IOC Report
SecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\directory\name.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\finitism
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exe
"C:\Users\user\Desktop\SecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exe"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\Desktop\SecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\SecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious

URLs

Name
IP
Malicious
http://aborters.duckdns.org:8081
unknown
malicious
http://anotherarmy.dns.army:8081
unknown
malicious
https://www.office.com/
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:648351%0D%0ADate%20a
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot
unknown
http://us2.smtp.mailhostbox.com
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:648351%0D%0ADate%20and%20Time:%2026/09/2024%20/%2002:40:59%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20648351%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://www.office.com/lB
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:648351%0D%0ADate%20and%20Time:%2025/09/2024%20/%2023:33:07%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20648351%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.97.3
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
http://varders.kozow.com:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://checkip.dyndns.org/
132.226.247.73
http://51.38.247.67:8081/_send_.php?L
unknown
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://checkip.dyndns.org/q
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://reallyfreegeoip.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
us2.smtp.mailhostbox.com
208.91.199.225
malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
132.226.247.73

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
208.91.199.225
us2.smtp.mailhostbox.com
United States
malicious
158.101.44.242
unknown
United States
132.226.247.73
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3850000
direct allocation
page read and write
malicious
2521000
trusted library allocation
page read and write
malicious
2CC1000
trusted library allocation
page read and write
malicious
269C000
trusted library allocation
page read and write
malicious
3C00000
direct allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
2DFA000
trusted library allocation
page read and write
malicious
3D4B000
trusted library allocation
page read and write
51C0000
trusted library allocation
page read and write
400E000
heap
page read and write
3F4E000
heap
page read and write
3F2E000
heap
page read and write
381C000
trusted library allocation
page read and write
4AB000
unkown
page readonly
4DBE000
stack
page read and write
48AE000
direct allocation
page read and write
400E000
heap
page read and write
3ED1000
heap
page read and write
492000
unkown
page read and write
29AD000
trusted library allocation
page execute and read and write
11E0000
heap
page read and write
4061000
trusted library allocation
page read and write
4AB000
unkown
page readonly
24DE000
trusted library allocation
page read and write
2300000
trusted library allocation
page read and write
5170000
heap
page execute and read and write
10D0000
heap
page read and write
48FD000
direct allocation
page read and write
3F91000
heap
page read and write
24F1000
trusted library allocation
page read and write
3E9D000
heap
page read and write
621B000
heap
page read and write
400000
system
page execute and read and write
490000
unkown
page read and write
3F4E000
heap
page read and write
25CA000
trusted library allocation
page read and write
400E000
heap
page read and write
2E80000
heap
page read and write
2BA6000
trusted library allocation
page read and write
4055000
trusted library allocation
page read and write
621D000
heap
page read and write
3F1D000
heap
page read and write
3549000
trusted library allocation
page read and write
E85000
heap
page read and write
5D7F000
stack
page read and write
6670000
trusted library allocation
page execute and read and write
400E000
heap
page read and write
4753000
direct allocation
page read and write
61C0000
heap
page read and write
3ED1000
heap
page read and write
5F35000
trusted library allocation
page read and write
9AE000
stack
page read and write
6640000
trusted library allocation
page read and write
35A4000
trusted library allocation
page read and write
5F40000
trusted library allocation
page read and write
2D6B000
trusted library allocation
page read and write
48F9000
direct allocation
page read and write
3B0F000
stack
page read and write
657B1FE000
stack
page read and write
2ECC000
heap
page read and write
590000
trusted library allocation
page read and write
47D0000
direct allocation
page read and write
4083000
heap
page read and write
3594000
trusted library allocation
page read and write
2EA5000
trusted library allocation
page read and write
10C0000
trusted library allocation
page read and write
2D31000
trusted library allocation
page read and write
2FAB000
trusted library allocation
page read and write
25DA000
trusted library allocation
page read and write
3ED1000
heap
page read and write
100000
heap
page read and write
29B2000
trusted library allocation
page read and write
20C82D20000
heap
page read and write
2705000
trusted library allocation
page read and write
BA000
stack
page read and write
5786000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
5E80000
trusted library allocation
page read and write
400E000
heap
page read and write
3F91000
heap
page read and write
61CF000
heap
page read and write
5F30000
trusted library allocation
page read and write
A40000
heap
page read and write
401000
unkown
page execute read
57EE000
stack
page read and write
3F91000
heap
page read and write
2F44000
trusted library allocation
page read and write
3F4E000
heap
