IOC Report
setup.exe

loading gif

Files

File Path
Type
Category
Malicious
setup.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_odbjwjnw.cj4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_su3a0sij.kp2.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\setup.exe
"C:\Users\user\Desktop\setup.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -exec bypass <!DOCTYPE html> <!--[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]--> <!--[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]--> <!--[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]--> <!--[if gt IE 8]><!--> <html class="no-js" lang="en-US"> <!--<![endif]--> <head> <title>Suspected phishing site | Cloudflare</title> <meta charset="UTF-8" /> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <meta http-equiv="X-UA-Compatible" content="IE=Edge" /> <meta name="robots" content="noindex, nofollow" /> <meta name="viewport" content="width=device-width,initial-scale=1" /> <link rel="stylesheet" id="cf_styles-css" href="/cdn-cgi/styles/cf.errors.css" /> <!--[if lt IE 9]><link rel="stylesheet" id='cf_styles-ie-css' href="/cdn-cgi/styles/cf.errors.ie.css" /><![endif]--> <style>body{margin:0;padding:0}</style> <!--[if gte IE 10]><!--> <script> if (!navigator.cookieEnabled) { window.addEventListener('DOMContentLoaded', function () { var cookieEl = document.getElementById('cookie-alert'); cookieEl.style.display = 'block'; }) } </script> <!--<![endif]--> </head> <body> <div id="cf-wrapper"> <div class="cf-alert cf-alert-error cf-cookie-error" id="cookie-alert" data-translate="enable_cookies">Please enable cookies.</div> <div id="cf-error-details" class="cf-error-details-wrapper"> <div class="cf-section cf-wrapper" style="margin-top: 100px;margin-bottom:200px;"> <div class="cf-columns one"> <div class="cf-column"> <h4 class="cf-text-error"><i class="cf-icon-exclamation-sign" style="background-size: 18px; height: 18px; width: 18px; margin-bottom: 2px;"></i> Warning</h4> <h2 style="margin: 16px 0;">Suspected Phishing</h2> <strong>This website has been reported for potential phishing.</strong> <p>Phishing is when a site attempts to steal sensitive information by falsely presenting as a safe source.</p> <div style="display: flex; align-items: center;"> <p> <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/" class="cf-btn" style="background-color: #404040; color: #fff; border: 0;">Learn More</a> <form action="/cdn-cgi/phish-bypass" method="GET" enctype="text/plain"> <input type="hidden" name="atok" value="71Za1bMT4p7rZalhixa.l.bxuLqtqavi.hc0woY.dYQ-1734782322-0.0.1.1-/int_clp_ldr_sha.txt"> <button type="submit" class="cf-btn cf-btn-danger" style="color: #bd2426; background: transparent;" data-translate="dismiss_and_enter">Ignore & Proceed</button> </form> </p> </div> </div> </div> </div><!-- /.section --> <div id="ts-blocks" style="display:none;"></div> <div class="cf-error-footer cf-wrapper w-240 lg:w-full py-10 sm:py-4 sm:px-8 mx-auto text-center sm:text-left border-solid border-0 border-t border-gray-300"> <p class="text-13"> <span class="cf-footer-item sm:block sm:mb-1">Cloudflare Ray ID: <strong class="font-semibold">8f57b3ae1fec0fa0</strong></span> <span class="cf-footer-separator sm:hidden">&bull;</span> <span id="cf-footer-item-ip" class="cf-footer-item hidden sm:block sm:mb-1"> Your IP: <button type="button" id="cf-footer-ip-reveal" class="cf-footer-ip-reveal-btn">Click to reveal</button> <span class="hidden" id="cf-footer-ip">8.46.123.189</span> <span class="cf-footer-separator sm:hidden">&bull;</span> </span> <span class="cf-footer-item sm:block sm:mb-1"><span>Performance &amp; security by</span> <a rel="noopener noreferrer" href="https://www.cloudflare.com/5xx-error-landing" id="brand_link" target="_blank">Cloudflare</a></span> </p> <script>(function(){function d(){var b=a.getElementById("cf-footer-item-ip"),c=a.getElementById("cf-footer-ip-reveal");b&&"classList"in b&&(b.classList.remove("hidden"),c.addEventListener("click",function(){c.classList.add("hidden");a.getElementById("cf-footer-ip").classList.remove("hidden")}))}var a=document;document.addEventListener&&a.addEventListener("DOMContentLoaded",d)})();</script> </div><!-- /.error-footer --> </div><!-- /#cf-error-details --> </div><!-- /#cf-wrapper --> <script> window._cf_translation = {}; </script> </body> </html>
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://principledjs.click/api
172.67.187.214
malicious
principledjs.click
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.winxdvd.com/dvd-copy-pro/upgradeini/upgrade.ini
unknown
http://ocsp.sectigo.com0
unknown
https://kliptizq.shop/
unknown
necklacebudi.lat
https://principledjs.click/apird
unknown
https://kliptizq.shop/int_clp_ldr_sha.txtG21O
