IOC Report
SecuriteInfo.com.Trojan.Win32.Makoob.9650.exe

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps1510501,00010010Label

Files

File Path
Type
Category
Malicious
Download
SecuriteInfo.com.Trojan.Win32.Makoob.9650.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\json[1].json
JSON data
modified
C:\Users\user\AppData\Local\Temp\bhv8FB6.tmp
Extensible storage engine DataBase, version 0x620, checksum 0xc733b127, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\mblgcqd
Unicode text, UTF-16, little-endian text, with no line terminators
modified
C:\Users\user\AppData\Local\Temp\nszDF24.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\boblehallers\biklangenes\brainless\Billigvarers246.til
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\boblehallers\biklangenes\brainless\Konfektioneringerne\Dissipaters.cho
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\boblehallers\biklangenes\brainless\Konfektioneringerne\Kalkvrksejernes\overcarking.iso
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\boblehallers\biklangenes\brainless\Konfektioneringerne\Kalkvrksejernes\programmeringsbegrebets.txt
Generic INItialization configuration [hypertensive brugskunstneren]
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\boblehallers\biklangenes\brainless\Konfektioneringerne\Kalkvrksejernes\sc.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 82", baseline, precision 8, 2560x1440, components 3
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\boblehallers\biklangenes\brainless\Konfektioneringerne\godetia.txt
Generic INItialization configuration [MIMRE VINDE]
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\boblehallers\biklangenes\brainless\Konfektioneringerne\halefjerens.for
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\boblehallers\biklangenes\brainless\vanhelligelserne.Abo
data
dropped
\Device\ConDrv
ISO-8859 text, with CRLF line terminators
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Makoob.9650.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Makoob.9650.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Makoob.9650.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Makoob.9650.exe"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\mblgcqd"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\xdqzdiobxbz"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\xdqzdiobxbz"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\hxwrebzukjrzgr"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=P
unknown
https://www.office.com/
unknown
http://geoplugin.net/json.gp#
unknown
https://fp-afd.azurefd.us/apc/trans.gif?a2555e10569a45fe03b885d268c50da9
unknown
http://www.imvu.comr
unknown
http://geoplugin.net/json.gp%
unknown
http://geoplugin.net/json.gpl
unknown
https://drive.google.com/7
unknown
https://aefd.nelreports.net/api/report?cat=bingth
unknown
http://geoplugin.net/json.gpp
unknown
http://www.imvu.com
unknown
https://aefd.nelreports.net/api/report?cat=wsb
unknown
http://c.pki.goog/r/gsr1.crl0
unknown
https://drive.usercontent.google.com/
unknown
http://www.imvu.comppData
unknown
http://www.nirsoft.net
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://ecfdb90f321c52ef6e93077f63413543.azr.footprintdns.com/apc/trans.gif?c2fcd52267835a3e34f9ac05
unknown
http://c.pki.goog/we2/64OUIVzpZV4.crl0
unknown
http://i.pki.goog/we2.crt0
unknown
https://ecfdb90f321c52ef6e93077f63413543.azr.footprintdns.com/apc/trans.gif?bd78002c55888096ce060c58
unknown
http://o.pki.goog/we20%
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://www.google.com
unknown
http://nsis.sf.net/NSIS_Error
unknown
https://dl.google.com/update2/installers/icons/%7B8a69d345-d564-463c-aff1-a69d9e530f96%7D.bmp?lang=e
unknown
https://aefd.nelreports.net/api/report?cat=bingaot
unknown
https://fp-afd.azurefd.us/apc/trans.gif?69c749c200c753dfb00f5bc8299ab8eb
unknown
https://drive.google.com/
unknown
https://maps.windows.com/windows-app-web-link
unknown
http://i.pki.goog/gsr1.crt0-
unknown
https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
unknown
http://c.pki.goog/r/r4.crl0
unknown
https://drive.usercontent.google.com/D
unknown
http://i.pki.goog/r4.crt0
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
https://apis.google.com
unknown
http://www.nirsoft.net/
unknown
https://aefd.nelreports.net/api/report?cat=wsb&ndcParam=QWthbWFp
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&
unknown
http://www.ebuddy.com
unknown
There are 37 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
geoplugin.net
178.237.33.50
drive.google.com
142.250.65.238
drive.usercontent.google.com
142.251.41.1

IPs

IP
Domain
Country
Malicious
176.65.142.81
unknown
Germany
malicious
142.250.65.238
drive.google.com
United States
142.251.41.1
drive.usercontent.google.com
United States
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-C2AG7V
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-C2AG7V
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-C2AG7V
time
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-C2AG7V
UID
malicious
HKEY_CURRENT_USER\Cormel\bructeri\arachis
Medalet80
HKEY_CURRENT_USER\slapping\Vikariatet199\relegates
funktionsleders
HKEY_CURRENT_USER\Impregnability246\yashmak\pneumatocystic
epinicia
HKEY_CURRENT_USER\afvekslingens\Uninstall\fremdeles\Personificator53
tencteri

