IOC Report
SecuriteInfo.com.generic.ml.10062.6710

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.generic.ml.10062.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\ARMOURY CRATE eGPU Product.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Ddsstivhed9.non
data
dropped
C:\Users\user\AppData\Local\Temp\Fecundify.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
modified
C:\Users\user\AppData\Local\Temp\MsMpLics.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Sognefogedernes.Run6
data
dropped
C:\Users\user\AppData\Local\Temp\System.IO.FileSystem.Watcher.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Undergangsstemningen.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\avutil-54.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\folder-publicshare.png
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\krista.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\lang-1045.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\multimedia-volume-control-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\nspFBDC.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\p11-kit-trust.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
"C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe"
malicious

URLs

Name
IP
Malicious
http://2.56.57.22/yendexoriginwithoutfilter_rtSDhNF87.bin
malicious
http://crl.certum.pl/ctsca2021.crl0o
unknown
http://creativecommons.org/licenses/by-sa/4.0/
unknown
http://repository.certum.pl/ctnca.cer09
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://repository.certum.pl/ctsca2021.cer0
unknown
http://crl.certum.pl/ctnca.crl0k
unknown
http://subca.ocsp-certum.com05
unknown
http://www.symauth.com/rpa00
unknown
http://ocsp.thawte.com0
unknown
http://subca.ocsp-certum.com02
unknown
http://www.nero.com
unknown
http://subca.ocsp-certum.com01
unknown
http://crl.certum.pl/ctnca2.crl0l
unknown
http://repository.certum.pl/ctnca2.cer09
unknown
http://www.avast.com0/
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.symauth.com/cps0(
unknown
http://www.certum.pl/CPS0
unknown
https://github.com/dotnet/runtime
unknown
There are 10 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Glycerose112\ADVERTENCY
Balsamo11
HKEY_LOCAL_MACHINE\SOFTWARE\Cynology204\MORTIFICEREDE
Expand String Value
HKEY_CURRENT_USER\Software\Pezizaceae207\anticapital
Forsikringsaftalelovenes242
HKEY_LOCAL_MACHINE\SOFTWARE\FAMILIEFORSIKRING\inditch
CAMPINGPLADS
HKEY_CURRENT_USER\Software\NONESUCHES\Nugatoriness
Nopredes
HKEY_CURRENT_USER\Software\Botanicas\Antilapse
Expand String Value

Memdumps

Base Address
Regiontype
Protect
Malicious
3170000
direct allocation
page execute and read and write
malicious
15DFD0AC000
heap
page read and write
1EE2504D000
heap
page read and write
15DFD0FD000
heap
page read and write
15DFDB59000
heap
page read and write
1D0F4500000
heap
page read and write
1EE25989000
heap
page read and write
199CBBF0000
heap
page read and write
1D0F43E0000
remote allocation
page read and write
1D0F4360000
trusted library allocation
page read and write
464154C000
stack
page read and write
A34000
heap
page read and write
15DFEA10000
trusted library allocation
page read and write
1E377210000
heap
page read and write
1FE76042000
heap
page read and write
15D67C79000
heap
page read and write
1CFC9629000
heap
page read and write
2062B823000
heap
page read and write
1FE76063000
heap
page read and write
1EE25976000
heap
page read and write
1EE2505D000
heap
page read and write
403EFE000
stack
page read and write
1EE25991000
heap
page read and write
1EE2598C000
heap
page read and write
199CBD80000
trusted library allocation
page read and write
EA1397E000
stack
page read and write
2C1FA402000
heap
page read and write
1EE259BE000
heap
page read and write
2C1FA220000
heap
page read and write
1CFC94A0000
heap
page read and write
15D67C00000
heap
page read and write
18C9E502000
heap
page read and write
C2D211B000
stack
page read and write
F5F1EFF000
stack
page read and write
15DFE784000
trusted library allocation
page read and write
15DFD0BB000
heap
page read and write
199CCB50000
trusted library allocation
page read and write
522417D000
stack
page read and write
5224AF9000
stack
page read and write
1EE2502D000
