IOC Report
SecuriteInfo.com.Win64.Malware-gen.24311.29797.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.24311.29797.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.24311.29797.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious

URLs

Name
IP
Malicious
penetratedpoopp.xyz
malicious
ellaboratepwsz.xyz
malicious
swellfrrgwwos.xyz
malicious
willingyhollowsk.shop
malicious
towerxxuytwi.xyz
malicious
https://potterryisiw.shop/api
188.114.96.3
malicious
foodypannyjsud.shop
malicious
pedestriankodwu.xyz
malicious
contintnetksows.shop
malicious
potterryisiw.shop
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://potterryisiw.shop/l
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://potterryisiw.shop/s.j
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://potterryisiw.shop/5
unknown
https://potterryisiw.shop/api9
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://potterryisiw.shop/apip
unknown
https://github.com/gabomdq/SDL_GameControllerDB
unknown
https://potterryisiw.shop/apit
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://potterryisiw.shop/L
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://potterryisiw.shop/apiRF2
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://potterryisiw.shop/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://potterryisiw.shop/Ua3
unknown
There are 38 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
potterryisiw.shop
188.114.96.3
malicious
willingyhollowsk.shop
unknown
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
potterryisiw.shop
European Union
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
C000604000
direct allocation
page read and write
malicious
C000047000
direct allocation
page read and write
C000AF0000
direct allocation
page read and write
2AA4000
heap
page read and write
4BE0000
trusted library allocation
page read and write
C0007E0000
direct allocation
page read and write
2A9B000
heap
page read and write
4BFB000
trusted library allocation
page read and write
2AC0000
heap
page read and write
1845B279000
direct allocation
page read and write
C000A70000
direct allocation
page read and write
C000602000
direct allocation
page read and write
4C51000
trusted library allocation
page read and write
4BFF000
trusted library allocation
page read and write
4BDA000
trusted library allocation
page read and write
2A22000
heap
page read and write
4BFB000
trusted library allocation
page read and write
2AC8000
heap
page read and write
4C09000
trusted library allocation
page read and write
2A9A000
heap
page read and write
4BD8000
trusted library allocation
page read and write
4C09000
trusted library allocation
page read and write
C000990000
direct allocation
page read and write
2AC8000
heap
page read and write
C00079C000
direct allocation
page read and write
2AC0000
heap
page read and write
C0009D0000
direct allocation
page read and write
2AAB000
heap
page read and write
4C1F000
trusted library allocation
page read and write
C000489000
direct allocation
page read and write
4BE0000
trusted library allocation
page read and write
2AC9000
heap
page read and write
29C0000
remote allocation
page read and write
2A9F000
heap
page read and write
4BE0000
trusted library allocation
page read and write
4BD5000
trusted library allocation
page read and write
4BD8000
trusted library allocation
page read and write
2AAF000
heap
page read and write
C000198000
direct allocation
page read and write
4BF9000
trusted library allocation
page read and write
2AAF000
heap
page read and write
4BE0000
trusted library allocation
page read and write
4BE0000
trusted library allocation
page read and write
4C31000
trusted library allocation
page read and write
4C5E000
trusted library allocation
page read and write
1845B0A9000
heap
page read and write
4C09000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
2A06000
heap
page read and write
4BE0000
trusted library allocation
page read and write
1847FE5E000
direct allocation
page read and write
4C06000
trusted library allocation
page read and write
2AA8000
heap
page read and write
2AC0000
heap
page read and write
2AB7000
heap
page read and write
C0005F0000
direct allocation
page read and write
2ACD000
heap
page read and write
C0005B6000
direct allocation
page read and write
2A20000
heap
page read and write
4DBB000
trusted library allocation
page read and write
1847FE0F000
direct allocation
page read and write
