IOC Report
SecuriteInfo.com.CrypterX-gen.112.10371.exe

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps108642010010Label

Files

File Path
Type
Category
Malicious
Download
SecuriteInfo.com.CrypterX-gen.112.10371.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.CrypterX-gen.112.10371.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp85EF.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\ygTGgAEg.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\ygTGgAEg.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x9125f891, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_42bbf54bd6c838ac724a99c0ee4b99179ac9e35b_ab4b5f8b_8bbd1277-d480-4fb7-9a2f-2209649801b1\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2F7D.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Mar 26 15:30:34 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2FCC.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER305A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ygTGgAEg.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\Xd763ft
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1sw31ev4.n1e.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a3tpthuh.mmx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m2mn1ass.5bm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_njiqu4ed.qn5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp9C26.tmp
XML 1.0 document, ASCII text
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.CrypterX-gen.112.10371.exe
"C:\Users\user\Desktop\SecuriteInfo.com.CrypterX-gen.112.10371.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ygTGgAEg.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ygTGgAEg" /XML "C:\Users\user\AppData\Local\Temp\tmp85EF.tmp"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.CrypterX-gen.112.10371.exe
"C:\Users\user\Desktop\SecuriteInfo.com.CrypterX-gen.112.10371.exe"
malicious
C:\Users\user\AppData\Roaming\ygTGgAEg.exe
C:\Users\user\AppData\Roaming\ygTGgAEg.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ygTGgAEg" /XML "C:\Users\user\AppData\Local\Temp\tmp9C26.tmp"
malicious
C:\Users\user\AppData\Roaming\ygTGgAEg.exe
"C:\Users\user\AppData\Roaming\ygTGgAEg.exe"
malicious
C:\Program Files (x86)\ZBhsenpjwMkCyTBtCAMAqdAovqfQlThgsjOJqCgBsUtzdTQVdxyZzdSZ\nYPOiVPQBw.exe
"C:\Program Files (x86)\ZBhsenpjwMkCyTBtCAMAqdAovqfQlThgsjOJqCgBsUtzdTQVdxyZzdSZ\nYPOiVPQBw.exe"
malicious
C:\Windows\SysWOW64\credwiz.exe
"C:\Windows\SysWOW64\credwiz.exe"
malicious
C:\Program Files (x86)\ZBhsenpjwMkCyTBtCAMAqdAovqfQlThgsjOJqCgBsUtzdTQVdxyZzdSZ\nYPOiVPQBw.exe
"C:\Program Files (x86)\ZBhsenpjwMkCyTBtCAMAqdAovqfQlThgsjOJqCgBsUtzdTQVdxyZzdSZ\V5lWzmNyBmNC5.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6820 -s 196
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.erbtechnique.dance/1c80/?fLbDV=yn28GLR&TP=jxAkT8e6KDHyZbn18Ag8BcB1queL6RnbFcOD+sI/JoqnMFd34osgQ+1OANtGW2JP7u7J4i5LjdR/bWOR5ew7EzvABsG0vrjM9Fr6mhr8DKebau2Clw==
52.223.13.41
malicious
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
https://duckduckgo.com/ac/?q=
unknown
https://g.live.com/odclientsettings/Prod-C:
unknown
https://duckduckgo.com/chrome_newtabv20
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.ecosia.org/newtab/v20Y&
unknown
https://g.live.com/odclientsettings/ProdV2-C:
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.ver)
unknown
https://ac.ecosia.org?q=
unknown
http://upx.sf.net
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://gemini.google.com/app?q=
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.nexohealth.online
185.104.28.238
www.erbtechnique.dance
52.223.13.41

IPs

IP
Domain
Country
Malicious
185.104.28.238
www.nexohealth.online
Netherlands
52.223.13.41
www.erbtechnique.dance
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
\REGISTRY\A\{5e93577d-3a22-1e2b-33e4-325ed71b9a27}\Root\InventoryApplicationFile\securiteinfo.com|38c6527c1583018d
ProgramId
\REGISTRY\A\{5e93577d-3a22-1e2b-33e4-325ed71b9a27}\Root\InventoryApplicationFile\securiteinfo.com|38c6527c1583018d
FileId
\REGISTRY\A\{5e93577d-3a22-1e2b-33e4-325ed71b9a27}\Root\InventoryApplicationFile\securiteinfo.com|38c6527c1583018d
LowerCaseLongPath
\REGISTRY\A\{5e93577d-3a22-1e2b-33e4-325ed71b9a27}\Root\InventoryApplicationFile\securiteinfo.com|38c6527c1583018d
LongPathHash
\REGISTRY\A\{5e93577d-3a22-1e2b-33e4-325ed71b9a27}\Root\InventoryApplicationFile\securiteinfo.com|38c6527c1583018d
Name
\REGISTRY\A\{5e93577d-3a22-1e2b-33e4-325ed71b9a27}\Root\InventoryApplicationFile\securiteinfo.com|38c6527c1583018d
OriginalFileName
\REGISTRY\A\{5e93577d-3a22-1e2b-33e4-325ed71b9a27}\Root\InventoryApplicationFile\securiteinfo.com|38c6527c1583018d
Publisher
\REGISTRY\A\{5e93577d-3a22-1e2b-33e4-325ed71b9a27}\Root\InventoryApplicationFile\securiteinfo.com|38c6527c1583018d
Version
\REGISTRY\A\{5e93577d-3a22-1e2b-33e4-325ed71b9a27}\Root\InventoryApplicationFile\securiteinfo.com|38c6527c1583018d
BinFileVersion
\REGISTRY\A\{5e93577d-3a22-1e2b-33e4-325ed71b9a27}\Root\InventoryApplicationFile\securiteinfo.com|38c6527c1583018d
BinaryType
\REGISTRY\A\{5e93577d-3a22-1e2b-33e4-325ed71b9a27}\Root\InventoryApplicationFile\securiteinfo.com|38c6527c1583018d
ProductName
\REGISTRY\A\{5e93577d-3a22-1e2b-33e4-325ed71b9a27}\Root\InventoryApplicationFile\securiteinfo.com|38c6527c1583018d
