IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206/405117-2476756634-1003bO
unknown
http://crl.micy1D
unknown
http://185.215.113.16/S/-3
unknown
https://cook-rain.sbs/apiecked
unknown
https://cook-rain.sbs/;
unknown
https://cook-rain.sbs/apiC
unknown
http://185.215.113.16/7J
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.16/off/def.exeO
unknown
http://185.215.113.16/steam/random.exebKit/537.36
unknown
https://cook-rain.sbs/api=
unknown
peepburry828.sbs
http://185.215.113.206/ntdesk
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.16/tp
unknown
http://185.215.113.206/c4becf79229cb002.php?#
unknown
http://185.215.113.206/C
unknown
p10tgrace.sbs
https://support.mozilla.org/products/firefoxgro.all
unknown
processhol.sbs
185.215.113.206/c4becf79229cb002.php
http://185.215.113.2069
unknown
https://cook-rain.sbs/apix
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://cook-rain.sbs/api
188.114.97.3
http://185.215.113.16/8L$3
unknown
https://cook-rain.sbs/apiq
unknown
http://185.215.113.16/steam/random.exe
unknown
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.16/x4e3
unknown
https://cook-rain.sbs/
unknown
https://cook-rain.sbs/v1=
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://185.215.113.206/c4becf79229cb002.php/
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
p3ar11fter.sbs
https://www.ecosia.org/newtab/
unknown
http://185.215.113.206/i
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.215.113.206/c4becf79229cb002.php:
unknown
https://cook-rain.sbs/on
unknown
http://185.215.113.16/zwn35
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
http://185.215.113.16/qd#3
unknown
http://185.215.113.16/off/def.exe
unknown
http://185.215.113.206
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://cook-rain.sbs/D(
unknown
There are 45 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cook-rain.sbs
188.114.97.3

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious
188.114.97.3
cook-rain.sbs
European Union
185.215.113.16
unknown
Portugal

Memdumps

Base Address
Regiontype
Protect
Malicious
795000
heap
page read and write
malicious
5BD1000
trusted library allocation
page execute and read and write
malicious
80B0000
direct allocation
page read and write
malicious
710000
heap
page read and write
54AA000
trusted library allocation
page read and write
5561000
trusted library allocation
page read and write
5A10000
trusted library allocation
page read and write
7FC000
heap
page read and write
54AB000
trusted library allocation
page read and write
38BE000
stack
page read and write
80B000
heap
page read and write
548B000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
803000
heap
page read and write
548B000
trusted library allocation
page read and write
4501000
heap
page read and write
54BB000
trusted library allocation
page read and write
5492000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
5763000
trusted library allocation
page read and write
57E0000
direct allocation
page read and write
590D000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
54AA000
trusted library allocation
page read and write
54AA000
trusted library allocation
page read and write
59A5000
trusted library allocation
page read and write
548B000
trusted library allocation
page read and write
4B50000
direct allocation
page execute and read and write
5499000
trusted library allocation
page read and write
60C4000
trusted library allocation
page execute and read and write
54FB000
trusted library allocation
page read and write
57C0000
direct allocation
page read and write
3B3E000
stack
page read and write
808000
heap
page read and write
5482000
trusted library allocation
page read and write
54C2000
trusted library allocation
page read and write
5482000
trusted library allocation
page read and write
5A46000
trusted library allocation
page read and write
8230000
direct allocation
page execute and read and write
2FBF000
stack
page read and write
54AB000
trusted library allocation
page read and write
7EC000
heap
page read and write
662F000
stack
page read and write
5568000
trusted library allocation
page read and write
5461000
trusted library allocation
page read and write
6B2F000
stack
page read and write
D5A000
unkown
page execute and read and write
9CE000
stack
page read and write
5769000
trusted library allocation
page read and write
761000
heap
page read and write
549A000
trusted library allocation
page read and write
7E1000
heap
page read and write
547A000
trusted library allocation
page read and write
5482000
trusted library allocation
page read and write
57C0000
direct allocation
page read and write
8230000
direct allocation
page execute and read and write
54B2000
trusted library allocation
page read and write
590B000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
7FA000
heap
page read and write
73C8D000
unkown
page read and write
D16000
unkown
page execute and read and write
7EC000
heap
page read and write
752F000
stack
page read and write
5561000
trusted library allocation
page read and write
7DEF000
stack
