Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Adventure_19.bmp
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\HPSUPD-Win32Exe.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Sites.UDP
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\emoji-body-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\iso_639-3.xml
|
XML 1.0 document, UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lgpllibs.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\microphone-disabled-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsy52E1.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\printer-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\svejtsers.for
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\vm3ddevapi64-debug.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
There are 2 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.sil.org/iso639-3/
|
unknown
|
||
http://www.vmware.com/0/
|
unknown
|
||
http://www.vmware.com/0
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://www.symauth.com/cps0(
|
unknown
|
||
http://www.symauth.com/rpa00
|
unknown
|
||
https://mozilla.org0
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\centrumpartiers\sindstilstand
|
Tiebold
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\SENGEKANTERNE\stubben
|
Roundabout87
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\dado
|
Foresprgselens98
|
||
HKEY_CURRENT_USER\Software\metaled\Filformatets
|
Expand String Value
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2A30000
|
direct allocation
|
page execute and read and write
|
||
1A4CA100000
|
heap
|
page read and write
|
||
84E367F000
|
stack
|
page read and write
|
||
1A4CA189000
|
heap
|
page read and write
|
||
1A4CA197000
|
heap
|
page read and write
|
||
264A1480000
|
heap
|
page read and write
|
||
1A4CA176000
|
heap
|
page read and write
|
||
1A4C9868000
|
heap
|
page read and write
|
||
1A4CA1BA000
|
heap
|
page read and write
|
||
207810F6000
|
trusted library allocation
|
page read and write
|
||
1A4CA17E000
|
heap
|
page read and write
|
||
1E5C51C0000
|
trusted library allocation
|
page read and write
|
||
1E5BF914000
|
heap
|
page read and write
|
||
7ADA87C000
|
stack
|
page read and write
|
||
207813A0000
|
trusted library allocation
|
page read and write
|
||
1A4CA197000
|
heap
|
page read and write
|
||
1A4CA197000
|
heap
|
page read and write
|
||
1611EF02000
|
heap
|
page read and write
|
||
20780470000
|
trusted library allocation
|
page read and write
|
||
1E5C0D60000
|
trusted library allocation
|
page read and write
|
||
469000
|
unkown
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
28DCD355000
|
heap
|
page read and write
|
||
1A4C98BF000
|
heap
|
page read and write
|
||
A697B7E000
|
stack
|
page read and write
|
||
2A330E02000
|
heap
|
page read and write
|
||
86E28FD000
|
stack
|
page read and write
|
||
1594A202000
|
trusted library allocation
|
page read and write
|
||
1A4CA17F000
|
heap
|
page read and write
|
||
207804FF000
|
heap
|
page read and write
|
||
1E5BF750000
|
heap
|
page read and write
|
||
20781350000
|
trusted library allocation
|
page read and write
|
||
46B000
|
unkown
|
page readonly
|
||
D84767F000
|
stack
|
page read and write
|
||
7343A7F000
|
stack
|
page read and write
|
||
1A4CA19E000
|
heap
|
page read and write
|
||
1A4C985D000
|
heap
|
page read and write
|
||
25886A29000
|
heap
|
page read and write
|
||
15948663000
|
heap
|
page read and write
|
||
2A330F13000
|
heap
|
page read and write
|
||
218A6C7B000
|
heap
|
page read and write
|
||
1A4CA602000
|
heap
|
page read and write
|
||
264A144C000
|
heap
|
page read and write
|
||
1E5C4DD0000
|
trusted library allocation
|
page read and write
|
||
1A4CA17C000
|
heap
|
page read and write
|
||
2130E013000
|
heap
|
page read and write
|
||
1A4CA1C4000
|
heap
|
page read and write
|
||
7343F7E000
|
stack
|
page read and write
|
||
1A815B80000
|
heap
|
page read and write
|
||
9487C7B000
|
stack
|
page read and write
|
||
A1C1F2B000
|
stack
|
page read and write
|
||
1611EE79000
|
heap
|
page read and write
|
||
2A331602000
|
trusted library allocation
|
page read and write
|
||
73131000
|
unkown
|
page execute read
|
||
207804FD000
|
heap
|
page read and write
|
||
218A6C5E000
|
heap
|
page read and write
|
||
212E000
|
stack
|
page read and write
