IOC Report
setup.exe

loading gif

Files

File Path
Type
Category
Malicious
setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\putty[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\1000009001\putty.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Tasks\explorti.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\setup.exe
"C:\Users\user\Desktop\setup.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
"C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\1000009001\putty.exe
"C:\Users\user\AppData\Local\Temp\1000009001\putty.exe"

URLs

Name
IP
Malicious
http://185.215.113.19/Vi9leo/index.phpbS
unknown
malicious
http://185.215.113.19/Vi9leo/index.php
185.215.113.19
malicious
http://185.215.113.19/Vi9leo/index.php?S
unknown
http://185.215.113.19/Vi9leo/index.phpsuitev
unknown
https://sectigo.com/CPS0
unknown
http://185.215.113.19/Vi9leo/index.phpspace
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
https://the.earth.li/l9
unknown
http://185.215.113.19/Vi9leo/index.phpuC:
unknown
http://185.215.113.19/Vi9leo/index.php-3693405117-CoM3y
unknown
http://185.215.113.19/Vi9leo/index.php;Z
unknown
http://185.215.113.19/Vi9leo/index.php=Z
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
http://185.215.113.19/Vi9leo/index.phpePuTTY4
unknown
http://185.215.113.19/Vi9leo/index.phpSZ
unknown
https://the.earth.li/~sgtatham/putty/0.81/w32/putty.exeg
unknown
http://185.215.113.19/Vi9leo/index.phpLocal
unknown
http://185.215.113.19/Vi9leo/index.phpUZ
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
https://the.earth.li/~sgtatham/putty/0.81/w32/putty.exeFq
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://185.215.113.19/Vi9leo/index.phpCS
unknown
http://185.215.113.19/Vi9leo/index.phpc3
unknown
http://185.215.113.19/Vi9leo/index.phplp)
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
http://185.215.113.19/Vi9leo/index.phpcZ
unknown
https://the.earth.li/~sgtatham/putty/0.81/w32/putty.exev
unknown
https://the.earth.li/~sgtatham/putty/latest/w32/putty.exes.dll.
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
https://the.earth.li/~sgtatham/putty/latest/w32/putty.exeNa
unknown
http://185.215.113.19/Vi9leo/index.phptS
unknown
https://the.earth.li/~sgtatham/putty/latest/w32/putty.exe6789
unknown
https://the.earth.li/~sgtatham/putty/latest/w32/putty.exe
93.93.131.124
http://185.215.113.19/Vi9leo/index.php000009001
unknown
https://the.earth.li/
unknown
http://185.215.113.19/Vi9leo/index.phpAppDataBP1
unknown
http://185.215.113.19/Vi9leo/index.phplogin
unknown
https://the.earth.li/~sgtatham/putty/0.81/w32/putty.exe
93.93.131.124
https://the.earth.li/~sgtatham/putty/0.81/w32/putty.exeM
unknown
There are 32 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
the.earth.li
93.93.131.124

IPs

IP
Domain
Country
Malicious
185.215.113.19
unknown
Portugal
malicious
93.93.131.124
the.earth.li
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
281000
unkown
page execute and read and write
malicious
281000
unkown
page execute and read and write
malicious
321000
unkown
page execute and read and write
malicious
5300000
direct allocation
page read and write
malicious
4A40000
direct allocation
page read and write
malicious
49A0000
direct allocation
page read and write
malicious
3150000
direct allocation
page read and write
BF4000
heap
page read and write
E8E000
heap
page read and write
4521000
heap
page read and write
5361000
direct allocation
page read and write
D89000
heap
page read and write
6571000
heap
page read and write
287F000
stack
page read and write
3150000
direct allocation
page read and write
45C1000
heap
page read and write
446F000
stack
page read and write
4BA0000
direct allocation
page execute and read and write
1494000
heap
page read and write
4521000
heap
page read and write
35AE000
stack
page read and write
BF4000
heap
page read and write
45C0000
heap
page read and write
1494000
heap
page read and write
4521000
heap
page read and write
4521000
heap
page read and write
C8B000
stack
page read and write
F35000
heap
page read and write
E8A000
heap
page read and write
616E000
stack
page read and write
281000
unkown
page execute and write copy
4521000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
BF4000
heap
page read and write
1494000
heap
page read and write
4521000
heap
page read and write
BF4000
heap
page read and write
3D9F000
stack
page read and write
1494000
heap
page read and write
55B0000
remote allocation
page read and write
36FE000
stack