C000588000
direct allocation
page read and write
2AC0000
heap
page read and write
C00058E000
direct allocation
page read and write
44BD000
stack
page read and write
2AA8000
heap
page read and write
4BE0000
trusted library allocation
page read and write
2AB7000
heap
page read and write
C00000A000
direct allocation
page read and write
2AC5000
heap
page read and write
2A6F000
heap
page read and write
C0000DE000
direct allocation
page read and write
C0000D6000
direct allocation
page read and write
C000B30000
direct allocation
page read and write
4BE0000
trusted library allocation
page read and write
C000041000
direct allocation
page read and write
4C32000
trusted library allocation
page read and write
2A8A000
heap
page read and write
4C01000
trusted library allocation
page read and write
C000BB4000
direct allocation
page read and write
C0005D8000
direct allocation
page read and write
2A85000
heap
page read and write
C000000000
direct allocation
page read and write
C000426000
direct allocation
page read and write
4CD0000
heap
page read and write
2A8A000
heap
page read and write
C000AE0000
direct allocation
page read and write
7FF6168BA000
unkown
page read and write
C0009A0000
direct allocation
page read and write
C000582000
direct allocation
page read and write
1847FE30000
direct allocation
page read and write
2ABD000
heap
page read and write
2AAC000
heap
page read and write
2ACA000
heap
page read and write
4CD1000
heap
page read and write
4BF9000
trusted library allocation
page read and write
25C5000
heap
page read and write
C0007B0000
direct allocation
page read and write
2A02000
heap
page read and write
2AAF000
heap
page read and write
7FF616160000
unkown
page readonly
C000A40000
direct allocation
page read and write
2AC8000
heap
page read and write
4BF0000
trusted library allocation
page read and write
2AA7000
heap
page read and write
C000600000
direct allocation
page read and write
1845B2F0000
direct allocation
page read and write
18422360000
direct allocation
page read and write
4BD1000
trusted library allocation
page read and write
4BF1000
trusted library allocation
page read and write
C0002C6000
direct allocation
page read and write
1845B330000
direct allocation
page read and write
C0005B6000
direct allocation
page read and write
4BD1000
trusted library allocation
page read and write
2A98000
heap
page read and write
C0000D8000
direct allocation
page read and write
C000B60000
direct allocation
page read and write
C000016000
direct allocation
page read and write
4BD8000
trusted library allocation
page read and write
C00004E000
direct allocation
page read and write
1845B030000
heap
page read and write
7FF61649E000
unkown
page readonly
C000A30000
direct allocation
page read and write
2A9B000
heap
page read and write
2AAC000
heap
page read and write
1847FE4B000
direct allocation
page read and write
2A98000
heap
page read and write
2AC9000
heap
page read and write
C000C00000
direct allocation
page read and write
4BFD000
trusted library allocation
page read and write
2AB6000
heap
page read and write
2AC8000
heap
page read and write
4BE9000
trusted library allocation
page read and write
1845B020000
heap
page read and write
C000B40000
direct allocation
page read and write
4BF7000
trusted library allocation
page read and write
2AB7000
heap
page read and write
4BD8000
trusted library allocation
page read and write
4BE0000
trusted library allocation
page read and write
4CE2000
trusted library allocation
page read and write
4C0D000
trusted library allocation
page read and write
C000037000
direct allocation
page read and write
218F5FF000
stack
page read and write
2AA8000
heap
page read and write
4BE0000
trusted library allocation
page read and write
4BFB000
trusted library allocation
page read and write
2AAF000
heap
page read and write
C000045000
direct allocation
page read and write
2AC5000
heap
page read and write
18422390000
direct allocation
page read and write
2A3D000
heap
page read and write
2A9B000
heap
page read and write
4BDD000
trusted library allocation
page read and write
4F90000
heap
page read and write
4BE0000
trusted library allocation
page read and write
C0000BE000
direct allocation
page read and write
C0005A4000
direct allocation
page read and write
C000030000
direct allocation
page read and write
4ACE000
stack
page read and write
C0005DE000
direct allocation
page read and write
2AC1000
heap
