IOC Report
SecuriteInfo.com.Trojan.Siggen17.57062.9420.1434

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Adventure_19.bmp
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
dropped
C:\Users\user\AppData\Local\Temp\HPSUPD-Win32Exe.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Sites.UDP
data
dropped
C:\Users\user\AppData\Local\Temp\emoji-body-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\iso_639-3.xml
XML 1.0 document, UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\lgpllibs.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\microphone-disabled-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\nsy52E1.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\printer-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\svejtsers.for
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\vm3ddevapi64-debug.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe"
malicious

URLs

Name
IP
Malicious
http://www.sil.org/iso639-3/
unknown
http://www.vmware.com/0/
unknown
http://www.vmware.com/0
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.symauth.com/cps0(
unknown
http://www.symauth.com/rpa00
unknown
https://mozilla.org0
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\centrumpartiers\sindstilstand
Tiebold
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\SENGEKANTERNE\stubben
Roundabout87
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\dado
Foresprgselens98
HKEY_CURRENT_USER\Software\metaled\Filformatets
Expand String Value

Memdumps

Base Address
Regiontype
Protect
Malicious
2A30000
direct allocation
page execute and read and write
malicious
1A4CA100000
heap
page read and write
84E367F000
stack
page read and write
1A4CA189000
heap
page read and write
1A4CA197000
heap
page read and write
264A1480000
heap
page read and write
1A4CA176000
heap
page read and write
1A4C9868000
heap
page read and write
1A4CA1BA000
heap
page read and write
207810F6000
trusted library allocation
page read and write
1A4CA17E000
heap
page read and write
1E5C51C0000
trusted library allocation
page read and write
1E5BF914000
heap
page read and write
7ADA87C000
stack
page read and write
207813A0000
trusted library allocation
page read and write
1A4CA197000
heap
page read and write
1A4CA197000
heap
page read and write
1611EF02000
heap
page read and write
20780470000
trusted library allocation
page read and write
1E5C0D60000
trusted library allocation
page read and write
469000
unkown
page read and write
AD0000
heap
page read and write
28DCD355000
heap
page read and write
1A4C98BF000
heap
page read and write
A697B7E000
stack
page read and write
2A330E02000
heap
page read and write
86E28FD000
stack
page read and write
1594A202000
trusted library allocation
page read and write
1A4CA17F000
heap
page read and write
207804FF000
heap
page read and write
1E5BF750000
heap
page read and write
20781350000
trusted library allocation
page read and write
46B000
unkown
page readonly
D84767F000
stack
page read and write
7343A7F000
stack
page read and write
1A4CA19E000
heap
page read and write
1A4C985D000
heap
page read and write
25886A29000
heap
page read and write
15948663000
heap
page read and write
2A330F13000
heap
page read and write
218A6C7B000
heap
page read and write
1A4CA602000
heap
page read and write
264A144C000
heap
page read and write
1E5C4DD0000
trusted library allocation
page read and write
1A4CA17C000
heap
page read and write
2130E013000
heap
page read and write
1A4CA1C4000
heap
page read and write
7343F7E000
stack
page read and write
1A815B80000
heap
page read and write
9487C7B000
stack
page read and write
A1C1F2B000
stack
page read and write
1611EE79000
heap
page read and write
2A331602000
trusted library allocation
page read and write
73131000
unkown
page execute read
207804FD000
heap
page read and write
218A6C5E000
heap
page read and write
212E000
stack
page read and write
25887202000
trusted library allocation
page read and write
25886A13000
heap
page read and write
264A1443000
heap
page read and write
1E5C0302000
heap
page read and write
28DCD374000
heap
page read and write
15948658000