|
||
25887202000
|
trusted library allocation
|
page read and write
|
||
25886A13000
|
heap
|
page read and write
|
||
264A1443000
|
heap
|
page read and write
|
||
1E5C0302000
|
heap
|
page read and write
|
||
28DCD374000
|
heap
|
page read and write
|
||
15948658000
|
heap
|
page read and write
|
||
1611EE2C000
|
heap
|
page read and write
|
||
15948718000
|
heap
|
page read and write
|
||
1A4C98E4000
|
heap
|
page read and write
|
||
DD25D9F000
|
stack
|
page read and write
|
||
1E5BF897000
|
heap
|
page read and write
|
||
264A1431000
|
heap
|
page read and write
|
||
1611ECD0000
|
heap
|
page read and write
|
||
2501B102000
|
heap
|
page read and write
|
||
1A01FFD0000
|
remote allocation
|
page read and write
|
||
20780513000
|
heap
|
page read and write
|
||
1E5C0318000
|
heap
|
page read and write
|
||
2A330E69000
|
heap
|
page read and write
|
||
6A997F000
|
stack
|
page read and write
|
||
7ADA6FC000
|
stack
|
page read and write
|
||
1A4C96D0000
|
heap
|
page read and write
|
||
28DCD330000
|
heap
|
page read and write
|
||
1A4C9813000
|
heap
|
page read and write
|
||
1A4CA618000
|
heap
|
page read and write
|
||
2130E066000
|
heap
|
page read and write
|
||
2A330E56000
|
heap
|
page read and write
|
||
207804FD000
|
heap
|
page read and write
|
||
1A02003E000
|
heap
|
page read and write
|
||
2A330C40000
|
heap
|
page read and write
|
||
1A4CA602000
|
heap
|
page read and write
|
||
9B8289B000
|
stack
|
page read and write
|
||
2A330BE0000
|
heap
|
page read and write
|
||
6A9677000
|
stack
|
page read and write
|
||
1A020002000
|
heap
|
page read and write
|
||
1A4C97D0000
|
trusted library allocation
|
page read and write
|
||
1A4CA1BA000
|
heap
|
page read and write
|
||
1611EE8F000
|
heap
|
page read and write
|
||
264A146B000
|
heap
|
page read and write
|
||
1A815B20000
|
heap
|
page read and write
|
||
1A4C98A9000
|
heap
|
page read and write
|
||
32CA57F000
|
stack
|
page read and write
|
||
28DCD373000
|
heap
|
page read and write
|
||
28DCD430000
|
heap
|
page read and write
|
||
1A4C9913000
|
heap
|
page read and write
|
||
20780445000
|
heap
|
page read and write
|
||
9B82EFA000
|
stack
|
page read and write
|
||
218A6C00000
|
heap
|
page read and write
|
||
1A4CA1DD000
|
heap
|
page read and write
|
||
2F3D000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2130E113000
|
heap
|
page read and write
|
||
1A4C986C000
|
heap
|
page read and write
|
||
1E5C4DE0000
|
trusted library allocation
|
page read and write
|
||
1E5C5120000
|
trusted library allocation
|
page read and write
|
||
A1C247E000
|
stack
|
page read and write
|
||
32CA8FB000
|
stack
|
page read and write
|
||
258868F0000
|
heap
|
page read and write
|
||
2A330E79000
|
heap
|
page read and write
|
||
1E5C4E75000
|
heap
|
page read and write
|
||
73136000
|
unkown
|
page readonly
|
||
1A4CA61A000
|
heap
|
page read and write
|
||
1A4CA123000
|
heap
|
page read and write
|
||
2501B054000
|
heap
|
page read and write
|
||
470E379000
|
stack
|
page read and write
|
||
1E5BF6E0000
|
heap
|
page read and write
|
||
7343C7F000
|
stack
|
page read and write
|
||
1A4CA1B9000
|
heap
|
page read and write
|
||
207804B8000
|
heap
|
page read and write
|
||
1611ED30000
|
heap
|
page read and write
|
||
20781320000
|
trusted library allocation
|
page read and write
|
||
1A4CA17E000
|
heap
|
page read and write
|
||
28DCD364000
|
heap
|
page read and write
|
||
264A1413000
|
heap
|
page read and write
|
||
1A4C9908000
|
heap
|
page read and write
|
||
1A4C98EE000
|
heap
|
page read and write
|
||
2130E03E000
|
heap
|
page read and write
|
||
264A142F000
|
heap
|
page read and write
|
||
1E5C4E0F000
|
heap
|
page read and write
|
||
9B837FE000
|
stack
|
page read and write
|
||
1A4CA182000
|
heap
|
page read and write
|
||
86E25FF000
|
stack
|
page read and write
|
||
1A4CA1A8000
|
heap
|
page read and write
|
||
218A6D13000
|
heap
|
page read and write
|
||
1E5C4F05000
|
heap
|
page read and write
|
||
1E5C5220000
|
trusted library allocation
|
page read and write
|
||
1611EF08000
|
heap
|
page read and write
|
||
1A4C98F9000
|
heap
|
page read and write
|
||
1A4C9FE0000
|
remote allocation
|
page read and write
|
||
264A1486000
|
heap
|
page read and write
|
||
94881FF000
|
stack
|
page read and write
|
||
2A330F02000
|
heap
|
page read and write
|
||