unknown
https://www.cloudflare.com/learning/access-management/phishhZ
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://kliptizq.shop/(O
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
aspecteirs.lat
https://www.cloudflare.com/learning/access-management/phishing-attack/class=cf-btnstyle=background-c
unknown
http://www.winxdvd.com/specialoffer/latest_giveaway_addBuy
unknown
https://principledjs.click:443/api=T
unknown
http://www.winxdvd.com/
unknown
http://www.winxdvd.com/dvd-copy-pro/buy.htm?dcp_beginbeuiafterafuiopenUsing_Trial_CopyThis
unknown
http://www.winxdvd.com/dvd-copy-pro/buy.htm?dcpregisteropenRegistered_SuccessfullyRegistered
unknown
https://aka.ms/pscore6lB
unknown
http://www.winxdvd.com/dvd-copy-pro/free-update.htm?chlic13open
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://www.cloudflare.com/learning/access-management/phish
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
sustainskelet.lat
https://www.cloudflare.com/5xx-error-landinghZ
unknown
crosshuaht.lat
http://www.winxdvd.com/specialoffer/old_giveaway_addBuy
unknown
rapeflowwj.lat
http://www.winxdvd.com/dvd-copy-pro/upgradeini/upgrade.iniupgrade.iniD=
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.winxdvd.com/dvd-copy-pro/registered-update.htmlatest_reg_addEnjoy
unknown
http://www.winxdvd.com/dvd-copy-pro/buy.htmlatest_unreg_addBuy
unknown
http://www.winxdvd.com/dvd-copy-pro/faq.htm1http://www.winxdvd.com/dvd-copy-pro/updatelog.htm9http:/
unknown
https://sectigo.com/CPS0
unknown
https://www.winxdvd.com/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.winxdvd.com/dvd-copy-pro/registered-update.htmThe
unknown
https://principledjs.click/apiz
unknown
https://www.cloudflare.com/learning/access-management/phishing-atX)
unknown
https://principledjs.click:443/api.default-release/key4.dbPK
unknown
http://www.winxdvd.com/dvd-copy-pro/registered-update.htmold_reg_addUpdate
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://principledjs.click:443/apiTU
unknown
https://kliptizq.shop/int_clp_ldr_sha.txtR3#O
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
energyaffai.lat
http://www.winxdvd.com
unknown
https://principledjs.click:443/api
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://kliptizq.shop:443/int_clp_ldr_sha.txt
unknown
http://www.winxdvd.com/dvd-copy-pro/registered-update.htm
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://www.cloudflare.com/5xx-error-landingid=brand_linktarget=_blank
unknown
https://www.winxdvd.com/Help_Filehelp.chm.chmhelpopenInit_CDROMCD-ROM
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://kliptizq.shop/int_clp_ldr_sha.txtg
unknown
https://kliptizq.shop/int_clp_ldr_sha.txt
172.67.191.144
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
http://www.winxdvd.com/dvd-copy-pro/free-update.htm
unknown
http://www.winxdvd.com/dvd-copy-pro/buy.htmold_unreg_addBuy
unknown
https://principledjs.click/
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
grannyejh.lat
discokeyus.lat
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.winxdvd.com/dvd-copy-pro/download.htm7http://www.winxdvd.com/help/how-to-use-dvd-copy-pro
unknown
https://www.cloudflare.com/5xx-error-landingmance
unknown
There are 70 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
principledjs.click
172.67.187.214
malicious
kliptizq.shop
172.67.191.144

IPs

IP
Domain
Country
Malicious
172.67.187.214
principledjs.click
United States
malicious
172.67.191.144
kliptizq.shop
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
1000000
heap
page read and write
3FBA000
trusted library allocation
page read and write
67EE000
stack
page read and write
6D9E000
heap
page read and write
46DF000
trusted library allocation
page read and write
2D20000
remote allocation
page read and write
3F93000
trusted library allocation
page read and write
3D33000
trusted library allocation
page read and write
2B8F000
stack
page read and write
1B8000
stack
page read and write
3F86000
trusted library allocation
page read and write
4012000
trusted library allocation
page read and write
4EF000
heap
page read and write
48AF000
trusted library allocation
page read and write
7000000
trusted library allocation
page read and write
7A90000
heap
page read and write
4027000
trusted library allocation
page read and write
4130000
trusted library allocation
page read and write
2CAA000
direct allocation
page read and write
4122000
trusted library allocation
page read and write
7060000
trusted library allocation
page read and write
3F85000
trusted library allocation
page read and write
3FA2000
trusted library allocation
page read and write
3F80000
trusted library allocation
page read and write
4025000
trusted library allocation
page read and write
3FFD000
