IOC Report
SecuriteInfo.com.Trojan.Inject.3564.15599

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.Inject.3564.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\CYKELPARKERINGENS.ini
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\GL-1.0.typelib
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\HERMAPHRODEITY.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Sydens.Pan7
data
dropped
C:\Users\user\AppData\Local\Temp\ThrottlePlugin.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\applications-other.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\folder-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\nsi86EA.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\rt64win7.inf
Windows setup INFormation, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\user-not-tracked-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\video-joined-displays-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.3564.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.3564.exe"
malicious

URLs

Name
IP
Malicious
http://185.222.57.79/SALES/1%20FEB%202-22_jalPPiWqFb130.bin
malicious
http://creativecommons.org/ns#DerivativeWorks
unknown
http://creativecommons.org/ns#ShareAlike
unknown
http://creativecommons.org/licenses/by-sa/4.0/
unknown
http://creativecommons.org/ns#Distribution
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://creativecommons.org/ns#Notice
unknown
http://creativecommons.org/ns#Reproduction
unknown
http://creativecommons.org/ns#Attribution
unknown
http://creativecommons.org/ns#
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\medtag\Erethitic
enregistration
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Bastille56\Skrivebordsskuffe50
Expand String Value
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\reclothing\Taxifly
NDRAAB

Memdumps

Base Address
Regiontype
Protect
Malicious
33D1000
direct allocation
page execute and read and write
malicious
9DBBB7F000
stack
page read and write
EB0797F000
stack
page read and write
6B0000
heap
page read and write
9B5EC7A000
stack
page read and write
16E9B999000
heap
page read and write
1F2964D0000
heap
page read and write
9DBB87D000
stack
page read and write
620000
trusted library allocation
page read and write
EB07A7B000
stack
page read and write
21285D90000
remote allocation
page read and write
860607B000
stack
page read and write
203B3A02000
heap
page read and write
7B6000
heap
page read and write
1B3DDC43000
heap
page read and write
16E9B997000
heap
page read and write
28A1DD51000
heap
page read and write
2D89A066000
heap
page read and write
EAAF7FF000
stack
page read and write
19F3CC75000
heap
page read and write
2380000
heap
page read and write
797000
heap
page read and write
16E9B98D000
heap
page read and write
1F2973D0000
trusted library allocation
page read and write
7A2000
heap
page read and write
28A1DD67000
heap
page read and write
8605EFB000
stack
page read and write
16E9BE02000
heap
page read and write
2513AFF000
stack
page read and write
28A1DD36000
heap
page read and write
21285C50000
trusted library allocation
page read and write
28CF000
stack
page read and write
21280D30000
trusted library allocation
page read and write
28A1DE40000
heap
page read and write
21280560000
heap
page read and write
16E9B982000
heap
page read and write
EAAF3FF000
stack
page read and write
9C2C79000
stack
page read and write
21285F06000
heap
page read and write
7A2000
heap
page read and write
231E000
stack
page read and write
21280F18000
heap
page read and write
E1A7D7F000
stack
page read and write
16E9B987000
heap
page read and write
24D60200000
heap
page read and write
8605A9C000
stack
page read and write
21285E88000
heap
page read and write
16E9B7E0000
remote allocation
page read and write
5960000
trusted library allocation
page read and write
25546800000
heap
page read and write
690000
heap
page read and write
16E9B991000
heap
page read and write
EB07B77000
stack
page read and write
7B0000
heap
page read and write
6F1857F000
stack
page read and write
1F2973C0000
heap
page readonly
C42D87E000
stack
page read and write
16E9B99D000
heap
page read and write
31C0000
trusted library allocation
page read and write
2554685C000
heap