15948648000
|
heap
|
page read and write
|
||
264A143E000
|
heap
|
page read and write
|
||
218A6AD0000
|
heap
|
page read and write
|
||
1611EE57000
|
heap
|
page read and write
|
||
1E5BF857000
|
heap
|
page read and write
|
||
1A4C982C000
|
heap
|
page read and write
|
||
218A6AE0000
|
heap
|
page read and write
|
||
15948648000
|
heap
|
page read and write
|
||
1E5C5130000
|
trusted library allocation
|
page read and write
|
||
1A815BE0000
|
remote allocation
|
page read and write
|
||
25886B02000
|
heap
|
page read and write
|
||
2130E102000
|
heap
|
page read and write
|
||
470DE9B000
|
stack
|
page read and write
|
||
218A6B40000
|
heap
|
page read and write
|
||
1E5BF892000
|
heap
|
page read and write
|
||
2501AFA0000
|
heap
|
page read and write
|
||
1E5BF7F3000
|
trusted library allocation
|
page read and write
|
||
1A4C9888000
|
heap
|
page read and write
|
||
9487FFE000
|
stack
|
page read and write
|
||
1A01FEB0000
|
heap
|
page read and write
|
||
84E3AFE000
|
stack
|
page read and write
|
||
207802A0000
|
trusted library allocation
|
page read and write
|
||
25886880000
|
heap
|
page read and write
|
||
20780440000
|
heap
|
page read and write
|
||
1A4CA14F000
|
heap
|
page read and write
|
||
264A1441000
|
heap
|
page read and write
|
||
1A4CA197000
|
heap
|
page read and write
|
||
1A4CA19E000
|
heap
|
page read and write
|
||
264A1476000
|
heap
|
page read and write
|
||
1E5BF878000
|
heap
|
page read and write
|
||
1A4CA176000
|
heap
|
page read and write
|
||
264A1447000
|
heap
|
page read and write
|
||
264A1479000
|
heap
|
page read and write
|
||
2501B05F000
|
heap
|
page read and write
|
||
1A4C9670000
|
heap
|
page read and write
|
||
25886A76000
|
heap
|
page read and write
|
||
1E5BF800000
|
heap
|
page read and write
|
||
1A4CA1B3000
|
heap
|
page read and write
|
||
1A4CA162000
|
heap
|
page read and write
|
||
1A4C985C000
|
heap
|
page read and write
|
||
99000
|
stack
|
page read and write
|
||
1A4CA17C000
|
heap
|
page read and write
|
||
A697DFE000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2184000
|
heap
|
page read and write
|
||
22CFB7F000
|
stack
|
page read and write
|
||
159485D0000
|
remote allocation
|
page read and write
|
||
1E5C5120000
|
trusted library allocation
|
page read and write
|
||
1A4CA1A8000
|
heap
|
page read and write
|
||
6A947E000
|
stack
|
page read and write
|
||
1E5C5340000
|
trusted library allocation
|
page read and write
|
||
1611EE3C000
|
heap
|
page read and write
|
||
A697F7D000
|
stack
|
page read and write
|
||
15948550000
|
heap
|
page read and write
|
||
1A4CA1A8000
|
heap
|
page read and write
|
||
1A4CA602000
|
heap
|
page read and write
|
||
25886A6B000
|
heap
|
page read and write
|
||
15948700000
|
heap
|
page read and write
|
||
D84727B000
|
stack
|
page read and write
|
||
1A4CA1B9000
|
heap
|
page read and write
|
||
86E2CFF000
|
stack
|
page read and write
|
||
86E2BFE000
|
stack
|
page read and write
|
||
1A4CA17B000
|
heap
|
page read and write
|
||
1A4CA176000
|
heap
|
page read and write
|
||
28DCD35E000
|
heap
|
page read and write
|
||
1A4C985F000
|
heap
|
page read and write
|
||
1A4CA176000
|
heap
|
page read and write
|
||
1A815C57000
|
heap
|
page read and write
|
||
1611EE13000
|
heap
|
page read and write
|
||
1E5BF8A4000
|
heap
|
page read and write
|
||
1A815C3D000
|
heap
|
page read and write
|
||
9487CFE000
|
stack
|
page read and write
|
||
1A4CA182000
|
heap
|
page read and write
|
||
1A815BB0000
|
trusted library allocation
|
page read and write
|
||
1E5BF902000
|
heap
|
page read and write
|
||
2130DF80000
|
heap
|
page read and write
|
||
2130EA02000
|
heap
|
page read and write
|
||
1A4CA1BB000
|
heap
|
page read and write
|
||
28DCD35E000
|
heap
|
page read and write
|
||
28DCD310000
|
heap
|
page read and write
|
||
86E29FF000
|
stack
|
page read and write
|
||
1A815C02000
|
heap
|
page read and write
|
||
46B000
|
unkown
|
page readonly
|
||
22CF97F000
|
stack
|
page read and write
|
||
264A1465000
|
heap
|
page read and write
|
||
84E36FF000
|
stack
|
page read and write
|
||
28DCD5C5000
|
heap
|
page read and write
|
||
DD25D1A000
|
stack
|
page read and write
|
||
1E5BF926000
|
heap
|
page read and write
|
||
218A6C5D000
|
heap
|
page read and write
|
||
15948580000
|
trusted library allocation
|
page read and write
|
||
