IOC Report
SecuriteInfo.com.Trojan.MulDropNET.68.25303.2606.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.MulDropNET.68.25303.2606.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmpD46C.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\tXBTtgndxsp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Trojan.MulDropNET.68.25303.2606.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\tXBTtgndxsp.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3fuehawq.v5v.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cfcc231m.bdy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m0af0yr3.l2b.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z5t5ijhw.djf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpE610.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\tXBTtgndxsp.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDropNET.68.25303.2606.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDropNET.68.25303.2606.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\tXBTtgndxsp.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tXBTtgndxsp" /XML "C:\Users\user\AppData\Local\Temp\tmpD46C.tmp"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDropNET.68.25303.2606.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDropNET.68.25303.2606.exe"
malicious
C:\Users\user\AppData\Roaming\tXBTtgndxsp.exe
C:\Users\user\AppData\Roaming\tXBTtgndxsp.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tXBTtgndxsp" /XML "C:\Users\user\AppData\Local\Temp\tmpE610.tmp"
malicious
C:\Users\user\AppData\Roaming\tXBTtgndxsp.exe
"C:\Users\user\AppData\Roaming\tXBTtgndxsp.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k LocalService -s W32Time
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.12.205
https://api.ipify.org
unknown
https://sectigo.com/CPS0
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://ocsp.comodo
unknown
http://nl9.nlkoddos.com
unknown

Domains

Name
IP
Malicious
nl9.nlkoddos.com
89.249.49.141
malicious
api.ipify.org
104.26.12.205
time.windows.com
unknown

IPs

IP
Domain
Country
Malicious
89.249.49.141
nl9.nlkoddos.com
Russian Federation
malicious
104.26.12.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tXBTtgndxsp_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tXBTtgndxsp_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tXBTtgndxsp_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tXBTtgndxsp_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tXBTtgndxsp_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tXBTtgndxsp_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tXBTtgndxsp_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tXBTtgndxsp_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tXBTtgndxsp_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tXBTtgndxsp_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tXBTtgndxsp_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tXBTtgndxsp_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tXBTtgndxsp_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tXBTtgndxsp_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349
Blob
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\W32Time\Config
LastKnownGoodTime
There are 24 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2EED000
trusted library allocation
page read and write
malicious
2EE5000
trusted library allocation
page read and write
malicious
393E000
trusted library allocation
page read and write
malicious
426000
remote allocation
page execute and read and write
malicious
2EC1000
trusted library allocation
page read and write
malicious
3805000
trusted library allocation
page read and write
5040000
trusted library allocation
page read and write
2510000
trusted library allocation
page read and write
73BA000
trusted library allocation
page read and write
7600000
trusted library allocation
page read and write
7740000
trusted library allocation
page read and write
BED000
trusted library allocation
page read and write
6600000
heap
page read and write
FA3000
trusted library allocation
page execute and read and write
569D000
stack
page read and write
2EBD000
trusted library allocation
page read and write
77C4000
trusted library allocation
page read and write
4DDD000
stack
page read and write
7357000
trusted library allocation
page read and write
2BBE000
stack
page read and write
77E6000
trusted library allocation
page read and write
6EE21000
unkown
page execute read
24E0000
trusted library allocation
page read and write
954D000
heap
page read and write
1E83E9F0000
heap
page read and write
483C000
stack
page read and write
DEE000
stack
page read and write
73FC000
trusted library allocation
page read and write
6C6D000
stack
page read and write
7F40000
trusted library allocation
page read and write
2E02000
trusted library allocation
page read and write
71FD000
trusted library allocation
page read and write
7321000
trusted library allocation
page read and write
2F9B000
heap
page read and write
6D40000
heap
page read and write
6C24000
trusted library allocation
page read and write
2EB9000
trusted library allocation
page read and write
600E000
stack
page read and write
83AE000
stack
page read and write
B7E000
stack
page read and write
7F4A000
trusted library allocation
page read and write
77B8000
trusted library allocation
page read and write
3ECE000
trusted library allocation
page read and write
60FE000
stack
page read and write
7F22000
trusted library allocation
page read and write
9534000
heap
page read and write
6EFC000
stack
page read and write
6D50000
trusted library section
page read and write
FD7000
trusted library allocation
