IOC Report
Setup.exe

loading gif

Files

File Path
Type
Category
Malicious
Setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\195263\Material.com
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\HQXY33B0W5S2WFQR3J53KKG.ps1
HTML document, ASCII text, with very long lines (945)
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\195263\P
data
dropped
C:\Users\user\AppData\Local\Temp\Alpine
data
dropped
C:\Users\user\AppData\Local\Temp\Answer
data
dropped
C:\Users\user\AppData\Local\Temp\Carroll
data
dropped
C:\Users\user\AppData\Local\Temp\Charitable
data
dropped
C:\Users\user\AppData\Local\Temp\Dodge
data
dropped
C:\Users\user\AppData\Local\Temp\Edt
data
dropped
C:\Users\user\AppData\Local\Temp\Enforcement
data
dropped
C:\Users\user\AppData\Local\Temp\Fist
data
dropped
C:\Users\user\AppData\Local\Temp\French
data
dropped
C:\Users\user\AppData\Local\Temp\Independent
data
dropped
C:\Users\user\AppData\Local\Temp\Movers
data
dropped
C:\Users\user\AppData\Local\Temp\Nr
data
dropped
C:\Users\user\AppData\Local\Temp\Preferred
data
dropped
C:\Users\user\AppData\Local\Temp\Rj
data
dropped
C:\Users\user\AppData\Local\Temp\Submitted
data
dropped
C:\Users\user\AppData\Local\Temp\Torture
ASCII text, with very long lines (1115), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Torture.cmd
ASCII text, with very long lines (1115), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Truth
data
dropped
C:\Users\user\AppData\Local\Temp\Voyuer
VAX-order 68K Blit (standalone) executable
dropped
C:\Users\user\AppData\Local\Temp\Wishlist
data
dropped
C:\Users\user\AppData\Local\Temp\Worst
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dminsef1.fk4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lt252tyx.s3h.ps1
ASCII text, with no line terminators
dropped
There are 18 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Setup.exe
"C:\Users\user\Desktop\Setup.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c copy Torture Torture.cmd & Torture.cmd
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "opssvc wrsa"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 195263
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "Metres" Wishlist
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Worst + ..\Dodge + ..\Charitable + ..\Rj + ..\Submitted + ..\Movers + ..\Independent + ..\Voyuer P
malicious
C:\Users\user\AppData\Local\Temp\195263\Material.com
Material.com P
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -exec bypass -f "C:\Users\user\AppData\Local\Temp\HQXY33B0W5S2WFQR3J53KKG.ps1"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\choice.exe
choice /d y /t 5
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://thesishsej.click/api
104.21.80.1
malicious
https://rentry.co/feouewe5/raw
172.67.75.40
https://aka.ms/pscore6lB
unknown
https://rentry.co/static/icons/512.pnghZ
unknown
https://rentry.co/whathZ
unknown
https://rentry.co/
unknown
https://rentry.co/static/icons/512.png
unknown
https://rentry.co/what
unknown
https://rentry.co/hZ
unknown
http://www.autoitscript.com/autoit3/X
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://www.autoitscript.com/autoit3/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 3 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
thesishsej.click
104.21.80.1
malicious
AsnvOPzrzKjjy.AsnvOPzrzKjjy
unknown
malicious
rentry.co
172.67.75.40

IPs

IP
Domain
Country
Malicious
104.21.80.1
thesishsej.click
United States
malicious
172.67.75.40
rentry.co
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
11D7000
heap
page read and write
31CD000
heap
page read and write
3772000
heap
page read and write
11D7000
heap
page read and write
3D28000
trusted library allocation
page read and write
1A70000
trusted library allocation
page read and write
6E4E000
stack
page read and write
6B0000
heap
page read and write
3A21000
trusted library allocation
page read and write
47F0000
heap
page read and write
336E000
trusted library allocation
page read and write
421000
unkown
page execute read
DA8000
heap
page read and write
11D7000
heap
page read and write
3D2A000
trusted library allocation
page read and write
11D7000
heap
page read and write
3A21000
trusted library allocation
page read and write
3FFF000
stack
page read and write
315E000
stack
page read and write
116B000
heap
page read and write
3A21000
trusted library allocation
page read and write
336E000
trusted library allocation
page read and write
3365000
trusted library allocation
page read and write
3772000
heap
page read and write
7820000
trusted library allocation
page read and write
3A91000
trusted library allocation
page read and write
3DF6000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
