IOC Report
Full_Ver_Setup.exe

loading gif

Files

File Path
Type
Category
Malicious
Full_Ver_Setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d345mtmt.sjj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fs5g2pay.usn.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Full_Ver_Setup.exe
"C:\Users\user\Desktop\Full_Ver_Setup.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -exec bypass <!DOCTYPE html> <!--[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]--> <!--[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]--> <!--[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]--> <!--[if gt IE 8]><!--> <html class="no-js" lang="en-US"> <!--<![endif]--> <head> <title>Suspected phishing site | Cloudflare</title> <meta charset="UTF-8" /> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <meta http-equiv="X-UA-Compatible" content="IE=Edge" /> <meta name="robots" content="noindex, nofollow" /> <meta name="viewport" content="width=device-width,initial-scale=1" /> <link rel="stylesheet" id="cf_styles-css" href="/cdn-cgi/styles/cf.errors.css" /> <!--[if lt IE 9]><link rel="stylesheet" id='cf_styles-ie-css' href="/cdn-cgi/styles/cf.errors.ie.css" /><![endif]--> <style>body{margin:0;padding:0}</style> <!--[if gte IE 10]><!--> <script> if (!navigator.cookieEnabled) { window.addEventListener('DOMContentLoaded', function () { var cookieEl = document.getElementById('cookie-alert'); cookieEl.style.display = 'block'; }) } </script> <!--<![endif]--> </head> <body> <div id="cf-wrapper"> <div class="cf-alert cf-alert-error cf-cookie-error" id="cookie-alert" data-translate="enable_cookies">Please enable cookies.</div> <div id="cf-error-details" class="cf-error-details-wrapper"> <div class="cf-section cf-wrapper" style="margin-top: 100px;margin-bottom:200px;"> <div class="cf-columns one"> <div class="cf-column"> <h4 class="cf-text-error"><i class="cf-icon-exclamation-sign" style="background-size: 18px; height: 18px; width: 18px; margin-bottom: 2px;"></i> Warning</h4> <h2 style="margin: 16px 0;">Suspected Phishing</h2> <strong>This website has been reported for potential phishing.</strong> <p>Phishing is when a site attempts to steal sensitive information by falsely presenting as a safe source.</p> <div style="display: flex; align-items: center;"> <p> <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/" class="cf-btn" style="background-color: #404040; color: #fff; border: 0;">Learn More</a> <form action="/cdn-cgi/phish-bypass" method="GET" enctype="text/plain"> <input type="hidden" name="atok" value="Y0.m3tWOgXwCJmvny1XQKkMDMWzKl6dWzxBD26bzmmI-1734906652-0.0.1.1-/int_clp_ldr_sha.txt"> <button type="submit" class="cf-btn cf-btn-danger" style="color: #bd2426; background: transparent;" data-translate="dismiss_and_enter">Ignore & Proceed</button> </form> </p> </div> </div> </div> </div><!-- /.section --> <div id="ts-blocks" style="display:none;"></div> <div class="cf-error-footer cf-wrapper w-240 lg:w-full py-10 sm:py-4 sm:px-8 mx-auto text-center sm:text-left border-solid border-0 border-t border-gray-300"> <p class="text-13"> <span class="cf-footer-item sm:block sm:mb-1">Cloudflare Ray ID: <strong class="font-semibold">8f638f1188e30f7d</strong></span> <span class="cf-footer-separator sm:hidden">&bull;</span> <span id="cf-footer-item-ip" class="cf-footer-item hidden sm:block sm:mb-1"> Your IP: <button type="button" id="cf-footer-ip-reveal" class="cf-footer-ip-reveal-btn">Click to reveal</button> <span class="hidden" id="cf-footer-ip">8.46.123.189</span> <span class="cf-footer-separator sm:hidden">&bull;</span> </span> <span class="cf-footer-item sm:block sm:mb-1"><span>Performance &amp; security by</span> <a rel="noopener noreferrer" href="https://www.cloudflare.com/5xx-error-landing" id="brand_link" target="_blank">Cloudflare</a></span> </p> <script>(function(){function d(){var b=a.getElementById("cf-footer-item-ip"),c=a.getElementById("cf-footer-ip-reveal");b&&"classList"in b&&(b.classList.remove("hidden"),c.addEventListener("click",function(){c.classList.add("hidden");a.getElementById("cf-footer-ip").classList.remove("hidden")}))}var a=document;document.addEventListener&&a.addEventListener("DOMContentLoaded",d)})();</script> </div><!-- /.error-footer --> </div><!-- /#cf-error-details --> </div><!-- /#cf-wrapper --> <script> window._cf_translation = {}; </script> </body> </html>