page read and write
C000A10000
direct allocation
page read and write
2A83000
heap
page read and write
C00078C000
direct allocation
page read and write
2A96000
heap
page read and write
1845B0B3000
heap
page read and write
7FF61649A000
unkown
page write copy
2AC6000
heap
page read and write
C000BD0000
direct allocation
page read and write
2AA3000
heap
page read and write
218F1FD000
stack
page read and write
4BE0000
trusted library allocation
page read and write
18422320000
direct allocation
page read and write
2AAC000
heap
page read and write
C000584000
direct allocation
page read and write
C000592000
direct allocation
page read and write
2A0C000
heap
page read and write
C000424000
direct allocation
page read and write
2A3C000
heap
page read and write
2AA8000
heap
page read and write
184222B0000
direct allocation
page read and write
4BD1000
trusted library allocation
page read and write
C00058A000
direct allocation
page read and write
2A94000
heap
page read and write
2AA8000
heap
page read and write
C0004D8000
direct allocation
page read and write
1845B31C000
direct allocation
page read and write
2AAD000
heap
page read and write
4BF8000
trusted library allocation
page read and write
C001000000
direct allocation
page read and write
4BE0000
trusted library allocation
page read and write
4C09000
trusted library allocation
page read and write
2AC0000
heap
page read and write
2A98000
heap
page read and write
2A98000
heap
page read and write
2AC9000
heap
page read and write
4C0F000
trusted library allocation
page read and write
C000790000
direct allocation
page read and write
2AC0000
heap
page read and write
C000B50000
direct allocation
page read and write
C000018000
direct allocation
page read and write
C0005E6000
direct allocation
page read and write
2AB7000
heap
page read and write
C0000CC000
direct allocation
page read and write
2A0C000
heap
page read and write
2ADE000
heap
page read and write
2A0C000
heap
page read and write
4C09000
trusted library allocation
page read and write
2AA4000
heap
page read and write
2AA3000
heap
page read and write
2AAD000
heap
page read and write
2A92000
heap
page read and write
4BE0000
trusted library allocation
page read and write
C0005F8000
direct allocation
page read and write
4BE0000
trusted library allocation
page read and write
4BD1000
trusted library allocation
page read and write
1845B2B0000
direct allocation
page read and write
4C07000
trusted library allocation
page read and write
C000483000
direct allocation
page read and write
2A0C000
heap
page read and write
4C21000
trusted library allocation
page read and write
7FF61649C000
unkown
page read and write
4C67000
trusted library allocation
page read and write
1847FF70000
heap
page read and write
4BD8000
trusted library allocation
page read and write
2AAC000
heap
page read and write
7FF6163DE000
unkown
page write copy
C0005E0000
direct allocation
page read and write
2AD8000
heap
page read and write
2AC9000
heap
page read and write
2A3D000
heap
page read and write
4BD0000
trusted library allocation
page read and write
C000804000
direct allocation
page read and write
4BD7000
trusted library allocation
page read and write
2AA4000
heap
page read and write
2AC0000
heap
page read and write
4BEE000
trusted library allocation
page read and write
4C32000
trusted library allocation
page read and write
4C06000
trusted library allocation
page read and write
2AB1000
heap
page read and write
2A24000
heap
page read and write
2AAF000
heap
page read and write
C000592000
direct allocation
page read and write
4BF9000
trusted library allocation
page read and write
C0000A0000
direct allocation
page read and write
C0009C0000
direct allocation
page read and write
2AAF000
heap
page read and write
2AA8000
heap
page read and write
2AAF000
heap
page read and write
2A96000
heap
page read and write
2AAC000
heap
page read and write
C000584000
direct allocation
page read and write
C000800000
direct allocation
page read and write
7FF616161000
unkown
page execute read
C0005E0000
direct allocation
page read and write
2AA8000
heap
page read and write
2A98000
heap
page read and write
2AC8000
heap
page read and write
4E86000
trusted library allocation
page read and write
2AC9000
heap
page read and write
2AC9000
heap
page read and write
2A3D000
heap
page read and write
25D0000
heap
page read and write
C000538000
direct allocation
page read and write
2AC3000
heap