page read and write
58E000
unkown
page execute and write copy
4C00000
direct allocation
page execute and read and write
4BB0000
direct allocation
page execute and read and write
45C1000
heap
page read and write
2EB000
unkown
page execute and read and write
293E000
stack
page read and write
45C1000
heap
page read and write
145E000
stack
page read and write
4521000
heap
page read and write
E30000
direct allocation
page read and write
FA0000
heap
page read and write
45E0000
heap
page read and write
4521000
heap
page read and write
E30000
direct allocation
page read and write
4EFE000
stack
page read and write
437E000
stack
page read and write
396E000
stack
page read and write
B65000
heap
page read and write
7BC000
stack
page read and write
4521000
heap
page read and write
45D0000
heap
page read and write
3150000
direct allocation
page read and write
30CE000
stack
page read and write
4A01000
direct allocation
page read and write
45C1000
heap
page read and write
4E71000
heap
page read and write
BF4000
heap
page read and write
4A8B000
stack
page read and write
356F000
stack
page read and write
EF2000
heap
page read and write
311F000
stack
page read and write
3150000
direct allocation
page read and write
503E000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
329E000
stack
page read and write
F7B000
heap
page read and write
45C1000
heap
page read and write
36BF000
stack
page read and write
D11000
heap
page read and write
4960000
trusted library allocation
page read and write
415F000
stack
page read and write
5490000
direct allocation
page execute and read and write
E30000
direct allocation
page read and write
4531000
heap
page read and write
7C9000
unkown
page execute and read and write
F66000
heap
page read and write
7CB000
unkown
page execute and write copy
28BE000
stack
page read and write
45C1000
heap
page read and write
5520000
direct allocation
page execute and read and write
AFB000
stack
page read and write
41EF000
stack
page read and write
3FAE000
stack
page read and write
729000
unkown
page execute and read and write
45C1000
heap
page read and write
307F000
stack
page read and write
F3D000
heap
page read and write
37CE000
stack
page read and write
4C70000
direct allocation
page execute and read and write
45C1000
heap
page read and write
285E000
stack
page read and write
BF4000
heap
page read and write
32FF000
stack
page read and write
68EC000
stack
page read and write
29B0000
heap
page read and write
3E11000
heap
page read and write
2E9000
unkown
page read and write
4521000
heap
page read and write
14AE000
heap
page read and write
45C1000
heap
page read and write
4520000
heap
page read and write
4521000
heap
page read and write
BF4000
heap
page read and write
4521000
heap
page read and write
4FFF000
stack
page read and write
63EE000
stack
page read and write
CA0000
direct allocation
page read and write
4521000
heap
page read and write
D8E000
heap
page read and write
94B000
stack
page read and write
45C1000
heap
page read and write
B20000
heap
page read and write
45C1000
heap
page read and write
E8B000
stack
page read and write
BF4000
heap
page read and write
2860000
heap
page read and write
40FE000
stack
page read and write
42DE000
stack
page read and write
45C1000
heap
page read and write
CB0000
heap
page read and write
55EE000
stack
page read and write
616000
unkown
page execute and read and write
729000
unkown
page execute and read and write
394E000
stack
page read and write
4D7B000
stack
page read and write
45C1000
heap
page read and write
BF4000
heap
page read and write
4521000
heap
page read and write
4521000
heap
page read and write
1150000
direct allocation
page read and write
64EF000
stack
page read and write
BF4000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
2E9000
unkown
page write copy
4521000
heap
page read and write
4B30000
direct allocation
page execute and read and write
3E3E000
stack
page read and write
40EE000
stack
page read and write
4521000
heap
page read and write
5490000
direct allocation
page execute and read and write
58E000
unkown
page execute and read and write
45C1000
heap
page read and write
626F000
stack
page read and write
52AF000
stack
page read and write
CA0000
direct allocation
page read and write
CA0000
direct allocation
page read and write
45C1000
heap
page read and write
45C1000
heap
page read and write
2950000
heap
page read and write
BF4000
heap
page read and write
4521000
heap
page read and write
4521000
heap
page read and write
E30000