page read and write
59BB000
trusted library allocation
page read and write
5B08000
trusted library allocation
page read and write
5561000
trusted library allocation
page read and write
5904000
trusted library allocation
page read and write
766F000
stack
page read and write
546F000
trusted library allocation
page read and write
8250000
direct allocation
page execute and read and write
54BB000
trusted library allocation
page read and write
590A000
trusted library allocation
page read and write
54AA000
trusted library allocation
page read and write
6C0000
heap
page read and write
4D5D000
stack
page read and write
5902000
trusted library allocation
page read and write
7CAF000
stack
page read and write
560F000
trusted library allocation
page read and write
5A4C000
trusted library allocation
page read and write
5909000
trusted library allocation
page read and write
5480000
trusted library allocation
page read and write
5482000
trusted library allocation
page read and write
676F000
stack
page read and write
51EE000
stack
page read and write
5496000
trusted library allocation
page read and write
5B9A000
trusted library allocation
page read and write
547F000
trusted library allocation
page read and write
54B5000
trusted library allocation
page read and write
80D000
heap
page read and write
5903000
trusted library allocation
page read and write
790000
heap
page read and write
808000
heap
page read and write
7DD000
heap
page read and write
54FC000
trusted library allocation
page read and write
4B20000
direct allocation
page execute and read and write
78C000
heap
page read and write
80EE000
stack
page read and write
549A000
trusted library allocation
page read and write
552C000
trusted library allocation
page read and write
59E3000
trusted library allocation
page read and write
377E000
stack
page read and write
56D7000
trusted library allocation
page read and write
6DEE000
stack
page read and write
5637000
trusted library allocation
page read and write
4501000
heap
page read and write
D4D000
unkown
page execute and read and write
A60000
direct allocation
page read and write
5480000
trusted library allocation
page read and write
7F1000
heap
page read and write
54A7000
trusted library allocation
page read and write
5464000
trusted library allocation
page read and write
4501000
heap
page read and write
5905000
trusted library allocation
page read and write
A60000
direct allocation
page read and write
7F4000
heap
page read and write
54FC000
trusted library allocation
page read and write
80C000
heap
page read and write
5C07000
trusted library allocation
page execute and read and write
54C8000
trusted library allocation
page read and write
5A46000
trusted library allocation
page read and write
7F8000
heap
page read and write
3EBF000
stack
page read and write
54AB000
trusted library allocation
page read and write
548F000
trusted library allocation
page read and write
4501000
heap
page read and write
54BB000
trusted library allocation
page read and write
4501000
heap
page read and write
54C1000
trusted library allocation
page read and write
80D000
heap
page read and write
8240000
direct allocation
page execute and read and write
A60000
direct allocation
page read and write
54A3000
trusted library allocation
page read and write
5A7D000
trusted library allocation
page read and write
5907000
trusted library allocation
page read and write
5B34000
trusted library allocation
page read and write
54B4000
trusted library allocation
page read and write
599E000
trusted library allocation
page read and write
5A03000
trusted library allocation
page read and write
54DC000
trusted library allocation
page read and write
54AA000
trusted library allocation
page read and write
5482000
trusted library allocation
page read and write
42BE000
stack
page read and write
54BA000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
57C0000
direct allocation
page read and write
7EC000
heap
page read and write
59EC000
trusted library allocation
page read and write
498D000
stack
page read and write
5A16000
trusted library allocation
page read and write
7B6F000
stack
page read and write
59EC000
trusted library allocation
page read and write
5E1A000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
548E000
trusted library allocation
page read and write
5486000
trusted library allocation
page read and write
4B10000
direct allocation
page execute and read and write
59AA000
trusted library allocation
page read and write
5A1E000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
54B3000
trusted library allocation
page read and write
8260000
direct allocation
page execute and read and write
4501000
heap
page read and write
5C7F000
trusted library allocation
page execute and read and write
7E2E000
stack
page read and write
59F5000
trusted library allocation
page read and write
590E000
trusted library allocation
page read and write
4990000
direct allocation
page read and write
5906000
trusted library allocation
page read and write
792E000
stack
page read and write
