
heap
page read and write
F22000
heap
page read and write
1830000
trusted library allocation
page read and write
1820000
heap
page read and write
10E4000
heap
page read and write
3D36000
heap
page read and write
EC0000
heap
page read and write
47F1000
heap
page read and write
1184000
heap
page read and write
46AE000
stack
page read and write
F22000
heap
page read and write
47E000
stack
page read and write
3CF2000
heap
page read and write
38A9000
heap
page read and write
369E000
heap
page read and write
1153000
heap
page read and write
F22000
heap
page read and write
1223000
heap
page read and write
10E0000
heap
page read and write
2E5C000
stack
page read and write
F8A000
heap
page read and write
1161000
heap
page read and write
3587000
heap
page read and write
188E000
stack
page read and write
1223000
heap
page read and write
3B84000
heap
page read and write
752000
heap
page read and write
2598000
heap
page read and write
3720000
heap
page read and write
3D36000
heap
page read and write
3B05000
heap
page read and write
A14000
unkown
page write copy
37AD000
heap
page read and write
47F1000
heap
page read and write
11FA000
heap
page read and write
1000000
heap
page read and write
35AA000
heap
page read and write
47F1000
heap
page read and write
107C000
heap
page read and write
F15000
heap
page read and write
F3B000
heap
page read and write
5790000
heap
page execute and read and write
9E0000
unkown
page readonly
107F000
heap
page read and write
338E000
stack
page read and write
47F1000
heap
page read and write
44DE000
stack
page read and write
F42000
heap
page read and write
950000
unkown
page readonly
123C000
heap
page read and write
111F000
heap
page read and write
2469000
heap
page read and write
415000
unkown
page readonly
951000
unkown
page execute read
F8A000
heap
page read and write
FE8000
heap
page read and write
3C2C000
heap
page read and write
2E20000
trusted library allocation
page read and write
70F000
stack
page read and write
2DD000
stack
page read and write
3618000
heap
page read and write
3AF4000
heap
page read and write
1145000
heap
page read and write
F04000
heap
page read and write
1084000
heap
page read and write
1010000
trusted library allocation
page read and write
3021000
trusted library allocation
page read and write
401000
unkown
page execute read
FBC000
heap
page read and write
91E000
stack
page read and write
3982000
heap
page read and write
11D4000
heap
page read and write
1009000
heap
page read and write
47F1000
heap
page read and write
FB7000
heap
page read and write
1150000
heap
page read and write
1024000
trusted library allocation
page read and write
3992000
heap
page read and write
47F1000
heap
page read and write
3898000
heap
page read and write
4A60000
heap
page read and write
1228000
heap
page read and write
385E000
heap
page read and write
AA5000
heap
page read and write
562E000
stack
page read and write
10B0000
heap
page read and write
F19000
heap
page read and write
116D000
heap
page read and write
380A000
heap
page read and write
380A000
heap
page read and write
47F1000
heap
page read and write
F66000
heap
page read and write
F99000
heap
page read and write
10C2000
heap
page read and write
F4E000
heap
page read and write
FF1000
heap
page read and write
5460000
trusted library allocation
page read and write
539F000
stack
page read and write
1194000
heap
page read and write
1037000
heap
page read and write
2588000
heap
page read and write
50A000
heap
page read and write
34F1000
heap
page read and write
47F1000
heap
page read and write
1011000
heap
page read and write
1040000
trusted library allocation
page read and write
3584000
heap
page read and write
FD0000
heap
page read and write
12AF000
heap
page read and write
1087000
heap
page read and write
1052000
trusted library allocation
page read and write
341A000
trusted library allocation
page read and write
1248000
heap
page read and write
3AB8000
heap
page read and write
53E0000
trusted library allocation
page execute and read and write
3D8A000
heap
page read and write
3A94000
heap
page read and write
F52000
heap
page read and write
F88000
heap
page read and write
1082000
heap
page read and write
14C000
stack
page read and write
10C3000
heap
page read and write
DFE000
stack
page read and write
1028000
heap
page read and write
3739000
heap
page read and write
3AD9000
heap
page read and write
8A0000
heap
page read and write
328F000
trusted library allocation
page read and write
367D000
heap
page read and write
3664000
heap
page read and write
47F1000
heap
page read and write
1229000
heap
page read and write
9E0000
unkown
page readonly
35BE000
heap
page read and write
1830000
trusted library allocation
page read and write
FFA000
heap
page read and write
47F1000
heap
page read and write
F56000
heap
page read and write
3051000
trusted library allocation
page read and write
3EA8000
heap
page read and write
1170000
heap
page read and write
74E000
stack
page read and write
402000
heap
page read and write
3561000
heap
page read and write