page read and write
1B3DDC85000
heap
page read and write
1CFB2C02000
trusted library allocation
page read and write
16E9BE02000
heap
page read and write
16E9B302000
heap
page read and write
16E9BE1A000
heap
page read and write
740000
heap
page read and write
16E9AFA0000
heap
page read and write
21285F05000
heap
page read and write
907027E000
stack
page read and write
21285D20000
trusted library allocation
page read and write
21280F13000
heap
page read and write
1CFB2400000
heap
page read and write
7A2000
heap
page read and write
212E4500000
heap
page read and write
16E9BE1A000
heap
page read and write
907057F000
stack
page read and write
2D89A000000
heap
page read and write
16E9B9C1000
heap
page read and write
737000
heap
page read and write
1B3DDC79000
heap
page read and write
2CAD2459000
heap
page read and write
1CFB2475000
heap
page read and write
24D6028D000
heap
page read and write
70B000
heap
page read and write
24D60261000
heap
page read and write
1B3DDC76000
heap
page read and write
24D60302000
heap
page read and write
426000
unkown
page read and write
1F297160000
trusted library allocation
page read and write
907077F000
stack
page read and write
212E4447000
heap
page read and write
21280714000
heap
page read and write
E1A7C7E000
stack
page read and write
24D60213000
heap
page read and write
21281A90000
trusted library allocation
page read and write
5991000
trusted library allocation
page read and write
16E9B7E0000
remote allocation
page read and write
599C000
trusted library allocation
page read and write
5985000
trusted library allocation
page read and write
19F3CC5B000
heap
page read and write
78E000
heap
page read and write
EB0752E000
stack
page read and write
212E4370000
heap
page read and write
203B4002000
trusted library allocation
page read and write
28A1DD53000
heap
page read and write
16E9B983000
heap
page read and write
9C2D79000
stack
page read and write
24D60308000
heap
page read and write
21280702000
heap
page read and write
21285A90000
trusted library allocation
page read and write
738000
heap
page read and write
7C0000
heap
page read and write
1F2970F0000
trusted library allocation
page read and write
22DC000
stack
page read and write
7A1000
heap
page read and write
1F297430000
trusted library allocation
page read and write
6F1817F000
stack
page read and write
16E9B24E000
heap
page read and write
21280697000
heap
page read and write
19F3CC6B000
heap
page read and write
19F3CBC0000
trusted library allocation
page read and write
212E4429000
heap
page read and write
255467B0000
remote allocation
page read and write
2CAD2481000
heap
page read and write
6F1807C000
stack
page read and write
25546829000
heap
page read and write
16E9B313000
heap
page read and write
16E9B2FB000
heap
page read and write
28A1DD60000
heap
page read and write
3529E7F000
stack
page read and write
16E9B2F0000
heap
page read and write
1F2973E0000
trusted library allocation
page read and write
21280600000
heap
page read and write
1B3DDC77000
heap
page read and write
21285F08000
heap
page read and write
212E444D000
heap
page read and write
212E43E0000
heap
page read and write
16E9B99D000
heap
page read and write
40A000
unkown
page write copy
71E000
heap
page read and write
21285D40000
trusted library allocation
page read and write
16E9B997000
heap
page read and write
16E9B999000
heap
page read and write
400000
unkown
page readonly
7A2000
heap
page read and write
EAAF77E000
stack
page read and write
28A1DD53000
heap
page read and write
16E9B9D2000
heap
page read and write
16E9B9C4000
heap
page read and write
2CAD2454000
heap
page read and write
E1A797B000
stack
page read and write
EAAF67F000
stack
page read and write
7B8000
heap
page read and write
21285E4D000
heap
page read and write
16E9B9AE000
heap
page read and write
2128067C000
heap
page read and write
EAAF37A000
stack
page read and write
1B3DDC48000
heap
page read and write
25138FE000
stack
page read and write
212860A0000
trusted library allocation
page read and write
28F4000
trusted library allocation
page read and write
21280613000
heap
page read and write
6F18477000
stack
page read and write
4D91000
trusted library allocation
page read and write
251407F000
stack
page read and write
