IOC Report
4W3cB5WEYH.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\4W3cB5WEYH.exe
"C:\Users\user\Desktop\4W3cB5WEYH.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
wordyfindy.lat
https://duckduckgo.com/ac/?q=
unknown
curverpluch.lat
slipperyloo.lat
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
tentabatte.lat
https://observerfry.lat/api
104.21.36.201
http://crl.microsoft
unknown
manyrestro.lat
https://observerfry.lat/p)
unknown
https://observerfry.lat/pi
unknown
shapestickyr.lat
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://observerfry.lat/
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://observerfry.lat/d
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://observerfry.lat/apit
unknown
talkynicer.lat
https://ac.ecosia.org/autocomplete?q=
unknown
bashfulacid.lat
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://observerfry.lat:443/api(
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
observerfry.lat
https://observerfry.lat/api(Win
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
observerfry.lat
104.21.36.201

IPs

IP
Domain
Country
Malicious
104.21.36.201
observerfry.lat
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
BF1000
unkown
page execute and read and write
malicious
41AF000
stack
page read and write
5EDF000
trusted library allocation
page read and write
5DCF000
trusted library allocation
page read and write
5E03000
trusted library allocation
page read and write
5DDF000
trusted library allocation
page read and write
593F000
stack
page read and write
E6A000
unkown
page execute and write copy
1811000
heap
page read and write
4E60000
direct allocation
page read and write
4E71000
heap
page read and write
4E60000
direct allocation
page read and write
5E19000
trusted library allocation
page read and write
5480000
direct allocation
page execute and read and write
DD1000
unkown
page execute and read and write
5DF9000
trusted library allocation
page read and write
3A6E000
stack
page read and write
1848000
heap
page read and write
5DC1000
trusted library allocation
page read and write
3F6E000
stack
page read and write
5DF2000
trusted library allocation
page read and write
5E03000
trusted library allocation
page read and write
E72000
unkown
page execute and read and write
5E03000
trusted library allocation
page read and write
5DE0000
trusted library allocation
page read and write
5DFA000
trusted library allocation
page read and write
EDF000
unkown
page execute and write copy
179F000
heap
page read and write
4CEF000
stack
page read and write
5DF6000
trusted library allocation
page read and write
55BD000
stack
page read and write
5DE2000
trusted library allocation
page read and write
BF1000
unkown
page execute and write copy
5F8F000
trusted library allocation
page read and write
5770000
trusted library allocation
page read and write
446E000
stack
page read and write
5DFA000
trusted library allocation
page read and write
C45000
unkown
page execute and write copy
1811000
heap
page read and write
17D5000
heap
page read and write
5DF0000
trusted library allocation
page read and write
181C000
heap
page read and write
5E0F000
trusted library allocation
page read and write
5DFC000
trusted library allocation
page read and write
1822000
heap
page read and write
5E03000
trusted library allocation
page read and write
136A000
stack
page read and write
4E71000
heap
page read and write
5790000
trusted library allocation
page read and write
17B5000
heap
page read and write
5DFA000
trusted library allocation
page read and write
C45000
unkown
page execute and read and write
1811000
heap
page read and write
5DEF000
trusted library allocation
page read and write
17B5000
heap
page read and write
5DE8000
trusted library allocation
page read and write
5E3A000
trusted library allocation
page read and write
183E000
heap
page read and write
183F000
heap
page read and write
5E43000
trusted library allocation
page read and write
5DF9000
trusted library allocation
page read and write
17EC000
heap
page read and write
E69000
unkown
page execute and read and write
5DDF000
trusted library allocation
page read and write
5DE0000
trusted library allocation
page read and write
5DEF000
trusted library allocation
page read and write
46AF000
stack
page read and write
1819000
heap
page read and write
5E12000
trusted library allocation
page read and write
5DDA000
trusted library allocation
page read and write
5470000
direct allocation
page execute and read and write
178C000
heap
page read and write
406F000
stack
page read and write
496E000
stack
page read and write
5C0E000
stack
page read and write
183F000
heap
page read and write
32EF000
stack
page read and write
183C000
heap
page read and write
1826000
heap
page read and write
17B7000
heap
page read and write
45AE000
stack
page read and write
1795000
heap
page read and write
EEE000
unkown
page execute and write copy
63C2000