ProductVersion
\REGISTRY\A\{5e93577d-3a22-1e2b-33e4-325ed71b9a27}\Root\InventoryApplicationFile\securiteinfo.com|38c6527c1583018d
LinkDate
\REGISTRY\A\{5e93577d-3a22-1e2b-33e4-325ed71b9a27}\Root\InventoryApplicationFile\securiteinfo.com|38c6527c1583018d
BinProductVersion
\REGISTRY\A\{5e93577d-3a22-1e2b-33e4-325ed71b9a27}\Root\InventoryApplicationFile\securiteinfo.com|38c6527c1583018d
AppxPackageFullName
\REGISTRY\A\{5e93577d-3a22-1e2b-33e4-325ed71b9a27}\Root\InventoryApplicationFile\securiteinfo.com|38c6527c1583018d
AppxPackageRelativeId
\REGISTRY\A\{5e93577d-3a22-1e2b-33e4-325ed71b9a27}\Root\InventoryApplicationFile\securiteinfo.com|38c6527c1583018d
Size
\REGISTRY\A\{5e93577d-3a22-1e2b-33e4-325ed71b9a27}\Root\InventoryApplicationFile\securiteinfo.com|38c6527c1583018d
Language
\REGISTRY\A\{5e93577d-3a22-1e2b-33e4-325ed71b9a27}\Root\InventoryApplicationFile\securiteinfo.com|38c6527c1583018d
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C010739177B3
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
1860000
system
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
6B0000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2470000
unkown
page execute and read and write
malicious
1C10000
unclassified section
page execute and read and write
malicious
750000
trusted library allocation
page read and write
malicious
2BF8000
trusted library allocation
page read and write
7DC000
heap
page read and write
40C1000
heap
page read and write
5740000
heap
page read and write
197F4262000
heap
page read and write
4407BFC000
stack
page read and write
197EED02000
heap
page read and write
1690E210000
trusted library allocation
page read and write
19E9000
direct allocation
page execute and read and write
25DB000
stack
page read and write
83F000
heap
page read and write
A24000
trusted library allocation
page read and write
1690C770000
heap
page read and write
181E000
direct allocation
page execute and read and write
1690C79B000
heap
page read and write
4559000
direct allocation
page execute and read and write
197EEB50000
heap
page read and write
40C1000
heap
page read and write
25F4000
trusted library allocation
page read and write
6C50000
heap
page read and write
40C1000
heap
page read and write
4FAA000
trusted library allocation
page read and write
329000
unkown
page readonly
762B000
heap
page read and write
9B6E000
stack
page read and write
40C1000
heap
page read and write
52D0000
trusted library allocation
page read and write
37A9000
trusted library allocation
page read and write
43A9000
heap
page read and write
545897E000
stack
page read and write
3EA000
stack
page read and write
2640000
trusted library allocation
page read and write
2C90000
trusted library allocation
page execute and read and write
319C000
unkown
page execute and read and write
360000
unkown
page readonly
813000
heap
page read and write
769C000
heap
page read and write
771000
unkown
page readonly
279F000
stack
page read and write
2655000
trusted library allocation
page read and write
A9BE000
stack
page read and write
1468000
heap
page read and write
5456CFE000
stack
page read and write
54573FE000
unkown
page readonly
40C1000
heap
page read and write
7659000
heap
page read and write
BBE000
stack
page read and write
40C1000
heap
page read and write
40C1000
heap
page read and write
AD7C000
stack
page read and write
197F42E2000
heap
page read and write
D80000
heap
page read and write
40C1000
heap
page read and write
1690E3A6000
trusted library allocation
page read and write
818000
heap
page read and write
1190000
heap
page read and write
5340000
heap
page read and write
4F90000
trusted library allocation
page read and write
1690E221000
trusted library allocation
page read and write
197F42D1000
heap
page read and write
175E000
stack
page read and write
B42000
trusted library allocation
page read and write
197EFB80000
trusted library section
page readonly
A63E000
stack
page read and write
23AE000
stack
page read and write
70AE000
stack
page read and write
800000
heap
page read and write
40C1000
heap
page read and write
70E0000
heap
page read and write
370000
unkown
page readonly
40C1000
heap
page read and write
40C1000
heap
page read and write
624000
heap
page read and write
527B000
trusted library allocation
page read and write
5457CFE000
unkown
page readonly
8C0000
unkown
page read and write
40C1000
heap
page read and write
A4E000
heap
page read and write
7320000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
7A0000
heap
page read and write
197EF502000
heap
page read and write
2460000
heap
page read and write
40C1000
heap
page read and write
1015000
heap
page read and write
A650000
heap
page read and write
40C1000
heap
page read and write
22A0000
unkown
page readonly
197F4400000
trusted library allocation
page read and write
5F05000
heap
page read and write
72E0000
trusted library allocation
page read and write
4D6E000
trusted library section
page readonly
7D6000
heap
page read and write
13AD000
trusted library allocation
page execute and read and write
197EEB80000
heap
page read and write
2634000
trusted library allocation
page read and write
A12000
unkown
page readonly
197EF513000
heap
page read and write
40C1000
heap