trusted library allocation
page read and write
409A000
trusted library allocation
page read and write
49E000
stack
page read and write
458000
heap
page read and write
359D000
stack
page read and write
7070000
trusted library allocation
page read and write
3FD3000
trusted library allocation
page read and write
6B2E000
stack
page read and write
3FBE000
trusted library allocation
page read and write
3FC6000
trusted library allocation
page read and write
3F9F000
trusted library allocation
page read and write
400A000
trusted library allocation
page read and write
3FA2000
trusted library allocation
page read and write
40C8000
trusted library allocation
page read and write
3F70000
trusted library allocation
page read and write
3FB8000
trusted library allocation
page read and write
573000
heap
page read and write
7030000
trusted library allocation
page read and write
400D000
trusted library allocation
page read and write
3FF2000
trusted library allocation
page read and write
3F7D000
trusted library allocation
page read and write
3F9D000
trusted library allocation
page read and write
3F93000
trusted library allocation
page read and write
6765000
heap
page execute and read and write
3F76000
trusted library allocation
page read and write
E7E000
stack
page read and write
57F000
heap
page read and write
3DDE000
stack
page read and write
7AA0000
trusted library allocation
page execute and read and write
7AF0000
trusted library allocation
page execute and read and write
3FBB000
trusted library allocation
page read and write
47D8000
trusted library allocation
page read and write
3FA5000
trusted library allocation
page read and write
3F79000
trusted library allocation
page read and write
40D2000
trusted library allocation
page read and write
3F98000
trusted library allocation
page read and write
3FB8000
trusted library allocation
page read and write
48EC000
trusted library allocation
page read and write
41EA000
trusted library allocation
page read and write
3190000
heap
page read and write
3FD6000
trusted library allocation
page read and write
6E9E000
stack
page read and write
6BF000
stack
page read and write
F10000
heap
page read and write
3F9B000
trusted library allocation
page read and write
FF2000
heap
page read and write
3C80000
trusted library allocation
page read and write
3F78000
trusted library allocation
page read and write
3F7E000
trusted library allocation
page read and write
3F7A000
trusted library allocation
page read and write
407B000
trusted library allocation
page read and write
45E2000
trusted library allocation
page read and write
F92000
heap
page read and write
3F8E000
trusted library allocation
page read and write
3FFD000
trusted library allocation
page read and write
2C70000
direct allocation
page read and write
A7A000
unkown
page readonly
4007000
trusted library allocation
page read and write
3FE4000
trusted library allocation
page read and write
3F9B000
trusted library allocation
page read and write
6BEE000
stack
page read and write
3FAE000
trusted library allocation
page read and write
4E3000
heap
page read and write
3F9A000
trusted library allocation
page read and write
70A0000
trusted library allocation
page read and write
3F9B000
trusted library allocation
page read and write
4014000
trusted library allocation
page read and write
27DF000
stack
page read and write
6EB0000
heap
page execute and read and write
3F3F000
stack
page read and write
6D94000
heap
page read and write
663E000
stack
page read and write
FFE000
heap
page read and write
3FCC000
trusted library allocation
page read and write
3FC7000
trusted library allocation
page read and write
9D7000
unkown
page write copy
2CC9000
direct allocation
page read and write
6B6E000
stack
page read and write
415A000
trusted library allocation
page read and write
3C7F000
stack
page read and write
FDF000
heap
page read and write
F8D000
heap
page read and write
3FD4000
trusted library allocation
page read and write
3F8B000
trusted library allocation
page read and write
7040000
trusted library allocation
page read and write
F55000
heap
page read and write
4BB000
heap
page read and write
F7A000
heap
page read and write
3D37000
trusted library allocation
page read and write
3FCD000
trusted library allocation
page read and write
3F9C000
trusted library allocation
page read and write
2CA2000
direct allocation
page read and write
FDE000
heap
page read and write
9D3000
unkown
page readonly
6970000
heap
page read and write
414A000
trusted library allocation
page read and write
3FD9000
trusted library allocation
page read and write
440000
heap
page read and write
3FC4000
trusted library allocation
page read and write
3FDD000
trusted library allocation
page read and write
1003000
heap
page read and write