trusted library allocation
page read and write
5E0B000
trusted library allocation
page read and write
5DFA000
trusted library allocation
page read and write
5E32000
trusted library allocation
page read and write
31EF000
stack
page read and write
1815000
heap
page read and write
5DEF000
trusted library allocation
page read and write
4E71000
heap
page read and write
5DE5000
trusted library allocation
page read and write
5E18000
trusted library allocation
page read and write
5E03000
trusted library allocation
page read and write
3CEE000
stack
page read and write
5E07000
trusted library allocation
page read and write
1740000
heap
page read and write
5C8E000
stack
page read and write
5E03000
trusted library allocation
page read and write
5DDC000
trusted library allocation
page read and write
17EC000
heap
page read and write
5450000
direct allocation
page execute and read and write
5E03000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
1815000
heap
page read and write
E38000
unkown
page execute and read and write
5DEF000
trusted library allocation
page read and write
42EF000
stack
page read and write
5DD6000
trusted library allocation
page read and write
179F000
heap
page read and write
E48000
unkown
page execute and read and write
17EC000
heap
page read and write
5DEA000
trusted library allocation
page read and write
5E03000
trusted library allocation
page read and write
40AE000
stack
page read and write
5E03000
trusted library allocation
page read and write
3A2F000
stack
page read and write
5E6B000
trusted library allocation
page read and write
5E0C000
trusted library allocation
page read and write
5E07000
trusted library allocation
page read and write
5E32000
trusted library allocation
page read and write
5DFA000
trusted library allocation
page read and write
179F000
heap
page read and write
1832000
heap
page read and write
5DC0000
trusted library allocation
page read and write
5DDF000
trusted library allocation
page read and write
4E60000
direct allocation
page read and write
5DF6000
trusted library allocation
page read and write
5DE2000
trusted library allocation
page read and write
5DCA000
trusted library allocation
page read and write
180A000
heap
page read and write
456F000
stack
page read and write
17EC000
heap
page read and write
E51000
unkown
page execute and write copy
E33000
unkown
page execute and write copy
5E03000
trusted library allocation
page read and write
1815000
heap
page read and write
17B5000
heap
page read and write
181C000
heap
page read and write
5DFF000
trusted library allocation
page read and write
1817000
heap
page read and write
5DFA000
trusted library allocation
page read and write
5300000
direct allocation
page read and write
5DD8000
trusted library allocation
page read and write
EAC000
unkown
page execute and read and write
5E03000
trusted library allocation
page read and write
17EC000
heap
page read and write
5E03000
trusted library allocation
page read and write
4E71000
heap
page read and write
EDF000
unkown
page execute and write copy
1811000
heap
page read and write
4E71000
heap
page read and write
602F000
trusted library allocation
page read and write
16BE000
stack
page read and write
5DDF000
trusted library allocation
page read and write
5E03000
trusted library allocation
page read and write
1846000
heap
page read and write
5E62000
trusted library allocation
page read and write
13C0000
heap
page read and write
5E73000
trusted library allocation
page read and write
5DF7000
trusted library allocation
page read and write
5E23000
trusted library allocation
page read and write
543F000
stack
page read and write
73D01000
unkown
page execute read
5E34000
trusted library allocation
page read and write
1816000
heap
page read and write
5E03000
trusted library allocation
page read and write
DAC000
unkown
page execute and write copy
5DDF000
trusted library allocation
page read and write
183F000
heap
page read and write
5DCA000
trusted library allocation
page read and write
5E62000
trusted library allocation
page read and write
1846000
heap
page read and write
4E60000
direct allocation
page read and write
1846000
heap
page read and write
5DE3000
trusted library allocation
page read and write
17EC000
heap
page read and write
5DDD000
trusted library allocation
page read and write
576D000
trusted library allocation
page read and write
5DFF000
trusted library allocation
page read and write
5E5D000
trusted library allocation
page read and write
1811000
heap
page read and write
5E42000
trusted library allocation
page read and write
5F17000
trusted library allocation
page read and write
17B7000
heap
page read and write
54C2000
trusted library allocation
page read and write
73D1D000
unkown
page read and write
4A6F000
stack
page read and write
5E19000
trusted library allocation
page read and write
4E60000
direct allocation
page read and write
4E60000
direct allocation
page read and write