page read and write
C08000
trusted library allocation
page read and write
780000
unkown
page read and write
80E000
heap
page read and write
350000
heap
page read and write
844000
heap
page read and write
7CD000
heap
page read and write
A9FE000
stack
page read and write
40C1000
heap
page read and write
230000
unkown
page readonly
52E0000
trusted library allocation
page read and write
7D0000
unkown
page read and write
700000
trusted library allocation
page read and write
52C0000
trusted library allocation
page read and write
197F42D5000
heap
page read and write
866000
heap
page read and write
25FC000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
310000
unkown
page readonly
40C1000
heap
page read and write
1690C79F000
heap
page read and write
197F4130000
trusted library allocation
page read and write
197EF3D1000
trusted library allocation
page read and write
340000
unkown
page readonly
977E000
stack
page read and write
25F0000
trusted library allocation
page read and write
4408BFE000
stack
page read and write
F40000
heap
page read and write
40C1000
heap
page read and write
5800000
trusted library section
page read and write
690000
trusted library allocation
page read and write
40C1000
heap
page read and write
40C1000
heap
page read and write
720000
unkown
page readonly
40C1000
heap
page read and write
22E0000
heap
page read and write
23D0000
heap
page read and write
AE8000
heap
page read and write
6A1E000
stack
page read and write
5456FFE000
unkown
page readonly
500F000
stack
page read and write
F88000
heap
page read and write
1982000
direct allocation
page execute and read and write
7644000
heap
page read and write
40C1000
heap
page read and write
17AD000
direct allocation
page execute and read and write
2630000
trusted library allocation
page read and write
40C1000
heap
page read and write
A30000
trusted library allocation
page read and write
240000
unkown
page readonly
197EF402000
heap
page read and write
13F0000
direct allocation
page read and write
197F5000000
heap
page read and write
1310000
heap
page read and write
B50000
unkown
page readonly
B4F000
unkown
page read and write
5352000
trusted library allocation
page read and write
197EFB70000
trusted library section
page readonly
D91000
unkown
page readonly
40C1000
heap
page read and write
197F421F000
heap
page read and write
1946000
direct allocation
page execute and read and write
95A000
heap
page read and write
197EF500000
heap
page read and write
40C1000
heap
page read and write
17A9000
direct allocation
page execute and read and write
197EF51A000
heap
page read and write
37F0000
trusted library allocation
page read and write
4D95000
heap
page read and write
2E74000
trusted library allocation
page read and write
40C1000
heap
page read and write
7DC000
heap
page read and write
40C1000
heap
page read and write
197F4302000
heap
page read and write
54582FB000
stack
page read and write
684E000
heap
page read and write
7D1000
heap
page read and write
5EE000
stack
page read and write
22F0000
unkown
page readonly
730000
heap
page read and write
300000
unkown
page readonly
18E6000
direct allocation
page execute and read and write
5274000
trusted library allocation
page read and write
768C000
heap
page read and write
40C1000
heap
page read and write
40C1000
heap
page read and write
236E000
stack
page read and write
40C1000
heap
page read and write
99EE000
stack
page read and write
76D2000
trusted library allocation
page read and write
197F4410000
trusted library allocation
page read and write
731E000
stack
page read and write
40C1000
heap
page read and write
40C1000
heap
page read and write
769B000
heap
page read and write
5ED0000
heap
page read and write
40C1000
heap
page read and write
197EF51A000
heap
page read and write
2CC0000
heap
page read and write
9EEC000
stack
page read and write
40C1000
heap
page read and write
4FF0000
heap
page read and write
261D000
trusted library allocation
page read and write
3B1000
unkown
page readonly
40C1000
heap
page read and write
40C1000
heap
page read and write
AB3E000
stack
page read and write
7FE000
heap
page read and write
B5B000
trusted library allocation
page execute and read and write
197F42D9000
heap
page read and write
2622000
trusted library allocation
page read and write
197F422C000
heap
page read and write
A8BE000
stack
page read and write
720000
unkown
page readonly
40C1000
heap
page read and write
750E000
stack
page read and write
76A4000
heap
page read and write
4B5000
unkown
page read and write
40C1000
heap
page read and write
7669000
heap
page read and write
7D6000
heap
page read and write
1690E203000
trusted library allocation
page read and write
197F42E0000
heap
page read and write
EE0000
unkown
page readonly
40C1000
heap
page read and write
310000
unkown
page readonly
40C1000
heap
page read and write
40C1000
heap
page read and write
54572FB000
stack
page read and write
2617000
trusted library allocation
page read and write
5470000
heap
page read and write
55DB000
stack
page read and write
329000
unkown
page readonly
250000
unkown
page readonly
3E21000
trusted library allocation
page read and write
3E29000
trusted library allocation
page read and write
7DD000
heap
page read and write
197EF415000
heap
page read and write
5EE0000
heap