264A146F000
|
heap
|
page read and write
|
||
207810F0000
|
trusted library allocation
|
page read and write
|
||
1A815BE0000
|
remote allocation
|
page read and write
|
||
218A6C5C000
|
heap
|
page read and write
|
||
1E5C4EAB000
|
heap
|
page read and write
|
||
DD2617E000
|
stack
|
page read and write
|
||
1A4CA002000
|
heap
|
page read and write
|
||
1A020058000
|
heap
|
page read and write
|
||
1A4CA1A9000
|
heap
|
page read and write
|
||
1E5BF829000
|
heap
|
page read and write
|
||
2A330BD0000
|
heap
|
page read and write
|
||
264A1BC0000
|
trusted library allocation
|
page read and write
|
||
1A020073000
|
heap
|
page read and write
|
||
1A4C9866000
|
heap
|
page read and write
|
||
1E5C4E56000
|
heap
|
page read and write
|
||
264A146D000
|
heap
|
page read and write
|
||
22CFA7F000
|
stack
|
page read and write
|
||
1A4CA197000
|
heap
|
page read and write
|
||
2130E0C4000
|
heap
|
page read and write
|
||
1A4CA11B000
|
heap
|
page read and write
|
||
1A4C983C000
|
heap
|
page read and write
|
||
1A4CA621000
|
heap
|
page read and write
|
||
7343D7A000
|
stack
|
page read and write
|
||
218A6D00000
|
heap
|
page read and write
|
||
1A4C9800000
|
heap
|
page read and write
|
||
84E3BFF000
|
stack
|
page read and write
|
||
A6976DB000
|
stack
|
page read and write
|
||
264A1320000
|
heap
|
page read and write
|
||
431000
|
unkown
|
page read and write
|
||
1E5C4E4D000
|
heap
|
page read and write
|
||
32CADFF000
|
unkown
|
page read and write
|
||
6A987F000
|
stack
|
page read and write
|
||
1A4CA17C000
|
heap
|
page read and write
|
||
1E5C01F0000
|
trusted library allocation
|
page read and write
|
||
1A4C9FE0000
|
remote allocation
|
page read and write
|
||
28DCD354000
|
heap
|
page read and write
|
||
207804FD000
|
heap
|
page read and write
|
||
2130E023000
|
heap
|
page read and write
|
||
94880FD000
|
stack
|
page read and write
|
||
1E5C5130000
|
trusted library allocation
|
page read and write
|
||
1611EE5F000
|
heap
|
page read and write
|
||
20781330000
|
heap
|
page readonly
|
||
1E5C0200000
|
heap
|
page read and write
|
||
1E5BF900000
|
heap
|
page read and write
|
||
A1C1FAE000
|
stack
|
page read and write
|
||
7343B7A000
|
stack
|
page read and write
|
||
1A4C9916000
|
heap
|
page read and write
|
||
207803D0000
|
heap
|
page read and write
|
||
1A4CA191000
|
heap
|
page read and write
|
||
73130000
|
unkown
|
page readonly
|
||
1A815D02000
|
heap
|
page read and write
|
||
A697E7E000
|
stack
|
page read and write
|
||
1A4CA1A8000
|
heap
|
page read and write
|
||
2130E029000
|
heap
|
page read and write
|
||
32CAC7F000
|
stack
|
page read and write
|
||
15948600000
|
heap
|
page read and write
|
||
9487A7B000
|
stack
|
page read and write
|
||
207804F6000
|
heap
|
page read and write
|
||
1A020000000
|
heap
|
page read and write
|
||
1E5C0304000
|
heap
|
page read and write
|
||
218A7602000
|
trusted library allocation
|
page read and write
|
||
509000
|
heap
|
page read and write
|
||
1A4CA61A000
|
heap
|
page read and write
|
||
2078051E000
|
heap
|
page read and write
|
||
1E5C51C0000
|
trusted library allocation
|
page read and write
|
||
1A4C9863000
|
heap
|
page read and write
|
||
218A6C13000
|
heap
|
page read and write
|
||
1A4CA1C4000
|
heap
|
page read and write
|
||
15948602000
|
heap
|
page read and write
|
||
1611EE61000
|
heap
|
page read and write
|
||
1A4CA14A000
|
heap
|
page read and write
|
||
6A957B000
|
stack
|
page read and write
|
||
1E5C51E0000
|
trusted library allocation
|
page read and write
|
||
1A4CA197000
|
heap
|
page read and write
|
||
1A02005D000
|
heap
|
page read and write
|
||
1A01FFD0000
|
remote allocation
|
page read and write
|
||
15948689000
|
heap
|
page read and write
|
||
28DCD346000
|
heap
|
page read and write
|
||
1A4CA197000
|
heap
|
page read and write
|
||
15948657000
|
heap
|
page read and write
|
||
1E5C4EA8000
|
heap
|
page read and write
|
||
25886B13000
|
heap
|
page read and write
|
||
2501B000000
|
heap
|
page read and write
|
||
1A815C37000
|
heap
|
page read and write
|
||
1E5C5124000
|
trusted library allocation
|
page read and write
|
||
25886890000
|
heap
|
page read and write
|
||
159485D0000
|
remote allocation
|
page read and write
|
||
2130E0BC000
|
heap
|
page read and write
|
||
2501B049000
|
heap
|
page read and write
|
||
9B82CF7000
|