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
355F8000
heap
page read and write
malicious
353F1000
heap
page read and write
malicious
400000
system
page execute and read and write
malicious
359BD000
heap
page read and write
malicious
3536B000
heap
page read and write
malicious
3577A000
heap
page read and write
malicious
35776000
heap
page read and write
malicious
353F1000
heap
page read and write
malicious
358F9000
heap
page read and write
malicious
35693000
heap
page read and write
malicious
5AA5000
direct allocation
page execute and read and write
malicious
35453000
heap
page read and write
malicious
4A38000
heap
page read and write
malicious
355F0000
unclassified section
page execute and read and write
malicious
4A14000
heap
page read and write
malicious
3583F000
heap
page read and write
malicious
2B2C000
heap
page read and write
466A000
heap
page read and write
55EC000
heap
page read and write
47FA000
heap
page read and write
45AC000
heap
page read and write
37D1000
heap
page read and write
3842000
heap
page read and write
10003000
unkown
page readonly
55FA000
heap
page read and write
37E0000
heap
page read and write
441A000
heap
page read and write
4A32000
heap
page read and write
3593000
heap
page read and write
4679000
heap
page read and write
354CA000
heap
page read and write
4544000
heap
page read and write
2CC0000
direct allocation
page read and write
46E3000
heap
page read and write
4792000
heap
page read and write
2C35000
remote allocation
page execute and read and write
407000
unkown
page readonly
498A000
heap
page read and write
55FE000
heap
page read and write
435B000
heap
page read and write
4686000
heap
page read and write
47D4000
heap
page read and write
37D1000
heap
page read and write
2B72000
heap
page read and write
55EF000
heap
page read and write
2A80000
heap
page read and write
2C8F000
heap
page read and write
45E000
system
page execute and read and write
4B67000
heap
page read and write
435F000
heap
page read and write
4AE7000
heap
page read and write
44DE000
heap
page read and write
4AD4000
heap
page read and write
4A87000
heap
page read and write
458D000
heap
page read and write
2B44000
heap
page read and write
2A66000
heap
page read and write
2A87000
heap
page read and write
354B6000
heap
page read and write
493D000
heap
page read and write
2A3B000
heap
page read and write
5602000
heap
page read and write
35453000
heap
page read and write
49AF000
stack
page read and write
4829000
heap
page read and write
44BA000
heap
page read and write
4599000
heap
page read and write
3384000
heap
page read and write
4986000
heap
page read and write
4931000
heap
page read and write
5280000
heap
page read and write
561F000
heap
page read and write
2470000
heap
page read and write
5171000
heap
page read and write
73E000
stack
page read and write
478D000
heap
page read and write
4AC9000
heap
page read and write
4B10000
heap
page read and write
4A8B000
heap
page read and write
4A96000
heap
page read and write
43A5000
heap
page read and write
4701000
heap
page read and write
48A6000
heap
page read and write
35A3B000
unclassified section
page execute and read and write
400000
unkown
page readonly
4B64000
heap
page read and write
7D1000
heap
page read and write
4944000
heap
page read and write
2C00000
heap
page read and write
4A8F000
heap
page read and write
3040000
heap
page readonly
4AA0000
heap
page read and write
4950000
heap
page read and write
2AE0000
heap
page read and write
476B000
heap
page read and write
4426000
heap
page read and write
48CC000
heap
page read and write
55E8000
heap
page read and write
34ECD000
stack
page read and write
3384000
heap
page read and write
2C3A000
heap
page read and write
47F6000
heap
page read and write
3864000
heap
page read and write
4831000
heap
page read and write
46A8000
heap
page read and write
55EF000
heap
page read and write
2D00000
direct allocation
page read and write
47EB000
heap
page read and write
55F6000
heap
page read and write
3864000
heap
page read and write
33FF000
stack
page read and write
2ACB000
heap
page read and write
4634000
heap
page read and write
461D000
heap
page read and write
444D000
heap
page read and write
475F000
heap
page read and write
465F000
heap
page read and write
29C4000
heap
page read and write
44A0000
heap
page read and write
336D000
stack
page read and write
4964000
heap
page read and write
3843000
heap
page read and write
49F3000
heap
page read and write
4840000
heap
page read and write
2C26000
heap
page read and write
55E0000
heap
page read and write
4B2E000
heap
page read and write
4758000
heap
page read and write
467D000
heap
page read and write
4848000
heap
page read and write
48A2000
heap
page read and write
3842000
heap
page read and write
43B8000
heap
page read and write
2210000
heap
page read and write
788000
heap
page read and write
55EF000
heap
page read and write
4653000
heap
page read and write
57D0000
trusted library allocation
page read and write
35A66000
direct allocation
page execute and read and write
4B41000
heap
page read and write
441E000
heap
page read and write
4416000
heap
page read and write
4B32000
heap
page read and write
4AEC000
heap
page read and write
4AC9000
heap
page read and write
2C31000
heap
page read and write
353F0000
heap
page read and write
49D0000
heap
page read and write
2D40000
direct allocation
page read and write
