IOC Report
SecuriteInfo.com.Trojan.GenericKD.72873276.19236.26672.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.GenericKD.72873276.19236.26672.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Program Files (x86)\Serbia Ice Hockey DB\Hokej.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Serbia Ice Hockey DB\Hokej.bak (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Serbia Ice Hockey DB\is-II59A.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Serbia Ice Hockey DB\is-M013U.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Serbia Ice Hockey DB\unins000.dat
InnoSetup Log Serbia Ice Hockey DB {14570A78-25CF-4C4B-86E4-D6DFFDA8C567}, version 0x418, 1725 bytes, 715575\37\user\37, C:\Program Files (x86)\Serbia Ice Hockey D
dropped
C:\Program Files (x86)\Serbia Ice Hockey DB\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Serbia Ice Hockey DB.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Jul 4 18:28:15 2024, mtime=Thu Jul 4 18:28:15 2024, atime=Sat Oct 9 21:27:46 2021, length=11867648, window=hide
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Hokej.exe_ed8c2db47b15ea7944e86a01489d7427b20d989_2e3703da_cb4c3753-e089-4040-a9d0-f7d02581bc53\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA2EE.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Jul 4 19:28:58 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA427.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA4F4.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-1DQS7.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-5F45V.tmp\SecuriteInfo.com.Trojan.GenericKD.72873276.19236.26672.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\Documents\Zapisnik_ONLine\LicenceSrpski.fr3
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (437), with CRLF line terminators
dropped
C:\Users\user\Documents\Zapisnik_ONLine\libeay32.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\Documents\Zapisnik_ONLine\ssleay32.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
modified
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Serbia Ice Hockey DB\Hokej.exe
"C:\Program Files (x86)\Serbia Ice Hockey DB\Hokej.exe"
malicious
C:\Program Files (x86)\Serbia Ice Hockey DB\Hokej.exe
"C:\Program Files (x86)\Serbia Ice Hockey DB\Hokej.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72873276.19236.26672.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72873276.19236.26672.exe"
C:\Users\user\AppData\Local\Temp\is-5F45V.tmp\SecuriteInfo.com.Trojan.GenericKD.72873276.19236.26672.tmp
"C:\Users\user\AppData\Local\Temp\is-5F45V.tmp\SecuriteInfo.com.Trojan.GenericKD.72873276.19236.26672.tmp" /SL5="$20426,3939740,937984,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72873276.19236.26672.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4612 -s 1444

URLs

Name
IP
Malicious
http://www.innosetup.com/
unknown
http://www.srbreferee.com/CheckNET.php
93.188.2.53
http://www.aiim.org/pdfa/ns/property#
unknown
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
http://www.fast-report.com
unknown
https://docs.nextcloud.com/server/latest/admin_manual/configuration_server/oauth2.html
unknown
http://srbija.livehockey.online
unknown
https://docs.aws.amazon.com/AmazonS3/latest/API/sig-v4-authenticating-requests.html
unknown
http://www.aiim.org/pdfa/ns/id/
unknown
http://www.openssl.org/V
unknown
http://srbija.livehockey.online/evaluation/index.php?SudijaID=
unknown
http://www.aiim.org/pdfa/ns/schema#
unknown
https://docs.nextcloud.com/server/latest/admin_manual/configuration_server/oauth2.htmltml
unknown
https://oauth.yandex.com/
unknown
http://www.aiim.org/pdfa/ns/extension/
unknown
http://kuwait.livehockey.online/evaluation/index.php?SudijaID=openU
unknown
http://www.indyproject.org/
unknown
http://www.remobjects.com/ps
unknown
http://www.url.com):
unknown
http://srbija.livehockey.online/OnlineRegistration/
unknown
http://fast-report.com)
unknown
https://oauth.yandex.com/03
unknown
http://srbija.livehockey.online/evaluation/i
unknown
There are 13 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ftpcluster.loopia.se
93.188.1.110
malicious
s682.loopia.se
93.188.1.8
www.srbreferee.com
93.188.2.53
s679.loopia.se
93.188.1.5
mysql679.loopia.se
unknown
mysql682.loopia.se
unknown

IPs

IP
Domain
Country
Malicious
93.188.1.110
ftpcluster.loopia.se
Sweden
malicious
93.188.2.53
www.srbreferee.com
Sweden
93.188.1.8
s682.loopia.se
Sweden
93.188.1.5
s679.loopia.se
Sweden
79.101.0.33
unknown
Serbia

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
Inno Setup: Setup Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
Inno Setup: App Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
Inno Setup: Icon Group
