IOC Report
SecuriteInfo.com.Win32.BootkitX-gen.5272.14841.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.BootkitX-gen.5272.14841.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_4a6c55577aaedf8dddd3a286fa2779c4277b_c0c012cd_099ad559-0e01-4b7d-a504-7bb0194793d8\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER99A5.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Jul 2 19:24:34 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9AEE.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9BBA.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.BootkitX-gen.5272.14841.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.BootkitX-gen.5272.14841.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7344 -s 1640

URLs

Name
IP
Malicious
radiationnopp.shop
malicious
publicitttyps.shop
malicious
answerrsdo.shop
malicious
benchillppwo.shop
malicious
bargainnykwo.shop
malicious
bouncedgowp.shop
malicious
bannngwko.shop
malicious
stationacutwo.shop
malicious
affecthorsedpo.shop
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://stationacutwo.shop/api8
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://upx.sf.net
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://stationacutwo.shop/C
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://stationacutwo.shop/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://stationacutwo.shop/api
188.114.96.3
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://stationacutwo.shop/li
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
There are 30 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
stationacutwo.shop
188.114.96.3
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
stationacutwo.shop
European Union
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{62144bad-46ff-02ee-ca30-4a876bb0f5be}\Root\InventoryApplicationFile\securiteinfo.com|4520026ce72d2ad2
ProgramId
\REGISTRY\A\{62144bad-46ff-02ee-ca30-4a876bb0f5be}\Root\InventoryApplicationFile\securiteinfo.com|4520026ce72d2ad2
FileId
\REGISTRY\A\{62144bad-46ff-02ee-ca30-4a876bb0f5be}\Root\InventoryApplicationFile\securiteinfo.com|4520026ce72d2ad2
LowerCaseLongPath
\REGISTRY\A\{62144bad-46ff-02ee-ca30-4a876bb0f5be}\Root\InventoryApplicationFile\securiteinfo.com|4520026ce72d2ad2
LongPathHash
\REGISTRY\A\{62144bad-46ff-02ee-ca30-4a876bb0f5be}\Root\InventoryApplicationFile\securiteinfo.com|4520026ce72d2ad2
Name
\REGISTRY\A\{62144bad-46ff-02ee-ca30-4a876bb0f5be}\Root\InventoryApplicationFile\securiteinfo.com|4520026ce72d2ad2
OriginalFileName
\REGISTRY\A\{62144bad-46ff-02ee-ca30-4a876bb0f5be}\Root\InventoryApplicationFile\securiteinfo.com|4520026ce72d2ad2
Publisher
\REGISTRY\A\{62144bad-46ff-02ee-ca30-4a876bb0f5be}\Root\InventoryApplicationFile\securiteinfo.com|4520026ce72d2ad2
Version
\REGISTRY\A\{62144bad-46ff-02ee-ca30-4a876bb0f5be}\Root\InventoryApplicationFile\securiteinfo.com|4520026ce72d2ad2
BinFileVersion
\REGISTRY\A\{62144bad-46ff-02ee-ca30-4a876bb0f5be}\Root\InventoryApplicationFile\securiteinfo.com|4520026ce72d2ad2
BinaryType
\REGISTRY\A\{62144bad-46ff-02ee-ca30-4a876bb0f5be}\Root\InventoryApplicationFile\securiteinfo.com|4520026ce72d2ad2
ProductName
\REGISTRY\A\{62144bad-46ff-02ee-ca30-4a876bb0f5be}\Root\InventoryApplicationFile\securiteinfo.com|4520026ce72d2ad2
ProductVersion
\REGISTRY\A\{62144bad-46ff-02ee-ca30-4a876bb0f5be}\Root\InventoryApplicationFile\securiteinfo.com|4520026ce72d2ad2
LinkDate
\REGISTRY\A\{62144bad-46ff-02ee-ca30-4a876bb0f5be}\Root\InventoryApplicationFile\securiteinfo.com|4520026ce72d2ad2
BinProductVersion
\REGISTRY\A\{62144bad-46ff-02ee-ca30-4a876bb0f5be}\Root\InventoryApplicationFile\securiteinfo.com|4520026ce72d2ad2
AppxPackageFullName
\REGISTRY\A\{62144bad-46ff-02ee-ca30-4a876bb0f5be}\Root\InventoryApplicationFile\securiteinfo.com|4520026ce72d2ad2
AppxPackageRelativeId
\REGISTRY\A\{62144bad-46ff-02ee-ca30-4a876bb0f5be}\Root\InventoryApplicationFile\securiteinfo.com|4520026ce72d2ad2
Size
\REGISTRY\A\{62144bad-46ff-02ee-ca30-4a876bb0f5be}\Root\InventoryApplicationFile\securiteinfo.com|4520026ce72d2ad2
Language
\REGISTRY\A\{62144bad-46ff-02ee-ca30-4a876bb0f5be}\Root\InventoryApplicationFile\securiteinfo.com|4520026ce72d2ad2
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
28B0000
direct allocation
page execute and read and write
malicious
4F86000
trusted library allocation
page read and write
2B7C000
heap
page read and write
2914000
heap
page read and write
4FAA000
trusted library allocation
page read and write
2B72000
heap
page read and write
4F79000
trusted library allocation
page read and write
4FAA000
trusted library allocation
page read and write
2914000
heap
page read and write
4F68000