54BB000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
5BD0000
trusted library allocation
page read and write
59EE000
trusted library allocation
page read and write
4AF0000
direct allocation
page execute and read and write
777000
heap
page read and write
590F000
trusted library allocation
page read and write
73C71000
unkown
page execute read
5000000
remote allocation
page read and write
54AA000
trusted library allocation
page read and write
54BA000
trusted library allocation
page read and write
337F000
stack
page read and write
5483000
trusted library allocation
page read and write
548E000
trusted library allocation
page read and write
4B30000
direct allocation
page execute and read and write
5908000
trusted library allocation
page read and write
A50000
heap
page read and write
A70000
unkown
page read and write
54AB000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
5904000
trusted library allocation
page read and write
5473000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
5561000
trusted library allocation
page read and write
5499000
trusted library allocation
page read and write
800000
heap
page read and write
5481000
trusted library allocation
page read and write
A60000
direct allocation
page read and write
5462000
trusted library allocation
page read and write
5461000
trusted library allocation
page read and write
5BCE000
stack
page read and write
3AFF000
stack
page read and write
A60000
direct allocation
page read and write
742E000
stack
page read and write
548D000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
80D000
heap
page read and write
28CE000
stack
page read and write
54AB000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
5A2B000
trusted library allocation
page read and write
5BC5000
stack
page read and write
5900000
trusted library allocation
page read and write
A71000
unkown
page execute and read and write
68EE000
stack
page read and write
80C000
heap
page read and write
5496000
trusted library allocation
page read and write
548E000
trusted library allocation
page read and write
4501000
heap
page read and write
54D1000
trusted library allocation
page read and write
33BE000
stack
page read and write
74F000
heap
page read and write
59AE000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
77AF000
stack
page read and write
4501000
heap
page read and write
57E0000
direct allocation
page read and write
7A2F000
stack
page read and write
547D000
trusted library allocation
page read and write
A71000
unkown
page execute and write copy
5460000
trusted library allocation
page read and write
2BFF000
stack
page read and write
806F000
stack
page read and write
54B7000
trusted library allocation
page read and write
549B000
trusted library allocation
page read and write
4B00000
direct allocation
page execute and read and write
54C4000
trusted library allocation
page read and write
55A1000
trusted library allocation
page read and write
4501000
heap
page read and write
5A1F000
trusted library allocation
page read and write
34BF000
stack
page read and write
54B2000
trusted library allocation
page read and write
590E000
trusted library allocation
page read and write
78EF000
stack
page read and write
7FC000
heap
page read and write
54B7000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
5901000
trusted library allocation
page read and write
548A000
trusted library allocation
page read and write
5496000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
5470000
trusted library allocation
page read and write
7F2F000
stack
page read and write
6B6E000
stack
page read and write
54D7000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
A4E000
stack
page read and write
6A2E000
stack
page read and write
8220000
direct allocation
page execute and read and write
5483000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
4511000
heap
page read and write
546F000
trusted library allocation
page read and write
5561000
trusted library allocation
page read and write
57C0000
direct allocation
page read and write
59F5000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
5C0000
heap
page read and write
67AE000
stack
page read and write
A0C000
stack
page read and write
54BB000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
313E000
stack
page read and write
5481000
trusted library allocation
page read and write
54AA000
trusted library allocation
page read and write
5579000
trusted library allocation
page read and write
54D9000
trusted library allocation
page read and write
72EE000
stack
page read and write
54EB000
trusted library allocation
page read and write
7FC000
heap
page read and write
54AB000
trusted library allocation
page read and write
4E9E000
stack
page read and write
549A000
trusted library allocation
page read and write
5908000
trusted library allocation
page read and write
81EF000
stack
page read and write
5480000
trusted library allocation
page read and write
5496000
trusted library allocation
page read and write
5492000
trusted library allocation
page read and write
54A2000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
