IOC Report
SecuriteInfo.com.Suspicious.Win32.Save.a.5066.21910

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Suspicious.Win32.Save.a.5066.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Suspicious.Win32.Save.a.5066.exe.log
ASCII text, with CRLF line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Suspicious.Win32.Save.a.5066.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Suspicious.Win32.Save.a.5066.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
malicious

URLs

Name
IP
Malicious
http://mail.ocpi.com.my
unknown
malicious
http://127.0.0.1:HTTP/1.1
unknown
http://cs-g2-crl.thawte.com/ThawteCSG2.crl0
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://crl.thawte.com/ThawtePCA.crl0
unknown
http://ocsp.thawte.com0
unknown
http://DPVGsz.com
unknown
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
unknown
http://DynDns.comDynDNSnamejidpasswordPsi/Psi
unknown
https://api.ipify.org%%startupfolder%
unknown
http://crl.thawte.com/ThawtePremiumServerCA.crl0
unknown
https://www.thawte.com/cps0
unknown
https://api.ipify.org%
unknown
http://www.mozilla.com/0
unknown
There are 4 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.ocpi.com.my
220.158.200.104

IPs

IP
Domain
Country
Malicious
220.158.200.104
mail.ocpi.com.my
Malaysia

Memdumps

Base Address
Regiontype
Protect
Malicious
6921000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
4AAA000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
9B325FF000
stack
page read and write
24A5D876000
heap
page read and write
9B327FE000
stack
page read and write
8EA0000
trusted library allocation
page read and write
2A83E659000
heap
page read and write
A110000
trusted library allocation
page read and write
24A64000000
heap
page read and write
A110000
trusted library allocation
page read and write
7949000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
1D47B268000
heap
page read and write
9F20000
trusted library allocation
page read and write
A110000
trusted library allocation
page read and write
94F7E7E000
stack
page read and write
A110000
trusted library allocation
page read and write
8E41000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
9B326FE000
stack
page read and write
6900000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
232DF875000
heap
page read and write
9F20000
trusted library allocation
page read and write
1ECCEF02000
heap
page read and write
1ECCEE29000
heap
page read and write
9F20000
trusted library allocation
page read and write
9F21000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
25961068000
heap
page read and write
A300000
trusted library allocation
page execute and read and write
A280000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
2A83EE02000
trusted library allocation
page read and write
24A5D8FC000
heap
page read and write
A100000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A2C0000
trusted library allocation
page read and write
7BA0000
trusted library allocation
page read and write
A280000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A110000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
25960E10000
heap
page read and write
A100000
trusted library allocation
page read and write
232DF86A000
heap
page read and write
A270000
trusted library allocation
page read and write
9EA0000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
232DFF50000
trusted library allocation
page read and write
7BA8000
trusted library allocation
page read and write
232DF842000
heap
page read and write
2944C7F000
stack
page read and write
A100000
trusted library allocation
page read and write
A2D0000
trusted library allocation
page read and write
9DB3000
trusted library allocation
page read and write
25961900000
heap
page read and write
6C4D000
trusted library allocation
page read and write
24A62E00000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
2FE0000
trusted library allocation
page read and write
24A63057000
heap
page read and write
9F20000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
9DA6000
trusted library allocation
page read and write
4BC0000
heap
page read and write
301E000
stack
page read and write
9F20000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A105000
trusted library allocation
page read and write
24A5E820000
trusted library section
page readonly
9F20000
trusted library allocation
page read and write
4071000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
6900000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
232DF86B000
heap
page read and write
A110000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
24A630DD000
heap
page read and write
25961013000
heap
page read and write
3065B7F000
stack
page read and write
6BF6000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
232DF85F000
heap
page read and write
A110000
trusted library allocation
page read and write
A110000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
232DF874000
heap
page read and write
24A630A0000
heap
page read and write
A270000
trusted library allocation
page read and write
EB64DFE000
stack
page read and write
94F807E000
stack
page read and write
9F20000
trusted library allocation
page read and write
A270000
trusted library allocation
page read and write
306597B000
stack
page read and write
24A5E000000
heap
page read and write