heap
page read and write
15DFE904000
heap
page read and write
4044FF000
stack
page read and write
1CFC964F000
heap
page read and write
C2D28FE000
stack
page read and write
C2D287D000
stack
page read and write
15D67C02000
heap
page read and write
1FE76058000
heap
page read and write
199CBDA0000
trusted library allocation
page read and write
15DFE861000
heap
page read and write
27CF79B000
stack
page read and write
2C1FAC02000
trusted library allocation
page read and write
1FE7607C000
heap
page read and write
1EE25989000
heap
page read and write
20046425000
heap
page read and write
1FE7606A000
heap
page read and write
1EE2599B000
heap
page read and write
20046140000
heap
page read and write
C79C7FA000
stack
page read and write
1EE2598D000
heap
page read and write
18C9E3A0000
heap
page read and write
2062BFB0000
remote allocation
page read and write
EA131CF000
stack
page read and write
2830000
trusted library allocation
page read and write
27CFCFB000
stack
page read and write
24A3077000
stack
page read and write
6C1000
heap
page read and write
24A2CFE000
stack
page read and write
1EE2598D000
heap
page read and write
1CFC9627000
heap
page read and write
C79C4F7000
stack
page read and write
1EE25964000
heap
page read and write
1EE25D90000
remote allocation
page read and write
1EE25066000
heap
page read and write
1D0F4413000
heap
page read and write
1E377500000
heap
page read and write
1EE2505F000
heap
page read and write
1EE25991000
heap
page read and write
199CBC57000
heap
page read and write
24A317E000
stack
page read and write
B83D57C000
stack
page read and write
20046116000
heap
page read and write
1FE76076000
heap
page read and write
408000
unkown
page readonly
15D67D02000
heap
page read and write
18C9E330000
heap
page read and write
8116AF9000
stack
page read and write
15DFD102000
heap
page read and write
B83D8FF000
stack
page read and write
1FE76046000
heap
page read and write
1EE2596D000
heap
page read and write
1EE259AB000
heap
page read and write
EA1357D000
stack
page read and write
1CFC9651000
heap
page read and write
F5F1E7A000
stack
page read and write
B83D9FC000
stack
page read and write
13047D02000
heap
page read and write
15DFE740000
trusted library allocation
page read and write
459000
unkown
page read and write
13047B30000
heap
page read and write
2C1FA43E000
heap
page read and write
1EE25964000
heap
page read and write
4EB4CF7000
stack
page read and write
20046123000
heap
page read and write
15DFD013000
heap
page read and write
EA13A7F000
stack
page read and write
EFD3A7E000
stack
page read and write
1E377455000
heap
page read and write
199CBCF0000
heap
page read and write
4EB497E000
stack
page read and write
20046142000
heap
page read and write
199CCB30000
trusted library allocation
page read and write
20046111000
heap
page read and write
1D0F4466000
heap
page read and write
15DFE8A0000
trusted library allocation
page read and write
3650000
trusted library allocation
page read and write
15DFE761000
trusted library allocation
page read and write
2AFD7B02000
heap
page read and write
401000
unkown
page execute read
1EE259A4000
heap
page read and write
15DFD08D000
heap
page read and write
4C0000
trusted library allocation
page read and write
1FE75E10000
heap
page read and write
20046125000
heap
page read and write
1FE76041000
heap
page read and write
1FE76031000
heap
page read and write
1E37745C000
heap
page read and write
1FE76062000
heap
page read and write
1EE25088000
heap
page read and write
15DFD0A6000
heap
page read and write
2AE3000
trusted library allocation
page read and write
2AB9000
trusted library allocation
page read and write
1FE76026000
heap
page read and write
C79C5FF000
stack
page read and write
2062BFB0000
remote allocation
page read and write
1EE2503C000
heap
page read and write
15DFEBB0000
trusted library allocation
page read and write
15DFCFA0000
heap
page read and write
1E3771B0000
heap
page read and write
2AFD7A68000
heap
page read and write
15D67B70000
trusted library allocation
page read and write
1EE250B1000
heap
page read and write
199CCBB0000
trusted library allocation
page read and write
1EE25D90000
remote allocation
page read and write
1CFC967D000
heap
page read and write
1A0FBF7000
stack