heap
page read and write
1611EE2C000
heap
page read and write
15948718000
heap
page read and write
1A4C98E4000
heap
page read and write
DD25D9F000
stack
page read and write
1E5BF897000
heap
page read and write
264A1431000
heap
page read and write
1611ECD0000
heap
page read and write
2501B102000
heap
page read and write
1A01FFD0000
remote allocation
page read and write
20780513000
heap
page read and write
1E5C0318000
heap
page read and write
2A330E69000
heap
page read and write
6A997F000
stack
page read and write
7ADA6FC000
stack
page read and write
1A4C96D0000
heap
page read and write
28DCD330000
heap
page read and write
1A4C9813000
heap
page read and write
1A4CA618000
heap
page read and write
2130E066000
heap
page read and write
2A330E56000
heap
page read and write
207804FD000
heap
page read and write
1A02003E000
heap
page read and write
2A330C40000
heap
page read and write
1A4CA602000
heap
page read and write
9B8289B000
stack
page read and write
2A330BE0000
heap
page read and write
6A9677000
stack
page read and write
1A020002000
heap
page read and write
1A4C97D0000
trusted library allocation
page read and write
1A4CA1BA000
heap
page read and write
1611EE8F000
heap
page read and write
264A146B000
heap
page read and write
1A815B20000
heap
page read and write
1A4C98A9000
heap
page read and write
32CA57F000
stack
page read and write
28DCD373000
heap
page read and write
28DCD430000
heap
page read and write
1A4C9913000
heap
page read and write
20780445000
heap
page read and write
9B82EFA000
stack
page read and write
218A6C00000
heap
page read and write
1A4CA1DD000
heap
page read and write
2F3D000
stack
page read and write
400000
unkown
page readonly
2130E113000
heap
page read and write
1A4C986C000
heap
page read and write
1E5C4DE0000
trusted library allocation
page read and write
1E5C5120000
trusted library allocation
page read and write
A1C247E000
stack
page read and write
32CA8FB000
stack
page read and write
258868F0000
heap
page read and write
2A330E79000
heap
page read and write
1E5C4E75000
heap
page read and write
73136000
unkown
page readonly
1A4CA61A000
heap
page read and write
1A4CA123000
heap
page read and write
2501B054000
heap
page read and write
470E379000
stack
page read and write
1E5BF6E0000
heap
page read and write
7343C7F000
stack
page read and write
1A4CA1B9000
heap
page read and write
207804B8000
heap
page read and write
1611ED30000
heap
page read and write
20781320000
trusted library allocation
page read and write
1A4CA17E000
heap
page read and write
28DCD364000
heap
page read and write
264A1413000
heap
page read and write
1A4C9908000
heap
page read and write
1A4C98EE000
heap
page read and write
2130E03E000
heap
page read and write
264A142F000
heap
page read and write
1E5C4E0F000
heap
page read and write
9B837FE000
stack
page read and write
1A4CA182000
heap
page read and write
86E25FF000
stack
page read and write
1A4CA1A8000
heap
page read and write
218A6D13000
heap
page read and write
1E5C4F05000
heap
page read and write
1E5C5220000
trusted library allocation
page read and write
1611EF08000
heap
page read and write
1A4C98F9000
heap
page read and write
1A4C9FE0000
remote allocation
page read and write
264A1486000
heap
page read and write
94881FF000
stack
page read and write
2A330F02000
heap
page read and write
15948648000
heap
page read and write
264A143E000
heap
page read and write
218A6AD0000
heap
page read and write
1611EE57000
heap
page read and write
1E5BF857000
heap
page read and write
1A4C982C000
heap
page read and write
218A6AE0000
heap
page read and write
15948648000
heap
page read and write
1E5C5130000
trusted library allocation
page read and write
1A815BE0000
remote allocation
page read and write
25886B02000
heap
page read and write
2130E102000
heap
page read and write
470DE9B000
stack
page read and write
218A6B40000
heap
page read and write
1E5BF892000
heap
page read and write
2501AFA0000
heap
page read and write
1E5BF7F3000
trusted library allocation
page read and write
1A4C9888000
heap
page read and write
9487FFE000
stack
page read and write
1A01FEB0000
heap
page read and write