page read and write
29E0000
heap
page read and write
2AC6000
heap
page read and write
29FB000
heap
page read and write
2AA4000
heap
page read and write
4BE0000
trusted library allocation
page read and write
C000AD0000
direct allocation
page read and write
4C3E000
trusted library allocation
page read and write
7FF616160000
unkown
page readonly
4C07000
trusted library allocation
page read and write
1845B2D0000
direct allocation
page read and write
2AC9000
heap
page read and write
4C10000
trusted library allocation
page read and write
C0005F0000
direct allocation
page read and write
2A96000
heap
page read and write
C000400000
direct allocation
page read and write
2AAA000
heap
page read and write
2A90000
heap
page read and write
2AC0000
heap
page read and write
1845B2FF000
direct allocation
page read and write
C000930000
direct allocation
page read and write
2AAF000
heap
page read and write
4C49000
trusted library allocation
page read and write
7FF6163D7000
unkown
page read and write
4C51000
trusted library allocation
page read and write
2A98000
heap
page read and write
2A6F000
heap
page read and write
4BCF000
stack
page read and write
C0005DC000
direct allocation
page read and write
2AC9000
heap
page read and write
7FF6163E0000
unkown
page write copy
2AAC000
heap
page read and write
2A98000
heap
page read and write
C000BC0000
direct allocation
page read and write
4C07000
trusted library allocation
page read and write
C0005B8000
direct allocation
page read and write
2A07000
heap
page read and write
4E4F000
stack
page read and write
2AB7000
heap
page read and write
7FF61649E000
unkown
page readonly
54A4000
trusted library allocation
page read and write
C0004CE000
direct allocation
page read and write
2AB3000
heap
page read and write
24B0000
heap
page read and write
4BE0000
trusted library allocation
page read and write
4C21000
trusted library allocation
page read and write
4BF0000
trusted library allocation
page read and write
2AD9000
heap
page read and write
C000554000
direct allocation
page read and write
C000558000
direct allocation
page read and write
2AA8000
heap
page read and write
2A82000
heap
page read and write
4CDC000
trusted library allocation
page read and write
2AAB000
heap
page read and write
2AAF000
heap
page read and write
1847FE1C000
direct allocation
page read and write
C0005E6000
direct allocation
page read and write
7FF6168BA000
unkown
page write copy
4BD8000
trusted library allocation
page read and write
4BD8000
trusted library allocation
page read and write
4BF1000
trusted library allocation
page read and write
7FF616485000
unkown
page read and write
2ACC000
heap
page read and write
2AC8000
heap
page read and write
2AB3000
heap
page read and write
4C10000
trusted library allocation
page read and write
2A7F000
heap
page read and write
4BD8000
trusted library allocation
page read and write
C000940000
direct allocation
page read and write
C0009B0000
direct allocation
page read and write
C0007C0000
direct allocation
page read and write
C0000CE000
direct allocation
page read and write
C000B00000
direct allocation
page read and write
2AC6000
heap
page read and write
4C20000
trusted library allocation
page read and write
464E000
stack
page read and write
C0005FC000
direct allocation
page read and write
C000B80000
direct allocation
page read and write
C00004C000
direct allocation
page read and write
2AAC000
heap
page read and write
4BFB000
trusted library allocation
page read and write
2AC8000
heap
page read and write
29C0000
remote allocation
page read and write
2AB7000
heap
page read and write
2AB1000
heap
page read and write
C0005F8000
direct allocation
page read and write
C000536000
direct allocation
page read and write
2AB5000
heap
page read and write
C000002000
direct allocation
page read and write
4BE0000
trusted library allocation
page read and write
4BD7000
trusted library allocation
page read and write
C0007D0000
direct allocation
page read and write
4E4B000
trusted library allocation
page read and write
C0005D8000
direct allocation
page read and write
7FF616161000
unkown
page execute read
2A92000
heap
page read and write
218F9FE000
stack
page read and write
4DAB000
trusted library allocation
page read and write
25C0000
heap
page read and write
C000918000
direct allocation
page read and write
1847FE54000
direct allocation
page read and write
C0005EA000
direct allocation
page read and write
4BF9000