stack
|
page read and write
|
||
84E39F7000
|
stack
|
page read and write
|
||
7343E7E000
|
stack
|
page read and write
|
||
218A6C62000
|
heap
|
page read and write
|
||
159485A0000
|
trusted library allocation
|
page read and write
|
||
264A1466000
|
heap
|
page read and write
|
||
1A4C986B000
|
heap
|
page read and write
|
||
1E5BF872000
|
heap
|
page read and write
|
||
73437DF000
|
stack
|
page read and write
|
||
218A6B70000
|
trusted library allocation
|
page read and write
|
||
2501AF40000
|
heap
|
page read and write
|
||
1A4C9829000
|
heap
|
page read and write
|
||
1A4C98C6000
|
heap
|
page read and write
|
||
DD2607E000
|
stack
|
page read and write
|
||
1A4CA1C8000
|
heap
|
page read and write
|
||
D84777E000
|
stack
|
page read and write
|
||
1A4CA177000
|
heap
|
page read and write
|
||
1E5C4DF0000
|
trusted library allocation
|
page read and write
|
||
1A4C98FC000
|
heap
|
page read and write
|
||
1A4C9FE0000
|
remote allocation
|
page read and write
|
||
1A4CA197000
|
heap
|
page read and write
|
||
2130E0E1000
|
heap
|
page read and write
|
||
1E5C5108000
|
trusted library allocation
|
page read and write
|
||
1A4CA1B9000
|
heap
|
page read and write
|
||
1611EE00000
|
heap
|
page read and write
|
||
2501B05F000
|
heap
|
page read and write
|
||
207805B0000
|
trusted library allocation
|
page read and write
|
||
1E5BF6F0000
|
heap
|
page read and write
|
||
2501BA02000
|
trusted library allocation
|
page read and write
|
||
7ADA5FC000
|
stack
|
page read and write
|
||
4F6000
|
heap
|
page read and write
|
||
1E5C5360000
|
trusted library allocation
|
page read and write
|
||
470E479000
|
stack
|
page read and write
|
||
25886A5A000
|
heap
|
page read and write
|
||
1E5C4F02000
|
heap
|
page read and write
|
||
1A4CA197000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
DD2627C000
|
stack
|
page read and write
|
||
1A4CA17D000
|
heap
|
page read and write
|
||
AD6000
|
heap
|
page read and write
|
||
7ADA97F000
|
stack
|
page read and write
|
||
2078051D000
|
heap
|
page read and write
|
||
264A1463000
|
heap
|
page read and write
|
||
734407F000
|
stack
|
page read and write
|
||
1E5C08E0000
|
trusted library allocation
|
page read and write
|
||
1A4CA600000
|
heap
|
page read and write
|
||
1A4C98E4000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
1E5C0202000
|
heap
|
page read and write
|
||
1E5C5250000
|
remote allocation
|
page read and write
|
||
A697BFC000
|
stack
|
page read and write
|
||
1E5C5100000
|
trusted library allocation
|
page read and write
|
||
22CFC7C000
|
stack
|
page read and write
|
||
1E5BF890000
|
heap
|
page read and write
|
||
28DCD346000
|
heap
|
page read and write
|
||
264A1468000
|
heap
|
page read and write
|
||
1E5C5250000
|
remote allocation
|
page read and write
|
||
9B82FFE000
|
stack
|
page read and write
|
||
1A4CA17C000
|
heap
|
page read and write
|
||
216E000
|
stack
|
page read and write
|
||
218A6D02000
|
heap
|
page read and write
|
||
1A4CA17D000
|
heap
|
page read and write
|
||
1A4CA197000
|
heap
|
page read and write
|
||
9B8291F000
|
stack
|
page read and write
|
||
2A330F00000
|
heap
|
page read and write
|
||
1E5C5134000
|
trusted library allocation
|
page read and write
|
||
1A815C13000
|
heap
|
page read and write
|
||
1A4CA176000
|
heap
|
page read and write
|
||
1A020102000
|
heap
|
page read and write
|
||
218A6C3C000
|
heap
|
page read and write
|
||
25886A3D000
|
heap
|
page read and write
|
||
264A144F000
|
heap
|
page read and write
|
||
1A4CA618000
|
heap
|
page read and write
|
||
2130E084000
|
heap
|
page read and write
|
||
1A020049000
|
heap
|
page read and write
|
||
1A4CA197000
|
heap
|
page read and write
|
||
1A020029000
|
heap
|
page read and write
|
||
1E5BF907000
|
heap
|
page read and write
|
||
1A4C98E3000
|
heap
|
page read and write
|
||
1A4CA17E000
|
heap
|
page read and write
|
||
1E5BF780000
|
trusted library allocation
|
page read and write
|
||
1A4CA16E000
|
heap
|
page read and write
|
||
2130DFF0000
|
heap
|
page read and write
|
||
1A4C9860000
|
heap
|
page read and write
|
||
2A330E00000
|
heap
|
page read and write
|
||
2130E087000
|
heap
|
page read and write
|
||
1A4CA190000
|
heap
|
page read and write
|
||
159484E0000
|
heap
|
page read and write
|
||
2130E06E000
|
heap
|
page read and write
|
||
1A020013000
|
heap
|
