IOC Report
SecuriteInfo.com.Program.Unwanted.5510.8307.25058.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Program.Unwanted.5510.8307.25058.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\features[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\Opera_GX_114.0.5282.123_Autoupdate_x64[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202410252328151\opera_package
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera GX Installer Temp\setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera GX Installer\opera_installer_20241025232814717.log
ASCII text, with very long lines (1849)
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera GX Installer\opera_installer_20241025232816125.log
ASCII text, with very long lines (1814)
dropped
C:\Users\user\AppData\Local\Temp\7zS4052A199\setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Opera_installer_2410260328139673260.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Opera_installer_2410260328142573128.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Opera_installer_2410260328151326808.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Opera_installer_241026032815625796.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Opera_installer_241026032815935792.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Setup\OperaGXSetup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Opera Software\Opera GX Stable\Crash Reports\settings.dat
data
dropped
\Device\Mailslot\opera_installer\C:\Users\user\AppData\Local\Programs\Opera GX
data
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5510.8307.25058.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5510.8307.25058.exe"
malicious
C:\Users\user\AppData\Local\Temp\Setup\OperaGXSetup.exe
"C:\Users\user\AppData\Local\Temp\Setup\OperaGXSetup.exe" -silent --allusers=0
C:\Users\user\AppData\Local\Temp\7zS4052A199\setup.exe
C:\Users\user\AppData\Local\Temp\7zS4052A199\setup.exe -silent --allusers=0 --server-tracking-blob=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
C:\Users\user\AppData\Local\Temp\7zS4052A199\setup.exe
C:\Users\user\AppData\Local\Temp\7zS4052A199\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\user\AppData\Roaming\Opera Software\Opera GX Stable\Crash Reports" "--crash-count-file=C:\Users\user\AppData\Roaming\Opera Software\Opera GX Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktopGX --annotation=ver=114.0.5282.123 --initial-client-data=0x320,0x324,0x328,0x2fc,0x32c,0x69478c5c,0x69478c68,0x69478c74
C:\Users\user\AppData\Local\Temp\.opera\Opera GX Installer Temp\setup.exe
"C:\Users\user\AppData\Local\Temp\.opera\Opera GX Installer Temp\setup.exe" --version
C:\Users\user\AppData\Local\Temp\7zS4052A199\setup.exe
"C:\Users\user\AppData\Local\Temp\7zS4052A199\setup.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --vought_browser=0 --launchopera=1 --installfolder="C:\Users\user\AppData\Local\Programs\Opera GX" --profile-folder --language=en-GB --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --server-tracking-data=server_tracking_data --initial-pid=3260 --package-dir-prefix="C:\Users\user\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_20241025232815" --session-guid=b3083e74-a52a-4920-aa0f-d32d81e99406 --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=FC05000000000000
C:\Users\user\AppData\Local\Temp\7zS4052A199\setup.exe
C:\Users\user\AppData\Local\Temp\7zS4052A199\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\user\AppData\Roaming\Opera Software\Opera GX Stable\Crash Reports" "--crash-count-file=C:\Users\user\AppData\Roaming\Opera Software\Opera GX Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktopGX --annotation=ver=114.0.5282.123 --initial-client-data=0x340,0x344,0x348,0x308,0x34c,0x68658c5c,0x68658c68,0x68658c74

URLs

Name
IP
Malicious
https://desktop-netinstaller-sub.osp.opera.software/z
unknown
http://foo/MainWindow.xamld
unknown
https://crashstats-collector-2.opera.com/--initial-client-data=0x340
unknown
https://legal.opera.com/terms
unknown
https://download5.operacdn.com/ftp/pub/opera_gx/114.0.5282.123/win/Opera_GX_114.0.5282.123_Autoupdat
unknown
https://redir.opera.com/www.opera.com/gx/firstrun/?utm_campaign=PWN_US_PB5_3849&utm_content=3849_opg
unknown
https://download.opera.com/
unknown
https://help.opera.com/latest/
unknown
https://desktop-netinstaller-sub.osp.opera.software/5y
unknown
https://policies.google.com/terms;
unknown
https://download.opera.com/download/get/?partner=www&opsys=Windows&utm_source=netinstaller
unknown
https://desktop-netinstaller-sub.osp.opera.software/d
unknown
http://localhost:3001api/prefs/?product=$1&version=$2..