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
fannleadyn.click
malicious
https://fannleadyn.click/api
104.21.63.229
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://fannleadyn.click/1X
unknown
https://duckduckgo.com/ac/?q=
unknown
https://kliptizq.shop/
unknown
necklacebudi.lat
https://fannleadyn.click/apiF9
unknown
https://www.cloudflare.com/learning/access-management/phishhZ
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://fannleadyn.click:443/api((
unknown
https://www.cloudflare.com/5xx-error-landingmancet
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
aspecteirs.lat
https://www.cloudflare.com/learning/access-management/phishing-attack/class=cf-btnstyle=background-c
unknown
https://fannleadyn.click/Y
unknown
https://fannleadyn.click/apiv
unknown
https://kliptizq.shop/int_clp_ldr_sha.txtf1
unknown
https://neqi.shop/sdgjyut/psh.txt
unknown
https://aka.ms/pscore6lB
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://www.cloudflare.com/learning/access-management/phish
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
sustainskelet.lat
https://www.cloudflare.com/5xx-error-landinghZ
unknown
crosshuaht.lat
rapeflowwj.lat
https://fannleadyn.click/x
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://fannleadyn.click/r
unknown
https://fannleadyn.click/s
unknown
http://www.innosetup.com/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://www.cloudflare.com/learning/access-management/phishing-atX)
unknown
https://neqi.shop/sdgjyut/psh.txtY)
unknown
https://neqi.shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://fannleadyn.click:443/apiell
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
energyaffai.lat
https://www.ecosia.org/newtab/
unknown
https://fannleadyn.click:443/api_PROFILE_STRING=Internet
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://kliptizq.shop:443/int_clp_ldr_sha.txtn
unknown
https://www.cloudflare.com/5xx-error-landingid=brand_linktarget=_blank
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://neqi.shop/Y
unknown
https://fannleadyn.click/api2
unknown
https://neqi.shop:443/sdgjyut/psh.txt
unknown
https://neqi.shop/sdgjyut/psh.txtc
unknown
https://kliptizq.shop/int_clp_ldr_sha.txt
104.21.84.113
https://fannleadyn.click/apiDZ
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://fannleadyn.click/
unknown
http://www.remobjects.com/ps
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
grannyejh.lat
discokeyus.lat
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 57 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fannleadyn.click
104.21.63.229
malicious
kliptizq.shop
104.21.84.113
neqi.shop
194.58.112.174

IPs

IP
Domain
Country
Malicious
104.21.63.229
fannleadyn.click
United States
malicious
104.21.84.113
kliptizq.shop
United States
194.58.112.174
neqi.shop
Russian Federation

Memdumps

Base Address
Regiontype
Protect
Malicious
3200000
direct allocation
page execute and read and write
malicious
753000
heap
page read and write
80F000
heap
page read and write
3F36000
trusted library allocation
page read and write
23F1000
direct allocation
page read and write
81F000
heap
page read and write
2220000
heap
page read and write
23C6000
direct allocation
page read and write
3720000
heap
page readonly
7E2000
heap
page read and write
7BCD000
heap
page read and write
3F05000
trusted library allocation
page read and write
4010000
trusted library allocation
page read and write
7D5000
heap
page read and write
4019000
trusted library allocation
page read and write
23F8000
direct allocation
page read and write
3FB4000
trusted library allocation
page read and write
4001000
trusted library allocation
page read and write
7DF000
heap
page read and write
7BDF000
heap
page read and write
80A000
heap
page read and write
76FE000
stack
page read and write
4008000
trusted library allocation
page read and write
610000
heap
page read and write
42EA000
trusted library allocation
page read and write
3F1D000
trusted library allocation
page read and write
403B000
trusted library allocation
page read and write
383A000
trusted library allocation
page read and write
3261000
heap
page read and write
3F68000
trusted library allocation
page read and write
3261000
heap
page read and write
4075000
trusted library allocation
page read and write
7D0000
heap
page read and write
344F000
heap
page read and write
3F0A000
trusted library allocation
page read and write