5DFB000
trusted library allocation
page read and write
5DCD000
trusted library allocation
page read and write
5DC1000
trusted library allocation
page read and write
5DC8000
trusted library allocation
page read and write
5E1D000
trusted library allocation
page read and write
17B9000
heap
page read and write
5E11000
trusted library allocation
page read and write
5E03000
trusted library allocation
page read and write
492F000
stack
page read and write
DF6000
unkown
page execute and write copy
5DDF000
trusted library allocation
page read and write
E06000
unkown
page execute and write copy
1826000
heap
page read and write
183C000
heap
page read and write
5E23000
trusted library allocation
page read and write
E44000
unkown
page execute and write copy
56BD000
stack
page read and write
1832000
heap
page read and write
17EC000
heap
page read and write
5960000
remote allocation
page read and write
5ACF000
stack
page read and write
4F70000
trusted library allocation
page read and write
5E21000
trusted library allocation
page read and write
17B5000
heap
page read and write
5E16000
trusted library allocation
page read and write
5E08000
trusted library allocation
page read and write
E86000
unkown
page execute and write copy
5E0C000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
5DE2000
trusted library allocation
page read and write
1819000
heap
page read and write
5E03000
trusted library allocation
page read and write
4E60000
direct allocation
page read and write
184A000
heap
page read and write
5DEF000
trusted library allocation
page read and write
5E03000
trusted library allocation
page read and write
C51000
unkown
page execute and write copy
5E0C000
trusted library allocation
page read and write
5F67000
trusted library allocation
page read and write
5DFC000
trusted library allocation
page read and write
5DE0000
trusted library allocation
page read and write
1832000
heap
page read and write
5E1A000
trusted library allocation
page read and write
5DEF000
trusted library allocation
page read and write
5E03000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
5DDD000
trusted library allocation
page read and write
5DE2000
trusted library allocation
page read and write
366F000
stack
page read and write
548D000
stack
page read and write
1787000
heap
page read and write
5DDF000
trusted library allocation
page read and write
1815000
heap
page read and write
56FE000
stack
page read and write
179A000
heap
page read and write
5E03000
trusted library allocation
page read and write
5E1B000
trusted library allocation
page read and write
4E30000
heap
page read and write
5960000
remote allocation
page read and write
150E000
stack
page read and write
E40000
unkown
page execute and write copy
E57000
unkown
page execute and read and write
5E21000
trusted library allocation
page read and write
4E60000
direct allocation
page read and write
5E39000
trusted library allocation
page read and write
5DC6000
trusted library allocation
page read and write
5DD2000
trusted library allocation
page read and write
175A000
heap
page read and write
1832000
heap
page read and write
5DEF000
trusted library allocation
page read and write
5E0C000
trusted library allocation
page read and write
5DFF000
trusted library allocation
page read and write
5DE2000
trusted library allocation
page read and write
5DDC000
trusted library allocation
page read and write
4E71000
heap
page read and write
1815000
heap
page read and write
5EC0000
trusted library allocation
page read and write
17B5000
heap
page read and write
126B000
stack
page read and write
5DFA000
trusted library allocation
page read and write
4E71000
heap
page read and write
5DCD000
trusted library allocation
page read and write
5E62000
trusted library allocation
page read and write
ED7000
unkown
page execute and read and write
EED000
unkown
page execute and write copy
4E71000
heap
page read and write
5DF5000
trusted library allocation
page read and write
5960000
remote allocation
page read and write
5DCD000
trusted library allocation
page read and write
E17000
unkown
page execute and read and write
5DDF000
trusted library allocation
page read and write
1848000
heap
page read and write
5DE5000
trusted library allocation
page read and write
1832000
heap
page read and write
68DE000
trusted library allocation
page read and write
183E000
heap
page read and write
181D000
heap
page read and write
E43000
unkown
page execute and read and write
73D00000
unkown
page readonly
5E28000
trusted library allocation
page read and write
5E03000
trusted library allocation
page read and write
4E71000
heap
page read and write
5E53000
trusted library allocation
page read and write
4BEE000
stack
page read and write
5DFF000
trusted library allocation
page read and write
5E03000
trusted library allocation
page read and write
5E13000
trusted library allocation
page read and write
17EC000
heap
page read and write
5E42000