21285D50000
trusted library allocation
page read and write
16E9B99B000
heap
page read and write
2CAD2458000
heap
page read and write
212E4B40000
trusted library allocation
page read and write
352A27F000
stack
page read and write
1F2965D4000
heap
page read and write
2D89A900000
heap
page read and write
2CAD2460000
heap
page read and write
2CAD245C000
heap
page read and write
2D89A0C3000
heap
page read and write
860637F000
stack
page read and write
21285D00000
trusted library allocation
page read and write
4C60000
trusted library allocation
page read and write
21285AA0000
trusted library allocation
page read and write
16E9B900000
heap
page read and write
1F296479000
heap
page read and write
5130000
trusted library allocation
page read and write
28A1DD46000
heap
page read and write
758000
heap
page read and write
21280E00000
heap
page read and write
5160000
trusted library allocation
page read and write
16E9B99D000
heap
page read and write
24D60264000
heap
page read and write
16E9B316000
heap
page read and write
212E4502000
heap
page read and write
540000
heap
page read and write
EB075AD000
stack
page read and write
16E9B98B000
heap
page read and write
16E9B99D000
heap
page read and write
27CD000
stack
page read and write
2CAD2500000
heap
page read and write
16E9B991000
heap
page read and write
212E4479000
heap
page read and write
24D6025E000
heap
page read and write
16E9B2CB000
heap
page read and write
9B5E87B000
stack
page read and write
21285E00000
heap
page read and write
1B3DDC39000
heap
page read and write
733000
heap
page read and write
2D89A102000
heap
page read and write
16E9B9A3000
heap
page read and write
1B3DD990000
heap
page read and write
789000
heap
page read and write
1B3DDC54000
heap
page read and write
212E4513000
heap
page read and write
16E9B98B000
heap
page read and write
400000
unkown
page readonly
78B000
heap
page read and write
16E9BE21000
heap
page read and write
203B39E0000
trusted library allocation
page read and write
E1A7B7F000
stack
page read and write
2CAD245D000
heap
page read and write
21280707000
heap
page read and write
734E0000
unkown
page readonly
1B3DDC4C000
heap
page read and write
724000
heap
page read and write
24D600B0000
heap
page read and write
78A000
heap
page read and write
4C5F000
stack
page read and write
4DA0000
trusted library allocation
page read and write
30000
heap
page read and write
E1A74FC000
stack
page read and write
203B3810000
heap
page read and write
2D899E90000
heap
page read and write
1CFB2500000
heap
page read and write
1CFB244A000
heap
page read and write
388B000
stack
page read and write
1CFB2508000
heap
page read and write
1B3DDC42000
heap
page read and write
E1A7A7D000
stack
page read and write
1B3DDC52000
heap
page read and write
16E9B98B000
heap
page read and write
3529F7B000
stack
page read and write
21280F04000
heap
page read and write
16E9BE02000
heap
page read and write
7B6000
heap
page read and write
212E4482000
heap
page read and write
4DA0000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
28A1DD31000
heap
page read and write
2D89A0CC000
heap
page read and write
16E9B234000
heap
page read and write
16E9BE02000
heap
page read and write
21285F08000
heap
page read and write
16E9B98B000
heap
page read and write
694000
heap
page read and write
2D899F90000
trusted library allocation
page read and write
C42D57B000
stack
page read and write
16E9B992000
heap
page read and write
19F3CC13000
heap
page read and write
16E9B98F000
heap
page read and write
2D89A06B000
heap
page read and write
28A1DD49000
heap
page read and write
79E000
heap
page read and write
2CAD22E0000
heap
page read and write
16E9B987000
heap
page read and write
212E4450000
heap
page read and write
408000
unkown
page readonly
212E448F000
heap
page read and write
16E9B9AD000
heap
page read and write
1B3DDC45000
heap
page read and write
25546680000
heap
page read and write
3529C7E000
stack
page read and write
24D60A02000
trusted library allocation
page read and write
99000
stack
page read and write
21285D00000
trusted library allocation
page read and write
2D899E30000
heap
page read and write
1B3DE202000
trusted library allocation
page read and write
2CAD245A000
heap
page read and write