10001000
unkown
page execute read
4785000
heap
page read and write
4B3A000
heap
page read and write
2ACF000
heap
page read and write
776000
heap
page read and write
4AC8000
heap
page read and write
3536A000
heap
page read and write
29E7000
heap
page read and write
44D5000
heap
page read and write
43D4000
heap
page read and write
4A63000
heap
page read and write
3385000
heap
page read and write
496D000
heap
page read and write
434000
unkown
page read and write
2BA2000
heap
page read and write
98000
stack
page read and write
4A54000
heap
page read and write
23BE000
stack
page read and write
46F0000
heap
page read and write
3813000
heap
page read and write
3842000
heap
page read and write
35A06000
unclassified section
page execute and read and write
2A53000
heap
page read and write
3842000
heap
page read and write
37D9000
heap
page read and write
488A000
heap
page read and write
332E000
stack
page read and write
44BE000
heap
page read and write
4442000
heap
page read and write
4992000
heap
page read and write
3842000
heap
page read and write
4B03000
heap
page read and write
43F8000
heap
page read and write
55EF000
heap
page read and write
3030000
heap
page read and write
37ED000
heap
page read and write
4B60000
heap
page read and write
55D9000
heap
page read and write
A6E000
stack
page read and write
A84000
heap
page read and write
460E000
heap
page read and write
4517000
heap
page read and write
44CA000
heap
page read and write
4825000
heap
page read and write
2AC8000
heap
page read and write
43FC000
heap
page read and write
49C0000
heap
page read and write
4381000
heap
page read and write
4B7C000
heap
page read and write
49B0000
heap
page read and write
3864000
heap
page read and write
2A5F000
heap
page read and write
436C000
heap
page read and write
354B6000
heap
page read and write
37E8000
heap
page read and write
55EF000
heap
page read and write
55FE000
heap
page read and write
839000
heap
page read and write
2C66000
heap
page read and write
4B07000
heap
page read and write
4363000
heap
page read and write
4628000
heap
page read and write
4638000
heap
page read and write
2C79000
heap
page read and write
29DC000
heap
page read and write
2A2B000
heap
page read and write
359C000
heap
page read and write
1835000
remote allocation
page execute and read and write
47EF000
heap
page read and write
4557000
heap
page read and write
4B0B000
heap
page read and write
4860000
heap
page read and write
439E000
heap
page read and write
4999000
heap
page read and write
4B25000
heap
page read and write
55EC000
heap
page read and write
4A03000
heap
page read and write
2F8D000
heap
page read and write
5602000
heap
page read and write
48B9000
heap
page read and write
2A30000
heap
page read and write
2C2F000
heap
page read and write
55F2000
heap
page read and write
2B6A000
heap
page read and write
456A000
heap
page read and write
55DF000
heap
page read and write
A84000
heap
page read and write
4806000
heap
page read and write
3843000
heap
page read and write
400000
system
page execute and read and write
2C35000
heap
page read and write
354C9000
heap
page read and write
4460000
heap
page read and write
2BF8000
heap
page read and write
401000
unkown
page execute read
2D8C000
stack
page read and write
3370000
heap
page read and write
19A000
stack
page read and write
57D0000
trusted library allocation
page read and write
4B16000
heap
page read and write
486B000
heap
page read and write
2BC8000
heap
page read and write
448000
unkown
page readonly
55DB000
heap
page read and write
29F4000
heap
page read and write
38F9000
heap
page read and write
4B40000
heap
page read and write
4960000
heap
page read and write
2ADB000
heap
page read and write
4AF8000
heap
page read and write
46D7000
heap
page read and write
4763000
heap
page read and write
44CD000
heap
page read and write
2DCC000
stack
page read and write
55EF000
heap
page read and write
4566000
heap
page read and write
4939000
heap
page read and write
35A20000
unclassified section
page execute and read and write
448000
unkown
page readonly
2BB1000
heap
page read and write
6EA5000
direct allocation
page execute and read and write
476E000
heap
page read and write
A84000
heap
page read and write
A84000
heap
page read and write
37D1000
heap
page read and write
4611000
heap
page read and write
4615000
heap
page read and write
3536B000
heap
page read and write
4AB9000
heap
page read and write
4389000
heap
page read and write
4767000
heap
page read and write
4586000
heap
page read and write
37E6000
heap
page read and write
55D8000
heap
page read and write
44E2000
heap
page read and write
3504E000
stack
page read and write
4ACC000
heap
page read and write
2B3B000
heap
page read and write
4582000
heap
page read and write
3843000
heap
page read and write
34B4F000
stack
page read and write
4B9A000
heap
page read and write
55D5000
heap
page read and write
354B4000
heap
page read and write
3815000
heap
page read and write
46FA000
heap
page read and write
4A87000
heap
page read and write
37D9000
heap
page read and write
55FE000
heap
page read and write
4A06000
heap
page read and write
42B000
unkown
page read and write
2A74000
heap
page read and write
3384000
heap
page read and write
4882000
heap
page read and write
46EA000
heap
page read and write
4A21000
heap
page read and write
55D5000
heap
page read and write