trusted library allocation
page read and write
5EF7000
trusted library allocation
page read and write
5DDF000
trusted library allocation
page read and write
5DF9000
trusted library allocation
page read and write
5E0E000
trusted library allocation
page read and write
5E07000
trusted library allocation
page read and write
EC8000
unkown
page execute and write copy
E67000
unkown
page execute and write copy
1832000
heap
page read and write
17EC000
heap
page read and write
5DCA000
trusted library allocation
page read and write
5DE5000
trusted library allocation
page read and write
4E71000
heap
page read and write
5DD2000
trusted library allocation
page read and write
5DDD000
trusted library allocation
page read and write
5F97000
trusted library allocation
page read and write
5E0D000
trusted library allocation
page read and write
5E03000
trusted library allocation
page read and write
DC6000
unkown
page execute and read and write
184B000
heap
page read and write
179A000
heap
page read and write
179F000
heap
page read and write
3F2F000
stack
page read and write
5E2D000
trusted library allocation
page read and write
5DE8000
trusted library allocation
page read and write
54B0000
direct allocation
page execute and read and write
5DDF000
trusted library allocation
page read and write
5DDF000
trusted library allocation
page read and write
5DF5000
trusted library allocation
page read and write
1750000
heap
page read and write
5E03000
trusted library allocation
page read and write
38EF000
stack
page read and write
1826000
heap
page read and write
5DE2000
trusted library allocation
page read and write
5E03000
trusted library allocation
page read and write
5DC1000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
5E21000
trusted library allocation
page read and write
5E27000
trusted library allocation
page read and write
EED000
unkown
page execute and read and write
356E000
stack
page read and write
177D000
heap
page read and write
1818000
heap
page read and write
5EC1000
trusted library allocation
page read and write
5E54000
trusted library allocation
page read and write
5E32000
trusted library allocation
page read and write
36AE000
stack
page read and write
4E60000
direct allocation
page read and write
5E02000
trusted library allocation
page read and write
4D2E000
stack
page read and write
5DC5000
trusted library allocation
page read and write
5E0D000
trusted library allocation
page read and write
5EC6000
trusted library allocation
page read and write
5DDF000
trusted library allocation
page read and write
5DE1000
trusted library allocation
page read and write
5E0B000
trusted library allocation
page read and write
4E2F000
stack
page read and write
5DEF000
trusted library allocation
page read and write
5E07000
trusted library allocation
page read and write
1815000
heap
page read and write
5E03000
trusted library allocation
page read and write
5DC9000
trusted library allocation
page read and write
5DDF000
trusted library allocation
page read and write
5480000
direct allocation
page execute and read and write
5DFC000
trusted library allocation
page read and write
5DF5000
trusted library allocation
page read and write
183F000
heap
page read and write
5E62000
trusted library allocation
page read and write
5E3D000
trusted library allocation
page read and write
4AAE000
stack
page read and write
1825000
heap
page read and write
4E71000
heap
page read and write
5E03000
trusted library allocation
page read and write
5DC1000
trusted library allocation
page read and write
5DFA000
trusted library allocation
page read and write
184A000
heap
page read and write
1832000
heap
page read and write
5DCA000
trusted library allocation
page read and write
17EC000
heap
page read and write
5490000
direct allocation
page execute and read and write
5DE2000
trusted library allocation
page read and write
5480000
direct allocation
page execute and read and write
DD1000
unkown
page execute and write copy
5676000
trusted library allocation
page read and write
4E60000
direct allocation
page read and write
C35000
unkown
page execute and read and write
1747000
heap
page read and write
180D000
heap
page read and write
5344000
direct allocation
page read and write
178C000
heap
page read and write
5DF2000
trusted library allocation
page read and write
5DDF000
trusted library allocation
page read and write
5DDF000
trusted library allocation
page read and write
ED5000
unkown
page execute and write copy
5300000
direct allocation
page read and write
5E3A000
trusted library allocation
page read and write
5E27000
trusted library allocation
page read and write
4E60000
direct allocation
page read and write
ECC000
unkown
page execute and write copy
1795000
heap
page read and write
5E10000
trusted library allocation
page read and write
5DCD000
trusted library allocation
page read and write
5DD2000
trusted library allocation
page read and write
5DDF000
