IOC Report
SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\ExternalUICleaner.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\New
MS Windows icon resource - 3 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\PrepareDlgProgress.gif
GIF image data, version 89a, 83 x 28
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\ProgressImage.png
PNG image data, 121 x 14, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\ShortcutFlags.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\Up
MS Windows icon resource - 3 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\applogoicon.bmp
PC bitmap, Windows 3.x format, 60 x 60 x 32, cbSize 14454, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\backbutton
PNG image data, 624 x 37, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\backbutton.xaml
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\background
PC bitmap, Windows 3.x format, 5 x 5 x 32, image size 100, resolution 3780 x 3780 px/m, cbSize 154, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\backgroundprepare
PC bitmap, Windows 3.x format, 5 x 5 x 32, image size 100, resolution 3780 x 3780 px/m, cbSize 154, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\backgroundsurface
PC bitmap, Windows 3.x format, 5 x 5 x 32, image size 100, resolution 3780 x 3780 px/m, cbSize 154, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\browsebutton
PNG image data, 168 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\browsebutton.xaml
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\checkbox
PNG image data, 192 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\checkbox_for_ctrls
PNG image data, 192 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\checkbox_for_list_ctrls
PNG image data, 32 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\cmdlinkarrow
MS Windows icon resource - 3 icons, 16x16, 16 colors, 4 bits/pixel, 16x16, 8 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\completi
MS Windows icon resource - 2 icons, 48x48, 8 bits/pixel, 48x48, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\custicon
MS Windows icon resource - 5 icons, 48x48, 8 bits/pixel, 32x32, 8 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\exclamic
PNG image data, 50 x 69, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_bottom_left.bmp
PC bitmap, Windows 3.x format, 1 x 3 x 24, image size 12, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_bottom_left_inactive.bmp
PC bitmap, Windows 3.x format, 1 x 3 x 24, image size 12, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_bottom_mid.bmp
PC bitmap, Windows 3.x format, 3 x 1 x 24, image size 12, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_bottom_mid_inactive.bmp
PC bitmap, Windows 3.x format, 3 x 1 x 24, image size 12, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_bottom_right.bmp
PC bitmap, Windows 3.x format, 1 x 3 x 24, image size 12, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_bottom_right_inactive.bmp
PC bitmap, Windows 3.x format, 1 x 3 x 24, image size 12, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_caption.bmp
PC bitmap, Windows 3.x format, 1 x 38 x 24, image size 152, resolution 3778 x 3778 px/m, cbSize 206, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_caption_inactive.bmp
PC bitmap, Windows 3.x format, 1 x 38 x 24, image size 152, resolution 3778 x 3778 px/m, cbSize 206, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_left.bmp
PC bitmap, Windows 3.x format, 1 x 3 x 24, image size 12, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_left_inactive.bmp
PC bitmap, Windows 3.x format, 1 x 3 x 24, image size 12, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_right.bmp
PC bitmap, Windows 3.x format, 1 x 3 x 24, image size 12, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_right_inactive.bmp
PC bitmap, Windows 3.x format, 1 x 3 x 24, image size 12, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_top_left.bmp
PC bitmap, Windows 3.x format, 1 x 25 x 24, image size 100, resolution 2835 x 2835 px/m, cbSize 154, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_top_left_inactive.bmp
PC bitmap, Windows 3.x format, 1 x 25 x 24, image size 100, resolution 2835 x 2835 px/m, cbSize 154, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_top_mid.bmp
PC bitmap, Windows 3.x format, 3 x 1 x 24, image size 12, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_top_mid_inactive.bmp
PC bitmap, Windows 3.x format, 3 x 1 x 24, image size 12, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_top_right.bmp
PC bitmap, Windows 3.x format, 1 x 25 x 24, image size 100, resolution 2835 x 2835 px/m, cbSize 154, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_top_right_inactive.bmp
PC bitmap, Windows 3.x format, 1 x 25 x 24, image size 100, resolution 2835 x 2835 px/m, cbSize 154, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\info
