IOC Report
Setup.exe

loading gif

Files

File Path
Type
Category
Malicious
Setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\203120\Sparc.com
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\203120\W
data
dropped
C:\Users\user\AppData\Local\Temp\Arise
data
dropped
C:\Users\user\AppData\Local\Temp\Craps
data
dropped
C:\Users\user\AppData\Local\Temp\Current
data
dropped
C:\Users\user\AppData\Local\Temp\Democratic
data
dropped
C:\Users\user\AppData\Local\Temp\Dodge
data
dropped
C:\Users\user\AppData\Local\Temp\Improvements
ASCII text, with very long lines (686), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Improvements.cmd (copy)
ASCII text, with very long lines (686), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Infection
data
dropped
C:\Users\user\AppData\Local\Temp\Injured
data
dropped
C:\Users\user\AppData\Local\Temp\Innovative
data
dropped
C:\Users\user\AppData\Local\Temp\Laboratories
data
dropped
C:\Users\user\AppData\Local\Temp\Las
data
dropped
C:\Users\user\AppData\Local\Temp\Lifestyle
data
dropped
C:\Users\user\AppData\Local\Temp\Modems
data
dropped
C:\Users\user\AppData\Local\Temp\Papua
data
dropped
C:\Users\user\AppData\Local\Temp\Power
data
dropped
C:\Users\user\AppData\Local\Temp\Sagem
data
dropped
C:\Users\user\AppData\Local\Temp\Technique
data
dropped
C:\Users\user\AppData\Local\Temp\Treasury
data
dropped
C:\Users\user\AppData\Local\Temp\Underground
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nhpagelo.kny.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tdajzssq.vxi.psm1
ASCII text, with no line terminators
dropped
There are 16 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Setup.exe
"C:\Users\user\Desktop\Setup.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c move Improvements Improvements.cmd & Improvements.cmd
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "opssvc wrsa"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 203120
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "Cbs" Modems
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Treasury + ..\Laboratories + ..\Lifestyle + ..\Injured + ..\Papua + ..\Craps + ..\Arise W
malicious
C:\Users\user\AppData\Local\Temp\203120\Sparc.com
Sparc.com W
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -exec bypass <!DOCTYPE html> <!--[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]--> <!--[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]--> <!--[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]--> <!--[if gt IE 8]><!--> <html class="no-js" lang="en-US"> <!--<![endif]--> <head> <title>Suspected phishing site | Cloudflare</title> <meta charset="UTF-8" /> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <meta http-equiv="X-UA-Compatible" content="IE=Edge" /> <meta name="robots" content="noindex, nofollow" /> <meta name="viewport" content="width=device-width,initial-scale=1" /> <link rel="stylesheet" id="cf_styles-css" href="/cdn-cgi/styles/cf.errors.css" /> <!--[if lt IE 9]><link rel="stylesheet" id='cf_styles-ie-css' href="/cdn-cgi/styles/cf.errors.ie.css" /><![endif]--> <style>body{margin:0;padding:0}</style> <!--[if gte IE 10]><!--> <script> if (!navigator.cookieEnabled) { window.addEventListener('DOMContentLoaded', function () { var cookieEl = document.getElementById('cookie-alert'); cookieEl.style.display = 'block'; }) } </script> <!--<![endif]--> </head> <body> <div id="cf-wrapper"> <div class="cf-alert cf-alert-error cf-cookie-error" id="cookie-alert" data-translate="enable_cookies">Please enable cookies.</div> <div id="cf-error-details" class="cf-error-details-wrapper"> <div class="cf-section cf-wrapper" style="margin-top: 100px;margin-bottom:200px;"> <div class="cf-columns one"> <div class="cf-column"> <h4 class="cf-text-error"><i class="cf-icon-exclamation-sign" style="background-size: 18px; height: 18px; width: 18px; margin-bottom: 2px;"></i> Warning</h4> <h2 style="margin: 16px 0;">Suspected Phishing</h2> <strong>This website has been reported for potential phishing.</strong> <p>Phishing is when a site attempts to steal sensitive information by falsely presenting as a safe source.</p> <div style="display: flex; align-items: center;"> <p> <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/" class="cf-btn" style="background-color: #404040; color: #fff; border: 0;">Learn More</a> <form action="/cdn-cgi/phish-bypass" method="GET" enctype="text/plain"> <input type="hidden" name="atok" value="0vOzla7LMRjuvVvuSKNV8aR5n18Cgvqbg1x8Fa8mxQk-1734782404-0.0.1.1-/int_clp_ldr_sha.txt"> <button type="submit" class="cf-btn cf-btn-danger" style="color: #bd2426; background: transparent;" data-translate="dismiss_and_enter">Ignore & Proceed</button> </form> </p> </div> </div> </div> </div><!