IOC Report
SecuriteInfo.com.Trojan.Siggen29.57841.15930.23271.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.Siggen29.57841.15930.23271.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_d3361eebbf430e036b4a51b6ef5b69d794b9ba_78258953_0519d225-d812-4cba-ad6d-22db454bf1fb\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC620.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 24 17:30:00 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC67E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC6BE.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Thu Oct 5 05:47:19 2023, atime=Wed Sep 27 08:36:54 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\TmpC5D1.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TmpC5E2.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.57841.15930.23271.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.57841.15930.23271.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 268

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/Entity/Id8ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
89.105.223.196
unknown
Netherlands
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{7e3867d0-153d-786d-0b8a-d81e4c20ed14}\Root\InventoryApplicationFile\securiteinfo.com|968e72f4518ea95a
ProgramId
\REGISTRY\A\{7e3867d0-153d-786d-0b8a-d81e4c20ed14}\Root\InventoryApplicationFile\securiteinfo.com|968e72f4518ea95a
FileId
\REGISTRY\A\{7e3867d0-153d-786d-0b8a-d81e4c20ed14}\Root\InventoryApplicationFile\securiteinfo.com|968e72f4518ea95a
LowerCaseLongPath
\REGISTRY\A\{7e3867d0-153d-786d-0b8a-d81e4c20ed14}\Root\InventoryApplicationFile\securiteinfo.com|968e72f4518ea95a
LongPathHash
\REGISTRY\A\{7e3867d0-153d-786d-0b8a-d81e4c20ed14}\Root\InventoryApplicationFile\securiteinfo.com|968e72f4518ea95a
Name
\REGISTRY\A\{7e3867d0-153d-786d-0b8a-d81e4c20ed14}\Root\InventoryApplicationFile\securiteinfo.com|968e72f4518ea95a
OriginalFileName
\REGISTRY\A\{7e3867d0-153d-786d-0b8a-d81e4c20ed14}\Root\InventoryApplicationFile\securiteinfo.com|968e72f4518ea95a
Publisher
\REGISTRY\A\{7e3867d0-153d-786d-0b8a-d81e4c20ed14}\Root\InventoryApplicationFile\securiteinfo.com|968e72f4518ea95a
Version
\REGISTRY\A\{7e3867d0-153d-786d-0b8a-d81e4c20ed14}\Root\InventoryApplicationFile\securiteinfo.com|968e72f4518ea95a
BinFileVersion
\REGISTRY\A\{7e3867d0-153d-786d-0b8a-d81e4c20ed14}\Root\InventoryApplicationFile\securiteinfo.com|968e72f4518ea95a
BinaryType
\REGISTRY\A\{7e3867d0-153d-786d-0b8a-d81e4c20ed14}\Root\InventoryApplicationFile\securiteinfo.com|968e72f4518ea95a
ProductName
\REGISTRY\A\{7e3867d0-153d-786d-0b8a-d81e4c20ed14}\Root\InventoryApplicationFile\securiteinfo.com|968e72f4518ea95a
ProductVersion
\REGISTRY\A\{7e3867d0-153d-786d-0b8a-d81e4c20ed14}\Root\InventoryApplicationFile\securiteinfo.com|968e72f4518ea95a
LinkDate
\REGISTRY\A\{7e3867d0-153d-786d-0b8a-d81e4c20ed14}\Root\InventoryApplicationFile\securiteinfo.com|968e72f4518ea95a
BinProductVersion
\REGISTRY\A\{7e3867d0-153d-786d-0b8a-d81e4c20ed14}\Root\InventoryApplicationFile\securiteinfo.com|968e72f4518ea95a
AppxPackageFullName
\REGISTRY\A\{7e3867d0-153d-786d-0b8a-d81e4c20ed14}\Root\InventoryApplicationFile\securiteinfo.com|968e72f4518ea95a
AppxPackageRelativeId
\REGISTRY\A\{7e3867d0-153d-786d-0b8a-d81e4c20ed14}\Root\InventoryApplicationFile\securiteinfo.com|968e72f4518ea95a
Size
\REGISTRY\A\{7e3867d0-153d-786d-0b8a-d81e4c20ed14}\Root\InventoryApplicationFile\securiteinfo.com|968e72f4518ea95a
Language
\REGISTRY\A\{7e3867d0-153d-786d-0b8a-d81e4c20ed14}\Root\InventoryApplicationFile\securiteinfo.com|968e72f4518ea95a
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1AC000
unkown
page read and write
malicious
29E1000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
6C50000
trusted library allocation
page read and write
3DA0000
trusted library allocation
page read and write
989E000
stack
page read and write
909D000
heap
page read and write
3B16000
trusted library allocation
page read and write
2EE3000
trusted library allocation
page read and write
2EEE000
trusted library allocation
page read and write
1F9000
unkown
page read and write
2D45000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
CF0000
trusted library allocation
page read and write
3086000
trusted library allocation
page read and write
5CEC000
heap
page read and write
3AE9000
trusted library allocation
page read and write
3C0C000
trusted library allocation
page read and write
610D000
stack
page read and write
63B0000
trusted library allocation
page read and write
3E64000
trusted library allocation
page read and write
3ED2000
trusted library allocation
page read and write
2C31000
trusted library allocation
page read and write
3B4C000
trusted library allocation
page read and write
3E32000
trusted library allocation
page read and write
49E8000
trusted library allocation
page read and write
538E000
stack
page read and write
92FD000
stack
page read and write
6779000
trusted library allocation
page read and write
CF2000
trusted library allocation
page read and write
2DD9000
trusted library allocation
page read and write
6C40000
trusted library allocation
page execute and read and write
1F8000
unkown
page execute and read and write