page read and write
|
||
1A4CA178000
|
heap
|
page read and write
|
||
32CAB77000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1E5C5230000
|
trusted library allocation
|
page read and write
|
||
1A815B10000
|
heap
|
page read and write
|
||
1A4CA1B9000
|
heap
|
page read and write
|
||
20780480000
|
trusted library allocation
|
page read and write
|
||
9487B7E000
|
stack
|
page read and write
|
||
1A4CA602000
|
heap
|
page read and write
|
||
32CAEF8000
|
stack
|
page read and write
|
||
1A4CA198000
|
heap
|
page read and write
|
||
1E5C5121000
|
trusted library allocation
|
page read and write
|
||
32CAD78000
|
stack
|
page read and write
|
||
9B830FB000
|
stack
|
page read and write
|
||
1A4CA1BB000
|
heap
|
page read and write
|
||
1E5C4D60000
|
trusted library allocation
|
page read and write
|
||
1A4C987A000
|
heap
|
page read and write
|
||
1E5C4DF0000
|
trusted library allocation
|
page read and write
|
||
218A6C2A000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
2960000
|
trusted library allocation
|
page read and write
|
||
2980000
|
trusted library allocation
|
page read and write
|
||
1594863D000
|
heap
|
page read and write
|
||
159485D0000
|
remote allocation
|
page read and write
|
||
1E5C0215000
|
heap
|
page read and write
|
||
1A4C9902000
|
heap
|
page read and write
|
||
1594A070000
|
trusted library allocation
|
page read and write
|
||
1A4C985B000
|
heap
|
page read and write
|
||
2A330E3E000
|
heap
|
page read and write
|
||
264A1446000
|
heap
|
page read and write
|
||
86E26FC000
|
stack
|
page read and write
|
||
1A4CA1BA000
|
heap
|
page read and write
|
||
264A1448000
|
heap
|
page read and write
|
||
1A4CA602000
|
heap
|
page read and write
|
||
15948702000
|
heap
|
page read and write
|
||
1A4C98AE000
|
heap
|
page read and write
|
||
20781340000
|
trusted library allocation
|
page read and write
|
||
1A4CA17F000
|
heap
|
page read and write
|
||
1A4CA197000
|
heap
|
page read and write
|
||
264A143A000
|
heap
|
page read and write
|
||
264A12C0000
|
heap
|
page read and write
|
||
1E5C4F02000
|
heap
|
page read and write
|
||
15948647000
|
heap
|
page read and write
|
||
2501B108000
|
heap
|
page read and write
|
||
86E24FA000
|
stack
|
page read and write
|
||
25886A02000
|
heap
|
page read and write
|
||
2180000
|
heap
|
page read and write
|
||
28DCD352000
|
heap
|
page read and write
|
||
26EF000
|
stack
|
page read and write
|
||
2501B113000
|
heap
|
page read and write
|
||
1A020070000
|
heap
|
page read and write
|
||
1A020802000
|
trusted library allocation
|
page read and write
|
||
1611EE5B000
|
heap
|
page read and write
|
||
2130E890000
|
trusted library allocation
|
page read and write
|
||
1A4CA602000
|
heap
|
page read and write
|
||
264A147D000
|
heap
|
page read and write
|
||
264A12B0000
|
heap
|
page read and write
|
||
1611EE66000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2501B070000
|
heap
|
page read and write
|
||
1A4CA176000
|
heap
|
page read and write
|
||
1A4C9864000
|
heap
|
page read and write
|
||
2501B100000
|
heap
|
page read and write
|
||
73134000
|
unkown
|
page readonly
|
||
6A93FC000
|
stack
|
page read and write
|
||
2501B03C000
|
heap
|
page read and write
|
||
1A4CA1B9000
|
heap
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
1E5C4E2D000
|
heap
|
page read and write
|
||
9487AFD000
|
stack
|
page read and write
|
||
1E5C5250000
|
remote allocation
|
page read and write
|
||
15948613000
|
heap
|
page read and write
|
||
7ADAB7E000
|
stack
|
page read and write
|
||
1A4C98A2000
|
heap
|
page read and write
|
||
42C000
|
unkown
|
page read and write
|
||
264A1502000
|
heap
|
page read and write
|
||
28DCD5C0000
|
heap
|
page read and write
|
||
1A815C29000
|
heap
|
page read and write
|
||
1611F802000
|
trusted library allocation
|
page read and write
|
||
1A4CA1A8000
|
heap
|
page read and write
|
||
6A977C000
|
stack
|
page read and write
|
||
1A4C98B3000
|
heap
|
page read and write
|
||
1A4CA174000
|
heap
|
page read and write
|
||
1E5C5100000
|
trusted library allocation
|
page read and write
|
||
1E5BF88E000
|
heap
|
page read and write
|
||
28DCD35E000
|
heap
|
page read and write
|
||
2501B013000
|
heap
|
page read and write
|
||
1E5C0313000
|
heap
|
page read and write
|
||
1E5C4EFE000
|
heap
|
page read and write
|
||
1A816602000
|