1397D702000
heap
page read and write
A110000
trusted library allocation
page read and write
8E45000
trusted library allocation
page read and write
8D60000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
9F21000
trusted library allocation
page read and write
A2C0000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
4BD0000
trusted library allocation
page read and write
A275000
trusted library allocation
page read and write
A270000
trusted library allocation
page read and write
A270000
trusted library allocation
page read and write
A270000
trusted library allocation
page read and write
9F50000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A270000
trusted library allocation
page read and write
2D70000
trusted library allocation
page read and write
A270000
trusted library allocation
page read and write
232DF834000
heap
page read and write
10C0000
heap
page read and write
A270000
trusted library allocation
page read and write
7A5E000
stack
page read and write
232DF87A000
heap
page read and write
B42000
unkown
page readonly
6905000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
4B03000
heap
page read and write
25961024000
heap
page read and write
5B0000
remote allocation
page read and write
24A62BA0000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
259610C5000
heap
page read and write
A15000
heap
page read and write
6900000
trusted library allocation
page read and write
1397D658000
heap
page read and write
9B321FE000
stack
page read and write
24A630AF000
heap
page read and write
8EB0000
trusted library allocation
page read and write
8E60000
trusted library allocation
page read and write
9F1E000
unkown
page read and write
9F20000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
A270000
trusted library allocation
page read and write
24A5D8A0000
heap
page read and write
2A83E560000
heap
page read and write
9F20000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
9DA0000
trusted library allocation
page read and write
94BF8FF000
stack
page read and write
9F20000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
9B324FE000
stack
page read and write
2D34000
trusted library allocation
page read and write
2A83E702000
heap
page read and write
A270000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
232DF7F0000
heap
page read and write
A2D0000
trusted library allocation
page read and write
EB64EFD000
stack
page read and write
1ECCED90000
remote allocation
page read and write
24A5E158000
heap
page read and write
A110000
trusted library allocation
page read and write
24A5D670000
heap
page read and write
232DF840000
heap
page read and write
A270000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
1397D64D000
heap
page read and write
8EA0000
trusted library allocation
page read and write
2DBE000
stack
page read and write
9F20000
trusted library allocation
page read and write
24A63022000
heap
page read and write
7BD0000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
9B31E77000
stack
page read and write
9F20000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
4F27000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
24A5D902000
heap
page read and write
A280000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A110000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
1397D713000
heap
page read and write
232DF813000
heap
page read and write
8E60000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
1397D67B000
heap
page read and write
9F20000
trusted library allocation
page read and write
1397D629000
heap
page read and write
A100000
trusted library allocation
page read and write
9F21000
trusted library allocation
page read and write
1397D63C000
heap
page read and write
A100000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
9EA0000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
A275000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A110000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
2D47000
trusted library allocation
page execute and read and write
8EA0000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A270000
trusted library allocation
page read and write
8F8000
stack
page read and write
24A63000000
heap
page read and write
4C1B000
trusted library allocation
page execute and read and write
8F70000
heap
page read and write
8E50000
trusted library allocation
page read and write
9F6E000
stack
page read and write
4EF0000
trusted library allocation
page read and write
4C12000
trusted library allocation
page read and write
A440000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
EB64FFD000
stack
page read and write
1D47B313000
heap
page read and write
24A630F5000
heap
page read and write
A110000
trusted library allocation
page read and write
24A5D87A000
heap
page read and write
232E0002000
trusted library allocation
page read and write
4F1B000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
6900000
trusted library allocation
page read and write
4B66000
heap
page read and write
94F7BFC000
stack
page read and write
9F20000
trusted library allocation
page read and write
24A62D60000
trusted library allocation
page read and write
A270000
trusted library allocation
page read and write
294527E000
stack
page read and write
A270000
trusted library allocation
page read and write
232DF85C000
heap
page read and write