page read and write
6E0E000
stack
page read and write
82D000
heap
page read and write
310000
unkown
page readonly
40C1000
heap
page read and write
40C1000
heap
page read and write
54580FE000
stack
page read and write
40C1000
heap
page read and write
7626000
heap
page read and write
197F4200000
heap
page read and write
197F4433000
trusted library allocation
page read and write
40C1000
heap
page read and write
7610000
trusted library allocation
page read and write
326000
unkown
page read and write
197EEC7A000
heap
page read and write
8A5000
heap
page read and write
40C1000
heap
page read and write
1690C78C000
heap
page read and write
40C1000
heap
page read and write
197EF400000
heap
page read and write
240000
unkown
page readonly
1F3C000
unclassified section
page execute and read and write
197EFB50000
trusted library section
page readonly
40C1000
heap
page read and write
37A1000
trusted library allocation
page read and write
197EEC40000
heap
page read and write
31F000
unkown
page readonly
441A000
heap
page read and write
40C1000
heap
page read and write
719C000
heap
page read and write
5485000
heap
page read and write
1690DF50000
trusted library allocation
page read and write
82D000
heap
page read and write
40C1000
heap
page read and write
7430000
trusted library allocation
page read and write
40C1000
heap
page read and write
87A000
heap
page read and write
40C1000
heap
page read and write
5457AFE000
stack
page read and write
197F4160000
trusted library allocation
page read and write
624000
heap
page read and write
7B0000
heap
page read and write
D1C000
stack
page read and write
197EEBB0000
trusted library allocation
page read and write
329000
unkown
page readonly
545767E000
stack
page read and write
7B9E000
stack
page read and write
76A4000
heap
page read and write
52B0000
trusted library allocation
page read and write
66E000
stack
page read and write
40C1000
heap
page read and write
2620000
trusted library allocation
page read and write
6C96000
heap
page read and write
545787E000
stack
page read and write
2734000
unkown
page execute and read and write
FE5000
heap
page read and write
7D6000
heap
page read and write
40C1000
heap
page read and write
40C1000
heap
page read and write
CC7000
heap
page read and write
40C1000
heap
page read and write
76A2000
heap
page read and write
8BE000
unkown
page read and write
54581FE000
unkown
page readonly
2607000
trusted library allocation
page read and write
197F4300000
heap
page read and write
22C0000
unkown
page read and write
7B1E000
stack
page read and write
80A000
heap
page read and write
1180000
trusted library allocation
page read and write
329000
unkown
page readonly
B57000
trusted library allocation
page execute and read and write
7CB000
heap
page read and write
310000
unkown
page readonly
71C6000
heap
page read and write
197EFB40000
trusted library section
page readonly
197F44D0000
remote allocation
page read and write
13C2000
trusted library allocation
page read and write
259E000
stack
page read and write
40C1000
heap
page read and write
6CD4000
heap
page read and write
9A2E000
stack
page read and write
25E2000
unkown
page read and write
2BA000
stack
page read and write
13BD000
trusted library allocation
page execute and read and write
A20000
trusted library allocation
page read and write
40C1000
heap
page read and write
1690E20A000
trusted library allocation
page read and write
7D6000
heap
page read and write
197F425B000
heap
page read and write
1690E060000
heap
page read and write
450000
heap
page read and write
40C1000
heap
page read and write
42E000
remote allocation
page execute and read and write
7632000
heap
page read and write
350000
heap
page read and write
7691000
heap
page read and write
40C1000
heap
page read and write
7E0000
heap
page read and write
545797E000
stack
page read and write
370000
unkown
page readonly
4260000
trusted library allocation
page execute and read and write
7638000
heap
page read and write
83A000
heap
page read and write
763A000
heap
page read and write
B3D000
heap
page read and write
43ED000
stack
page read and write
880000
heap
page read and write
5457F7E000
stack
page read and write
1946000
direct allocation
page execute and read and write
1690E301000
trusted library allocation
page read and write
4D60000
trusted library section
page readonly
40C1000
heap
page read and write
4772000
direct allocation
page execute and read and write
1320000
heap
page read and write
3995000
trusted library allocation
page read and write
AC3E000
stack
page read and write
40C1000
heap
page read and write
4C12000
trusted library allocation
page read and write
1690C720000
heap
page read and write
7620000
heap
page read and write
FBE000
heap
page read and write
326000
unkown
page read and write
4701000
direct allocation
page execute and read and write
4430000
direct allocation
page execute and read and write
197F4460000
trusted library allocation
page read and write
2E89000
trusted library allocation
page read and write
57F0000
trusted library allocation
page execute and read and write
293C000
unclassified section
page execute and read and write
7D6000
heap
page read and write
5410000
trusted library allocation
page read and write
198000
stack
page read and write
823000
heap