trusted library allocation
|
page read and write
|
||
32CA97F000
|
stack
|
page read and write
|
||
228F000
|
stack
|
page read and write
|
||
218A6C64000
|
heap
|
page read and write
|
||
1E5C0359000
|
heap
|
page read and write
|
||
1E5C5210000
|
trusted library allocation
|
page read and write
|
||
1E5C4E20000
|
heap
|
page read and write
|
||
218A6D08000
|
heap
|
page read and write
|
||
218A6C5F000
|
heap
|
page read and write
|
||
25886A00000
|
heap
|
page read and write
|
||
86E2AFE000
|
stack
|
page read and write
|
||
1E5BF8AD000
|
heap
|
page read and write
|
||
218A6C61000
|
heap
|
page read and write
|
||
7ADA77B000
|
stack
|
page read and write
|
||
1594A0B0000
|
trusted library allocation
|
page read and write
|
||
1E5C0359000
|
heap
|
page read and write
|
||
22A0000
|
heap
|
page read and write
|
||
1E5C5200000
|
trusted library allocation
|
page read and write
|
||
1E5C4EE5000
|
heap
|
page read and write
|
||
20780449000
|
heap
|
page read and write
|
||
1E5C4E61000
|
heap
|
page read and write
|
||
1611ECC0000
|
heap
|
page read and write
|
||
1E5BF900000
|
heap
|
page read and write
|
||
2130DF90000
|
heap
|
page read and write
|
||
1A4CA16E000
|
heap
|
page read and write
|
||
1611ED60000
|
trusted library allocation
|
page read and write
|
||
1E5BF83D000
|
heap
|
page read and write
|
||
264A1461000
|
heap
|
page read and write
|
||
1E5C4E71000
|
heap
|
page read and write
|
||
2501AFD0000
|
trusted library allocation
|
page read and write
|
||
7AD9EEB000
|
stack
|
page read and write
|
||
6A92FE000
|
stack
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
503000
|
heap
|
page read and write
|
||
2501B04E000
|
heap
|
page read and write
|
||
1A01FFB0000
|
trusted library allocation
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
28DCD365000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
264A1442000
|
heap
|
page read and write
|
||
1A815BE0000
|
remote allocation
|
page read and write
|
||
1A4CA15C000
|
heap
|
page read and write
|
||
264A1424000
|
heap
|
page read and write
|
||
1A4CA15D000
|
heap
|
page read and write
|
||
1A4C98F9000
|
heap
|
page read and write
|
||
264A1429000
|
heap
|
page read and write
|
||
1A4CA1A8000
|
heap
|
page read and write
|
||
22CFF7C000
|
stack
|
page read and write
|
||
1A4CA179000
|
heap
|
page read and write
|
||
2970000
|
trusted library allocation
|
page read and write
|
||
1E5BF7F0000
|
trusted library allocation
|
page read and write
|
||
1A4CA119000
|
heap
|
page read and write
|
||
28DCD372000
|
heap
|
page read and write
|
||
734375B000
|
stack
|
page read and write
|
||
A1C267E000
|
stack
|
page read and write
|
||
1E5BF902000
|
heap
|
page read and write
|
||
1A4CA187000
|
heap
|
page read and write
|
||
32CA4FC000
|
stack
|
page read and write
|
||
84E338B000
|
stack
|
page read and write
|
||
2130EB32000
|
heap
|
page read and write
|
||
1611EE82000
|
heap
|
page read and write
|
||
28DCD341000
|
heap
|
page read and write
|
||
22CF3CB000
|
stack
|
page read and write
|
||
264A1400000
|
heap
|
page read and write
|
||
218A6C86000
|
heap
|
page read and write
|
||
1E5BF813000
|
heap
|
page read and write
|
||
DD260F8000
|
stack
|
page read and write
|
||
9487DFB000
|
stack
|
page read and write
|
||
1A4CA621000
|
heap
|
page read and write
|
||
1E5C5250000
|
trusted library allocation
|
page read and write
|
||
1A4CA176000
|
heap
|
page read and write
|
||
2130E068000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
1611EE29000
|
heap
|
page read and write
|
||
D84787E000
|
stack
|
page read and write
|
||
2A330E13000
|
heap
|
page read and write
|
||
264A1450000
|
heap
|
page read and write
|
||
264A144A000
|
heap
|
page read and write
|
||
6A927E000
|
stack
|
page read and write
|
||
264A1462000
|
heap
|
page read and write
|
||
1611EF13000
|
heap
|
page read and write
|
||
1E5BF87C000
|
heap
|
page read and write
|
||
32CA5FE000
|
stack
|
page read and write
|
||
218A6C53000
|
heap
|
page read and write
|
||
1A4CA18B000
|
heap
|
page read and write
|
||
1A4C986A000
|
heap
|
page read and write
|
||
9B835FC000
|
stack
|
page read and write
|
||
264A1432000
|
heap
|
page read and write
|
||
1E5BF826000
|
heap
|
page read and write
|
||
4C7000
|
heap
|
page read and write
|
||
1A4CA18D000
|
heap
|
page read and write
|
||
2A330E28000
|
heap
|