direct allocation
page read and write
45C1000
heap
page read and write
4B70000
direct allocation
page execute and read and write
436E000
stack
page read and write
1160000
heap
page read and write
BF4000
heap
page read and write
D45000
heap
page read and write
299E000
stack
page read and write
D3C000
heap
page read and write
4B60000
direct allocation
page execute and read and write
FA0000
heap
page read and write
BCE000
stack
page read and write
54A000
unkown
page execute and read and write
62E000
unkown
page execute and write copy
4521000
heap
page read and write
45C1000
heap
page read and write
1150000
direct allocation
page read and write
4521000
heap
page read and write
4521000
heap
page read and write
45C1000
heap
page read and write
1494000
heap
page read and write
499E000
stack
page read and write
D8E000
heap
page read and write
45C1000
heap
page read and write
4C30000
direct allocation
page execute and read and write
B67000
heap
page read and write
54D0000
direct allocation
page execute and read and write
CA0000
direct allocation
page read and write
BD0000
heap
page read and write
357F000
stack
page read and write
17AE000
stack
page read and write
107E000
stack
page read and write
3150000
direct allocation
page read and write
FA0000
heap
page read and write
423E000
stack
page read and write
3E7E000
stack
page read and write
2E2000
unkown
page execute and read and write
4521000
heap
page read and write
4521000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
BF4000
heap
page read and write
6510000
heap
page read and write
4521000
heap
page read and write
CA0000
direct allocation
page read and write
4A40000
direct allocation
page read and write
401F000
stack
page read and write
58E000
unkown
page execute and write copy
2CBF000
stack
page read and write
2FDF000
stack
page read and write
4A40000
direct allocation
page read and write
3A1E000
stack
page read and write
5460000
direct allocation
page execute and read and write
2990000
heap
page read and write
28A0000
heap
page read and write
28FE000
stack
page read and write
58B0000
heap
page read and write
7E5000
stack
page read and write
3150000
direct allocation
page read and write
E30000
direct allocation
page read and write
3ABE000
stack
page read and write
6026000
heap
page read and write
31FE000
stack
page read and write
351E000
stack
page read and write
D89000
heap
page read and write
1494000
heap
page read and write
3150000
direct allocation
page read and write
D2A000
heap
page read and write
3150000
direct allocation
page read and write
4521000
heap
page read and write
4521000
heap
page read and write
F14000
heap
page read and write
14AA000
heap
page read and write
BF4000
heap
page read and write
4521000
heap
page read and write
EF6000
heap
page read and write
4521000
heap
page read and write
4E71000
heap
page read and write
3A7F000
stack
page read and write
3A4F000
stack
page read and write
4521000
heap
page read and write
13E0000
heap
page read and write
346F000
stack
page read and write
585D000
stack
page read and write
45C1000
heap
page read and write
3F6F000
stack
page read and write
2970000
unkown
page read and write
C69000
unkown
page readonly
BF4000
heap
page read and write
66D4000
heap
page read and write
576000
unkown
page execute and read and write
389000
unkown
page read and write
EBA000
heap
page read and write
CFA000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
45C1000
heap
page read and write
3150000
direct allocation
page read and write
4AA1000
direct allocation
page read and write
BF4000
heap
page read and write
CBB000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
4BD0000
direct allocation
page execute and read and write
4521000
heap
page read and write
B70000
heap
page read and write
55B0000
remote allocation
page read and write
5300000
direct allocation
page read and write
4521000
heap
page read and write
54C0000
direct allocation
page execute and read and write
EF3000
heap
page read and write
F87000
heap
page read and write
E30000
direct allocation
page read and write
4521000
heap
page read and write
422E000
stack
page read and write
657E000
heap
page read and write
45C1000
heap
page read and write
BF4000
heap
page read and write
4521000
heap
page read and write
397E000
stack
page read and write
45C6000
heap
page read and write
451F000
stack
page read and write
4521000
heap
page read and write
3EDF000
stack
page read and write
D50000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
BF4000
heap