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
Inno Setup: User
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
Inno Setup: Selected Tasks
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
Inno Setup: Deselected Tasks
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
Inno Setup: Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
MajorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
MinorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
EstimatedSize
HKEY_CURRENT_USER\SHLSDataBase
DBG1FSize
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
ProgramId
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
FileId
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
LowerCaseLongPath
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
LongPathHash
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
Name
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
OriginalFileName
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
Publisher
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
Version
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
BinFileVersion
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
BinaryType
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
ProductName
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
ProductVersion
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
LinkDate
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
BinProductVersion
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
AppxPackageFullName
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
AppxPackageRelativeId
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
Size
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
Language
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
Usn
There are 36 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
9CF000
heap
page read and write
8810000
direct allocation
page read and write
6C62000
direct allocation
page read and write
7F90000
direct allocation
page read and write
A2F000
heap
page read and write
7F444000
direct allocation
page read and write
7EEF000
direct allocation
page read and write
2232000
heap
page read and write
566E000
stack
page read and write
7F58D000
direct allocation
page read and write
8590000
direct allocation
page read and write
4735000
direct allocation
page read and write
3108000
direct allocation
page read and write
197F000
unkown
page read and write
7F4F9000
direct allocation
page read and write
3584000
direct allocation
page read and write
12EC000
heap
page read and write
38A5000
heap
page read and write
7230000
direct allocation
page read and write
6CD9000
direct allocation
page read and write
18BD000
unkown
page read and write
D66000
unkown
page read and write
63F8000
direct allocation
page read and write
1355000
heap
page read and write
1C0A000
unkown
page readonly
8838000
direct allocation
page read and write
2F20000
heap
page read and write
3DFD000
direct allocation
page read and write
3410000
direct allocation
page read and write
7F55A000
direct allocation
page read and write
2D28000
direct allocation
page read and write
86C1000
direct allocation
page read and write
38A1000
heap
page read and write
2378000
direct allocation
page read and write
18D6000
unkown
page read and write
BAF000
stack
page read and write
7F400000
direct allocation
page read and write
18D3000
unkown
page read and write
8CB0000
direct allocation
page read and write
7F49D000
direct allocation
page read and write
30DA000
direct allocation
page read and write
357A000
direct allocation
page read and write
18CC000
unkown
page read and write
7F589000
direct allocation
page read and write
400000
unkown
page readonly
7F59F000
direct allocation
page read and write
22BA000
direct allocation
page read and write
A90000
heap
page read and write
84AD000
heap
page read and write
4731000
direct allocation
page read and write
1973000
unkown
page read and write
7F553000
direct allocation
page read and write
38FC000
heap
page read and write
2412000
direct allocation
page read and write
5BE000
stack
page read and write
670000
unkown
page readonly
7190000
direct allocation
page read and write
A29000
heap
page read and write
7F13B000
direct allocation
page read and write
7240000
direct allocation
page read and write
1337000
heap
page read and write
7F407000
direct allocation
page read and write
7F4A4000
direct allocation
page read and write
12F4000
heap
page read and write
12CF000
heap
page read and write
4390000
direct allocation
page read and write
1378000
heap
page read and write
7F198000
direct allocation
page read and write
38A1000
trusted library allocation
page read and write
3689000
heap
page read and write
2770000