page read and write
26D2000
trusted library allocation
page read and write
3F91000
heap
page read and write
2310000
trusted library allocation
page read and write
2D73000
trusted library allocation
page read and write
5D80000
trusted library allocation
page read and write
48AE000
direct allocation
page read and write
D78000
heap
page read and write
3F91000
heap
page read and write
4839000
direct allocation
page read and write
40AB000
trusted library allocation
page read and write
B80000
direct allocation
page read and write
20C811DC000
heap
page read and write
3D8F000
stack
page read and write
3CE9000
trusted library allocation
page read and write
4753000
direct allocation
page read and write
2E16000
trusted library allocation
page read and write
48FD000
direct allocation
page read and write
D9A000
heap
page read and write
3FFE000
heap
page read and write
3704000
trusted library allocation
page read and write
400E000
heap
page read and write
9A000
stack
page read and write
2F7A000
trusted library allocation
page read and write
2FC6000
trusted library allocation
page read and write
400E000
heap
page read and write
3F4E000
heap
page read and write
4398000
heap
page read and write
400E000
heap
page read and write
4083000
heap
page read and write
540000
trusted library allocation
page execute and read and write
5C0000
heap
page read and write
A40000
heap
page read and write
3940000
trusted library allocation
page read and write
2B6B000
trusted library allocation
page read and write
D20000
trusted library allocation
page read and write
E0000
heap
page read and write
3F91000
heap
page read and write
1A0000
heap
page read and write
496E000
direct allocation
page read and write
3F91000
heap
page read and write
482000
unkown
page readonly
400E000
heap
page read and write
3ED1000
heap
page read and write
5DA0000
trusted library allocation
page read and write
3FEC000
heap
page read and write
3CC1000
trusted library allocation
page read and write
676E000
stack
page read and write
496E000
direct allocation
page read and write
2F3B000
trusted library allocation
page read and write
3F9B000
trusted library allocation
page read and write
401000
unkown
page execute read
D40000
trusted library allocation
page read and write
47D0000
direct allocation
page read and write
3E8F000
heap
page read and write
400000
unkown
page readonly
3E9A000
heap
page read and write
7B0000
trusted library allocation
page read and write
3DD1000
trusted library allocation
page read and write
491000
unkown
page write copy
3E98000
heap
page read and write
5ABE000
stack
page read and write
482000
unkown
page readonly
27CD000
trusted library allocation
page read and write
2F11000
trusted library allocation
page read and write
20C811FB000
heap
page read and write
3EE2000
trusted library allocation
page read and write
392A000
trusted library allocation
page read and write
3B1B000
heap
page read and write
3F91000
heap
page read and write
2604000
trusted library allocation
page read and write
3ED1000
heap
page read and write
29B6000
trusted library allocation
page execute and read and write
3EBD000
heap
page read and write
400E000
heap
page read and write
6BFE000
stack
page read and write
3888000
trusted library allocation
page read and write
3F91000
heap
page read and write
3F74000
heap
page read and write
3E58000
heap
page read and write
4570000
direct allocation
page read and write
3ED1000
heap
page read and write
2D5F000
trusted library allocation
page read and write
20C8157E000
heap
page read and write
5BA000
trusted library allocation
page execute and read and write
3F4E000
heap
page read and write
3F4E000
heap
page read and write
400E000
heap
page read and write
38DE000
trusted library allocation
page read and write
48F9000
direct allocation
page read and write
400E000
heap
page read and write
4006000
heap
page read and write
491000
unkown
page write copy
2EC0000
direct allocation
page read and write
400E000
heap
page read and write
3F8C000
trusted library allocation
page read and write
2EB0000
heap
page read and write
3F4E000
heap
page read and write
3F2C000
heap
page read and write
4693000
direct allocation
page read and write
29E0000
trusted library allocation
page read and write
60BE000
stack
page read and write
3FDB000
heap
page read and write
3F91000
heap
page read and write
400E000
heap
page read and write
5DAD000
trusted library allocation
page read and write
6690000
trusted library allocation
page execute and read and write
61BE000
stack
page read and write
405C000
trusted library allocation
page read and write
400E000
heap
page read and write
3F91000
heap
page read and write
20C811B8000
heap
page read and write
3F91000
heap
page read and write
3FC4000
heap
page read and write
3F90000
heap
page read and write
3F91000
heap
page read and write
2510000
heap
page execute and read and write
400000
unkown
page readonly
3F91000
heap
page read and write
B9A000
heap
page read and write
5EF0000
trusted library allocation
page execute and read and write
3ADF000
stack
page read and write
A6D000
heap
page read and write
2D0F000
trusted library allocation
page read and write
400E000
heap
page read and write
400E000
heap
page read and write
3ED1000
heap
page read and write
3F91000
heap
page read and write
3EB8000
trusted library allocation
page read and write
DA8000
heap
page read and write
400E000
heap
page read and write
400E000
heap
page read and write
3C90000
heap
page read and write
3F1E000
heap
page read and write
390A000
trusted library allocation
page read and write
295F000
trusted library allocation
page read and write
3F4D000
heap
page read and write
66C0000
trusted library allocation
page execute and read and write
400E000
heap
page read and write
657B0FA000
stack
page read and write
400C000
heap
page read and write
400E000
heap
page read and write
400E000