unknown
https://crashpad.chromium.org/https://crashpad.chromium.org/bug/new
unknown
https://desktop-netinstaller-sub.osp.opera.software/SysWOW64
unknown
https://crashstats-collector-2.opera.com/https://crashstats-collector-2.opera.com/
unknown
http://www.az-partners.net
unknown
https://www.savinist.com/77PRQFB/KMZXBTT/d
unknown
https://crashstats-collector-2.opera.com/32--url=https://crashstats-collector-2.opera.com/
unknown
https://www.opera.com
unknown
https://crashstats-collector-2.opera.com/
unknown
http://eu.net.opera.comd
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://download5.operacdn.com/ftp/pub/opera_gx/114.0.5282.123/win/Opera_GX_114.0.5282.1
unknown
https://desktop-netinstaller-sub.osp.opera.software/v1/binary
unknown
https://autoupdate.opera.com/A
unknown
https://crashpad.chromium.org/
unknown
https://addons.opera.com/en/extensions/details/dify-cashback/
unknown
https://www.az-partners.net/s/dPr71
unknown
https://autoupdate.opera.com/J
unknown
https://download5.operacdn.com/
unknown
https://download.opera.com/0
unknown
http://www.opera.com0
unknown
http://www.az-partners.netd
unknown
https://opera.com/privacy
unknown
https://www.az-partners.net/s/rXLVPlBfq
unknown
https://gamemaker.io)
unknown
http://www.savinist.com
unknown
https://sourcecode.opera.com
unknown
https://autoupdate.geo.opera.com/https://autoupdate.opera.com/me/OperaDesktopGXhttps://crashstats-co
unknown
http://foo/bar/mainwindow.baml
unknown
http://net.geo.opera.comd
unknown
http://eu.net.opera.com
unknown
https://www.az-partners.net/s/rXLVPcorlib
unknown
http://defaultcontainer/MainWindow.xamld
unknown
http://foo/MainWindow.xaml
unknown
https://download5.operacdn.com/p
unknown
http://net.geo.opera.com
unknown
https://gamemaker.io/en/get.
unknown
https://www.opera.com/gx/
unknown
https://gamemaker.io
unknown
https://www.az-partners.net
unknown
https://www.az-partners.net/s/rXLVPKO
unknown
https://api.config.opr.gg/v0/config?utm_campaign=PWN_US_PB5_3849&utm_medium=pa&utm_source=PWNgames&p
unknown
https://help.instagram.com/581066165581870;
unknown
https://www.savinist.com/77PRQFB/KMZXBTT/?sub1=opgx90
unknown
https://features.opera-api2.com/api/v2/features?country=US&language=en-GB&uuid=701b5ff5-b736-4d66-a0
unknown
https://crashstats-collector-2.opera.com/s
unknown
https://api.config.opr.gg/v0/config
unknown
https://www.az-partners.net/s/rXLVP
unknown
https://download.opera.com/download/get/?id=68353&autoupdate=1&ni=1&stream=stable&utm_campaign=PWN_U
unknown
https://www.opera.com/privacy
unknown
https://crashpad.chromium.org/bug/new
unknown
http://www.savinist.comd
unknown
https://download.opera.com/download/get/?id=52318&autoupdate=1&ni=10000
unknown
https://crashstats-collector-2.opera.com/--annotation=channel=Stable--annotation=plat=Win32--annotat
unknown
https://download.opera.com/download/get/?id=52318&autoupdate=1&ni=1
unknown
https://gamemaker.io/en/education.
unknown
https://legal.opera.com/terms.