24A62B90000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
A110000
trusted library allocation
page read and write
24A62E90000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
A116000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
24A6302F000
heap
page read and write
4C30000
trusted library allocation
page read and write
1ECCEE02000
heap
page read and write
2A83E63C000
heap
page read and write
68F0000
trusted library allocation
page read and write
94BFAFB000
stack
page read and write
9B329FE000
stack
page read and write
6900000
trusted library allocation
page read and write
9DCD000
trusted library allocation
page read and write
9B322FA000
stack
page read and write
30E2000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
2944A7C000
stack
page read and write
94BFDFE000
stack
page read and write
A100000
trusted library allocation
page read and write
259610E2000
heap
page read and write
A100000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
24A6309E000
heap
page read and write
2E90000
heap
page read and write
A270000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
6900000
trusted library allocation
page read and write
926E000
stack
page read and write
9F20000
trusted library allocation
page read and write
A116000
trusted library allocation
page read and write
A2B5000
trusted library allocation
page read and write
A110000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A0F0000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
4F00000
heap
page read and write
2944B7E000
stack
page read and write
94F7EFE000
stack
page read and write
9F21000
trusted library allocation
page read and write
E3C000
stack
page read and write
A100000
trusted library allocation
page read and write
232DF86F000
heap
page read and write
1ECCEE40000
heap
page read and write
6905000
trusted library allocation
page read and write
94BF47C000
stack
page read and write
24A5E015000
heap
page read and write
1397D726000
heap
page read and write
A280000
trusted library allocation
page read and write
2A83E700000
heap
page read and write
400000
remote allocation
page execute and read and write
1397D613000
heap
page read and write
A110000
trusted library allocation
page read and write
9EA0000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
3060000
heap
page execute and read and write
A270000
trusted library allocation
page read and write
1480000
heap
page read and write
A2C0000
trusted library allocation
page read and write
9C80000
trusted library allocation
page read and write
294507F000
stack
page read and write
C7C9C7F000
stack
page read and write
A270000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
1120000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A280000
trusted library allocation
page read and write
8E70000
trusted library allocation
page read and write
7BB0000
trusted library allocation
page read and write
A110000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
A2F0000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
A275000
trusted library allocation
page read and write
A2C0000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
A275000
trusted library allocation
page read and write
4F24000
trusted library allocation
page read and write
A108000
trusted library allocation
page read and write
A2A0000
trusted library allocation
page read and write
1D47B271000
heap
page read and write
A40E000
stack
page read and write
A110000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A275000
trusted library allocation
page read and write
306567C000
stack
page read and write
1D47B302000
heap
page read and write
9DDA000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
1D47B030000
heap
page read and write
9F20000
trusted library allocation
page read and write
24A630F5000
heap
page read and write
A270000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
9B320FA000
stack
page read and write
6905000
trusted library allocation
page read and write
1170000
heap
page read and write
3020000
trusted library allocation
page read and write
94BFEFF000
stack
page read and write
24A63064000
heap
page read and write
9F20000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
6905000
trusted library allocation
page read and write
A2D0000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
24A5D83D000
heap
page read and write
232DF864000
heap
page read and write
5B0000
remote allocation
page read and write
25961802000
heap
page read and write
307D000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
8E40000
unkown
page read and write
24A62C10000
trusted library allocation
page read and write
94BFCFE000
stack
page read and write
232DF861000
heap
page read and write
8EA0000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
24A5E810000
trusted library section
page readonly
FFC20000
trusted library allocation
page execute and read and write
A275000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
A2C0000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
A280000
trusted library allocation
page read and write
A270000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
2A83E602000
heap
page read and write
8E50000
trusted library allocation
page read and write
A2B0000
trusted library allocation
page execute and read and write
9F20000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