11D7000
heap
page read and write
3D2B000
trusted library allocation
page read and write
3A9D000
trusted library allocation
page read and write
11D7000
heap
page read and write
699000
heap
page read and write
3D2D000
trusted library allocation
page read and write
EBA000
heap
page read and write
3364000
trusted library allocation
page read and write
3369000
trusted library allocation
page read and write
11D7000
heap
page read and write
116B000
heap
page read and write
3D26000
trusted library allocation
page read and write
4D4E000
stack
page read and write
46B000
unkown
page read and write
3D2A000
trusted library allocation
page read and write
116B000
heap
page read and write
D04000
heap
page read and write
3772000
heap
page read and write
C5C000
stack
page read and write
4D0E000
stack
page read and write
3D25000
trusted library allocation
page read and write
300A000
trusted library allocation
page execute and read and write
E23000
heap
page read and write
5000000
heap
page read and write
11D7000
heap
page read and write
3772000
heap
page read and write
734E000
stack
page read and write
116B000
heap
page read and write
3B21000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
774D000
stack
page read and write
8260000
heap
page read and write
68C000
heap
page read and write
3A21000
trusted library allocation
page read and write
711E000
stack
page read and write
70DB000
stack
page read and write
336D000
trusted library allocation
page read and write
6F9E000
stack
page read and write
3428000
heap
page read and write
9F8000
heap
page read and write
11D7000
heap
page read and write
9B8000
heap
page read and write
271E000
stack
page read and write
752B000
heap
page read and write
11D7000
heap
page read and write
3369000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
11D7000
heap
page read and write
3012000
trusted library allocation
page read and write
22DF000
stack
page read and write
3A21000
trusted library allocation
page read and write
5002000
trusted library allocation
page read and write
3362000
trusted library allocation
page read and write
116B000
heap
page read and write
11D7000
heap
page read and write
75DE000
stack
page read and write
77CD000
stack
page read and write
3363000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
3B21000
trusted library allocation
page read and write
5DF9000
trusted library allocation
page read and write
3D2D000
trusted library allocation
page read and write
116B000
heap
page read and write
3A21000
trusted library allocation
page read and write
600000
heap
page read and write
336D000
trusted library allocation
page read and write
4C8E000
stack
page read and write
3010000
trusted library allocation
page read and write
31B2000
heap
page read and write
336A000
trusted library allocation
page read and write
8D0000
heap
page read and write
116B000
heap
page read and write
11D7000
heap
page read and write
11D7000
heap
page read and write
3DF7000
trusted library allocation
page read and write
3B21000
trusted library allocation
page read and write
3D27000
trusted library allocation
page read and write
3D20000
trusted library allocation
page read and write
4DF3000
trusted library allocation
page read and write
3772000
heap
page read and write
76E0000
trusted library allocation
page read and write
409000
unkown
page readonly
4ED000
unkown
page write copy
11D7000
heap
page read and write
3D24000
trusted library allocation
page read and write
2A80000
heap
page read and write
11D7000
heap
page read and write
730E000
stack
page read and write
3198000
heap
page read and write
3D25000
trusted library allocation
page read and write
87E000
stack
page read and write
790000
heap
page read and write
2E8C000
stack
page read and write
2FE3000
trusted library allocation
page execute and read and write
11D7000
heap
page read and write
3D2F000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
6F5B000
stack
page read and write
4F3E000
stack
page read and write
11D7000
heap
page read and write
3D2E000
trusted library allocation
page read and write
3363000
trusted library allocation
page read and write
96F000
stack
page read and write
3A21000
trusted library allocation
page read and write
4F1000
unkown
page write copy
7508000
heap
page read and write
3A21000
trusted library allocation
page read and write
3B21000
trusted library allocation
page read and write
3D28000
trusted library allocation
page read and write
11D7000
heap
page read and write
11D7000
heap
page read and write
3366000
trusted library allocation
page read and write
8CF000
stack
page read and write
11D7000
heap
page read and write
675000
heap
page read and write
3D2F000
trusted library allocation