2CAD243C000
heap
page read and write
21285C30000
trusted library allocation
page read and write
16E9B229000
heap
page read and write
203B37B0000
heap
page read and write
16E9B221000
heap
page read and write
16E9B992000
heap
page read and write
24D601B0000
trusted library allocation
page read and write
599C000
trusted library allocation
page read and write
21285E1F000
heap
page read and write
212E4451000
heap
page read and write
907047E000
stack
page read and write
28A1DD63000
heap
page read and write
24D60040000
heap
page read and write
25546780000
trusted library allocation
page read and write
401000
unkown
page execute read
E1A777F000
stack
page read and write
90702FE000
stack
page read and write
16E9B9A4000
heap
page read and write
16E9B982000
heap
page read and write
16E9AFB0000
heap
page read and write
16E9B971000
heap
page read and write
16E9BE02000
heap
page read and write
21285F02000
heap
page read and write
19F3CC29000
heap
page read and write
16E9B9B9000
heap
page read and write
9C27EC000
stack
page read and write
8605B1E000
stack
page read and write
16E9B987000
heap
page read and write
16E9B24D000
heap
page read and write
E1A70AB000
stack
page read and write
16E9BE02000
heap
page read and write
21285C70000
trusted library allocation
page read and write
21285B20000
trusted library allocation
page read and write
9B5E67F000
stack
page read and write
16E9B2DD000
heap
page read and write
EB078FB000
stack
page read and write
452000
unkown
page readonly
28A1DFE0000
heap
page read and write
28A1DD68000
heap
page read and write
21280679000
heap
page read and write
16E9B2C4000
heap
page read and write
378C000
stack
page read and write
2D89A0E1000
heap
page read and write
24D60313000
heap
page read and write
21285D90000
remote allocation
page read and write
2513DFE000
stack
page read and write
21281523000
trusted library allocation
page read and write
21280F58000
heap
page read and write
9C2BF9000
stack
page read and write
19F3CC02000
heap
page read and write
1B3DDC7C000
heap
page read and write
7C0000
heap
page read and write
16E9B98B000
heap
page read and write
2D89A025000
heap
page read and write
21280F59000
heap
page read and write
1CFB2481000
heap
page read and write
16E9B9AC000
heap
page read and write
19F3CD13000
heap
page read and write
1B3DDC51000
heap
page read and write
24D60050000
heap
page read and write
21280E15000
heap
page read and write
21285EA8000
heap
page read and write
C42D67B000
stack
page read and write
21285E55000
heap
page read and write
28A1DBE0000
heap
page read and write
1F297100000
trusted library allocation
page read and write
16E9BE21000
heap
page read and write
1B3DDA00000
heap
page read and write
19F3CA60000
heap
page read and write
212E443C000
heap
page read and write
1F2973B0000
trusted library allocation
page read and write
1B3DDC29000
heap
page read and write
16E9B913000
heap
page read and write
894E11B000
stack
page read and write
740000
heap
page read and write
78B000
heap
page read and write
16E9B2B6000
heap
page read and write
21285C3E000
trusted library allocation
page read and write
1F2964F0000
heap
page read and write
28A1DD20000
heap
page read and write
894E8FF000
stack
page read and write
1F296470000
heap
page read and write
16E9B802000
heap
page read and write
25546823000
heap
page read and write
8605B9E000
stack
page read and write
2513EF9000
stack
page read and write
28A1DD44000
heap
page read and write
212E4448000
heap
page read and write
2CAD2C02000
trusted library allocation
page read and write
751000
heap
page read and write
C86000
heap
page read and write
31D0000
trusted library allocation
page read and write
1F296475000
heap
page read and write
21285F03000
heap
page read and write
28A1DE20000
heap
page read and write
21286080000
trusted library allocation
page read and write
1CFB2413000
heap
page read and write
1F2965BD000
heap
page read and write
21280F18000
heap
page read and write
2D89A087000
heap
page read and write
21285D60000
trusted library allocation
page read and write
2D89A0BB000
heap
page read and write
203B3A63000
heap
page read and write
212806AA000
heap
page read and write
16E9B9B5000
heap
page read and write
401000
unkown
page execute read
21285C51000