5647000
trusted library allocation
page read and write
54A5000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
A60000
direct allocation
page read and write
5474000
trusted library allocation
page read and write
5485000
trusted library allocation
page read and write
4501000
heap
page read and write
71A000
heap
page read and write
7F3000
heap
page read and write
54B3000
trusted library allocation
page read and write
54A2000
trusted library allocation
page read and write
D40000
unkown
page execute and read and write
54D8000
trusted library allocation
page read and write
5486000
trusted library allocation
page read and write
748000
heap
page read and write
7F1000
heap
page read and write
590E000
trusted library allocation
page read and write
54D3000
trusted library allocation
page read and write
7EC000
heap
page read and write
54BB000
trusted library allocation
page read and write
5C5E000
trusted library allocation
page execute and read and write
54C7000
trusted library allocation
page read and write
803000
heap
page read and write
3D7F000
stack
page read and write
55BF000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
579C000
stack
page read and write
EEC000
unkown
page execute and read and write
5481000
trusted library allocation
page read and write
5481000
trusted library allocation
page read and write
793000
heap
page read and write
4500000
heap
page read and write
54BB000
trusted library allocation
page read and write
57C0000
direct allocation
page read and write
54C0000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
54B4000
trusted library allocation
page read and write
702F000
stack
page read and write
288F000
stack
page read and write
4501000
heap
page read and write
68AF000
stack
page read and write
64EF000
stack
page read and write
54B4000
trusted library allocation
page read and write
2EBE000
stack
page read and write
5476000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
A60000
direct allocation
page read and write
54BB000
trusted library allocation
page read and write
5906000
trusted library allocation
page read and write
5599000
trusted library allocation
page read and write
54AA000
trusted library allocation
page read and write
5AEA000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
73C86000
unkown
page readonly
54A8000
trusted library allocation
page read and write
A60000
direct allocation
page read and write
5A46000
trusted library allocation
page read and write
4501000
heap
page read and write
5905000
trusted library allocation
page read and write
28F0000
heap
page read and write
4FDF000
stack
page read and write
6085000
trusted library allocation
page execute and read and write
4C5E000
stack
page read and write
5903000
trusted library allocation
page read and write
5C66000
trusted library allocation
page execute and read and write
43FE000
stack
page read and write
54BB000
trusted library allocation
page read and write
73C8F000
unkown
page readonly
A60000
direct allocation
page read and write
7F6E000
stack
page read and write
54B4000
trusted library allocation
page read and write
4990000
direct allocation
page read and write
548E000
trusted library allocation
page read and write
AC8000
unkown
page execute and read and write
5473000
trusted library allocation
page read and write
547F000
trusted library allocation
page read and write
5476000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
5474000
trusted library allocation
page read and write
549C000
trusted library allocation
page read and write
5483000
trusted library allocation
page read and write
7F1000
heap
page read and write
7A4000
heap
page read and write
4501000
heap
page read and write
54C5000
trusted library allocation
page read and write
5461000
trusted library allocation
page read and write
57C0000
direct allocation
page read and write
54BB000
trusted library allocation
page read and write
5769000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
323F000
stack
page read and write
39FE000
stack
page read and write
39BF000
stack
page read and write
4B10000
direct allocation
page execute and read and write
54C5000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
590F000
trusted library allocation
page read and write
57C0000
direct allocation
page read and write
5473000
trusted library allocation
page read and write
5901000
trusted library allocation
page read and write
5461000
trusted library allocation
page read and write
590D000
trusted library allocation
page read and write
A70000
unkown
page readonly
54BD000
trusted library allocation
page read and write
80C000
heap
page read and write
54C8000
trusted library allocation
page read and write
823E000
stack
page read and write
54BB000
trusted library allocation
page read and write
59F3000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
5A23000
trusted library allocation
page read and write
52EF000
stack
page read and write
387F000
stack
page read and write
5480000
trusted library allocation
page read and write
6CAE000
stack
page read and write
7F3000
heap
page read and write