2D2E000
stack
page read and write
1397D66A000
heap
page read and write
9F20000
trusted library allocation
page read and write
1ECCF602000
trusted library allocation
page read and write
232DF865000
heap
page read and write
232DF780000
heap
page read and write
8EB0000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
8E41000
trusted library allocation
page read and write
4BA9000
heap
page read and write
400000
remote allocation
page execute and read and write
A270000
trusted library allocation
page read and write
2D40000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
A275000
trusted library allocation
page read and write
25961113000
heap
page read and write
9F20000
trusted library allocation
page read and write
A270000
trusted library allocation
page read and write
9B323FB000
stack
page read and write
9F20000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
24A5D926000
heap
page read and write
A140000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
294456F000
stack
page read and write
24A5D89E000
heap
page read and write
24A62E60000
trusted library allocation
page read and write
1D47B202000
heap
page read and write
9F20000
trusted library allocation
page read and write
4F2D000
trusted library allocation
page read and write
94BF97C000
stack
page read and write
A100000
trusted library allocation
page read and write
A270000
trusted library allocation
page read and write
C7C910C000
stack
page read and write
1ECCED60000
trusted library allocation
page read and write
4EDD000
stack
page read and write
A280000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
A290000
trusted library allocation
page read and write
24A62D30000
trusted library allocation
page read and write
8DDE000
stack
page read and write
6838000
trusted library allocation
page read and write
24A62E40000
trusted library allocation
page read and write
2944E7D000
stack
page read and write
6900000
trusted library allocation
page read and write
24A5E100000
heap
page read and write
9F20000
trusted library allocation
page read and write
1474000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
C7C967F000
stack
page read and write
8E50000
trusted library allocation
page read and write
9DCD000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
4C17000
trusted library allocation
page execute and read and write
9F20000
trusted library allocation
page read and write
A298000
trusted library allocation
page read and write
232DF83A000
heap
page read and write
A110000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
24A5D871000
heap
page read and write
8DF0000
heap
page read and write
A2F0000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A070000
trusted library allocation
page read and write
A290000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
1ECCED90000
remote allocation
page read and write
24A63050000
heap
page read and write
24A62E90000
remote allocation
page read and write
7BA5000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
2596102A000
heap
page read and write
C7C9BFF000
stack
page read and write
6C51000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
F38000
stack
page read and write
24A5D7D0000
trusted library allocation
page read and write
294517E000
stack
page read and write
8E50000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A2C0000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
55B7000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
1160000
heap
page read and write
9F20000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A270000
trusted library allocation
page read and write
113B000
heap
page read and write
5B0000
remote allocation
page read and write
2F9E000
stack
page read and write
1397D580000
trusted library allocation
page read and write
55BE000
trusted library allocation
page read and write
92F0000
trusted library allocation
page execute and read and write
232DF860000
heap
page read and write
232DF858000
heap
page read and write
A100000
trusted library allocation
page read and write
9DCD000
trusted library allocation
page read and write
A290000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
4AF6000
heap
page read and write
A280000
trusted library allocation
page read and write
232DF826000
heap
page read and write
7BC0000
trusted library allocation
page read and write
7BA3000
trusted library allocation
page read and write
8E3E000
stack
page read and write
9F20000
trusted library allocation
page read and write
1ECCEC00000
heap
page read and write
2596108A000
heap
page read and write
8E40000
trusted library allocation
page read and write
2FDE000
stack
page read and write
9F20000
trusted library allocation
page read and write
A270000
trusted library allocation
page read and write
24A62E80000
trusted library allocation
page read and write
A270000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A270000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
9F30000
trusted library allocation
page read and write
24A5D6D0000
heap
page read and write
9EA0000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
24A5D660000
heap
page read and write
4B9C000
heap
page read and write
24A62E90000
remote allocation
page read and write
1397DE02000
trusted library allocation
page read and write
25960F80000
trusted library allocation