trusted library allocation
page read and write
1CFB23C0000
heap
page read and write
16E9B23C000
heap
page read and write
72E000
heap
page read and write
16E9B2ED000
heap
page read and write
1B3DDD02000
heap
page read and write
16E9B98B000
heap
page read and write
36A0000
heap
page read and write
16E9B982000
heap
page read and write
9DBBC7F000
stack
page read and write
19F3CC3D000
heap
page read and write
9B5ED7C000
stack
page read and write
2CAD2400000
heap
page read and write
212806B0000
heap
page read and write
9DBB67B000
stack
page read and write
5986000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
19F3CA50000
heap
page read and write
16E9B99D000
heap
page read and write
16E9B287000
heap
page read and write
6F1867E000
stack
page read and write
24D60265000
heap
page read and write
16E9B9AA000
heap
page read and write
16E9B2E6000
heap
page read and write
16E9BE00000
heap
page read and write
1F296570000
heap
page read and write
212E4413000
heap
page read and write
1B3DDC53000
heap
page read and write
7A2000
heap
page read and write
16E9BE02000
heap
page read and write
212E4400000
heap
page read and write
25546813000
heap
page read and write
906FF8B000
stack
page read and write
19F3CC77000
heap
page read and write
212E444E000
heap
page read and write
21280F02000
heap
page read and write
21281610000
trusted library allocation
page read and write
19F3CC00000
heap
page read and write
16E9B98F000
heap
page read and write
1B3DDC66000
heap
page read and write
28A1DD53000
heap
page read and write
513E000
trusted library allocation
page read and write
2CAD2513000
heap
page read and write
9B5E57A000
stack
page read and write
16E9B987000
heap
page read and write
2D89A113000
heap
page read and write
2128063F000
heap
page read and write
16E9B987000
heap
page read and write
6D8000
heap
page read and write
E1A77FC000
stack
page read and write
1B3DDC6B000
heap
page read and write
203B3A28000
heap
page read and write
545000
heap
page read and write
1B3DDC4A000
heap
page read and write
21285C54000
trusted library allocation
page read and write
16E9B997000
heap
page read and write
16E9BE18000
heap
page read and write
21285C30000
trusted library allocation
page read and write
24D60277000
heap
page read and write
21280702000
heap
page read and write
1B3DDC7D000
heap
page read and write
1F2965BD000
heap
page read and write
2CAD2413000
heap
page read and write
21285EA6000
heap
page read and write
255467B0000
remote allocation
page read and write
6F1837B000
stack
page read and write
7B6000
heap
page read and write
21285D90000
trusted library allocation
page read and write
2D899E20000
heap
page read and write
16E9B99B000
heap
page read and write
1B3DDC49000
heap
page read and write
21285C38000
trusted library allocation
page read and write
7B6000
heap
page read and write
7C0000
heap
page read and write
1B3DDC69000
heap
page read and write
21285B10000
trusted library allocation
page read and write
1F2965B5000
heap
page read and write
C42D27B000
stack
page read and write
2513FF9000
stack
page read and write
21285EE0000
heap
page read and write
16E9B9AF000
heap
page read and write
1B3DDC63000
heap
page read and write
21280673000
heap
page read and write
9DBBA7F000
stack
page read and write
16E9B950000
heap
page read and write
16E9B9AB000
heap
page read and write
9B5E77B000
stack
page read and write
21285EFD000
heap
page read and write
EB074AB000
stack
page read and write
21285E12000
heap
page read and write
9B5E47A000
stack
page read and write
1B3DDC50000
heap
page read and write
734E1000
unkown
page execute read
452000
unkown
page readonly
5A60000
trusted library allocation
page read and write
21280693000
heap
page read and write
203B3A00000
heap
page read and write
7B6000
heap
page read and write
1CFB2429000
heap
page read and write
894E9FD000
stack
page read and write
8606177000
stack
page read and write
9B5E377000
stack
page read and write
24D60300000
heap
page read and write
21285C60000
trusted library allocation
page read and write
21280629000
heap
page read and write
9DBB97E000
stack
page read and write
16E9B98F000
heap
page read and write
21281501000
trusted library allocation
page read and write
732000
heap
page read and write
212806A4000