37FE000
heap
page read and write
446C000
heap
page read and write
49D8000
heap
page read and write
4B8B000
heap
page read and write
49E8000
heap
page read and write
401000
unkown
page execute read
4822000
heap
page read and write
6FF000
stack
page read and write
4B4D000
heap
page read and write
7C9000
heap
page read and write
5171000
heap
page read and write
2CBE000
heap
page read and write
55DB000
heap
page read and write
38B0000
trusted library allocation
page read and write
4ABF000
heap
page read and write
4705000
heap
page read and write
55DB000
heap
page read and write
79A000
heap
page read and write
456E000
heap
page read and write
477A000
heap
page read and write
2D20000
direct allocation
page read and write
46CC000
heap
page read and write
2AEF000
heap
page read and write
37D0000
heap
page read and write
55DB000
heap
page read and write
4A2E000
heap
page read and write
4802000
heap
page read and write
A10000
heap
page read and write
43D0000
heap
page read and write
43A1000
heap
page read and write
474000
system
page execute and read and write
4B1E000
heap
page read and write
44C6000
heap
page read and write
A84000
heap
page read and write
459D000
heap
page read and write
55E3000
heap
page read and write
5602000
heap
page read and write
354B9000
heap
page read and write
37E0000
heap
page read and write
2B79000
heap
page read and write
46DF000
heap
page read and write
2BA5000
heap
page read and write
4A96000
heap
page read and write
49A6000
heap
page read and write
6600000
direct allocation
page read and write
37F1000
heap
page read and write
485C000
heap
page read and write
4886000
heap
page read and write
55D8000
heap
page read and write
5EE000
stack
page read and write
4B83000
heap
page read and write
38FE000
heap
page read and write
4624000
heap
page read and write
4A19000
heap
page read and write
498E000
heap
page read and write
2474000
heap
page read and write
4354000
heap
page read and write
49DB000
heap
page read and write
2BBC000
heap
page read and write
439A000
heap
page read and write
2C0B000
heap
page read and write
2B5F000
heap
page read and write
4621000
heap
page read and write
3384000
heap
page read and write
2AD8000
heap
page read and write
4A98000
heap
page read and write
55D9000
heap
page read and write
4A4B000
heap
page read and write
46D4000
heap
page read and write
48AD000
heap
page read and write
2CA8000
heap
page read and write
37FA000
heap
page read and write
4619000
heap
page read and write
4650000
heap
page read and write
4644000
heap
page read and write
5602000
heap
page read and write
4B74000
heap
page read and write
499D000
heap
page read and write
45A8000
heap
page read and write
2B5B000
heap
page read and write
4A48000
heap
page read and write
354B9000
heap
page read and write
2B53000
heap
page read and write
4510000
heap
page read and write
2B63000
heap
page read and write
37E0000
heap
page read and write
49BD000
heap
page read and write
A84000
heap
page read and write
359C000
heap
page read and write
44F9000
heap
page read and write
55EC000
heap
page read and write
4B21000
heap
page read and write
409000
unkown
page read and write
2C2A000
heap
page read and write
A84000
heap
page read and write
33E0000
heap
page read and write
44C2000
heap
page read and write
48B5000
heap
page read and write
38F7000
heap
page read and write
4A12000
heap
page read and write
4ADC000
heap
page read and write
37B0000
heap
page read and write
55F1000
heap
page read and write
48AE000
stack
page read and write
3384000
heap
page read and write
44E9000
heap
page read and write
4AC1000
heap
page read and write
47E0000
heap
page read and write
4A0A000
heap
page read and write
3208000
heap
page read and write
7AB000
heap
page read and write
5616000
heap
page read and write
2D50000
direct allocation
page read and write
2AF7000
heap
page read and write
400000
unkown
page readonly
4663000
heap
page read and write
560E000
heap
page read and write
326F000
stack
page read and write
29EF000
heap
page read and write
484C000
heap
page read and write
2C93000
heap
page read and write
2C5E000
heap
page read and write
401000
unkown
page execute read
32E0000
heap
page readonly
4350000
heap
page read and write
4376000
heap
page read and write
456000
system
page execute and read and write
4AC1000
heap
page read and write
2A25000
heap
page read and write
55DB000
heap
page read and write
55F2000
heap
page read and write
3842000
heap
page read and write
37E0000
heap
page read and write
55F6000
heap
page read and write
440F000
heap
page read and write
2C1A000
heap
page read and write
2BCB000
heap
page read and write
A0E000
stack
page read and write
A84000
heap
page read and write
34D3E000
stack
page read and write
48D0000
heap
page read and write
A84000
heap
page read and write
354B6000
heap
page read and write
3843000
heap
page read and write
4A86000
heap
page read and write
225E000
stack
page read and write
3384000
heap
page read and write
55EF000
heap
page read and write
47D8000
heap
page read and write
4A44000
heap
page read and write
3514F000
stack
page read and write
4B7F000
heap
page read and write
35A0C000
unclassified section
page execute and read and write
2B9A000
heap
page read and write
44A4000
heap
page read and write
46E7000
heap
page read and write
354C9000
heap
page read and write
6680000
direct allocation
page read and write