page read and write
45C1000
heap
page read and write
45C1000
heap
page read and write
4B10000
direct allocation
page execute and read and write
1480000
heap
page read and write
40AF000
stack
page read and write
280000
unkown
page read and write
9B0000
heap
page read and write
CA2000
unkown
page write copy
51AE000
stack
page read and write
4521000
heap
page read and write
F66000
heap
page read and write
45C1000
heap
page read and write
365E000
stack
page read and write
55B0000
remote allocation
page read and write
45C1000
heap
page read and write
D87000
heap
page read and write
B60000
heap
page read and write
1494000
heap
page read and write
B50000
heap
page read and write
4521000
heap
page read and write
D4C000
heap
page read and write
BF4000
heap
page read and write
5500000
direct allocation
page execute and read and write
CA0000
direct allocation
page read and write
4C10000
direct allocation
page execute and read and write
37FF000
stack
page read and write
F66000
heap
page read and write
310E000
stack
page read and write
4521000
heap
page read and write
BF4000
heap
page read and write
58F000
unkown
page execute and write copy
2E3E000
stack
page read and write
BF4000
heap
page read and write
296E000
stack
page read and write
4521000
heap
page read and write
326F000
stack
page read and write
E30000
heap
page read and write
45C1000
heap
page read and write
472E000
stack
page read and write
40BF000
stack
page read and write
E1E000
stack
page read and write
BF4000
heap
page read and write
D50000
heap
page read and write
49AE000
stack
page read and write
4C40000
direct allocation
page execute and read and write
837E000
stack
page read and write
3F1E000
stack
page read and write
4B40000
direct allocation
page execute and read and write
54E0000
direct allocation
page execute and read and write
BF4000
heap
page read and write
4521000
heap
page read and write
45C1000
heap
page read and write
3150000
direct allocation
page read and write
45C1000
heap
page read and write
45C1000
heap
page read and write
45C1000
heap
page read and write
F7F000
stack
page read and write
45C1000
heap
page read and write
3F7F000
stack
page read and write
2C5F000
stack
page read and write
4A00000
trusted library allocation
page read and write
4521000
heap
page read and write
4521000
heap
page read and write
62AE000
stack
page read and write
58E000
unkown
page execute and read and write
447F000
stack
page read and write
34DF000
stack
page read and write
5720000
heap
page read and write
45C1000
heap
page read and write
4C2E000
stack
page read and write
52FD000
stack
page read and write
2F7E000
stack
page read and write
3BAF000
stack
page read and write
486E000
stack
page read and write
4521000
heap
page read and write
45C1000
heap
page read and write
5724000
heap
page read and write
482F000
stack
page read and write
3AAE000
stack
page read and write
45C1000
heap
page read and write
2EDE000
stack
page read and write
4521000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
4521000
heap
page read and write
1494000
heap
page read and write
4B90000
direct allocation
page execute and read and write
5300000
direct allocation
page read and write
E90000
heap
page read and write
E45000
heap
page read and write
45C1000
heap
page read and write
4521000
heap
page read and write
4BDC000
stack
page read and write
FA0000
heap
page read and write
4521000
heap
page read and write
28A5000
heap
page read and write
BF4000
heap
page read and write
CA0000
direct allocation
page read and write
320000
unkown
page readonly
4521000
heap
page read and write
45C1000
heap
page read and write
29BB000
heap
page read and write
510000
unkown
page execute and read and write
4521000
heap
page read and write
E30000
direct allocation
page read and write
4521000
heap
page read and write
4AAF000
stack
page read and write
4521000
heap
page read and write
280000
unkown
page readonly
45C1000
heap
page read and write
4521000
heap
page read and write
FA0000
heap
page read and write
45C1000
heap
page read and write
45C1000
heap
page read and write
470000
unkown
page execute and read and write
4521000
heap
page read and write
3A8E000
stack
page read and write
389F000
stack
page read and write
4521000
heap
page read and write
BF4000
heap
page read and write
4C50000
direct allocation
page execute and read and write
5EA000
unkown
page execute and read and write
BF4000
heap
page read and write
392F000
stack
page read and write
3FBE000
stack
page read and write
85BC000