-- /.section --> <div id="ts-blocks" style="display:none;"></div> <div class="cf-error-footer cf-wrapper w-240 lg:w-full py-10 sm:py-4 sm:px-8 mx-auto text-center sm:text-left border-solid border-0 border-t border-gray-300"> <p class="text-13"> <span class="cf-footer-item sm:block sm:mb-1">Cloudflare Ray ID: <strong class="font-semibold">8f57b5a98cec4252</strong></span> <span class="cf-footer-separator sm:hidden">&bull;</span> <span id="cf-footer-item-ip" class="cf-footer-item hidden sm:block sm:mb-1"> Your IP: <button type="button" id="cf-footer-ip-reveal" class="cf-footer-ip-reveal-btn">Click to reveal</button> <span class="hidden" id="cf-footer-ip">8.46.123.189</span> <span class="cf-footer-separator sm:hidden">&bull;</span> </span> <span class="cf-footer-item sm:block sm:mb-1"><span>Performance &amp; security by</span> <a rel="noopener noreferrer" href="https://www.cloudflare.com/5xx-error-landing" id="brand_link" target="_blank">Cloudflare</a></span> </p> <script>(function(){function d(){var b=a.getElementById("cf-footer-item-ip"),c=a.getElementById("cf-footer-ip-reveal");b&&"classList"in b&&(b.classList.remove("hidden"),c.addEventListener("click",function(){c.classList.add("hidden");a.getElementById("cf-footer-ip").classList.remove("hidden")}))}var a=document;document.addEventListener&&a.addEventListener("DOMContentLoaded",d)})();</script> </div><!-- /.error-footer --> </div><!-- /#cf-error-details --> </div><!-- /#cf-wrapper --> <script> window._cf_translation = {}; </script> </body> </html>
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\choice.exe
choice /d y /t 5
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://chillysalvagk.click/api
104.21.42.70
malicious
chillysalvagk.click
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
necklacebudi.lat
https://www.cloudflare.com/learning/access-management/phishing-atX)
unknown
http://www.autoitscript.com/autoit3/X
unknown
https://www.cloudflare.com/learning/access-management/phishhZ
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
aspecteirs.lat
https://www.cloudflare.com/learning/access-management/phishing-attack/class=cf-btnstyle=background-c
unknown
energyaffai.lat
https://www.autoitscript.com/autoit3/
unknown
https://www.cloudflare.com/learning/access-management/phishing-attack//
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://www.cloudflare.com/5xx-error-landingid=brand_linktarget=_blank
unknown
https://kliptizq.shop/int_clp_ldr_sha.txt
104.21.84.113
https://www.cloudflare.com/learning/access-management/phish
unknown
sustainskelet.lat
https://aka.ms/pscore6lBjq
unknown
https://www.cloudflare.com/5xx-error-landinghZ
unknown
crosshuaht.lat
rapeflowwj.lat
grannyejh.lat
discokeyus.lat
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.cloudflare.com/5xx-error-landingmance
unknown
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
chillysalvagk.click
104.21.42.70
malicious
kliptizq.shop
104.21.84.113
CKZFzmvdWkUlKnRYBQ.CKZFzmvdWkUlKnRYBQ
unknown

IPs

IP
Domain
Country
Malicious
104.21.42.70
chillysalvagk.click
United States
malicious
104.21.84.113
kliptizq.shop
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
3832000
trusted library allocation
page read and write
malicious
515A000
trusted library allocation
page read and write
3B66000
trusted library allocation
page read and write
3AB3000
trusted library allocation
page read and write
38B1000
trusted library allocation
page read and write
784F000
stack
page read and write
3B6D000
trusted library allocation
page read and write
5280000
trusted library allocation
page read and write
38B1000
trusted library allocation
page read and write
2CB0000
heap
page read and write
8BE000
stack
page read and write
560000
heap
page read and write
D31000
heap
page read and write
31E0000
trusted library allocation
page read and write
6EFE000
stack
page read and write
3BFD000
trusted library allocation
page read and write
39A8000
trusted library allocation
page read and write
34EE000
stack
page read and write
516B000
trusted library allocation
page read and write
3B89000
trusted library allocation
page read and write
50B1000
trusted library allocation
page read and write
2910000
heap
page read and write
D96000
heap
page read and write
3C3B000
trusted library allocation
page read and write