heap
page read and write
12D1000
heap
page read and write
138A000
heap
page read and write
1C5A000
unkown
page readonly
134B000
heap
page read and write
6D4E000
trusted library allocation
page read and write
D85000
unkown
page readonly
6C83000
direct allocation
page read and write
24D8000
direct allocation
page read and write
222B000
heap
page read and write
21F5000
heap
page read and write
38F8000
heap
page read and write
2279000
direct allocation
page read and write
138B000
heap
page read and write
7F26000
direct allocation
page read and write
3420000
direct allocation
page read and write
9B8000
heap
page read and write
70E8000
direct allocation
page read and write
6BA9000
direct allocation
page read and write
C39000
heap
page read and write
1365000
heap
page read and write
6AC0000
direct allocation
page read and write
135A000
heap
page read and write
D83000
unkown
page readonly
22B2000
direct allocation
page read and write
63FC000
direct allocation
page read and write
D61000
unkown
page read and write
8F80000
direct allocation
page read and write
1C6A000
unkown
page readonly
63CD000
direct allocation
page read and write
9EF000
stack
page read and write
DD1000
unkown
page execute read
7F48A000
direct allocation
page read and write
9B000
stack
page read and write
7262000
direct allocation
page read and write
D7B000
unkown
page read and write
3650000
heap
page read and write
21F9000
heap
page read and write
137C000
heap
page read and write
1C60000
unkown
page readonly
72E9000
direct allocation
page read and write
4B9000
unkown
page read and write
1363000
heap
page read and write
7F3DE000
direct allocation
page read and write
192D000
unkown
page read and write
1378000
heap
page read and write
3E2D000
direct allocation
page read and write
12FC000
heap
page read and write
C20000
heap
page read and write
2363000
direct allocation
page read and write
451B000
stack
page read and write
226B000
heap
page read and write
7F4E1000
direct allocation
page read and write
65C7000
direct allocation
page read and write
12EE000
heap
page read and write
77E0000
direct allocation
page read and write
1351000
heap
page read and write
7F1DA000
direct allocation
page read and write
3035000
direct allocation
page read and write
4B7000
unkown
page read and write
2260000
heap
page read and write
6A60000
direct allocation
page read and write
D7D000
unkown
page write copy
9355000
direct allocation
page read and write
38D4000
heap
page read and write
12EA000
heap
page read and write
4729000
direct allocation
page read and write
130F000
heap
page read and write
389E000
stack
page read and write
9CA000
heap
page read and write
6345000
direct allocation
page read and write
8855000
direct allocation
page read and write
2419000
direct allocation
page read and write
2371000
direct allocation
page read and write
917F000
direct allocation
page read and write
3610000
heap
page read and write
9B0000
heap
page read and write
7220000
direct allocation
page read and write
633F000
direct allocation
page read and write
7F41C000
direct allocation
page read and write
7F17B000
direct allocation
page read and write
4488000
direct allocation
page read and write
400000
unkown
page readonly
1362000
heap
page read and write
1977000
unkown
page read and write
313C000
direct allocation
page read and write
135D000
heap
page read and write
1316000
heap
page read and write
12CC000
heap
page read and write
3751000
heap
page read and write
41D000
unkown
page execute read
A17000
heap
page read and write
3420000
heap
page read and write
7F18A000
direct allocation
page read and write
30D0000
direct allocation
page read and write
8BE6000
direct allocation
page read and write
21CE000
heap
page read and write
9F0000
heap
page read and write
7F476000
direct allocation
page read and write
2301000
direct allocation
page read and write
7F154000
direct allocation
page read and write
242E000
direct allocation
page read and write
A02000
heap
page read and write
7F3F1000
direct allocation
page read and write
635E000
direct allocation
page read and write
7F4FE000
direct allocation
page read and write
4590000
heap
page read and write
5E89000
direct allocation
page read and write
661E000
direct allocation
page read and write
4293000
heap
page read and write
132F000
heap
page read and write
7F403000
direct allocation
page read and write
A84000
heap
page read and write
1336000
heap
page read and write
7DF0000
direct allocation
page read and write
1360000
heap
page read and write
EF9000
unkown
page readonly
9FF000
heap
page read and write
401000
unkown
page execute read
65F000
unkown
page read and write
4ABF000
stack
page read and write
7F157000
direct allocation
page read and write