5470000
trusted library allocation
page execute and read and write
54A0000
trusted library allocation
page read and write
558000
heap
page read and write
24BC000
stack
page read and write
2460000
heap
page read and write
3A40000
heap
page read and write
FE9000
heap
page read and write
37C0000
heap
page read and write
3C6F000
heap
page read and write
3010000
trusted library allocation
page read and write
120F000
heap
page read and write
1010000
heap
page read and write
3656000
heap
page read and write
589F000
stack
page read and write
F14000
heap
page read and write
2E2A000
trusted library allocation
page read and write
8D8000
heap
page read and write
11AB000
heap
page read and write
A10000
unkown
page read and write
2587000
heap
page read and write
1229000
heap
page read and write
21AC000
stack
page read and write
F3A000
heap
page read and write
3A94000
heap
page read and write
740000
heap
page read and write
1030000
trusted library allocation
page read and write
A3F000
stack
page read and write
36B3000
heap
page read and write
337C000
trusted library allocation
page read and write
3C7F000
heap
page read and write
109A000
heap
page read and write
1131000
heap
page read and write
54C000
heap
page read and write
83A000
stack
page read and write
30DE000
stack
page read and write
3C1A000
heap
page read and write
47F1000
heap
page read and write
35BE000
heap
page read and write
378B000
heap
page read and write
257D000
heap
page read and write
123C000
heap
page read and write
F59000
heap
page read and write
1194000
heap
page read and write
178F000
stack
page read and write
F22000
heap
page read and write
34F6000
heap
page read and write
3A9F000
heap
page read and write
3C76000
heap
page read and write
37C1000
heap
page read and write
106F000
heap
page read and write
3618000
heap
page read and write
600000
heap
page read and write
3926000
heap
page read and write
10E8000
heap
page read and write
37B6000
heap
page read and write
2DE0000
trusted library allocation
page read and write
FBD000
heap
page read and write
1241000
heap
page read and write
3CE0000
heap
page read and write
3EA9000
heap
page read and write
38D2000
heap
page read and write
3001000
trusted library allocation
page read and write
2E02000
trusted library allocation
page read and write
E90000
heap
page read and write
8CE000
stack
page read and write
3A30000
heap
page read and write
3D30000
trusted library allocation
page read and write
3ABF000
heap
page read and write
3AD9000
heap
page read and write
3C2C000
heap
page read and write
A06000
unkown
page readonly
812000
heap
page read and write
2E9C000
stack
page read and write
47F1000
heap
page read and write
FEE000
heap
page read and write
F56000
heap
page read and write
47F1000
heap
page read and write
1163000
heap
page read and write
34EE000
stack
page read and write
1194000
heap
page read and write
35FC000
heap
page read and write
F61000
heap
page read and write
1AD000
stack
page read and write
36BD000
heap
page read and write
FCE000
heap
page read and write
3A4A000
heap
page read and write
54B0000
trusted library allocation
page read and write
47F1000
heap
page read and write
268F000
stack
page read and write
47F1000
heap
page read and write
1070000
heap
page read and write
47F1000
heap
page read and write
3CD000
stack
page read and write
47F1000
heap
page read and write
1410000
trusted library allocation
page read and write
420000
heap
page read and write
10A4000
heap
page read and write
3C86000
heap
page read and write
124F000
heap
page read and write
A90000
heap
page read and write
EED000
heap
page read and write
379C000
heap
page read and write
3960000
heap
page read and write
47F1000
heap
page read and write
1014000
heap
page read and write
35C1000
heap
page read and write
3B97000
heap
page read and write
49F0000
direct allocation
page read and write
111F000
heap
page read and write
525000
heap
page read and write
4CEF000
stack
page read and write
139E000
stack
page read and write
10B1000
heap
page read and write
38A9000
heap
page read and write
392F000
heap
page read and write
F9A000
heap
page read and write
3DB4000
heap
page read and write
950000
unkown
page readonly
3CE1000
heap
page read and write
13F0000
heap
page read and write
3719000
heap
page read and write
39E4000
heap
page read and write
1097000
heap
page read and write
1151000
heap
page read and write
1229000
heap
page read and write
5450000
trusted library allocation
page read and write
2540000
heap
page read and write
3BD9000
heap
page read and write
1194000
heap
page read and write
37B4000
heap
page read and write
38AA000
heap
page read and write
1120000
heap
page read and write
1229000
heap
page read and write
3517000
heap
page read and write
106F000
heap
page read and write
10FA000
heap
page read and write
BE0000
remote allocation
page execute and read and write
31D000
stack
page read and write
827000
heap
page read and write
F7E000
stack
page read and write
A19000
unkown
page readonly
3BC0000
heap
page read and write
8B0000
heap