PNG image data, 50 x 69, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\installlogoicon
MS Windows icon resource - 5 icons, 48x48, 16 colors, 4 bits/pixel, 48x48, 8 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\insticon
MS Windows icon resource - 3 icons, 48x48, 16 colors, 4 bits/pixel, 48x48, 8 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\lzmaextractor.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\metrobuttonimage
PNG image data, 624 x 37, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\metrobuttonimage.xaml
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\metroinstallbutton
PNG image data, 1020 x 54, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\metroinstallbutton.xaml
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\metrorunapplicationbutton
PNG image data, 732 x 163, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\metrorunapplicationbutton.xaml
ASCII text, with very long lines (373), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\modify.png
PNG image data, 732 x 163, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\modify.png.xaml
ASCII text, with very long lines (383), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\nextcancelbuttons
PNG image data, 624 x 37, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\nextcancelbuttons.xaml
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\optionslogoicon
MS Windows icon resource - 3 icons, 48x48, 8 bits/pixel, 48x48, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\print.png
PNG image data, 222 x 37, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\print.png.xaml
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\printico
MS Windows icon resource - 2 icons, 32x32, 8 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\remove.png
PNG image data, 732 x 163, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\remove.png.xaml
ASCII text, with very long lines (379), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\removico
MS Windows icon resource - 5 icons, 48x48, 16 colors, 4 bits/pixel, 48x48, 8 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\repair.png
PNG image data, 732 x 163, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\repair.png.xaml
ASCII text, with very long lines (584), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\repairic
MS Windows icon resource - 4 icons, 48x48, 8 bits/pixel, 32x32, 8 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\runapplicationbutton
PNG image data, 432 x 72, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\sys_close_down.png
PNG image data, 28 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\sys_close_hot.png
PNG image data, 28 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\sys_close_inactive.png
PNG image data, 28 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\sys_close_normal.png
PNG image data, 28 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\sys_min_down.png
PNG image data, 28 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\sys_min_hot.png
PNG image data, 28 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\sys_min_inactive.png
PNG image data, 28 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\sys_min_normal.png
PNG image data, 28 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\viewreadmebutton
PNG image data, 732 x 163, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\viewreadmebutton.xaml
ASCII text, with very long lines (387), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\waitlogoicon
MS Windows icon resource - 2 icons, 48x48, 8 bits/pixel, 48x48, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\whitebackground
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 400x300, components 3
dropped
C:\Users\user\AppData\Local\Temp\MSI772.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI7F0.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI82F.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI850.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI870.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI880.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI8A1.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI92E.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIB14.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIB53.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\shi55E.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Outlook 24.9\install\550CEA2\?? 02 - ??.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 936, Revision Number: {D50A0C29-3B68-4483-AA7D-3507B07E5BB7}, Number of Words: 0, Subject: Outlook, Author: Microsoft, Name of Creating Application: Outlook, Template: ;2052, Comments: Outlook , Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Thu Jan 25 08:08:36 2024, Number of Pages: 200
dropped