page read and write
40C1000
heap
page read and write
5457FFE000
unkown
page readonly
690000
heap
page read and write
40C1000
heap
page read and write
AEE000
heap
page read and write
197EFA40000
trusted library allocation
page read and write
40C1000
heap
page read and write
54A0000
heap
page read and write
40C1000
heap
page read and write
7664000
heap
page read and write
979000
heap
page read and write
65A000
stack
page read and write
900000
unkown
page readonly
54A3000
heap
page read and write
54589FE000
unkown
page readonly
1690C510000
system
page execute and read and write
859000
heap
page read and write
1220000
heap
page read and write
780000
unkown
page read and write
197EEC00000
heap
page read and write
1B86000
direct allocation
page execute and read and write
15B000
stack
page read and write
311000
unkown
page execute read
771000
unkown
page readonly
818000
heap
page read and write
CC0000
heap
page read and write
197F428B000
heap
page read and write
326000
unkown
page read and write
950000
heap
page read and write
45CE000
direct allocation
page execute and read and write
40C1000
heap
page read and write
2E7D000
trusted library allocation
page read and write
40C1000
heap
page read and write
5620000
heap
page read and write
13C0000
trusted library allocation
page read and write
197F4400000
trusted library allocation
page read and write
360000
unkown
page read and write
5457DFD000
stack
page read and write
1931000
direct allocation
page execute and read and write
40C1000
heap
page read and write
5456DFE000
unkown
page readonly
40C1000
heap
page read and write
197EEC94000
heap
page read and write
40C1000
heap
page read and write
A00000
unkown
page readonly
31F000
unkown
page readonly
700000
trusted library allocation
page read and write
40C0000
heap
page read and write
750000
heap
page read and write
A4A000
heap
page read and write
40C1000
heap
page read and write
7BDF000
stack
page read and write
40C1000
heap
page read and write
5F0000
heap
page read and write
1690E3BE000
trusted library allocation
page read and write
40C1000
heap
page read and write
853000
heap
page read and write
40C1000
heap
page read and write
950000
heap
page read and write
6C40000
trusted library allocation
page execute and read and write
129E000
stack
page read and write
40C1000
heap
page read and write
41ED000
heap
page read and write
3909000
trusted library allocation
page read and write
380000
unkown
page readonly
A10000
trusted library allocation
page read and write
40C1000
heap
page read and write
197EECA6000
heap
page read and write
44083FE000
stack
page read and write
40C1000
heap
page read and write
40C1000
heap
page read and write
40C1000
heap
page read and write
3B1000
unkown
page readonly
1250000
heap
page read and write
40C1000
heap
page read and write
1560000
heap
page read and write
2CA4000
unkown
page read and write
7CD000
heap
page read and write
765F000
heap
page read and write
7A0000
heap
page read and write
6CA8000
heap
page read and write
1690DF50000
trusted library allocation
page read and write
1690C630000
heap
page read and write
13B0000
trusted library allocation
page read and write
40C1000
heap
page read and write
27A1000
trusted library allocation
page read and write
2CA0000
heap
page read and write
CB0000
trusted library allocation
page execute and read and write
40C1000
heap
page read and write
3836000
trusted library allocation
page read and write
13A4000
trusted library allocation
page read and write
4CF0000
system
page execute and read and write
197EED13000
heap
page read and write
18C0000
direct allocation
page execute and read and write
197EEC90000
heap
page read and write
4D70000
heap
page read and write
6FD000
stack
page read and write
4D4D000
system
page execute and read and write
620000
heap
page read and write
6FC000
stack
page read and write
5ECD000
stack
page read and write
197F4140000
trusted library allocation
page read and write
700000
trusted library allocation
page read and write
6840000
heap
page read and write
750000
heap
page read and write
4E44000
unclassified section
page read and write
2BA0000
trusted library allocation
page read and write
2460000
heap
page read and write
197F4240000
heap
page read and write
250000
unkown
page readonly
7696000
heap
page read and write
232C000
stack
page read and write
197F40A0000
trusted library allocation
page read and write
7D0000
unkown
page read and write
7440000
trusted library section
page read and write
54583FE000
unkown
page readonly
7565000
heap
page read and write
40C1000
heap
page read and write
40C1000
heap
page read and write
6FD0000
heap
page read and write
12DE000
stack
page read and write
3A20000
trusted library allocation
page read and write
A10000
unkown
page readonly
5360000
trusted library allocation
page execute and read and write
89F000
heap
page read and write
40C1000
heap
page read and write
4FB0000
trusted library allocation
page execute and read and write
24F0000
unkown
page readonly
13F0000
heap
page read and write
197F4470000
trusted library allocation
page read and write
54578FE000
unkown
page readonly
22E4000
heap
page read and write
40C1000
heap
page read and write
5260000
trusted library allocation
page read and write
800000
heap
page read and write