929000
unkown
page write copy
4024000
trusted library allocation
page read and write
3FD6000
trusted library allocation
page read and write
3F83000
trusted library allocation
page read and write
3FC6000
trusted library allocation
page read and write
2C61000
direct allocation
page read and write
55A9000
trusted library allocation
page read and write
3F7F000
trusted library allocation
page read and write
1003000
heap
page read and write
4007000
trusted library allocation
page read and write
3FEE000
trusted library allocation
page read and write
6BAE000
stack
page read and write
35B0000
heap
page read and write
3F9A000
trusted library allocation
page read and write
3FB4000
trusted library allocation
page read and write
3F9B000
trusted library allocation
page read and write
4927000
trusted library allocation
page read and write
3FA2000
trusted library allocation
page read and write
451E000
stack
page read and write
3FB9000
trusted library allocation
page read and write
405E000
stack
page read and write
3F78000
trusted library allocation
page read and write
65FE000
stack
page read and write
36CE000
trusted library allocation
page read and write
3F7D000
trusted library allocation
page read and write
3FCE000
trusted library allocation
page read and write
C3C000
unkown
page readonly
FF2000
heap
page read and write
3FAC000
trusted library allocation
page read and write
2D40000
heap
page read and write
3F95000
trusted library allocation
page read and write
3FA1000
trusted library allocation
page read and write
3FBA000
trusted library allocation
page read and write
3FD3000
trusted library allocation
page read and write
3F9D000
trusted library allocation
page read and write
355E000
stack
page read and write
4570000
heap
page execute and read and write
3F9F000
trusted library allocation
page read and write
1003000
heap
page read and write
450000
heap
page read and write
488A000
trusted library allocation
page read and write
3F71000
trusted library allocation
page read and write
F4F000
heap
page read and write
401000
unkown
page execute read
6C22000
heap
page read and write
3FA8000
trusted library allocation
page read and write
696B000
stack
page read and write
3F83000
trusted library allocation
page read and write
3FEC000
trusted library allocation
page read and write
3FBB000
trusted library allocation
page read and write
3FEA000
trusted library allocation
page execute and read and write
3FC6000
trusted library allocation
page read and write
4986000
trusted library allocation
page read and write
3F79000
trusted library allocation
page read and write
3FB4000
trusted library allocation
page read and write
3FB7000
trusted library allocation
page read and write
3180000
heap
page read and write
3FD3000
trusted library allocation
page read and write
2C85000
direct allocation
page read and write
3F85000
trusted library allocation
page read and write
4060000
heap
page read and write
3F82000
trusted library allocation
page read and write
3E3E000
stack
page read and write
400000
unkown
page readonly
A76000
unkown
page readonly
17C000
stack
page read and write
2C68000
direct allocation
page read and write
68EB000
stack
page read and write
3F78000
trusted library allocation
page read and write
44CD000
stack
page read and write
9C3000
unkown
page read and write
3F96000
trusted library allocation
page read and write
3FC0000
trusted library allocation
page read and write
3FD6000
trusted library allocation
page read and write
3FF5000
trusted library allocation
page execute and read and write
3181000
heap
page read and write
3FBB000
trusted library allocation
page read and write
3F9F000
trusted library allocation
page read and write
6FF0000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
3181000
heap
page read and write
3FD6000
trusted library allocation
page read and write
3F8B000
trusted library allocation
page read and write
3F96000
trusted library allocation
page read and write
3CDE000
stack
page read and write
3FF4000
trusted library allocation
page read and write
7AC0000
trusted library allocation
page read and write
4152000
trusted library allocation
page read and write
3FEC000
trusted library allocation
page read and write
9C6000
unkown
page read and write
692E000
stack
page read and write
3F83000
trusted library allocation
page read and write
38FE000
stack
page read and write
4010000
trusted library allocation
page read and write
3FD0000
trusted library allocation
page read and write
5589000
trusted library allocation
page read and write
4007000
trusted library allocation
page read and write
3F77000
trusted library allocation
page read and write
E3E000
stack
page read and write
3F76000
trusted library allocation
page read and write
3FD6000
trusted library allocation