page read and write
4C15000
trusted library allocation
page execute and read and write
A110000
trusted library allocation
page read and write
1D47B090000
heap
page read and write
A140000
trusted library allocation
page read and write
BA0000
heap
page read and write
A270000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
C7C98FA000
stack
page read and write
4C0A000
trusted library allocation
page execute and read and write
A100000
trusted library allocation
page read and write
94F837E000
stack
page read and write
9F20000
trusted library allocation
page read and write
516E000
stack
page read and write
A120000
trusted library allocation
page execute and read and write
9F20000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
2944F7F000
stack
page read and write
EB64AFE000
stack
page read and write
A110000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
A280000
trusted library allocation
page read and write
24A5E113000
heap
page read and write
9F40000
trusted library allocation
page read and write
1D47B229000
heap
page read and write
8E40000
trusted library allocation
page read and write
24A5D913000
heap
page read and write
8E95000
trusted library allocation
page read and write
1ECCED90000
remote allocation
page read and write
A100000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A270000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
24A5D88A000
heap
page read and write
9F20000
trusted library allocation
page read and write
A2D0000
trusted library allocation
page read and write
C7C99FF000
stack
page read and write
9F20000
trusted library allocation
page read and write
3000000
trusted library allocation
page read and write
9F30000
trusted library allocation
page read and write
4F2A000
trusted library allocation
page read and write
C7C977B000
stack
page read and write
682E000
stack
page read and write
232DF84D000
heap
page read and write
8E40000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
8E60000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
259610BC000
heap
page read and write
7B9E000
stack
page read and write
25961066000
heap
page read and write
2A83E600000
heap
page read and write
A280000
trusted library allocation
page read and write
2E60000
trusted library allocation
page execute and read and write
2A83E62A000
heap
page read and write
232DF86D000
heap
page read and write
3071000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
1D47BA02000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A270000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
A2B0000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
4C00000
trusted library allocation
page read and write
24A5D88C000
heap
page read and write
9F20000
trusted library allocation
page read and write
8DF3000
heap
page read and write
8E50000
trusted library allocation
page read and write
A2C0000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
259610CD000
heap
page read and write
A270000
trusted library allocation
page read and write
24A5E800000
trusted library section
page readonly
232DF862000
heap
page read and write
A410000
trusted library allocation
page read and write
24A5D857000
heap
page read and write
9F0000
trusted library allocation
page read and write
8EB6000
trusted library allocation
page read and write
24A62D3E000
trusted library allocation
page read and write
8A1D000
stack
page read and write
10AE000
stack
page read and write
A2A0000
trusted library allocation
page read and write
916E000
stack
page read and write
9F20000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
7921000
trusted library allocation
page read and write
1D47B190000
trusted library allocation
page read and write
25960E20000
heap
page read and write
A270000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
232DF87E000
heap
page read and write
6905000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
1D47B261000
heap
page read and write
232DF859000
heap
page read and write
9F20000
trusted library allocation
page read and write
A270000
trusted library allocation
page read and write
2596103E000
heap
page read and write
A100000
trusted library allocation
page read and write
24A5E118000
heap
page read and write
5B0000
remote allocation
page read and write
8EB0000
trusted library allocation
page read and write
5B0000
remote allocation
page read and write
2FF0000
trusted library allocation
page read and write
9F2C000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
24A5E7F0000
trusted library section
page readonly
A103000
trusted library allocation
page read and write
232DF831000
heap
page read and write
232DF829000
heap
page read and write
4F41000
trusted library allocation
page read and write
4C50000
heap
page read and write
8EB0000
trusted library allocation
page read and write
9B31C7C000
stack
page read and write
9F20000
trusted library allocation
page read and write
1D47B213000
heap
page read and write
9F20000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A275000
trusted library allocation
page read and write
EB64D7D000
stack
page read and write
4B36000
heap
page read and write
A100000
trusted library allocation
page read and write
A2E0000
trusted library allocation
page read and write
6C37000
trusted library allocation
page read and write
24A5E102000
heap
page read and write
