IOC Report
setup.exe

loading gifFilesProcessesURLsDomainsIPsMemdumps21010010Label

Files

File Path
Type
Category
Malicious
Download
setup.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\ZD058SML6HEQFYABXN6\FNP_Act_Installer.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\ZD058SML6HEQFYABXN6\ISUIServices.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\ZD058SML6HEQFYABXN6\foretoken.xlsx
data
dropped
C:\Users\user\AppData\Local\Temp\ZD058SML6HEQFYABXN6\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\ZD058SML6HEQFYABXN6\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\setup.exe
"C:\Users\user\Desktop\setup.exe"
malicious
C:\Users\user\AppData\Local\Temp\ZD058SML6HEQFYABXN6\ISDbg.exe
"C:\Users\user\AppData\Local\Temp\ZD058SML6HEQFYABXN6\ISDbg.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://duckduckgo.com/ac/?q=
unknown
https://toppyneedus.biz:443/api
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.gnu.org/philosophy/why-not-lgpl.html
unknown
https://cegu.shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://gg.agroundyogasuspect.shop/cp_sh.eml
172.67.195.182
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://cegu.shop/W
unknown
https://toppyneedus.biz/api$
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
http://www.symauth.com/cps0(
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://169.254.169.254http://169.254.169.254/latest/meta-datalatest/meta-data/public-ipv4latest/meta
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://toppyneedus.biz/api
172.67.149.66
http://www.symauth.com/rpa00
unknown
https://cegu.shop/8574262446/ph.txt
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://cegu.shop/?
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
http://www.info-zip.org/
unknown
http://www.macrovision.com/fnp/2004/11/activation
unknown
https://toppyneedus.biz/
unknown
https://toppyneedus.biz/apiC#
unknown
https://toppyneedus.biz/apir2
unknown
http://fsf.org/
unknown
https://toppyneedus.biz/apiH
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.mozilla.or
unknown
http://www.gnu.org/licenses/
unknown
https://flexerasoftware.flexnetoperations.com/control/inst/ActivationService-CCUninstalling
unknown
There are 29 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
toppyneedus.biz
172.67.149.66
gg.agroundyogasuspect.shop
172.67.195.182
cegu.shop
unknown
impolitewearr.biz
unknown
selfcarestop.top
unknown

IPs

IP
Domain
Country
Malicious
172.67.149.66
toppyneedus.biz
United States
172.67.195.182
gg.agroundyogasuspect.shop
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
ACCC000
heap
page read and write
malicious
9BC000
heap
page read and write
4224000
trusted library allocation
page read and write
15BE000
stack
page read and write
4515000
trusted library allocation
page read and write
451B000
trusted library allocation
page read and write
2701000
heap
page read and write
4318000
trusted library allocation
page read and write
4618000
trusted library allocation
page read and write
434F000
trusted library allocation
page read and write
421E000
trusted library allocation
page read and write
46C4000
trusted library allocation
page read and write
4220000
trusted library allocation
page read and write
45B6000
trusted library allocation
page read and write
4229000
trusted library allocation
page read and write
4514000
trusted library allocation
page read and write
144000
heap
page read and write
422C000
trusted library allocation
page read and write
4242000
trusted library allocation
page read and write
4318000
trusted library allocation
page read and write
9BA000
heap
page read and write
4513000
trusted library allocation
page read and write
4258000
trusted library allocation
page read and write
2701000
heap
page read and write
4AB000
unkown
page readonly
4329000
trusted library allocation
page read and write
401000
unkown
page execute read
4512000
trusted library allocation
page read and write
451C000
trusted library allocation
page read and write
42A8000
trusted library allocation
page read and write
421F000
trusted library allocation
page read and write
4245000
trusted library allocation
page read and write
434F000
trusted library allocation
page read and write
3070000
unkown
page write copy
42C6000
trusted library allocation
page read and write
9C7000
heap
page read and write
45B2000
trusted library allocation
page read and write
4516000
trusted library allocation
page read and write
9D8000
heap
page read and write
424E000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
431D000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
B3F000
unkown
page readonly
4215000
trusted library allocation
page read and write
42A9000
trusted library allocation
page read and write
9BE000
heap
page read and write
4337000
trusted library allocation
page read and write
4231000
trusted library allocation
page read and write
9CC000
heap
page read and write
4211000
trusted library allocation
page read and write
1254000
heap
page read and write
4608000
trusted library allocation
page read and write
4228000
trusted library allocation
page read and write
2701000
heap
page read and write
BDF000
unkown
page readonly
45E5000
trusted library allocation
page read and write
9AA000
heap
page read and write
400000
unkown
page readonly
424E000
trusted library allocation
page read and write
6D392000
unkown
page readonly
42E6000
trusted library allocation
page read and write
464A000
trusted library allocation
page read and write
4329000
trusted library allocation
page read and write
423E000
trusted library allocation
page read and write
6C68A000
