IOC Report
SecuriteInfo.com.Program.Unwanted.5457.1790.16701.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Program.Unwanted.5457.1790.16701.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\Installer.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Outbyte\Driver Updater\2.x\Logs\CheckSerialNumber.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Outbyte\Driver Updater\2.x\Logs\InstallerInternal.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\AxComponentsRTL.bpl
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\AxComponentsVCL.bpl
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\BrowserHelper.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\CFAHelper.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\CommonForms.Site.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\Data\main.ini
Generic INItialization configuration [CustomDllSurrogate]
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\Downloader.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\DriverUpdater.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\EULA.rtf
Rich Text Format data, version 1, ANSI, code page 1251, default language ID 1049
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\GoogleAnalyticsHelper.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\GoogleAnalyticsHelperIV.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\InstallerUtils.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\Lang\deu.lng
BALANCE NS32000 .o not stripped version 101
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\Lang\enu.lng
BALANCE NS32000 .o not stripped version 101
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\Lang\esp.lng
BALANCE NS32000 .o not stripped version 101
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\Lang\fra.lng
BALANCE NS32000 .o not stripped version 101
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\Lang\ita.lng
BALANCE NS32000 .o not stripped version 101
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\Lang\jpn.lng
BALANCE NS32000 .o not stripped version 101
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\Lang\ptb.lng
BALANCE NS32000 .o not stripped version 101
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\Localizer.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\OxComponentsRTL.bpl
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\SetupHelper.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\__setup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\rtl250.bpl
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\vcl250.bpl
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\vclie250.bpl
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\vclimg250.bpl
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Local\Temp\is-8997833.tmp\Installer.exe
"C:\Users\user\AppData\Local\Temp\is-8997833.tmp\Installer.exe" /spid:5876 /splha:35562336
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5457.1790.16701.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5457.1790.16701.exe"

URLs

Name
IP
Malicious
http://www.jrsoftware.org/0
unknown
https://outbyte.com/tools/software/info/
unknown
http://www.openssl.org4.
unknown
https://outbyte.com/driver-updater/update/
unknown
http://www.outbyte.com/driver-updater
unknown
https://www.apache.org/licenses/LICENSE-2.0
unknown
https://%s:%u/d.phph
unknown
https://www.sqlite.org/copyright.html
unknown
http://crl.certum.pl/ca.crl0:
unknown
http://outbyte.com/en/support/contacts/
unknown
https://account.outbyte.com/
unknown
https://outbyte.com/tools/software/info/_Sie
unknown
https://outbyte.com/sid/get/%0:s/
unknown
https://debuglogs.outbyte.com/
unknown
http://www.openssl.org/
unknown
https://mit-license.org
unknown
https://www.opera.com
unknown
https://outbyte.com/tools/software/info/RHai
unknown
https://www.trustpilot.com/review/outbyte.com
unknown
http://www.jrsoftware.org/
unknown
http://www.outbyte.com/en/support.phpThttp://www.outbyte.com/en/checkforupdate/?product=driver-updat
unknown
https://outbyte.com/support/contacts/
unknown
https://outbyte.com/tools/userdata/?product=driver-updater=
unknown
https://outbyte.com/support/contacts/HUn
unknown
https://outbyte.com/driver-updater/afteruninstallb/
unknown
http://www.outbyte.com/en/checkforupdate/?product=driver-updater&version=2.3.3.29920
unknown
https://customer.appesteem.com/certified?vendor=OUTBYBIhre
unknown
https://outbyte.com/software/outbyte-vpn/account
unknown
https://outbyte.com/support/contacts/NNormalmente
unknown
https://outbyte.com/goblog/blog/why-update-computer-drivers/
unknown
https://outbyte.com/software/file-recovery/download/
unknown
https://outbyte.com/support/how-to-activate/
unknown
https://outbyte.com/tools/software/info/bTiene
unknown
https://www.certum.pl/repository.0
unknown
http://www.outbyte.com/en/support.php
unknown
https://outbyte.com/software/avarmor/download/
unknown
https://ssl.outbyte.com/v1/check
unknown
https://outbyte.com/support/livechat/
unknown
https://outbyte.com/support/faq/driver-updater/
unknown
https://net.geo.opera.com/opera/stable/windows?utm_source=outbyte&utm_medium=pb&utm_campaign=driver
unknown
http://outbyte.com/en/support/contacts/%http://www.outbyte.com/driver-updater
unknown
https://outbyte.com/tools/userdata/?product=driver-updater
45.33.97.245
https://debuglogs.outbyte.com/U
unknown
http://repository.certum.pl/l3.cer0
unknown
https://api.sclpfybn.com/rest/v1/external/navigation/list
unknown
https://outbyte.com/privacy/:https://outbyte.com/tools/userdata/?product=driver-updater
unknown
https://outbyte.com/support/contacts/QUn
unknown
https://www.opera.com/eula/computers0https://outbyte.com/software/pc-repair/download/
unknown
https://outbyte.com/software/##defs.ProductNameInternal##/purchase/?info
unknown
https://www.opera.com/privacy
unknown
http://ocsp.certum.pl0.