stack
page read and write
CAA000
unkown
page readonly
39DF000
stack
page read and write
72B000
unkown
page execute and write copy
CA0000
direct allocation
page read and write
389000
unkown
page write copy
4521000
heap
page read and write
6570000
heap
page read and write
4521000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
2E9000
unkown
page read and write
D1C000
heap
page read and write
3DDE000
stack
page read and write
4B10000
direct allocation
page execute and read and write
D4E000
heap
page read and write
4521000
heap
page read and write
2E9000
unkown
page write copy
E30000
direct allocation
page read and write
49DE000
stack
page read and write
4521000
heap
page read and write
4521000
heap
page read and write
38DE000
stack
page read and write
544F000
stack
page read and write
4521000
heap
page read and write
45C1000
heap
page read and write
4B00000
direct allocation
page execute and read and write
F87000
heap
page read and write
DAD000
heap
page read and write
3150000
direct allocation
page read and write
3B5E000
stack
page read and write
4521000
heap
page read and write
4ADF000
stack
page read and write
2D9E000
stack
page read and write
F08000
heap
page read and write
E80000
heap
page read and write
45C1000
heap
page read and write
127C000
stack
page read and write
45C1000
heap
page read and write
66B0000
heap
page read and write
4A00000
heap
page read and write
45C1000
heap
page read and write
343F000
stack
page read and write
2CFE000
stack
page read and write
4DBE000
stack
page read and write
383E000
stack
page read and write
1150000
direct allocation
page read and write
6020000
heap
page read and write
4E6F000
stack
page read and write
4521000
heap
page read and write
5470000
direct allocation
page execute and read and write
339F000
stack
page read and write
4BF0000
direct allocation
page execute and read and write
62E000
unkown
page execute and read and write
380E000
stack
page read and write
1494000
heap
page read and write
AFC000
stack
page read and write
45C1000
heap
page read and write
4521000
heap
page read and write
BF4000
heap
page read and write
14A0000
heap
page read and write
4521000
heap
page read and write
3E10000
heap
page read and write
5721000
heap
page read and write
2994000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
3D3E000
stack
page read and write
F7B000
heap
page read and write
37EF000
stack
page read and write
3BBF000
stack
page read and write
E30000
direct allocation
page read and write
45AE000
stack
page read and write
F91000
heap
page read and write
BA1000
unkown
page execute read
4521000
heap
page read and write
45C1000
heap
page read and write
BF4000
heap
page read and write
45C1000
heap
page read and write
CFA000
stack
page read and write
4521000
heap
page read and write
C90000
heap
page read and write
1490000
heap
page read and write
429F000
stack
page read and write
B8E000
stack
page read and write
4B10000
direct allocation
page execute and read and write
FA0000
heap
page read and write
4BEF000
stack
page read and write
BF4000
heap
page read and write
D2A000
heap
page read and write
4521000
heap
page read and write
405E000
stack
page read and write
3160000
heap
page read and write
5490000
direct allocation
page execute and read and write
FA7000
heap
page read and write
45C1000
heap
page read and write
F93000
heap
page read and write
F12000
heap
page read and write
44BE000
stack
page read and write
EB3000
heap
page read and write
291F000
stack
page read and write
C4E000
stack
page read and write
4DFE000
stack
page read and write
2E2000
unkown
page execute and read and write
4521000
heap
page read and write
3BEE000
stack
page read and write
4B20000
direct allocation
page execute and read and write
4521000
heap
page read and write
107F000
stack
page read and write
3BFE000
stack
page read and write
56EF000
stack
page read and write
BA0000
unkown
page readonly
45C1000
heap
page read and write
4521000
heap
page read and write
CF5000
heap
page read and write
4AEE000
stack
page read and write
4521000
heap
page read and write
4521000
heap
page read and write
5490000
direct allocation
page execute and read and write
4521000
heap
page read and write
62F000
unkown
page execute and write copy
F2E000
heap
page read and write
3CEF000
stack
page read and write
54A000
unkown
page execute and read and write
4521000
heap
page read and write
54A0000
direct allocation
page execute and read and write
D71000
heap
page read and write
35BE000
stack
page read and write