unkown
page readonly
4341000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
44BC000
trusted library allocation
page read and write
4259000
trusted library allocation
page read and write
2701000
heap
page read and write
2F9D000
trusted library allocation
page read and write
4249000
trusted library allocation
page read and write
4311000
trusted library allocation
page read and write
4263000
trusted library allocation
page read and write
144000
heap
page read and write
42A8000
trusted library allocation
page read and write
BCF000
unkown
page write copy
12FA000
heap
page read and write
4516000
trusted library allocation
page read and write
B2D0000
trusted library allocation
page read and write
42DF000
trusted library allocation
page read and write
42C1000
trusted library allocation
page read and write
42A8000
trusted library allocation
page read and write
423D000
trusted library allocation
page read and write
4275000
trusted library allocation
page read and write
45F2000
trusted library allocation
page read and write
2E61000
unkown
page execute read
4221000
trusted library allocation
page read and write
4249000
trusted library allocation
page read and write
4515000
trusted library allocation
page read and write
2701000
heap
page read and write
42DA000
trusted library allocation
page read and write
45AF000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
3026000
unkown
page readonly
42B5000
trusted library allocation
page read and write
6D2F0000
unkown
page readonly
4211000
trusted library allocation
page read and write
9D9000
heap
page read and write
42C1000
trusted library allocation
page read and write
144000
heap
page read and write
36A0000
heap
page read and write
4221000
trusted library allocation
page read and write
4514000
trusted library allocation
page read and write
42D1000
trusted library allocation
page read and write
2701000
heap
page read and write
4241000
trusted library allocation
page read and write
45C0000
trusted library allocation
page read and write
42AF000
trusted library allocation
page read and write
9B5000
heap
page read and write
4241000
trusted library allocation
page read and write
2701000
heap
page read and write
4341000
trusted library allocation
page read and write
9CC000
heap
page read and write
4229000
trusted library allocation
page read and write
4516000
trusted library allocation
page read and write
A6A9000
heap
page read and write
3076000
unkown
page read and write
423D000
trusted library allocation
page read and write
9C9000
heap
page read and write
144000
heap
page read and write
2EF2000
trusted library allocation
page read and write
9B0000
heap
page read and write
424E000
trusted library allocation
page read and write
9B5000
heap
page read and write
4311000
trusted library allocation
page read and write
5EB1000
trusted library allocation
page read and write
4211000
trusted library allocation
page read and write
42B5000
trusted library allocation
page read and write
9CC000
heap
page read and write
4278000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
45AC000
trusted library allocation
page read and write
45B3000
trusted library allocation
page read and write
462B000
trusted library allocation
page read and write
4F12000
trusted library allocation
page read and write
9B9000
heap
page read and write
9B5000
heap
page read and write
1320000
heap
page read and write
424E000
trusted library allocation
page read and write
4676000
trusted library allocation
page read and write
4211000
trusted library allocation
page read and write
45B5000
trusted library allocation
page read and write
4249000
trusted library allocation
page read and write
16BE000
stack
page read and write
451E000
trusted library allocation
page read and write
4721000
trusted library allocation
page read and write
3690000
heap
page read and write
4244000
trusted library allocation
page read and write
9D9000
heap
page read and write
6D2F1000
unkown
page execute read
1230000
heap
page read and write
4615000
trusted library allocation
page read and write
2701000
heap
page read and write
42B2000
trusted library allocation
page read and write
9B5000
heap
page read and write
42C1000
trusted library allocation
page read and write
9BC000
heap
page read and write
46F8000
trusted library allocation
page read and write
42DF000
trusted library allocation
page read and write
4513000
trusted library allocation
page read and write
4A9000
unkown
page write copy
C04000
unkown
page readonly
9B0000
heap
page read and write
42A8000
trusted library allocation
page read and write
3CDB000
heap
page read and write
9B9000
heap
page read and write
6D381000
unkown
page execute read
423D000
trusted library allocation
page read and write
423D000
trusted library allocation
page read and write
B3F000
unkown
page readonly
4271000
trusted library allocation
page read and write
45F0000
trusted library allocation
page read and write
45D6000
trusted library allocation
page read and write
4224000
trusted library allocation
page read and write
45E8000
trusted library allocation
page read and write
42E5000
trusted library allocation
page read and write
45F4000
trusted library allocation
page read and write
B46E000
trusted library allocation
page read and write
10000000
unkown
page readonly
42B3000
trusted library allocation
page read and write
45F8000
trusted library allocation
page read and write
4428000
trusted library allocation
page read and write
462D000
trusted library allocation
page read and write
C04000
unkown
page readonly
9D9000
heap
page read and write
423E000
trusted library allocation