84E3AFE000
stack
page read and write
207802A0000
trusted library allocation
page read and write
25886880000
heap
page read and write
20780440000
heap
page read and write
1A4CA14F000
heap
page read and write
264A1441000
heap
page read and write
1A4CA197000
heap
page read and write
1A4CA19E000
heap
page read and write
264A1476000
heap
page read and write
1E5BF878000
heap
page read and write
1A4CA176000
heap
page read and write
264A1447000
heap
page read and write
264A1479000
heap
page read and write
2501B05F000
heap
page read and write
1A4C9670000
heap
page read and write
25886A76000
heap
page read and write
1E5BF800000
heap
page read and write
1A4CA1B3000
heap
page read and write
1A4CA162000
heap
page read and write
1A4C985C000
heap
page read and write
99000
stack
page read and write
1A4CA17C000
heap
page read and write
A697DFE000
stack
page read and write
400000
unkown
page readonly
2184000
heap
page read and write
22CFB7F000
stack
page read and write
159485D0000
remote allocation
page read and write
1E5C5120000
trusted library allocation
page read and write
1A4CA1A8000
heap
page read and write
6A947E000
stack
page read and write
1E5C5340000
trusted library allocation
page read and write
1611EE3C000
heap
page read and write
A697F7D000
stack
page read and write
15948550000
heap
page read and write
1A4CA1A8000
heap
page read and write
1A4CA602000
heap
page read and write
25886A6B000
heap
page read and write
15948700000
heap
page read and write
D84727B000
stack
page read and write
1A4CA1B9000
heap
page read and write
86E2CFF000
stack
page read and write
86E2BFE000
stack
page read and write
1A4CA17B000
heap
page read and write
1A4CA176000
heap
page read and write
28DCD35E000
heap
page read and write
1A4C985F000
heap
page read and write
1A4CA176000
heap
page read and write
1A815C57000
heap
page read and write
1611EE13000
heap
page read and write
1E5BF8A4000
heap
page read and write
1A815C3D000
heap
page read and write
9487CFE000
stack
page read and write
1A4CA182000
heap
page read and write
1A815BB0000
trusted library allocation
page read and write
1E5BF902000
heap
page read and write
2130DF80000
heap
page read and write
2130EA02000
heap
page read and write
1A4CA1BB000
heap
page read and write
28DCD35E000
heap
page read and write
28DCD310000
heap
page read and write
86E29FF000
stack
page read and write
1A815C02000
heap
page read and write
46B000
unkown
page readonly
22CF97F000
stack
page read and write
264A1465000
heap
page read and write
84E36FF000
stack
page read and write
28DCD5C5000
heap
page read and write
DD25D1A000
stack
page read and write
1E5BF926000
heap
page read and write
218A6C5D000
heap
page read and write
15948580000
trusted library allocation
page read and write
264A146F000
heap
page read and write
207810F0000
trusted library allocation
page read and write
1A815BE0000
remote allocation
page read and write
218A6C5C000
heap
page read and write
1E5C4EAB000
heap
page read and write
DD2617E000
stack
page read and write
1A4CA002000
heap
page read and write
1A020058000
heap
page read and write
1A4CA1A9000
heap
page read and write
1E5BF829000
heap
page read and write
2A330BD0000
heap
page read and write
264A1BC0000
trusted library allocation
page read and write
1A020073000
heap
page read and write
1A4C9866000
heap
page read and write
1E5C4E56000
heap
page read and write
264A146D000
heap
page read and write
22CFA7F000
stack
page read and write
1A4CA197000
heap
page read and write
2130E0C4000
heap
page read and write
1A4CA11B000
heap
page read and write
1A4C983C000
heap
page read and write
1A4CA621000
heap
page read and write
7343D7A000
stack
page read and write
218A6D00000
heap
page read and write
1A4C9800000
heap
page read and write
84E3BFF000
stack
page read and write
A6976DB000
stack
page read and write
264A1320000
heap
page read and write
431000
unkown
page read and write
1E5C4E4D000
heap
page read and write
32CADFF000
unkown
page read and write
6A987F000
stack
page read and write
1A4CA17C000
heap
page read and write
1E5C01F0000
trusted library allocation
page read and write
1A4C9FE0000
remote allocation