heap
page read and write
3F4E000
heap
page read and write
400D000
heap
page read and write
400E000
heap
page read and write
400E000
heap
page read and write
3F91000
heap
page read and write
9A0000
heap
page read and write
2D67000
trusted library allocation
page read and write
3F4E000
heap
page read and write
4693000
direct allocation
page read and write
3EB8000
heap
page read and write
5A2E000
stack
page read and write
400E000
heap
page read and write
2E70000
trusted library allocation
page read and write
66B0000
trusted library allocation
page execute and read and write
3EE6000
trusted library allocation
page read and write
1B7000
stack
page read and write
3F91000
heap
page read and write
657B8FE000
stack
page read and write
3F4E000
heap
page read and write
5EE4000
trusted library allocation
page read and write
400E000
heap
page read and write
3E93000
heap
page read and write
272E000
trusted library allocation
page read and write
3EB3000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
408B000
heap
page read and write
3D35000
trusted library allocation
page read and write
3F4E000
heap
page read and write
400E000
heap
page read and write
4753000
direct allocation
page read and write
2502000
trusted library allocation
page read and write
483D000
direct allocation
page read and write
3F91000
heap
page read and write
3F4F000
heap
page read and write
4753000
direct allocation
page read and write
279B000
trusted library allocation
page read and write
4630000
direct allocation
page read and write
3F4E000
heap
page read and write
3ED1000
heap
page read and write
48FD000
direct allocation
page read and write
48FD000
direct allocation
page read and write
3F91000
heap
page read and write
653E000
stack
page read and write
3C02000
heap
page read and write
400E000
heap
page read and write
3ED1000
heap
page read and write
400E000
heap
page read and write
3F91000
heap
page read and write
3F4E000
heap
page read and write
950000
heap
page read and write
4710000
direct allocation
page read and write
647E000
stack
page read and write
4630000
direct allocation
page read and write
400000
unkown
page readonly
95E000
stack
page read and write
3DFD000
trusted library allocation
page read and write
48FD000
direct allocation
page read and write
3EB4000
heap
page read and write
400E000
heap
page read and write
D37000
trusted library allocation
page read and write
4839000
direct allocation
page read and write
4710000
direct allocation
page read and write
3F91000
heap
page read and write
4880000
heap
page execute and read and write
67D0000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
55BE000
stack
page read and write
37CE000
stack
page read and write
20C81202000
heap
page read and write
4753000
direct allocation
page read and write
483D000
direct allocation
page read and write
D50000
trusted library allocation
page read and write
58EF000
stack
page read and write
492000
unkown
page read and write
3F91000
heap
page read and write
5280000
heap
page read and write
3E1D000
trusted library allocation
page read and write
400F000
heap
page read and write
2A38000
trusted library allocation
page read and write
2B95000
trusted library allocation
page read and write
6650000
trusted library allocation
page execute and read and write
4B0000
trusted library allocation
page read and write
795000
trusted library allocation
page execute and read and write
3F91000
heap
page read and write
400E000
heap
page read and write
400E000
heap
page read and write
3F91000
heap
page read and write
3ED1000
heap
page read and write
3DC8000
heap
page read and write
2FCA000
trusted library allocation
page read and write
110000
heap
page read and write
4A7000
unkown
page read and write
3895000
trusted library allocation
page read and write
594000
trusted library allocation
page read and write
163F000
stack
page read and write
3ED1000
heap
page read and write
400E000
heap
page read and write
3085000
heap
page read and write
21FE000
stack
page read and write
A48000
heap
page read and write
400E000
heap
page read and write
3EAC000
heap
page read and write
3EB0000
heap
page read and write
400F000
heap
page read and write
2F39000
trusted library allocation
page read and write
2B0C000
stack
page read and write
3D90000
heap
page read and write
256E000
trusted library allocation
page read and write
580000
trusted library allocation
page read and write
3F91000
heap
page read and write
35AA000
trusted library allocation
page read and write
3E90000
trusted library allocation
page read and write
CF7000
stack
page read and write
48FD000
direct allocation
page read and write
3F4C000
heap
page read and write
4393000
heap
page read and write
3F91000
heap
page read and write
20C811E7000
heap
page read and write
35B2000
trusted library allocation
page read and write
2F36000
trusted library allocation
page read and write
40E1000
trusted library allocation
page read and write
20C8124C000
heap
page read and write
3F4E000
heap
page read and write
24CE000
stack
page read and write
25C1000
trusted library allocation
page read and write
3F91000
heap
page read and write
20C8124C000
heap
page read and write
682E000
stack
page read and write
2F94000
heap
page read and write
3F91000
heap
page read and write
490000
unkown
page read and write
3ED1000
heap
page read and write
5B0000
trusted library allocation
page read and write
520000
heap
page read and write
5965000
heap
page read and write
8FE000
stack
page read and write
2796000
trusted library allocation
page read and write
D8E000
heap
page read and write
2A30000
trusted library allocation
page read and write
100000
heap
page read and write
4630000
direct allocation
page read and write
400E000
heap
page read and write
3607000
trusted library allocation
page read and write
400E000
heap
page read and write
3F91000
heap
page read and write
6AFE000
stack