heap
page read and write
21281520000
trusted library allocation
page read and write
1F296460000
heap
page read and write
251387B000
stack
page read and write
7C9000
heap
page read and write
EB07C7F000
stack
page read and write
2514178000
stack
page read and write
16E9B991000
heap
page read and write
1B3DDC55000
heap
page read and write
28DC000
trusted library allocation
page read and write
35299FB000
stack
page read and write
28A1DD51000
heap
page read and write
1B3DDC41000
heap
page read and write
16E9B213000
heap
page read and write
EAAF6F9000
stack
page read and write
72E000
heap
page read and write
203B3A79000
heap
page read and write
25546856000
heap
page read and write
596D000
trusted library allocation
page read and write
907067E000
stack
page read and write
203B3A13000
heap
page read and write
203B3A3C000
heap
page read and write
24D60282000
heap
page read and write
1F2965BD000
heap
page read and write
6F180FF000
stack
page read and write
212E444C000
heap
page read and write
9B5DF4B000
stack
page read and write
2554683D000
heap
page read and write
352A17F000
stack
page read and write
203B3B02000
heap
page read and write
24D6024A000
heap
page read and write
16E9B7E0000
remote allocation
page read and write
599C000
trusted library allocation
page read and write
16E9B992000
heap
page read and write
1B3DDC00000
heap
page read and write
16E9B2B0000
heap
page read and write
19F3D402000
trusted library allocation
page read and write
1CFB2350000
heap
page read and write
3529CFE000
stack
page read and write
21285D70000
trusted library allocation
page read and write
C42D77B000
stack
page read and write
21285D80000
trusted library allocation
page read and write
203B37A0000
heap
page read and write
1F2965B5000
heap
page read and write
EAAF878000
stack
page read and write
25546620000
heap
page read and write
3600000
heap
page read and write
25546610000
heap
page read and write
1F296740000
trusted library allocation
page read and write
16E9B917000
heap
page read and write
1F297170000
trusted library allocation
page read and write
2CAD2270000
heap
page read and write
2D89A064000
heap
page read and write
2D89A03E000
heap
page read and write
16E9B9AE000
heap
page read and write
203B3B13000
heap
page read and write
21285E61000
heap
page read and write
352A077000
stack
page read and write
2CAD245E000
heap
page read and write
597A000
trusted library allocation
page read and write
1F2965E0000
heap
page read and write
9DBB47B000
stack
page read and write
711000
heap
page read and write
435000
unkown
page read and write
16E9B308000
heap
page read and write
255467B0000
remote allocation
page read and write
212E4453000
heap
page read and write
24D6024B000
heap
page read and write
16E9B2AB000
heap
page read and write
2D89A802000
heap
page read and write
203B3A68000
heap
page read and write
24D60229000
heap
page read and write
E1A767E000
stack
page read and write
1B3DDC46000
heap
page read and write
7A2000
heap
page read and write
16E9B2A4000
heap
page read and write
212806AD000
heap
page read and write
1CFB243C000
heap
page read and write
16E9B999000
heap
page read and write
1B3DDBD0000
trusted library allocation
page read and write
203B3B00000
heap
page read and write
19F3CD02000
heap
page read and write
16E9B987000
heap
page read and write
C80000
heap
page read and write
16E9B200000
heap
page read and write
4D90000
trusted library allocation
page read and write
16E9B1E0000
trusted library allocation
page read and write
2CAD2429000
heap
page read and write
2D89A023000
heap
page read and write
9C2CFF000
stack
page read and write
1F296578000
heap
page read and write
212E4471000
heap
page read and write
21280F00000
heap
page read and write
1B3DDC4F000
heap
page read and write
1B3DDC80000
heap
page read and write
21285C74000
trusted library allocation
page read and write
251397E000
stack
page read and write
21280657000
heap
page read and write
894E87D000
stack
page read and write
78E000
heap
page read and write
16E9B915000
heap
page read and write
1B3DDC68000
heap
page read and write
28A1DD51000
heap
page read and write
1B3DDC47000
heap
page read and write
7C0000
heap
page read and write
2CAD244C000
heap
page read and write
16E9B99B000
heap