6580000
heap
page read and write
29B7000
heap
page read and write
45C1000
heap
page read and write
3CFF000
stack
page read and write
D42000
heap
page read and write
F8D000
heap
page read and write
18AF000
stack
page read and write
382000
unkown
page execute and read and write
54F0000
direct allocation
page execute and read and write
BA0000
unkown
page readonly
2ABF000
stack
page read and write
67B3000
heap
page read and write
BF4000
heap
page read and write
CA4000
unkown
page read and write
CA0000
direct allocation
page read and write
827E000
stack
page read and write
321000
unkown
page execute and write copy
45C1000
heap
page read and write
3150000
direct allocation
page read and write
3E2F000
stack
page read and write
325F000
stack
page read and write
EC9000
heap
page read and write
BF4000
heap
page read and write
4521000
heap
page read and write
4CBF000
stack
page read and write
E30000
direct allocation
page read and write
45C1000
heap
page read and write
4521000
heap
page read and write
CA0000
direct allocation
page read and write
33DE000
stack
page read and write
BF4000
heap
page read and write
53FD000
stack
page read and write
333E000
stack
page read and write
45C1000
heap
page read and write
580000
unkown
page execute and read and write
BF4000
heap
page read and write
4521000
heap
page read and write
4521000
heap
page read and write
EB0000
heap
page read and write
5490000
direct allocation
page execute and read and write
45C1000
heap
page read and write
BF4000
heap
page read and write
45C1000
heap
page read and write
6025000
heap
page read and write
BF0000
heap
page read and write
45C1000
heap
page read and write
BF4000
heap
page read and write
45C1000
heap
page read and write
45C1000
heap
page read and write
D45000
heap
page read and write
BF4000
heap
page read and write
5510000
direct allocation
page execute and read and write
4D2F000
stack
page read and write
4B8F000
stack
page read and write
393F000
stack
page read and write
45C1000
heap
page read and write
3C5F000
stack
page read and write
C69000
unkown
page readonly
4521000
heap
page read and write
2DFF000
stack
page read and write
4521000
heap
page read and write
3B8F000
stack
page read and write
4521000
heap
page read and write
3150000
direct allocation
page read and write
4B10000
direct allocation
page execute and read and write
31BF000
stack
page read and write
45C1000
heap
page read and write
534E000
stack
page read and write
4521000
heap
page read and write
FA7000
heap
page read and write
295E000
stack
page read and write
470000
unkown
page execute and read and write
BA1000
unkown
page execute read
2E9F000
stack
page read and write
45C1000
heap
page read and write
1494000
heap
page read and write
3150000
direct allocation
page read and write
2ED0000
trusted library allocation
page read and write
308E000
stack
page read and write
29BD000
heap
page read and write
CAA000
unkown
page readonly
2954000
heap
page read and write
36AF000
stack
page read and write
45C1000
heap
page read and write
281000
unkown
page execute and write copy
45C1000
heap
page read and write
D3C000
heap
page read and write
347E000
stack
page read and write
1494000
heap
page read and write
496F000
stack
page read and write
361F000
stack
page read and write
BF4000
heap
page read and write
52B0000
trusted library allocation
page read and write
4EBF000
stack
page read and write
CA0000
direct allocation
page read and write
45EE000
stack
page read and write
4B80000
direct allocation
page execute and read and write
5480000
direct allocation
page execute and read and write
4521000
heap
page read and write
45C1000
heap
page read and write
5300000
direct allocation
page read and write
43DF000
stack
page read and write
45C1000
heap
page read and write
4521000
heap
page read and write
EF2000
heap
page read and write
45C1000
heap
page read and write
4521000
heap
page read and write
E30000
direct allocation
page read and write
5722000
heap
page read and write
4521000
heap
page read and write
4A40000
direct allocation
page read and write
513F000
stack
page read and write
67B0000
heap
page read and write
432F000
stack
page read and write
BF4000
heap
page read and write
1494000
heap
page read and write
3167000
heap
page read and write
379E000
stack
page read and write
13F0000
heap
page read and write
F7B000
heap
page read and write
4521000
heap
page read and write
390F000
stack
page read and write
375F000
stack
page read and write
F66000
heap
page read and write