trusted library allocation
page read and write
5101000
trusted library allocation
page read and write
2914000
heap
page read and write
4F38000
trusted library allocation
page read and write
4F58000
trusted library allocation
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
4F5E000
trusted library allocation
page read and write
4FA8000
trusted library allocation
page read and write
4F76000
trusted library allocation
page read and write
2914000
heap
page read and write
2B7C000
heap
page read and write
4F76000
trusted library allocation
page read and write
4F76000
trusted library allocation
page read and write
2914000
heap
page read and write
4F38000
trusted library allocation
page read and write
4F48000
trusted library allocation
page read and write
5172000
trusted library allocation
page read and write
5001000
heap
page read and write
2B1B000
heap
page read and write
2914000
heap
page read and write
4F86000
trusted library allocation
page read and write
2B74000
heap
page read and write
4F38000
trusted library allocation
page read and write
2B16000
heap
page read and write
4F01000
trusted library allocation
page read and write
4F6F000
trusted library allocation
page read and write
2914000
heap
page read and write
4F79000
trusted library allocation
page read and write
5139000
trusted library allocation
page read and write
2914000
heap
page read and write
2B98000
heap
page read and write
4F3B000
trusted library allocation
page read and write
4F86000
trusted library allocation
page read and write
505A000
trusted library allocation
page read and write
4F1F000
trusted library allocation
page read and write
2914000
heap
page read and write
4F09000
trusted library allocation
page read and write
2914000
heap
page read and write
4FA8000
trusted library allocation
page read and write
4FB5000
trusted library allocation
page read and write
2914000
heap
page read and write
4F3A000
trusted library allocation
page read and write
2914000
heap
page read and write
4FA8000
trusted library allocation
page read and write
45F0000
remote allocation
page read and write
2B16000
heap
page read and write
4F98000
trusted library allocation
page read and write
2914000
heap
page read and write
2B86000
heap
page read and write
2914000
heap
page read and write
4FB8000
trusted library allocation
page read and write
4DFE000
stack
page read and write
4F93000
trusted library allocation
page read and write
50DA000
trusted library allocation
page read and write
2B1B000
heap
page read and write
2B74000
heap
page read and write
4FB8000
trusted library allocation
page read and write
2914000
heap
page read and write
4FB5000
trusted library allocation
page read and write
4F62000
trusted library allocation
page read and write
4F37000
trusted library allocation
page read and write
2914000
heap
page read and write
4F6B000
trusted library allocation
page read and write
2B7D000
heap
page read and write
2914000
heap
page read and write
4DBF000
stack
page read and write
4CBE000
stack
page read and write
56BE000
trusted library allocation
page read and write
2914000
heap
page read and write
4F12000
trusted library allocation
page read and write
2914000
heap
page read and write
4F02000
trusted library allocation
page read and write
2B87000
heap
page read and write
512A000
trusted library allocation
page read and write
2914000
heap
page read and write
4F12000
trusted library allocation
page read and write
2B72000
heap
page read and write
4F79000
trusted library allocation
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
2B84000
heap
page read and write
4F6B000
trusted library allocation
page read and write
2910000
heap
page read and write
4F04000
trusted library allocation
page read and write
2914000
heap
page read and write
4F28000
trusted library allocation
page read and write
5022000
trusted library allocation
page read and write
2914000
heap
page read and write
4F76000
trusted library allocation
page read and write
2914000
heap
page read and write
2B03000
heap
page read and write
2B61000
heap
page read and write
4F04000
trusted library allocation
page read and write
2914000
heap
page read and write
4FB5000
trusted library allocation
page read and write
4F2F000
trusted library allocation
page read and write
4F5D000
trusted library allocation
page read and write
4F38000
trusted library allocation
page read and write
4F45000
trusted library allocation
page read and write
4F0B000
trusted library allocation
page read and write
5131000
trusted library allocation
page read and write
2B39000
heap
page read and write
2B86000
heap
page read and write
2914000
heap
page read and write
4F28000
trusted library allocation