3AB0000
remote allocation
page read and write
3261000
heap
page read and write
861000
heap
page read and write
7BCA000
heap
page read and write
4702000
trusted library allocation
page read and write
750000
heap
page read and write
4001000
trusted library allocation
page read and write
3F48000
trusted library allocation
page read and write
3FCA000
trusted library allocation
page read and write
3F3A000
trusted library allocation
page read and write
3FD3000
trusted library allocation
page read and write
7BDB000
heap
page read and write
7EA0000
trusted library allocation
page read and write
3F99000
trusted library allocation
page read and write
3AAE000
stack
page read and write
7BB3000
heap
page read and write
6439000
trusted library allocation
page read and write
3FAF000
trusted library allocation
page read and write
3F41000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
857000
heap
page read and write
3F08000
trusted library allocation
page read and write
577C000
trusted library allocation
page read and write
5498000
trusted library allocation
page read and write
3261000
heap
page read and write
3F96000
trusted library allocation
page read and write
3F5E000
trusted library allocation
page read and write
3261000
heap
page read and write
3F5F000
trusted library allocation
page read and write
5080000
heap
page execute and read and write
7B6B000
heap
page read and write
3F1D000
trusted library allocation
page read and write
3FCE000
trusted library allocation
page read and write
50B0000
heap
page read and write
81F000
heap
page read and write
5431000
trusted library allocation
page read and write
3675000
trusted library allocation
page execute and read and write
7BD5000
heap
page read and write
4316000
trusted library allocation
page read and write
4027000
trusted library allocation
page read and write
614000
heap
page read and write
3430000
heap
page read and write
3F5A000
trusted library allocation
page read and write
5724000
trusted library allocation
page read and write
406D000
trusted library allocation
page read and write
4019000
trusted library allocation
page read and write
4000000
trusted library allocation
page read and write
3F4A000
trusted library allocation
page read and write
502E000
stack
page read and write
7E1D000
stack
page read and write
7EB000
heap
page read and write
7E90000
trusted library allocation
page read and write
7EE000
heap
page read and write
420B000
trusted library allocation
page read and write
83F000
heap
page read and write
7C6000
heap
page read and write
810000
heap
page read and write
500000
unkown
page execute read
82A000
heap
page read and write
838000
heap
page read and write
4031000
trusted library allocation
page read and write
4010000
trusted library allocation
page read and write
3FA3000
trusted library allocation
page read and write
56A9000
trusted library allocation
page read and write
23A9000
direct allocation
page read and write
3F66000
trusted library allocation
page read and write
839000
heap
page read and write
22B0000
heap
page read and write
364D000
trusted library allocation
page execute and read and write
3F34000
trusted library allocation
page read and write
839000
heap
page read and write
2394000
direct allocation
page read and write
400A000
trusted library allocation
page read and write
3FBE000
trusted library allocation
page read and write
3FD6000
trusted library allocation
page read and write
7D9F000
stack
page read and write
3FB9000
trusted library allocation
page read and write
3F59000
trusted library allocation
page read and write
3FC5000
trusted library allocation
page read and write
3644000
trusted library allocation
page read and write
7E5000
heap
page read and write
3643000
trusted library allocation
page execute and read and write
7740000
heap
page read and write
3FCE000
trusted library allocation
page read and write
23E3000
direct allocation
page read and write
5712000
trusted library allocation
page read and write
7FC000
heap
page read and write
3FD6000
trusted library allocation
page read and write
3FA1000
trusted library allocation
page read and write
74AE000
stack
page read and write
7A2E000
stack
page read and write
852000
heap
page read and write
7D5000
heap
page read and write
3F0C000
trusted library allocation
page read and write
614000
heap
page read and write
5035000
heap
page execute and read and write
3F56000