unknown
https://outbyte.com/software/helpdesk/account%https://outbyte.com/support/livechat/
unknown
https://outbyte.com/
unknown
https://customer.appesteem.com/certified?vendor=OUTBY?Your
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://outbyte.com/support/contacts/AUn
unknown
http://www.outbyte.com/en/checkforupdate/?product=driver-updater&version=2.3.3.29920QJg
unknown
https://outbyte.com/sid/get/xco7KleGZQ/
45.33.97.245
https://customer.appesteem.com/certified?vendor=OUTBY
unknown
https://net.geo.opera.com/opera/stable/windows?utm_source=outbyte&utm_medium=pb&utm_campaign=driverR
unknown
http://crl3.digicv
unknown
https://du.outbyte.com/api/
unknown
https://outbyte.com/sid/ip/driver-updater/bOur
unknown
https://outbyte.com/support/contacts/eWindows
unknown
http://crl.certum.pl/l3.crl0a
unknown
https://customer.appesteem.com/certified?vendor=OUTBYTSua
unknown
https://outbyte.com/refunds/
unknown
https://outbyte.com/software/avarmor/account
unknown
https://net.geo.opera.com/opera/stable/windows?utm_source=outbyte&utm_medium=pb&utm_campaign=driverY
unknown
https://outbyte.com/privacy/
unknown
https://net.geo.opera.com/opera/stable/windows?utm_source=outbyte&utm_medium=pb&utm_campaign=driverU
unknown
https://outbyte.com/en/support/livechat/
unknown
https://net.geo.opera.com/opera/stable/windows?utm_source=outbyte&utm_medium=pb&utm_campaign=driver_
unknown
https://outbyte.com/tools/feedback/
unknown
https://outbyte.com/how-to-uninstall/
unknown
https://outbyte.com/tools/phones/?product=driver-updater
unknown
https://ssl.outbyte.com/v1/check-https://account.outbyte.com/site/current-time
unknown
https://net.geo.opera.com/opera/stable/windows?utm_source=outbyte&utm_medium=pb&utm_campaign=drivere
unknown
https://outbyte.com/goblog/blog/why-update-computer-drivers/%https://account.outbyte.com/check/key
unknown
https://outbyte.com/software/pc-repair/account
unknown
https://outbyte.com/tools/software/info/RYou
unknown
https://customer.appesteem.com/certified?vendor=OUTBY2La
unknown
https://outbyte.com/feedback/
unknown
https://net.geo.opera.com/opera/stable/windows?utm_source=outbyte&utm_medium=pb&utm_campaign=driverm
unknown
https://outbyte.com/licensecheck/
unknown
https://outbyte.com/products/1https://outbyte.com/driver-updater/afterinstallb/MZP
unknown
https://du.outbyte.com/api/info/
unknown
https://outbyte.com/lp/48discount/?t=%0:d
unknown
https://outbyte.com/products/1https://outbyte.com/driver-updater/afterinstallb/
unknown
https://bis.outbyte.com/rest/v1/external/navigation/list/https://outbyte.com/support/faq/driver-upda
unknown
http://outbyte.com/en/support/contacts/%http://www.outbyte.com/driver-updater%http://www.outbyte.com
unknown
https://outbyte.com/goblog/blog/outbyte-pc-repair-ultimate-guide/
unknown
https://www.certum.pl/CPS0
unknown
https://outbyte.com/support/contacts/PEin
unknown
https://outbyte.com/software/driver-updater/after-uninstall/?activated=%0:d
unknown
https://outbyte.com/software/driver-updater/afterinstall/
unknown
https://outbyte.com/driver-updater/renew/?key=%0:snYou
unknown
https://customer.appesteem.com/certified?vendor=OUTBYUSu
unknown
https://outbyte.com/software/file-recovery/account
unknown
https://account.outbyte.com/upgrade/annual-subscription
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
outbyte.com
45.33.97.245

IPs

IP
Domain
Country
Malicious
45.33.97.245
outbyte.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Outbyte\Driver Updater\2.x\Settings
General.CustomClientId
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Outbyte\Driver Updater\2.x\Settings
General.URLClientId
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FBF610F-C2E8-622F-6F80-5BD3D9C8E663}\Version
Assembly
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Outbyte\Driver Updater\2.x\Settings
General.TrackingIV.CID
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Outbyte\Driver Updater\2.x\Settings
General.TrackingIV.SID
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Outbyte\Driver Updater\2.x\Settings
Application.GAIV.FunnelDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Outbyte\Driver Updater\2.x\Settings
General.Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Outbyte\Driver Updater\2.x\Settings
General.LastRun.Installer.exe
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Outbyte\Driver Updater\2.x\Settings
General.CountRun.Installer.exe
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Outbyte\Driver Updater\2.x\Settings
UserInfo.Country
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Outbyte\Driver Updater\2.x\Settings
UserInfo.CountryID
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Outbyte\Driver Updater\2.x\Settings
Application.GAIV.UniqueEvents
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Outbyte\Driver Updater\2.x\Settings
UserInfo.Country
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Outbyte\Driver Updater\2.x\Settings
UserInfo.CountryID
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