page read and write
28DCD354000
heap
page read and write
207804FD000
heap
page read and write
2130E023000
heap
page read and write
94880FD000
stack
page read and write
1E5C5130000
trusted library allocation
page read and write
1611EE5F000
heap
page read and write
20781330000
heap
page readonly
1E5C0200000
heap
page read and write
1E5BF900000
heap
page read and write
A1C1FAE000
stack
page read and write
7343B7A000
stack
page read and write
1A4C9916000
heap
page read and write
207803D0000
heap
page read and write
1A4CA191000
heap
page read and write
73130000
unkown
page readonly
1A815D02000
heap
page read and write
A697E7E000
stack
page read and write
1A4CA1A8000
heap
page read and write
2130E029000
heap
page read and write
32CAC7F000
stack
page read and write
15948600000
heap
page read and write
9487A7B000
stack
page read and write
207804F6000
heap
page read and write
1A020000000
heap
page read and write
1E5C0304000
heap
page read and write
218A7602000
trusted library allocation
page read and write
509000
heap
page read and write
1A4CA61A000
heap
page read and write
2078051E000
heap
page read and write
1E5C51C0000
trusted library allocation
page read and write
1A4C9863000
heap
page read and write
218A6C13000
heap
page read and write
1A4CA1C4000
heap
page read and write
15948602000
heap
page read and write
1611EE61000
heap
page read and write
1A4CA14A000
heap
page read and write
6A957B000
stack
page read and write
1E5C51E0000
trusted library allocation
page read and write
1A4CA197000
heap
page read and write
1A02005D000
heap
page read and write
1A01FFD0000
remote allocation
page read and write
15948689000
heap
page read and write
28DCD346000
heap
page read and write
1A4CA197000
heap
page read and write
15948657000
heap
page read and write
1E5C4EA8000
heap
page read and write
25886B13000
heap
page read and write
2501B000000
heap
page read and write
1A815C37000
heap
page read and write
1E5C5124000
trusted library allocation
page read and write
25886890000
heap
page read and write
159485D0000
remote allocation
page read and write
2130E0BC000
heap
page read and write
2501B049000
heap
page read and write
9B82CF7000
stack
page read and write
84E39F7000
stack
page read and write
7343E7E000
stack
page read and write
218A6C62000
heap
page read and write
159485A0000
trusted library allocation
page read and write
264A1466000
heap
page read and write
1A4C986B000
heap
page read and write
1E5BF872000
heap
page read and write
73437DF000
stack
page read and write
218A6B70000
trusted library allocation
page read and write
2501AF40000
heap
page read and write
1A4C9829000
heap
page read and write
1A4C98C6000
heap
page read and write
DD2607E000
stack
page read and write
1A4CA1C8000
heap
page read and write
D84777E000
stack
page read and write
1A4CA177000
heap
page read and write
1E5C4DF0000
trusted library allocation
page read and write
1A4C98FC000
heap
page read and write
1A4C9FE0000
remote allocation
page read and write
1A4CA197000
heap
page read and write
2130E0E1000
heap
page read and write
1E5C5108000
trusted library allocation
page read and write
1A4CA1B9000
heap
page read and write
1611EE00000
heap
page read and write
2501B05F000
heap
page read and write
207805B0000
trusted library allocation
page read and write
1E5BF6F0000
heap
page read and write
2501BA02000
trusted library allocation
page read and write
7ADA5FC000
stack
page read and write
4F6000
heap
page read and write
1E5C5360000
trusted library allocation
page read and write
470E479000
stack
page read and write
25886A5A000
heap
page read and write
1E5C4F02000
heap
page read and write
1A4CA197000
heap
page read and write
30000
heap
page read and write
DD2627C000
stack
page read and write
1A4CA17D000
heap
page read and write
AD6000
heap
page read and write
7ADA97F000
stack
page read and write
2078051D000
heap
page read and write
264A1463000
heap
page read and write
734407F000
stack
page read and write
1E5C08E0000
trusted library allocation
page read and write
1A4CA600000
heap
page read and write
1A4C98E4000
heap
page read and write
408000
unkown
page readonly
1E5C0202000
heap