page read and write
4231000
trusted library allocation
page read and write
4275000
trusted library allocation
page read and write
423D000
trusted library allocation
page read and write
9C7000
heap
page read and write
4511000
trusted library allocation
page read and write
423E000
trusted library allocation
page read and write
5CA6000
trusted library allocation
page read and write
9CC000
heap
page read and write
4211000
trusted library allocation
page read and write
4516000
trusted library allocation
page read and write
4513000
trusted library allocation
page read and write
144000
heap
page read and write
422E000
trusted library allocation
page read and write
423E000
trusted library allocation
page read and write
B3F9000
trusted library allocation
page read and write
144000
heap
page read and write
10001000
unkown
page execute read
434F000
trusted library allocation
page read and write
4511000
trusted library allocation
page read and write
6D356000
unkown
page readonly
4511000
trusted library allocation
page read and write
469A000
trusted library allocation
page read and write
422A000
trusted library allocation
page read and write
4519000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
4317000
trusted library allocation
page read and write
45E3000
trusted library allocation
page read and write
423D000
trusted library allocation
page read and write
12DD000
stack
page read and write
4511000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
10002000
unkown
page readonly
423D000
trusted library allocation
page read and write
EBB000
stack
page read and write
6C6ED000
unkown
page read and write
42A8000
trusted library allocation
page read and write
423E000
trusted library allocation
page read and write
6C500000
unkown
page readonly
42A9000
trusted library allocation
page read and write
A0D8000
heap
page read and write
42BC000
trusted library allocation
page read and write
427A000
trusted library allocation
page read and write
434F000
trusted library allocation
page read and write
42E7000
trusted library allocation
page read and write
42B0000
trusted library allocation
page read and write
3CC9000
heap
page read and write
42D7000
trusted library allocation
page read and write
6C6F4000
unkown
page readonly
37CE000
heap
page read and write
4512000
trusted library allocation
page read and write
9BE000
heap
page read and write
4246000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
9D9000
heap
page read and write
45E3000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
4727000
trusted library allocation
page read and write
42D1000
trusted library allocation
page read and write
BD0000
unkown
page read and write
42C1000
trusted library allocation
page read and write
423E000
trusted library allocation
page read and write
465B000
trusted library allocation
page read and write
451F000
trusted library allocation
page read and write
4223000
trusted library allocation
page read and write
1321000
heap
page read and write
4516000
trusted library allocation
page read and write
4228000
trusted library allocation
page read and write
9C5000
heap
page read and write
4253000
trusted library allocation
page read and write
4668000
trusted library allocation
page read and write
4275000
trusted library allocation
page read and write
425D000
trusted library allocation
page read and write
BD1000
unkown
page write copy
4F6000
unkown
page write copy
144000
heap
page read and write
4242000
trusted library allocation
page read and write
2701000
heap
page read and write
46FC000
trusted library allocation
page read and write
46DE000
trusted library allocation
page read and write
4554000
trusted library allocation
page read and write
9B0000
heap
page read and write
424E000
trusted library allocation
page read and write
42A9000
trusted library allocation
page read and write
4227000
trusted library allocation
page read and write
4253000
trusted library allocation
page read and write
9C5000
heap
page read and write
4513000
trusted library allocation
page read and write
9D9000
heap
page read and write
9CC000
heap
page read and write
144000
heap
page read and write
422A000
trusted library allocation
page read and write
425A000
trusted library allocation
page read and write
4AD000
unkown
page readonly
6C6E5000
unkown
page write copy
45B0000
trusted library allocation
page read and write
423E000
trusted library allocation
page read and write
422A000
trusted library allocation
page read and write
423E000
trusted library allocation
page read and write
423D000
trusted library allocation
page read and write
4512000
trusted library allocation
page read and write
4258000
trusted library allocation
page read and write
12F0000
heap
page read and write
424E000
trusted library allocation
page read and write
42B0000
trusted library allocation
page read and write
9F0000
trusted library allocation
page read and write
42DD000
trusted library allocation
page read and write
6D353000
unkown
page read and write
42B0000
trusted library allocation
page read and write
2701000
heap
page read and write
424E000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
9D8000
heap
page read and write
2E60000
unkown
page readonly
8B0000
unkown
page readonly
453C000
trusted library allocation
page read and write
45EC000
trusted library allocation
page read and write
42F5000
trusted library allocation
page read and write
9CA000
heap
page read and write
461C000
trusted library allocation
page read and write
463E000
trusted library allocation
page read and write
4231000
trusted library allocation
page read and write
42A8000
trusted library allocation