CED000
trusted library allocation
page execute and read and write
2800000
trusted library allocation
page read and write
1FB000
unkown
page readonly
2DBE000
trusted library allocation
page read and write
3078000
trusted library allocation
page read and write
F50000
heap
page read and write
3C42000
trusted library allocation
page read and write
9060000
heap
page read and write
9310000
heap
page read and write
2CD2000
trusted library allocation
page read and write
432000
remote allocation
page execute and read and write
3A95000
trusted library allocation
page read and write
5BC000
stack
page read and write
3E14000
trusted library allocation
page read and write
3B5B000
trusted library allocation
page read and write
3B55000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
2FBC000
trusted library allocation
page read and write
9EE000
stack
page read and write
3EC2000
trusted library allocation
page read and write
3AAE000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
3DFA000
trusted library allocation
page read and write
CF6000
trusted library allocation
page execute and read and write
2F7F000
trusted library allocation
page read and write
2D3A000
trusted library allocation
page read and write
4EDE000
trusted library allocation
page read and write
3B96000
trusted library allocation
page read and write
3E2D000
trusted library allocation
page read and write
9069000
heap
page read and write
D06000
heap
page read and write
3D8D000
trusted library allocation
page read and write
181000
unkown
page execute read
6BC0000
trusted library allocation
page read and write
2BB5000
trusted library allocation
page read and write
3E1B000
trusted library allocation
page read and write
2C9B000
trusted library allocation
page read and write
3DC4000
trusted library allocation
page read and write
3C35000
trusted library allocation
page read and write
3B59000
trusted library allocation
page read and write
4EF2000
trusted library allocation
page read and write
2BA5000
trusted library allocation
page read and write
2DF8000
trusted library allocation
page read and write
3B18000
trusted library allocation
page read and write
3E6D000
trusted library allocation
page read and write
2B7A000
trusted library allocation
page read and write
1A2000
unkown
page readonly
3B10000
trusted library allocation
page read and write
3ACD000
trusted library allocation
page read and write
2E09000
trusted library allocation
page read and write
3E77000
trusted library allocation
page read and write
6D40000
heap
page read and write
3DB2000
trusted library allocation
page read and write
5020000
heap
page read and write
3070000
trusted library allocation
page read and write
60CE000
stack
page read and write
2CFE000
trusted library allocation
page read and write
3D9A000
trusted library allocation
page read and write
2E90000
trusted library allocation
page read and write
2D2F000
trusted library allocation
page read and write
65D3000
trusted library allocation
page read and write
94BE000
stack
page read and write
4FA2000
trusted library allocation
page read and write
62C0000
trusted library allocation
page execute and read and write
3108000
trusted library allocation
page read and write
AF7000
stack
page read and write
2EC0000
trusted library allocation
page read and write
63BA000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page execute and read and write
6ACC000
stack
page read and write
544B000
heap
page read and write
6730000
trusted library allocation
page read and write
6AF0000
heap
page read and write
4F10000
trusted library allocation
page read and write
3E4D000
trusted library allocation
page read and write
9034000
heap
page read and write
9093000
heap
page read and write
85D5000
trusted library allocation
page read and write
62B0000
trusted library allocation
page execute and read and write
2DE6000
trusted library allocation
page read and write
3C22000
trusted library allocation
page read and write
3EC7000
trusted library allocation
page read and write
2B8E000
trusted library allocation
page read and write
39E1000
trusted library allocation
page read and write
C9D000
stack
page read and write
3B5E000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
3E69000
trusted library allocation
page read and write
29A0000
heap
page read and write
446000
remote allocation
page execute and read and write
2B51000
trusted library allocation
page read and write
3E8A000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
4F5E000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6800000
trusted library allocation
page execute and read and write
3AC2000
trusted library allocation
page read and write
5023000
heap
page read and write
5CC1000
heap
page read and write
2B99000
trusted library allocation
page read and write
DF0000
heap
page read and write
9011000
heap
page read and write
3A53000
trusted library allocation
page read and write
A0E000
heap
page read and write
1FE000
unkown
page write copy
675E000
trusted library allocation
page read and write
3052000
trusted library allocation
page read and write
2DCC000
trusted library allocation
page read and write
3C02000
trusted library allocation
page read and write