page execute and read and write
68E0000
heap
page read and write
327F000
unkown
page read and write
677E000
stack
page read and write
739B000
trusted library allocation
page read and write
FAD000
trusted library allocation
page execute and read and write
412000
remote allocation
page execute and read and write
24C0000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
2E79000
trusted library allocation
page read and write
25D0000
trusted library allocation
page read and write
7B6C000
stack
page read and write
C17000
heap
page read and write
BE1000
trusted library allocation
page read and write
80DE000
stack
page read and write
7851000
trusted library allocation
page read and write
311F000
trusted library allocation
page read and write
6710000
trusted library allocation
page execute and read and write
3DF2000
trusted library allocation
page read and write
3F5B000
trusted library allocation
page read and write
2EE3000
trusted library allocation
page read and write
9B6C000
stack
page read and write
1305000
trusted library allocation
page execute and read and write
2C87000
trusted library allocation
page read and write
4A70000
trusted library allocation
page read and write
57C0000
trusted library allocation
page read and write
5FB0000
heap
page read and write
5260000
heap
page read and write
72EE000
trusted library allocation
page read and write
323E000
unkown
page read and write
9F0000
heap
page read and write
2C98000
trusted library allocation
page read and write
9489000
heap
page read and write
425000
remote allocation
page execute and read and write
1380000
heap
page read and write
2CF8000
trusted library allocation
page read and write
31A5000
trusted library allocation
page read and write
25AD000
trusted library allocation
page execute and read and write
7370000
trusted library allocation
page read and write
772B000
trusted library allocation
page read and write
7331000
trusted library allocation
page read and write
25C6000
trusted library allocation
page execute and read and write
77D5000
trusted library allocation
page read and write
2DA4000
heap
page read and write
3058000
trusted library allocation
page read and write
77EA000
trusted library allocation
page read and write
9588000
heap
page read and write
4D30000
heap
page read and write
77B0000
trusted library allocation
page read and write
777D000
trusted library allocation
page read and write
2E16000
trusted library allocation
page read and write
7757000
trusted library allocation
page read and write
2750000
heap
page read and write
784D000
trusted library allocation
page read and write
24D0000
trusted library allocation
page read and write
6A8E000
stack
page read and write
B49C000
stack
page read and write
E98000
heap
page read and write
73C8000
trusted library allocation
page read and write
94E0000
heap
page read and write
9506000
heap
page read and write
311B000
trusted library allocation
page read and write
460000
unkown
page readonly
302C000
trusted library allocation
page read and write
9586000
heap
page read and write
12D0000
trusted library allocation
page read and write
462000
unkown
page readonly
31D5000
trusted library allocation
page read and write
2BD2000
trusted library allocation
page read and write
7E70000
heap
page read and write
FC2000
trusted library allocation
page read and write
5EFC000
stack
page read and write
72C8000
trusted library allocation
page read and write
2761000
trusted library allocation
page read and write
8A4000
heap
page read and write
680E000
stack
page read and write
2AB0000
heap
page read and write
3025000
trusted library allocation
page read and write
955A000
heap
page read and write
AE0000
heap
page read and write
7B0000
trusted library allocation
page read and write
772D000
trusted library allocation
page read and write
70E0000
trusted library allocation
page execute and read and write
38CE000
trusted library allocation
page read and write
5EBF000
stack
page read and write
1300000
trusted library allocation
page read and write
2EBC000
trusted library allocation
page read and write
69F0000
trusted library allocation
page execute and read and write
7D7000
trusted library allocation
page execute and read and write
BE6000
trusted library allocation
page read and write
1040000
heap
page read and write
7CA000
trusted library allocation
page execute and read and write
6BEE000
stack
page read and write
B39C000
stack
page read and write
6AEE000
stack
page read and write
1E83EA2B000
heap
page read and write
C00000
trusted library allocation
page read and write
9BAE000
stack
page read and write
3D6E000
trusted library allocation
page read and write
7790000
trusted library allocation
page read and write
30C5000
trusted library allocation
page read and write
7AD000
trusted library allocation
page execute and read and write
6418000
heap
page read and write
4D05000
trusted library allocation
page read and write
77E8000
trusted library allocation
page read and write
740D000
trusted library allocation
page read and write
310A000
trusted library allocation
page read and write
94E9000
heap
page read and write
532E000
stack
page read and write
1E83EA4A000
heap
page read and write
6A8D000
stack
page read and write
2D6C000
stack
page read and write
7232000
trusted library allocation
page read and write
FE7000
heap
page read and write
AF6000
heap
page read and write
37B7000
trusted library allocation
page read and write
2A94000
trusted library allocation
page read and write
65FE000
stack
page read and write
1000000
heap
page read and write
4AFB000
stack
page read and write
3895000
trusted library allocation
page read and write
6C10000
trusted library allocation