9B4000
heap
page read and write
3A51000
heap
page read and write
6B69000
heap
page read and write
9AE000
heap
page read and write
99F000
heap
page read and write
822C000
direct allocation
page read and write
3A60000
heap
page read and write
6B99000
heap
page read and write
3A51000
heap
page read and write
2CB0000
direct allocation
page read and write
612F000
stack
page read and write
788C000
direct allocation
page read and write
9AB000
heap
page read and write
7FDBA000
direct allocation
page read and write
7674000
direct allocation
page read and write
3A51000
heap
page read and write
9AE000
heap
page read and write
9A4000
heap
page read and write
78AF000
stack
page read and write
9AB000
heap
page read and write
5340000
heap
page read and write
3A51000
heap
page read and write
5C6000
heap
page read and write
98B000
heap
page read and write
304C000
direct allocation
page read and write
9A9000
heap
page read and write
6BAF000
heap
page read and write
6BD3000
heap
page read and write
6BD4000
heap
page read and write
5DAE000
stack
page read and write
982000
heap
page read and write
276B000
direct allocation
page read and write
586E000
stack
page read and write
7261000
unkown
page execute read
9A4000
heap
page read and write
6B8D000
heap
page read and write
7650000
direct allocation
page read and write
994000
heap
page read and write
50000000
unkown
page readonly
3A51000
heap
page read and write
6BA6000
heap
page read and write
27D8000
direct allocation
page read and write
6C4D000
direct allocation
page readonly
3A51000
heap
page read and write
5C0000
heap
page read and write
3A51000
heap
page read and write
221D000
direct allocation
page read and write
2739000
direct allocation
page read and write
385C000
direct allocation
page read and write
79ED000
stack
page read and write
33BE000
stack
page read and write
3847000
direct allocation
page read and write
997000
heap
page read and write
824A000
direct allocation
page read and write
2773000
direct allocation
page read and write
701C000
heap
page read and write
3812000
direct allocation
page read and write
6BEB000
heap
page read and write
C7E000
unkown
page read and write
3011000
direct allocation
page read and write
BC0000
unkown
page readonly
98E000
heap
page read and write
389E000
direct allocation
page read and write
982000
heap
page read and write
B7F4000
direct allocation
page read and write
997000
heap
page read and write
6E00000
direct allocation
page read and write
72CE000
direct allocation
page read and write
540000
unkown
page readonly
B7D5000
direct allocation
page read and write
8E3000
heap
page read and write
D01000
unkown
page execute read
3A51000
heap
page read and write
7666000
direct allocation
page read and write
6BA8000
heap
page read and write
904000
heap
page read and write
9B4000
heap
page read and write
71D000
heap
page read and write
439000
unkown
page readonly
981000
heap
page read and write
5011A000
unkown
page write copy
940000
heap
page read and write
3A51000
heap
page read and write
9B4000
heap
page read and write
997000
heap
page read and write
3A51000
heap
page read and write
6B58000
heap
page read and write
9B4000
heap
page read and write
6B3A000
heap
page read and write
38E8000
direct allocation
page read and write
80E0000
remote allocation
page read and write
6B3A000
heap
page read and write
9AB000
heap
page read and write
6EFF000
heap
page read and write
431000
unkown
page readonly
3A51000
heap
page read and write
277A000
direct allocation
page read and write
19B000
stack
page read and write
5AEF000
stack
page read and write
762E000
direct allocation
page read and write
3A51000
heap
page read and write
6B31000
heap
page read and write
9B8000
heap
page read and write
6B34000
heap
page read and write
3A51000
heap
page read and write
A201000
heap
page read and write
21F8000
direct allocation
page read and write
37F0000
direct allocation
page read and write
3913000
direct allocation
page read and write
7657000
direct allocation
page read and write
71CD000
unkown
page write copy
6DAA000
direct allocation
page read and write
3A51000
heap
page read and write
994000
heap
page read and write
9B8000
heap
page read and write
6F76000
heap
page read and write
6E3E000
heap
page read and write
6B33000
heap
page read and write
6DF0000
direct allocation
page read and write
729000
heap
page read and write
967000
heap
page read and write
71B1000
unkown
page execute read
6A24000
heap
page read and write
9B9000
heap
page read and write
997000
heap
page read and write
7019000
heap
page read and write
6B3D000
heap
page read and write
997000
heap
page read and write
774000
heap
page read and write
9AE000
heap
page read and write
3A51000
heap
page read and write
3002000
direct allocation
page read and write
6C32000
heap
page read and write
6DD3000
unkown
page readonly
98B000
heap
page read and write
982000
heap
page read and write
1002000
unkown
page write copy
26D5000
direct allocation
page read and write