C:\Users\user\AppData\Roaming\Microsoft\Outlook 24.9\install\550CEA2\?? 02 - ??.x64.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 936, Revision Number: {04B12AD4-B137-456D-BCD0-722D8223EA45}, Number of Words: 0, Subject: Outlook, Author: Microsoft, Name of Creating Application: Outlook, Template: x64;2052, Comments: Outlook , Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Thu Jan 25 08:08:37 2024, Number of Pages: 200
dropped
C:\Users\user\AppData\Roaming\Microsoft\Outlook 24.9\install\holder0.aiph
data
dropped
There are 81 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe"
malicious
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 0E4E2BFC58A5D03AC826880BF5326FF0 C

URLs

Name
IP
Malicious
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
unknown
http://html4/loose.dtd
unknown
http://ocsp.sectigo.com00
unknown
https://sectigo.com/CPS0
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
http://.css
unknown
http://.jpg
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349
Blob

Memdumps

Base Address
Regiontype
Protect
Malicious
C63000
heap
page read and write
577B000
heap
page read and write
577D000
heap
page read and write
56BF000
heap
page read and write
577D000
heap
page read and write
577D000
heap
page read and write
572A000
heap
page read and write
5726000
heap
page read and write
3EB1000
heap
page read and write
5760000
heap
page read and write
5735000
heap
page read and write
5726000
heap
page read and write
56D8000
heap
page read and write
577D000
heap
page read and write
C57000
heap
page read and write
CE0000
heap
page read and write
AD0000
heap
page read and write
56E0000
heap
page read and write
5BD0000
heap
page read and write
5731000
heap
page read and write
56D8000
heap
page read and write
C6C000
heap
page read and write
56BC000
heap
page read and write
3EA1000
heap
page read and write
577D000
heap
page read and write
577D000
heap
page read and write
56C3000
heap
page read and write
56CB000
heap
page read and write
5970000
trusted library allocation
page read and write
5760000
heap
page read and write
2D20000
heap
page read and write
5759000
heap
page read and write
577B000
heap
page read and write
56BF000
heap
page read and write
56E0000
heap
page read and write
3EAA000
heap
page read and write
5971000
trusted library allocation
page read and write
575D000
heap
page read and write
56B3000
heap
page read and write
575D000
heap
page read and write
5971000
trusted library allocation
page read and write
C83000
heap
page read and write
56B6000
heap
page read and write
56CB000
heap
page read and write
3E71000
heap
page read and write
56BF000
heap
page read and write
3EA2000
heap
page read and write
56DC000
heap
page read and write
577B000
heap
page read and write
3E9E000
heap
page read and write
5731000
heap
page read and write
577B000
heap
page read and write
574C000
heap
page read and write
5759000
heap
page read and write
5BEE000
heap
page read and write
CCB000
heap
page read and write
577B000
heap
page read and write
BD0000
heap
page read and write
1178000
unkown
page write copy
5726000
heap
page read and write
31AE000
stack
page read and write
5BF6000
heap
page read and write
56DC000
heap
page read and write
54A0000
unkown
page readonly
56C3000
heap
page read and write
5735000
heap
page read and write
56AD000
heap
page read and write
10E9000
unkown
page readonly
56AD000
heap
page read and write
572A000
heap
page read and write
5760000
heap
page read and write
577D000
heap
page read and write
3EC7000
heap
page read and write
31FE000
stack
page read and write
5749000
heap
page read and write
577D000
heap
page read and write
577B000
heap
page read and write
577B000
heap
page read and write
5430000
unkown
page readonly
E80000
unkown
page readonly
577B000
heap
page read and write
408C000
stack
page read and write
56BC000
heap
page read and write
56CB000
heap
page read and write
2D2A000
heap
page read and write
CE3000
heap
page read and write
5460000
unkown
page readonly
5735000
heap
page read and write
574C000
heap
page read and write
577D000
heap
page read and write
5F90000
trusted library section
page read and write
56BC000
heap
page read and write
5726000
heap
page read and write
56AD000
heap
page read and write
575D000
heap
page read and write
577B000
heap
page read and write
56CB000
heap
page read and write
5731000
heap
page read and write
574C000
heap
page read and write
6390000
unkown
page readonly
56E0000
heap
page read and write
E50000
heap
page read and write
5500000
unkown
page readonly
117A000
unkown
page write copy
56B2000
heap
page read and write
577B000
heap
page read and write
577D000
heap
page read and write
56C3000
heap
page read and write
577B000
heap
page read and write
56BC000
heap
page read and write
67A0000
trusted library allocation
page read and write
CAA000
heap
page read and write
5971000
trusted library allocation
page read and write
418D000
stack