page read and write
1387000
heap
page read and write
BD7000
heap
page read and write
6A40000
trusted library allocation
page read and write
AFDE000
stack
page read and write
768C000
trusted library allocation
page read and write
2E0E000
trusted library allocation
page read and write
27B2000
trusted library allocation
page read and write
787B000
trusted library allocation
page read and write
78DE000
trusted library allocation
page read and write
784F000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
4D90000
heap
page read and write
3FBB000
trusted library allocation
page read and write
3090000
heap
page read and write
FA0000
trusted library allocation
page read and write
6730000
trusted library allocation
page read and write
2E4F000
trusted library allocation
page read and write
7F1D000
trusted library allocation
page read and write
2BCB000
trusted library allocation
page read and write
91E000
heap
page read and write
6F7E000
stack
page read and write
D3C000
stack
page read and write
4DA0000
trusted library allocation
page execute and read and write
951BC7E000
stack
page read and write
1360000
heap
page read and write
4CBB000
trusted library allocation
page read and write
951B50B000
stack
page read and write
1047000
heap
page read and write
8449000
trusted library allocation
page read and write
4B30000
trusted library allocation
page execute and read and write
1E83EA40000
heap
page read and write
2FAA000
trusted library allocation
page read and write
8FE000
heap
page read and write
30FE000
trusted library allocation
page read and write
951BA7F000
stack
page read and write
3220000
heap
page read and write
72B1000
trusted library allocation
page read and write
77B4000
trusted library allocation
page read and write
77BE000
trusted library allocation
page read and write
721F000
trusted library allocation
page read and write
6732000
trusted library allocation
page read and write
844E000
trusted library allocation
page read and write
F03000
heap
page read and write
3D2E000
trusted library allocation
page read and write
2E7D000
stack
page read and write
4F30000
heap
page read and write
2BDE000
trusted library allocation
page read and write
81DE000
stack
page read and write
402000
remote allocation
page execute and read and write
A9AE000
stack
page read and write
6CFE000
stack
page read and write
2D74000
trusted library allocation
page read and write
6A4E000
stack
page read and write
274E000
stack
page read and write
604E000
stack
page read and write
7F3B000
trusted library allocation
page read and write
D90000
heap
page read and write
91FB000
trusted library allocation
page read and write
479E000
stack
page read and write
944000
heap
page read and write
B5E000
stack
page read and write
2FE1000
trusted library allocation
page read and write
765B000
trusted library allocation
page read and write
12DD000
trusted library allocation
page execute and read and write
77EE000
trusted library allocation
page read and write
5FFD000
stack
page read and write
735B000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
7EE4000
heap
page read and write
2BED000
trusted library allocation
page read and write
77C2000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
83E000
stack
page read and write
727A000
trusted library allocation
page read and write
5170000
heap
page read and write
94CE000
stack
page read and write
EC4000
heap
page read and write
4D00000
trusted library allocation
page read and write
729E000
trusted library allocation
page read and write
70E000
stack
page read and write
1010000
trusted library allocation
page execute and read and write
FD2000
trusted library allocation
page read and write
850000
heap
page read and write
7847000
trusted library allocation
page read and write
766A000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
5180000
heap
page read and write
900000
heap
page read and write
7759000
trusted library allocation
page read and write
371E000
trusted library allocation
page read and write
2EBA000
stack
page read and write
4CF0000
trusted library allocation
page read and write
779F000
trusted library allocation
page read and write
7301000
trusted library allocation
page read and write
953000
heap
page read and write
5010000
trusted library allocation
page execute and read and write
6C20000
trusted library allocation
page read and write
2E1D000
trusted library allocation
page read and write
2CF0000
trusted library allocation
page read and write
4D40000
trusted library allocation
page read and write
7B3000
trusted library allocation
page read and write
81F4000
heap
page read and write
6EE20000
unkown
page readonly
2D90000
heap
page execute and read and write
2E60000
heap
page execute and read and write
6860000
trusted library allocation
page read and write
1E83EA60000
heap
page read and write
779B000
trusted library allocation
page read and write
1E83EA5B000
heap
page read and write
7F04000
trusted library allocation
page read and write
2EE1000
trusted library allocation
page read and write
643F000
heap
page read and write
4CD2000
trusted library allocation
page read and write
BE0000
heap
page read and write
76AE000
trusted library allocation
page read and write
720E000
trusted library allocation
page read and write
25C6000
trusted library allocation
page read and write
3761000
trusted library allocation
page read and write
4F20000
heap
page read and write
4CE0000
trusted library allocation
page read and write
B5F0000
trusted library allocation
page read and write
6EE3D000
unkown
page read and write
4FEC000
stack
page read and write
7F27000
trusted library allocation
page read and write