trusted library allocation
page read and write
865000
heap
page read and write
3FA1000
trusted library allocation
page read and write
7F2000
heap
page read and write
3F00000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
840000
heap
page read and write
614000
heap
page read and write
3F47000
trusted library allocation
page read and write
7F3000
heap
page read and write
5F0000
heap
page read and write
19C000
stack
page read and write
586E000
trusted library allocation
page read and write
7BA3000
heap
page read and write
3F49000
trusted library allocation
page read and write
3F0F000
trusted library allocation
page read and write
5030000
heap
page execute and read and write
3FCE000
trusted library allocation
page read and write
824000
heap
page read and write
824000
heap
page read and write
88E0000
heap
page read and write
84A000
heap
page read and write
3F16000
trusted library allocation
page read and write
7F7000
heap
page read and write
3670000
trusted library allocation
page read and write
832000
heap
page read and write
99000
stack
page read and write
862000
heap
page read and write
832000
heap
page read and write
4FEE000
stack
page read and write
3F01000
trusted library allocation
page read and write
3FD1000
trusted library allocation
page read and write
7C7E000
stack
page read and write
3FB0000
trusted library allocation
page read and write
3F63000
trusted library allocation
page read and write
3F5A000
trusted library allocation
page read and write
83F000
heap
page read and write
7DA000
heap
page read and write
3FC2000
trusted library allocation
page read and write
857000
heap
page read and write
3FD5000
trusted library allocation
page read and write
401F000
trusted library allocation
page read and write
817000
heap
page read and write
7B87000
heap
page read and write
3F01000
trusted library allocation
page read and write
3FA5000
trusted library allocation
page read and write
36DE000
stack
page read and write
3FB0000
trusted library allocation
page read and write
5686000
trusted library allocation
page read and write
4039000
trusted library allocation
page read and write
3F56000
trusted library allocation
page read and write
838000
heap
page read and write
81C000
heap
page read and write
386E000
stack
page read and write
2A00000
trusted library allocation
page read and write
3F33000
trusted library allocation
page read and write
855000
heap
page read and write
3F9E000
trusted library allocation
page read and write
7EB000
heap
page read and write
3F59000
trusted library allocation
page read and write
3F9D000
trusted library allocation
page read and write
3F99000
trusted library allocation
page read and write
82A000
heap
page read and write
3F3D000
trusted library allocation
page read and write
72E000
stack
page read and write
3FD1000
trusted library allocation
page read and write
3F7E000
trusted library allocation
page read and write
3659000
trusted library allocation
page read and write
7D0000
heap
page read and write
7CF0000
trusted library allocation
page execute and read and write
3672000
trusted library allocation
page read and write
36E0000
heap
page read and write
402F000
trusted library allocation
page read and write
4242000
trusted library allocation
page read and write
7DE000
heap
page read and write
3F99000
trusted library allocation
page read and write
7E8000
heap
page read and write
3476000
heap
page read and write
4010000
trusted library allocation
page read and write
3FA1000
trusted library allocation
page read and write
50D000
unkown
page read and write
3FA5000
trusted library allocation
page read and write
3F98000
trusted library allocation
page read and write
558E000
trusted library allocation
page read and write
3C1F000
stack
page read and write
3FBF000
trusted library allocation
page read and write
3261000
heap
page read and write
4211000
trusted library allocation
page read and write
3FC6000
trusted library allocation
page read and write
7CD000
heap
page read and write
88F0000
trusted library allocation
page read and write
513000
unkown
page readonly
3F06000
trusted library allocation
page read and write
3F98000
trusted library allocation
page read and write
7DE000
heap
page read and write
5A0000
heap
page read and write
3F9A000
trusted library allocation
page read and write
3F99000
trusted library allocation
page read and write
79EE000
stack
page read and write
3FAF000