4D9E000
stack
page read and write
3C3F000
stack
page read and write
5A30000
trusted library allocation
page read and write
3FFF000
stack
page read and write
554C000
trusted library allocation
page read and write
57C0000
direct allocation
page read and write
54AA000
trusted library allocation
page read and write
5484000
trusted library allocation
page read and write
5000000
remote allocation
page read and write
5499000
trusted library allocation
page read and write
73C70000
unkown
page readonly
54C8000
trusted library allocation
page read and write
5486000
trusted library allocation
page read and write
5461000
trusted library allocation
page read and write
34FE000
stack
page read and write
80C000
heap
page read and write
59D5000
trusted library allocation
page read and write
71AE000
stack
page read and write
A60000
direct allocation
page read and write
54ED000
trusted library allocation
page read and write
804000
heap
page read and write
35FF000
stack
page read and write
4501000
heap
page read and write
4B10000
direct allocation
page execute and read and write
327E000
stack
page read and write
59CD000
trusted library allocation
page read and write
413F000
stack
page read and write
4B40000
direct allocation
page execute and read and write
548E000
trusted library allocation
page read and write
54AA000
trusted library allocation
page read and write
5473000
trusted library allocation
page read and write
5C67000
trusted library allocation
page read and write
80D000
heap
page read and write
5476000
trusted library allocation
page read and write
A60000
direct allocation
page read and write
63EC000
stack
page read and write
54C6000
trusted library allocation
page read and write
76AE000
stack
page read and write
6F2E000
stack
page read and write
716F000
stack
page read and write
5470000
trusted library allocation
page read and write
535E000
stack
page read and write
54B9000
trusted library allocation
page read and write
FEE000
stack
page read and write
54BB000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
363E000
stack
page read and write
547B000
trusted library allocation
page read and write
5464000
trusted library allocation
page read and write
59AF000
trusted library allocation
page read and write
54F3000
trusted library allocation
page read and write
98E000
stack
page read and write
57E0000
direct allocation
page read and write
54AB000
trusted library allocation
page read and write
4B10000
direct allocation
page execute and read and write
7F1000
heap
page read and write
5482000
trusted library allocation
page read and write
AB5000
unkown
page execute and read and write
550C000
trusted library allocation
page read and write
47B000
stack
page read and write
C3D000
unkown
page execute and read and write
549A000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
547D000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
69EF000
stack
page read and write
549A000
trusted library allocation
page read and write
54DB000
trusted library allocation
page read and write
49CC000
stack
page read and write
54CA000
trusted library allocation
page read and write
5481000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
5AAE000
trusted library allocation
page read and write
7D2000
heap
page read and write
5905000
trusted library allocation
page read and write
590F000
trusted library allocation
page read and write
7F8000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
4501000
heap
page read and write
4501000
heap
page read and write
5480000
trusted library allocation
page read and write
5481000
trusted library allocation
page read and write
5B69000
trusted library allocation
page read and write
754000
heap
page read and write
54AE000
trusted library allocation
page read and write
5467000
trusted library allocation
page read and write
2D3F000
stack
page read and write
547F000
trusted library allocation
page read and write
7EC000
heap
page read and write
5A9C000
trusted library allocation
page read and write
7D2000
heap
page read and write
803000
heap
page read and write
57C0000
direct allocation
page read and write
57F8000
trusted library allocation
page read and write
54C4000
trusted library allocation
page read and write
756E000
stack
page read and write
5B49000
trusted library allocation
page read and write
59EF000
trusted library allocation
page read and write
54A5000
trusted library allocation
page read and write
590C000
trusted library allocation
page read and write
5480000
trusted library allocation
page read and write
54CD000
trusted library allocation
page read and write
59EB000
trusted library allocation
page read and write
80E6000
direct allocation
page read and write
63AF000
stack
page read and write
57C0000
direct allocation
page read and write
4501000
heap
page read and write
200FF000
stack
page read and write
5470000
trusted library allocation
page read and write
54D2000
trusted library allocation
page read and write
54A9000
trusted library allocation
page read and write
5494000
trusted library allocation
page read and write