2EA7000
trusted library allocation
page read and write
896000
heap
page read and write
ADB0000
heap
page read and write
2640000
heap
page execute and read and write
7359000
trusted library allocation
page read and write
1340000
trusted library allocation
page read and write
2FDF000
trusted library allocation
page read and write
51CE000
stack
page read and write
730E000
trusted library allocation
page read and write
6BAE000
stack
page read and write
1E83EA60000
heap
page read and write
6D56000
trusted library allocation
page read and write
6710000
heap
page read and write
7A4000
trusted library allocation
page read and write
3DAE000
trusted library allocation
page read and write
7325000
trusted library allocation
page read and write
263E000
stack
page read and write
7265000
trusted library allocation
page read and write
6C60000
trusted library allocation
page execute and read and write
4E15000
heap
page read and write
73AE000
trusted library allocation
page read and write
EF8000
stack
page read and write
2DE1000
trusted library allocation
page read and write
53B0000
heap
page read and write
BCB000
trusted library allocation
page read and write
9470000
heap
page read and write
5910000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
3CCD000
trusted library allocation
page read and write
FC0000
trusted library allocation
page read and write
315D000
trusted library allocation
page read and write
3C41000
trusted library allocation
page read and write
5030000
trusted library allocation
page execute and read and write
78AD000
trusted library allocation
page read and write
7EAD000
heap
page read and write
25A5000
trusted library allocation
page read and write
4CD0000
trusted library allocation
page read and write
33DE000
stack
page read and write
7F31000
trusted library allocation
page read and write
B9B000
stack
page read and write
5050000
trusted library allocation
page read and write
7355000
trusted library allocation
page read and write
6A47000
trusted library allocation
page read and write
72DB000
trusted library allocation
page read and write
424000
remote allocation
page execute and read and write
5060000
heap
page read and write
2DF0000
trusted library allocation
page read and write
73C6000
trusted library allocation
page read and write
7444000
trusted library allocation
page read and write
3082000
trusted library allocation
page read and write
7644000
trusted library allocation
page read and write
10D6000
heap
page read and write
4A90000
heap
page read and write
61CC000
stack
page read and write
586E000
stack
page read and write
71B3000
trusted library allocation
page read and write
9E0000
heap
page read and write
B5F3000
trusted library allocation
page read and write
1307000
trusted library allocation
page execute and read and write
4580000
trusted library allocation
page read and write
9500000
heap
page read and write
9482000
heap
page read and write
421000
remote allocation
page execute and read and write
2759000
heap
page read and write
2A70000
heap
page read and write
4E00000
heap
page execute and read and write
9582000
heap
page read and write
7E80000
heap
page read and write
76C1000
trusted library allocation
page read and write
5170000
heap
page read and write
70C0000
trusted library allocation
page read and write
3CAD000
trusted library allocation
page read and write
3F0E000
trusted library allocation
page read and write
37A4000
trusted library allocation
page read and write
CF9000
stack
page read and write
3F1E000
trusted library allocation
page read and write
6D3B000
stack
page read and write
FDB000
trusted library allocation
page execute and read and write
7F45000
trusted library allocation
page read and write
3F2E000
trusted library allocation
page read and write
3F3B000
trusted library allocation
page read and write
73BC000
trusted library allocation
page read and write
562C000
stack
page read and write
71C4000
trusted library allocation
page read and write
12FA000
trusted library allocation
page execute and read and write
2C30000
heap
page execute and read and write
2C41000
trusted library allocation
page read and write
71D9000
trusted library allocation
page read and write
2BE6000
trusted library allocation
page read and write
630E000
stack
page read and write
CEE000
stack
page read and write
73B2000
trusted library allocation
page read and write
31EE000
stack
page read and write
88B000
heap
page read and write
63CF000
heap
page read and write
1E83F202000
trusted library allocation
page read and write
640D000
heap
page read and write
7707000
trusted library allocation
page read and write
741E000
trusted library allocation
page read and write
4E10000
trusted library section
page readonly
3DCE000
trusted library allocation
page read and write
B4DE000
stack
page read and write
6ECF000
stack
page read and write
1007000
heap
page read and write
5E0000
heap
page read and write
72C6000
trusted library allocation
page read and write
130B000
trusted library allocation
page execute and read and write
3110000
heap
page read and write
4CAB000
trusted library allocation
page read and write
729C000
trusted library allocation
page read and write
784B000
trusted library allocation
page read and write
72AF000
trusted library allocation
page read and write
25A3000
trusted library allocation
page execute and read and write
1E83EA13000
heap
page read and write
7344000
trusted library allocation
page read and write
77EC000
trusted library allocation
page read and write
2FA4000
trusted library allocation
page read and write
27E6000
trusted library allocation
page read and write
7191000
trusted library allocation