page read and write
1E5C5250000
remote allocation
page read and write
A697BFC000
stack
page read and write
1E5C5100000
trusted library allocation
page read and write
22CFC7C000
stack
page read and write
1E5BF890000
heap
page read and write
28DCD346000
heap
page read and write
264A1468000
heap
page read and write
1E5C5250000
remote allocation
page read and write
9B82FFE000
stack
page read and write
1A4CA17C000
heap
page read and write
216E000
stack
page read and write
218A6D02000
heap
page read and write
1A4CA17D000
heap
page read and write
1A4CA197000
heap
page read and write
9B8291F000
stack
page read and write
2A330F00000
heap
page read and write
1E5C5134000
trusted library allocation
page read and write
1A815C13000
heap
page read and write
1A4CA176000
heap
page read and write
1A020102000
heap
page read and write
218A6C3C000
heap
page read and write
25886A3D000
heap
page read and write
264A144F000
heap
page read and write
1A4CA618000
heap
page read and write
2130E084000
heap
page read and write
1A020049000
heap
page read and write
1A4CA197000
heap
page read and write
1A020029000
heap
page read and write
1E5BF907000
heap
page read and write
1A4C98E3000
heap
page read and write
1A4CA17E000
heap
page read and write
1E5BF780000
trusted library allocation
page read and write
1A4CA16E000
heap
page read and write
2130DFF0000
heap
page read and write
1A4C9860000
heap
page read and write
2A330E00000
heap
page read and write
2130E087000
heap
page read and write
1A4CA190000
heap
page read and write
159484E0000
heap
page read and write
2130E06E000
heap
page read and write
1A020013000
heap
page read and write
1A4CA178000
heap
page read and write
32CAB77000
stack
page read and write
401000
unkown
page execute read
1E5C5230000
trusted library allocation
page read and write
1A815B10000
heap
page read and write
1A4CA1B9000
heap
page read and write
20780480000
trusted library allocation
page read and write
9487B7E000
stack
page read and write
1A4CA602000
heap
page read and write
32CAEF8000
stack
page read and write
1A4CA198000
heap
page read and write
1E5C5121000
trusted library allocation
page read and write
32CAD78000
stack
page read and write
9B830FB000
stack
page read and write
1A4CA1BB000
heap
page read and write
1E5C4D60000
trusted library allocation
page read and write
1A4C987A000
heap
page read and write
1E5C4DF0000
trusted library allocation
page read and write
218A6C2A000
heap
page read and write
440000
unkown
page read and write
2960000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
1594863D000
heap
page read and write
159485D0000
remote allocation
page read and write
1E5C0215000
heap
page read and write
1A4C9902000
heap
page read and write
1594A070000
trusted library allocation
page read and write
1A4C985B000
heap
page read and write
2A330E3E000
heap
page read and write
264A1446000
heap
page read and write
86E26FC000
stack
page read and write
1A4CA1BA000
heap
page read and write
264A1448000
heap
page read and write
1A4CA602000
heap
page read and write
15948702000
heap
page read and write
1A4C98AE000
heap
page read and write
20781340000
trusted library allocation
page read and write
1A4CA17F000
heap
page read and write
1A4CA197000
heap
page read and write
264A143A000
heap
page read and write
264A12C0000
heap
page read and write
1E5C4F02000
heap
page read and write
15948647000
heap
page read and write
2501B108000
heap
page read and write
86E24FA000
stack
page read and write
25886A02000
heap
page read and write
2180000
heap
page read and write
28DCD352000
heap
page read and write
26EF000
stack
page read and write
2501B113000
heap
page read and write
1A020070000
heap
page read and write
1A020802000
trusted library allocation
page read and write
1611EE5B000
heap
page read and write
2130E890000
trusted library allocation
page read and write
1A4CA602000
heap
page read and write
264A147D000
heap
page read and write
264A12B0000
heap
page read and write
1611EE66000
heap
page read and write
401000
unkown
page execute read
2501B070000
heap
page read and write
1A4CA176000
heap
page read and write
1A4C9864000
heap