page read and write
400E000
heap
page read and write
67A6000
trusted library allocation
page read and write
400E000
heap
page read and write
2330000
trusted library allocation
page read and write
3F91000
heap
page read and write
42D6000
heap
page read and write
361D000
trusted library allocation
page read and write
3ED1000
heap
page read and write
359B000
trusted library allocation
page read and write
3F91000
heap
page read and write
2E24000
heap
page read and write
8AF000
stack
page read and write
4693000
direct allocation
page read and write
2586000
trusted library allocation
page read and write
483D000
direct allocation
page read and write
281E000
trusted library allocation
page read and write
3CE3000
trusted library allocation
page read and write
4630000
direct allocation
page read and write
4C0000
heap
page read and write
3ED1000
heap
page read and write
3ED1000
heap
page read and write
2799000
trusted library allocation
page read and write
2791000
trusted library allocation
page read and write
2DFC000
heap
page read and write
490000
trusted library allocation
page read and write
4570000
direct allocation
page read and write
2B81000
trusted library allocation
page read and write
3DA8000
trusted library allocation
page read and write
4693000
direct allocation
page read and write
607E000
stack
page read and write
3F1D000
heap
page read and write
4630000
direct allocation
page read and write
5DA6000
trusted library allocation
page read and write
400E000
heap
page read and write
270B000
trusted library allocation
page read and write
5784000
trusted library allocation
page read and write
3FCB000
heap
page read and write
29C7000
trusted library allocation
page execute and read and write
3F91000
heap
page read and write
2ECE000
trusted library allocation
page read and write
20C811E7000
heap
page read and write
3F91000
heap
page read and write
400000
unkown
page readonly
657B5FE000
stack
page read and write
400E000
heap
page read and write
2FB0000
heap
page read and write
2EAB000
trusted library allocation
page read and write
3D4D000
trusted library allocation
page read and write
20C81130000
heap
page read and write
2D39000
trusted library allocation
page read and write
3F2E000
heap
page read and write
44A2000
heap
page read and write
4A7000
unkown
page read and write
3F17000
trusted library allocation
page read and write
5970000
heap
page read and write
3EEF000
heap
page read and write
36EF000
trusted library allocation
page read and write
3ED1000
heap
page read and write
4839000
direct allocation
page read and write
400E000
heap
page read and write
6790000
trusted library allocation
page execute and read and write
25CE000
trusted library allocation
page read and write
D30000
trusted library allocation
page read and write
3DF1000
heap
page read and write
6680000
trusted library allocation
page read and write
2E1E000
stack
page read and write
400E000
heap
page read and write
299D000
trusted library allocation
page execute and read and write
400E000
heap
page read and write
46C7000
direct allocation
page read and write
4072000
trusted library allocation
page read and write
657B7FD000
stack
page read and write
19E000
stack
page read and write
4D2E000
stack
page read and write
5B2000
trusted library allocation
page read and write
20C811E5000
heap
page read and write
3ED1000
heap
page read and write
3F4E000
heap
page read and write
4013000
trusted library allocation
page read and write
4089000
heap
page read and write
2FC4000
trusted library allocation
page read and write
3D48000
trusted library allocation
page read and write
3E5D000
heap
page read and write
20C811B0000
heap
page read and write
4AB000
unkown
page readonly
A60000
heap
page read and write
26DF000
trusted library allocation
page read and write
3F91000
heap
page read and write
48F9000
direct allocation
page read and write
3F4E000
heap
page read and write
3F91000
heap
page read and write
3ED1000
heap
page read and write
3ED1000
heap
page read and write
39EF000
trusted library allocation
page read and write
400E000
heap
page read and write
4570000
direct allocation
page read and write
3630000
trusted library allocation
page read and write
2D35000
trusted library allocation
page read and write
48AE000
direct allocation
page read and write
3F91000
heap
page read and write
8B5000
stack
page read and write
400E000
heap
page read and write
58F0000
heap
page read and write
496E000
direct allocation
page read and write
950000
heap
page read and write
2F31000
trusted library allocation
page read and write
38C5000
trusted library allocation
page read and write
3F4E000
heap
page read and write
3D45000
trusted library allocation
page read and write
3DFB000
heap
page read and write
3F4E000
heap
page read and write
400E000
heap
page read and write
5E87000
trusted library allocation
page read and write
5F7000
heap
page read and write
3F4E000
heap
page read and write
483D000
direct allocation
page read and write
482000
unkown
page readonly
2EB0000
heap
page read and write
35AC000
trusted library allocation
page read and write
20C8124C000
heap
page read and write
3D3F000
trusted library allocation
page read and write
3F91000
heap
page read and write
3DFD000
heap
page read and write
358E000
trusted library allocation
page read and write
3E33000
trusted library allocation
page read and write
29C0000
trusted library allocation
page read and write
4870000
trusted library allocation
page read and write
593F000
heap
page read and write
3F4E000
heap
page read and write
4839000
direct allocation
page read and write
4A7000
unkown
page read and write
3ED1000
heap
page read and write
4839000
direct allocation
page read and write
2B10000
trusted library allocation
page execute and read and write
3F91000
heap
page read and write
D60000
heap
page read and write
1E0000
heap
page read and write
3ED1000