page read and write
3DF2000
trusted library allocation
page read and write
4820000
heap
page read and write
3D25000
trusted library allocation
page read and write
4FFF000
stack
page read and write
3366000
trusted library allocation
page read and write
500000
unkown
page readonly
3A21000
trusted library allocation
page read and write
281F000
stack
page read and write
31BD000
heap
page read and write
3190000
heap
page read and write
3B21000
trusted library allocation
page read and write
7382000
heap
page read and write
3080000
heap
page readonly
CE6000
heap
page read and write
116B000
heap
page read and write
3B21000
trusted library allocation
page read and write
3275000
heap
page read and write
715E000
stack
page read and write
116B000
heap
page read and write
E9B000
heap
page read and write
30A0000
heap
page execute and read and write
D6E000
stack
page read and write
936000
heap
page read and write
31CA000
heap
page read and write
11AC000
heap
page read and write
3A97000
trusted library allocation
page read and write
6DCE000
stack
page read and write
3B21000
trusted library allocation
page read and write
930000
heap
page read and write
3D2C000
trusted library allocation
page read and write
76DE000
stack
page read and write
11D7000
heap
page read and write
7800000
trusted library allocation
page read and write
4FBE000
stack
page read and write
79F000
stack
page read and write
31CE000
heap
page read and write
3362000
trusted library allocation
page read and write
307E000
stack
page read and write
11D7000
heap
page read and write
11D7000
heap
page read and write
2FAF000
stack
page read and write
3A21000
trusted library allocation
page read and write
EE0000
heap
page read and write
7830000
trusted library allocation
page read and write
3365000
trusted library allocation
page read and write
3B21000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
705A000
stack
page read and write
11D7000
heap
page read and write
7880000
trusted library allocation
page read and write
570000
heap
page read and write
E27000
heap
page read and write
3A21000
trusted library allocation
page read and write
E48000
heap
page read and write
77D0000
trusted library allocation
page read and write
336D000
trusted library allocation
page read and write
116B000
heap
page read and write
3365000
trusted library allocation
page read and write
11D7000
heap
page read and write
4FCA000
trusted library allocation
page read and write
988000
stack
page read and write
709E000
stack
page read and write
3DFB000
trusted library allocation
page read and write
3366000
trusted library allocation
page read and write
4CC5000
heap
page execute and read and write
5091000
trusted library allocation
page read and write
11D7000
heap
page read and write
94C000
stack
page read and write
3D2F000
trusted library allocation
page read and write
11D7000
heap
page read and write
3DEE000
trusted library allocation
page read and write
3772000
heap
page read and write
116B000
heap
page read and write
7860000
trusted library allocation
page read and write
116B000
heap
page read and write
11D7000
heap
page read and write
3A21000
trusted library allocation
page read and write
116B000
heap
page read and write
7DE000
stack
page read and write
C10000
heap
page read and write
3361000
trusted library allocation
page read and write
11D7000
heap
page read and write
3366000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
1A70000
trusted library allocation
page read and write
C5F000
stack
page read and write
88E000
stack
page read and write
11D7000
heap
page read and write
701E000
stack
page read and write
3360000
trusted library allocation
page read and write
9B0000
heap
page read and write
D70000
heap
page read and write
11D7000
heap
page read and write
3A21000
trusted library allocation
page read and write
400000
unkown
page readonly
2FE4000
trusted library allocation
page read and write
11D7000
heap
page read and write
3D27000
trusted library allocation
page read and write
3365000
trusted library allocation
page read and write
3363000
trusted library allocation
page read and write
3EBE000
trusted library allocation
page read and write
3D28000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
3366000
trusted library allocation
page read and write
3369000
trusted library allocation
page read and write
336E000
trusted library allocation
page read and write
3364000
trusted library allocation
page read and write
434000
unkown
page read and write
3A21000
trusted library allocation
page read and write
9F0000
heap
page read and write
11D7000
heap
page read and write
3772000
heap
page read and write
50CA000
trusted library allocation
page read and write