unknown
http://defaultcontainer/MainWindow.xaml
unknown
https://telegram.org/tos/
unknown
https://features.opera-api2.com/
unknown
https://www.az-partners.net/s/3XgyP
unknown
https://download3.operacdn.com/res/servicefiles/partner_content/std-2/1714144780-custom_partner_cont
unknown
http://foo/bar/mainwindow.bamld
unknown
https://autoupdate.geo.opera.com/v5/netinstaller/gx/Stable/windows/x64
unknown
https://www.savinist.com
unknown
https://crashstats-collector-2.opera.com/--database=C:
unknown
https://download.opera.com/download/get/?id=52318&autoupdate=1&ni=1pera
unknown
https://net.geo.opera.com/opera_gx/stable/edition/std-2?utm_source=PWNgames&utm_medium=pa&utm_campai
unknown
https://www.savinist.com/77PRQFB/KMZXBTT/
unknown
https://desktop-netinstaller-sub.osp.opera.software/v1/binaryT
unknown
https://net.geo.opera.com
unknown
https://autoupdate.geo.opera.com/
unknown
https://autoupdate.opera.com/me/9406d3c57aa7de97f93900760b88b1cc50a7d676ba9d29c865bf5befe72936eabdd7
unknown
https://twitter.com/en/tos;
unknown
https://crashstats-collector-2.opera.com/--initial-client-data=0x320
unknown
https://desktop-netinstaller-sub.osp.opera.software/v1/binaryh
unknown
https://redir.opera.com/uninstallsurvey/
unknown
https://autoupdate.opera.com/me/
unknown
https://desktop-netinstaller-sub.osp.opera.software/
unknown
https://features.opera-api2.com/q
unknown
https://desktop-netinstaller-sub.osp.opera.software/v1/binaryy
unknown
https://api.config.opr.gg/
unknown
https://api.config.opr.gg/U
unknown
https://legal.opera.com/eula/computers
unknown
https://www.whatsapp.com/legal;
unknown
https://www.opera.com..
unknown
https://api.config.opr.gg/v0/configeditionutm_campaign=%s&utm_medium=%s&utm_source=%s&product=%s&cha
unknown
https://desktop-netinstaller-sub.osp.opera.software/1x
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
82.145.216.20
unknown
United Kingdom
82.145.217.121
unknown
United Kingdom
188.130.153.32
unknown
Russian Federation
104.18.24.17
unknown
United States
185.26.182.111
unknown
Norway
185.26.182.123
unknown
Norway
104.18.10.89
unknown
United States
188.114.96.3
unknown
European Union
185.26.182.106
unknown
Norway
82.145.216.23
unknown
United Kingdom

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Opera Software
Last Opera GX Stable Install Path
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
EDC000
unkown
page readonly
3DFD000
stack
page read and write
671000
unkown
page execute read
109D000
heap
page read and write
4840000
remote allocation
page read and write
2B738000
direct allocation
page read and write
780000
unkown
page readonly
2EBD000
trusted library allocation
page read and write
105C000
heap
page read and write
EA0000
unkown
page readonly
2B2E000
stack
page read and write
7D5000
unkown
page read and write
56004000
direct allocation
page read and write
5100000
trusted library allocation
page read and write
11FE000
stack
page read and write
10AE000
stack
page read and write
781000
unkown
page execute read
2B614000
direct allocation
page read and write
5BC34000
direct allocation
page read and write
780000
unkown
page readonly
4731000
heap
page read and write
33224000
direct allocation
page read and write
E70000
heap
page read and write
B3A000
heap
page read and write
4C668000
direct allocation
page read and write
7C8000
unkown
page readonly
499D000
heap
page read and write
5600C000
direct allocation
page read and write
7DA000
unkown
page readonly
EF0000
unkown
page readonly
780000
unkown
page readonly
693DC000
unkown
page readonly
444C000
stack
page read and write
3C248000
direct allocation
page read and write
E40000
heap
page read and write
68CA2000
unkown
page readonly
108A000
heap
page read and write
2B764000
direct allocation
page read and write
2DE2000
trusted library allocation
page read and write
2B668000
direct allocation
page read and write
5BCD4000
direct allocation
page read and write
434D000
stack
page read and write
2EDD000
trusted library allocation
page read and write
4FC000
stack
page read and write
2B794000
direct allocation
page read and write
13C000
stack
page read and write
39A04000
direct allocation
page read and write
313F000
stack
page read and write
F00000
trusted library allocation
page read and write
68C84000
unkown
page read and write
FE0000
heap
page read and write
2D71000
trusted library allocation
page read and write
3C20C000
direct allocation
page read and write
64AF000
stack
page read and write
148E000
stack
page read and write
2B760000
direct allocation
page read and write
32BF000
stack
page read and write
68891000