page read and write
2F07000
trusted library allocation
page read and write
7254000
trusted library allocation
page read and write
781D000
trusted library allocation
page read and write
12F2000
trusted library allocation
page read and write
6F6D000
stack
page read and write
25A4000
trusted library allocation
page read and write
6E60000
heap
page read and write
25A0000
trusted library allocation
page read and write
8A6000
heap
page read and write
5020000
trusted library allocation
page read and write
FB8000
heap
page read and write
6856000
trusted library allocation
page read and write
BD0000
heap
page read and write
8A00000
trusted library allocation
page read and write
735D000
trusted library allocation
page read and write
1E83F180000
trusted library allocation
page read and write
783F000
trusted library allocation
page read and write
F90000
trusted library allocation
page read and write
B5DF000
stack
page read and write
7327000
trusted library allocation
page read and write
24BE000
stack
page read and write
D7B000
stack
page read and write
8E7000
heap
page read and write
3E71000
trusted library allocation
page read and write
5F7C000
stack
page read and write
6415000
heap
page read and write
73B6000
trusted library allocation
page read and write
4CC1000
trusted library allocation
page read and write
9B3000
heap
page read and write
FBD000
trusted library allocation
page execute and read and write
76F6000
trusted library allocation
page read and write
2CF4000
trusted library allocation
page read and write
7323000
trusted library allocation
page read and write
78C0000
trusted library allocation
page read and write
2E11000
trusted library allocation
page read and write
7843000
trusted library allocation
page read and write
7F780000
trusted library allocation
page execute and read and write
6740000
trusted library allocation
page execute and read and write
7BD000
trusted library allocation
page execute and read and write
30C6000
trusted library allocation
page read and write
BB9000
heap
page read and write
3290000
heap
page read and write
69E0000
trusted library section
page read and write
B35E000
stack
page read and write
53AD000
stack
page read and write
C10000
heap
page read and write
1E83EA31000
heap
page read and write
FB0000
trusted library allocation
page read and write
73B4000
trusted library allocation
page read and write
2793000
trusted library allocation
page read and write
6735000
heap
page read and write
27C7000
trusted library allocation
page read and write
71CC000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
72F0000
trusted library allocation
page execute and read and write
78D1000
trusted library allocation
page read and write
3EAE000
trusted library allocation
page read and write
BDE000
trusted library allocation
page read and write
58F0000
trusted library allocation
page read and write
3EDA000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
2C8B000
trusted library allocation
page read and write
6AAE000
stack
page read and write
7744000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
3922000
trusted library allocation
page read and write
7841000
trusted library allocation
page read and write
1E83F1A0000
remote allocation
page read and write
27C5000
trusted library allocation
page read and write
25AF000
trusted library allocation
page read and write
1350000
heap
page read and write
3E99000
trusted library allocation
page read and write
7120000
heap
page read and write
4E10000
heap
page read and write
947F000
heap
page read and write
66CF000
stack
page read and write
644C000
stack
page read and write
6473000
heap
page read and write
46DC000
stack
page read and write
2CFC000
trusted library allocation
page read and write
1E83F1A0000
remote allocation
page read and write
BC0000
trusted library allocation
page read and write
4D10000
heap
page read and write
7C0000
trusted library allocation
page read and write
781F000
trusted library allocation
page read and write
77FF000
trusted library allocation
page read and write
735F000
trusted library allocation
page read and write
FDA000
heap
page read and write
524E000
stack
page read and write
1E83EA4B000
heap
page read and write
788B000
trusted library allocation
page read and write
3112000
trusted library allocation
page read and write
3DEE000
trusted library allocation
page read and write
8446000
trusted library allocation
page read and write
24D5000
trusted library allocation
page read and write
EB9000
heap
page read and write
572C000
stack
page read and write
6EE36000
unkown
page readonly
413000
remote allocation
page execute and read and write
385A000
trusted library allocation
page read and write
25BD000
trusted library allocation
page execute and read and write
78D9000
trusted library allocation
page read and write
78BE000
trusted library allocation
page read and write
783D000
trusted library allocation
page read and write
6C30000
heap
page read and write
770000
heap
page read and write
7110000
trusted library allocation
page read and write
7845000
trusted library allocation
page read and write
5270000
heap
page read and write
C04000
trusted library allocation
page read and write
72CA000
trusted library allocation
page read and write
6C10000
trusted library allocation
page read and write
7E80000
heap
page read and write
2A6C000
stack
page read and write
313D000
trusted library allocation
page read and write
31F9000
trusted library allocation
page read and write
2A2E000
stack
page read and write
7655000
trusted library allocation
page read and write
9A6B000
stack
page read and write
7230000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