page read and write
6C5000
heap
page read and write
1EE25964000
heap
page read and write
2AFD7980000
heap
page read and write
1FE75F10000
trusted library allocation
page read and write
1FE7607E000
heap
page read and write
1D0F41A0000
heap
page read and write
2AFD7A13000
heap
page read and write
15D67C64000
heap
page read and write
1EE25976000
heap
page read and write
1D0F4310000
trusted library allocation
page read and write
EFD3D7E000
stack
page read and write
15DFE8FE000
heap
page read and write
2062C002000
trusted library allocation
page read and write
C79C87E000
unkown
page read and write
15DFEA10000
trusted library allocation
page read and write
2C1FA400000
heap
page read and write
15DFD09F000
heap
page read and write
C79BF7E000
stack
page read and write
24A2C7C000
stack
page read and write
1EE25963000
heap
page read and write
1EE25968000
heap
page read and write
46B000
unkown
page readonly
1EE2596D000
heap
page read and write
4EB4BFB000
stack
page read and write
1EE25E02000
heap
page read and write
13047C3D000
heap
page read and write
15DFEA80000
trusted library allocation
page read and write
1EE25966000
heap
page read and write
1D0F442A000
heap
page read and write
370D000
stack
page read and write
13047C5A000
heap
page read and write
15DFDB13000
heap
page read and write
1E377429000
heap
page read and write
2C1FA413000
heap
page read and write
1A0F5AF000
stack
page read and write
1FE76068000
heap
page read and write
15DFD058000
heap
page read and write
199CCB60000
trusted library allocation
page read and write
15DFEB90000
trusted library allocation
page read and write
13047BA0000
heap
page read and write
1FE76064000
heap
page read and write
1E37743C000
heap
page read and write
15DFDB18000
heap
page read and write
1D0F4459000
heap
page read and write
15DFD029000
heap
page read and write
522437F000
stack
page read and write
1A0FDFD000
stack
page read and write
1FE76067000
heap
page read and write
4641DFC000
stack
page read and write
4641CFF000
stack
page read and write
15DFD06C000
heap
page read and write
18C9E508000
heap
page read and write
1EE25975000
heap
page read and write
B83D27C000
stack
page read and write
15DFE904000
heap
page read and write
9BE000
stack
page read and write
15D67C28000
heap
page read and write
1EE2598C000
heap
page read and write
18C9E463000
heap
page read and write
1EE25013000
heap
page read and write
15DFEA60000
trusted library allocation
page read and write
4641BFF000
stack
page read and write
4040FF000
stack
page read and write
1EE25922000
heap
page read and write
30000
heap
page read and write
15DFEA50000
trusted library allocation
page read and write
45B000
unkown
page readonly
18C9EE02000
trusted library allocation
page read and write
15DFE8FF000
heap
page read and write
1EE25102000
heap
page read and write
1FE7603D000
heap
page read and write
522447A000
stack
page read and write
2062B680000
heap
page read and write
199CBC3F000
heap
page read and write
1EE25973000
heap
page read and write
15DFDB04000
heap
page read and write
4036AB000
stack
page read and write
45B000
unkown
page readonly
2AFD7A00000
heap
page read and write
1CFC9700000
heap
page read and write
15D67C13000
heap
page read and write
1FE75DA0000
heap
page read and write
1D0F4449000
heap
page read and write
1FE76045000
heap
page read and write
15DFE811000
heap
page read and write
15DFE748000
trusted library allocation
page read and write
13047C3B000
heap
page read and write
15D67A70000
heap
page read and write
2AFD7A6E000
heap
page read and write
4EB4DFF000
stack
page read and write
2062B802000
heap
page read and write
5224CFF000
stack
page read and write
1EE2598D000
heap
page read and write
1EE259C3000
heap
page read and write
6BD000
heap
page read and write
1CFC9613000
heap
page read and write
1E377452000
heap
page read and write
20046147000
heap
page read and write
15DFD093000
heap
page read and write
1EE25062000
heap
page read and write
1FE7603E000
heap
page read and write
15DFE764000
trusted library allocation
page read and write
2AFD7AE1000
heap
page read and write
1FE76013000
heap
page read and write
1EE250E9000
heap
page read and write
2C1FA429000
heap
page read and write
15DFE74E000
trusted library allocation
page read and write
F5F1F7F000