4A90000
heap
page read and write
463F000
heap
page read and write
407000
unkown
page readonly
560E000
heap
page read and write
44ED000
heap
page read and write
3536B000
heap
page read and write
55DB000
heap
page read and write
2430000
heap
page read and write
492A000
heap
page read and write
41B000
system
page execute and read and write
10012000
trusted library allocation
page read and write
4A47000
heap
page read and write
4B50000
heap
page read and write
5AE000
stack
page read and write
4696000
heap
page read and write
50A5000
direct allocation
page execute and read and write
464C000
heap
page read and write
352F1000
heap
page read and write
4571000
heap
page read and write
2BBF000
stack
page read and write
448000
unkown
page readonly
400000
unkown
page readonly
3564E000
unclassified section
page execute and read and write
2B7D000
heap
page read and write
4367000
heap
page read and write
4968000
heap
page read and write
55D8000
heap
page read and write
4A68000
heap
page read and write
2B48000
heap
page read and write
4400000
heap
page read and write
55FE000
heap
page read and write
2CE0000
direct allocation
page read and write
4B41000
heap
page read and write
497B000
heap
page read and write
5171000
heap
page read and write
4553000
heap
page read and write
2A22000
heap
page read and write
49D8000
heap
page read and write
4A34000
heap
page read and write
34D00000
remote allocation
page read and write
45B7000
heap
page read and write
6620000
direct allocation
page read and write
460A000
heap
page read and write
3384000
heap
page read and write
2AC0000
heap
page read and write
38FA000
heap
page read and write
2D30000
direct allocation
page read and write
4602000
heap
page read and write
74E000
heap
page read and write
4449000
heap
page read and write
66C0000
heap
page read and write
4940000
heap
page read and write
2A18000
heap
page read and write
2A3E000
heap
page read and write
3384000
heap
page read and write
49C8000
heap
page read and write
3536A000
heap
page read and write
4B78000
heap
page read and write
454F000
heap
page read and write
3842000
heap
page read and write
4407000
heap
page read and write
3867000
heap
page read and write
3539A000
heap
page read and write
44AF000
heap
page read and write
400000
unkown
page readonly
3635000
remote allocation
page execute and read and write
4A58000
heap
page read and write
55D1000
heap
page read and write
4A87000
heap
page read and write
4540000
heap
page read and write
2B76000
heap
page read and write
2A77000
heap
page read and write
4873000
heap
page read and write
2235000
remote allocation
page execute and read and write
4781000
heap
page read and write
457E000
heap
page read and write
463B000
heap
page read and write
42F000
unkown
page read and write
7DB000
heap
page read and write
44AB000
heap
page read and write
46AC000
heap
page read and write
3385000
heap
page read and write
4478000
heap
page read and write
2BCF000
heap
page read and write
4385000
heap
page read and write
2BC0000
heap
page read and write
3385000
heap
page read and write
318E000
stack
page read and write
55EC000
heap
page read and write
2F80000
heap
page read and write
3384000
heap
page read and write
46B4000
heap
page read and write
409000
unkown
page write copy
4B1A000
heap
page read and write
55F1000
heap
page read and write
9C0000
heap
page readonly
4811000
heap
page read and write
55D5000
heap
page read and write
45B4000
heap
page read and write
2A5D000
heap
page read and write
2CD0000
direct allocation
page read and write
2F83000
heap
page read and write
354B9000
heap
page read and write
4657000
heap
page read and write
55EF000
heap
page read and write
4AAA000
heap
page read and write
48C4000
heap
page read and write
78A5000
direct allocation
page execute and read and write
3380000
heap
page read and write
4B45000
heap
page read and write
481A000
heap
page read and write
4B58000
heap
page read and write
4464000
heap
page read and write
55FE000
heap
page read and write
323C000
stack
page read and write
3536B000
heap
page read and write
10005000
unkown
page readonly
55F1000
heap
page read and write
4676000
heap
page read and write
2A37000
heap
page read and write
2C84000
heap
page read and write
494D000
heap
page read and write
55F1000
heap
page read and write
354C9000
heap
page read and write
48BC000
heap
page read and write
4789000
heap
page read and write
4451000
heap
page read and write
37E6000
heap
page read and write
65E0000
direct allocation
page read and write
4B29000
heap
page read and write
3050000
heap
page read and write
55D9000
heap
page read and write
45B0000
heap
page read and write
55D1000
heap
page read and write
4A4E000
heap
page read and write
3384000
heap
page read and write
55DB000
heap
page read and write
74A000
heap
page read and write
3864000
heap
page read and write
33E8000
heap
page read and write
451C000
heap
page read and write
4513000
heap
page read and write
29C0000
heap
page read and write
4AC7000
heap
page read and write
37D1000
heap
page read and write
2C0F000
heap
page read and write
3590000
heap
page read and write
4A96000
heap
page read and write
A84000
heap
page read and write
2CF0000
direct allocation
page read and write
4396000
heap
page read and write
352F0000
heap
page read and write
4AF4000
heap
page read and write
29E3000
heap
page read and write
55D9000