trusted library allocation
page read and write
3F25000
trusted library allocation
page read and write
3750000
trusted library allocation
page execute and read and write
787E000
stack
page read and write
85B000
heap
page read and write
7EE000
heap
page read and write
3260000
heap
page read and write
4055000
trusted library allocation
page read and write
757D000
stack
page read and write
7D1000
heap
page read and write
5792000
trusted library allocation
page read and write
614000
heap
page read and write
7EB000
heap
page read and write
4036000
trusted library allocation
page read and write
822000
heap
page read and write
3F10000
trusted library allocation
page read and write
4019000
trusted library allocation
page read and write
4008000
trusted library allocation
page read and write
81C000
heap
page read and write
3F96000
trusted library allocation
page read and write
3F25000
trusted library allocation
page read and write
402A000
trusted library allocation
page read and write
7DDE000
stack
page read and write
3F12000
trusted library allocation
page read and write
4039000
trusted library allocation
page read and write
846000
heap
page read and write
3F9A000
trusted library allocation
page read and write
3F98000
trusted library allocation
page read and write
84D000
heap
page read and write
862000
heap
page read and write
7E50000
trusted library allocation
page read and write
76BA000
stack
page read and write
7DD000
heap
page read and write
7F8000
heap
page read and write
3F99000
trusted library allocation
page read and write
85E000
heap
page read and write
3F2F000
trusted library allocation
page read and write
3F6A000
trusted library allocation
page read and write
4201000
trusted library allocation
page read and write
3F5F000
trusted library allocation
page read and write
3F38000
trusted library allocation
page read and write
400000
unkown
page readonly
35AE000
stack
page read and write
3FD7000
trusted library allocation
page read and write
3F1F000
trusted library allocation
page read and write
8920000
trusted library allocation
page execute and read and write
7DA000
heap
page read and write
862000
heap
page read and write
75FE000
stack
page read and write
3261000
heap
page read and write
371E000
stack
page read and write
3F2D000
trusted library allocation
page read and write
34D5000
heap
page read and write
7FC000
heap
page read and write
3F6D000
trusted library allocation
page read and write
3F2B000
trusted library allocation
page read and write
7D5000
heap
page read and write
3FB0000
trusted library allocation
page read and write
3F57000
trusted library allocation
page read and write
7DE000
heap
page read and write
50E0000
heap
page read and write
3F1F000
trusted library allocation
page read and write
3F5F000
trusted library allocation
page read and write
3FB6000
trusted library allocation
page read and write
3FD7000
trusted library allocation
page read and write
855000
heap
page read and write
356E000
stack
page read and write
838000
heap
page read and write
7CBF000
stack
page read and write
7D00000
trusted library allocation
page read and write
7E60000
trusted library allocation
page read and write
85E000
heap
page read and write
815000
heap
page read and write
502000
unkown
page write copy
3FCA000
trusted library allocation
page read and write
7CD000
heap
page read and write
3F96000
trusted library allocation
page read and write
614000
heap
page read and write
3F11000
trusted library allocation
page read and write
3F3E000
trusted library allocation
page read and write
402B000
trusted library allocation
page read and write
7FB3000
trusted library allocation
page read and write
813000
heap
page read and write
34EC000
heap
page read and write
4031000
trusted library allocation
page read and write
7BE000
heap
page read and write
3B1E000
stack
page read and write
7D8000
heap
page read and write
4039000
trusted library allocation
page read and write
43A4000
trusted library allocation
page read and write
3F99000
trusted library allocation
page read and write
3F36000
trusted library allocation
page read and write
3F9D000
trusted library allocation
page read and write
7E40000
trusted library allocation
page read and write
3F1D000
trusted library allocation
page read and write
3FA1000
trusted library allocation
page read and write
4001000
trusted library allocation
page read and write
238C000
direct allocation