stack
page read and write
1CFC9430000
heap
page read and write
6D9000
heap
page read and write
C79C2FC000
stack
page read and write
1CFC9649000
heap
page read and write
2AFD7AC8000
heap
page read and write
2062B902000
heap
page read and write
1E377413000
heap
page read and write
2AFD7A43000
heap
page read and write
1EE2598C000
heap
page read and write
1EE2598D000
heap
page read and write
15DFDA00000
heap
page read and write
15D80000000
trusted library allocation
page read and write
1EE259A2000
heap
page read and write
15D68402000
trusted library allocation
page read and write
1FE76060000
heap
page read and write
15DFD125000
heap
page read and write
1EE2599A000
heap
page read and write
1EE2598D000
heap
page read and write
2AFD7A66000
heap
page read and write
1D0F4402000
heap
page read and write
4641EFD000
stack
page read and write
15DFD03D000
heap
page read and write
1EE2599E000
heap
page read and write
1EE25967000
heap
page read and write
540000
heap
page read and write
199CC8F0000
trusted library allocation
page read and write
1EE25061000
heap
page read and write
732A1000
unkown
page execute read
C79BFFE000
stack
page read and write
1D0F43E0000
remote allocation
page read and write
15DFD08F000
heap
page read and write
2C1FA290000
heap
page read and write
1EE25E02000
heap
page read and write
199CBD99000
heap
page read and write
1EE25029000
heap
page read and write
2AFD79B0000
trusted library allocation
page read and write
199CBD10000
heap
page read and write
1E377461000
heap
page read and write
13048602000
trusted library allocation
page read and write
EFD38FE000
stack
page read and write
1EE250C9000
heap
page read and write
1EE25964000
heap
page read and write
1EE25984000
heap
page read and write
403BFF000
stack
page read and write
2062B800000
heap
page read and write
1E37748A000
heap
page read and write
1EE250EA000
heap
page read and write
2062BFB0000
remote allocation
page read and write
1EE25E20000
heap
page read and write
20046100000
heap
page read and write
15DFE890000
trusted library allocation
page read and write
732A6000
unkown
page readonly
1EE25972000
heap
page read and write
15DFD000000
heap
page read and write
18C9E42A000
heap
page read and write
1A0FAFB000
stack
page read and write
1FE7605C000
heap
page read and write
199CBD90000
heap
page read and write
1EE25993000
heap
page read and write
15DFE888000
heap
page read and write
1EE25E02000
heap
page read and write
24A2D7E000
stack
page read and write
1A0F97B000
stack
page read and write
15DFD0FD000
heap
page read and write
2C1FA3B0000
remote allocation
page read and write
3130000
trusted library allocation
page read and write
C79BEFC000
stack
page read and write
2AFD7A29000
heap
page read and write
380A000
stack
page read and write
1E3771A0000
heap
page read and write
15D67A10000
heap
page read and write
13047D13000
heap
page read and write
15DFCF40000
heap
page read and write
15DFE8A7000
heap
page read and write
18C9E340000
heap
page read and write
1EE2598D000
heap
page read and write
4EB4A7B000
stack
page read and write
1CFC964D000
heap
page read and write
2A7C000
trusted library allocation
page read and write
F5F20FE000
stack
page read and write
2AFD7ABF000
heap
page read and write
A40000
heap
page read and write
B83DAFF000
stack
page read and write
1EE2598C000
heap
page read and write
18C9E467000
heap
page read and write
1EE250F8000
heap
page read and write
1CFC9713000
heap
page read and write
15DFD0B2000
heap
page read and write
1EE25972000
heap
page read and write
1EE25967000
heap
page read and write
15DFE5A0000
trusted library allocation
page read and write
1FE76000000
heap
page read and write
F5F217F000
stack
page read and write
680000
heap
page read and write
27CFEFF000
stack
page read and write
1EE25972000
heap
page read and write
1EE25971000
heap
page read and write
1EE25D90000
remote allocation
page read and write
1EE2599B000
heap
page read and write
435000
unkown
page read and write
2C1FA390000
trusted library allocation
page read and write
4EB4AFF000
stack
page read and write
1EE24FF0000
trusted library allocation
page read and write
732A4000
unkown
page readonly
15D67D13000
heap
page read and write
1EE25116000
heap
page read and write
1EE259AC000
heap