heap
page read and write
20C811FF000
heap
page read and write
3ED1000
heap
page read and write
47D0000
direct allocation
page read and write
20C81575000
heap
page read and write
8CA000
heap
page read and write
4630000
direct allocation
page read and write
402F000
trusted library allocation
page read and write
20C811E0000
heap
page read and write
48F9000
direct allocation
page read and write
3F91000
heap
page read and write
840000
trusted library allocation
page execute and read and write
2824000
trusted library allocation
page read and write
663F000
stack
page read and write
4710000
direct allocation
page read and write
37D5000
trusted library allocation
page read and write
400E000
heap
page read and write
2F67000
trusted library allocation
page read and write
3776000
trusted library allocation
page read and write
400E000
heap
page read and write
3F4E000
heap
page read and write
25C6000
trusted library allocation
page read and write
E5000
heap
page read and write
29A0000
trusted library allocation
page read and write
57AE000
stack
page read and write
400E000
heap
page read and write
3F72000
heap
page read and write
2B72000
trusted library allocation
page read and write
2F40000
trusted library allocation
page read and write
400E000
heap
page read and write
5BFE000
stack
page read and write
2F74000
trusted library allocation
page read and write
20C81110000
heap
page read and write
3F91000
heap
page read and write
400000
unkown
page readonly
9C0000
heap
page read and write
9AA000
stack
page read and write
48AE000
direct allocation
page read and write
3F02000
trusted library allocation
page read and write
F60000
trusted library allocation
page execute and read and write
400E000
heap
page read and write
2FC0000
heap
page read and write
400E000
heap
page read and write
3F91000
heap
page read and write
1540000
heap
page read and write
3ED1000
heap
page read and write
560000
heap
page read and write
26FD000
trusted library allocation
page read and write
3F91000
heap
page read and write
48F9000
direct allocation
page read and write
3F3E000
heap
page read and write
5110000
trusted library allocation
page read and write
3E6C000
heap
page read and write
26DA000
trusted library allocation
page read and write
2B92000
trusted library allocation
page read and write
4010000
trusted library allocation
page read and write
4630000
direct allocation
page read and write
64BE000
stack
page read and write
27C7000
trusted library allocation
page read and write
657B2FE000
stack
page read and write
2BB0000
heap
page read and write
3F4E000
heap
page read and write
578A000
trusted library allocation
page read and write
625E000
stack
page read and write
3FC6000
heap
page read and write
5E10000
trusted library allocation
page execute and read and write
5DE0000
trusted library allocation
page read and write
3EA7000
heap
page read and write
3F4E000
heap
page read and write
38A2000
trusted library allocation
page read and write
657B4FE000
stack
page read and write
3ED1000
heap
page read and write
2D77000
trusted library allocation
page read and write
3FEC000
heap
page read and write
3ED1000
heap
page read and write
400E000
heap
page read and write
5D9A000
trusted library allocation
page read and write
3EAE000
heap
page execute and read and write
2B30000
heap
page read and write
3F4E000
heap
page read and write
3E5B000
heap
page read and write
400E000
heap
page read and write
2E7A000
trusted library allocation
page read and write
3F91000
heap
page read and write
2B20000
heap
page execute and read and write
400E000
heap
page read and write
490000
unkown
page write copy
2815000
trusted library allocation
page read and write
9C4000
heap
page read and write
5BBE000
stack
page read and write
3ED1000
heap
page read and write
490000
unkown
page write copy
2F5F000
stack
page read and write
26D4000
trusted library allocation
page read and write
400E000
heap
page read and write
3F91000
heap
page read and write
3ED1000
heap
page read and write
3859000
heap
page read and write
3F91000
heap
page read and write
2E0A000
trusted library allocation
page read and write
3F91000
heap
page read and write
3102000
trusted library allocation
page read and write
3F91000
heap
page read and write
2E74000
trusted library allocation
page read and write
3CD0000
heap
page read and write
5C7E000
stack
page read and write
27D1000
trusted library allocation
page read and write
3F91000
heap
page read and write
3FC9000
heap
page read and write
400E000
heap
page read and write
A71000
heap
page read and write
3F91000
heap
page read and write
4047000
heap
page read and write
9A000
stack
page read and write
64FF000
stack
page read and write
24F6000
trusted library allocation
page read and write
D10000
heap
page read and write
3F91000
heap
page read and write
480000
trusted library allocation
page read and write
3ED1000
heap
page read and write
25D2000
trusted library allocation
page read and write
5F7E000
stack
page read and write
29BA000
trusted library allocation
page execute and read and write
3F2D000
heap
page read and write
3F91000
heap
page read and write
5EA000
heap
page read and write
497000
trusted library allocation
page read and write
37FA000
trusted library allocation
page read and write
2E9D000
trusted library allocation
page read and write
3F91000
heap
page read and write
3F4E000
heap
page read and write
3EBD000
heap
page read and write
24DB000
trusted library allocation
page read and write
3F5E000
heap
page read and write
8CE000
heap
page read and write
38C0000
trusted library allocation
page read and write
664D000
trusted library allocation
page read and write
3ED1000
heap
page read and write
3F4E000
heap
page read and write
66A0000
trusted library allocation
page execute and read and write
400E000
heap
page read and write
3F91000
heap
page read and write
E5F000
heap
page read and write