page read and write
3FA1000
trusted library allocation
page read and write
3F9A000
trusted library allocation
page read and write
7E70000
trusted library allocation
page read and write
3F5A000
trusted library allocation
page read and write
3FA0000
trusted library allocation
page read and write
7A52000
heap
page read and write
800000
heap
page read and write
832000
heap
page read and write
81C000
heap
page read and write
3261000
heap
page read and write
84E000
heap
page read and write
7E30000
trusted library allocation
page read and write
3FA3000
trusted library allocation
page read and write
7F4000
heap
page read and write
3F35000
trusted library allocation
page read and write
3738000
trusted library allocation
page read and write
344D000
heap
page read and write
3FBF000
trusted library allocation
page read and write
811000
heap
page read and write
767D000
stack
page read and write
3F5E000
trusted library allocation
page read and write
88C0000
heap
page read and write
7C6000
heap
page read and write
22B5000
heap
page read and write
3F53000
trusted library allocation
page read and write
33FE000
stack
page read and write
400D000
trusted library allocation
page read and write
820000
heap
page read and write
4C1B000
trusted library allocation
page read and write
3FAF000
trusted library allocation
page read and write
4039000
trusted library allocation
page read and write
3C6E000
stack
page read and write
773B000
stack
page read and write
4042000
trusted library allocation
page read and write
23B8000
direct allocation
page read and write
437A000
trusted library allocation
page read and write
402B000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
3FB6000
trusted library allocation
page read and write
4029000
trusted library allocation
page read and write
422A000
trusted library allocation
page read and write
3F9D000
trusted library allocation
page read and write
7EB0000
trusted library allocation
page read and write
3261000
heap
page read and write
7750000
heap
page read and write
4F8E000
stack
page read and write
3FB2000
trusted library allocation
page read and write
3F3A000
trusted library allocation
page read and write
3F0E000
trusted library allocation
page read and write
3FCA000
trusted library allocation
page read and write
23BF000
direct allocation
page read and write
32D8000
heap
page read and write
780000
heap
page read and write
74EE000
stack
page read and write
7E8000
heap
page read and write
3660000
trusted library allocation
page read and write
7E2000
heap
page read and write
57D9000
trusted library allocation
page read and write
7CD000
heap
page read and write
3FD6000
trusted library allocation
page read and write
3FB0000
trusted library allocation
page read and write
3270000
heap
page read and write
81C000
heap
page read and write
401000
unkown
page execute read
7CE0000
trusted library allocation
page read and write
23B0000
direct allocation
page read and write
3FCE000
trusted library allocation
page read and write
3FBE000
trusted library allocation
page read and write
7C8000
heap
page read and write
3F62000
trusted library allocation
page read and write
7C8000
heap
page read and write
4F90000
trusted library allocation
page read and write
4F4C000
stack
page read and write
3690000
trusted library allocation
page read and write
502000
unkown
page read and write
7D5E000
stack
page read and write
3FA1000
trusted library allocation
page read and write
39AD000
stack
page read and write
3FD7000
trusted library allocation
page read and write
763E000
stack
page read and write
7EB000
heap
page read and write
79AE000
stack
page read and write
832000
heap
page read and write
796E000
stack
page read and write
4039000
trusted library allocation
page read and write
3FA6000
trusted library allocation
page read and write
3261000
heap
page read and write
3650000
trusted library allocation
page read and write
4039000
trusted library allocation
page read and write
2230000
direct allocation
page execute and read and write
839000
heap
page read and write
7CD0000
heap
page execute and read and write
23D4000
direct allocation
page read and write
7EC0000
trusted library allocation
page read and write
3FD7000
trusted library allocation
page read and write
7C6000
heap
page read and write
3360000
trusted library allocation
page read and write
3F47000
trusted library allocation
page read and write
239B000