679000
heap
page read and write
4430000
trusted library allocation
page read and write
47DF000
stack
page read and write
116B000
heap
page read and write
3D20000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
67C000
stack
page read and write
3D2F000
trusted library allocation
page read and write
3772000
heap
page read and write
11D7000
heap
page read and write
630000
heap
page read and write
3360000
trusted library allocation
page read and write
3D2F000
trusted library allocation
page read and write
11D7000
heap
page read and write
116B000
heap
page read and write
3A21000
trusted library allocation
page read and write
49C000
stack
page read and write
3D21000
trusted library allocation
page read and write
8BE000
stack
page read and write
11D7000
heap
page read and write
116B000
heap
page read and write
3362000
trusted library allocation
page read and write
3B21000
trusted library allocation
page read and write
2D4E000
stack
page read and write
3A21000
trusted library allocation
page read and write
3420000
heap
page read and write
3D27000
trusted library allocation
page read and write
30EE000
stack
page read and write
93B000
heap
page read and write
4D91000
trusted library allocation
page read and write
3D2F000
trusted library allocation
page read and write
3D27000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
3B21000
trusted library allocation
page read and write
7840000
trusted library allocation
page read and write
77E0000
trusted library allocation
page read and write
11D7000
heap
page read and write
336E000
trusted library allocation
page read and write
3771000
heap
page read and write
11D7000
heap
page read and write
74AB000
heap
page read and write
116B000
heap
page read and write
2960000
heap
page read and write
761E000
stack
page read and write
3D25000
trusted library allocation
page read and write
11D7000
heap
page read and write
3030000
trusted library allocation
page read and write
769E000
stack
page read and write
5DB9000
trusted library allocation
page read and write
2FF9000
trusted library allocation
page read and write
295E000
stack
page read and write
3D20000
trusted library allocation
page read and write
560000
heap
page read and write
8270000
trusted library allocation
page execute and read and write
116B000
heap
page read and write
3772000
heap
page read and write
3366000
trusted library allocation
page read and write
83E000
stack
page read and write
31CA000
heap
page read and write
5030000
heap
page read and write
11D7000
heap
page read and write
8D4000
heap
page read and write
2FD0000
trusted library allocation
page read and write
778D000
stack
page read and write
116B000
heap
page read and write
3D28000
trusted library allocation
page read and write
116B000
heap
page read and write
2F8C000
stack
page read and write
74EA000
heap
page read and write
3367000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
3368000
trusted library allocation
page read and write
3D2A000
trusted library allocation
page read and write
4BD000
unkown
page readonly
7480000
heap
page execute and read and write
116B000
heap
page read and write
EDE000
stack
page read and write
3D25000
trusted library allocation
page read and write
40C000
unkown
page read and write
751B000
heap
page read and write
2DC0000
heap
page read and write
336B000
trusted library allocation
page read and write
420000
unkown
page read and write
3A79000
trusted library allocation
page read and write
116B000
heap
page read and write
3120000
heap
page read and write
4C90000
trusted library allocation
page read and write
3366000
trusted library allocation
page read and write
336B000
trusted library allocation
page read and write
285E000
stack
page read and write
11D7000
heap
page read and write
303E000
stack
page read and write
98000
stack
page read and write
336C000
trusted library allocation
page read and write
3015000
trusted library allocation
page execute and read and write
9ED000
heap
page read and write
74A0000
heap
page read and write
DA0000
heap
page read and write
336F000
trusted library allocation
page read and write
116B000
heap
page read and write
CE0000
heap
page read and write
649000
heap
page read and write
3D2D000
trusted library allocation
page read and write
7700000
trusted library allocation
page read and write
9F1000
heap
page read and write
C9E000
stack
page read and write
800000
heap
page read and write
9D4000
heap
page read and write
3D2F000
trusted library allocation
page read and write
31DD000
heap
page read and write
30F0000
heap
page read and write
3362000
trusted library allocation
page read and write
9FF000
heap
page read and write
11D7000
heap
page read and write
4C4C000
stack