unkown
page execute read
2B601000
direct allocation
page read and write
9F0000
heap
page read and write
F1B000
heap
page read and write
5BC54000
direct allocation
page read and write
5BC14000
direct allocation
page read and write
2B604000
direct allocation
page read and write
2B658000
direct allocation
page read and write
2B6A0000
direct allocation
page read and write
10C0000
heap
page read and write
2EB9000
trusted library allocation
page read and write
105A000
heap
page read and write
E3E000
stack
page read and write
34D7000
heap
page read and write
5120000
heap
page execute and read and write
2B784000
direct allocation
page read and write
F76000
heap
page read and write
140B000
stack
page read and write
3329C000
direct allocation
page read and write
3D81000
trusted library allocation
page read and write
2B724000
direct allocation
page read and write
56018000
direct allocation
page read and write
3C280000
direct allocation
page read and write
FF0000
heap
page read and write
10BD000
heap
page read and write
2B4B000
stack
page read and write
2EFE000
stack
page read and write
2C56000
heap
page read and write
301E000
stack
page read and write
14C0000
heap
page read and write
2B724000
direct allocation
page read and write
E63000
trusted library allocation
page execute and read and write
6D4E000
stack
page read and write
2A00000
heap
page read and write
39A08000
direct allocation
page read and write
2DCE000
stack
page read and write
4840000
remote allocation
page read and write
2B626000
direct allocation
page read and write
68658000
unkown
page read and write
B5C000
heap
page read and write
E70000
heap
page read and write
3C204000
direct allocation
page read and write
2B754000
direct allocation
page read and write
2B724000
direct allocation
page read and write
5BCA4000
direct allocation
page read and write
2B650000
direct allocation
page read and write
1210000
heap
page read and write
F3B000
heap
page read and write
1097000
heap
page read and write
4C658000
direct allocation
page read and write
68643000
unkown
page write copy
31BE000
stack
page read and write
68039000
unkown
page read and write
F30000
trusted library allocation
page execute and read and write
2EBF000
stack
page read and write
EDA000
trusted library allocation
page execute and read and write
5BC0C000
direct allocation
page read and write
33250000
direct allocation
page read and write
3C270000
direct allocation
page read and write
E70000
heap
page read and write
69478000
unkown
page read and write
2B754000
direct allocation
page read and write
5BCCC000
direct allocation
page read and write
F4A000
heap
page read and write
33240000
direct allocation
page read and write
64ED000
stack
page read and write
3B42000
heap
page read and write
6B8000
unkown
page readonly
10D4000
heap
page read and write
2B68C000
direct allocation
page read and write
780000
unkown
page readonly
3C228000
direct allocation
page read and write
4C6B0000
direct allocation
page read and write
14D0000
heap
page read and write
2CBC000
stack
page read and write
E50000
trusted library allocation
page read and write
68662000
unkown
page readonly
5BCBC000
direct allocation
page read and write
33BF000
stack
page read and write
5BC24000
direct allocation
page read and write
67C0000
heap
page read and write
3C2A4000
direct allocation
page read and write
33228000
direct allocation
page read and write
5BC04000
direct allocation
page read and write
7D5000
unkown
page write copy
3F7E000
stack
page read and write
10BB000
heap
page read and write
FFC000
heap
page read and write
12E0000
heap
page read and write
50A000
heap
page read and write
76B000
stack
page read and write
68024000
unkown
page read and write
2B760000
direct allocation
page read and write
4C650000
direct allocation
page read and write
4C6A4000
direct allocation
page read and write
3C224000
direct allocation
page read and write
3C7F000
stack
page read and write
39A0C000
direct allocation
page read and write
5BD18000
direct allocation
page read and write
3C264000
direct allocation
page read and write
56008000
direct allocation
page read and write
6865D000
unkown
page read and write
49BE000
heap
page read and write
5BCD4000
direct allocation
page read and write
67C31000
unkown
page execute read
3B2F000
stack
page read and write
53EC000
stack
page read and write
2ECE000
stack
page read and write
3020000
unkown
page readonly
2B6E000
stack
page read and write
2B74C000
direct allocation
page read and write
5C2E000
stack
page read and write
2B00000
heap
page read and write
629E000
stack
page read and write