page read and write
811650B000
stack
page read and write
1A0F9FF000
stack
page read and write
1EE250E7000
heap
page read and write
1E377402000
heap
page read and write
20046146000
heap
page read and write
EA1314B000
stack
page read and write
B83D3FF000
stack
page read and write
40A000
unkown
page read and write
1A0FCFF000
stack
page read and write
52248FA000
stack
page read and write
8116979000
stack
page read and write
2062B858000
heap
page read and write
13047C00000
heap
page read and write
1CFC963C000
heap
page read and write
15D67D00000
heap
page read and write
1FE7605B000
heap
page read and write
1EE2598C000
heap
page read and write
403FFD000
stack
page read and write
199CBD95000
heap
page read and write
2C1FA425000
heap
page read and write
1E37745F000
heap
page read and write
199CBAA0000
heap
page read and write
C2D24FE000
stack
page read and write
15DFDA15000
heap
page read and write
1EE250E2000
heap
page read and write
15DFE630000
trusted library allocation
page read and write
13047C75000
heap
page read and write
1EE25964000
heap
page read and write
1EE2596D000
heap
page read and write
2AFD7B13000
heap
page read and write
1FE7607A000
heap
page read and write
2062B670000
heap
page read and write
15DFDB02000
heap
page read and write
1E377463000
heap
page read and write
20046144000
heap
page read and write
1EE2596A000
heap
page read and write
1EE25967000
heap
page read and write
1EE25950000
heap
page read and write
1CFC9708000
heap
page read and write
1FE76084000
heap
page read and write
EA1377A000
stack
page read and write
1EE25989000
heap
page read and write
1D0F443F000
heap
page read and write
1EE25989000
heap
page read and write
1EE2598D000
heap
page read and write
EA1387E000
stack
page read and write
15DFE848000
heap
page read and write
403CFD000
stack
page read and write
15DFE770000
trusted library allocation
page read and write
1E377502000
heap
page read and write
1D0F4518000
heap
page read and write
2C1FA470000
heap
page read and write
2C1FA502000
heap
page read and write
24A327C000
stack
page read and write
15DFE0F0000
trusted library allocation
page read and write
15DFE740000
trusted library allocation
page read and write
40A000
unkown
page write copy
2C1FA458000
heap
page read and write
1EE2599C000
heap
page read and write
15D67C68000
heap
page read and write
1FE76044000
heap
page read and write
5224077000
stack
page read and write
1E377C02000
trusted library allocation
page read and write
1EE25975000
heap
page read and write
1EE2505E000
heap
page read and write
1EE2504E000
heap
page read and write
199CBC38000
heap
page read and write
2AFD8402000
heap
page read and write
1EE259CE000
heap
page read and write
15DFE593000
trusted library allocation
page read and write
6CE000
heap
page read and write
1EE25968000
heap
page read and write
1EE2596D000
heap
page read and write
15DFE8F6000
heap
page read and write
1EE25989000
heap
page read and write
1FE7604D000
heap
page read and write
F5F1FFC000
stack
page read and write
1D0F448A000
heap
page read and write
4EB487B000
stack
page read and write
1FE7607F000
heap
page read and write
C79C3F7000
stack
page read and write
522427A000
stack
page read and write
1FE76057000
heap
page read and write
20046126000
heap
page read and write
1EE25967000
heap
page read and write
545000
heap
page read and write
C79C6F9000
stack
page read and write
A46000
heap
page read and write
15DFE82B000
heap
page read and write
2C1FA45D000
heap
page read and write
18C9E47E000
heap
page read and write
620000
heap
page read and write
1D0F43E0000
remote allocation
page read and write
1EE259C0000
heap
page read and write
1EE25965000
heap
page read and write
15DFD06F000
heap
page read and write
2AFD7A87000
heap
page read and write
15DFE800000
heap
page read and write
C2D25FC000
stack
page read and write
1EE25068000
heap
page read and write
408000
unkown
page readonly
13047C29000
heap
page read and write
2C1FA3B0000
remote allocation
page read and write
403AFB000
stack
page read and write
1EE25108000
heap
page read and write
20046420000
heap
page read and write
688000
heap
page read and write
1EE2599A000
heap
page read and write
1E37745D000
heap
page read and write
3640000
trusted library allocation
page read and write