page read and write
9FF000
heap
page read and write
116B000
heap
page read and write
116B000
heap
page read and write
7160000
heap
page read and write
3090000
trusted library allocation
page execute and read and write
3D2D000
trusted library allocation
page read and write
11D7000
heap
page read and write
3A21000
trusted library allocation
page read and write
3772000
heap
page read and write
3D21000
trusted library allocation
page read and write
307E000
stack
page read and write
3A21000
trusted library allocation
page read and write
21DF000
stack
page read and write
56E000
stack
page read and write
500000
heap
page read and write
336F000
trusted library allocation
page read and write
679000
heap
page read and write
3A21000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
3D25000
trusted library allocation
page read and write
3A95000
trusted library allocation
page read and write
11D7000
heap
page read and write
3D28000
trusted library allocation
page read and write
DDC000
heap
page read and write
11D7000
heap
page read and write
84F000
stack
page read and write
2DF0000
heap
page read and write
3A21000
trusted library allocation
page read and write
520000
heap
page read and write
116B000
heap
page read and write
3A21000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
11D7000
heap
page read and write
401000
unkown
page execute read
116B000
heap
page read and write
3365000
trusted library allocation
page read and write
3B21000
trusted library allocation
page read and write
500000
unkown
page readonly
765E000
stack
page read and write
5D91000
trusted library allocation
page read and write
31AE000
heap
page read and write
699000
heap
page read and write
3366000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
66D000
heap
page read and write
31DD000
heap
page read and write
8380000
heap
page read and write
3A21000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
11D7000
heap
page read and write
590000
heap
page read and write
116B000
heap
page read and write
3A21000
trusted library allocation
page read and write
116B000
heap
page read and write
2E4F000
stack
page read and write
3D26000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
69E000
heap
page read and write
3D23000
trusted library allocation
page read and write
3360000
trusted library allocation
page read and write
11D7000
heap
page read and write
7470000
trusted library allocation
page read and write
6AD000
heap
page read and write
30BE000
stack
page read and write
80E000
stack
page read and write
3A21000
trusted library allocation
page read and write
11D7000
heap
page read and write
4D80000
heap
page read and write
519F000
trusted library allocation
page read and write
3D2E000
trusted library allocation
page read and write
7539000
heap
page read and write
336C000
trusted library allocation
page read and write
3772000
heap
page read and write
3A93000
trusted library allocation
page read and write
4F0000
heap
page read and write
7C0000
heap
page read and write
6AD000
heap
page read and write
420000
unkown
page readonly
3108000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
8C0000
heap
page read and write
11D7000
heap
page read and write
3A9A000
trusted library allocation
page read and write
400000
unkown
page readonly
3A21000
trusted library allocation
page read and write
675000
heap
page read and write
3DFF000
trusted library allocation
page read and write
63A000
heap
page read and write
3B21000
trusted library allocation
page read and write
3362000
trusted library allocation
page read and write
76F0000
trusted library allocation
page execute and read and write
3D2D000
trusted library allocation
page read and write
11D7000
heap
page read and write
11D7000
heap
page read and write
6E8E000
stack
page read and write
74B7000
heap
page read and write
E16000
heap
page read and write
6FDE000
stack
page read and write
11D7000
heap
page read and write
4FBC000
trusted library allocation
page read and write
4FC4000
trusted library allocation
page read and write
3D2E000
trusted library allocation
page read and write
3D2C000
trusted library allocation
page read and write
2FED000
trusted library allocation
page execute and read and write
3D24000
trusted library allocation
page read and write
74CF000
heap
page read and write
11D7000
heap
page read and write
3A21000
trusted library allocation
page read and write
11D7000
heap
page read and write
3D2B000
trusted library allocation
page read and write
45C000
stack
page read and write
2FE0000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
5102000
trusted library allocation
page read and write
82C0000
trusted library allocation
page read and write
74C5000
heap
page read and write