page read and write
2501B100000
heap
page read and write
73134000
unkown
page readonly
6A93FC000
stack
page read and write
2501B03C000
heap
page read and write
1A4CA1B9000
heap
page read and write
650000
heap
page read and write
1E5C4E2D000
heap
page read and write
9487AFD000
stack
page read and write
1E5C5250000
remote allocation
page read and write
15948613000
heap
page read and write
7ADAB7E000
stack
page read and write
1A4C98A2000
heap
page read and write
42C000
unkown
page read and write
264A1502000
heap
page read and write
28DCD5C0000
heap
page read and write
1A815C29000
heap
page read and write
1611F802000
trusted library allocation
page read and write
1A4CA1A8000
heap
page read and write
6A977C000
stack
page read and write
1A4C98B3000
heap
page read and write
1A4CA174000
heap
page read and write
1E5C5100000
trusted library allocation
page read and write
1E5BF88E000
heap
page read and write
28DCD35E000
heap
page read and write
2501B013000
heap
page read and write
1E5C0313000
heap
page read and write
1E5C4EFE000
heap
page read and write
1A816602000
trusted library allocation
page read and write
32CA97F000
stack
page read and write
228F000
stack
page read and write
218A6C64000
heap
page read and write
1E5C0359000
heap
page read and write
1E5C5210000
trusted library allocation
page read and write
1E5C4E20000
heap
page read and write
218A6D08000
heap
page read and write
218A6C5F000
heap
page read and write
25886A00000
heap
page read and write
86E2AFE000
stack
page read and write
1E5BF8AD000
heap
page read and write
218A6C61000
heap
page read and write
7ADA77B000
stack
page read and write
1594A0B0000
trusted library allocation
page read and write
1E5C0359000
heap
page read and write
22A0000
heap
page read and write
1E5C5200000
trusted library allocation
page read and write
1E5C4EE5000
heap
page read and write
20780449000
heap
page read and write
1E5C4E61000
heap
page read and write
1611ECC0000
heap
page read and write
1E5BF900000
heap
page read and write
2130DF90000
heap
page read and write
1A4CA16E000
heap
page read and write
1611ED60000
trusted library allocation
page read and write
1E5BF83D000
heap
page read and write
264A1461000
heap
page read and write
1E5C4E71000
heap
page read and write
2501AFD0000
trusted library allocation
page read and write
7AD9EEB000
stack
page read and write
6A92FE000
stack
page read and write
408000
unkown
page readonly
503000
heap
page read and write
2501B04E000
heap
page read and write
1A01FFB0000
trusted library allocation
page read and write
303E000
stack
page read and write
28DCD365000
heap
page read and write
40A000
unkown
page read and write
264A1442000
heap
page read and write
1A815BE0000
remote allocation
page read and write
1A4CA15C000
heap
page read and write
264A1424000
heap
page read and write
1A4CA15D000
heap
page read and write
1A4C98F9000
heap
page read and write
264A1429000
heap
page read and write
1A4CA1A8000
heap
page read and write
22CFF7C000
stack
page read and write
1A4CA179000
heap
page read and write
2970000
trusted library allocation
page read and write
1E5BF7F0000
trusted library allocation
page read and write
1A4CA119000
heap
page read and write
28DCD372000
heap
page read and write
734375B000
stack
page read and write
A1C267E000
stack
page read and write
1E5BF902000
heap
page read and write
1A4CA187000
heap
page read and write
32CA4FC000
stack
page read and write
84E338B000
stack
page read and write
2130EB32000
heap
page read and write
1611EE82000
heap
page read and write
28DCD341000
heap
page read and write
22CF3CB000
stack
page read and write
264A1400000
heap
page read and write
218A6C86000
heap
page read and write
1E5BF813000
heap
page read and write
DD260F8000
stack
page read and write
9487DFB000
stack
page read and write
1A4CA621000
heap
page read and write
1E5C5250000
trusted library allocation
page read and write
1A4CA176000
heap
page read and write
2130E068000
heap
page read and write
40A000
unkown
page write copy
1611EE29000
heap
page read and write
D84787E000
stack
page read and write
2A330E13000
heap
page read and write
264A1450000
heap