direct allocation
page read and write
81A000
heap
page read and write
4008000
trusted library allocation
page read and write
3F58000
trusted library allocation
page read and write
3278000
stack
page read and write
396D000
stack
page read and write
7B9E000
heap
page read and write
3FA5000
trusted library allocation
page read and write
800000
heap
page read and write
3D6E000
stack
page read and write
3F71000
trusted library allocation
page read and write
3F33000
trusted library allocation
page read and write
3DCE000
stack
page read and write
826000
heap
page read and write
824000
heap
page read and write
323C000
stack
page read and write
4019000
trusted library allocation
page read and write
85A000
heap
page read and write
3F53000
trusted library allocation
page read and write
88D0000
trusted library allocation
page execute and read and write
42B2000
trusted library allocation
page read and write
75BB000
stack
page read and write
4039000
trusted library allocation
page read and write
3F1F000
trusted library allocation
page read and write
221F000
stack
page read and write
81A000
heap
page read and write
804000
heap
page read and write
3FCA000
trusted library allocation
page read and write
3F25000
trusted library allocation
page read and write
3F66000
trusted library allocation
page read and write
7CD000
heap
page read and write
843000
heap
page read and write
569F000
trusted library allocation
page read and write
788000
heap
page read and write
4043000
trusted library allocation
page read and write
3FAC000
trusted library allocation
page read and write
7E3000
heap
page read and write
3AB0000
remote allocation
page read and write
3F08000
trusted library allocation
page read and write
507E000
stack
page read and write
3F0C000
trusted library allocation
page read and write
851000
heap
page read and write
6459000
trusted library allocation
page read and write
807000
heap
page read and write
3FC6000
trusted library allocation
page read and write
861000
heap
page read and write
852000
heap
page read and write
3F0C000
trusted library allocation
page read and write
82A000
heap
page read and write
3F42000
trusted library allocation
page read and write
4036000
trusted library allocation
page read and write
809000
heap
page read and write
7EE000
heap
page read and write
7DE000
heap
page read and write
3760000
heap
page read and write
7BAD000
heap
page read and write
7C8000
heap
page read and write
3F9D000
trusted library allocation
page read and write
4262000
trusted library allocation
page read and write
50D000
unkown
page write copy
3F57000
trusted library allocation
page read and write
4037000
trusted library allocation
page read and write
7B59000
heap
page read and write
855000
heap
page read and write
346A000
heap
page read and write
35EF000
stack
page read and write
97F000
stack
page read and write
838000
heap
page read and write
809000
heap
page read and write
3F79000
trusted library allocation
page read and write
3FC6000
trusted library allocation
page read and write
4039000
trusted library allocation
page read and write
3F9A000
trusted library allocation
page read and write
78BB000
stack
page read and write
3FA4000
trusted library allocation
page read and write
2970000
heap
page read and write
3F10000
trusted library allocation
page read and write
3F2F000
trusted library allocation
page read and write
4008000
trusted library allocation
page read and write
402F000
trusted library allocation
page read and write
50A000
unkown
page read and write
4010000
trusted library allocation
page read and write
832000
heap
page read and write
813000
heap
page read and write
746F000
stack
page read and write
800000
heap
page read and write
3F62000
trusted library allocation
page read and write
3F24000
trusted library allocation
page read and write
6496000
trusted library allocation
page read and write
81A000
heap
page read and write
4007000
trusted library allocation
page read and write
3AB0000
remote allocation
page read and write
22B9000
heap
page read and write
3720000
heap
page read and write
3F75000
trusted library allocation
page read and write
3F30000
trusted library allocation
page read and write
7D2000
heap
page read and write
4008000
trusted library allocation
page read and write
84D000
heap
page read and write
23EA000
direct allocation
page read and write
3F9D000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