562E000
stack
page read and write
58AE000
stack
page read and write
4EB000
unkown
page write copy
9AE000
heap
page read and write
9B4000
heap
page read and write
9A4000
heap
page read and write
7B6E000
stack
page read and write
9B4000
heap
page read and write
303D000
direct allocation
page read and write
98E000
heap
page read and write
3A51000
heap
page read and write
6D8F000
direct allocation
page read and write
3A51000
heap
page read and write
6C3C000
heap
page read and write
960000
heap
page read and write
3A51000
heap
page read and write
1BE6000
unkown
page write copy
6C3E000
heap
page read and write
994000
heap
page read and write
3A51000
heap
page read and write
99F000
heap
page read and write
916000
heap
page read and write
3A51000
heap
page read and write
76C4000
direct allocation
page read and write
3068000
direct allocation
page read and write
271A000
direct allocation
page read and write
9AE000
heap
page read and write
6BA8000
heap
page read and write
21BC000
direct allocation
page read and write
7E6E000
stack
page read and write
3A51000
heap
page read and write
768A000
direct allocation
page read and write
994000
heap
page read and write
7519000
unkown
page write copy
9AE000
heap
page read and write
1BD0000
unkown
page write copy
91B000
heap
page read and write
997000
heap
page read and write
6BB4000
heap
page read and write
3A51000
heap
page read and write
98F000
heap
page read and write
6DA0000
unkown
page readonly
75F2000
direct allocation
page read and write
2E10000
heap
page read and write
774000
heap
page read and write
400000
unkown
page readonly
6BA6000
heap
page read and write
74F6000
unkown
page read and write
FDA000
unkown
page write copy
9B8000
heap
page read and write
823F000
direct allocation
page read and write
400000
unkown
page readonly
7600000
direct allocation
page read and write
B7FB000
direct allocation
page read and write
7158000
direct allocation
page read and write
3BB3000
heap
page read and write
2241000
direct allocation
page read and write
997000
heap
page read and write
A200000
heap
page read and write
3A51000
heap
page read and write
9B4000
heap
page read and write
6E3D000
heap
page read and write
3A51000
heap
page read and write
81D1000
direct allocation
page read and write
AE00000
direct allocation
page read and write
21F1000
direct allocation
page read and write
933000
heap
page read and write
C71000
unkown
page write copy
994000
heap
page read and write
6660000
direct allocation
page read and write
6EF3000
heap
page read and write
50121000
unkown
page write copy
1BB9000
unkown
page write copy
FFF000
unkown
page read and write
9AB000
heap
page read and write
9B8000
heap
page read and write
76CC000
direct allocation
page read and write
4EB000
unkown
page read and write
521000
unkown
page read and write
6D70000
direct allocation
page read and write
9B8000
heap
page read and write
3028000
direct allocation
page read and write
5EEE000
stack
page read and write
9B4000
heap
page read and write
6687000
direct allocation
page read and write
2020000
heap
page read and write
3A51000
heap
page read and write
9A4000
heap
page read and write
B7ED000
direct allocation
page read and write
3A51000
heap
page read and write
98F000
heap
page read and write
6B9D000
heap
page read and write
6D51000
direct allocation
page read and write
71D4000
unkown
page readonly
98F000
heap
page read and write
75D7000
direct allocation
page read and write
50119000
unkown
page read and write
9AE000
heap
page read and write
9A4000
heap
page read and write
3A51000
heap
page read and write
78EC000
stack
page read and write
98B000
heap
page read and write
67DE000
stack
page read and write
2FF4000
direct allocation
page read and write
98B000
heap
page read and write
6B33000
heap
page read and write
982000
heap
page read and write
6E3E000
heap
page read and write
50A81000
unkown
page execute read
27B4000
direct allocation
page read and write
997000
heap
page read and write
74F5000
unkown
page write copy
576C000
stack
page read and write
6BA6000
heap
page read and write
21C3000
direct allocation
page read and write
6C34000
heap
page read and write
851000
unkown
page execute read
6C4B000
direct allocation
page readonly
38FD000
direct allocation
page read and write
26A8000
direct allocation
page read and write
FD7000
unkown
page read and write
FFB60000
direct allocation
page read and write
7638000
direct allocation
page read and write
9AE000
heap
page read and write
2764000
direct allocation
page read and write
6B34000
heap
page read and write
6E3C000
stack
page read and write
3A51000
heap
page read and write
27D1000
direct allocation
page read and write
3803000
direct allocation
page read and write
53AC000
stack
page read and write
FFAD5000
direct allocation
page read and write
9B7000
heap
page read and write
93A000
heap
page read and write
2216000
direct allocation
page read and write
6C33000
heap
page read and write
666B000
direct allocation
page read and write