trusted library allocation
page read and write
5E02000
trusted library allocation
page read and write
1848000
heap
page read and write
1811000
heap
page read and write
5E03000
trusted library allocation
page read and write
179F000
heap
page read and write
DDC000
unkown
page execute and write copy
5E43000
trusted library allocation
page read and write
4E40000
heap
page read and write
5DE2000
trusted library allocation
page read and write
5DE2000
trusted library allocation
page read and write
3B6E000
stack
page read and write
5DC1000
trusted library allocation
page read and write
73D1F000
unkown
page readonly
1811000
heap
page read and write
5E03000
trusted library allocation
page read and write
5DFA000
trusted library allocation
page read and write
5E2B000
trusted library allocation
page read and write
5DDF000
trusted library allocation
page read and write
4E81000
heap
page read and write
5480000
direct allocation
page execute and read and write
5E1A000
trusted library allocation
page read and write
4E71000
heap
page read and write
179A000
heap
page read and write
1555000
heap
page read and write
5E04000
trusted library allocation
page read and write
4E71000
heap
page read and write
179F000
heap
page read and write
ED8000
unkown
page execute and write copy
5E1B000
trusted library allocation
page read and write
1826000
heap
page read and write
5DD2000
trusted library allocation
page read and write
5DE0000
trusted library allocation
page read and write
1819000
heap
page read and write
41EE000
stack
page read and write
5E2A000
trusted library allocation
page read and write
4E71000
heap
page read and write
5EC7000
trusted library allocation
page read and write
5480000
direct allocation
page execute and read and write
5E03000
trusted library allocation
page read and write
5E22000
trusted library allocation
page read and write
194F000
stack
page read and write
5E0D000
trusted library allocation
page read and write
5DD1000
trusted library allocation
page read and write
1815000
heap
page read and write
1798000
heap
page read and write
5E07000
trusted library allocation
page read and write
5E03000
trusted library allocation
page read and write
5480000
direct allocation
page execute and read and write
5E03000
trusted library allocation
page read and write
5E04000
trusted library allocation
page read and write
4E71000
heap
page read and write
1819000
heap
page read and write
5DF5000
trusted library allocation
page read and write
1823000
heap
page read and write
5E03000
trusted library allocation
page read and write
5300000
direct allocation
page read and write
1815000
heap
page read and write
5E00000
trusted library allocation
page read and write
5DE0000
trusted library allocation
page read and write
352F000
stack
page read and write
5E07000
trusted library allocation
page read and write
173E000
stack
page read and write
1823000
heap
page read and write
442F000
stack
page read and write
4E71000
heap
page read and write
1832000
heap
page read and write
533B000
stack
page read and write
4E70000
heap
page read and write
52FD000
stack
page read and write
4E71000
heap
page read and write
5E3A000
trusted library allocation
page read and write
5E2D000
trusted library allocation
page read and write
54A0000
direct allocation
page execute and read and write
17EC000
heap
page read and write
3DEF000
stack
page read and write
181D000
heap
page read and write
5E16000
trusted library allocation
page read and write
57FE000
stack
page read and write
5DD0000
trusted library allocation
page read and write
DDE000
unkown
page execute and read and write
DF8000
unkown
page execute and read and write
5E62000
trusted library allocation
page read and write
5DD2000
trusted library allocation
page read and write
392E000
stack
page read and write
5DD6000
trusted library allocation
page read and write
17B5000
heap
page read and write
E83000
unkown
page execute and write copy
5DEF000
trusted library allocation
page read and write
5DE9000
trusted library allocation
page read and write
5E03000
trusted library allocation
page read and write
1832000
heap
page read and write
33EF000
stack
page read and write
5779000
trusted library allocation
page read and write
181A000
heap
page read and write
17D4000
heap
page read and write
17B5000
heap
page read and write
5DEF000
trusted library allocation
page read and write
179F000
heap
page read and write
5E03000
trusted library allocation
page read and write
5DD7000
trusted library allocation
page read and write
5DCF000
trusted library allocation
page read and write
432E000
stack
page read and write
342E000
stack
page read and write
4E71000
heap
page read and write
179A000
heap
page read and write
17B5000
heap
page read and write
5E1B000
trusted library allocation
page read and write
5DEF000
trusted library allocation
page read and write
BF0000
unkown
page readonly
5DCA000
trusted library allocation
page read and write