page read and write
42F5000
trusted library allocation
page read and write
423E000
trusted library allocation
page read and write
2701000
heap
page read and write
424E000
trusted library allocation
page read and write
42A9000
trusted library allocation
page read and write
423E000
trusted library allocation
page read and write
2701000
heap
page read and write
423E000
trusted library allocation
page read and write
42CE000
trusted library allocation
page read and write
4246000
trusted library allocation
page read and write
464B000
trusted library allocation
page read and write
42CE000
trusted library allocation
page read and write
42C7000
trusted library allocation
page read and write
4329000
trusted library allocation
page read and write
423E000
trusted library allocation
page read and write
2701000
heap
page read and write
423D000
trusted library allocation
page read and write
425A000
trusted library allocation
page read and write
451E000
trusted library allocation
page read and write
42E6000
trusted library allocation
page read and write
421E000
trusted library allocation
page read and write
2701000
heap
page read and write
4241000
trusted library allocation
page read and write
144000
heap
page read and write
42B3000
trusted library allocation
page read and write
45C4000
trusted library allocation
page read and write
42B3000
trusted library allocation
page read and write
461C000
trusted library allocation
page read and write
4514000
trusted library allocation
page read and write
4227000
trusted library allocation
page read and write
144000
heap
page read and write
4F2000
unkown
page write copy
426A000
trusted library allocation
page read and write
5EB3000
trusted library allocation
page read and write
4349000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
423E000
trusted library allocation
page read and write
423D000
trusted library allocation
page read and write
432F000
trusted library allocation
page read and write
427A000
trusted library allocation
page read and write
42C7000
trusted library allocation
page read and write
4216000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
45FC000
trusted library allocation
page read and write
144000
heap
page read and write
144000
heap
page read and write
129E000
stack
page read and write
4513000
trusted library allocation
page read and write
3144000
unkown
page readonly
42A8000
trusted library allocation
page read and write
4242000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
424C000
trusted library allocation
page read and write
422E000
trusted library allocation
page read and write
9D8000
heap
page read and write
9D9000
heap
page read and write
42E1000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
4514000
trusted library allocation
page read and write
6C6EB000
unkown
page read and write
4278000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
427A000
trusted library allocation
page read and write
4231000
trusted library allocation
page read and write
9B5000
heap
page read and write
9B9000
heap
page read and write
4516000
trusted library allocation
page read and write
45C5000
trusted library allocation
page read and write
434A000
trusted library allocation
page read and write
4523000
trusted library allocation
page read and write
45D8000
trusted library allocation
page read and write
B00000
remote allocation
page read and write
144000
heap
page read and write
468C000
trusted library allocation
page read and write
9D8000
heap
page read and write
9C5000
heap
page read and write
B3FD000
trusted library allocation
page read and write
45EA000
trusted library allocation
page read and write
2701000
heap
page read and write
433F000
trusted library allocation
page read and write
4318000
trusted library allocation
page read and write
42B3000
trusted library allocation
page read and write
42BB000
trusted library allocation
page read and write
4224000
trusted library allocation
page read and write
42AF000
trusted library allocation
page read and write
3069000
unkown
page read and write
433F000
trusted library allocation
page read and write
4246000
trusted library allocation
page read and write
433A000
trusted library allocation
page read and write
425D000
trusted library allocation
page read and write
307E000
unkown
page readonly
B00000
remote allocation
page read and write
9BE000
heap
page read and write
4512000
trusted library allocation
page read and write
425A000
trusted library allocation
page read and write
42DD000
trusted library allocation
page read and write
4603000
trusted library allocation
page read and write
12FE000
heap
page read and write
4511000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
4519000
trusted library allocation
page read and write
9D9000
heap
page read and write
4349000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
421E000
trusted library allocation
page read and write
4514000
trusted library allocation
page read and write
38F1000
heap
page read and write
423E000
trusted library allocation
page read and write
42D1000
trusted library allocation
page read and write
4216000
trusted library allocation
page read and write
45D5000
trusted library allocation
page read and write
45DF000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
1362000
heap
page read and write
4513000
trusted library allocation
page read and write
B00000
remote allocation
page read and write
42F5000
trusted library allocation
page read and write
422C000
trusted library allocation
page read and write
6D391000
unkown
page read and write
451C000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
144000
heap