40C1000
heap
page read and write
197F44D0000
remote allocation
page read and write
7621000
heap
page read and write
40C1000
heap
page read and write
40C1000
heap
page read and write
CD0000
heap
page read and write
757000
stack
page read and write
23D4000
heap
page read and write
1300000
heap
page read and write
2660000
trusted library allocation
page read and write
4C60000
trusted library allocation
page read and write
2F0000
unkown
page readonly
5456BFE000
unkown
page readonly
1690E20E000
trusted library allocation
page read and write
1690E217000
trusted library allocation
page read and write
40C1000
heap
page read and write
40C1000
heap
page read and write
2E85000
trusted library allocation
page read and write
197F4306000
heap
page read and write
455D000
direct allocation
page execute and read and write
23D4000
heap
page read and write
AE2000
unkown
page readonly
4D71000
system
page execute and read and write
13D7000
trusted library allocation
page execute and read and write
40C1000
heap
page read and write
197F4255000
heap
page read and write
5AE000
stack
page read and write
4FA0000
trusted library allocation
page read and write
197F4480000
trusted library allocation
page read and write
10FC000
stack
page read and write
EFC000
stack
page read and write
2DCE000
stack
page read and write
114E000
stack
page read and write
A23000
trusted library allocation
page execute and read and write
197F42DC000
heap
page read and write
A4FE000
stack
page read and write
A74000
heap
page read and write
300000
unkown
page readonly
826000
heap
page read and write
22E0000
heap
page read and write
6ABE000
stack
page read and write
40C1000
heap
page read and write
2650000
trusted library allocation
page read and write
1690DF50000
trusted library allocation
page read and write
40C1000
heap
page read and write
197EECA0000
heap
page read and write
F74000
heap
page read and write
98EE000
stack
page read and write
F3E000
stack
page read and write
1460000
heap
page read and write
920000
unkown
page read and write
6BBF000
stack
page read and write
528E000
trusted library allocation
page read and write
18C7000
direct allocation
page execute and read and write
720000
trusted library allocation
page read and write
40C1000
heap
page read and write
826000
heap
page read and write
40C1000
heap
page read and write
40C1000
heap
page read and write
4FF3000
heap
page read and write
7194000
heap
page read and write
31F000
unkown
page readonly
197EEC5B000
heap
page read and write
19E3000
direct allocation
page execute and read and write
7D2000
heap
page read and write
40C1000
heap
page read and write
40C1000
heap
page read and write
52D5000
trusted library allocation
page read and write
26A2000
unkown
page read and write
24EC000
stack
page read and write
BF0000
heap
page read and write
7E0000
heap
page read and write
40C1000
heap
page read and write
54570F9000
stack
page read and write
56E000
stack
page read and write
4842000
unclassified section
page read and write
4F0F000
stack
page read and write
260E000
trusted library allocation
page read and write
2611000
trusted library allocation
page read and write
B4A000
trusted library allocation
page execute and read and write
40C1000
heap
page read and write
197F4400000
trusted library allocation
page read and write
54579FE000
unkown
page readonly
40C1000
heap
page read and write
197EEC26000
heap
page read and write
311000
unkown
page execute read
4D5C000
stack
page read and write
C4A2000
system
page read and write
40C1000
heap
page read and write
9DAE000
stack
page read and write
5456AF7000
stack
page read and write
13CA000
trusted library allocation
page execute and read and write
767D000
heap
page read and write
624000
heap
page read and write
825000
heap
page read and write
13A3000
trusted library allocation
page execute and read and write
721E000
stack
page read and write
5450000
trusted library section
page readonly
13A0000
trusted library allocation
page read and write
A3FE000
stack
page read and write
4DC8000
system
page execute and read and write
AAFF000
stack
page read and write
88B000
heap
page read and write
40C1000
heap
page read and write
194D000
direct allocation
page execute and read and write
4C00000
heap
page read and write
197EEC7D000
heap
page read and write
4DB0000
trusted library allocation
page read and write
1690C599000
system
page execute and read and write
31F000
unkown
page readonly
54576FE000
unkown
page readonly
2636000
trusted library allocation
page read and write
4D73000
system
page execute and read and write
40C1000
heap
page read and write
40C1000
heap
page read and write
40C1000
heap
page read and write
2F0000
unkown
page readonly
326000
unkown
page read and write
27F4000
trusted library allocation
page read and write
44093FE000
stack
page read and write
1ED4000
unclassified section
page execute and read and write
197F4170000
trusted library allocation
page read and write
7686000
heap
page read and write
5430000
trusted library allocation
page read and write
F82000
heap
page read and write
40C1000
heap
page read and write
54574FE000
unkown
page readonly
70D0000
trusted library allocation
page read and write
433E000
stack
page read and write
197EEB70000
heap
page read and write
52A2000