page read and write
4F28000
trusted library allocation
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
4F06000
trusted library allocation
page read and write
4F1D000
trusted library allocation
page read and write
2B96000
heap
page read and write
4F98000
trusted library allocation
page read and write
2A5D000
stack
page read and write
2914000
heap
page read and write
4F86000
trusted library allocation
page read and write
4F2F000
trusted library allocation
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
4F28000
trusted library allocation
page read and write
4F76000
trusted library allocation
page read and write
2914000
heap
page read and write
4F5C000
trusted library allocation
page read and write
2914000
heap
page read and write
4F30000
trusted library allocation
page read and write
2B99000
heap
page read and write
4F1F000
trusted library allocation
page read and write
2B86000
heap
page read and write
2AFD000
heap
page read and write
4F48000
trusted library allocation
page read and write
2B84000
heap
page read and write
4F79000
trusted library allocation
page read and write
2914000
heap
page read and write
2B96000
heap
page read and write
4F22000
trusted library allocation
page read and write
2B74000
heap
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
4F7B000
trusted library allocation
page read and write
4F27000
trusted library allocation
page read and write
4FA8000
trusted library allocation
page read and write
5500000
heap
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
4F24000
trusted library allocation
page read and write
4F33000
trusted library allocation
page read and write
483F000
stack
page read and write
4F21000
trusted library allocation
page read and write
2914000
heap
page read and write
2B72000
heap
page read and write
4F40000
trusted library allocation
page read and write
4F79000
trusted library allocation
page read and write
2AFD000
heap
page read and write
2B79000
heap
page read and write
545F000
stack
page read and write
2914000
heap
page read and write
50E2000
trusted library allocation
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
4F19000
trusted library allocation
page read and write
2914000
heap
page read and write
4F48000
trusted library allocation
page read and write
4F34000
trusted library allocation
page read and write
2B03000
heap
page read and write
4F00000
trusted library allocation
page read and write
4F48000
trusted library allocation
page read and write
4F79000
trusted library allocation
page read and write
2B1A000
heap
page read and write
2914000
heap
page read and write
512F000
trusted library allocation
page read and write
4F52000
trusted library allocation
page read and write
5119000
trusted library allocation
page read and write
4F7D000
trusted library allocation
page read and write
2B7B000
heap
page read and write
2914000
heap
page read and write
4F76000
trusted library allocation
page read and write
4F86000
trusted library allocation
page read and write
19A000
stack
page read and write
4F79000
trusted library allocation
page read and write
2914000
heap
page read and write
436000
unkown
page readonly
2B72000
heap
page read and write
447E000
stack
page read and write
4FAA000
trusted library allocation
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
2B74000
heap
page read and write
2914000
heap
page read and write
2AF6000
heap
page read and write
2914000
heap
page read and write
4F2B000
trusted library allocation
page read and write
4F7D000
trusted library allocation
page read and write
4630000
heap
page read and write
2914000
heap
page read and write
2B86000
heap
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
2B84000
heap
page read and write
2B7D000
heap
page read and write
2914000
heap
page read and write
473D000
stack
page read and write
4F51000
trusted library allocation
page read and write
4F86000
trusted library allocation
page read and write
4F76000
trusted library allocation
page read and write
4F49000
trusted library allocation
page read and write
2B38000
heap
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
2AC1000
heap
page execute and read and write
2914000
heap
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
4F79000
trusted library allocation
page read and write
2914000
heap
page read and write
4FAA000
trusted library allocation
page read and write
5000000
heap
page read and write
4F48000
trusted library allocation
page read and write
4F35000
trusted library allocation
page read and write
2810000
heap
page read and write
2B16000
heap
page read and write
4F4A000
trusted library allocation
page read and write
2B86000
heap
page read and write
2914000
heap
page read and write