trusted library allocation
page read and write
C0004F4000
direct allocation
page read and write
C00003A000
direct allocation
page read and write
4BE9000
trusted library allocation
page read and write
C0009F0000
direct allocation
page read and write
C000020000
direct allocation
page read and write
218E7FC000
stack
page read and write
4E8C000
trusted library allocation
page read and write
C000604000
direct allocation
page read and write
1845B30E000
direct allocation
page read and write
C000BE0000
direct allocation
page read and write
7FF6168C3000
unkown
page readonly
218F7FD000
stack
page read and write
2A22000
heap
page read and write
447D000
stack
page read and write
C000602000
direct allocation
page read and write
283E000
stack
page read and write
C0005D4000
direct allocation
page read and write
4BE0000
trusted library allocation
page read and write
4C06000
trusted library allocation
page read and write
C0005DE000
direct allocation
page read and write
2AB6000
heap
page read and write
1845B3A5000
heap
page read and write
C0004FC000
direct allocation
page read and write
2AAF000
heap
page read and write
2AAD000
heap
page read and write
C00076C000
direct allocation
page read and write
2AAB000
heap
page read and write
2A6F000
heap
page read and write
4C09000
trusted library allocation
page read and write
C000B70000
direct allocation
page read and write
2BDF000
stack
page read and write
C00041C000
direct allocation
page read and write
2AA0000
heap
page read and write
2AC9000
heap
page read and write
4BE0000
trusted library allocation
page read and write
4C18000
trusted library allocation
page read and write
C0005E8000
direct allocation
page read and write
2A98000
heap
page read and write
7FF6168C3000
unkown
page readonly
4BE0000
trusted library allocation
page read and write
C000AB0000
direct allocation
page read and write
C000A60000
direct allocation
page read and write
C000421000
direct allocation
page read and write
C000035000
direct allocation
page read and write
4BEF000
trusted library allocation
page read and write
4C26000
trusted library allocation
page read and write
C000980000
direct allocation
page read and write
2AD0000
heap
page read and write
C0007A0000
direct allocation
page read and write
C00070C000
direct allocation
page read and write
7FF616495000
unkown
page write copy
C00016E000
direct allocation
page read and write
C0005D4000
direct allocation
page read and write
29BD000
stack
page read and write
4BE0000
trusted library allocation
page read and write
4C3E000
trusted library allocation
page read and write
C000B90000
direct allocation
page read and write
2AB5000
heap
page read and write
2AC3000
heap
page read and write
C0009E0000
direct allocation
page read and write
C000AC0000
direct allocation
page read and write
293E000
stack
page read and write
7FF6163DD000
unkown
page read and write
C000027000
direct allocation
page read and write
2AC0000
heap
page read and write
2AA3000
heap
page read and write
2AB7000
heap
page read and write
1845B3A0000
heap
page read and write
4C04000
trusted library allocation
page read and write
2AAB000
heap
page read and write
2AB7000
heap
page read and write
3AA000
stack
page read and write
4BFB000
trusted library allocation
page read and write
2A92000
heap
page read and write
2A98000
heap
page read and write
2AC0000
heap
page read and write
C00077C000
direct allocation
page read and write
4FA4000
trusted library allocation
page read and write
7FF61685A000
unkown
page read and write
C000950000
direct allocation
page read and write
4BFB000
trusted library allocation
page read and write
2AB3000
heap
page read and write
2AC8000
heap
page read and write
C0000DA000
direct allocation
page read and write
2A92000
heap
page read and write
4BF9000
trusted library allocation
page read and write
2AA4000
heap
page read and write
4C12000
trusted library allocation
page read and write
2AC0000
heap
page read and write
2AC9000
heap
page read and write
4BD4000
trusted library allocation
page read and write
2AC5000
heap
page read and write
2AA3000
heap
page read and write
1847FCB0000
direct allocation
page read and write
2AAF000
heap
page read and write
4BE0000
trusted library allocation
page read and write
7FF616883000
unkown
page read and write
4BE8000
trusted library allocation
page read and write
4C09000
trusted library allocation
page read and write
4540000
heap
page read and write