2D4E000
stack
page read and write
2B764000
direct allocation
page read and write
69482000
unkown
page readonly
97A000
stack
page read and write
11B0000
heap
page read and write
E80000
heap
page read and write
3B30000
heap
page read and write
5110000
trusted library allocation
page read and write
D30000
heap
page read and write
EE2000
trusted library allocation
page read and write
2B74C000
direct allocation
page read and write
362E000
stack
page read and write
EF0000
unkown
page readonly
2C30000
heap
page read and write
2B780000
direct allocation
page read and write
2B774000
direct allocation
page read and write
68644000
unkown
page read and write
4C69C000
direct allocation
page read and write
2B63C000
direct allocation
page read and write
2B718000
direct allocation
page read and write
3B7E000
stack
page read and write
53A0000
heap
page execute and read and write
780000
unkown
page readonly
68661000
unkown
page execute read
DF0000
heap
page read and write
2B69C000
direct allocation
page read and write
ECD000
trusted library allocation
page execute and read and write
EA1000
unkown
page execute read
49C6000
heap
page read and write
5BC98000
direct allocation
page read and write
CF8000
stack
page read and write
2B760000
direct allocation
page read and write
3C2A0000
direct allocation
page read and write
2F38000
trusted library allocation
page read and write
2B65C000
direct allocation
page read and write
FF2000
heap
page read and write
2B774000
direct allocation
page read and write
1050000
heap
page read and write
780000
unkown
page readonly
5130000
heap
page read and write
458F000
stack
page read and write
32BE000
stack
page read and write
2B700000
direct allocation
page read and write
B30000
heap
page read and write
4980000
heap
page read and write
40CD000
stack
page read and write
781000
unkown
page execute read
781000
unkown
page execute read
7C8000
unkown
page readonly
7D5000
unkown
page write copy
499F000
heap
page read and write
420E000
stack
page read and write
E8C000
heap
page read and write
2C2C000
stack
page read and write
1097000
heap
page read and write
5BCB0000
direct allocation
page read and write
300E000
stack
page read and write
3CE6000
heap
page read and write
68CA1000
unkown
page execute read
30B0000
heap
page read and write
67F9C000
unkown
page readonly
7DA000
unkown
page readonly
5BC50000
direct allocation
page read and write
68C9E000
unkown
page execute read
2FFF000
stack
page read and write
3C234000
direct allocation
page read and write
53A3000
heap
page execute and read and write
386F000
stack
page read and write
4740000
heap
page read and write
4C678000
direct allocation
page read and write
ED0000
trusted library allocation
page read and write
66B000
stack
page read and write
3323C000
direct allocation
page read and write
4C67C000
direct allocation
page read and write
101E000
heap
page read and write
7C8000
unkown
page readonly
34AF000
stack
page read and write
5BC80000
direct allocation
page read and write
46004000
direct allocation
page read and write
E60000
trusted library allocation
page read and write
41CD000
stack
page read and write
781000
unkown
page execute read
10A1000
heap
page read and write
2F57000
trusted library allocation
page read and write
3C294000
direct allocation
page read and write
69464000
unkown
page read and write
9D0000
heap
page read and write
4EA04000
direct allocation
page read and write
2B760000
direct allocation
page read and write
2B720000
direct allocation
page read and write
108D000
heap
page read and write
7D5000
unkown
page read and write
33230000
direct allocation
page read and write
10BE000
heap
page read and write
3D71000
trusted library allocation
page read and write
1416000
heap
page read and write
6CA000
unkown
page readonly
4C66C000
direct allocation
page read and write
3325C000
direct allocation
page read and write
2B71C000
direct allocation
page read and write
276C000
heap
page read and write
642F000
stack
page read and write
2C8D000
stack
page read and write
698C000
stack
page read and write
EBE000
stack
page read and write
113E000
stack
page read and write
33CD000
heap
page read and write
2B74C000
direct allocation
page read and write
68023000
unkown
page write copy
46008000
direct allocation
page read and write
5BD20000
direct allocation
page read and write
69476000
unkown
page read and write
2B780000
direct allocation
page read and write
37F0000
heap
page read and write
41F0000
direct allocation
page read and write
2B6C0000
direct allocation
page read and write
5BC60000
direct allocation
page read and write