page read and write
|
||
1A4CA197000
|
heap
|
page read and write
|
||
1A4CA197000
|
heap
|
page read and write
|
||
9487EF7000
|
stack
|
page read and write
|
||
264A147C000
|
heap
|
page read and write
|
||
2130EB00000
|
heap
|
page read and write
|
||
1611EF00000
|
heap
|
page read and write
|
||
4EF000
|
heap
|
page read and write
|
||
1A4CA602000
|
heap
|
page read and write
|
||
2A330E75000
|
heap
|
page read and write
|
||
470E2FE000
|
stack
|
page read and write
|
||
264A1445000
|
heap
|
page read and write
|
||
9B831FB000
|
stack
|
page read and write
|
||
1A4CA180000
|
heap
|
page read and write
|
||
1E5BF8B0000
|
heap
|
page read and write
|
||
218A6C7B000
|
heap
|
page read and write
|
||
1A4C98F9000
|
heap
|
page read and write
|
||
2501B02A000
|
heap
|
page read and write
|
||
1A4CA197000
|
heap
|
page read and write
|
||
2501B07E000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
1A4CA17A000
|
heap
|
page read and write
|
||
207804B0000
|
heap
|
page read and write
|
||
1A4CA197000
|
heap
|
page read and write
|
||
207803F0000
|
heap
|
page read and write
|
||
1A4CA17C000
|
heap
|
page read and write
|
||
1A815C00000
|
heap
|
page read and write
|
||
1E5C4E40000
|
heap
|
page read and write
|
||
264A1464000
|
heap
|
page read and write
|
||
1E5C4E00000
|
heap
|
page read and write
|
||
1E5C510E000
|
trusted library allocation
|
page read and write
|
||
D84757B000
|
stack
|
page read and write
|
||
7ADA47F000
|
stack
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
2130E0CD000
|
heap
|
page read and write
|
||
1E5C51C0000
|
trusted library allocation
|
page read and write
|
||
20780490000
|
trusted library allocation
|
page read and write
|
||
15948713000
|
heap
|
page read and write
|
||
6A8FFB000
|
stack
|
page read and write
|
||
218A6C7C000
|
heap
|
page read and write
|
||
264A1449000
|
heap
|
page read and write
|
||
7ADA57F000
|
stack
|
page read and write
|
||
2501AF30000
|
heap
|
page read and write
|
||
7ADAA7D000
|
stack
|
page read and write
|
||
264A142E000
|
heap
|
page read and write
|
||
4FA000
|
heap
|
page read and write
|
||
2130E000000
|
heap
|
page read and write
|
||
258869F0000
|
trusted library allocation
|
page read and write
|
||
86E20CB000
|
stack
|
page read and write
|
||
159484F0000
|
heap
|
page read and write
|
||
A1C227E000
|
stack
|
page read and write
|
||
1A4CA17D000
|
heap
|
page read and write
|
||
1A4CA19E000
|
heap
|
page read and write
|
||
1611EE79000
|
heap
|
page read and write
|
||
2501B088000
|
heap
|
page read and write
|
||
1594862A000
|
heap
|
page read and write
|
||
7ADA2FB000
|
stack
|
page read and write
|
||
28DCD1E0000
|
heap
|
page read and write
|
||
1A4C982D000
|
heap
|
page read and write
|
||
1E5C0300000
|
heap
|
page read and write
|
||
264A1432000
|
heap
|
page read and write
|
||
1A4C9660000
|
heap
|
page read and write
|
||
9B82DF9000
|
stack
|
page read and write
|
||
32CAA78000
|
stack
|
page read and write
|
||
1A4CA197000
|
heap
|
page read and write
|
||
1A4CA17F000
|
heap
|
page read and write
|
||
2A330D40000
|
trusted library allocation
|
page read and write
|
||
DD261FF000
|
stack
|
page read and write
|
||
1E5C4EE0000
|
heap
|
page read and write
|
||
470E3FE000
|
stack
|
page read and write
|
||
1A4CA172000
|
heap
|
page read and write
|
||
264A1C02000
|
trusted library allocation
|
page read and write
|
||
1A4CA1A8000
|
heap
|
page read and write
|
||
4A0000
|
trusted library allocation
|
page read and write
|
||
84E38FB000
|
stack
|
page read and write
|
||
28DCD356000
|
heap
|
page read and write
|
||
20780290000
|
heap
|
page read and write
|
||
1A4C987B000
|
heap
|
page read and write
|
||
86E2DFF000
|
stack
|
page read and write
|
||
1A01FFD0000
|
remote allocation
|
page read and write
|
||
15948658000
|
heap
|
page read and write
|
||
264A1477000
|
heap
|
page read and write
|
||
1E5C0318000
|
heap
|
page read and write
|
||
1E5C4EF6000
|
heap
|
page read and write
|
||
A697A7E000
|
stack
|
page read and write
|
||
A1C257E000
|
stack
|
page read and write
|
||
1A01FE50000
|
heap
|
page read and write
|
||
1A4CA17F000
|
heap
|
page read and write
|
||
22CFD7C000
|
stack
|
page read and write
|
||
28DCD370000
|
heap
|
page read and write
|
||
1A01FE40000
|
heap
|
page read and write
|
There are 679 hidden memdumps, click here to show them.