page read and write
6F7E000
stack
page read and write
3FBB000
trusted library allocation
page read and write
48E1000
trusted library allocation
page read and write
47F0000
trusted library allocation
page read and write
4007000
trusted library allocation
page read and write
4081000
trusted library allocation
page read and write
9D3000
unkown
page readonly
3F9A000
trusted library allocation
page read and write
3FD7000
trusted library allocation
page read and write
3F90000
trusted library allocation
page read and write
3FB1000
trusted library allocation
page read and write
3F95000
trusted library allocation
page read and write
402D000
trusted library allocation
page read and write
6D8A000
heap
page read and write
3FDC000
trusted library allocation
page read and write
7020000
trusted library allocation
page read and write
2C8C000
direct allocation
page read and write
6D60000
heap
page read and write
2C53000
direct allocation
page read and write
3FC4000
trusted library allocation
page read and write
9D8000
unkown
page readonly
6EA0000
trusted library allocation
page read and write
3A3E000
stack
page read and write
FF6000
heap
page read and write
3F83000
trusted library allocation
page read and write
3F7F000
trusted library allocation
page read and write
6D77000
heap
page read and write
3F8C000
trusted library allocation
page read and write
3F79000
trusted library allocation
page read and write
3F96000
trusted library allocation
page read and write
7AE0000
trusted library allocation
page read and write
3FB3000
trusted library allocation
page read and write
F90000
heap
page read and write
3F9B000
trusted library allocation
page read and write
67AE000
stack
page read and write
3F96000
trusted library allocation
page read and write
3F79000
trusted library allocation
page read and write
19C000
stack
page read and write
9B000
stack
page read and write
FF4000
heap
page read and write
3F84000
trusted library allocation
page read and write
3FBB000
trusted library allocation
page read and write
3FF6000
trusted library allocation
page read and write
3FB6000
trusted library allocation
page read and write
670D000
stack
page read and write
3FF4000
trusted library allocation
page read and write
FD9000
heap
page read and write
6EFE000
stack
page read and write
FFA000
heap
page read and write
7080000
trusted library allocation
page read and write
3F71000
trusted library allocation
page read and write
3FB4000
trusted library allocation
page read and write
3FA4000
trusted library allocation
page read and write
7AB0000
trusted library allocation
page read and write
3F93000
trusted library allocation
page read and write
3F95000
trusted library allocation
page read and write
667F000
stack
page read and write
2810000
heap
page read and write
FF9000
heap
page read and write
2C5A000
direct allocation
page read and write
430000
heap
page read and write
3F71000
trusted library allocation
page read and write
3F90000
trusted library allocation
page read and write
40B2000
trusted library allocation
page read and write
E85000
heap
page read and write
3F71000
trusted library allocation
page read and write
6DB7000
heap
page read and write
3FAB000
trusted library allocation
page read and write
400A000
trusted library allocation
page read and write
3F95000
trusted library allocation
page read and write
2A83000
heap
page read and write
FD5000
heap
page read and write
4879000
trusted library allocation
page read and write
3FA2000
trusted library allocation
page read and write
6E5E000
stack
page read and write
DE0000
heap
page read and write
2CC1000
direct allocation
page read and write
2C94000
direct allocation
page read and write
4B0000
heap
page read and write
EE0000
heap
page read and write
3F83000
trusted library allocation
page read and write
3B7E000
stack
page read and write
3FC4000
trusted library allocation
page read and write
6F3F000
stack
page read and write
4864000
trusted library allocation
page read and write
3F7A000
trusted library allocation
page read and write
3FAC000
trusted library allocation
page read and write
5581000
trusted library allocation
page read and write
FF2000
heap
page read and write
95B000
unkown
page read and write
3FB9000
trusted library allocation
page read and write
3F86000
trusted library allocation
page read and write
3FFC000
trusted library allocation
page read and write
3F89000
trusted library allocation
page read and write
3F9F000
trusted library allocation
page read and write
3FE0000
trusted library allocation
page read and write
3F90000
trusted library allocation
page read and write
3FA5000
trusted library allocation
page read and write
3FA9000
trusted library allocation
page read and write
6FE000
stack
page read and write
3F7D000