620000
heap
page read and write
3AB8000
trusted library allocation
page read and write
6F5000
heap
page read and write
6E7E000
stack
page read and write
3ABD000
trusted library allocation
page read and write
7930000
trusted library allocation
page read and write
3A03000
trusted library allocation
page read and write
39A9000
trusted library allocation
page read and write
38B1000
trusted library allocation
page read and write
38B1000
trusted library allocation
page read and write
5147000
trusted library allocation
page read and write
4D90000
heap
page read and write
758B000
heap
page read and write
7035000
heap
page execute and read and write
3AB3000
trusted library allocation
page read and write
3B6C000
trusted library allocation
page read and write
345D000
stack
page read and write
37F0000
trusted library allocation
page read and write
391D000
trusted library allocation
page read and write
3B4D000
trusted library allocation
page read and write
38B1000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
7538000
heap
page read and write
70BB000
stack
page read and write
38B1000
trusted library allocation
page read and write
83B0000
heap
page read and write
74AF000
stack
page read and write
4C7F000
stack
page read and write
382D000
trusted library allocation
page read and write
A26000
heap
page read and write
3AB3000
trusted library allocation
page read and write
3A25000
trusted library allocation
page read and write
30CC000
heap
page read and write
2CF5000
heap
page read and write
E60000
heap
page read and write
401000
unkown
page execute read
AC3000
heap
page read and write
60E000
stack
page read and write
4C3E000
stack
page read and write
37ED000
trusted library allocation
page read and write
22C4000
heap
page read and write
5350000
heap
page read and write
D89000
heap
page read and write
532F000
stack
page read and write
52AF000
stack
page read and write
3ABA000
trusted library allocation
page read and write
21CF000
stack
page read and write
352E000
stack
page read and write
3991000
trusted library allocation
page read and write
3C5D000
trusted library allocation
page read and write
D31000
heap
page read and write
3B63000
trusted library allocation
page read and write
D31000
heap
page read and write
AD7000
stack
page read and write
D75000
heap
page read and write
3B53000
trusted library allocation
page read and write
39EA000
trusted library allocation
page read and write
3832000
trusted library allocation
page read and write
3502000
heap
page read and write
3ABB000
trusted library allocation
page read and write
3918000
trusted library allocation
page read and write
38B1000
trusted library allocation
page read and write
3AB2000
trusted library allocation
page read and write
B50000
heap
page read and write
D31000
heap
page read and write
3C3F000
trusted library allocation
page read and write
3B4E000
trusted library allocation
page read and write
723D000
stack
page read and write
37B1000
trusted library allocation
page read and write
3502000
heap
page read and write
934000
heap
page read and write
40C000
unkown
page write copy
4D7F000
stack
page read and write
2CF4000
heap
page read and write
30CC000
stack
page read and write
D31000
heap
page read and write
6FBE000
stack
page read and write
3502000
heap
page read and write
3502000
heap
page read and write
3289000
heap
page read and write
3998000
trusted library allocation
page read and write
630000
heap
page read and write
29CC000
stack
page read and write
3280000
heap
page read and write
4E30000
heap
page execute and read and write
3920000
trusted library allocation
page read and write
72C0000
heap
page read and write
D31000
heap
page read and write
30D8000
heap
page read and write
3240000
heap
page read and write
D63000
heap
page read and write
315E000
stack
page read and write
3BFB000
trusted library allocation
page read and write
2DBE000
stack
page read and write
3262000
heap
page read and write
727D000
stack
page read and write
5CE000
stack
page read and write
77BE000
stack
page read and write
3986000
trusted library allocation
page read and write
3502000
heap
page read and write
3501000
heap
page read and write
3ABE000
trusted library allocation
page read and write
3280000
heap
page read and write
328D000
heap
page read and write
31F0000
heap
page read and write
D31000
heap
page read and write
39A3000
trusted library allocation
page read and write
3B8C000
trusted library allocation
page read and write
D80000
heap
page read and write
349E000
stack
page read and write