332A8000
direct allocation
page read and write
303E000
stack
page read and write
10B6000
heap
page read and write
3328C000
direct allocation
page read and write
10D9000
heap
page read and write
3C284000
direct allocation
page read and write
2B754000
direct allocation
page read and write
3C254000
direct allocation
page read and write
E9B000
stack
page read and write
2EAF000
trusted library allocation
page read and write
ED6000
trusted library allocation
page execute and read and write
8E0000
unkown
page readonly
2D8F000
stack
page read and write
68251000
unkown
page execute read
2B66C000
direct allocation
page read and write
1116000
heap
page read and write
5EB0000
heap
page read and write
4C640000
direct allocation
page read and write
103E000
stack
page read and write
FFB000
heap
page read and write
3320C000
direct allocation
page read and write
F85000
heap
page read and write
3A2E000
stack
page read and write
105E000
heap
page read and write
2B720000
direct allocation
page read and write
54F0000
heap
page read and write
670000
unkown
page readonly
780000
unkown
page readonly
2B760000
direct allocation
page read and write
5BD00000
direct allocation
page read and write
376E000
stack
page read and write
75F000
stack
page read and write
EEB000
unkown
page write copy
487E000
stack
page read and write
2B764000
direct allocation
page read and write
2EA1000
trusted library allocation
page read and write
372F000
stack
page read and write
26AA000
heap
page read and write
4C6C4000
direct allocation
page read and write
E46000
heap
page read and write
5EF5000
heap
page read and write
1A0000
heap
page read and write
671000
unkown
page execute read
2B6F4000
direct allocation
page read and write
10D4000
heap
page read and write
37ED000
stack
page read and write
10D5000
heap
page read and write
1B0000
heap
page read and write
2B760000
direct allocation
page read and write
7C8000
unkown
page readonly
407F000
stack
page read and write
5BC98000
direct allocation
page read and write
4EA08000
direct allocation
page read and write
2B724000
direct allocation
page read and write
6B8000
unkown
page readonly
2EFA000
trusted library allocation
page read and write
E96000
heap
page read and write
4750000
heap
page read and write
68642000
unkown
page read and write
2F0E000
stack
page read and write
7DA000
unkown
page readonly
109D000
heap
page read and write
4330000
direct allocation
page read and write
2B6F4000
direct allocation
page read and write
1070000
heap
page read and write
500000
heap
page read and write
2B720000
direct allocation
page read and write
D32000
heap
page read and write
B63000
heap
page read and write
63B000
stack
page read and write
646E000
stack
page read and write
14DB000
heap
page read and write
F10000
heap
page read and write
2DBE000
stack
page read and write
73C000
stack
page read and write
1015000
heap
page read and write
4C6D0000
direct allocation
page read and write
2EC1000
trusted library allocation
page read and write
5EFA000
heap
page read and write
3EFC000
stack
page read and write
2B724000
direct allocation
page read and write
448E000
stack
page read and write
290B000
stack
page read and write
E64000
trusted library allocation
page read and write
5BCCC000
direct allocation
page read and write
10DC000
heap
page read and write
14FC000
heap
page read and write
7D5000
unkown
page write copy
10D2000
heap
page read and write
33278000
direct allocation
page read and write
68250000
unkown
page readonly
4270000
direct allocation
page read and write
42F0000
direct allocation
page read and write
FE6000
heap
page read and write
33268000
direct allocation
page read and write
3C250000
direct allocation
page read and write
624F000
stack
page read and write
2B6C8000
direct allocation
page read and write
4C601000
direct allocation
page read and write
7DA000
unkown
page readonly
5BC64000
direct allocation
page read and write
3C2C0000
direct allocation
page read and write
5BC94000
direct allocation
page read and write
497F000
stack
page read and write
36EC000
stack
page read and write
10CD000
heap
page read and write
2B70000
trusted library allocation
page read and write
2EFC000
trusted library allocation
page read and write
7D5000
unkown
page read and write
3C2B8000
direct allocation
page read and write
EEB000
trusted library allocation
page execute and read and write
2B74C000
direct allocation
page read and write
1070000
heap
page read and write
9E0000
heap
page read and write
26A1000
heap
page read and write
4C68C000
direct allocation
page read and write
10A1000
heap
page read and write