910000
heap
page read and write
7742000
trusted library allocation
page read and write
643A000
heap
page read and write
6C0000
heap
page read and write
4A80000
trusted library allocation
page read and write
25F0000
trusted library allocation
page read and write
97AE000
stack
page read and write
1E83EA00000
heap
page read and write
4D10000
trusted library allocation
page read and write
716F000
trusted library allocation
page read and write
7F0E000
trusted library allocation
page read and write
860000
heap
page read and write
2CB7000
trusted library allocation
page read and write
579C000
stack
page read and write
2EF8000
trusted library allocation
page read and write
2C70000
trusted library allocation
page read and write
B11E000
stack
page read and write
7180000
trusted library allocation
page read and write
30AA000
stack
page read and write
2BE1000
trusted library allocation
page read and write
7611000
trusted library allocation
page read and write
ABAE000
stack
page read and write
948F000
heap
page read and write
2E71000
trusted library allocation
page read and write
3EEE000
trusted library allocation
page read and write
3102000
trusted library allocation
page read and write
2530000
heap
page execute and read and write
7D2000
trusted library allocation
page read and write
4F6E000
stack
page read and write
4D70000
heap
page read and write
5254000
heap
page read and write
7A0000
trusted library allocation
page read and write
BF2000
trusted library allocation
page read and write
3D0D000
trusted library allocation
page read and write
9CAE000
stack
page read and write
3633000
trusted library allocation
page read and write
641A000
heap
page read and write
5FBA000
heap
page read and write
790000
trusted library allocation
page read and write
7622000
trusted library allocation
page read and write
93CB000
trusted library allocation
page read and write
820D000
heap
page read and write
7431000
trusted library allocation
page read and write
7F18000
trusted library allocation
page read and write
70D0000
trusted library allocation
page read and write
EC7000
heap
page read and write
950D000
heap
page read and write
730C000
trusted library allocation
page read and write
25CA000
trusted library allocation
page execute and read and write
775B000
trusted library allocation
page read and write
9E1000
heap
page read and write
5920000
trusted library allocation
page read and write
672A000
trusted library allocation
page read and write
6762000
heap
page read and write
4B00000
trusted library section
page readonly
3541000
trusted library allocation
page read and write
2AA0000
trusted library allocation
page read and write
5AA000
stack
page read and write
BB0000
heap
page read and write
BF9000
stack
page read and write
1E83ECF0000
heap
page read and write
2B6E000
stack
page read and write
66FF000
stack
page read and write
2C80000
heap
page read and write
1E83EC10000
heap
page read and write
3769000
trusted library allocation
page read and write
98A000
stack
page read and write
7442000
trusted library allocation
page read and write
4CCD000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
25B0000
trusted library allocation
page read and write
6200000
heap
page read and write
2F49000
trusted library allocation
page read and write
94CC000
heap
page read and write
94D000
heap
page read and write
341F000
stack
page read and write
7F09000
trusted library allocation
page read and write
326F000
stack
page read and write
4A93000
heap
page read and write
B90000
heap
page read and write
A5E000
stack
page read and write
6380000
heap
page read and write
782C000
trusted library allocation
page read and write
FE4000
heap
page read and write
7C6000
trusted library allocation
page execute and read and write
5040000
trusted library section
page read and write
76D4000
trusted library allocation
page read and write
94E4000
heap
page read and write
2BC0000
trusted library allocation
page read and write
BC4000
trusted library allocation
page read and write
B0DF000
stack
page read and write
2A90000
trusted library allocation
page read and write
ADC0000
heap
page read and write
2592000
trusted library allocation
page read and write
9A2E000
stack
page read and write
7F0000
trusted library allocation
page read and write
5000000
heap
page read and write
7F13000
trusted library allocation
page read and write
3E4E000
trusted library allocation
page read and write
6BEE000
stack
page read and write
414000
remote allocation
page execute and read and write
7755000
trusted library allocation
page read and write
72F0000
trusted library allocation
page read and write
10D0000
heap
page read and write
48A000
stack
page read and write
65BE000
stack
page read and write
7857000
trusted library allocation
page read and write
7633000
trusted library allocation
page read and write
6F3E000
stack
page read and write
785B000
trusted library allocation
page read and write
840000
trusted library allocation
page execute and read and write
27CF000
trusted library allocation
page read and write
47EE000
stack
page read and write
4F1D000
stack
page read and write
12E0000
trusted library allocation
page read and write
12F6000
trusted library allocation
page execute and read and write
2E23000
trusted library allocation
page read and write
25D2000
trusted library allocation
page read and write
3050000
trusted library allocation
page read and write
9578000
heap
page read and write
12F0000
trusted library allocation
page read and write
937000
heap
page read and write
403000
remote allocation
page execute and read and write
12AC000
stack
page read and write
3F7B000
trusted library allocation