2B03000
heap
page read and write
2A1F000
stack
page read and write
4F7F000
trusted library allocation
page read and write
4F7B000
trusted library allocation
page read and write
2B78000
heap
page read and write
2B98000
heap
page read and write
4F79000
trusted library allocation
page read and write
4F0B000
trusted library allocation
page read and write
2914000
heap
page read and write
4F58000
trusted library allocation
page read and write
2914000
heap
page read and write
2B98000
heap
page read and write
4F37000
trusted library allocation
page read and write
2B8D000
heap
page read and write
4F79000
trusted library allocation
page read and write
285E000
stack
page read and write
4F02000
trusted library allocation
page read and write
2914000
heap
page read and write
4F1F000
trusted library allocation
page read and write
4F65000
trusted library allocation
page read and write
2914000
heap
page read and write
2B86000
heap
page read and write
4F7B000
trusted library allocation
page read and write
4F76000
trusted library allocation
page read and write
2B86000
heap
page read and write
4F28000
trusted library allocation
page read and write
2B84000
heap
page read and write
2914000
heap
page read and write
2B87000
heap
page read and write
4F28000
trusted library allocation
page read and write
2B8A000
heap
page read and write
4F2F000
trusted library allocation
page read and write
4F7F000
trusted library allocation
page read and write
4FAA000
trusted library allocation
page read and write
2914000
heap
page read and write
2AF6000
heap
page read and write
50AA000
trusted library allocation
page read and write
4F7B000
trusted library allocation
page read and write
4F76000
trusted library allocation
page read and write
2914000
heap
page read and write
4F01000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
2AFD000
heap
page read and write
5139000
trusted library allocation
page read and write
503A000
trusted library allocation
page read and write
2914000
heap
page read and write
401000
unkown
page execute read
2A9E000
stack
page read and write
2B74000
heap
page read and write
2B16000
heap
page read and write
2900000
heap
page read and write
2B98000
heap
page read and write
2B7B000
heap
page read and write
2914000
heap
page read and write
4F38000
trusted library allocation
page read and write
2914000
heap
page read and write
4F62000
trusted library allocation
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
4F37000
trusted library allocation
page read and write
4F48000
trusted library allocation
page read and write
4F79000
trusted library allocation
page read and write
2AFE000
heap
page read and write
2914000
heap
page read and write
493F000
stack
page read and write
2B82000
heap
page read and write
4F76000
trusted library allocation
page read and write
2914000
heap
page read and write
551E000
trusted library allocation
page read and write
2B98000
heap
page read and write
2B72000
heap
page read and write
2914000
heap
page read and write
4F42000
trusted library allocation
page read and write
439000
unkown
page write copy
2B16000
heap
page read and write
4F3B000
trusted library allocation
page read and write
4F9B000
trusted library allocation
page read and write
4F5A000
trusted library allocation
page read and write
4F7F000
trusted library allocation
page read and write
5009000
trusted library allocation
page read and write
4F76000
trusted library allocation
page read and write
55AB000
trusted library allocation
page read and write
4F08000
trusted library allocation
page read and write
4F27000
trusted library allocation
page read and write
2914000
heap
page read and write
5003000
trusted library allocation
page read and write
4F79000
trusted library allocation
page read and write
44C0000
heap
page read and write
2B8F000
heap
page read and write
2AFD000
heap
page read and write
452000
unkown
page execute and read and write
2914000
heap
page read and write
4F0B000
trusted library allocation
page read and write
4F1A000
trusted library allocation
page read and write
4F4B000
trusted library allocation
page read and write
4F1F000
trusted library allocation
page read and write
2B72000
heap
page read and write
4F06000
trusted library allocation
page read and write
2914000
heap
page read and write
2AF7000
heap
page read and write
2B74000
heap
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
4F01000
trusted library allocation
page read and write
4F79000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
2914000
heap
page read and write
4F76000
trusted library allocation
page read and write
4F24000
trusted library allocation
page read and write
2726000
unkown
page readonly
4F63000