7C6000
heap
page read and write
23CD000
direct allocation
page read and write
3ECF000
stack
page read and write
3F3D000
trusted library allocation
page read and write
32E0000
heap
page read and write
3FB5000
trusted library allocation
page read and write
35F0000
heap
page read and write
7DA000
heap
page read and write
3F51000
trusted library allocation
page read and write
5EE000
stack
page read and write
579E000
trusted library allocation
page read and write
3F98000
trusted library allocation
page read and write
3261000
heap
page read and write
81F000
heap
page read and write
7EE0000
trusted library allocation
page read and write
3F26000
trusted library allocation
page read and write
852000
heap
page read and write
7F6000
heap
page read and write
42DA000
trusted library allocation
page read and write
404D000
trusted library allocation
page read and write
4029000
trusted library allocation
page read and write
3FAF000
trusted library allocation
page read and write
826000
heap
page read and write
7760000
heap
page read and write
805000
heap
page read and write
366A000
trusted library allocation
page execute and read and write
3F1D000
trusted library allocation
page read and write
3F0C000
trusted library allocation
page read and write
614000
heap
page read and write
53F000
unkown
page readonly
7E80000
trusted library allocation
page read and write
3F32000
trusted library allocation
page read and write
3F55000
trusted library allocation
page read and write
406B000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
815000
heap
page read and write
7DA000
heap
page read and write
3F98000
trusted library allocation
page read and write
3400000
heap
page read and write
4010000
trusted library allocation
page read and write
429E000
trusted library allocation
page read and write
7D8000
heap
page read and write
838000
heap
page read and write
3F59000
trusted library allocation
page read and write
4029000
trusted library allocation
page read and write
3F51000
trusted library allocation
page read and write
404E000
trusted library allocation
page read and write
85E000
heap
page read and write
42E2000
trusted library allocation
page read and write
6431000
trusted library allocation
page read and write
403C000
trusted library allocation
page read and write
824000
heap
page read and write
3F3B000
trusted library allocation
page read and write
3FC3000
trusted library allocation
page read and write
3263000
heap
page read and write
4029000
trusted library allocation
page read and write
3F45000
trusted library allocation
page read and write
85F000
heap
page read and write
4008000
trusted library allocation
page read and write
3F3B000
trusted library allocation
page read and write
83B000
heap
page read and write
3FB9000
trusted library allocation
page read and write
3FD7000
trusted library allocation
page read and write
3F2F000
trusted library allocation
page read and write
5702000
trusted library allocation
page read and write
861000
heap
page read and write
3FBB000
trusted library allocation
page read and write
3FD6000
trusted library allocation
page read and write
3F49000
trusted library allocation
page read and write
3FB3000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
848000
heap
page read and write
3F4D000
trusted library allocation
page read and write
3FA5000
trusted library allocation
page read and write
402B000
trusted library allocation
page read and write
834000
heap
page read and write
32D0000
heap
page read and write
84A000
heap
page read and write
5735000
trusted library allocation
page read and write
396D000
trusted library allocation
page read and write
3F23000
trusted library allocation
page read and write
4010000
trusted library allocation
page read and write
3F0C000
trusted library allocation
page read and write
343B000
heap
page read and write
3FB0000
trusted library allocation
page read and write
85E000
heap
page read and write
3F43000
trusted library allocation
page read and write
832000
heap
page read and write
3F0B000
trusted library allocation
page read and write
4028000
trusted library allocation
page read and write
8900000
trusted library allocation
page read and write
3FBB000
trusted library allocation
page read and write
852000
heap
page read and write
861000
heap
page read and write
80E000
heap
page read and write
There are 613 hidden memdumps, click here to show them.