C000A80000
direct allocation
page read and write
C0005B8000
direct allocation
page read and write
2AD8000
heap
page read and write
1845B340000
direct allocation
page read and write
2AC6000
heap
page read and write
2AC9000
heap
page read and write
7FF6168BE000
unkown
page write copy
2AC0000
heap
page read and write
4BE0000
trusted library allocation
page read and write
2A9A000
heap
page read and write
2A82000
heap
page read and write
4BE0000
trusted library allocation
page read and write
2A90000
heap
page read and write
4C3D000
trusted library allocation
page read and write
2AB6000
heap
page read and write
2A98000
heap
page read and write
C000487000
direct allocation
page read and write
4BE1000
trusted library allocation
page read and write
C000600000
direct allocation
page read and write
C000A90000
direct allocation
page read and write
4C0E000
trusted library allocation
page read and write
2AB6000
heap
page read and write
2AAC000
heap
page read and write
2AB6000
heap
page read and write
C0005F2000
direct allocation
page read and write
2AD8000
heap
page read and write
2AA4000
heap
page read and write
2A23000
heap
page read and write
4C1A000
trusted library allocation
page read and write
4BE9000
trusted library allocation
page read and write
C000A20000
direct allocation
page read and write
2AC0000
heap
page read and write
4C09000
trusted library allocation
page read and write
C000064000
direct allocation
page read and write
7FF6163D7000
unkown
page write copy
C00002C000
direct allocation
page read and write
4C2D000
trusted library allocation
page read and write
C000588000
direct allocation
page read and write
2AC8000
heap
page read and write
36B000
stack
page read and write
C000960000
direct allocation
page read and write
2A8A000
heap
page read and write
2AC9000
heap
page read and write
4BFB000
trusted library allocation
page read and write
2A94000
heap
page read and write
2A20000
heap
page read and write
4C21000
trusted library allocation
page read and write
2A20000
heap
page read and write
C00059C000
direct allocation
page read and write
4CFB000
trusted library allocation
page read and write
C0005E2000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
2AAF000
heap
page read and write
4E0E000
stack
page read and write
7FF6168B5000
unkown
page read and write
2AAD000
heap
page read and write
4BD2000
trusted library allocation
page read and write
2590000
heap
page read and write
2AC6000
heap
page read and write
2ADB000
heap
page read and write
C00048E000
direct allocation
page read and write
1845B332000
direct allocation
page read and write
C0005A2000
direct allocation
page read and write
4BE0000
trusted library allocation
page read and write
2483000
remote allocation
page execute and read and write
4BE0000
trusted library allocation
page read and write
1845B350000
direct allocation
page read and write
2AC9000
heap
page read and write
4C09000
trusted library allocation
page read and write
7FF616497000
unkown
page read and write
2A96000
heap
page read and write
C000920000
direct allocation
page read and write
25C7000
heap
page read and write
2AC9000
heap
page read and write
2A88000
heap
page read and write
4C29000
trusted library allocation
page read and write
2A9A000
heap
page read and write
218EBFF000
stack
page read and write
4BE0000
trusted library allocation
page read and write
2AB7000
heap
page read and write
7FF6163DC000
unkown
page write copy
4C25000
trusted library allocation
page read and write
C000094000
direct allocation
page read and write
C000A00000
direct allocation
page read and write
2A98000
heap
page read and write
2AC0000
heap
page read and write
2A22000
heap
page read and write
1845B390000
direct allocation
page read and write
C00008C000
direct allocation
page read and write
2AC8000
heap
page read and write
2AA8000
heap
page read and write
2AAB000
heap
page read and write
2AC0000
heap
page read and write
1847FE65000
direct allocation
page read and write
18422230000
direct allocation
page read and write
2A82000
heap
page read and write
C000BA0000
direct allocation
page read and write
2AA3000
heap
page read and write
2AAA000
heap
page read and write
2A9A000
heap
page read and write
2AB6000
heap
page read and write
2A9F000
heap
page read and write
1845B274000
direct allocation
page read and write
C0007F0000
direct allocation
page read and write
4D13000
trusted library allocation
page read and write