3ABB000
trusted library allocation
page read and write
C55000
heap
page read and write
3C28000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
29D0000
heap
page execute and read and write
2B61000
trusted library allocation
page read and write
3C51000
trusted library allocation
page read and write
6BFF000
trusted library allocation
page read and write
5213000
heap
page execute and read and write
2E20000
trusted library allocation
page read and write
3BF0000
trusted library allocation
page read and write
65D0000
trusted library allocation
page read and write
3056000
trusted library allocation
page read and write
3B68000
trusted library allocation
page read and write
960000
heap
page read and write
3AD9000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
3C3E000
trusted library allocation
page read and write
F57000
heap
page read and write
2B42000
trusted library allocation
page read and write
3E07000
trusted library allocation
page read and write
90AD000
heap
page read and write
1FB000
unkown
page readonly
4ECB000
trusted library allocation
page read and write
2BA0000
trusted library allocation
page read and write
DDF000
heap
page read and write
3E7E000
trusted library allocation
page read and write
67F0000
trusted library allocation
page execute and read and write
2ED2000
trusted library allocation
page read and write
3DA9000
trusted library allocation
page read and write
6BD0000
trusted library allocation
page read and write
DCD000
heap
page read and write
3C4C000
trusted library allocation
page read and write
6BE9000
trusted library allocation
page read and write
2D12000
trusted library allocation
page read and write
904B000
heap
page read and write
2FC7000
trusted library allocation
page read and write
29C0000
trusted library allocation
page read and write
2B6D000
trusted library allocation
page read and write
85E0000
trusted library allocation
page read and write
2FB7000
trusted library allocation
page read and write
63B5000
trusted library allocation
page read and write
3E60000
trusted library allocation
page read and write
2CF1000
trusted library allocation
page read and write
D0A000
heap
page read and write
3BFB000
trusted library allocation
page read and write
2C38000
trusted library allocation
page read and write
A00000
heap
page read and write
2DAD000
trusted library allocation
page read and write
2B87000
trusted library allocation
page read and write
2D0B000
trusted library allocation
page read and write
6C0A000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
6210000
trusted library allocation
page read and write
201000
unkown
page write copy
2C0B000
trusted library allocation
page read and write
1EF000
unkown
page read and write
2F71000
trusted library allocation
page read and write
3B3F000
trusted library allocation
page read and write
3DA4000
trusted library allocation
page read and write
2BF8000
trusted library allocation
page read and write
3BC3000
trusted library allocation
page read and write
2E04000
trusted library allocation
page read and write
2CDC000
trusted library allocation
page read and write
5C90000
heap
page read and write
105F000
stack
page read and write
3AF3000
trusted library allocation
page read and write
2D75000
trusted library allocation
page read and write
3ADE000
trusted library allocation
page read and write
3E42000
trusted library allocation
page read and write
3E5A000
trusted library allocation
page read and write
D00000
heap
page read and write
304E000
trusted library allocation
page read and write
9300000
heap
page read and write
CDD000
trusted library allocation
page execute and read and write
9087000
heap
page read and write
30F7000
trusted library allocation
page read and write
3004000
trusted library allocation
page read and write
DCF000
stack
page read and write
2EDE000
trusted library allocation
page read and write
8600000
trusted library allocation
page read and write
3DAF000
trusted library allocation
page read and write
2C09000
trusted library allocation
page read and write
9000000
heap
page read and write
6790000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6570000
trusted library allocation
page execute and read and write
A0A000
heap
page read and write
DF4000
heap
page read and write
3A02000
trusted library allocation
page read and write
2E9A000
trusted library allocation
page read and write
3076000
trusted library allocation
page read and write
5D8E000
heap
page read and write
D30000
heap
page read and write
6580000
trusted library allocation
page read and write
4F25000
trusted library allocation
page read and write
2DED000
trusted library allocation
page read and write
3B23000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
4EE6000
trusted library allocation
page read and write
2C17000
trusted library allocation
page read and write
CD4000
trusted library allocation
page read and write
1AC000
unkown
page write copy
D1B000
trusted library allocation
page execute and read and write
8800000
trusted library allocation
page read and write
3BE9000
trusted library allocation
page read and write
3B63000
trusted library allocation
page read and write
DFC000
heap
page read and write
2EB3000