page read and write
2F0B000
trusted library allocation
page read and write
6C20000
heap
page read and write
7243000
trusted library allocation
page read and write
4FF0000
heap
page read and write
2EB5000
trusted library allocation
page read and write
3390000
heap
page read and write
F50000
heap
page read and write
4C80000
trusted library allocation
page execute and read and write
576E000
stack
page read and write
94A2000
heap
page read and write
74D000
stack
page read and write
5180000
heap
page execute and read and write
4C90000
trusted library allocation
page read and write
2F70000
heap
page read and write
6A50000
trusted library allocation
page execute and read and write
71A2000
trusted library allocation
page read and write
81D0000
heap
page read and write
31AA000
trusted library allocation
page read and write
4A60000
trusted library allocation
page execute and read and write
6EE3D000
unkown
page read and write
767B000
trusted library allocation
page read and write
7709000
trusted library allocation
page read and write
4D73000
heap
page read and write
951B97B000
stack
page read and write
7276000
trusted library allocation
page read and write
698E000
stack
page read and write
1E83F1A0000
remote allocation
page read and write
2CEC000
trusted library allocation
page read and write
946000
heap
page read and write
E90000
heap
page read and write
4C48000
trusted library allocation
page read and write
12D4000
trusted library allocation
page read and write
4B20000
heap
page read and write
25C0000
trusted library allocation
page read and write
318A000
trusted library allocation
page read and write
6BD0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
3106000
trusted library allocation
page read and write
728B000
trusted library allocation
page read and write
457E000
stack
page read and write
2DA0000
heap
page read and write
94FC000
stack
page read and write
992E000
stack
page read and write
2500000
heap
page read and write
2EB1000
trusted library allocation
page read and write
3C69000
trusted library allocation
page read and write
3F4E000
trusted library allocation
page read and write
779D000
trusted library allocation
page read and write
71EA000
trusted library allocation
page read and write
7849000
trusted library allocation
page read and write
97EE000
stack
page read and write
7EFF000
trusted library allocation
page read and write
7859000
trusted library allocation
page read and write
3E0E000
trusted library allocation
page read and write
65CE000
stack
page read and write
72C4000
trusted library allocation
page read and write
7EC0000
heap
page read and write
7F4F000
trusted library allocation
page read and write
7EFB000
trusted library allocation
page read and write
587000
stack
page read and write
4D00000
trusted library allocation
page read and write
86E000
heap
page read and write
2590000
trusted library allocation
page read and write
124D000
stack
page read and write
73B0000
trusted library allocation
page read and write
12ED000
trusted library allocation
page execute and read and write
7F36000
trusted library allocation
page read and write
25B3000
trusted library allocation
page read and write
73B8000
trusted library allocation
page read and write
423000
remote allocation
page execute and read and write
4DE0000
heap
page read and write
4DE5000
heap
page read and write
FB0000
heap
page read and write
2D70000
trusted library allocation
page read and write
91B000
heap
page read and write
D95000
heap
page read and write
2C6E000
stack
page read and write
8F6C000
stack
page read and write
47A0000
trusted library allocation
page read and write
3EFB000
trusted library allocation
page read and write
ADAE000
stack
page read and write
2F54000
trusted library allocation
page read and write
114C000
stack
page read and write
3F1B000
trusted library allocation
page read and write
771A000
trusted library allocation
page read and write
73C4000
trusted library allocation
page read and write
1320000
trusted library allocation
page read and write
4CA4000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
76C3000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
6EE3D000
unkown
page read and write
7310000
trusted library allocation
page read and write
FCA000
trusted library allocation
page execute and read and write
3114000
trusted library allocation
page read and write
777F000
trusted library allocation
page read and write
5250000
heap
page read and write
B3E000
stack
page read and write
2F20000
heap
page read and write
FA4000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
2F90000
heap
page read and write
738E000
trusted library allocation
page read and write
512000
unkown
page readonly
64CD000
stack
page read and write
2DDD000
trusted library allocation
page read and write
73CA000
trusted library allocation
page read and write
3D8E000
trusted library allocation
page read and write
329B000
heap
page read and write
7A3000
trusted library allocation
page execute and read and write
516D000
stack
page read and write
6320000
heap
page read and write
6A90000
heap
page read and write
3E2E000
trusted library allocation
page read and write
1302000
trusted library allocation
page read and write
306D000
stack
page read and write
422000
remote allocation
page execute and read and write
73EC000
trusted library allocation
page read and write
4CD0000
trusted library allocation
page read and write
2DFB000
trusted library allocation
page read and write
620A000
heap
page read and write
7853000
trusted library allocation
page read and write
81E8000
heap
page read and write
2C83000
trusted library allocation
page read and write
73C2000