925000
heap
page read and write
1BCE000
unkown
page write copy
6B8E000
heap
page read and write
1BD9000
unkown
page read and write
6C31000
direct allocation
page execute read
B85A000
direct allocation
page read and write
98F000
heap
page read and write
99A000
heap
page read and write
76E1000
direct allocation
page read and write
5C2F000
stack
page read and write
9BC000
heap
page read and write
3828000
direct allocation
page read and write
57E000
unkown
page readonly
75B0000
direct allocation
page read and write
6EF6000
heap
page read and write
425000
unkown
page write copy
706A000
heap
page read and write
9AE000
heap
page read and write
928000
heap
page read and write
3036000
direct allocation
page read and write
B82E000
direct allocation
page read and write
3921000
direct allocation
page read and write
3A51000
heap
page read and write
9B8000
heap
page read and write
B80C000
direct allocation
page read and write
997000
heap
page read and write
6BB0000
heap
page read and write
9B9000
heap
page read and write
7F6F000
stack
page read and write
6EBD000
heap
page read and write
220F000
direct allocation
page read and write
80E0000
remote allocation
page read and write
660D000
heap
page read and write
38B4000
direct allocation
page read and write
3928000
direct allocation
page read and write
3A51000
heap
page read and write
3873000
direct allocation
page read and write
701C000
heap
page read and write
5B0000
heap
page read and write
B846000
direct allocation
page read and write
490000
heap
page read and write
5B2E000
stack
page read and write
9A2000
heap
page read and write
A23D000
heap
page read and write
305A000
direct allocation
page read and write
9AB000
heap
page read and write
994000
heap
page read and write
1BA5000
unkown
page execute read
9B9000
heap
page read and write
2756000
direct allocation
page read and write
2CA0000
heap
page read and write
9A4000
heap
page read and write
6B5C000
heap
page read and write
38A6000
direct allocation
page read and write
9B8000
heap
page read and write
6D7F000
direct allocation
page read and write
50D38000
unkown
page readonly
38CA000
direct allocation
page read and write
6A20000
heap
page read and write
918000
heap
page read and write
6DCC000
unkown
page write copy
98D000
heap
page read and write
59EE000
stack
page read and write
27A6000
direct allocation
page read and write
26A0000
direct allocation
page read and write
6DC2000
direct allocation
page read and write
6D68000
direct allocation
page read and write
98D000
heap
page read and write
21E2000
direct allocation
page read and write
98B000
heap
page read and write
25FE000
direct allocation
page read and write
6B34000
heap
page read and write
9A4000
heap
page read and write
3A51000
heap
page read and write
5D6F000
stack
page read and write
997000
heap
page read and write
3070000
direct allocation
page read and write
B823000
direct allocation
page read and write
6B34000
heap
page read and write
9AB000
heap
page read and write
981000
heap
page read and write
9B8000
heap
page read and write
98F000
heap
page read and write
75E5000
direct allocation
page read and write
652E000
stack
page read and write
996000
heap
page read and write
6BB3000
heap
page read and write
4F6000
unkown
page read and write
64EF000
stack
page read and write
3A51000
heap
page read and write
6BB1000
heap
page read and write
FE0000
unkown
page write copy
6DD5000
unkown
page readonly
626F000
stack
page read and write
6D59000
direct allocation
page read and write
88D000
unkown
page read and write
2FAE000
stack
page read and write
6BB5000
heap
page read and write
71C7000
unkown
page read and write
997000
heap
page read and write
26CE000
direct allocation
page read and write
96A000
heap
page read and write
300A000
direct allocation
page read and write
3890000
direct allocation
page read and write
3A51000
heap
page read and write
962000
heap
page read and write
6C42000
direct allocation
page read and write
7866000
direct allocation
page read and write
6E30000
heap
page read and write
774000
heap
page read and write
3A51000
heap
page read and write
6B31000
heap
page read and write
3904000
direct allocation
page read and write
6D0000
heap
page read and write
775000
heap
page read and write
6BEB000
heap
page read and write
8224000
direct allocation
page read and write
8C7000
heap
page read and write
26E9000
direct allocation
page read and write
34BF000
stack
page read and write
3018000
direct allocation
page read and write
7CEE000
stack
page read and write
B802000
direct allocation
page read and write
726000
heap
page read and write
983000
heap
page read and write
B7E5000
direct allocation
page read and write
3A51000
heap
page read and write
3864000
direct allocation
page read and write
76E8000
direct allocation
page read and write
7649000
direct allocation
page read and write
2CC0000
direct allocation
page read and write
3A51000
heap
page read and write
6EF4000
heap
page read and write
922000
heap
page read and write