4521000
heap
page read and write
CA2000
unkown
page read and write
E20000
heap
page read and write
2B5F000
stack
page read and write
E30000
direct allocation
page read and write
66B1000
heap
page read and write
3E6E000
stack
page read and write
44AE000
stack
page read and write
46EF000
stack
page read and write
41FF000
stack
page read and write
69EC000
stack
page read and write
2F3F000
stack
page read and write
4521000
heap
page read and write
BF4000
heap
page read and write
E40000
heap
page read and write
F0E000
heap
page read and write
3B1F000
stack
page read and write
3D2E000
stack
page read and write
4521000
heap
page read and write
2BBF000
stack
page read and write
45C1000
heap
page read and write
4521000
heap
page read and write
72B000
unkown
page execute and write copy
D83000
heap
page read and write
543D000
stack
page read and write
EAF000
heap
page read and write
315E000
stack
page read and write
F7D000
heap
page read and write
441E000
stack
page read and write
5ACE000
unkown
page read and write
BF4000
heap
page read and write
30BE000
stack
page read and write
4C20000
direct allocation
page execute and read and write
45C1000
heap
page read and write
BF4000
heap
page read and write
4D6E000
stack
page read and write
36EE000
stack
page read and write
2890000
heap
page read and write
D42000
heap
page read and write
CA0000
direct allocation
page read and write
3A6F000
stack
page read and write
4521000
heap
page read and write
4521000
heap
page read and write
1494000
heap
page read and write
9C0000
heap
page read and write
E60000
heap
page read and write
433F000
stack
page read and write
2A5F000
stack
page read and write
2EB000
unkown
page execute and read and write
2D5F000
stack
page read and write
419E000
stack
page read and write
176F000
stack
page read and write
1494000
heap
page read and write
45BF000
stack
page read and write
4B50000
direct allocation
page execute and read and write
4521000
heap
page read and write
BF4000
heap
page read and write
38B000
unkown
page execute and read and write
45C1000
heap
page read and write
4AF0000
direct allocation
page execute and read and write
6580000
heap
page read and write
4521000
heap
page read and write
336F000
stack
page read and write
4521000
heap
page read and write
2A9E000
stack
page read and write
4521000
heap
page read and write
580000
unkown
page execute and read and write
4C60000
direct allocation
page execute and read and write
4B10000
direct allocation
page execute and read and write
E1E000
stack
page read and write
45C1000
heap
page read and write
E30000
direct allocation
page read and write
4521000
heap
page read and write
137D000
stack
page read and write
1494000
heap
page read and write
576000
unkown
page execute and read and write
280000
unkown
page read and write
4521000
heap
page read and write
45C1000
heap
page read and write
D50000
heap
page read and write
45C1000
heap
page read and write
1167000
heap
page read and write
F7B000
heap
page read and write
28A9000
heap
page read and write
CA0000
direct allocation
page read and write
4521000
heap
page read and write
382E000
stack
page read and write
320000
unkown
page read and write
4CFE000
stack
page read and write
BF4000
heap
page read and write
553E000
stack
page read and write
45C1000
heap
page read and write
45C1000
heap
page read and write
301E000
stack
page read and write
84BB000
stack
page read and write
5490000
direct allocation
page execute and read and write
4521000
heap
page read and write
4E70000
heap
page read and write
280000
unkown
page readonly
4521000
heap
page read and write
4521000
heap
page read and write
E30000
direct allocation
page read and write
620000
unkown
page execute and read and write
58F000
unkown
page execute and write copy
4521000
heap
page read and write
BF4000
heap
page read and write
4521000
heap
page read and write
CA0000
direct allocation
page read and write
4521000
heap
page read and write
54B0000
direct allocation
page execute and read and write
4521000
heap
page read and write
63AF000
stack
page read and write
4E71000
heap
page read and write
5530000
direct allocation
page execute and read and write
4521000
heap
page read and write
D6D000
heap
page read and write
3C9E000
stack
page read and write
4B10000
direct allocation
page execute and read and write
D50000
heap
page read and write
314E000
stack
page read and write
4521000
heap
page read and write
F7B000
heap
page read and write
There are 773 hidden memdumps, click here to show them.