trusted library allocation
page read and write
40C1000
heap
page read and write
1690C779000
heap
page read and write
56B0000
trusted library allocation
page read and write
7107000
heap
page read and write
760000
unkown
page read and write
4C20000
trusted library allocation
page execute and read and write
197EEC8E000
heap
page read and write
9C6F000
stack
page read and write
4DF0000
heap
page execute and read and write
230000
unkown
page readonly
7B8000
heap
page read and write
22E4000
heap
page read and write
311000
unkown
page execute read
2BEE000
stack
page read and write
40C1000
heap
page read and write
7CAE000
stack
page read and write
40C1000
heap
page read and write
2690000
heap
page read and write
197EFB60000
trusted library section
page readonly
40C1000
heap
page read and write
2807000
trusted library allocation
page read and write
5480000
heap
page read and write
6CE0000
heap
page read and write
23E0000
heap
page read and write
A7F000
heap
page read and write
40C1000
heap
page read and write
7D1000
heap
page read and write
CB64000
system
page read and write
4C10000
trusted library allocation
page read and write
5457BFE000
unkown
page readonly
40C1000
heap
page read and write
6BC0000
trusted library allocation
page read and write
4782000
unclassified section
page read and write
900000
unkown
page readonly
280B000
trusted library allocation
page read and write
7693000
heap
page read and write
5320000
heap
page execute and read and write
54575FE000
unkown
page readonly
5457C7E000
stack
page read and write
7680000
heap
page read and write
1690C59B000
system
page execute and read and write
FFB000
stack
page read and write
95A000
heap
page read and write
197EEC59000
heap
page read and write
40CA000
heap
page read and write
360000
unkown
page read and write
84A000
heap
page read and write
A00000
unkown
page readonly
B46000
trusted library allocation
page execute and read and write
5270000
trusted library allocation
page read and write
40C1000
heap
page read and write
40C1000
heap
page read and write
197F4160000
trusted library allocation
page read and write
1B71000
direct allocation
page execute and read and write
685B000
heap
page read and write
545650B000
stack
page read and write
740000
heap
page read and write
95E000
heap
page read and write
185F000
stack
page read and write
197EF701000
trusted library allocation
page read and write
40C1000
heap
page read and write
3EA000
stack
page read and write
197F4140000
trusted library allocation
page read and write
43AC000
stack
page read and write
40C1000
heap
page read and write
7ADF000
stack
page read and write
489D000
stack
page read and write
40C1000
heap
page read and write
40C1000
heap
page read and write
4D80000
heap
page read and write
25E0000
trusted library allocation
page read and write
A53D000
stack
page read and write
2E10000
heap
page execute and read and write
41C0000
trusted library allocation
page read and write
2E0C000
stack
page read and write
AC7C000
stack
page read and write
360000
unkown
page readonly
740000
unkown
page readonly
BE0000
heap
page read and write
197EEC13000
heap
page read and write
71A6000
heap
page read and write
197F428D000
heap
page read and write
5460000
heap
page read and write
40C1000
heap
page read and write
40C1000
heap
page read and write
40C1000
heap
page read and write
40C1000
heap
page read and write
1690E200000
trusted library allocation
page read and write
9DEC000
stack
page read and write
387C000
trusted library allocation
page read and write
CA0000
heap
page execute and read and write
545747E000
stack
page read and write
22A0000
unkown
page readonly
40C1000
heap
page read and write
40C1000
heap
page read and write
76AA000
heap
page read and write
40C1000
heap
page read and write
40C1000
heap
page read and write
40C1000
heap
page read and write
CF0000
heap
page read and write
80E000
heap
page read and write
40C1000
heap
page read and write
197EEC78000
heap
page read and write
40C1000
heap
page read and write
19C8000
direct allocation
page execute and read and write
730000
unkown
page readonly
1B8D000
direct allocation
page execute and read and write
C562000
system
page read and write
40C1000
heap
page read and write
EE1000
unkown
page readonly
23D0000
heap
page read and write
40C1000
heap
page read and write
B70000
trusted library allocation
page read and write
813000
heap
page read and write
763D000
heap
page read and write
40C1000
heap
page read and write
1690C7A2000
heap
page read and write
1680000
direct allocation
page execute and read and write
A3D000
trusted library allocation
page execute and read and write
40C1000
heap
page read and write
40C1000
heap
page read and write
740000
unkown
page readonly
43A5000
heap
page read and write
25F7000
trusted library allocation
page read and write
BD5000
heap
page read and write
870000
heap
page read and write
4C30000
heap
page read and write
A7E000
stack
page read and write
40C1000
heap
page read and write
7635000
heap
page read and write
197F4141000
trusted library allocation
page read and write
40C1000
heap
page read and write
139E000
stack
page read and write
7696000
heap
page read and write
8EE000
stack
page read and write
40C1000
heap
page read and write
529D000
trusted library allocation