4E71000
heap
page read and write
5DE2000
trusted library allocation
page read and write
17B7000
heap
page read and write
5E0D000
trusted library allocation
page read and write
17D5000
heap
page read and write
1819000
heap
page read and write
4BAF000
stack
page read and write
5DCA000
trusted library allocation
page read and write
5DC1000
trusted library allocation
page read and write
5E2D000
trusted library allocation
page read and write
154E000
stack
page read and write
5DFA000
trusted library allocation
page read and write
5DDA000
trusted library allocation
page read and write
183C000
heap
page read and write
5E3A000
trusted library allocation
page read and write
E87000
unkown
page execute and read and write
17B7000
heap
page read and write
175E000
heap
page read and write
5DFF000
trusted library allocation
page read and write
1826000
heap
page read and write
5E25000
trusted library allocation
page read and write
5DE5000
trusted library allocation
page read and write
37AF000
stack
page read and write
5F9F000
trusted library allocation
page read and write
482E000
stack
page read and write
14A0000
heap
page read and write
5E1B000
trusted library allocation
page read and write
5E32000
trusted library allocation
page read and write
184A000
heap
page read and write
5E0D000
trusted library allocation
page read and write
5E3E000
trusted library allocation
page read and write
5E22000
trusted library allocation
page read and write
17B7000
heap
page read and write
165E000
stack
page read and write
16FC000
stack
page read and write
1842000
heap
page read and write
1832000
heap
page read and write
3BAE000
stack
page read and write
5DEA000
trusted library allocation
page read and write
174C000
heap
page read and write
5DD1000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
E5F000
unkown
page execute and write copy
4E60000
direct allocation
page read and write
1846000
heap
page read and write
5E73000
trusted library allocation
page read and write
17EC000
heap
page read and write
5DD2000
trusted library allocation
page read and write
59CE000
stack
page read and write
1811000
heap
page read and write
E85000
unkown
page execute and read and write
5460000
direct allocation
page execute and read and write
5E03000
trusted library allocation
page read and write
1815000
heap
page read and write
5DF7000
trusted library allocation
page read and write
183F000
heap
page read and write
5E03000
trusted library allocation
page read and write
4E71000
heap
page read and write
5C30000
heap
page read and write
179A000
heap
page read and write
ED5000
unkown
page execute and write copy
5DF4000
trusted library allocation
page read and write
179F000
heap
page read and write
5E03000
trusted library allocation
page read and write
5E03000
trusted library allocation
page read and write
4E71000
heap
page read and write
73D16000
unkown
page readonly
5E2B000
trusted library allocation
page read and write
5E15000
trusted library allocation
page read and write
5DDF000
trusted library allocation
page read and write
1832000
heap
page read and write
5DE2000
trusted library allocation
page read and write
5DE2000
trusted library allocation
page read and write
5DE2000
trusted library allocation
page read and write
E60000
unkown
page execute and read and write
1845000
heap
page read and write
5E2B000
trusted library allocation
page read and write
5F59000
trusted library allocation
page read and write
181D000
heap
page read and write
5DCD000
trusted library allocation
page read and write
1550000
heap
page read and write
5783000
trusted library allocation
page read and write
1811000
heap
page read and write
5E2B000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
BF0000
unkown
page read and write
5E53000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
5E03000
trusted library allocation
page read and write
5E03000
trusted library allocation
page read and write
5D8F000
stack
page read and write
5DE5000
trusted library allocation
page read and write
47EF000
stack
page read and write
46EE000
stack
page read and write
5B0E000
stack
page read and write
37EE000
stack
page read and write
179A000
heap
page read and write
4E71000
heap
page read and write
179A000
heap
page read and write
5DC8000
trusted library allocation
page read and write
5DC6000
trusted library allocation
page read and write
DAA000
unkown
page execute and read and write
183D000
heap
page read and write
4E60000
direct allocation
page read and write
5E39000
trusted library allocation
page read and write
4E60000
direct allocation
page read and write
5DFC000
trusted library allocation
page read and write
3CAF000
stack
page read and write
583E000
stack
page read and write
1832000
heap
page read and write
3E2E000
stack
page read and write
1798000
heap
page read and write
5DF8000
trusted library allocation
page read and write
There are 616 hidden memdumps, click here to show them.