page read and write
32FF000
stack
page read and write
56DC000
heap
page read and write
5731000
heap
page read and write
5C18000
heap
page read and write
575D000
heap
page read and write
577B000
heap
page read and write
CCB000
heap
page read and write
574C000
heap
page read and write
5749000
heap
page read and write
574C000
heap
page read and write
5BCF000
stack
page read and write
56D8000
heap
page read and write
56AD000
heap
page read and write
5735000
heap
page read and write
576A000
heap
page read and write
5970000
trusted library allocation
page read and write
C97000
heap
page read and write
56D8000
heap
page read and write
577B000
heap
page read and write
575D000
heap
page read and write
B9B000
heap
page read and write
117B000
unkown
page read and write
C9B000
heap
page read and write
5C0B000
heap
page read and write
5735000
heap
page read and write
5726000
heap
page read and write
5971000
trusted library allocation
page read and write
5760000
heap
page read and write
572A000
heap
page read and write
CB7000
heap
page read and write
577D000
heap
page read and write
5971000
trusted library allocation
page read and write
56B2000
heap
page read and write
56AB000
heap
page read and write
2B7D000
stack
page read and write
56C3000
heap
page read and write
C83000
heap
page read and write
577D000
heap
page read and write
5759000
heap
page read and write
5ACE000
stack
page read and write
5760000
heap
page read and write
56D8000
heap
page read and write
56CB000
heap
page read and write
3E9E000
heap
page read and write
575D000
heap
page read and write
577B000
heap
page read and write
5749000
heap
page read and write
5759000
heap
page read and write
577B000
heap
page read and write
5971000
trusted library allocation
page read and write
577D000
heap
page read and write
577D000
heap
page read and write
572A000
heap
page read and write
575D000
heap
page read and write
887000
stack
page read and write
2BA0000
heap
page read and write
56C3000
heap
page read and write
577D000
heap
page read and write
5749000
heap
page read and write
56C3000
heap
page read and write
1178000
unkown
page read and write
5971000
trusted library allocation
page read and write
577D000
heap
page read and write
10E9000
unkown
page readonly
5C0B000
heap
page read and write
56D8000
heap
page read and write
5760000
heap
page read and write
56DC000
heap
page read and write
56AD000
heap
page read and write
56E0000
heap
page read and write
577B000
heap
page read and write
3E95000
heap
page read and write
5C03000
heap
page read and write
30AB000
stack
page read and write
577D000
heap
page read and write
5760000
heap
page read and write
577D000
heap
page read and write
CE0000
heap
page read and write
5971000
trusted library allocation
page read and write
56E0000
heap
page read and write
C5B000
heap
page read and write
5F95000
trusted library section
page read and write
C5B000
heap
page read and write
56CB000
heap
page read and write
56B4000
heap
page read and write
56B3000
heap
page read and write
5760000
heap
page read and write
577B000
heap
page read and write
5759000
heap
page read and write
3ED0000
heap
page read and write
577B000
heap
page read and write
56E0000
heap
page read and write
56AD000
heap
page read and write
575D000
heap
page read and write
572A000
heap
page read and write
2BEE000
stack
page read and write
577D000
heap
page read and write
56BC000
heap
page read and write
6CA1000
heap
page read and write
576A000
heap
page read and write
3DBF000
stack
page read and write
5760000
heap
page read and write
5760000
heap
page read and write
577D000
heap
page read and write
56C3000
heap
page read and write
572A000
heap
page read and write
5C08000
heap
page read and write
3EE8000
heap
page read and write
5971000
trusted library allocation
page read and write
577B000
heap
page read and write
5726000
heap
page read and write
5760000
heap
page read and write
577D000
heap
page read and write
577D000
heap
page read and write
5785000
heap
page read and write
577D000
heap
page read and write
56AD000
heap
page read and write
56BF000
heap
page read and write
56B6000
heap
page read and write
5C0E000
heap
page read and write
5C04000
heap
page read and write
577D000
heap
page read and write
575D000
heap
page read and write
CCB000
heap
page read and write
2CEE000
stack
page read and write
9F0000
heap
page read and write
56B3000
heap
page read and write
56AD000
heap
page read and write
3E84000
heap
page read and write
577B000
heap
page read and write
576A000
heap
page read and write
5760000
heap
page read and write
56AB000
heap
page read and write
56BC000
heap
page read and write
5759000
heap
page read and write
3E10000
heap
page read and write
577D000
heap
page read and write
3EA4000
heap
page read and write
572A000
heap
page read and write
5971000
trusted library allocation
page read and write
576A000
heap
page read and write