page read and write
423E000
trusted library allocation
page read and write
5F7E000
trusted library allocation
page read and write
422F000
trusted library allocation
page read and write
2701000
heap
page read and write
424E000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
42AD000
trusted library allocation
page read and write
423E000
trusted library allocation
page read and write
4249000
trusted library allocation
page read and write
4686000
trusted library allocation
page read and write
8B0000
unkown
page readonly
422C000
trusted library allocation
page read and write
45A1000
trusted library allocation
page read and write
425B000
trusted library allocation
page read and write
4229000
trusted library allocation
page read and write
4231000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
46A8000
trusted library allocation
page read and write
1220000
heap
page read and write
9D7000
heap
page read and write
42D7000
trusted library allocation
page read and write
4231000
trusted library allocation
page read and write
9BB000
heap
page read and write
4615000
trusted library allocation
page read and write
4347000
trusted library allocation
page read and write
4603000
trusted library allocation
page read and write
2701000
heap
page read and write
424E000
trusted library allocation
page read and write
4250000
trusted library allocation
page read and write
4441000
trusted library allocation
page read and write
9D9000
heap
page read and write
423D000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
422C000
trusted library allocation
page read and write
45EE000
trusted library allocation
page read and write
4517000
trusted library allocation
page read and write
BDF000
unkown
page readonly
42E1000
trusted library allocation
page read and write
451A000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
451D000
trusted library allocation
page read and write
45FE000
trusted library allocation
page read and write
4274000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
4418000
trusted library allocation
page read and write
42D1000
trusted library allocation
page read and write
42C1000
trusted library allocation
page read and write
451D000
trusted library allocation
page read and write
451F000
trusted library allocation
page read and write
4349000
trusted library allocation
page read and write
4246000
trusted library allocation
page read and write
423E000
trusted library allocation
page read and write
45CD000
trusted library allocation
page read and write
4512000
trusted library allocation
page read and write
6D380000
unkown
page readonly
45A7000
trusted library allocation
page read and write
9C9000
heap
page read and write
9B9000
heap
page read and write
BCF000
unkown
page write copy
423E000
trusted library allocation
page read and write
4510000
trusted library allocation
page read and write
42C1000
trusted library allocation
page read and write
AC75000
heap
page read and write
424E000
trusted library allocation
page read and write
423D000
trusted library allocation
page read and write
46BC000
trusted library allocation
page read and write
4221000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
465F000
trusted library allocation
page read and write
4224000
trusted library allocation
page read and write
10003000
unkown
page read and write
422A000
trusted library allocation
page read and write
50D9000
trusted library allocation
page read and write
144000
heap
page read and write
FBB000
stack
page read and write
4516000
trusted library allocation
page read and write
9C7000
heap
page read and write
424E000
trusted library allocation
page read and write
4221000
trusted library allocation
page read and write
37B0000
heap
page read and write
4519000
trusted library allocation
page read and write
423E000
trusted library allocation
page read and write
423D000
trusted library allocation
page read and write
3082000
unkown
page readonly
4441000
trusted library allocation
page read and write
4217000
trusted library allocation
page read and write
6C6E2000
unkown
page read and write
4227000
trusted library allocation
page read and write
8B1000
unkown
page execute read
423E000
trusted library allocation
page read and write
45C6000
trusted library allocation
page read and write
2701000
heap
page read and write
306F000
unkown
page read and write
1250000
heap
page read and write
424D000
trusted library allocation
page read and write
9B1000
heap
page read and write
36A1000
heap
page read and write
6C501000
unkown
page execute read
424E000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
45C0000
trusted library allocation
page read and write
460E000
trusted library allocation
page read and write
4221000
trusted library allocation
page read and write
9D8000
heap
page read and write
42E5000
trusted library allocation
page read and write
42DA000
trusted library allocation
page read and write
423E000
trusted library allocation
page read and write
423E000
trusted library allocation
page read and write
423E000
trusted library allocation
page read and write
8B1000
unkown
page execute read
421F000
trusted library allocation
page read and write
45F4000
trusted library allocation
page read and write
4518000
trusted library allocation
page read and write
423E000
trusted library allocation
page read and write
9C7000
heap
page read and write
424E000
trusted library allocation
page read and write
4616000
trusted library allocation
page read and write
423D000
trusted library allocation
page read and write
42C6000
trusted library allocation
page read and write
There are 541 hidden memdumps, click here to show them.