page read and write
264A144A000
heap
page read and write
6A927E000
stack
page read and write
264A1462000
heap
page read and write
1611EF13000
heap
page read and write
1E5BF87C000
heap
page read and write
32CA5FE000
stack
page read and write
218A6C53000
heap
page read and write
1A4CA18B000
heap
page read and write
1A4C986A000
heap
page read and write
9B835FC000
stack
page read and write
264A1432000
heap
page read and write
1E5BF826000
heap
page read and write
4C7000
heap
page read and write
1A4CA18D000
heap
page read and write
2A330E28000
heap
page read and write
1A4CA197000
heap
page read and write
1A4CA197000
heap
page read and write
9487EF7000
stack
page read and write
264A147C000
heap
page read and write
2130EB00000
heap
page read and write
1611EF00000
heap
page read and write
4EF000
heap
page read and write
1A4CA602000
heap
page read and write
2A330E75000
heap
page read and write
470E2FE000
stack
page read and write
264A1445000
heap
page read and write
9B831FB000
stack
page read and write
1A4CA180000
heap
page read and write
1E5BF8B0000
heap
page read and write
218A6C7B000
heap
page read and write
1A4C98F9000
heap
page read and write
2501B02A000
heap
page read and write
1A4CA197000
heap
page read and write
2501B07E000
heap
page read and write
19A000
stack
page read and write
1A4CA17A000
heap
page read and write
207804B0000
heap
page read and write
1A4CA197000
heap
page read and write
207803F0000
heap
page read and write
1A4CA17C000
heap
page read and write
1A815C00000
heap
page read and write
1E5C4E40000
heap
page read and write
264A1464000
heap
page read and write
1E5C4E00000
heap
page read and write
1E5C510E000
trusted library allocation
page read and write
D84757B000
stack
page read and write
7ADA47F000
stack
page read and write
4C0000
heap
page read and write
2130E0CD000
heap
page read and write
1E5C51C0000
trusted library allocation
page read and write
20780490000
trusted library allocation
page read and write
15948713000
heap
page read and write
6A8FFB000
stack
page read and write
218A6C7C000
heap
page read and write
264A1449000
heap
page read and write
7ADA57F000
stack
page read and write
2501AF30000
heap
page read and write
7ADAA7D000
stack
page read and write
264A142E000
heap
page read and write
4FA000
heap
page read and write
2130E000000
heap
page read and write
258869F0000
trusted library allocation
page read and write
86E20CB000
stack
page read and write
159484F0000
heap
page read and write
A1C227E000
stack
page read and write
1A4CA17D000
heap
page read and write
1A4CA19E000
heap
page read and write
1611EE79000
heap
page read and write
2501B088000
heap
page read and write
1594862A000
heap
page read and write
7ADA2FB000
stack
page read and write
28DCD1E0000
heap
page read and write
1A4C982D000
heap
page read and write
1E5C0300000
heap
page read and write
264A1432000
heap
page read and write
1A4C9660000
heap
page read and write
9B82DF9000
stack
page read and write
32CAA78000
stack
page read and write
1A4CA197000
heap
page read and write
1A4CA17F000
heap
page read and write
2A330D40000
trusted library allocation
page read and write
DD261FF000
stack
page read and write
1E5C4EE0000
heap
page read and write
470E3FE000
stack
page read and write
1A4CA172000
heap
page read and write
264A1C02000
trusted library allocation
page read and write
1A4CA1A8000
heap
page read and write
4A0000
trusted library allocation
page read and write
84E38FB000
stack
page read and write
28DCD356000
heap
page read and write
20780290000
heap
page read and write
1A4C987B000
heap
page read and write
86E2DFF000
stack
page read and write
1A01FFD0000
remote allocation
page read and write
15948658000
heap
page read and write
264A1477000
heap
page read and write
1E5C0318000
heap
page read and write
1E5C4EF6000
heap
page read and write
A697A7E000
stack
page read and write
A1C257E000
stack
page read and write
1A01FE50000
heap
page read and write
1A4CA17F000
heap
page read and write
22CFD7C000
stack
page read and write
28DCD370000
heap
page read and write
1A01FE40000
heap
page read and write
There are 679 hidden memdumps, click here to show them.