98FF000
stack
page read and write
9F20000
trusted library allocation
page read and write
232DF863000
heap
page read and write
4F22000
trusted library allocation
page read and write
A101000
trusted library allocation
page read and write
24A630F3000
heap
page read and write
55C0000
trusted library allocation
page read and write
4F3C000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
1ECCEE13000
heap
page read and write
9F20000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A275000
trusted library allocation
page read and write
A2C0000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
232DF872000
heap
page read and write
9EA0000
trusted library allocation
page read and write
1397D700000
heap
page read and write
9F20000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
232DF845000
heap
page read and write
9F20000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
A5F0000
heap
page read and write
520000
trusted library allocation
page readonly
232DF849000
heap
page read and write
1ECCEBF0000
heap
page read and write
24A63102000
heap
page read and write
9F20000
trusted library allocation
page read and write
24A5E118000
heap
page read and write
9EDE000
stack
page read and write
A410000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
94BF67C000
stack
page read and write
9F20000
trusted library allocation
page read and write
142E000
stack
page read and write
A2AE000
stack
page read and write
48D5000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
A2A0000
trusted library allocation
page read and write
94F817E000
stack
page read and write
9F20000
trusted library allocation
page read and write
1159000
heap
page read and write
1040000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
3065A7B000
stack
page read and write
A100000
trusted library allocation
page read and write
EB6487B000
stack
page read and write
2D5B000
trusted library allocation
page execute and read and write
6900000
trusted library allocation
page read and write
1060000
heap
page read and write
68F0000
trusted library allocation
page read and write
A2D0000
trusted library allocation
page read and write
4875000
trusted library allocation
page read and write
232DF856000
heap
page read and write
9F20000
trusted library allocation
page read and write
A270000
trusted library allocation
page read and write
3079000
trusted library allocation
page read and write
8F71000
heap
page read and write
1D47B287000
heap
page read and write
232DF868000
heap
page read and write
1397D480000
heap
page read and write
A270000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
9B5D000
stack
page read and write
4EE0000
trusted library allocation
page execute and read and write
A110000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
24A62E90000
remote allocation
page read and write
24A62D74000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
1D47B26E000
heap
page read and write
A100000
trusted library allocation
page read and write
294537F000
stack
page read and write
A06D000
stack
page read and write
A100000
trusted library allocation
page read and write
24A63100000
heap
page read and write
EB64C7E000
stack
page read and write
24A5EB90000
trusted library allocation
page read and write
1D47B23D000
heap
page read and write
8E50000
trusted library allocation
page read and write
232DF855000
heap
page read and write
7BA0000
trusted library allocation
page read and write
24A62D51000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
A275000
trusted library allocation
page read and write
2D30000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
A292000
trusted library allocation
page read and write
2FE0000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
A110000
trusted library allocation
page read and write
9DF4000
trusted library allocation
page read and write
232DF87B000
heap
page read and write
9F20000
trusted library allocation
page read and write
259610CB000
heap
page read and write
8EB0000
trusted library allocation
page read and write
EB649FE000
stack
page read and write
232DF873000
heap
page read and write
9F20000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
510000
heap
page read and write
8EB0000
trusted library allocation
page read and write
4ADA000
heap
page read and write
55B0000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
2A83E653000
heap
page read and write
A270000
trusted library allocation
page read and write
2A83E5D0000
heap
page read and write
A130000
trusted library allocation
page read and write
4BE4000
trusted library allocation
page read and write
9DDA000
trusted library allocation
page read and write
1130000
heap
page read and write
A110000
trusted library allocation
page read and write
25960E80000
heap
page read and write
A270000
trusted library allocation
page read and write
24A5D828000
heap
page read and write
232DF83C000
heap
page read and write
110E000
stack
page read and write
9F20000
trusted library allocation
page read and write
A10000
heap
page read and write
A270000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A275000
trusted library allocation
page read and write
8EB0000
trusted library allocation
page read and write
A101000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
24A63014000
heap
page read and write