3A51000
heap
page read and write
7612000
direct allocation
page read and write
9AB000
heap
page read and write
3A51000
heap
page read and write
997000
heap
page read and write
6B49000
heap
page read and write
9A2000
heap
page read and write
55ED000
stack
page read and write
21EA000
direct allocation
page read and write
8370000
trusted library allocation
page read and write
9AE000
heap
page read and write
6B64000
heap
page read and write
997000
heap
page read and write
66A1000
direct allocation
page read and write
662F000
stack
page read and write
3053000
direct allocation
page read and write
95B000
heap
page read and write
1BE5000
unkown
page read and write
D00000
unkown
page readonly
401000
unkown
page execute read
9BD000
heap
page read and write
98B000
heap
page read and write
C6C000
unkown
page read and write
9A8000
heap
page read and write
26F7000
direct allocation
page read and write
21DB000
direct allocation
page read and write
767B000
direct allocation
page read and write
6DC6000
unkown
page read and write
4FC000
unkown
page read and write
9AB000
heap
page read and write
6D41000
direct allocation
page read and write
3882000
direct allocation
page read and write
774000
heap
page read and write
382D000
direct allocation
page read and write
3855000
direct allocation
page read and write
6BA2000
heap
page read and write
6BD2000
heap
page read and write
63AF000
stack
page read and write
54EC000
stack
page read and write
750B000
unkown
page read and write
2208000
direct allocation
page read and write
1BB4000
unkown
page read and write
522000
unkown
page readonly
6BF3000
heap
page read and write
6C38000
heap
page read and write
2E30000
direct allocation
page read and write
6697000
direct allocation
page read and write
9A4000
heap
page read and write
98F000
heap
page read and write
74F4000
unkown
page read and write
FD2000
unkown
page read and write
18F000
stack
page read and write
6676000
direct allocation
page read and write
6B33000
heap
page read and write
223A000
direct allocation
page read and write
981000
heap
page read and write
476000
unkown
page readonly
9AB000
heap
page read and write
38C2000
direct allocation
page read and write
850000
unkown
page readonly
501CC000
unkown
page readonly
3A51000
heap
page read and write
2740000
direct allocation
page read and write
701B000
heap
page read and write
6D8000
heap
page read and write
6DAC000
direct allocation
page read and write
99F000
heap
page read and write
50A80000
unkown
page readonly
1BEB000
unkown
page write copy
6DB3000
direct allocation
page read and write
6B80000
heap
page read and write
6DE3000
direct allocation
page read and write
FDC000
unkown
page read and write
1BE8000
unkown
page read and write
994000
heap
page read and write
9AE000
heap
page read and write
95000
stack
page read and write
997000
heap
page read and write
336F000
stack
page read and write
997000
heap
page read and write
7A2E000
stack
page read and write
6B35000
heap
page read and write
2FED000
direct allocation
page read and write
6DFA000
direct allocation
page read and write
9B8000
heap
page read and write
6B34000
heap
page read and write
9BD000
heap
page read and write
27BC000
direct allocation
page read and write
6C35000
heap
page read and write
326E000
stack
page read and write
3A51000
heap
page read and write
50D37000
unkown
page read and write
2709000
direct allocation
page read and write
C6F000
unkown
page read and write
98B000
heap
page read and write
9AE000
heap
page read and write
98E000
heap
page read and write
761C000
direct allocation
page read and write
9B8000
heap
page read and write
4EE000
unkown
page read and write
3A51000
heap
page read and write
3A51000
heap
page read and write
B836000
direct allocation
page read and write
30AF000
stack
page read and write
9AB000
heap
page read and write
3A51000
heap
page read and write
37F5000
direct allocation
page read and write
668E000
direct allocation
page read and write
7B2D000
stack
page read and write
27CA000
direct allocation
page read and write
98F000
heap
page read and write
997000
heap
page read and write
BC1000
unkown
page execute read
3A51000
heap
page read and write
6BEC000
heap
page read and write
3A51000
heap
page read and write
6B90000
heap
page read and write
994000
heap
page read and write
982000
heap
page read and write
6B31000
heap
page read and write
302F000
direct allocation
page read and write
98E000
heap
page read and write
6E32000
heap
page read and write
FFCF0000
direct allocation
page read and write
98B000
heap
page read and write
90E000
heap
page read and write
38BB000
direct allocation
page read and write
50CFB000
unkown
page write copy
977000
heap
page read and write
6DF0000
heap
page read and write
2025000
heap
page read and write
3A51000
heap
page read and write
77AE000
stack
page read and write
2224000
direct allocation
page read and write
2F6D000
stack
page read and write
9B8000
heap
page read and write
26DC000
direct allocation
page read and write