7530000
heap
page read and write
3075000
trusted library allocation
page execute and read and write
38B1000
trusted library allocation
page read and write
362E000
stack
page read and write
92B000
heap
page read and write
399C000
trusted library allocation
page read and write
22C0000
heap
page read and write
68E000
stack
page read and write
3287000
heap
page read and write
D95000
heap
page read and write
D82000
heap
page read and write
3B67000
trusted library allocation
page read and write
F15000
unkown
page readonly
38B1000
trusted library allocation
page read and write
6F7E000
stack
page read and write
70FE000
stack
page read and write
6BA000
heap
page read and write
7960000
trusted library allocation
page read and write
3B6E000
trusted library allocation
page read and write
5136000
trusted library allocation
page read and write
6EE000
heap
page read and write
4560000
trusted library allocation
page read and write
3B59000
trusted library allocation
page read and write
E40000
heap
page read and write
2CB8000
heap
page read and write
2CD2000
heap
page read and write
3B7F000
trusted library allocation
page read and write
3020000
trusted library allocation
page read and write
3AB3000
trusted library allocation
page read and write
3AB1000
trusted library allocation
page read and write
38B1000
trusted library allocation
page read and write
7591000
heap
page read and write
2CEA000
heap
page read and write
3280000
heap
page read and write
3C47000
trusted library allocation
page read and write
3AB4000
trusted library allocation
page read and write
79C0000
trusted library allocation
page read and write
3B7B000
trusted library allocation
page read and write
5380000
heap
page read and write
A9C000
stack
page read and write
3A0C000
trusted library allocation
page read and write
3BEE000
trusted library allocation
page read and write
D31000
heap
page read and write
2FCC000
stack
page read and write
328D000
heap
page read and write
6F5000
heap
page read and write
23CF000
stack
page read and write
38B1000
trusted library allocation
page read and write
4DEE000
stack
page read and write
3090000
trusted library allocation
page read and write
3B65000
trusted library allocation
page read and write
3B50000
trusted library allocation
page read and write
78D0000
trusted library allocation
page read and write
51AC000
trusted library allocation
page read and write
78F0000
trusted library allocation
page read and write
327E000
stack
page read and write
3153000
heap
page read and write
3168000
heap
page read and write
2E8E000
stack
page read and write
3987000
trusted library allocation
page read and write
500000
unkown
page readonly
3B72000
trusted library allocation
page read and write
3832000
trusted library allocation
page read and write
5099000
trusted library allocation
page read and write
3220000
heap
page read and write
3049000
trusted library allocation
page read and write
D31000
heap
page read and write
7950000
trusted library allocation
page read and write
D87000
heap
page read and write
38B1000
trusted library allocation
page read and write
E3E000
stack
page read and write
9C0000
trusted library allocation
page read and write
7910000
trusted library allocation
page read and write
6B0000
heap
page read and write
3B87000
trusted library allocation
page read and write
3288000
heap
page read and write
3B58000
trusted library allocation
page read and write
38B1000
trusted library allocation
page read and write
2F8F000
stack
page read and write
3824000
trusted library allocation
page read and write
311E000
stack
page read and write
713E000
stack
page read and write
38B1000
trusted library allocation
page read and write
315F000
heap
page read and write
D97000
heap
page read and write
78CD000
stack
page read and write
79B0000
trusted library allocation
page read and write
38B1000
trusted library allocation
page read and write
7920000
trusted library allocation
page read and write
F0D000
unkown
page write copy
D31000
heap
page read and write
328D000
heap
page read and write
625000
heap
page read and write
9C0000
trusted library allocation
page read and write
3AB2000
trusted library allocation
page read and write
3101000
heap
page read and write
37B1000
trusted library allocation
page read and write
E41000
unkown
page execute read
D7E000
heap
page read and write
F03000
unkown
page readonly
6F9000
heap
page read and write
75C4000
heap
page read and write
3B88000
trusted library allocation
page read and write
3B53000
trusted library allocation