EFD3B7E000
stack
page read and write
1EE25E02000
heap
page read and write
1D0F4502000
heap
page read and write
2062B813000
heap
page read and write
1FE76065000
heap
page read and write
1EE2599B000
heap
page read and write
1EE25918000
heap
page read and write
1E37745B000
heap
page read and write
1D0F4449000
heap
page read and write
1EE25975000
heap
page read and write
15D67C56000
heap
page read and write
2062B6E0000
heap
page read and write
20046144000
heap
page read and write
18C9E413000
heap
page read and write
1EE24EF0000
heap
page read and write
4EB48FF000
stack
page read and write
1D0F4448000
heap
page read and write
5223E7B000
stack
page read and write
4043FE000
stack
page read and write
15DFDA02000
heap
page read and write
2C1FA3B0000
remote allocation
page read and write
15DFD107000
heap
page read and write
1EE25964000
heap
page read and write
20046144000
heap
page read and write
15DFE81E000
heap
page read and write
1EE25964000
heap
page read and write
13047C02000
heap
page read and write
1EE250A3000
heap
page read and write
1EE25978000
heap
page read and write
1CFC95A0000
trusted library allocation
page read and write
1D0F4458000
heap
page read and write
400000
unkown
page readonly
1E377464000
heap
page read and write
15D67C3C000
heap
page read and write
15DFEA70000
trusted library allocation
page read and write
6FF000
heap
page read and write
20046130000
heap
page read and write
1FE76078000
heap
page read and write
1CFC9702000
heap
page read and write
1EE2599C000
heap
page read and write
1D0F43A0000
trusted library allocation
page read and write
2AFD8500000
heap
page read and write
1EE259AE000
heap
page read and write
1EE25E02000
heap
page read and write
1E377400000
heap
page read and write
24A2F7B000
stack
page read and write
18C9E513000
heap
page read and write
18C9E400000
heap
page read and write
18C9E455000
heap
page read and write
1FE76047000
heap
page read and write
1EE24E90000
heap
page read and write
20046116000
heap
page read and write
1CFC9671000
heap
page read and write
4041FF000
stack
page read and write
199CC8E0000
trusted library allocation
page read and write
1EE250AA000
heap
page read and write
1FE7607B000
heap
page read and write
81169F9000
stack
page read and write
1EE25000000
heap
page read and write
1EE25E02000
heap
page read and write
200460D0000
heap
page read and write
18C9E500000
heap
page read and write
EFD359B000
stack
page read and write
1EE25900000
heap
page read and write
1D0F4400000
heap
page read and write
15DFD0A9000
heap
page read and write
1CFC9687000
heap
page read and write
1D0F4459000
heap
page read and write
4EB4FFE000
stack
page read and write
650000
heap
page read and write
15D67C80000
heap
page read and write
400000
unkown
page readonly
15DFE780000
trusted library allocation
page read and write
262F000
stack
page read and write
1E377310000
trusted library allocation
page read and write
1CFC964B000
heap
page read and write
19A000
stack
page read and write
1FE75DB0000
heap
page read and write
1D0F4330000
trusted library allocation
page read and write
46420FC000
stack
page read and write
1EE25962000
heap
page read and write
15DFCFD0000
trusted library allocation
page read and write
1EE2599C000
heap
page read and write
13047BD0000
trusted library allocation
page read and write
EFD387E000
stack
page read and write
1EE25989000
heap
page read and write
1E37747D000
heap
page read and write
2AFD7AD0000
heap
page read and write
1EE2599B000
heap
page read and write
1FE7605E000
heap
page read and write
1FE7603A000
heap
page read and write
1EE2599A000
heap
page read and write
F5F2078000
stack
page read and write
15DFE8A5000
heap
page read and write
2062B83D000
heap
page read and write
1EE25E02000
heap
page read and write
15DFE5B0000
trusted library allocation
page read and write
15DFDB00000
heap
page read and write
2AFD853A000
heap
page read and write
15DFE8FC000
heap
page read and write
1EE24E80000
heap
page read and write
15DFEAA0000
remote allocation
page read and write
1CFC9440000
heap
page read and write
B83D67D000
stack
page read and write
1D0F4210000
heap
page read and write
1EE25113000
heap
page read and write
1FE76061000
heap
page read and write
1FE7602A000
heap
page read and write
1FE76102000