trusted library allocation
page read and write
3FA2000
trusted library allocation
page read and write
2C4C000
direct allocation
page read and write
37BD000
stack
page read and write
DD0000
heap
page read and write
3FAC000
trusted library allocation
page read and write
3B3F000
stack
page read and write
3F9A000
trusted library allocation
page read and write
3FBE000
trusted library allocation
page read and write
3FD4000
trusted library allocation
page read and write
3FA8000
trusted library allocation
page read and write
FED000
heap
page read and write
3F90000
trusted library allocation
page read and write
3FA7000
trusted library allocation
page read and write
3FAB000
trusted library allocation
page read and write
3F7D000
trusted library allocation
page read and write
3F7B000
trusted library allocation
page read and write
38BE000
stack
page read and write
6FE0000
trusted library allocation
page execute and read and write
3F83000
trusted library allocation
page read and write
2A80000
heap
page read and write
4007000
trusted library allocation
page read and write
6DA3000
heap
page read and write
70B0000
trusted library allocation
page read and write
3FCD000
trusted library allocation
page execute and read and write
F60000
heap
page read and write
FD5000
heap
page read and write
2D20000
remote allocation
page read and write
2D20000
remote allocation
page read and write
1176000
heap
page read and write
10E0000
direct allocation
page execute and read and write
2CBA000
direct allocation
page read and write
39FF000
stack
page read and write
3FC5000
trusted library allocation
page read and write
F68000
heap
page read and write
6760000
heap
page execute and read and write
674B000
stack
page read and write
3FA8000
trusted library allocation
page read and write
710000
heap
page read and write
3F7D000
trusted library allocation
page read and write
94E000
unkown
page read and write
48C0000
trusted library allocation
page read and write
6D7D000
heap
page read and write
455E000
stack
page read and write
3FAB000
trusted library allocation
page read and write
4140000
heap
page read and write
68AD000
stack
page read and write
3FC6000
trusted library allocation
page read and write
3F9F000
trusted library allocation
page read and write
3F73000
trusted library allocation
page read and write
400D000
trusted library allocation
page read and write
1170000
heap
page read and write
3FD9000
trusted library allocation
page read and write
7AD0000
heap
page read and write
2800000
trusted library allocation
page read and write
3F89000
trusted library allocation
page read and write
FE3000
heap
page read and write
3FF0000
trusted library allocation
page read and write
929000
unkown
page read and write
3F96000
trusted library allocation
page read and write
E80000
heap
page read and write
7090000
trusted library allocation
page read and write
866B000
trusted library allocation
page read and write
4120000
trusted library allocation
page execute and read and write
2C77000
direct allocation
page read and write
3EF8000
trusted library allocation
page read and write
7010000
trusted library allocation
page read and write
49BF000
trusted library allocation
page read and write
3F87000
trusted library allocation
page read and write
40B0000
heap
page readonly
2C9B000
direct allocation
page read and write
6FBD000
stack
page read and write
3F95000
trusted library allocation
page read and write
6FD0000
trusted library allocation
page read and write
2A1F000
stack
page read and write
3FB2000
trusted library allocation
page read and write
6D4E000
heap
page read and write
EA0000
heap
page read and write
3FBB000
trusted library allocation
page read and write
55E7000
trusted library allocation
page read and write
40AF000
stack
page read and write
682D000
stack
page read and write
7050000
trusted library allocation
page read and write
3FA8000
trusted library allocation
page read and write
3FA5000
trusted library allocation
page read and write
411C000
stack
page read and write
65BE000
stack
page read and write
4581000
trusted library allocation
page read and write
489D000
trusted library allocation
page read and write
F1A000
heap
page read and write
3FC2000
trusted library allocation
page read and write
3FBB000
trusted library allocation
page read and write
3FAB000
trusted library allocation
page read and write
3FC3000
trusted library allocation
page execute and read and write
3FED000
trusted library allocation
page read and write
6D39000
heap
page read and write
3FA1000
trusted library allocation
page read and write
2C7E000
direct allocation
page read and write
3FCC000
trusted library allocation
page read and write
686A000
stack
page read and write
There are 417 hidden memdumps, click here to show them.