5420000
unkown
page readonly
56D8000
heap
page read and write
56B3000
heap
page read and write
56E0000
heap
page read and write
5490000
unkown
page readonly
56DC000
heap
page read and write
5726000
heap
page read and write
C5B000
heap
page read and write
98A000
stack
page read and write
56BF000
heap
page read and write
541B000
heap
page read and write
5735000
heap
page read and write
577B000
heap
page read and write
575D000
heap
page read and write
577D000
heap
page read and write
56CB000
heap
page read and write
572A000
heap
page read and write
3E9B000
heap
page read and write
5760000
heap
page read and write
56BC000
heap
page read and write
56B4000
heap
page read and write
574C000
heap
page read and write
56B2000
heap
page read and write
574C000
heap
page read and write
CE8000
heap
page read and write
577D000
heap
page read and write
5760000
heap
page read and write
577D000
heap
page read and write
5749000
heap
page read and write
577B000
heap
page read and write
577D000
heap
page read and write
5760000
heap
page read and write
5971000
trusted library allocation
page read and write
575C000
heap
page read and write
577B000
heap
page read and write
56C3000
heap
page read and write
5760000
heap
page read and write
56AD000
heap
page read and write
C66000
heap
page read and write
5731000
heap
page read and write
5760000
heap
page read and write
3EBF000
heap
page read and write
572A000
heap
page read and write
5760000
heap
page read and write
5749000
heap
page read and write
575D000
heap
page read and write
56E0000
heap
page read and write
5971000
trusted library allocation
page read and write
577D000
heap
page read and write
5BFB000
heap
page read and write
56AC000
heap
page read and write
C8D000
heap
page read and write
C58000
heap
page read and write
5510000
unkown
page readonly
C39000
heap
page read and write
5735000
heap
page read and write
56CB000
heap
page read and write
56CB000
heap
page read and write
5735000
heap
page read and write
575D000
heap
page read and write
575D000
heap
page read and write
CD3000
heap
page read and write
5970000
trusted library allocation
page read and write
3E0C000
stack
page read and write
577D000
heap
page read and write
5759000
heap
page read and write
56AB000
heap
page read and write
5731000
heap
page read and write
5726000
heap
page read and write
575D000
heap
page read and write
56CB000
heap
page read and write
577B000
heap
page read and write
577B000
heap
page read and write
56D8000
heap
page read and write
5759000
heap
page read and write
CCD000
heap
page read and write
B95000
heap
page read and write
56AD000
heap
page read and write
576A000
heap
page read and write
577B000
heap
page read and write
56B4000
heap
page read and write
C37000
heap
page read and write
56CB000
heap
page read and write
5735000
heap
page read and write
5760000
heap
page read and write
56D8000
heap
page read and write
C57000
heap
page read and write
5735000
heap
page read and write
56B4000
heap
page read and write
E3C000
stack
page read and write
56BC000
heap
page read and write
C92000
heap
page read and write
56BF000
heap
page read and write
577D000
heap
page read and write
5735000
heap
page read and write
56D8000
heap
page read and write
56BF000
heap
page read and write
5410000
direct allocation
page read and write
577B000
heap
page read and write
5760000
heap
page read and write
C6C000
heap
page read and write
5726000
heap
page read and write
577B000
heap
page read and write
5760000
heap
page read and write
56D8000
heap
page read and write
3E59000
heap
page read and write
577B000
heap
page read and write
56AF000
heap
page read and write
5731000
heap
page read and write
3EC7000
heap
page read and write
CAF000
heap
page read and write
5760000
heap
page read and write
5C05000
heap
page read and write
576A000
heap
page read and write
5970000
trusted library allocation
page read and write
5450000
unkown
page readonly
5C12000
heap
page read and write
56DC000
heap
page read and write
56BF000
heap
page read and write
5749000
heap
page read and write
3480000
trusted library allocation
page read and write
577D000
heap
page read and write
56BF000
heap
page read and write
5760000
heap
page read and write
577D000
heap
page read and write
577D000
heap
page read and write
C44000
heap
page read and write
5BF8000
heap
page read and write
577B000
heap
page read and write
574C000
heap
page read and write
56AD000
heap
page read and write
5726000
heap
page read and write
5731000
heap
page read and write
CCB000
heap
page read and write
577D000
heap
page read and write
56E0000
heap
page read and write
574C000
heap
page read and write
56AC000
heap
page read and write
5760000
heap
page read and write
C66000
heap
page read and write
5749000
heap
page read and write
56B4000
heap
page read and write
2BA4000
heap
page read and write
3E97000
heap
page read and write
3EBE000
heap