A430000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
4E9E000
stack
page read and write
2944D7D000
stack
page read and write
A420000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
1D47B020000
heap
page read and write
A280000
trusted library allocation
page read and write
A130000
trusted library allocation
page read and write
9F30000
trusted library allocation
page read and write
2A83E643000
heap
page read and write
8EA0000
trusted library allocation
page read and write
1ECCEC60000
heap
page read and write
1397D420000
heap
page read and write
9F20000
trusted library allocation
page read and write
A290000
trusted library allocation
page read and write
C7C957B000
stack
page read and write
24A5D893000
heap
page read and write
24A630EE000
heap
page read and write
8E50000
trusted library allocation
page read and write
24A62D70000
trusted library allocation
page read and write
6C39000
trusted library allocation
page read and write
25961102000
heap
page read and write
2A83ED30000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
132F000
stack
page read and write
9F20000
trusted library allocation
page read and write
1397D600000
heap
page read and write
8EB0000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
6900000
trusted library allocation
page read and write
232DF800000
heap
page read and write
A100000
trusted library allocation
page read and write
A130000
trusted library allocation
page read and write
55D0000
heap
page execute and read and write
8D9E000
stack
page read and write
4BF0000
trusted library allocation
page read and write
1397D602000
heap
page read and write
9B3267F000
stack
page read and write
9F20000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
24A5E623000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A290000
trusted library allocation
page read and write
232DF857000
heap
page read and write
2A83E713000
heap
page read and write
9B3247E000
stack
page read and write
3020000
trusted library allocation
page read and write
2FE0000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
EB64B7E000
stack
page read and write
24A5E830000
trusted library section
page readonly
A410000
trusted library allocation
page read and write
24A630FD000
heap
page read and write
A120000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
A100000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A26E000
stack
page read and write
24A62D50000
trusted library allocation
page read and write
A430000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
24A62C20000
trusted library allocation
page read and write
6905000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
24A5D82A000
heap
page read and write
9F20000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
8EB1000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A270000
trusted library allocation
page read and write
305E000
stack
page read and write
A16E000
stack
page read and write
4F35000
trusted library allocation
page read and write
1473000
trusted library allocation
page execute and read and write
24A63049000
heap
page read and write
9B3257E000
stack
page read and write
A270000
trusted library allocation
page read and write
6905000
trusted library allocation
page read and write
6C3F000
trusted library allocation
page read and write
1D47B25A000
heap
page read and write
A100000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
9C90000
trusted library allocation
page read and write
24A630F8000
heap
page read and write
A110000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A270000
trusted library allocation
page read and write
A2C0000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
9DF1000
trusted library allocation
page read and write
A2B0000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
9DE9000
trusted library allocation
page read and write
24A63043000
heap
page read and write
A100000
trusted library allocation
page read and write
9F21000
trusted library allocation
page read and write
4C10000
trusted library allocation
page read and write
24A5E620000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
3020000
trusted library allocation
page read and write
2E80000
trusted library allocation
page read and write
A2B0000
trusted library allocation
page read and write
94BF7FF000
stack
page read and write
6905000
trusted library allocation
page read and write
2D50000
trusted library allocation
page read and write
9C60000
trusted library allocation
page read and write
4B05000
heap
page read and write
9F20000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
24A62D60000
trusted library allocation
page read and write
9B31FFA000
stack
page read and write
A2D0000
trusted library allocation
page read and write
A270000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
6BF9000
trusted library allocation
page read and write
92AD000
stack
page read and write
4F10000
trusted library allocation
page read and write
58B000
stack
page read and write
5B0000
remote allocation
page read and write
A275000
trusted library allocation
page read and write
24A62D30000
trusted library allocation
page read and write
55AE000
stack
page read and write
A100000
trusted library allocation
page read and write
7A9E000
stack
page read and write
118C000
heap
page read and write
7974000
trusted library allocation
page read and write
24A62E70000