trusted library allocation
page read and write
437000
remote allocation
page execute and read and write
2C4A000
trusted library allocation
page read and write
D68000
heap
page read and write
9007000
heap
page read and write
5431000
heap
page read and write
3B1E000
trusted library allocation
page read and write
6752000
trusted library allocation
page read and write
C50000
heap
page read and write
4F1E000
trusted library allocation
page read and write
5D5B000
heap
page read and write
65B0000
trusted library allocation
page execute and read and write
698C000
stack
page read and write
DC7000
heap
page read and write
6775000
trusted library allocation
page read and write
868D000
stack
page read and write
4EE1000
trusted library allocation
page read and write
7AA000
stack
page read and write
D17000
trusted library allocation
page execute and read and write
311A000
trusted library allocation
page read and write
2C6B000
trusted library allocation
page read and write
6BCA000
trusted library allocation
page read and write
62A0000
heap
page read and write
8FD000
stack
page read and write
51FE000
stack
page read and write
2FB2000
trusted library allocation
page read and write
646A000
stack
page read and write
5C8E000
stack
page read and write
F30000
trusted library allocation
page read and write
9056000
heap
page read and write
6746000
trusted library allocation
page read and write
CC0000
trusted library allocation
page read and write
3E72000
trusted library allocation
page read and write
E22000
heap
page read and write
3C83000
trusted library allocation
page read and write
5443000
heap
page read and write
2ED9000
trusted library allocation
page read and write
6BAB000
unkown
page read and write
9021000
heap
page read and write
2F73000
trusted library allocation
page read and write
3B07000
trusted library allocation
page read and write
943E000
stack
page read and write
3E97000
trusted library allocation
page read and write
3DD7000
trusted library allocation
page read and write
2CE4000
trusted library allocation
page read and write
3EBD000
trusted library allocation
page read and write
5410000
heap
page read and write
2B5F000
trusted library allocation
page read and write
3C39000
trusted library allocation
page read and write
310B000
trusted library allocation
page read and write
6C28000
trusted library allocation
page read and write
3D93000
trusted library allocation
page read and write
9075000
heap
page read and write
6777000
trusted library allocation
page read and write
2DFF000
trusted library allocation
page read and write
6AE0000
trusted library allocation
page read and write
3C08000
trusted library allocation
page read and write
5D1F000
heap
page read and write
2BC1000
trusted library allocation
page read and write
2D25000
trusted library allocation
page read and write
299B000
stack
page read and write
2EFA000
trusted library allocation
page read and write
6BE5000
trusted library allocation
page read and write
85D0000
trusted library allocation
page read and write
3EAB000
trusted library allocation
page read and write
180000
unkown
page readonly
3AD4000
trusted library allocation
page read and write
3EB6000
trusted library allocation
page read and write
2E87000
trusted library allocation
page read and write
3B46000
trusted library allocation
page read and write
6C0F000
trusted library allocation
page read and write
2C50000
trusted library allocation
page read and write
B10000
heap
page read and write
2A88000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
285E000
stack
page read and write
6AD0000
trusted library allocation
page execute and read and write
6BE2000
trusted library allocation
page read and write
67E0000
trusted library allocation
page execute and read and write
94FE000
stack
page read and write
4B7C000
stack
page read and write
6840000
heap
page execute and read and write
53EE000
stack
page read and write
4F20000
trusted library allocation
page read and write
3DE2000
trusted library allocation
page read and write
DE8000
heap
page read and write
3BDC000
trusted library allocation
page read and write
688C000
stack
page read and write
65C0000
trusted library allocation
page read and write
3E37000
trusted library allocation
page read and write
5D14000
heap
page read and write
3C18000
trusted library allocation
page read and write
1A2000
unkown
page readonly
920000
heap
page read and write
3113000
trusted library allocation
page read and write
3B50000
trusted library allocation
page read and write
85F0000
trusted library allocation
page execute and read and write
2DB6000
trusted library allocation
page read and write
673B000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
65E0000
trusted library allocation
page execute and read and write
6741000
trusted library allocation
page read and write
F2F000
stack
page read and write
3B13000
trusted library allocation
page read and write
2BAA000
trusted library allocation
page read and write
CD0000
trusted library allocation
page read and write
E00000
heap
page read and write
5D16000
heap
page read and write
662E000
stack
page read and write
2D2A000
trusted library allocation
page read and write
C30000
heap
page read and write