2354000
direct allocation
page read and write
134B000
heap
page read and write
5EFE000
direct allocation
page read and write
2470000
direct allocation
page read and write
38C5000
heap
page read and write
4250000
direct allocation
page execute and read and write
277A000
heap
page read and write
7F4D6000
direct allocation
page read and write
7F4EF000
direct allocation
page read and write
2775000
heap
page read and write
6D40000
trusted library allocation
page read and write
63DC000
direct allocation
page read and write
2311000
direct allocation
page read and write
400000
unkown
page readonly
7F1A6000
direct allocation
page read and write
195E000
unkown
page read and write
3100000
direct allocation
page read and write
7F599000
direct allocation
page read and write
9ED000
heap
page read and write
49BE000
stack
page read and write
3B1F000
stack
page read and write
7F46F000
direct allocation
page read and write
681C000
direct allocation
page read and write
65D000
unkown
page write copy
5F1D000
direct allocation
page read and write
1316000
heap
page read and write
5E7F000
direct allocation
page read and write
3D90000
direct allocation
page read and write
4C4000
unkown
page readonly
4BFF000
stack
page read and write
3A1E000
stack
page read and write
9E1000
heap
page read and write
23E9000
direct allocation
page read and write
D42000
unkown
page write copy
1345000
heap
page read and write
196D000
unkown
page read and write
8899000
direct allocation
page read and write
4CBE000
stack
page read and write
DD0000
unkown
page readonly
222B000
heap
page read and write
1360000
heap
page read and write
1165000
heap
page read and write
132D000
heap
page read and write
1342000
heap
page read and write
5EEF000
direct allocation
page read and write
8067000
direct allocation
page read and write
4C50000
trusted library section
page read and write
4290000
heap
page read and write
3651000
heap
page read and write
38C2000
heap
page read and write
1341000
heap
page read and write
2F23000
heap
page read and write
401000
unkown
page execute read
197A000
unkown
page write copy
130F000
heap
page read and write
1290000
heap
page read and write
7D0000
heap
page read and write
6CE9000
direct allocation
page read and write
17D1000
unkown
page execute read
1363000
heap
page read and write
1327000
heap
page read and write
4C00000
trusted library allocation
page read and write
1361000
heap
page read and write
1140000
heap
page read and write
7F56E000
direct allocation
page read and write
135C000
heap
page read and write
22C8000
direct allocation
page read and write
658F000
direct allocation
page read and write
1341000
heap
page read and write
8490000
heap
page read and write
70F6000
direct allocation
page read and write
7F455000
direct allocation
page read and write
8E40000
direct allocation
page read and write
7F1C6000
direct allocation
page read and write
7F557000
direct allocation
page read and write
1347000
heap
page read and write
9DF000
heap
page read and write
24C1000
direct allocation
page read and write
38AA000
heap
page read and write
314C000
direct allocation
page read and write
7F4E8000
direct allocation
page read and write
9D7000
heap
page read and write
2227000
heap
page read and write
5F7A000
direct allocation
page read and write
2309000
direct allocation
page read and write
7F520000
direct allocation
page read and write
8350000
direct allocation
page read and write
7F577000
direct allocation
page read and write
24BA000
direct allocation
page read and write
D44000
unkown
page read and write
7F040000
direct allocation
page read and write
570000
heap
page read and write
7F563000
direct allocation
page read and write
35AC000
stack
page read and write
2165000
heap
page read and write
9D4000
heap
page read and write
3850000
direct allocation
page read and write
809D000
direct allocation
page read and write
7F56A000
direct allocation
page read and write
12C8000
heap
page read and write
3750000
heap
page read and write
2458000
direct allocation
page read and write
137B000
heap
page read and write
72FD000
direct allocation
page read and write
7F3F7000
direct allocation
page read and write
45C0000
heap
page read and write
4230000
heap
page read and write
3900000
heap
page read and write
1368000
heap
page read and write
1308000
heap
page read and write
7F594000
direct allocation
page read and write
7F3E8000
direct allocation
page read and write
5DEF000
stack
page read and write
7F1CB000
direct allocation
page read and write
18DB000
unkown
page read and write
6363000
direct allocation
page read and write
7CE000
stack
page read and write
7F582000
direct allocation
page read and write
4723000
direct allocation
page read and write
10EE000