13C0000
heap
page read and write
2B67C000
direct allocation
page read and write
4C60C000
direct allocation
page read and write
EE5000
trusted library allocation
page execute and read and write
3C2B0000
direct allocation
page read and write
4170000
direct allocation
page read and write
2EE4000
trusted library allocation
page read and write
332AC000
direct allocation
page read and write
5134000
heap
page read and write
1040000
heap
page read and write
2B74C000
direct allocation
page read and write
118C000
stack
page read and write
104E000
heap
page read and write
EDC000
unkown
page readonly
29D0000
heap
page read and write
2B60C000
direct allocation
page read and write
62DF000
stack
page read and write
6803E000
unkown
page execute read
5BC01000
direct allocation
page read and write
6947E000
unkown
page execute read
B53000
heap
page read and write
2B74C000
direct allocation
page read and write
35EF000
stack
page read and write
1200000
heap
page read and write
2C4D000
stack
page read and write
2AE0000
heap
page read and write
54ED000
stack
page read and write
1410000
heap
page read and write
2B6A4000
direct allocation
page read and write
10CF000
heap
page read and write
2B6C0000
direct allocation
page read and write
7C8000
unkown
page readonly
2D60000
heap
page execute and read and write
F4E000
heap
page read and write
E90000
heap
page read and write
66B000
stack
page read and write
4C6C0000
direct allocation
page read and write
2920000
heap
page read and write
2B764000
direct allocation
page read and write
10DC000
heap
page read and write
2B780000
direct allocation
page read and write
7C8000
unkown
page readonly
30AE000
stack
page read and write
7D5000
unkown
page read and write
2C9E000
stack
page read and write
67B0000
heap
page read and write
5BD2C000
direct allocation
page read and write
3C260000
direct allocation
page read and write
2E9A000
trusted library allocation
page read and write
666E000
stack
page read and write
2B607000
direct allocation
page read and write
2877000
heap
page read and write
3C2D0000
direct allocation
page read and write
2B6C8000
direct allocation
page read and write
EE7000
trusted library allocation
page execute and read and write
EF0000
heap
page read and write
69463000
unkown
page write copy
2B70C000
direct allocation
page read and write
100E000
heap
page read and write
327F000
stack
page read and write
68C98000
unkown
page read and write
E80000
heap
page read and write
E20000
heap
page read and write
781000
unkown
page execute read
2B748000
direct allocation
page read and write
2B754000
direct allocation
page read and write
34EE000
stack
page read and write
781000
unkown
page execute read
68C82000
unkown
page read and write
688C000
stack
page read and write
2BA0000
heap
page read and write
3326C000
direct allocation
page read and write
1140000
heap
page read and write
33201000
direct allocation
page read and write
4C604000
direct allocation
page read and write
68041000
unkown
page execute read
6947D000
unkown
page read and write
B5A000
heap
page read and write
2B774000
direct allocation
page read and write
E60000
heap
page read and write
2AB8000
heap
page read and write
2F1E000
stack
page read and write
7D5000
unkown
page write copy
5EC7000
heap
page read and write
2B724000
direct allocation
page read and write
7DA000
unkown
page readonly
F10000
heap
page read and write
10D8000
heap
page read and write
6C5000
unkown
page write copy
F40000
heap
page read and write
306C000
stack
page read and write
656E000
stack
page read and write
7DA000
unkown
page readonly
632E000
stack
page read and write
DF6000
heap
page read and write
1003000
heap
page read and write
7DA000
unkown
page readonly
10D2000
heap
page read and write
6CA000
unkown
page readonly
EAD000
heap
page read and write
68022000
unkown
page read and write
4C65C000
direct allocation
page read and write
4840000
remote allocation
page read and write
68042000
unkown
page readonly
E6D000
trusted library allocation
page execute and read and write
2B760000
direct allocation
page read and write
68890000
unkown
page readonly
EA0000
unkown
page readonly
5BD0C000
direct allocation
page read and write
33288000
direct allocation
page read and write
68C83000
unkown
page write copy
107C000
heap
page read and write
2B754000
direct allocation
page read and write
111B000
stack
page read and write
49FE000
heap
page read and write
4760000
heap
page read and write
108A000
heap
page read and write
7C8000
unkown
page readonly
EC9000
trusted library allocation
page read and write
75E000
stack
page read and write