D5B000
heap
page read and write
3C47000
trusted library allocation
page read and write
3E26000
trusted library allocation
page read and write
2F69000
trusted library allocation
page read and write
63B8000
trusted library allocation
page read and write
3AFA000
trusted library allocation
page read and write
69CE000
stack
page read and write
3C44000
trusted library allocation
page read and write
CFA000
trusted library allocation
page execute and read and write
39EF000
trusted library allocation
page read and write
90CB000
heap
page read and write
5210000
heap
page execute and read and write
3A12000
trusted library allocation
page read and write
181000
unkown
page execute read
6D20000
trusted library allocation
page read and write
6C20000
trusted library allocation
page read and write
85DB000
trusted library allocation
page read and write
5D7B000
heap
page read and write
6590000
trusted library allocation
page read and write
4F90000
heap
page read and write
2F8C000
trusted library allocation
page read and write
947E000
stack
page read and write
CCF000
stack
page read and write
3DB7000
trusted library allocation
page read and write
3E53000
trusted library allocation
page read and write
3E6F000
trusted library allocation
page read and write
3B0A000
trusted library allocation
page read and write
3C88000
trusted library allocation
page read and write
3106000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
D15000
trusted library allocation
page execute and read and write
2F28000
trusted library allocation
page read and write
2B5A000
trusted library allocation
page read and write
2E14000
trusted library allocation
page read and write
3DEE000
trusted library allocation
page read and write
30FF000
trusted library allocation
page read and write
C2E000
stack
page read and write
2EA6000
trusted library allocation
page read and write
85DE000
trusted library allocation
page read and write
8620000
trusted library allocation
page read and write
3BCF000
trusted library allocation
page read and write
5D5D000
heap
page read and write
1E0000
unkown
page read and write
3B00000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
67A0000
trusted library allocation
page execute and read and write
3EA4000
trusted library allocation
page read and write
5D39000
heap
page read and write
953E000
stack
page read and write
FF430000
trusted library allocation
page execute and read and write
656C000
stack
page read and write
3072000
trusted library allocation
page read and write
90C9000
heap
page read and write
A2FE000
stack
page read and write
930000
heap
page read and write
1FE000
unkown
page write copy
F40000
trusted library allocation
page execute and read and write
620E000
stack
page read and write
53F8000
trusted library allocation
page read and write
DCB000
heap
page read and write
2E4F000
trusted library allocation
page read and write
2C43000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
2810000
heap
page read and write
4EC4000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
201000
unkown
page write copy
6770000
trusted library allocation
page read and write
9AE000
stack
page read and write
295F000
stack
page read and write
D38000
heap
page read and write
180000
unkown
page readonly
2EC7000
trusted library allocation
page read and write
6C14000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
3EDC000
trusted library allocation
page read and write
4EED000
trusted library allocation
page read and write
2FA0000
trusted library allocation
page read and write
672F000
stack
page read and write
2C24000
trusted library allocation
page read and write
D12000
trusted library allocation
page read and write
3117000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
CE0000
trusted library allocation
page read and write
6C30000
trusted library allocation
page read and write
5FCE000
stack
page read and write
CD3000
trusted library allocation
page execute and read and write
2F60000
trusted library allocation
page read and write
2E98000
trusted library allocation
page read and write
9045000
heap
page read and write
6C05000
trusted library allocation
page read and write
3C2F000
trusted library allocation
page read and write
501E000
stack
page read and write
D4F000
heap
page read and write
55DE000
stack
page read and write
30F2000
trusted library allocation
page read and write
2FD3000
trusted library allocation
page read and write
3068000
trusted library allocation
page read and write
6D3D000
trusted library allocation
page read and write
2F99000
trusted library allocation
page read and write
2C54000
trusted library allocation
page read and write
6BF8000
trusted library allocation
page read and write
2FAB000
trusted library allocation
page read and write
6BFA000
trusted library allocation
page read and write
6BC8000
trusted library allocation
page read and write
D10000
trusted library allocation
page read and write
306A000
trusted library allocation
page read and write
3AA1000
trusted library allocation
page read and write
6C10000
trusted library allocation
page read and write
3DAD000
trusted library allocation
page read and write
There are 462 hidden memdumps, click here to show them.