stack
page read and write
5E20000
direct allocation
page execute and read and write
2219000
heap
page read and write
130A000
heap
page read and write
7F1D3000
direct allocation
page read and write
65C0000
direct allocation
page read and write
2261000
direct allocation
page read and write
23E0000
direct allocation
page read and write
C10000
heap
page read and write
1331000
heap
page read and write
38BE000
heap
page read and write
25C0000
direct allocation
page read and write
7F585000
direct allocation
page read and write
38C5000
heap
page read and write
47C7000
direct allocation
page read and write
1345000
heap
page read and write
8160000
direct allocation
page read and write
6840000
direct allocation
page read and write
4733000
direct allocation
page read and write
70D9000
direct allocation
page read and write
7F15B000
direct allocation
page read and write
38E1000
heap
page read and write
2C30000
direct allocation
page read and write
2436000
direct allocation
page read and write
6A78000
direct allocation
page read and write
1150000
heap
page read and write
9319000
direct allocation
page read and write
7F3D4000
direct allocation
page read and write
6C8F000
direct allocation
page read and write
6480000
direct allocation
page read and write
7F57C000
direct allocation
page read and write
46CD000
stack
page read and write
22AB000
direct allocation
page read and write
12F2000
heap
page read and write
7F3DA000
direct allocation
page read and write
194D000
unkown
page read and write
7EEB000
direct allocation
page read and write
1DBC000
stack
page read and write
7822000
direct allocation
page read and write
63A000
heap
page read and write
880000
direct allocation
page execute and read and write
7F487000
direct allocation
page read and write
1360000
heap
page read and write
2338000
direct allocation
page read and write
3E54000
direct allocation
page read and write
9E5000
heap
page read and write
24ED000
direct allocation
page read and write
8A6000
heap
page read and write
22DF000
direct allocation
page read and write
471A000
direct allocation
page read and write
6BC6000
direct allocation
page read and write
19D000
stack
page read and write
2C9D000
direct allocation
page read and write
138E000
heap
page read and write
7259000
direct allocation
page read and write
70E0000
direct allocation
page read and write
63DF000
direct allocation
page read and write
A04000
heap
page read and write
2287000
direct allocation
page read and write
18BB000
unkown
page read and write
7F3E4000
direct allocation
page read and write
90F0000
direct allocation
page read and write
1302000
heap
page read and write
6320000
direct allocation
page read and write
1364000
heap
page read and write
3900000
heap
page read and write
849F000
heap
page read and write
487E000
stack
page read and write
2503000
direct allocation
page read and write
7F3D0000
direct allocation
page read and write
5EF7000
direct allocation
page read and write
8A78000
direct allocation
page read and write
20F7000
stack
page read and write
84A6000
heap
page read and write
87C0000
direct allocation
page read and write
D49000
unkown
page read and write
132E000
heap
page read and write
1319000
heap
page read and write
472D000
direct allocation
page read and write
2483000
direct allocation
page read and write
6040000
trusted library allocation
page read and write
892C000
direct allocation
page read and write
7F47E000
direct allocation
page read and write
7A40000
direct allocation
page execute and read and write
22ED000
direct allocation
page read and write
191C000
unkown
page read and write
2346000
direct allocation
page read and write
67A6000
direct allocation
page read and write
38FC000
heap
page read and write
368D000
heap
page read and write
9174000
direct allocation
page read and write
8C5C000
direct allocation
page read and write
1330000
heap
page read and write
4C6000
unkown
page readonly
1333000
heap
page read and write
4409000
direct allocation
page read and write
20EF000
stack
page read and write
F50000
unkown
page readonly
A10000
heap
page read and write
4B7000
unkown
page write copy
135D000
heap
page read and write
2486000
direct allocation
page read and write
7F48E000
direct allocation
page read and write
5CEE000
stack
page read and write
1389000
heap
page read and write
2160000
heap
page read and write
78C8000
direct allocation
page read and write
355A000
direct allocation
page read and write
A1D000
heap
page read and write
193C000
unkown
page read and write
8210000
direct allocation
page read and write
62F0000
direct allocation
page read and write
12E1000
heap
page read and write
70FD000
direct allocation
page read and write
7F4CD000
direct allocation
page read and write