15E1000
unkown
page execute read
994000
heap
page read and write
9AB000
heap
page read and write
6B31000
heap
page read and write
1BF0000
unkown
page readonly
2350000
direct allocation
page read and write
7260000
unkown
page readonly
99F000
heap
page read and write
99A000
heap
page read and write
9A4000
heap
page read and write
9B4000
heap
page read and write
42F000
unkown
page readonly
3A51000
heap
page read and write
76D3000
direct allocation
page read and write
5011D000
unkown
page read and write
6E34000
heap
page read and write
63EE000
stack
page read and write
3A51000
heap
page read and write
6B9E000
heap
page read and write
54AF000
stack
page read and write
9A2000
heap
page read and write
9B4000
heap
page read and write
3A51000
heap
page read and write
9AB000
heap
page read and write
93C000
heap
page read and write
3A51000
heap
page read and write
6B99000
heap
page read and write
6363000
heap
page read and write
6B82000
heap
page read and write
7515000
unkown
page read and write
981000
heap
page read and write
9A4000
heap
page read and write
3CBF000
stack
page read and write
9B4000
heap
page read and write
9AB000
heap
page read and write
3A51000
heap
page read and write
994000
heap
page read and write
3A51000
heap
page read and write
4C2000
unkown
page execute read
3A51000
heap
page read and write
74F8000
unkown
page write copy
98F000
heap
page read and write
944000
heap
page read and write
98E000
heap
page read and write
92B000
heap
page read and write
3A51000
heap
page read and write
994000
heap
page read and write
384E000
direct allocation
page read and write
666F000
direct allocation
page read and write
3897000
direct allocation
page read and write
9A4000
heap
page read and write
8C0000
heap
page read and write
98B000
heap
page read and write
98D000
heap
page read and write
80E0000
remote allocation
page read and write
FD3000
unkown
page write copy
9B000
stack
page read and write
2729000
direct allocation
page read and write
3889000
direct allocation
page read and write
760000
heap
page read and write
50CFC000
unkown
page read and write
98F000
heap
page read and write
59AF000
stack
page read and write
895000
unkown
page readonly
572B000
stack
page read and write
948000
heap
page read and write
401000
unkown
page execute read
42C000
unkown
page read and write
383D000
direct allocation
page read and write
381A000
direct allocation
page read and write
2248000
direct allocation
page read and write
3A51000
heap
page read and write
3A51000
heap
page read and write
9A9000
heap
page read and write
9B9000
heap
page read and write
222C000
direct allocation
page read and write
3A51000
heap
page read and write
6BDD000
heap
page read and write
9A4000
heap
page read and write
9B8000
heap
page read and write
7FB10000
direct allocation
page read and write
98B000
heap
page read and write
6B7B000
heap
page read and write
3A51000
heap
page read and write
98F000
heap
page read and write
3A51000
heap
page read and write
3A51000
heap
page read and write
6B3C000
heap
page read and write
5012C000
unkown
page readonly
5320000
heap
page read and write
3A51000
heap
page read and write
959000
heap
page read and write
2233000
direct allocation
page read and write
6B54000
heap
page read and write
5FEF000
stack
page read and write
774000
heap
page read and write
524000
unkown
page readonly
3A51000
heap
page read and write
9B8000
heap
page read and write
6B8D000
heap
page read and write
6D88000
direct allocation
page read and write
3A51000
heap
page read and write
7119000
direct allocation
page read and write
6B5F000
heap
page read and write
3A51000
heap
page read and write
937000
heap
page read and write
6D77000
direct allocation
page read and write
6C3E000
heap
page read and write
9AE000
heap
page read and write
3A51000
heap
page read and write
6F3E000
stack
page read and write
3A51000
heap
page read and write
6B33000
heap
page read and write
5C6E000
stack
page read and write
6B3E000
heap
page read and write
9AB000
heap
page read and write
3A51000
heap
page read and write
76A8000
direct allocation
page read and write
9A2000
heap
page read and write
3A51000
heap
page read and write
990000
heap
page read and write
982000
heap
page read and write
6C31000
heap
page read and write
5300000
heap
page read and write
3A51000
heap
page read and write
701A000
heap
page read and write
50D15000
unkown
page write copy
6B33000
heap
page read and write
1BEA000
unkown
page read and write
425000
unkown
page read and write
9B4000
heap
page read and write
6B49000
heap
page read and write
965000
heap
page read and write
3A51000
heap
page read and write
3838000
direct allocation
page read and write
7683000
direct allocation
page read and write
7FAE000
stack
page read and write
982000
heap
page read and write
9A9000
heap
page read and write
3A51000
heap
page read and write
94B000
heap
page read and write
42D000
unkown
page write copy
275D000
direct allocation
page read and write
6DE9000
direct allocation