4066000
trusted library allocation
page read and write
37EB000
trusted library allocation
page read and write
400E000
heap
page read and write
8B5000
stack
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
400E000
heap
page read and write
3F4E000
heap
page read and write
4F0000
heap
page read and write
48AE000
direct allocation
page read and write
400E000
heap
page read and write
2EA1000
trusted library allocation
page read and write
3ED0000
heap
page read and write
3F91000
heap
page read and write
3ED1000
heap
page read and write
8B5000
stack
page read and write
36DE000
stack
page read and write
3F91000
heap
page read and write
47D0000
direct allocation
page read and write
2B6E000
trusted library allocation
page read and write
3D90000
heap
page read and write
B90000
heap
page read and write
3F91000
heap
page read and write
3F4E000
heap
page read and write
3F91000
heap
page read and write
2D6F000
trusted library allocation
page read and write
400E000
heap
page read and write
7FE000
stack
page read and write
5DC0000
trusted library allocation
page read and write
24EE000
trusted library allocation
page read and write
3F91000
heap
page read and write
400E000
heap
page read and write
3DBE000
trusted library allocation
page read and write
3D2F000
trusted library allocation
page read and write
2A2E000
stack
page read and write
2703000
trusted library allocation
page read and write
2BA0000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
4753000
direct allocation
page read and write
3741000
trusted library allocation
page read and write
2D7B000
trusted library allocation
page read and write
400E000
heap
page read and write
2EA3000
trusted library allocation
page read and write
3F91000
heap
page read and write
5DF0000
trusted library allocation
page execute and read and write
A0E000
stack
page read and write
850000
heap
page read and write
29C5000
trusted library allocation
page execute and read and write
9A000
stack
page read and write
797000
trusted library allocation
page execute and read and write
387C000
trusted library allocation
page read and write
4EEE000
stack
page read and write
2710000
trusted library allocation
page read and write
27A4000
trusted library allocation
page read and write
3ED1000
heap
page read and write
51D0000
heap
page read and write
510000
heap
page read and write
401000
unkown
page execute read
22FE000
stack
page read and write
3F91000
heap
page read and write
3ED1000
heap
page read and write
3D3C000
trusted library allocation
page read and write
3ED6000
heap
page read and write
401000
unkown
page execute read
3F4E000
heap
page read and write
3F91000
heap
page read and write
F90000
heap
page read and write
24EA000
trusted library allocation
page read and write
3FD2000
trusted library allocation
page read and write
400E000
heap
page read and write
3F91000
heap
page read and write
5E00000
trusted library allocation
page execute and read and write
2808000
trusted library allocation
page read and write
3EEF000
heap
page read and write
8AF000
stack
page read and write
496E000
direct allocation
page read and write
5B6000
trusted library allocation
page execute and read and write
593000
trusted library allocation
page execute and read and write
3F91000
heap
page read and write
400E000
heap
page read and write
E29000
heap
page read and write
515000
heap
page read and write
5C8000
heap
page read and write
B70000
heap
page read and write
2E72000
trusted library allocation
page read and write
2D7F000
trusted library allocation
page read and write
48F9000
direct allocation
page read and write
400E000
heap
page read and write
38A9000
trusted library allocation
page read and write
4047000
heap
page read and write
3521000
trusted library allocation
page read and write
3F4F000
heap
page read and write
401000
unkown
page execute read
2D26000
trusted library allocation
page read and write
3FC3000
heap
page read and write
1640000
heap
page read and write
4AB000
unkown
page readonly
3ED1000
heap
page read and write
67D5000
trusted library allocation
page read and write
3717000
trusted library allocation
page read and write
490000
unkown
page read and write
3F91000
heap
page read and write
2EB5000
heap
page read and write
3F91000
heap
page read and write
6720000
trusted library allocation
page read and write
400E000
heap
page read and write
38BB000
trusted library allocation
page read and write
3F4E000
heap
page read and write
596E000
heap
page read and write
400E000
heap
page read and write
400E000
heap
page read and write
5C3E000
stack
page read and write
400D000
heap
page read and write
400F000
heap
page read and write
39C5000
trusted library allocation
page read and write
24D0000
trusted library allocation
page read and write
595A000
heap
page read and write
46C5000
direct allocation
page read and write
3F91000
heap
page read and write
496E000
direct allocation
page read and write
3F4E000
heap
page read and write
20C81100000
heap
page read and write
20C81200000
heap
page read and write
3F91000
heap
page read and write
3DF5000
heap
page read and write
3FDA000
heap
page read and write
407F000
trusted library allocation
page read and write
3F91000
heap
page read and write
3ED1000
heap
page read and write
3F91000
heap
page read and write
48AE000
direct allocation
page read and write
3F4E000
heap
page read and write
3F4E000
heap
page read and write
3F46000
heap
page read and write
482000
unkown
page readonly
682000
heap
page read and write
1C0000
heap
page read and write
4084000
heap
page read and write
3ED1000
heap
page read and write
4570000
direct allocation
page read and write
3F6E000
heap
page execute and read and write
BC0000
heap
page read and write
3F91000
heap
page read and write
365C000
trusted library allocation
page read and write
3ED1000
heap
page read and write
3ED1000
heap
page read and write