heap
page read and write
2C04000
heap
page read and write
4935000
heap
page read and write
48D7000
heap
page read and write
38B0000
trusted library allocation
page read and write
29CC000
heap
page read and write
4681000
heap
page read and write
455B000
heap
page read and write
2B0A000
heap
page read and write
37D0000
heap
page read and write
492D000
heap
page read and write
3843000
heap
page read and write
4922000
heap
page read and write
2F8D000
heap
page read and write
2D60000
direct allocation
page read and write
55D5000
heap
page read and write
2B6E000
heap
page read and write
4A35000
heap
page read and write
4A5C000
heap
page read and write
4504000
heap
page read and write
4422000
heap
page read and write
7E5000
heap
page read and write
37E1000
heap
page read and write
4AA0000
heap
page read and write
2B02000
heap
page read and write
37D0000
heap
page read and write
37D0000
heap
page read and write
4666000
heap
page read and write
A84000
heap
page read and write
37E0000
heap
page read and write
2A68000
heap
page read and write
3256000
stack
page read and write
477E000
heap
page read and write
409000
unkown
page write copy
55E0000
heap
page read and write
2B81000
heap
page read and write
49AA000
heap
page read and write
3272000
stack
page read and write
48C0000
heap
page read and write
4867000
heap
page read and write
49F7000
heap
page read and write
482D000
heap
page read and write
57D0000
trusted library allocation
page read and write
448000
unkown
page readonly
4DD0000
heap
page read and write
34D00000
remote allocation
page read and write
48DC000
heap
page read and write
2C80000
heap
page read and write
46D0000
heap
page read and write
4AC5000
heap
page read and write
4A86000
heap
page read and write
489A000
heap
page read and write
4816000
heap
page read and write
2A5B000
heap
page read and write
38FB000
heap
page read and write
37D1000
heap
page read and write
48B1000
heap
page read and write
4AE3000
heap
page read and write
55EF000
heap
page read and write
449C000
heap
page read and write
5F0000
heap
page read and write
3384000
heap
page read and write
468E000
heap
page read and write
4858000
heap
page read and write
407000
unkown
page readonly
43C9000
heap
page read and write
4708000
heap
page read and write
6610000
direct allocation
page read and write
2B39000
heap
page read and write
382D000
heap
page read and write
4973000
heap
page read and write
16E0000
remote allocation
page execute and read and write
4772000
heap
page read and write
2A28000
heap
page read and write
4562000
heap
page read and write
7BF000
heap
page read and write
465B000
heap
page read and write
55EB000
heap
page read and write
4606000
heap
page read and write
2C88000
heap
page read and write
4429000
heap
page read and write
10000000
unkown
page readonly
55FE000
heap
page read and write
37D5000
heap
page read and write
47FE000
heap
page read and write
33FD000
heap
page read and write
4864000
heap
page read and write
446F000
heap
page read and write
496F000
heap
page read and write
4A50000
heap
page read and write
2C6D000
heap
page read and write
440B000
heap
page read and write
38FA000
heap
page read and write
49FF000
heap
page read and write
4877000
heap
page read and write
49D4000
heap
page read and write
A84000
heap
page read and write
3384000
heap
page read and write
2440000
heap
page read and write
487A000
heap
page read and write
55D9000
heap
page read and write
3842000
heap
page read and write
4A52000
heap
page read and write
2BD3000
heap
page read and write
4431000
heap
page read and write
7B5000
heap
page read and write
4A45000
heap
page read and write
407000
unkown
page readonly
34DCC000
stack
page read and write
4575000
heap
page read and write
4977000
heap
page read and write
4436000
heap
page read and write
3384000
heap
page read and write
3536A000
heap
page read and write
49A2000
heap
page read and write
4835000
heap
page read and write
4A3D000
heap
page read and write
2B50000
heap
page read and write
3842000
heap
page read and write
6640000
direct allocation
page read and write
43CB000
heap
page read and write
55D1000
heap
page read and write
46FE000
heap
page read and write
4AD8000
heap
page read and write
4455000
heap
page read and write
2AD5000
heap
page read and write
4392000
heap
page read and write
7F9000
heap
page read and write
4B6B000
heap
page read and write
48A9000
heap
page read and write
486F000
heap
page read and write
4A96000
heap
page read and write
437E000
heap
page read and write
4B5C000
heap
page read and write
454B000
heap
page read and write
46F2000
heap
page read and write
4809000
heap
page read and write
55EF000
heap
page read and write
2C7C000
heap
page read and write
37D1000
heap
page read and write
A3F000
stack
page read and write
480D000
heap
page read and write
37AE000
stack
page read and write
4B49000
heap
page read and write
455E000
heap
page read and write
3384000
heap
page read and write
50AC000
heap
page read and write
A80000
heap
page read and write
495B000
heap
page read and write
44D1000
heap
page read and write
55EF000
heap
page read and write
38F0000
heap
page read and write
55F1000
heap
page read and write
47DC000
heap
page read and write
488D000
heap
page read and write
29C8000
heap
page read and write
321C000
heap
page read and write
468A000
heap
page read and write
31CE000
stack