trusted library allocation
page read and write
2DFE000
trusted library allocation
page read and write
77B6000
trusted library allocation
page read and write
7EA1000
heap
page read and write
4CC6000
trusted library allocation
page read and write
BA0000
trusted library allocation
page read and write
742F000
trusted library allocation
page read and write
7381000
trusted library allocation
page read and write
3E6E000
trusted library allocation
page read and write
739D000
trusted library allocation
page read and write
678E000
stack
page read and write
3549000
trusted library allocation
page read and write
4CA0000
trusted library allocation
page read and write
6C00000
trusted library allocation
page execute and read and write
868000
heap
page read and write
FC6000
trusted library allocation
page execute and read and write
520C000
stack
page read and write
8DE000
heap
page read and write
6C1A000
trusted library allocation
page read and write
B25E000
stack
page read and write
B21F000
stack
page read and write
559C000
stack
page read and write
2DEC000
stack
page read and write
12C0000
trusted library allocation
page read and write
1E83EB02000
heap
page read and write
6BE0000
trusted library allocation
page execute and read and write
2573000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
614B000
stack
page read and write
73F0000
heap
page read and write
2D80000
trusted library allocation
page read and write
1357000
heap
page read and write
2541000
trusted library allocation
page read and write
7278000
trusted library allocation
page read and write
2C7F000
trusted library allocation
page read and write
789C000
trusted library allocation
page read and write
6396000
heap
page read and write
7F2C000
trusted library allocation
page read and write
9E4000
heap
page read and write
6EE3D000
unkown
page read and write
6EE3F000
unkown
page readonly
58BE000
stack
page read and write
FF0000
trusted library allocation
page read and write
6720000
trusted library allocation
page read and write
955000
heap
page read and write
1030000
trusted library allocation
page read and write
25DB000
trusted library allocation
page execute and read and write
3161000
trusted library allocation
page read and write
71CA000
trusted library allocation
page read and write
64BE000
stack
page read and write
4A50000
heap
page execute and read and write
3074000
trusted library allocation
page read and write
769D000
trusted library allocation
page read and write
2C72000
trusted library allocation
page read and write
776C000
trusted library allocation
page read and write
12D3000
trusted library allocation
page execute and read and write
381F000
trusted library allocation
page read and write
F9C000
stack
page read and write
8225000
heap
page read and write
89FC000
stack
page read and write
4CBE000
trusted library allocation
page read and write
7F320000
trusted library allocation
page execute and read and write
3D4E000
trusted library allocation
page read and write
73DB000
trusted library allocation
page read and write
6734000
trusted library allocation
page read and write
98A000
heap
page read and write
6737000
trusted library allocation
page read and write
493B000
stack
page read and write
4B10000
heap
page read and write
6730000
trusted library allocation
page read and write
1E83EA02000
heap
page read and write
AF0000
heap
page read and write
7855000
trusted library allocation
page read and write
FA0000
heap
page read and write
25A3000
trusted library allocation
page read and write
78D3000
trusted library allocation
page read and write
C06000
trusted library allocation
page read and write
31AF000
unkown
page read and write
68EE000
heap
page read and write
773E000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
6310000
heap
page read and write
6A00000
trusted library allocation
page read and write
3853000
trusted library allocation
page read and write
732D000
trusted library allocation
page read and write
2BCE000
trusted library allocation
page read and write
8F7000
stack
page read and write
78D7000
trusted library allocation
page read and write
ACAE000
stack
page read and write
F50000
heap
page read and write
73BE000
trusted library allocation
page read and write
71FB000
trusted library allocation
page read and write
7DEC000
stack
page read and write
1330000
trusted library allocation
page execute and read and write
2EE7000
trusted library allocation
page read and write
77B2000
trusted library allocation
page read and write
765D000
trusted library allocation
page read and write
25D7000
trusted library allocation
page execute and read and write
7333000
trusted library allocation
page read and write
2F6E000
unkown
page read and write
6850000
trusted library allocation
page read and write
FD5000
trusted library allocation
page execute and read and write
7DB000
trusted library allocation
page execute and read and write
3120000
heap
page read and write
72B3000
trusted library allocation
page read and write
3280000
heap
page read and write
3CED000
trusted library allocation
page read and write
515C000
stack
page read and write
660E000
heap
page read and write
3F9B000
trusted library allocation
page read and write
95CE000
stack
page read and write
3E8E000
trusted library allocation
page read and write
98EF000
stack
page read and write
4D0A000
trusted library allocation
page read and write
72EC000
trusted library allocation
page read and write
2A96000
trusted library allocation
page read and write
76E5000
trusted library allocation
page read and write
4A40000
heap
page read and write
96AE000
stack
page read and write
There are 892 hidden memdumps, click here to show them.