25BD000
trusted library allocation
page read and write
491000
unkown
page write copy
400E000
heap
page read and write
3534000
trusted library allocation
page read and write
6227000
heap
page read and write
3F91000
heap
page read and write
2B7A000
trusted library allocation
page read and write
3F91000
heap
page read and write
3F4E000
heap
page read and write
51BD000
stack
page read and write
4A0000
trusted library allocation
page read and write
3E88000
heap
page read and write
400E000
heap
page read and write
408B000
heap
page read and write
3F91000
heap
page read and write
400E000
heap
page read and write
4006000
heap
page read and write
3DE9000
heap
page read and write
3ED1000
heap
page read and write
B9E000
heap
page read and write
400E000
heap
page read and write
3FFE000
heap
page read and write
3F91000
heap
page read and write
400E000
heap
page read and write
2B7E000
trusted library allocation
page read and write
5AD000
trusted library allocation
page execute and read and write
83C000
stack
page read and write
3F91000
heap
page read and write
792000
trusted library allocation
page read and write
482000
unkown
page readonly
3ED1000
heap
page read and write
3E6D000
heap
page read and write
3EAA000
heap
page read and write
2FC5000
heap
page read and write
38B4000
trusted library allocation
page read and write
637E000
stack
page read and write
20C81213000
heap
page read and write
2B86000
trusted library allocation
page read and write
3F4E000
heap
page read and write
2338000
trusted library allocation
page read and write
3DD9000
heap
page read and write
3F4E000
heap
page read and write
2594000
trusted library allocation
page read and write
2828000
trusted library allocation
page read and write
400000
unkown
page readonly
3541000
trusted library allocation
page read and write
3F91000
heap
page read and write
2F6E000
trusted library allocation
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
2B8D000
trusted library allocation
page read and write
3F91000
heap
page read and write
401000
unkown
page execute read
2701000
trusted library allocation
page read and write
3F91000
heap
page read and write
400E000
heap
page read and write
138F000
stack
page read and write
A1E000
stack
page read and write
3F90000
heap
page read and write
5E8A000
trusted library allocation
page read and write
4940000
heap
page read and write
3F91000
heap
page read and write
4710000
direct allocation
page read and write
400E000
heap
page read and write
3FE5000
trusted library allocation
page read and write
657B9FE000
stack
page read and write
2771000
trusted library allocation
page read and write
3F4E000
heap
page read and write
3F4E000
heap
page read and write
2D1B000
trusted library allocation
page read and write
3ED1000
heap
page read and write
3AE1000
heap
page read and write
400E000
heap
page read and write
400E000
heap
page read and write
25DE000
trusted library allocation
page read and write
3F91000
heap
page read and write
20C81570000
heap
page read and write
3F91000
heap
page read and write
2990000
trusted library allocation
page read and write
3F4E000
heap
page read and write
1F0000
heap
page read and write
3F4E000
heap
page read and write
79B000
trusted library allocation
page execute and read and write
3F4E000
heap
page read and write
257B000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
483D000
direct allocation
page read and write
3C07000
heap
page read and write
3F91000
heap
page read and write
49F0000
heap
page read and write
27D7000
trusted library allocation
page read and write
2F90000
heap
page read and write
470000
heap
page read and write
4710000
direct allocation
page read and write
62FD000
stack
page read and write
A44000
heap
page read and write
3F91000
heap
page read and write
15CE000
stack
page read and write
3EB2000
heap
page read and write
2994000
trusted library allocation
page read and write
3ED1000
heap
page read and write
3DD3000
heap
page read and write
4044000
trusted library allocation
page read and write
59D000
trusted library allocation
page execute and read and write
67D2000
trusted library allocation
page read and write
3F91000
heap
page read and write
400E000
heap
page read and write
400E000
heap
page read and write
2E6C000
trusted library allocation
page read and write
3F4E000
heap
page read and write
400E000
heap
page read and write
3F91000
heap
page read and write
3E9E000
heap
page read and write
8FE000
stack
page read and write
3F1E000
heap
page read and write
123E000
stack
page read and write
3ED1000
heap
page read and write
482000
unkown
page readonly
20C81213000
heap
page read and write
110000
heap
page read and write
3F91000
heap
page read and write
4710000
direct allocation
page read and write
43E5000
heap
page read and write
400E000
heap
page read and write
3E5D000
heap
page read and write
39F3000
trusted library allocation
page read and write
2993000
trusted library allocation
page execute and read and write
5A0000
trusted library allocation
page read and write
3F91000
heap
page read and write
E80000
heap
page read and write
400E000
heap
page read and write
3851000
heap
page read and write
2B50000
trusted library allocation
page read and write
633E000
stack
page read and write
5E20000
trusted library allocation
page execute and read and write
3F4E000
heap
page read and write
2FB8000
trusted library allocation
page read and write
400E000
heap
page read and write
490000
unkown
page write copy
48FD000
stack
page read and write
67E0000
trusted library allocation
page read and write
118E000
stack
page read and write
40CB000
trusted library allocation
page read and write
400E000
heap
page read and write
8C0000
heap
page read and write
93E000
stack
page read and write
3F91000
heap
page read and write
4084000
heap
page read and write
3FBD000
trusted library allocation
page read and write
370E000
stack