page read and write
4AB4000
heap
page read and write
4AD2000
heap
page read and write
49C1000
heap
page read and write
49D0000
heap
page read and write
55DB000
heap
page read and write
A84000
heap
page read and write
438D000
heap
page read and write
29FC000
heap
page read and write
4445000
heap
page read and write
46F6000
heap
page read and write
46EE000
heap
page read and write
44F5000
heap
page read and write
83C000
stack
page read and write
55D9000
heap
page read and write
811000
heap
page read and write
2A33000
heap
page read and write
A84000
heap
page read and write
36AE000
stack
page read and write
4699000
heap
page read and write
2CA0000
heap
page read and write
462C000
heap
page read and write
4A87000
heap
page read and write
3843000
heap
page read and write
4776000
heap
page read and write
436E000
heap
page read and write
4468000
heap
page read and write
3384000
heap
page read and write
442D000
heap
page read and write
29D0000
heap
page read and write
46A1000
heap
page read and write
4AC1000
heap
page read and write
29F2000
heap
page read and write
34D7F000
stack
page read and write
4995000
heap
page read and write
4A39000
heap
page read and write
44E6000
heap
page read and write
49B1000
heap
page read and write
7EF000
heap
page read and write
46B8000
heap
page read and write
306C000
stack
page read and write
2BFC000
heap
page read and write
4B93000
heap
page read and write
2C18000
heap
page read and write
48C8000
heap
page read and write
401000
unkown
page execute read
4A5F000
heap
page read and write
740000
heap
page read and write
A84000
heap
page read and write
4591000
heap
page read and write
55EF000
heap
page read and write
480000
heap
page read and write
437A000
heap
page read and write
2C22000
heap
page read and write
2B11000
heap
page read and write
4754000
heap
page read and write
49B5000
heap
page read and write
2C13000
heap
page read and write
3200000
heap
page read and write
825000
heap
page read and write
4579000
heap
page read and write
2C62000
heap
page read and write
2A4D000
heap
page read and write
35A50000
direct allocation
page read and write
4B96000
heap
page read and write
64A5000
direct allocation
page execute and read and write
55E0000
heap
page read and write
443E000
heap
page read and write
4B36000
heap
page read and write
4B70000
heap
page read and write
55D5000
heap
page read and write
6670000
direct allocation
page read and write
46DB000
heap
page read and write
475B000
heap
page read and write
4372000
heap
page read and write
57D0000
trusted library allocation
page read and write
45C0000
heap
page read and write
77C000
heap
page read and write
48D3000
heap
page read and write
55E3000
heap
page read and write
481E000
heap
page read and write
38FB000
heap
page read and write
2C97000
heap
page read and write
43AD000
heap
page read and write
65F0000
direct allocation
page read and write
2C1E000
heap
page read and write
3384000
heap
page read and write
4895000
heap
page read and write
49B9000
heap
page read and write
3500D000
stack
page read and write
4AC7000
heap
page read and write
4957000
heap
page read and write
4853000
heap
page read and write
450C000
heap
page read and write
57D0000
trusted library allocation
page read and write
4B54000
heap
page read and write
489E000
heap
page read and write
2B40000
heap
page read and write
487E000
heap
page read and write
4500000
heap
page read and write
2B4C000
heap
page read and write
3274000
stack
page read and write
22B0000
heap
page read and write
5170000
heap
page read and write
794000
heap
page read and write
6660000
direct allocation
page read and write
55F2000
heap
page read and write
46BF000
heap
page read and write
2A7B000
heap
page read and write
4926000
heap
page read and write
37E6000
heap
page read and write
4595000
heap
page read and write
359B0000
unclassified section
page execute and read and write
44FC000
heap
page read and write
66A0000
direct allocation
page read and write
55E3000
heap
page read and write
45BB000
heap
page read and write
484F000
heap
page read and write
37D0000
heap
page read and write
4035000
remote allocation
page execute and read and write
4B0E000
heap
page read and write
2B28000
heap
page read and write
4473000
heap
page read and write
55D1000
heap
page read and write
2A8A000
heap
page read and write
47F3000
heap
page read and write
4AE0000
heap
page read and write
3500B000
stack
page read and write
43A9000
heap
page read and write
55EC000
heap
page read and write
44F1000
heap
page read and write
3842000
heap
page read and write
2BB8000
heap
page read and write
4458000
heap
page read and write
2CB9000
heap
page read and write
3385000
heap
page read and write
55EF000
heap
page read and write
6630000
heap
page read and write
4AB8000
heap
page read and write
2C69000
heap
page read and write
2C71000
heap
page read and write
2A90000
heap
page read and write
2B06000
heap
page read and write
8E0000
heap
page read and write
2BC4000
heap
page read and write
2BB5000
heap
page read and write
4AD0000
heap
page read and write
446000
unkown
page read and write
3842000
heap
page read and write
466E000
heap
page read and write
4982000
heap
page read and write
4413000
heap
page read and write
469F000
stack
page read and write
4750000
heap
page read and write
44B3000
heap
page read and write
37D1000
heap
page read and write
4AFF000