trusted library allocation
page read and write
4F76000
trusted library allocation
page read and write
4F5E000
trusted library allocation
page read and write
5101000
trusted library allocation
page read and write
4F2B000
trusted library allocation
page read and write
2B99000
heap
page read and write
512F000
trusted library allocation
page read and write
5108000
trusted library allocation
page read and write
5F20000
trusted library allocation
page read and write
4F68000
trusted library allocation
page read and write
2B98000
heap
page read and write
4F3A000
trusted library allocation
page read and write
2914000
heap
page read and write
4F53000
trusted library allocation
page read and write
4F1F000
trusted library allocation
page read and write
4F07000
trusted library allocation
page read and write
2914000
heap
page read and write
4F79000
trusted library allocation
page read and write
4F2F000
trusted library allocation
page read and write
4F6A000
trusted library allocation
page read and write
2B72000
heap
page read and write
2B18000
heap
page read and write
4F7F000
trusted library allocation
page read and write
2B74000
heap
page read and write
2726000
unkown
page readonly
4F7D000
trusted library allocation
page read and write
4F76000
trusted library allocation
page read and write
2914000
heap
page read and write
4F48000
trusted library allocation
page read and write
4F48000
trusted library allocation
page read and write
2B0D000
heap
page read and write
2B96000
heap
page read and write
4F79000
trusted library allocation
page read and write
4F43000
trusted library allocation
page read and write
2914000
heap
page read and write
4F0D000
trusted library allocation
page read and write
2AED000
heap
page read and write
4F28000
trusted library allocation
page read and write
2914000
heap
page read and write
4F25000
trusted library allocation
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
4F11000
trusted library allocation
page read and write
2914000
heap
page read and write
4F38000
trusted library allocation
page read and write
4F38000
trusted library allocation
page read and write
2914000
heap
page read and write
4F46000
trusted library allocation
page read and write
4F76000
trusted library allocation
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
4F7B000
trusted library allocation
page read and write
2914000
heap
page read and write
4F79000
trusted library allocation
page read and write
2B8D000
heap
page read and write
45F0000
remote allocation
page read and write
4F28000
trusted library allocation
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
4FB8000
trusted library allocation
page read and write
2914000
heap
page read and write
44BE000
stack
page read and write
4FA8000
trusted library allocation
page read and write
2B98000
heap
page read and write
4FC0000
trusted library allocation
page read and write
2914000
heap
page read and write
2B76000
heap
page read and write
4F33000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
443F000
stack
page read and write
2914000
heap
page read and write
4F38000
trusted library allocation
page read and write
2914000
heap
page read and write
400000
unkown
page readonly
4F28000
trusted library allocation
page read and write
2B82000
heap
page read and write
2B1B000
heap
page read and write
2914000
heap
page read and write
4F1F000
trusted library allocation
page read and write
5119000
trusted library allocation
page read and write
4FB5000
trusted library allocation
page read and write
2914000
heap
page read and write
2B72000
heap
page read and write
2B7C000
heap
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
4F18000
trusted library allocation
page read and write
4F7F000
trusted library allocation
page read and write
4F76000
trusted library allocation
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
45F0000
remote allocation
page read and write
2B03000
heap
page read and write
2B03000
heap
page read and write
4F76000
trusted library allocation
page read and write
2914000
heap
page read and write
4F28000
trusted library allocation
page read and write
4F76000
trusted library allocation
page read and write
45CD000
stack
page read and write
2B80000
heap
page read and write
4F21000
trusted library allocation
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
4F76000
trusted library allocation
page read and write
4F48000
trusted library allocation
page read and write
2914000
heap
page read and write
4F5A000
trusted library allocation
page read and write
2B72000
heap
page read and write
2B03000
heap
page read and write
4F27000
trusted library allocation
page read and write
4F5A000
trusted library allocation