page read and write
3B64000
trusted library allocation
page read and write
37E4000
trusted library allocation
page read and write
38B1000
trusted library allocation
page read and write
7641000
heap
page read and write
5EA3000
trusted library allocation
page read and write
3B7C000
trusted library allocation
page read and write
4EA1000
trusted library allocation
page read and write
D31000
heap
page read and write
39A2000
trusted library allocation
page read and write
38B1000
trusted library allocation
page read and write
326B000
heap
page read and write
3502000
heap
page read and write
CAD000
stack
page read and write
7990000
trusted library allocation
page read and write
3AB2000
trusted library allocation
page read and write
3BEA000
trusted library allocation
page read and write
2F8C000
stack
page read and write
2CDD000
heap
page read and write
3ABA000
trusted library allocation
page read and write
4DAC000
stack
page read and write
CC8000
heap
page read and write
3AB2000
trusted library allocation
page read and write
3C0B000
trusted library allocation
page read and write
D7C000
heap
page read and write
19A000
stack
page read and write
3502000
heap
page read and write
4CBE000
stack
page read and write
83D0000
trusted library allocation
page read and write
2E2F000
stack
page read and write
934000
heap
page read and write
3A1D000
trusted library allocation
page read and write
2C70000
heap
page read and write
3AB2000
trusted library allocation
page read and write
3AB6000
trusted library allocation
page read and write
328F000
heap
page read and write
3AB6000
trusted library allocation
page read and write
517D000
trusted library allocation
page read and write
2E36000
heap
page read and write
717000
heap
page read and write
D31000
heap
page read and write
3B69000
trusted library allocation
page read and write
5E69000
trusted library allocation
page read and write
3B42000
trusted library allocation
page read and write
328D000
heap
page read and write
220E000
stack
page read and write
37B1000
trusted library allocation
page read and write
4DC0000
heap
page read and write
35EF000
stack
page read and write
757E000
heap
page read and write
38B1000
trusted library allocation
page read and write
EDD000
unkown
page readonly
31A7000
heap
page read and write
420000
unkown
page read and write
3B80000
trusted library allocation
page read and write
570000
heap
page read and write
328F000
heap
page read and write
98000
stack
page read and write
7980000
trusted library allocation
page read and write
391B000
trusted library allocation
page read and write
D31000
heap
page read and write
A37000
heap
page read and write
3B87000
trusted library allocation
page read and write
398C000
trusted library allocation
page read and write
2F8F000
stack
page read and write
399D000
trusted library allocation
page read and write
3B50000
trusted library allocation
page read and write
3030000
trusted library allocation
page read and write
3AB9000
trusted library allocation
page read and write
4C7000
unkown
page read and write
3AB5000
trusted library allocation
page read and write
3C2E000
trusted library allocation
page read and write
2CED000
heap
page read and write
CC0000
heap
page read and write
780E000
stack
page read and write
2DED000
stack
page read and write
398B000
trusted library allocation
page read and write
D91000
heap
page read and write
327C000
heap
page read and write
39FB000
trusted library allocation
page read and write
3155000
heap
page read and write
4CFF000
stack
page read and write
3AB0000
trusted library allocation
page read and write
3034000
trusted library allocation
page read and write
2240000
heap
page read and write
3B6C000
trusted library allocation
page read and write
3072000
trusted library allocation
page read and write
D97000
heap
page read and write
3AB8000
trusted library allocation
page read and write
777E000
stack
page read and write
3AB3000
trusted library allocation
page read and write
3929000
trusted library allocation
page read and write
3AB8000
trusted library allocation
page read and write
2E30000
heap
page read and write
2CEE000
heap
page read and write
38B1000
trusted library allocation
page read and write
3B74000
trusted library allocation
page read and write
3B8D000
trusted library allocation
page read and write
8520000
heap
page read and write
707D000
stack
page read and write
3AB2000
trusted library allocation
page read and write
4E41000
trusted library allocation
page read and write
3B88000
trusted library allocation