heap
page read and write
4A0E000
heap
page read and write
2F6C000
stack
page read and write
4358000
heap
page read and write
2A13000
heap
page read and write
45A0000
heap
page read and write
4508000
heap
page read and write
2B9E000
heap
page read and write
4838000
heap
page read and write
37E6000
heap
page read and write
46B0000
heap
page read and write
2BA9000
heap
page read and write
2B86000
heap
page read and write
2CC0000
heap
page read and write
43C0000
heap
page read and write
4A16000
heap
page read and write
46BC000
heap
page read and write
3385000
heap
page read and write
4ABD000
heap
page read and write
7FF000
heap
page read and write
46A5000
heap
page read and write
4630000
heap
page read and write
55EF000
heap
page read and write
4A96000
heap
page read and write
29ED000
heap
page read and write
44A7000
heap
page read and write
2A40000
heap
page read and write
49EC000
heap
page read and write
37D0000
heap
page read and write
A84000
heap
page read and write
33D0000
heap
page read and write
4AAE000
heap
page read and write
2BAD000
heap
page read and write
45C000
system
page execute and read and write
352F1000
heap
page read and write
28BF000
stack
page read and write
325B000
stack
page read and write
55D0000
heap
page read and write
37E0000
heap
page read and write
497F000
heap
page read and write
2C2D000
heap
page read and write
44DA000
heap
page read and write
3842000
heap
page read and write
4403000
heap
page read and write
47E7000
heap
page read and write
4B12000
heap
page read and write
34F0C000
stack
page read and write
229E000
stack
page read and write
3864000
heap
page read and write
4672000
heap
page read and write
3842000
heap
page read and write
4A4E000
heap
page read and write
560000
heap
page read and write
4B87000
heap
page read and write
37E1000
heap
page read and write
4AB6000
heap
page read and write
4AC9000
heap
page read and write
409000
unkown
page write copy
4648000
heap
page read and write
4844000
heap
page read and write
4AAE000
heap
page read and write
32D0000
heap
page read and write
2C07000
heap
page read and write
47E3000
heap
page read and write
2B2A000
heap
page read and write
37E1000
heap
page read and write
469D000
heap
page read and write
37E0000
heap
page read and write
4A26000
heap
page read and write
49F0000
heap
page read and write
55F1000
heap
page read and write
4AF0000
heap
page read and write
2A57000
heap
page read and write
4F50000
direct allocation
page execute and read and write
35A51000
direct allocation
page execute and read and write
55EC000
heap
page read and write
4A41000
heap
page read and write
46C3000
heap
page read and write
49AE000
heap
page read and write
400000
system
page execute and read and write
2C8C000
heap
page read and write
4548000
heap
page read and write
6690000
direct allocation
page read and write
45A4000
heap
page read and write
43B2000
heap
page read and write
4B8F000
heap
page read and write
4A2A000
heap
page read and write
4A1D000
heap
page read and write
4A4C000
heap
page read and write
3815000
heap
page read and write
2B57000
heap
page read and write
354B4000
heap
page read and write
2B66000
heap
page read and write
879000
stack
page read and write
46C8000
heap
page read and write
34D00000
remote allocation
page read and write
3385000
heap
page read and write
458A000
heap
page read and write
55D1000
heap
page read and write
4A2E000
heap
page read and write
6650000
direct allocation
page read and write
49E4000
heap
page read and write
55F3000
heap
page read and write
55EF000
heap
page read and write
37F2000
heap
page read and write
43BC000
heap
page read and write
37D1000
heap
page read and write
3070000
heap
page read and write
3385000
heap
page read and write
4A3F000
heap
page read and write
93F000
stack
page read and write
4B41000
heap
page read and write
35664000
unclassified section
page execute and read and write
29DF000
heap
page read and write
4AC7000
heap
page read and write
483C000
heap
page read and write
3842000
heap
page read and write
49FB000
heap
page read and write
49C4000
heap
page read and write
2D10000
direct allocation
page read and write
3384000
heap
page read and write
22B5000
heap
page read and write
55EF000
heap
page read and write
352F1000
heap
page read and write
4891000
heap
page read and write
2A8E000
heap
page read and write
49CC000
heap
page read and write
57D0000
trusted library allocation
page read and write
55FA000
heap
page read and write
34A4E000
stack
page read and write
2B24000
heap
page read and write
445C000
heap
page read and write
784000
heap
page read and write
2B30000
heap
page read and write
2460000
direct allocation
page read and write
44B7000
heap
page read and write
55DB000
heap
page read and write
2BD8000
heap
page read and write
4A96000
heap
page read and write
443A000
heap
page read and write
34FF000
stack
page read and write
43C4000
heap
page read and write
55E0000
heap
page read and write
49DF000
heap
page read and write
2A50000
heap
page read and write
4AFB000
heap
page read and write
A84000
heap
page read and write
4B3D000
heap
page read and write
43B4000
heap
page read and write
29D8000
heap
page read and write
4A96000
heap
page read and write
351E0000
heap
page read and write
491E000
heap
page read and write
2C75000
heap
page read and write
There are 1076 hidden memdumps, click here to show them.