page read and write
4F7F000
trusted library allocation
page read and write
28AE000
stack
page read and write
4F38000
trusted library allocation
page read and write
4F7A000
trusted library allocation
page read and write
5131000
trusted library allocation
page read and write
2B74000
heap
page read and write
4F79000
trusted library allocation
page read and write
2B8F000
heap
page read and write
2B16000
heap
page read and write
4F7F000
trusted library allocation
page read and write
4F79000
trusted library allocation
page read and write
4F76000
trusted library allocation
page read and write
2B86000
heap
page read and write
2B72000
heap
page read and write
2914000
heap
page read and write
2B86000
heap
page read and write
2914000
heap
page read and write
2B72000
heap
page read and write
2AAE000
heap
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
2B74000
heap
page read and write
4F37000
trusted library allocation
page read and write
2B98000
heap
page read and write
4FB8000
trusted library allocation
page read and write
4F48000
trusted library allocation
page read and write
4F21000
trusted library allocation
page read and write
4F76000
trusted library allocation
page read and write
2914000
heap
page read and write
4F21000
trusted library allocation
page read and write
4F28000
trusted library allocation
page read and write
4F0F000
trusted library allocation
page read and write
4F56000
trusted library allocation
page read and write
4F7D000
trusted library allocation
page read and write
4F86000
trusted library allocation
page read and write
4F79000
trusted library allocation
page read and write
4F70000
trusted library allocation
page read and write
2914000
heap
page read and write
2B03000
heap
page read and write
9B000
stack
page read and write
2AFD000
heap
page read and write
4F76000
trusted library allocation
page read and write
2914000
heap
page read and write
4F38000
trusted library allocation
page read and write
2914000
heap
page read and write
4F79000
trusted library allocation
page read and write
5108000
trusted library allocation
page read and write
2B86000
heap
page read and write
4F7D000
trusted library allocation
page read and write
2AF1000
heap
page read and write
2914000
heap
page read and write
2AAA000
heap
page read and write
4F38000
trusted library allocation
page read and write
4F7B000
trusted library allocation
page read and write
4F28000
trusted library allocation
page read and write
2B74000
heap
page read and write
4F76000
trusted library allocation
page read and write
4F7D000
trusted library allocation
page read and write
4F79000
trusted library allocation
page read and write
2B87000
heap
page read and write
4F28000
trusted library allocation
page read and write
4F0B000
trusted library allocation
page read and write
2B98000
heap
page read and write
4F09000
trusted library allocation
page read and write
2B74000
heap
page read and write
2914000
heap
page read and write
4F27000
trusted library allocation
page read and write
2B0D000
heap
page read and write
4F01000
trusted library allocation
page read and write
4F0D000
trusted library allocation
page read and write
4F68000
trusted library allocation
page read and write
535E000
stack
page read and write
4F79000
trusted library allocation
page read and write
2914000
heap
page read and write
2B84000
heap
page read and write
2B84000
heap
page read and write
1F0000
heap
page read and write
5001000
heap
page read and write
2914000
heap
page read and write
2A20000
direct allocation
page read and write
2B16000
heap
page read and write
5A1D000
trusted library allocation
page read and write
4F48000
trusted library allocation
page read and write
50D2000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
4F28000
trusted library allocation
page read and write
4F7D000
trusted library allocation
page read and write
4F79000
trusted library allocation
page read and write
2914000
heap
page read and write
4EFE000
stack
page read and write
4F6F000
trusted library allocation
page read and write
4F09000
trusted library allocation
page read and write
2AA0000
heap
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
2AED000
heap
page read and write
2B74000
heap
page read and write
4F51000
trusted library allocation
page read and write
2B86000
heap
page read and write
400000
unkown
page execute and read and write
4F38000
trusted library allocation
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
2914000
heap
page read and write
4F12000
trusted library allocation
page read and write
2B1A000
heap
page read and write
4F3B000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
There are 565 hidden memdumps, click here to show them.