page read and write
3EBE000
heap
page read and write
577B000
heap
page read and write
56D8000
heap
page read and write
5BF1000
heap
page read and write
5759000
heap
page read and write
56BC000
heap
page read and write
56BC000
heap
page read and write
577B000
heap
page read and write
C5B000
heap
page read and write
56B4000
heap
page read and write
3EBE000
heap
page read and write
56D8000
heap
page read and write
3EC7000
heap
page read and write
577B000
heap
page read and write
5759000
heap
page read and write
577D000
heap
page read and write
575D000
heap
page read and write
5760000
heap
page read and write
5735000
heap
page read and write
5731000
heap
page read and write
5731000
heap
page read and write
576A000
heap
page read and write
56BF000
heap
page read and write
56B3000
heap
page read and write
568D000
stack
page read and write
56BC000
heap
page read and write
56CB000
heap
page read and write
5760000
heap
page read and write
56B4000
heap
page read and write
56DC000
heap
page read and write
56D8000
heap
page read and write
56C3000
heap
page read and write
54D0000
heap
page read and write
56A9000
heap
page read and write
5759000
heap
page read and write
5749000
heap
page read and write
56AD000
heap
page read and write
5731000
heap
page read and write
56B4000
heap
page read and write
6CA8000
heap
page read and write
5971000
trusted library allocation
page read and write
574C000
heap
page read and write
CDD000
heap
page read and write
5759000
heap
page read and write
5760000
heap
page read and write
577D000
heap
page read and write
56C3000
heap
page read and write
575D000
heap
page read and write
575D000
heap
page read and write
5759000
heap
page read and write
577D000
heap
page read and write
577D000
heap
page read and write
3E9A000
heap
page read and write
5726000
heap
page read and write
577D000
heap
page read and write
558C000
stack
page read and write
577B000
heap
page read and write
577D000
heap
page read and write
5760000
heap
page read and write
577B000
heap
page read and write
56B6000
heap
page read and write
5760000
heap
page read and write
577B000
heap
page read and write
5C1A000
heap
page read and write
5410000
unkown
page readonly
5760000
heap
page read and write
400B000
stack
page read and write
56DC000
heap
page read and write
5726000
heap
page read and write
5735000
heap
page read and write
1186000
unkown
page readonly
5760000
heap
page read and write
3E9A000
heap
page read and write
6CA0000
heap
page read and write
C6D000
heap
page read and write
56B4000
heap
page read and write
B90000
heap
page read and write
56BF000
heap
page read and write
5970000
trusted library allocation
page read and write
577B000
heap
page read and write
575D000
heap
page read and write
56CB000
heap
page read and write
56AF000
heap
page read and write
56E0000
heap
page read and write
572A000
heap
page read and write
574C000
heap
page read and write
5760000
heap
page read and write
5C12000
heap
page read and write
5C0F000
heap
page read and write
577D000
heap
page read and write
5749000
heap
page read and write
5731000
heap
page read and write
3E50000
heap
page read and write
5760000
heap
page read and write
5440000
unkown
page readonly
5C12000
heap
page read and write
3EBE000
heap
page read and write
577D000
heap
page read and write
56CB000
heap
page read and write
CAC000
heap
page read and write
5731000
heap
page read and write
576A000
heap
page read and write
5C17000
heap
page read and write
5760000
heap
page read and write
2B90000
heap
page read and write
C91000
heap
page read and write
5760000
heap
page read and write
33F0000
heap
page read and write
574C000
heap
page read and write
575D000
heap
page read and write
5760000
heap
page read and write
5760000
heap
page read and write
56AF000
heap
page read and write
5760000
heap
page read and write
5C0E000
heap
page read and write
572A000
heap
page read and write
5759000
heap
page read and write
577D000
heap
page read and write
5C1E000
heap
page read and write
577B000
heap
page read and write
56E0000
heap
page read and write
56C3000
heap
page read and write
B30000
heap
page read and write
3EA2000
heap
page read and write
56C3000
heap
page read and write
577B000
heap
page read and write
6680000
heap
page read and write
5749000
heap
page read and write
577B000
heap
page read and write
5726000
heap
page read and write
56B2000
heap
page read and write
56BC000
heap
page read and write
56BC000
heap
page read and write
1186000
unkown
page readonly
3E7F000
heap
page read and write
56B2000
heap
page read and write
56E0000
heap
page read and write
56AD000
heap
page read and write
572A000
heap
page read and write
577B000
heap
page read and write
5768000
heap
page read and write
576A000
heap
page read and write
56B4000
heap
page read and write
3E9E000
heap
page read and write
56DC000
heap
page read and write
5760000
heap
page read and write
56E0000