5BD00000
direct allocation
page read and write
1110000
heap
page read and write
5BC70000
direct allocation
page read and write
5BC26000
direct allocation
page read and write
F9C000
stack
page read and write
2B700000
direct allocation
page read and write
69481000
unkown
page execute read
4C628000
direct allocation
page read and write
5B2D000
stack
page read and write
2B720000
direct allocation
page read and write
652F000
stack
page read and write
2FE1000
trusted library allocation
page read and write
685BC000
unkown
page readonly
2B724000
direct allocation
page read and write
3C238000
direct allocation
page read and write
475C000
heap
page read and write
ECE000
stack
page read and write
FF6000
heap
page read and write
3010000
unkown
page readonly
1300000
heap
page read and write
3C214000
direct allocation
page read and write
5BCC4000
direct allocation
page read and write
670000
unkown
page readonly
E77000
heap
page read and write
7DA000
unkown
page readonly
9A0000
heap
page read and write
10BD000
heap
page read and write
68BFC000
unkown
page readonly
2B71C000
direct allocation
page read and write
6C5000
unkown
page read and write
5BC38000
direct allocation
page read and write
EC0000
trusted library allocation
page read and write
69071000
unkown
page execute read
317E000
stack
page read and write
E30000
heap
page read and write
EEB000
unkown
page read and write
9B0000
heap
page read and write
B3E000
heap
page read and write
69070000
unkown
page readonly
123E000
stack
page read and write
781000
unkown
page execute read
2B6B0000
direct allocation
page read and write
2B724000
direct allocation
page read and write
2F3C000
trusted library allocation
page read and write
614E000
stack
page read and write
EA1000
unkown
page execute read
33258000
direct allocation
page read and write
2B74C000
direct allocation
page read and write
2B754000
direct allocation
page read and write
780000
unkown
page readonly
7C8000
unkown
page readonly
76C000
stack
page read and write
2FDC000
trusted library allocation
page read and write
2B678000
direct allocation
page read and write
E90000
heap
page read and write
49FC000
heap
page read and write
10CD000
heap
page read and write
6C4E000
stack
page read and write
67E0000
trusted library allocation
page read and write
33214000
direct allocation
page read and write
83C000
stack
page read and write
4C614000
direct allocation
page read and write
ED2000
trusted library allocation
page read and write
29BF000
stack
page read and write
69462000
unkown
page read and write
2D9F000
stack
page read and write
B63000
heap
page read and write
63E000
stack
page read and write
B60000
heap
page read and write
2B774000
direct allocation
page read and write
2B700000
direct allocation
page read and write
2EDE000
stack
page read and write
8E2000
unkown
page readonly
2B6E0000
direct allocation
page read and write
10BD000
heap
page read and write
F3E000
stack
page read and write
2DDE000
stack
page read and write
10CD000
heap
page read and write
430D000
stack
page read and write
5BCC4000
direct allocation
page read and write
1079000
heap
page read and write
4C63C000
direct allocation
page read and write
5EC4000
heap
page read and write
50F0000
heap
page read and write
5BC84000
direct allocation
page read and write
4C630000
direct allocation
page read and write
2FA7000
trusted library allocation
page read and write
781000
unkown
page execute read
5BC48000
direct allocation
page read and write
2B74C000
direct allocation
page read and write
67C30000
unkown
page readonly
2C50000
heap
page read and write
5BCEC000
direct allocation
page read and write
4C6A0000
direct allocation
page read and write
2FBC000
trusted library allocation
page read and write
2B6C0000
direct allocation
page read and write
2B760000
direct allocation
page read and write
5BCA0000
direct allocation
page read and write
2B6B8000
direct allocation
page read and write
93C000
stack
page read and write
4C6B8000
direct allocation
page read and write
5BD30000
direct allocation
page read and write
B7B000
heap
page read and write
FCB000
heap
page read and write
2B630000
direct allocation
page read and write
10A1000
heap
page read and write
3C201000
direct allocation
page read and write
B6C000
heap
page read and write
6865E000
unkown
page execute read
10C5000
heap
page read and write
3C2C4000
direct allocation
page read and write
144C000
stack
page read and write
2B718000
direct allocation
page read and write
140E000
stack
page read and write
5500000
heap
page read and write
There are 630 hidden memdumps, click here to show them.