57C0000
direct allocation
page read and write
8210000
direct allocation
page execute and read and write
57A000
stack
page read and write
7F4000
heap
page read and write
4B10000
direct allocation
page execute and read and write
54AB000
trusted library allocation
page read and write
5A52000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
80B000
heap
page read and write
5481000
trusted library allocation
page read and write
49D4000
direct allocation
page read and write
802000
heap
page read and write
54B4000
trusted library allocation
page read and write
4B1E000
stack
page read and write
54AB000
trusted library allocation
page read and write
545D000
stack
page read and write
4501000
heap
page read and write
54B2000
trusted library allocation
page read and write
548E000
trusted library allocation
page read and write
427F000
stack
page read and write
4600000
trusted library allocation
page read and write
54B4000
trusted library allocation
page read and write
4501000
heap
page read and write
5524000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
7F3000
heap
page read and write
373F000
stack
page read and write
4EDE000
stack
page read and write
8070000
trusted library allocation
page read and write
5B5F000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
54F3000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
5461000
trusted library allocation
page read and write
7EC000
heap
page read and write
54AA000
trusted library allocation
page read and write
803000
heap
page read and write
84E000
stack
page read and write
5462000
trusted library allocation
page read and write
94F000
stack
page read and write
30FF000
stack
page read and write
7BAE000
stack
page read and write
506E000
stack
page read and write
5473000
trusted library allocation
page read and write
5ADC000
trusted library allocation
page read and write
54EB000
trusted library allocation
page read and write
5A56000
trusted library allocation
page read and write
548B000
trusted library allocation
page read and write
546F000
trusted library allocation
page read and write
5474000
trusted library allocation
page read and write
549B000
trusted library allocation
page read and write
549C000
trusted library allocation
page read and write
57C0000
direct allocation
page read and write
403E000
stack
page read and write
1FF02000
trusted library allocation
page read and write
28F7000
heap
page read and write
54BB000
trusted library allocation
page read and write
5492000
trusted library allocation
page read and write
5484000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
556E000
trusted library allocation
page read and write
5A59000
trusted library allocation
page read and write
D5A000
unkown
page execute and write copy
54BB000
trusted library allocation
page read and write
6EEF000
stack
page read and write
5BAB000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
54AA000
trusted library allocation
page read and write
54D3000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
7FF000
heap
page read and write
54A9000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
A60000
direct allocation
page read and write
54AA000
trusted library allocation
page read and write
590E000
trusted library allocation
page read and write
5496000
trusted library allocation
page read and write
548E000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
5FA1000
trusted library allocation
page execute and read and write
54BC000
trusted library allocation
page read and write
54B8000
trusted library allocation
page read and write
5476000
trusted library allocation
page read and write
54F3000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
54CA000
trusted library allocation
page read and write
547D000
trusted library allocation
page read and write
44FF000
stack
page read and write
54BD000
trusted library allocation
page read and write
2AFF000
stack
page read and write
563F000
trusted library allocation
page read and write
547B000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
5E08000
trusted library allocation
page execute and read and write
77EE000
stack
page read and write
5568000
trusted library allocation
page read and write
80A000
heap
page read and write
54BB000
trusted library allocation
page read and write
43BF000
stack
page read and write
5464000
trusted library allocation
page read and write
7E1000
heap
page read and write
7D0000
heap
page read and write
5907000
trusted library allocation
page read and write
28D0000
heap
page read and write
548E000
trusted library allocation
page read and write
59CA000
trusted library allocation
page read and write
5B6D000
trusted library allocation
page read and write
80B000
heap
page read and write
5A28000
trusted library allocation
page read and write
5496000
trusted library allocation
page read and write
5492000
trusted library allocation
page read and write
80D000
heap
page read and write
590E000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
2C3E000
stack
page read and write
62AE000
stack
page read and write
54BB000
trusted library allocation