page read and write
9A6000
heap
page read and write
31EF000
stack
page read and write
3044000
direct allocation
page read and write
1BCC000
unkown
page read and write
3A50000
heap
page read and write
766D000
direct allocation
page read and write
99F000
heap
page read and write
981000
heap
page read and write
602E000
stack
page read and write
3A51000
heap
page read and write
751E000
unkown
page readonly
3A51000
heap
page read and write
960000
heap
page read and write
997000
heap
page read and write
891000
unkown
page write copy
6B3F000
heap
page read and write
6BB7000
heap
page read and write
5EAF000
stack
page read and write
3A51000
heap
page read and write
99A000
heap
page read and write
71B0000
unkown
page readonly
3A51000
heap
page read and write
A201000
heap
page read and write
50D10000
unkown
page write copy
2701000
direct allocation
page read and write
3A51000
heap
page read and write
50CF9000
unkown
page read and write
3A51000
heap
page read and write
3A51000
heap
page read and write
3A51000
heap
page read and write
751C000
unkown
page readonly
981000
heap
page read and write
3A51000
heap
page read and write
81DA000
direct allocation
page read and write
980000
heap
page read and write
75DE000
direct allocation
page read and write
9AB000
heap
page read and write
B853000
direct allocation
page read and write
97C000
heap
page read and write
1BD8000
unkown
page write copy
6DA1000
unkown
page execute read
98B000
heap
page read and write
765E000
direct allocation
page read and write
982000
heap
page read and write
9A4000
heap
page read and write
50D12000
unkown
page read and write
6BD4000
heap
page read and write
99F000
heap
page read and write
3A51000
heap
page read and write
7016000
heap
page read and write
2CC0000
direct allocation
page read and write
C7F000
unkown
page readonly
15E0000
unkown
page readonly
66A8000
direct allocation
page read and write
1BE0000
unkown
page read and write
2FFB000
direct allocation
page read and write
3A51000
heap
page read and write
68DF000
stack
page read and write
3061000
direct allocation
page read and write
6B30000
heap
page read and write
62AE000
stack
page read and write
982000
heap
page read and write
3A51000
heap
page read and write
2798000
direct allocation
page read and write
99F000
heap
page read and write
5330000
direct allocation
page execute and read and write
6B78000
heap
page read and write
2747000
direct allocation
page read and write
1006000
unkown
page readonly
770000
heap
page read and write
FFBB9000
direct allocation
page read and write
3B8C000
stack
page read and write
96C000
heap
page read and write
71D2000
unkown
page readonly
616E000
stack
page read and write
400000
unkown
page readonly
6B80000
heap
page read and write
3A51000
heap
page read and write
3A51000
heap
page read and write
6BEF000
heap
page read and write
387A000
direct allocation
page read and write
5012B000
unkown
page read and write
709A000
heap
page read and write
95E000
heap
page read and write
9A4000
heap
page read and write
3A51000
heap
page read and write
9AB000
heap
page read and write
3A51000
heap
page read and write
2FDE000
direct allocation
page read and write
3806000
direct allocation
page read and write
1BD1000
unkown
page read and write
76B6000
direct allocation
page read and write
9A4000
heap
page read and write
6B33000
heap
page read and write
4FA000
unkown
page write copy
6D0000
heap
page read and write
2E6C000
stack
page read and write
751B000
unkown
page read and write
7DEF000
stack
page read and write
6B3C000
heap
page read and write
3A70000
heap
page read and write
66C0000
direct allocation
page read and write
982000
heap
page read and write
50001000
unkown
page execute read
98F000
heap
page read and write
6665000
direct allocation
page read and write
9AE000
heap
page read and write
9AB000
heap
page read and write
1BCF000
unkown
page read and write
3A51000
heap
page read and write
2CB0000
direct allocation
page read and write
930000
heap
page read and write
7C6F000
stack
page read and write
9AE000
heap
page read and write
994000
heap
page read and write
9AB000
heap
page read and write
3A51000
heap
page read and write
3A51000
heap
page read and write
6B64000
heap
page read and write
80AF000
stack
page read and write
702C000
heap
page read and write
3A51000
heap
page read and write
3A51000
heap
page read and write
915000
heap
page read and write
1BE9000
unkown
page write copy
B869000
direct allocation
page read and write
6C30000
direct allocation
page readonly
FFB7B000
direct allocation
page read and write
381F000
direct allocation
page read and write
6B33000
heap
page read and write
274E000
direct allocation
page read and write
C6E000
unkown
page write copy
3A51000
heap
page read and write
30EE000
stack
page read and write
98F000
heap
page read and write
3BB0000
heap
page read and write
3A51000
heap
page read and write
6B31000
heap
page read and write
91F000
heap
page read and write
There are 819 hidden memdumps, click here to show them.