7F3EE000
direct allocation
page read and write
135C000
heap
page read and write
7F405000
direct allocation
page read and write
236A000
direct allocation
page read and write
8B60000
direct allocation
page read and write
78EB000
direct allocation
page read and write
137A000
heap
page read and write
18F000
stack
page read and write
138E000
heap
page read and write
72D9000
direct allocation
page read and write
93000
stack
page read and write
8E53000
direct allocation
page read and write
315B000
direct allocation
page read and write
6360000
direct allocation
page read and write
9EC000
heap
page read and write
4C0000
unkown
page read and write
1C54000
unkown
page readonly
1D2A000
unkown
page readonly
234D000
direct allocation
page read and write
66B000
unkown
page write copy
3120000
direct allocation
page read and write
1303000
heap
page read and write
634E000
direct allocation
page read and write
1270000
direct allocation
page execute and read and write
7260000
direct allocation
page read and write
134F000
heap
page read and write
3E0C000
direct allocation
page read and write
7F473000
direct allocation
page read and write
7237000
direct allocation
page read and write
1345000
heap
page read and write
12E1000
heap
page read and write
21FA000
heap
page read and write
24B2000
direct allocation
page read and write
9F4000
heap
page read and write
A0A000
heap
page read and write
4478000
direct allocation
page read and write
5F56000
direct allocation
page read and write
109E000
stack
page read and write
1361000
heap
page read and write
A34000
heap
page read and write
2CC5000
direct allocation
page read and write
4499000
direct allocation
page read and write
7F432000
direct allocation
page read and write
6C00000
direct allocation
page read and write
D51000
unkown
page read and write
59EF000
stack
page read and write
5A60000
direct allocation
page execute and read and write
38C7000
heap
page read and write
389D000
stack
page read and write
38A0000
heap
page read and write
134F000
heap
page read and write
7F47C000
direct allocation
page read and write
1335000
heap
page read and write
D56000
unkown
page read and write
18BB000
unkown
page write copy
24DF000
direct allocation
page read and write
1323000
heap
page read and write
6350000
direct allocation
page read and write
7F508000
direct allocation
page read and write
25C0000
direct allocation
page read and write
1358000
heap
page read and write
7F1E2000
direct allocation
page read and write
5E99000
direct allocation
page read and write
786F000
direct allocation
page read and write
22C1000
direct allocation
page read and write
22E6000
direct allocation
page read and write
849D000
heap
page read and write
2494000
direct allocation
page read and write
12CB000
heap
page read and write
2296000
direct allocation
page read and write
C30000
heap
page read and write
21BB000
heap
page read and write
8BDF000
direct allocation
page read and write
58AE000
stack
page read and write
243D000
direct allocation
page read and write
5F15000
direct allocation
page read and write
550000
heap
page read and write
2CAD000
direct allocation
page read and write
78F0000
direct allocation
page read and write
1348000
heap
page read and write
24FC000
direct allocation
page read and write
86D0000
direct allocation
page read and write
8E78000
direct allocation
page read and write
6980000
direct allocation
page read and write
5F0E000
direct allocation
page read and write
9D1000
heap
page read and write
18D000
stack
page read and write
93000
stack
page read and write
18E000
stack
page read and write
24F4000
direct allocation
page read and write
2120000
heap
page read and write
9290000
direct allocation
page read and write
7F188000
direct allocation
page read and write
1368000
heap
page read and write
22CF000
direct allocation
page read and write
6552000
direct allocation
page read and write
1378000
heap
page read and write
1988000
unkown
page readonly
6938000
direct allocation
page read and write
5E87000
direct allocation
page read and write
6B0000
heap
page read and write
7F19F000
direct allocation
page read and write
2427000
direct allocation
page read and write
1352000
heap
page read and write
7F1B5000
direct allocation
page read and write
132E000
heap
page read and write
12EB000
heap
page read and write
2EE0000
heap
page read and write
19A000
stack
page read and write
72C1000
direct allocation
page read and write
472F000
direct allocation
page read and write
A13000
heap
page read and write
1354000
heap
page read and write
7104000
direct allocation
page read and write
38AA000
heap
page read and write
7C80000
heap
page read and write
2180000
heap
page read and write
7F55E000
direct allocation