page read and write
19A000
stack
page read and write
2FF0000
trusted library allocation
page read and write
600E000
stack
page read and write
6A0000
heap
page read and write
AA9000
heap
page read and write
F55000
heap
page read and write
5692000
heap
page read and write
3BBB000
heap
page read and write
3D0000
heap
page read and write
6C2000
heap
page read and write
356A000
heap
page read and write
39FF000
heap
page read and write
374B000
heap
page read and write
35BE000
heap
page read and write
800000
heap
page read and write
1028000
heap
page read and write
610F000
stack
page read and write
F88000
heap
page read and write
4059000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
3240000
trusted library allocation
page read and write
3618000
heap
page read and write
3940000
heap
page read and write
10F1000
heap
page read and write
47F1000
heap
page read and write
106F000
heap
page read and write
34DB000
heap
page read and write
123C000
heap
page read and write
1020000
trusted library allocation
page read and write
102A000
heap
page read and write
373E000
heap
page read and write
34E0000
heap
page read and write
47F1000
heap
page read and write
3BBB000
heap
page read and write
11DB000
heap
page read and write
A19000
unkown
page readonly
3540000
heap
page read and write
1216000
heap
page read and write
314F000
stack
page read and write
11A3000
heap
page read and write
133E000
stack
page read and write
400000
unkown
page readonly
3926000
heap
page read and write
3525000
heap
page read and write
47F1000
heap
page read and write
F24000
heap
page read and write
3B8D000
heap
page read and write
372A000
heap
page read and write
121D000
heap
page read and write
3030000
trusted library allocation
page read and write
1055000
trusted library allocation
page execute and read and write
680000
heap
page read and write
400000
unkown
page readonly
1204000
heap
page read and write
F97000
heap
page read and write
354F000
heap
page read and write
F28000
heap
page read and write
F2B000
heap
page read and write
EFD000
heap
page read and write
1340000
heap
page read and write
A06000
unkown
page readonly
4F6000
heap
page read and write
47F1000
heap
page read and write
FC1000
heap
page read and write
2595000
heap
page read and write
3720000
heap
page read and write
3DAD000
heap
page read and write
1023000
trusted library allocation
page execute and read and write
F14000
heap
page read and write
47F1000
heap
page read and write
1194000
heap
page read and write
1014000
heap
page read and write
11F0000
heap
page read and write
1132000
heap
page read and write
1017000
heap
page read and write
107B000
heap
page read and write
11C0000
heap
page read and write
2FCC000
stack
page read and write
87E000
stack
page read and write
3A53000
heap
page read and write
6B0000
heap
page read and write
3739000
heap
page read and write
F04000
heap
page read and write
1010000
heap
page read and write
529000
heap
page read and write
F1C000
heap
page read and write
47F1000
heap
page read and write
47F1000
heap
page read and write
3D48000
heap
page read and write
6BE000
heap
page read and write
3536000
heap
page read and write
53DE000
stack
page read and write
1830000
heap
page read and write
3EA8000
heap
page read and write
F88000
heap
page read and write
39E4000
heap
page read and write
A10000
unkown
page write copy
541F000
stack
page read and write
350B000
heap
page read and write
16D000
stack
page read and write
3AC2000
heap
page read and write
1E0000
heap
page read and write
F52000
heap
page read and write
39E7000
heap
page read and write
34F1000
heap
page read and write
13DD000
stack
page read and write
11F5000
heap
page read and write
351A000
heap
page read and write
11AE000
heap
page read and write
34BE000
stack
page read and write
F52000
heap
page read and write
7FBC0000
trusted library allocation
page execute and read and write
F88000
heap
page read and write
F15000
heap
page read and write
3913000
heap
page read and write
41C000
unkown
page readonly
F58000
heap
page read and write
4051000
trusted library allocation
page read and write
3C66000
heap
page read and write
323C000
stack
page read and write
4630000
heap
page read and write
356C000
heap
page read and write
4F0000
heap
page read and write
106F000
heap
page read and write
10C4000
heap
page read and write
1263000
heap
page read and write
3992000
heap
page read and write
455E000
stack
page read and write
FC4000
heap
page read and write
53A000
heap
page read and write
3C3D000
heap
page read and write
25A8000
heap
page read and write
35A3000
heap
page read and write
2E25000
trusted library allocation
page read and write
35C0000
heap
page read and write
378B000
heap
page read and write
1040000
heap
page read and write
7CE000
stack
page read and write
121A000
heap
page read and write
3040000
heap
page execute and read and write
34C9000
heap
page read and write
1072000
heap
page read and write
1018000
heap
page read and write
951000
unkown
page execute read
There are 800 hidden memdumps, click here to show them.