trusted library allocation
page read and write
1ECCEE00000
heap
page read and write
C7C9AFF000
stack
page read and write
24A5D813000
heap
page read and write
9F20000
trusted library allocation
page read and write
1ECCEE51000
heap
page read and write
94F827E000
stack
page read and write
9DDA000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
24A62E50000
trusted library allocation
page read and write
4C02000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
4AD0000
heap
page read and write
9F20000
trusted library allocation
page read and write
A280000
trusted library allocation
page read and write
4BFD000
trusted library allocation
page execute and read and write
24A5D7E0000
trusted library section
page read and write
24A63102000
heap
page read and write
1397D677000
heap
page read and write
92B0000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
B40000
unkown
page readonly
A10A000
trusted library allocation
page read and write
232DF879000
heap
page read and write
9F20000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
24A5E002000
heap
page read and write
232DF841000
heap
page read and write
55CA000
trusted library allocation
page read and write
232DF85A000
heap
page read and write
146E000
stack
page read and write
8EB0000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
5B0000
remote allocation
page read and write
9F20000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
2E80000
trusted library allocation
page read and write
1D47B200000
heap
page read and write
24A5E710000
trusted library allocation
page read and write
94BFA7C000
stack
page read and write
232DF87D000
heap
page read and write
4BE3000
trusted library allocation
page execute and read and write
2D4A000
trusted library allocation
page execute and read and write
A100000
trusted library allocation
page read and write
9EA0000
trusted library allocation
page read and write
4B58000
heap
page read and write
A100000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
C7C97FE000
stack
page read and write
6910000
heap
page execute and read and write
9F20000
trusted library allocation
page read and write
8EC0000
heap
page execute and read and write
6900000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
29448FB000
stack
page read and write
232DF902000
heap
page read and write
A2C0000
trusted library allocation
page read and write
118E000
heap
page read and write
2A83E643000
heap
page read and write
9F20000
trusted library allocation
page read and write
1397D410000
heap
page read and write
8EB0000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
25961000000
heap
page read and write
24A5E840000
trusted library section
page readonly
9F20000
trusted library allocation
page read and write
A130000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
A110000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
2D57000
trusted library allocation
page execute and read and write
A2E0000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
2FE4000
trusted library allocation
page read and write
A140000
trusted library allocation
page read and write
3065C7E000
stack
page read and write
8E80000
trusted library allocation
page execute and read and write
1D47B263000
heap
page read and write
A100000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
119C000
heap
page read and write
9DA6000
trusted library allocation
page read and write
A270000
trusted library allocation
page read and write
2596106E000
heap
page read and write
A2D0000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
8E47000
trusted library allocation
page read and write
9C70000
trusted library allocation
page read and write
24A5D800000
heap
page read and write
A2E0000
trusted library allocation
page read and write
4C06000
trusted library allocation
page execute and read and write
9F20000
trusted library allocation
page read and write
4BC0000
heap
page read and write
24A62D54000
trusted library allocation
page read and write
5B0000
remote allocation
page read and write
232DF790000
heap
page read and write
94BFBFD000
stack
page read and write
4F80000
heap
page read and write
A110000
trusted library allocation
page read and write
232DF884000
heap
page read and write
24A62D38000
trusted library allocation
page read and write
24A5D88E000
heap
page read and write
9F20000
trusted library allocation
page read and write
A280000
trusted library allocation
page read and write
9F20000
trusted library allocation
page read and write
2A83ED50000
trusted library allocation
page read and write
2A83E613000
heap
page read and write
68D0000
heap
page read and write
8EA0000
trusted library allocation
page read and write
A130000
trusted library allocation
page read and write
29444EC000
stack
page read and write
2A83E570000
heap
page read and write
A100000
trusted library allocation
page read and write
A270000
trusted library allocation
page read and write
9EA0000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
A28E000
trusted library allocation
page read and write
4BED000
trusted library allocation
page execute and read and write
24A5E601000
trusted library allocation
page read and write
A275000
trusted library allocation
page read and write
9DA3000
trusted library allocation
page read and write
There are 1050 hidden memdumps, click here to show them.