heap
page read and write
C7A000
heap
page read and write
56DC000
heap
page read and write
56DC000
heap
page read and write
577D000
heap
page read and write
577D000
heap
page read and write
575D000
heap
page read and write
577B000
heap
page read and write
56AD000
heap
page read and write
572A000
heap
page read and write
574C000
heap
page read and write
575D000
heap
page read and write
5971000
trusted library allocation
page read and write
BFA000
heap
page read and write
5726000
heap
page read and write
56BF000
heap
page read and write
575D000
heap
page read and write
5971000
trusted library allocation
page read and write
577B000
heap
page read and write
576A000
heap
page read and write
575D000
heap
page read and write
CE0000
heap
page read and write
5410000
direct allocation
page read and write
5C0E000
heap
page read and write
56BF000
heap
page read and write
56DC000
heap
page read and write
5735000
heap
page read and write
575D000
heap
page read and write
5470000
unkown
page readonly
577B000
heap
page read and write
CD4000
heap
page read and write
56DC000
heap
page read and write
56DC000
heap
page read and write
577B000
heap
page read and write
575D000
heap
page read and write
56B4000
heap
page read and write
577D000
heap
page read and write
B36000
heap
page read and write
5760000
heap
page read and write
56BC000
heap
page read and write
56D8000
heap
page read and write
577B000
heap
page read and write
5760000
heap
page read and write
5760000
heap
page read and write
5970000
trusted library allocation
page read and write
575D000
heap
page read and write
5760000
heap
page read and write
3E6E000
heap
page read and write
5C12000
heap
page read and write
5731000
heap
page read and write
577B000
heap
page read and write
CCC000
heap
page read and write
572A000
heap
page read and write
5749000
heap
page read and write
5735000
heap
page read and write
577B000
heap
page read and write
5760000
heap
page read and write
5690000
heap
page read and write
5760000
heap
page read and write
576A000
heap
page read and write
5971000
trusted library allocation
page read and write
3EA5000
heap
page read and write
5C0E000
heap
page read and write
577B000
heap
page read and write
574C000
heap
page read and write
56C3000
heap
page read and write
56B4000
heap
page read and write
56AB000
heap
page read and write
E81000
unkown
page execute read
5749000
heap
page read and write
5C0B000
heap
page read and write
575D000
heap
page read and write
5BFD000
heap
page read and write
56BF000
heap
page read and write
56BF000
heap
page read and write
577B000
heap
page read and write
5760000
heap
page read and write
5760000
heap
page read and write
56B4000
heap
page read and write
5749000
heap
page read and write
5971000
trusted library allocation
page read and write
56B4000
heap
page read and write
3CBE000
stack
page read and write
5C12000
heap
page read and write
56B6000
heap
page read and write
575D000
heap
page read and write
3E11000
heap
page read and write
56AD000
heap
page read and write
574C000
heap
page read and write
CD1000
heap
page read and write
56E0000
heap
page read and write
CE2000
heap
page read and write
5BE7000
heap
page read and write
577B000
heap
page read and write
CD1000
heap
page read and write
5726000
heap
page read and write
5760000
heap
page read and write
577D000
heap
page read and write
3E8A000
heap
page read and write
5760000
heap
page read and write
56C3000
heap
page read and write
C92000
heap
page read and write
CE0000
heap
page read and write
577B000
heap
page read and write
577D000
heap
page read and write
576A000
heap
page read and write
5760000
heap
page read and write
5971000
trusted library allocation
page read and write
5749000
heap
page read and write
5C07000
heap
page read and write
575D000
heap
page read and write
56B4000
heap
page read and write
CDD000
heap
page read and write
3C80000
direct allocation
page read and write
575D000
heap
page read and write
C5C000
heap
page read and write
577D000
heap
page read and write
56CB000
heap
page read and write
BF0000
heap
page read and write
56BC000
heap
page read and write
56DC000
heap
page read and write
3EC7000
heap
page read and write
5760000
heap
page read and write
576A000
heap
page read and write
56AD000
heap
page read and write
575D000
heap
page read and write
5C14000
heap
page read and write
5C0B000
heap
page read and write
56C3000
heap
page read and write
577D000
heap
page read and write
56E0000
heap
page read and write
577B000
heap
page read and write
E80000
unkown
page readonly
5760000
heap
page read and write
5759000
heap
page read and write
56AD000
heap
page read and write
5480000
unkown
page readonly
5C11000
heap
page read and write
E81000
unkown
page execute read
5731000
heap
page read and write
56B3000
heap
page read and write
572A000
heap
page read and write
There are 678 hidden memdumps, click here to show them.