page read and write
5A10000
trusted library allocation
page read and write
2E7F000
stack
page read and write
54E3000
trusted library allocation
page read and write
6DAF000
stack
page read and write
54AB000
trusted library allocation
page read and write
549E000
trusted library allocation
page read and write
54EB000
trusted library allocation
page read and write
5C5000
heap
page read and write
559F000
trusted library allocation
page read and write
72AF000
stack
page read and write
546F000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
7A6E000
stack
page read and write
5491000
trusted library allocation
page read and write
54F1000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
7F8000
heap
page read and write
590A000
trusted library allocation
page read and write
4990000
direct allocation
page read and write
5900000
trusted library allocation
page read and write
80D000
heap
page read and write
548B000
trusted library allocation
page read and write
549B000
trusted library allocation
page read and write
60AE000
trusted library allocation
page execute and read and write
5903000
trusted library allocation
page read and write
A60000
direct allocation
page read and write
5494000
trusted library allocation
page read and write
54CA000
trusted library allocation
page read and write
5464000
trusted library allocation
page read and write
57C0000
direct allocation
page read and write
7F3000
heap
page read and write
5581000
trusted library allocation
page read and write
547F000
trusted library allocation
page read and write
54B3000
trusted library allocation
page read and write
5907000
trusted library allocation
page read and write
59DD000
trusted library allocation
page read and write
54AA000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
5903000
trusted library allocation
page read and write
4501000
heap
page read and write
3DBE000
stack
page read and write
516F000
stack
page read and write
54AA000
trusted library allocation
page read and write
800000
heap
page read and write
54BB000
trusted library allocation
page read and write
80D000
heap
page read and write
5E0000
heap
page read and write
3C7E000
stack
page read and write
54DC000
trusted library allocation
page read and write
784000
heap
page read and write
5000000
remote allocation
page read and write
54CA000
trusted library allocation
page read and write
666E000
stack
page read and write
4B64000
trusted library allocation
page read and write
5A09000
trusted library allocation
page read and write
5AEF000
trusted library allocation
page read and write
6179000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
802000
heap
page read and write
7FA000
heap
page read and write
54A1000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
5AEB000
trusted library allocation
page read and write
60B5000
trusted library allocation
page execute and read and write
706E000
stack
page read and write
59C0000
trusted library allocation
page read and write
29FF000
stack
page read and write
2FFE000
stack
page read and write
54D1000
trusted library allocation
page read and write
547D000
trusted library allocation
page read and write
59C5000
trusted library allocation
page read and write
548B000
trusted library allocation
page read and write
57C0000
direct allocation
page read and write
54C5000
trusted library allocation
page read and write
3EFE000
stack
page read and write
4B10000
direct allocation
page execute and read and write
549A000
trusted library allocation
page read and write
D5B000
unkown
page execute and write copy
5476000
trusted library allocation
page read and write
7F8000
heap
page read and write
5E1C000
trusted library allocation
page execute and read and write
71E000
heap
page read and write
73EF000
stack
page read and write
4ACF000
stack
page read and write
55A1000
trusted library allocation
page read and write
59BC000
trusted library allocation
page read and write
5762000
trusted library allocation
page read and write
5A35000
trusted library allocation
page read and write
8200000
direct allocation
page execute and read and write
51A0000
heap
page read and write
6C6F000
stack
page read and write
5499000
trusted library allocation
page read and write
417E000
stack
page read and write
80D000
heap
page read and write
7FA000
heap
page read and write
5907000
trusted library allocation
page read and write
EED000
unkown
page execute and write copy
54DB000
trusted library allocation
page read and write
5476000
trusted library allocation
page read and write
5470000
trusted library allocation
page read and write
2D7E000
stack
page read and write
557A000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
54EB000
trusted library allocation
page read and write
652E000
stack
page read and write
5905000
trusted library allocation
page read and write
547F000
trusted library allocation
page read and write
7CEE000
stack
page read and write
55A2000
trusted library allocation
page read and write
A60000
direct allocation
page read and write
There are 749 hidden memdumps, click here to show them.