page read and write
197EFC80000
trusted library allocation
page read and write
73A0000
trusted library allocation
page execute and read and write
7A0000
heap
page read and write
197F4174000
trusted library allocation
page read and write
9B2E000
stack
page read and write
13C6000
trusted library allocation
page execute and read and write
40C1000
heap
page read and write
40C1000
heap
page read and write
54571FE000
unkown
page readonly
418000
remote allocation
page execute and read and write
40C1000
heap
page read and write
197F4130000
trusted library allocation
page read and write
BFE000
stack
page read and write
25E2000
unkown
page read and write
4D90000
heap
page read and write
40C1000
heap
page read and write
5490000
trusted library allocation
page execute and read and write
5291000
trusted library allocation
page read and write
6FD000
stack
page read and write
A2D000
trusted library allocation
page execute and read and write
9CAE000
stack
page read and write
1690E3C4000
trusted library allocation
page read and write
7630000
heap
page read and write
885000
heap
page read and write
B50000
unkown
page readonly
2670000
trusted library allocation
page read and write
380000
unkown
page readonly
83A000
heap
page read and write
95E000
heap
page read and write
50FD000
stack
page read and write
129F000
stack
page read and write
197F00A0000
trusted library allocation
page read and write
70F8000
heap
page read and write
24F0000
unkown
page readonly
197EECFF000
heap
page read and write
40C1000
heap
page read and write
40C1000
heap
page read and write
1690E100000
trusted library allocation
page read and write
7D6000
heap
page read and write
197EED29000
heap
page read and write
760000
unkown
page read and write
730000
unkown
page readonly
40C1000
heap
page read and write
5457EFE000
unkown
page readonly
9EF000
stack
page read and write
22C0000
unkown
page read and write
2E21000
trusted library allocation
page read and write
197EEC2B000
heap
page read and write
F4E000
heap
page read and write
40C1000
heap
page read and write
1690C750000
heap
page read and write
4DA0000
trusted library allocation
page execute and read and write
EF7000
stack
page read and write
823000
heap
page read and write
B52000
trusted library allocation
page read and write
5296000
trusted library allocation
page read and write
22F0000
unkown
page readonly
7CB000
heap
page read and write
13DB000
trusted library allocation
page execute and read and write
5350000
trusted library allocation
page read and write
71C1000
heap
page read and write
311000
unkown
page execute read
197EEC73000
heap
page read and write
197F44D0000
remote allocation
page read and write
5750000
heap
page read and write
40C1000
heap
page read and write
D90000
unkown
page readonly
4409BFE000
stack
page read and write
197F424D000
heap
page read and write
197EFB90000
trusted library section
page readonly
40C1000
heap
page read and write
A640000
heap
page read and write
40C1000
heap
page read and write
12E0000
heap
page read and write
40C1000
heap
page read and write
80A000
heap
page read and write
6940000
trusted library allocation
page read and write
46FD000
direct allocation
page execute and read and write
279C000
unkown
page execute and read and write
13D2000
trusted library allocation
page read and write
B7A000
stack
page read and write
23E0000
heap
page read and write
40C1000
heap
page read and write
2BA000
stack
page read and write
13D0000
trusted library allocation
page read and write
340000
unkown
page readonly
920000
unkown
page read and write
4C40000
trusted library allocation
page read and write
7154000
heap
page read and write
40C1000
heap
page read and write
5456EFC000
stack
page read and write
837000
heap
page read and write
40C1000
heap
page read and write
197EEBC0000
trusted library section
page read and write
850000
heap
page read and write
40C1000
heap
page read and write
BD0000
heap
page read and write
40C1000
heap
page read and write
A40000
heap
page read and write
6FC000
stack
page read and write
F7F000
heap
page read and write
40C1000
heap
page read and write
55F0000
trusted library allocation
page read and write
442E000
stack
page read and write
545757E000
stack
page read and write
7B5F000
stack
page read and write
197F4110000
trusted library allocation
page read and write
40C1000
heap
page read and write
F60000
heap
page read and write
427C000
heap
page read and write
40C1000
heap
page read and write
881000
heap
page read and write
A81000
heap
page read and write
197F42EF000
heap
page read and write
8A0000
heap
page read and write
5180000
trusted library allocation
page read and write
756D000
heap
page read and write
2803000
trusted library allocation
page read and write
13F7000
heap
page read and write
197F40B0000
trusted library allocation
page read and write
40C1000
heap
page read and write
52F0000
trusted library allocation
page read and write
D50000
heap
page read and write
4C6B000
trusted library allocation
page read and write
1940000
direct allocation
page execute and read and write
40C1000
heap
page read and write
4F1C000
stack
page read and write
197F4120000
trusted library allocation
page read and write
769F000
heap
page read and write
There are 898 hidden memdumps, click here to show them.