page read and write
21285F02000
heap
page read and write
25547002000
trusted library allocation
page read and write
19A000
stack
page read and write
9DBB27C000
stack
page read and write
16E9B98B000
heap
page read and write
9B5EF7F000
stack
page read and write
31B0000
trusted library allocation
page read and write
758000
heap
page read and write
203B3A57000
heap
page read and write
16E9B9CC000
heap
page read and write
21280700000
heap
page read and write
21280570000
heap
page read and write
1CFB2450000
heap
page read and write
4C62000
trusted library allocation
page read and write
2CAD23E0000
trusted library allocation
page read and write
16E9B24C000
heap
page read and write
EB07D7E000
stack
page read and write
1CFB2513000
heap
page read and write
212E4475000
heap
page read and write
1CFB2360000
heap
page read and write
16E9B98B000
heap
page read and write
16E9B271000
heap
page read and write
1F296510000
trusted library allocation
page read and write
737000
heap
page read and write
21285E2C000
heap
page read and write
16E9B989000
heap
page read and write
19F3CAC0000
heap
page read and write
28A1DD61000
heap
page read and write
2CAD2402000
heap
page read and write
212805D0000
heap
page read and write
21285EFF000
heap
page read and write
28A1DD36000
heap
page read and write
28A1DFE5000
heap
page read and write
5971000
trusted library allocation
page read and write
795000
heap
page read and write
860627F000
stack
page read and write
16E9BE18000
heap
page read and write
599C000
trusted library allocation
page read and write
1B3DD9A0000
heap
page read and write
21280700000
heap
page read and write
16E9B999000
heap
page read and write
78F000
heap
page read and write
21285D00000
trusted library allocation
page read and write
894E4FC000
stack
page read and write
24D6023C000
heap
page read and write
9DBB57E000
stack
page read and write
28A1DD48000
heap
page read and write
16E9B9C1000
heap
page read and write
8605F7F000
stack
page read and write
2513CF7000
stack
page read and write
21285C60000
trusted library allocation
page read and write
25546802000
heap
page read and write
9DBBD7E000
stack
page read and write
16E9B95F000
heap
page read and write
16E9B2F0000
heap
page read and write
5131000
trusted library allocation
page read and write
740000
heap
page read and write
1CFB23F0000
trusted library allocation
page read and write
16E9B9B7000
heap
page read and write
734E4000
unkown
page readonly
734E6000
unkown
page readonly
5993000
trusted library allocation
page read and write
894E67E000
stack
page read and write
7A1000
heap
page read and write
21285E40000
heap
page read and write
2513BF8000
stack
page read and write
2CAD248A000
heap
page read and write
36EE000
stack
page read and write
2D89A013000
heap
page read and write
25546902000
heap
page read and write
24D6025D000
heap
page read and write
2CAD2502000
heap
page read and write
7A1000
heap
page read and write
2CAD2508000
heap
page read and write
1CFB2456000
heap
page read and write
16E9B010000
heap
page read and write
21285D90000
remote allocation
page read and write
1CFB244E000
heap
page read and write
21285EE6000
heap
page read and write
795000
heap
page read and write
16E9B250000
heap
page read and write
408000
unkown
page readonly
21280691000
heap
page read and write
21280E02000
heap
page read and write
212E4380000
heap
page read and write
1B3DDC30000
heap
page read and write
24D6025F000
heap
page read and write
894E5FE000
stack
page read and write
16E9B99D000
heap
page read and write
2D89A029000
heap
page read and write
1B3DDC13000
heap
page read and write
21285EF7000
heap
page read and write
E1A78FD000
stack
page read and write
1B3DDC3E000
heap
page read and write
24D60262000
heap
page read and write
212E4508000
heap
page read and write
212E4C02000
trusted library allocation
page read and write
2128068E000
heap
page read and write
1B3DDC63000
heap
page read and write
1CFB246F000
heap
page read and write
6D0000
heap
page read and write
40A000
unkown
page read and write
1CFB2502000
heap
page read and write
2CAD2280000
heap
page read and write
751000
heap
page read and write
4D9E000
trusted library allocation
page read and write
There are 692 hidden memdumps, click here to show them.