2AAF000
heap
page read and write
218EFFE000
stack
page read and write
C000014000
direct allocation
page read and write
2A98000
heap
page read and write
2ADE000
heap
page read and write
4A8E000
stack
page read and write
C000480000
direct allocation
page read and write
C000A50000
direct allocation
page read and write
2AD8000
heap
page read and write
2AA4000
heap
page read and write
C0005FE000
direct allocation
page read and write
7FF616889000
unkown
page read and write
7FF6168BB000
unkown
page write copy
2AA8000
heap
page read and write
7FF6163DF000
unkown
page read and write
C000B20000
direct allocation
page read and write
7FF6168B1000
unkown
page read and write
4C09000
trusted library allocation
page read and write
1845B050000
heap
page read and write
C000AA0000
direct allocation
page read and write
2AAF000
heap
page read and write
2AC9000
heap
page read and write
4D33000
trusted library allocation
page read and write
18422313000
direct allocation
page read and write
2AA6000
heap
page read and write
2A8A000
heap
page read and write
44FD000
stack
page read and write
4C32000
trusted library allocation
page read and write
C0005F2000
direct allocation
page read and write
4C67000
trusted library allocation
page read and write
C0005A2000
direct allocation
page read and write
2AAB000
heap
page read and write
1845B0A0000
heap
page read and write
2AA4000
heap
page read and write
C000B10000
direct allocation
page read and write
4BE0000
trusted library allocation
page read and write
2AAF000
heap
page read and write
218F3FE000
stack
page read and write
4D83000
trusted library allocation
page read and write
59B2000
trusted library allocation
page read and write
4BE0000
trusted library allocation
page read and write
C00008E000
direct allocation
page read and write
C00058C000
direct allocation
page read and write
4C67000
trusted library allocation
page read and write
2AB2000
heap
page read and write
2AD0000
heap
page read and write
C000068000
direct allocation
page read and write
4BD8000
trusted library allocation
page read and write
2A9B000
heap
page read and write
2A9A000
heap
page read and write
C000580000
direct allocation
page read and write
2AAF000
heap
page read and write
29C0000
remote allocation
page read and write
C0005FE000
direct allocation
page read and write
C000970000
direct allocation
page read and write
2AC6000
heap
page read and write
2AA6000
heap
page read and write
C0000B0000
direct allocation
page read and write
2AA4000
heap
page read and write
2A83000
heap
page read and write
18422250000
direct allocation
page read and write
C000088000
direct allocation
page read and write
C000096000
direct allocation
page read and write
C0002EC000
direct allocation
page read and write
2AB7000
heap
page read and write
2AA4000
heap
page read and write
4BE9000
trusted library allocation
page read and write
C000BA4000
direct allocation
page read and write
2AC0000
heap
page read and write
7FF6168BE000
unkown
page write copy
2A07000
heap
page read and write
297E000
stack
page read and write
4BF1000
trusted library allocation
page read and write
2AB3000
heap
page read and write
2AA0000
heap
page read and write
4BD8000
trusted library allocation
page read and write
2AAF000
heap
page read and write
2AA4000
heap
page read and write
4BF9000
trusted library allocation
page read and write
218E9FE000
stack
page read and write
C000090000
direct allocation
page read and write
2AC0000
heap
page read and write
C000006000
direct allocation
page read and write
2A92000
heap
page read and write
218EDFE000
stack
page read and write
4BF6000
trusted library allocation
page read and write
4BD7000
trusted library allocation
page read and write
2A20000
heap
page read and write
2AAF000
heap
page read and write
C0005FC000
direct allocation
page read and write
2AD0000
heap
page read and write
C000BF0000
direct allocation
page read and write
2430000
remote allocation
page execute and read and write
1845B270000
direct allocation
page read and write
2A96000
heap
page read and write
2AD3000
heap
page read and write
4BE0000
trusted library allocation
page read and write
4BF9000
trusted library allocation
page read and write
184222C0000
direct allocation
page read and write
2AA3000
heap
page read and write
2AB5000
heap
page read and write
2A95000
heap
page read and write
2AC0000
heap
page read and write
There are 665 hidden memdumps, click here to show them.