page read and write
2505000
trusted library allocation
page read and write
2821000
trusted library allocation
page read and write
400E000
heap
page read and write
4AB000
unkown
page readonly
400C000
heap
page read and write
990000
heap
page read and write
400E000
heap
page read and write
15E000
stack
page read and write
400E000
heap
page read and write
3F4E000
heap
page read and write
47D0000
direct allocation
page read and write
5DD0000
trusted library allocation
page execute and read and write
3ED1000
heap
page read and write
4943000
heap
page read and write
3F4E000
heap
page read and write
20C811DB000
heap
page read and write
3692000
trusted library allocation
page read and write
5DB0000
trusted library allocation
page execute and read and write
4089000
heap
page read and write
35A7000
trusted library allocation
page read and write
3ED1000
heap
page read and write
5A6E000
stack
page read and write
3ED1000
heap
page read and write
BCB000
heap
page read and write
20C811E0000
heap
page read and write
900000
heap
page read and write
3F91000
heap
page read and write
8FE000
heap
page read and write
5D96000
trusted library allocation
page read and write
3ED1000
heap
page read and write
3F76000
trusted library allocation
page read and write
400E000
heap
page read and write
3EB9000
heap
page read and write
3DDB000
heap
page read and write
3586000
trusted library allocation
page read and write
4839000
direct allocation
page read and write
3ED1000
heap
page read and write
367C000
trusted library allocation
page read and write
3F2C000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
400E000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
3F4E000
heap
page read and write
158F000
stack
page read and write
20C81213000
heap
page read and write
492000
unkown
page read and write
4860000
trusted library allocation
page read and write
400E000
heap
page read and write
3D53000
trusted library allocation
page read and write
3831000
trusted library allocation
page read and write
400E000
heap
page read and write
400E000
heap
page read and write
496E000
direct allocation
page read and write
24D6000
trusted library allocation
page read and write
3ED1000
heap
page read and write
2320000
heap
page read and write
51D3000
heap
page read and write
4570000
direct allocation
page read and write
3E22000
heap
page read and write
483D000
direct allocation
page read and write
A71000
heap
page read and write
2E7F000
trusted library allocation
page read and write
2CBE000
stack
page read and write
400E000
heap
page read and write
399D000
trusted library allocation
page read and write
3F87000
heap
page read and write
3ED1000
heap
page read and write
2BA4000
trusted library allocation
page read and write
2B66000
trusted library allocation
page read and write
3ED6000
heap
page read and write
37DE000
heap
page read and write
2DA4000
trusted library allocation
page read and write
39B2000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
400E000
heap
page read and write
160E000
stack
page read and write
3ED1000
heap
page read and write
26CC000
trusted library allocation
page read and write
FB0000
heap
page read and write
29B0000
trusted library allocation
page read and write
3761000
trusted library allocation
page read and write
3FD6000
heap
page execute and read and write
400E000
heap
page read and write
400E000
heap
page read and write
400E000
heap
page read and write
400E000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
3F4E000
heap
page read and write
29C2000
trusted library allocation
page read and write
2590000
trusted library allocation
page read and write
3080000
heap
page read and write
A65000
heap
page read and write
2EB0000
trusted library allocation
page read and write
3F4E000
heap
page read and write
25D6000
trusted library allocation
page read and write
657BAFB000
stack
page read and write
4AB000
unkown
page readonly
2FBE000
trusted library allocation
page read and write
3ED1000
heap
page read and write
3ED1000
heap
page read and write
6AF000
heap
page read and write
2FBB000
trusted library allocation
page read and write
5DA8000
trusted library allocation
page read and write
3F1B000
heap
page read and write
3F4E000
heap
page read and write
47D0000
direct allocation
page read and write
2F60000
heap
page read and write
2628000
trusted library allocation
page read and write
400E000
heap
page read and write
2ECA000
heap
page read and write
4693000
direct allocation
page read and write
3745000
trusted library allocation
page read and write
29CB000
trusted library allocation
page execute and read and write
27A0000
trusted library allocation
page read and write
5D94000
trusted library allocation
page read and write
3F91000
heap
page read and write
400F000
heap
page read and write
3F91000
heap
page read and write
24FD000
trusted library allocation
page read and write
4693000
direct allocation
page read and write
3F4E000
heap
page read and write
6784000
trusted library allocation
page read and write
44A9000
heap
page read and write
353B000
trusted library allocation
page read and write
2D63000
trusted library allocation
page read and write
38D1000
trusted library allocation
page read and write
3FAE000
trusted library allocation
page read and write
3EA5000
trusted library allocation
page read and write
2598000
trusted library allocation
page read and write
400E000
heap
page read and write
3F4E000
heap
page read and write
2DC7000
trusted library allocation
page read and write
359E000
trusted library allocation
page read and write
3F91000
heap
page read and write
4570000
direct allocation
page read and write
3EF9000
heap
page read and write
3D27000
trusted library allocation
page read and write
9C0000
heap
page read and write
8AF000
stack
page read and write
D70000
heap
page read and write
There are 1086 hidden memdumps, click here to show them.