IOC Report
#Ud835#Udc7a#Ud835#Udc6c#Ud835#Udc7b#Ud835#Udc7c#Ud835#Udc77.exe

loading gifFilesProcessesURLsDomainsIPsMemdumps108642010010Label

Files

File Path
Type
Category
Malicious
Download
#Ud835#Udc7a#Ud835#Udc6c#Ud835#Udc7b#Ud835#Udc7c#Ud835#Udc77.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\MVYET7Q4Z4FMOQW2PUNL.ps1
HTML document, ASCII text, with very long lines (945)
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0pmniutn.uip.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wo0vreub.sln.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\#Ud835#Udc7a#Ud835#Udc6c#Ud835#Udc7b#Ud835#Udc7c#Ud835#Udc77.exe
"C:\Users\user\Desktop\#Ud835#Udc7a#Ud835#Udc6c#Ud835#Udc7b#Ud835#Udc7c#Ud835#Udc77.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -exec bypass -f "C:\Users\user\AppData\Local\Temp\MVYET7Q4Z4FMOQW2PUNL.ps1"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
moonehobno.bond
malicious
traveladdicts.top
malicious
rainy-lamep.bond
malicious
learnyprocce.bond
malicious
noxiuos-utopi.bond
malicious
https://traveladdicts.top/api
104.21.60.241
malicious
abaft-taboo.bond
malicious
elfinyamen.bond
malicious
conquemappe.bond
malicious
cowertbabei.bond
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://traveladdicts.top/K
unknown
https://traveladdicts.top/L
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://rentry.co/static/icons/270.pnLRkqR
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
unknown
https://rentry.co/feouewe5/rawp
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://rentry.co/static/icons/512.pnghZ#l
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://traveladdicts.top/c
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://traveladdicts.top/sd
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://traveladdicts.top/apiC
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
unknown
https://rentry.co/feouewe5/raw
104.26.3.16
https://sectigo.com/CPS0
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://traveladdicts.top/api9
unknown
https://traveladdicts.top/api:
unknown
https://rentry.co/static/icons/512.png
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
https://rentry.co/d
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://traveladdicts.top/
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://aka.ms/pscore6lBkq
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://rentry.co/static/icons/270.png
unknown
https://www.ecosia.org/newtab/
unknown
https://rentry.co/static/icons/270.pnghZ#lx
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://crl.microsoft.
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://crl.micro
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://rentry.co/
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
unknown
http://www.testlab2008.com/indices/submit.php?c=CD&i=
unknown
https://support.microsof
unknown
https://traveladdicts.top/#
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://rentry.co/static/icons/270.pnghZ#lL1
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://traveladdicts.top/3
unknown
https://traveladdicts.top/4
unknown
https://rentry.co/hZ#l
unknown
https://rentry.co/static/icons/512.pnghZ#lXN
unknown
There are 65 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
traveladdicts.top
104.21.60.241
malicious
rentry.co
104.26.3.16