69E000
heap
page read and write
1A70000
trusted library allocation
page read and write
77F0000
trusted library allocation
page read and write
3D24000
trusted library allocation
page read and write
11D7000
heap
page read and write
116B000
heap
page read and write
3368000
trusted library allocation
page read and write
11D7000
heap
page read and write
74FF000
heap
page read and write
4EFF000
stack
page read and write
C00000
heap
page read and write
11D7000
heap
page read and write
11D7000
heap
page read and write
116B000
heap
page read and write
3D25000
trusted library allocation
page read and write
D2E000
stack
page read and write
116B000
heap
page read and write
7870000
trusted library allocation
page read and write
C1C000
stack
page read and write
7810000
trusted library allocation
page read and write
3D2E000
trusted library allocation
page read and write
4E3000
unkown
page readonly
4F5000
unkown
page readonly
336F000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
116B000
heap
page read and write
82A0000
trusted library allocation
page read and write
31CA000
heap
page read and write
11D7000
heap
page read and write
5FE000
stack
page read and write
3D2E000
trusted library allocation
page read and write
19A000
stack
page read and write
50BA000
trusted library allocation
page read and write
4CB000
unkown
page read and write
4F7F000
stack
page read and write
3772000
heap
page read and write
40C000
unkown
page write copy
116B000
heap
page read and write
3D24000
trusted library allocation
page read and write
3A99000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
116B000
heap
page read and write
11D7000
heap
page read and write
7170000
heap
page read and write
D04000
heap
page read and write
9ED000
heap
page read and write
3A21000
trusted library allocation
page read and write
336F000
trusted library allocation
page read and write
3D22000
trusted library allocation
page read and write
116B000
heap
page read and write
82D0000
trusted library allocation
page execute and read and write
409000
unkown
page readonly
11D7000
heap
page read and write
2DF6000
heap
page read and write
3D2F000
trusted library allocation
page read and write
11D7000
heap
page read and write
3A8E000
trusted library allocation
page read and write
11D7000
heap
page read and write
3367000
trusted library allocation
page read and write
2CE0000
heap
page read and write
DCF000
heap
page read and write
116B000
heap
page read and write
9D1000
heap
page read and write
74BA000
heap
page read and write
6F1D000
stack
page read and write
3DF8000
trusted library allocation
page read and write
3D20000
trusted library allocation
page read and write
4CC0000
heap
page execute and read and write
5B5000
heap
page read and write
3D2E000
trusted library allocation
page read and write
116B000
heap
page read and write
3A21000
trusted library allocation
page read and write
3DFD000
trusted library allocation
page read and write
9FF000
heap
page read and write
11D7000
heap
page read and write
9AE000
stack
page read and write
9ED000
heap
page read and write
3366000
trusted library allocation
page read and write
30FE000
stack
page read and write
9F9000
heap
page read and write
3D2F000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
92E000
stack
page read and write
3369000
trusted library allocation
page read and write
7850000
trusted library allocation
page read and write
3D21000
trusted library allocation
page read and write
C18000
heap
page read and write
7C6000
heap
page read and write
401000
unkown
page execute read
336E000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
82B0000
trusted library allocation
page read and write
11D7000
heap
page read and write
63C000
stack
page read and write
116B000
heap
page read and write
5146000
trusted library allocation
page read and write
31DD000
heap
page read and write
3771000
heap
page read and write
6E0E000
stack
page read and write
E9C000
heap
page read and write
5B0000
heap
page read and write
4EE9000
trusted library allocation
page read and write
3D2A000
trusted library allocation
page read and write
3369000
trusted library allocation
page read and write
31BC000
heap
page read and write
3D25000
trusted library allocation
page read and write
116B000
heap
page read and write
753E000
heap
page read and write
598000
heap
page read and write
11D7000
heap
page read and write
11D7000
heap
page read and write
3364000
trusted library allocation
page read and write
50C2000
trusted library allocation
page read and write
116B000
heap
page read and write
3A21000
trusted library allocation
page read and write
7525000
heap
page read and write
There are 598 hidden memdumps, click here to show them.