heap
page read and write
200460B0000
heap
page read and write
199CBD70000
trusted library allocation
page read and write
15DFDB18000
heap
page read and write
1EE250C2000
heap
page read and write
427000
unkown
page read and write
13047C13000
heap
page read and write
A2E000
stack
page read and write
1D0F4513000
heap
page read and write
1FE76802000
trusted library allocation
page read and write
15DFE83B000
heap
page read and write
15DFDB59000
heap
page read and write
732A0000
unkown
page readonly
199CBC39000
heap
page read and write
EA1347F000
stack
page read and write
B83D7FF000
stack
page read and write
2062B829000
heap
page read and write
6D4000
heap
page read and write
4042FE000
stack
page read and write
1FE7605A000
heap
page read and write
15DFEAA0000
remote allocation
page read and write
2AFD7910000
heap
page read and write
1EE25983000
heap
page read and write
1D0F41B0000
heap
page read and write
1EE25989000
heap
page read and write
20046144000
heap
page read and write
15D67A00000
heap
page read and write
1E377508000
heap
page read and write
18C9E3D0000
trusted library allocation
page read and write
15DFEAA0000
remote allocation
page read and write
1EE250B4000
heap
page read and write
199CBAB0000
trusted library allocation
page read and write
272F000
stack
page read and write
1A0F87D000
stack
page read and write
1EE25975000
heap
page read and write
B83D4FF000
stack
page read and write
1EE2598B000
heap
page read and write
15DFE8F0000
heap
page read and write
1EE2599E000
heap
page read and write
1EE25802000
heap
page read and write
6E9000
heap
page read and write
15DFE760000
trusted library allocation
page read and write
15DFD08A000
heap
page read and write
1CFC9600000
heap
page read and write
20046127000
heap
page read and write
1EE2598C000
heap
page read and write
C2D29FD000
stack
page read and write
4EB4EFC000
stack
page read and write
15DFD0B2000
heap
page read and write
46B000
unkown
page readonly
1EE25968000
heap
page read and write
1A0F52B000
stack
page read and write
1EE25E00000
heap
page read and write
13047C67000
heap
page read and write
15DFE770000
trusted library allocation
page read and write
1CFC9E02000
trusted library allocation
page read and write
6D7000
heap
page read and write
20046130000
heap
page read and write
15DFCF30000
heap
page read and write
2062B7E0000
trusted library allocation
page read and write
199CBC3F000
heap
page read and write
27CFDFB000
stack
page read and write
20046050000
heap
page read and write
2AFD8512000
heap
page read and write
EFD3C7F000
stack
page read and write
1FE7605F000
heap
page read and write
1EE250CD000
heap
page read and write
199CBBF8000
heap
page read and write
99000
stack
page read and write
1EE25E02000
heap
page read and write
18C9E460000
heap
page read and write
1EE25E03000
heap
page read and write
522457B000
stack
page read and write
1EE2596A000
heap
page read and write
1FE76075000
heap
page read and write
2730000
heap
page read and write
1EE25967000
heap
page read and write
15DFD102000
heap
page read and write
15DFEA30000
trusted library allocation
page read and write
C2D267E000
stack
page read and write
15DFE590000
trusted library allocation
page read and write
27CFFFE000
stack
page read and write
199CCB40000
heap
page readonly
A30000
heap
page read and write
B83D07B000
stack
page read and write
1E377513000
heap
page read and write
2AFD7920000
heap
page read and write
1EE25969000
heap
page read and write
24A2E7B000
stack
page read and write
2C1FA473000
heap
page read and write
4641AFF000
stack
page read and write
13047B40000
heap
page read and write
B83D6FB000
stack
page read and write
15DFE620000
trusted library allocation
page read and write
8116A7F000
stack
page read and write
EA1367A000
stack
page read and write
15DFEA10000
trusted library allocation
page read and write
18C9E489000
heap
page read and write
18C9E43C000
heap
page read and write
1CFC9648000
heap
page read and write
199CBC40000
heap
page read and write
1D0F5E02000
trusted library allocation
page read and write
20046130000
heap
page read and write
401000
unkown
page execute read
2C1FA230000
heap
page read and write
15DFD066000
heap
page read and write
There are 674 hidden memdumps, click here to show them.