page read and write
D0E000
stack
page read and write
3832000
trusted library allocation
page read and write
3829000
trusted library allocation
page read and write
3B63000
trusted library allocation
page read and write
75B1000
heap
page read and write
2CEA000
heap
page read and write
3926000
trusted library allocation
page read and write
71BA000
stack
page read and write
2CDC000
heap
page read and write
327C000
heap
page read and write
3AB6000
trusted library allocation
page read and write
401000
unkown
page execute read
3AB3000
trusted library allocation
page read and write
3B5E000
trusted library allocation
page read and write
2C80000
heap
page read and write
37EC000
trusted library allocation
page read and write
34A0000
heap
page read and write
3AB8000
trusted library allocation
page read and write
3981000
trusted library allocation
page read and write
D31000
heap
page read and write
409000
unkown
page readonly
38B1000
trusted library allocation
page read and write
920000
heap
page read and write
3B43000
trusted library allocation
page read and write
3226000
heap
page read and write
752F000
stack
page read and write
3AB0000
trusted library allocation
page read and write
AA4000
heap
page read and write
31C8000
trusted library allocation
page read and write
3033000
trusted library allocation
page execute and read and write
38B1000
trusted library allocation
page read and write
35AE000
stack
page read and write
51A1000
trusted library allocation
page read and write
327C000
heap
page read and write
290F000
stack
page read and write
3C2F000
trusted library allocation
page read and write
75BD000
heap
page read and write
50BF000
trusted library allocation
page read and write
3B7A000
trusted library allocation
page read and write
83F0000
trusted library allocation
page read and write
323E000
stack
page read and write
75E0000
heap
page read and write
327C000
heap
page read and write
746E000
stack
page read and write
3502000
heap
page read and write
38B1000
trusted library allocation
page read and write
328D000
heap
page read and write
2210000
heap
page read and write
40C000
unkown
page read and write
D61000
heap
page read and write
3832000
trusted library allocation
page read and write
328D000
heap
page read and write
38B1000
trusted library allocation
page read and write
3997000
trusted library allocation
page read and write
3640000
heap
page read and write
3B6E000
trusted library allocation
page read and write
3B52000
trusted library allocation
page read and write
2CCF000
heap
page read and write
3AB6000
trusted library allocation
page read and write
2DE0000
heap
page read and write
72BA000
stack
page read and write
500000
unkown
page readonly
D79000
heap
page read and write
37B1000
trusted library allocation
page read and write
3B53000
trusted library allocation
page read and write
B4C000
stack
page read and write
37B1000
trusted library allocation
page read and write
38B1000
trusted library allocation
page read and write
38B1000
trusted library allocation
page read and write
3B43000
trusted library allocation
page read and write
3157000
heap
page read and write
7940000
trusted library allocation
page read and write
D31000
heap
page read and write
533A000
trusted library allocation
page read and write
38B1000
trusted library allocation
page read and write
3AB0000
trusted library allocation
page read and write
D65000
heap
page read and write
2CEA000
heap
page read and write
3248000
heap
page read and write
3AB7000
trusted library allocation
page read and write
925000
heap
page read and write
77C0000
heap
page execute and read and write
52EE000
stack
page read and write
3B7E000
trusted library allocation
page read and write
30A0000
heap
page readonly
3B62000
trusted library allocation
page read and write
83C0000
trusted library allocation
page execute and read and write
318E000
heap
page read and write
717000
heap
page read and write
3ABA000
trusted library allocation
page read and write
3AB0000
trusted library allocation
page read and write
D93000
heap
page read and write
280E000
stack
page read and write
72D0000
heap
page read and write
37E5000
trusted library allocation
page read and write
434000
unkown
page read and write
326D000
heap
page read and write
3AB5000
trusted library allocation
page read and write
3502000
heap
page read and write
3AB5000
trusted library allocation
page read and write
303D000
trusted library allocation
page execute and read and write
3B6F000
trusted library allocation
page read and write
3923000