page read and write
81E000
stack
page read and write
4DC0000
trusted library allocation
page read and write
3410000
direct allocation
page read and write
4772000
direct allocation
page read and write
6411000
direct allocation
page read and write
918C000
direct allocation
page read and write
500000
heap
page read and write
2227000
heap
page read and write
1958000
unkown
page read and write
3600000
heap
page read and write
A15000
heap
page read and write
A26000
heap
page read and write
84AA000
heap
page read and write
12C4000
heap
page read and write
12DE000
heap
page read and write
9F9000
heap
page read and write
2444000
direct allocation
page read and write
1306000
heap
page read and write
1378000
heap
page read and write
668000
unkown
page read and write
22D8000
direct allocation
page read and write
30CE000
direct allocation
page read and write
58EE000
stack
page read and write
1328000
heap
page read and write
38F3000
heap
page read and write
6700000
direct allocation
page read and write
7F440000
direct allocation
page read and write
2518000
direct allocation
page read and write
2F00000
heap
page read and write
9D9000
heap
page read and write
D42000
unkown
page read and write
7F4E5000
direct allocation
page read and write
250A000
direct allocation
page read and write
22FA000
direct allocation
page read and write
1378000
heap
page read and write
1365000
heap
page read and write
5F05000
direct allocation
page read and write
7856000
direct allocation
page read and write
632F000
direct allocation
page read and write
1358000
heap
page read and write
148F000
stack
page read and write
244B000
direct allocation
page read and write
1329000
heap
page read and write
1366000
heap
page read and write
7F49B000
direct allocation
page read and write
628000
heap
page read and write
620000
heap
page read and write
5F98000
direct allocation
page read and write
233F000
direct allocation
page read and write
7F572000
direct allocation
page read and write
A10000
heap
page read and write
8110000
direct allocation
page read and write
672000
unkown
page readonly
7FBB0000
direct allocation
page read and write
576F000
stack
page read and write
2420000
direct allocation
page read and write
3E6B000
direct allocation
page read and write
7197000
direct allocation
page read and write
1379000
heap
page read and write
1962000
unkown
page read and write
2328000
direct allocation
page read and write
229D000
direct allocation
page read and write
497F000
stack
page read and write
A82000
heap
page read and write
8A0000
heap
page read and write
870000
heap
page read and write
235C000
direct allocation
page read and write
67CA000
direct allocation
page read and write
38C3000
heap
page read and write
248D000
direct allocation
page read and write
72BD000
direct allocation
page read and write
7F1AE000
direct allocation
page read and write
2321000
direct allocation
page read and write
84FB000
heap
page read and write
80D0000
direct allocation
page read and write
38D5000
heap
page read and write
43FA000
direct allocation
page read and write
23F2000
direct allocation
page read and write
8231000
direct allocation
page read and write
114A000
heap
page read and write
12D8000
heap
page read and write
1986000
unkown
page readonly
5FA0000
heap
page read and write
A0A000
heap
page read and write
38D8000
heap
page read and write
3020000
direct allocation
page read and write
38AB000
heap
page read and write
401000
unkown
page execute read
7F483000
direct allocation
page read and write
2477000
direct allocation
page read and write
38A3000
heap
page read and write
1364000
heap
page read and write
1145000
heap
page read and write
12EB000
heap
page read and write
472B000
direct allocation
page read and write
1302000
heap
page read and write
7DC0000
direct allocation
page execute and read and write
30D7000
direct allocation
page read and write
2188000
heap
page read and write
5FC0000
trusted library allocation
page read and write
8255000
direct allocation
page read and write
1C4E000
unkown
page readonly
134A000
heap
page read and write
7F409000
direct allocation
page read and write
7F43C000
direct allocation
page read and write
1345000
heap
page read and write
231A000
direct allocation
page read and write
24E6000
direct allocation
page read and write
7F190000
direct allocation
page read and write
7F13D000
direct allocation
page read and write
2D0A000
direct allocation
page read and write
C35000
heap
page read and write
18E0000
unkown
page read and write
38CD000
heap
page read and write
5E92000
direct allocation
page read and write
10A0000
heap
page read and write
38A8000
heap
page read and write
72A3000
direct allocation
page read and write
18D0000
unkown
page read and write
21F4000
heap
page read and write
70C9000
direct allocation
page read and write
24AB000
direct allocation
page read and write
7F42F000
direct allocation
page read and write
18F6000
unkown
page read and write
1324000
heap
page read and write
135D000
heap
page read and write
70C0000
direct allocation
page read and write
A04000
heap
page read and write
4220000
heap
page read and write
7580000
heap
page read and write
38EF000
heap
page read and write
134B000
heap
page read and write
1327000
heap
page read and write
8A7000
heap
page read and write
228E000
direct allocation
page read and write
2511000
direct allocation
page read and write
2C10000
trusted library allocation
page read and write
38F2000
heap
page read and write
8D40000
direct allocation
page read and write
6D0D000
direct allocation
page read and write
12EE000
heap
page read and write
1C49000
unkown
page readonly
21F7000
heap
page read and write
7F560000
direct allocation
page read and write
1298000
heap
page read and write
A1E000
heap
page read and write
A1F000
heap
page read and write
4C2000
unkown
page write copy
132E000
heap
page read and write
84A4000
heap
page read and write
7F417000
direct allocation
page read and write
5EA8000
direct allocation
page read and write
1361000
heap
page read and write
A23000
heap
page read and write
4410000
direct allocation
page read and write
7F3E2000
direct allocation
page read and write
1335000
heap
page read and write
2231000
heap
page read and write
245F000
direct allocation
page read and write
399F000
stack
page read and write
22A4000
direct allocation
page read and write
C23000
heap
page read and write
787C000
direct allocation
page read and write
7F4F3000
direct allocation
page read and write
2CF4000
direct allocation
page read and write
7F175000
direct allocation
page read and write
137D000
heap
page read and write
3525000
direct allocation
page read and write
7F4CA000
direct allocation
page read and write
1353000
heap
page read and write
12C4000
heap
page read and write
655B000
direct allocation
page read and write
368C000
heap
page read and write
7F3FA000
direct allocation
page read and write
12EE000
heap
page read and write
18C4000
unkown
page read and write
6450000
direct allocation
page read and write
644B000
direct allocation
page read and write
A13000
heap
page read and write
4725000
direct allocation
page read and write
2468000
direct allocation
page read and write
72DC000
direct allocation
page read and write
D5B000
unkown
page read and write
1321000
heap
page read and write
130F000
heap
page read and write
A82000
heap
page read and write
138E000
heap
page read and write
21EA000
heap
page read and write
F80000
heap
page read and write
7F4DC000
direct allocation
page read and write
46D0000
direct allocation
page read and write
1347000
heap
page read and write
12EC000
heap
page read and write
66D3000
direct allocation
page read and write
2280000
direct allocation
page read and write
915F000
direct allocation
page read and write
6920000
direct allocation
page read and write
57AE000
stack
page read and write
1364000
heap
page read and write
4AFE000
stack
page read and write
38BD000
heap
page read and write
9178000
direct allocation
page read and write
1160000
heap
page read and write
38D3000
heap
page read and write
7189000
direct allocation
page read and write
1938000
unkown
page read and write
249C000
direct allocation
page read and write
240A000
direct allocation
page read and write
4727000
direct allocation
page read and write
2130000
heap
page read and write
7F180000
direct allocation
page read and write
640B000
direct allocation
page read and write
12E9000
heap
page read and write
63E3000
direct allocation
page read and write
4737000
direct allocation
page read and write
66EA000
direct allocation
page read and write
126E000
stack
page read and write
9F0000
heap
page read and write
1383000
heap
page read and write
A06000
heap
page read and write
91D9000
direct allocation
page read and write
65D000
unkown
page read and write
6B92000
direct allocation
page read and write
303B000
direct allocation
page read and write
24C8000
direct allocation
page read and write
1379000
heap
page read and write
7F566000
direct allocation
page read and write
9AE000
stack
page read and write
7F4C0000
direct allocation
page read and write
1339000
heap
page read and write
A26000
heap
page read and write
8CDE000
direct allocation
page read and write
8960000
direct allocation
page read and write
4DBF000
stack
page read and write
2C7A000
direct allocation
page read and write
12D4000
heap
page read and write
659E000
direct allocation
page read and write
There are 771 hidden memdumps, click here to show them.