trusted library allocation
page read and write
6C9000
heap
page read and write
83E0000
trusted library allocation
page read and write
3502000
heap
page read and write
B8C000
stack
page read and write
6F3E000
stack
page read and write
75D3000
heap
page read and write
3AB3000
trusted library allocation
page read and write
37EE000
trusted library allocation
page read and write
3864000
trusted library allocation
page read and write
392C000
trusted library allocation
page read and write
3502000
heap
page read and write
3992000
trusted library allocation
page read and write
71FD000
stack
page read and write
2CFA000
heap
page read and write
79D0000
trusted library allocation
page read and write
6F9000
heap
page read and write
325E000
heap
page read and write
51EB000
trusted library allocation
page read and write
3194000
heap
page read and write
3ABF000
trusted library allocation
page read and write
D31000
heap
page read and write
3C2B000
trusted library allocation
page read and write
3B8A000
trusted library allocation
page read and write
30B0000
trusted library allocation
page execute and read and write
CB0000
heap
page read and write
D31000
heap
page read and write
D31000
heap
page read and write
74EE000
stack
page read and write
3501000
heap
page read and write
2FE0000
heap
page read and write
400000
unkown
page readonly
3AB1000
trusted library allocation
page read and write
4D3E000
stack
page read and write
3AB3000
trusted library allocation
page read and write
E40000
unkown
page readonly
D31000
heap
page read and write
3B7A000
trusted library allocation
page read and write
7030000
heap
page execute and read and write
3050000
heap
page read and write
3B4C000
trusted library allocation
page read and write
30C0000
heap
page read and write
3502000
heap
page read and write
3ABA000
trusted library allocation
page read and write
306A000
trusted library allocation
page execute and read and write
3340000
heap
page read and write
2FAF000
stack
page read and write
3172000
heap
page read and write
3ABE000
trusted library allocation
page read and write
2CFD000
heap
page read and write
3070000
trusted library allocation
page read and write
328F000
heap
page read and write
D95000
heap
page read and write
9C0000
trusted library allocation
page read and write
2B0F000
stack
page read and write
327F000
heap
page read and write
38B1000
trusted library allocation
page read and write
30F5000
heap
page read and write
2CFD000
heap
page read and write
D31000
heap
page read and write
75DA000
heap
page read and write
3C1A000
trusted library allocation
page read and write
37B1000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
8400000
trusted library allocation
page execute and read and write
3AB6000
trusted library allocation
page read and write
BF0000
heap
page read and write
910000
heap
page read and write
3040000
trusted library allocation
page read and write
3160000
heap
page read and write
3980000
trusted library allocation
page read and write
2FCC000
stack
page read and write
788E000
stack
page read and write
5E49000
trusted library allocation
page read and write
70D000
heap
page read and write
F11000
unkown
page write copy
38B1000
trusted library allocation
page read and write
7900000
trusted library allocation
page execute and read and write
2C3C000
stack
page read and write
D8E000
heap
page read and write
2CFD000
heap
page read and write
3648000
heap
page read and write
3060000
trusted library allocation
page read and write
37F3000
trusted library allocation
page read and write
400000
unkown
page readonly
D8C000
heap
page read and write
319A000
heap
page read and write
C6E000
stack
page read and write
7970000
trusted library allocation
page read and write
50BB000
trusted library allocation
page read and write
38B1000
trusted library allocation
page read and write
3AB6000
trusted library allocation
page read and write
3ABD000
trusted library allocation
page read and write
46B000
unkown
page read and write
6EBE000
stack
page read and write
3A14000
trusted library allocation
page read and write
409000
unkown
page readonly
37B1000
trusted library allocation
page read and write
392E000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
4BF000
unkown
page read and write
D31000
heap
page read and write
717E000
stack
page read and write
2FE8000
heap
page read and write
3262000
heap
page read and write
2F4E000
stack
page read and write
39F2000
trusted library allocation
page read and write
There are 539 hidden memdumps, click here to show them.