IPs

IP
Domain
Country
Malicious
104.21.60.241
traveladdicts.top
United States
malicious
104.26.3.16
rentry.co
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
2460000
direct allocation
page execute and read and write
malicious
37A7000
trusted library allocation
page read and write
3788000
trusted library allocation
page read and write
710000
trusted library allocation
page read and write
700000
heap
page read and write
3758000
trusted library allocation
page read and write
3851000
trusted library allocation
page read and write
7060000
trusted library allocation
page read and write
640000
heap
page read and write
6A30000
heap
page read and write
75A000
heap
page read and write
3784000
trusted library allocation
page read and write
6DF5000
heap
page read and write
3768000
trusted library allocation
page read and write
CFE000
stack
page read and write
75A000
heap
page read and write
37DB000
trusted library allocation
page read and write
6DCD000
heap
page read and write
6ED000
heap
page read and write
3888000
trusted library allocation
page read and write
3752000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
3761000
trusted library allocation
page read and write
7FB000
heap
page read and write
706000
heap
page read and write
9C0000
trusted library allocation
page read and write
6E6000
heap
page read and write
6CC000
heap
page read and write
37F8000
trusted library allocation
page read and write
3851000
trusted library allocation
page read and write
6ED000
heap
page read and write
37AD000
trusted library allocation
page read and write
6FBE000
stack
page read and write
719000
heap
page read and write
308E000
stack
page read and write
7C80000
heap
page read and write
375B000
trusted library allocation
page read and write
378A000
trusted library allocation
page read and write
73E000
heap
page read and write
37C3000
trusted library allocation
page read and write
37C4000
trusted library allocation
page read and write
604000
heap
page read and write
6E06000
heap
page read and write
5C0000
heap
page read and write
4ADB000
trusted library allocation
page read and write
604000
heap
page read and write
ABE000
stack
page read and write
6FD000
heap
page read and write
6F4000
heap
page read and write
7100000
trusted library allocation
page read and write
37D4000
trusted library allocation
page read and write
378A000
trusted library allocation
page read and write
604000
heap
page read and write
74B000
heap
page read and write
374A000
trusted library allocation
page read and write
6DC9000
heap
page read and write
3799000
trusted library allocation
page read and write
CBE000
stack
page read and write
3756000
trusted library allocation
page read and write
69D000
heap
page read and write
3753000
trusted library allocation
page read and write
694000
heap
page read and write
374D000
trusted library allocation
page read and write
3861000
trusted library allocation
page read and write
37FA000
trusted library allocation
page read and write
3752000
trusted library allocation
page read and write
3E6B000
trusted library allocation
page read and write
6AF000
heap
page read and write
742000
trusted library allocation
page read and write
75A000
heap
page read and write
6E1A000
heap
page read and write
379C000
trusted library allocation
page read and write
3A48000
trusted library allocation
page read and write
2EEE000
stack
page read and write
374C000
trusted library allocation
page read and write
24C1000
heap
page read and write
3761000
trusted library allocation
page read and write
377A000
trusted library allocation
page read and write
57E1000
trusted library allocation
page read and write
700000
trusted library allocation
page read and write
3884000
trusted library allocation
page read and write
3756000
trusted library allocation
page read and write
374D000
trusted library allocation
page read and write
377D000
trusted library allocation
page read and write
375C000
trusted library allocation
page read and write
386A000
trusted library allocation
page read and write
37BE000
trusted library allocation
page read and write
3750000
trusted library allocation
page read and write
318F000
stack
page read and write
6AA000
heap
page read and write
72A000
heap
page read and write
302D000
stack
page read and write
3BE5000
trusted library allocation
page read and write
375D000
trusted library allocation
page read and write
70D000
heap
page read and write
6B0000
heap
page read and write
7D8000
heap
page read and write
604000
heap
page read and write
32F0000
remote allocation
page read and write
2DED000
stack
page read and write
378F000
trusted library allocation
page read and write
374C000
trusted library allocation
page read and write
715000
heap
page read and write
3757000
trusted library allocation
page read and write
466000
unkown
page write copy
715000
heap
page read and write
6AE000
heap
page read and write
37D8000
trusted library allocation
page read and write
97E000
stack
page read and write
3797000
trusted library allocation
page read and write
3861000
trusted library allocation
page read and write
3782000
trusted library allocation
page read and write
70F0000
trusted library allocation
page read and write
74B000
heap
page read and write
434E000
stack
page read and write
745000
heap
page read and write
3772000
trusted library allocation
page read and write
719000
heap
page read and write
712000
heap
page read and write
7D0000
heap
page read and write
6D90000
heap
page read and write
464000
unkown
page write copy
737000
heap
page read and write
37AE000
trusted library allocation
page read and write
37AF000
trusted library allocation
page read and write
760000
trusted library allocation
page read and write
37B0000
trusted library allocation
page read and write
375C000
trusted library allocation
page read and write
270F000
stack
page read and write
374F000
trusted library allocation
page read and write
3A4E000
trusted library allocation
page read and write
37D4000
trusted library allocation
page read and write
375D000
trusted library allocation
page read and write
3875000
trusted library allocation
page read and write
375F000
trusted library allocation
page read and write
753000
heap
page read and write
31CE000
stack
page read and write
24C2000
heap
page read and write
3710000
trusted library allocation
page read and write
4435000
heap
page execute and read and write
74F000
heap
page read and write
3741000
trusted library allocation
page read and write
714000
trusted library allocation
page read and write
754000
heap
page read and write
3741000
trusted library allocation
page read and write
3754000
trusted library allocation
page read and write
BBF000
stack
page read and write
7B40000
trusted library allocation
page read and write
712000
heap
page read and write
75A000
heap
page read and write
4C16000
trusted library allocation
page read and write
2360000
direct allocation
page read and write
4B49000
trusted library allocation
page read and write
3749000
trusted library allocation
page read and write
685E000
stack
page read and write
670000
heap
page read and write
720000
trusted library allocation
page read and write
6E5000
heap
page read and write
3851000
trusted library allocation
page read and write
3859000
trusted library allocation
page read and write
75A000
heap
page read and write
2F2E000
stack
page read and write
441D000
stack
page read and write
9B0000
trusted library allocation
page execute and read and write
74B000
heap
page read and write
7B00000
heap
page read and write
335E000
stack
page read and write
691A000
stack
page read and write
726000
heap
page read and write
7BE000
stack
page read and write
3754000
trusted library allocation
page read and write
37B3000
trusted library allocation
page read and write
3741000
trusted library allocation
page read and write
464000
unkown
page read and write
720000
heap
page read and write
37A4000
trusted library allocation
page read and write
37A4000
trusted library allocation
page read and write
377A000
trusted library allocation
page read and write
3758000
trusted library allocation
page read and write
75A000
heap
page read and write
739000
heap
page read and write
37AB000
trusted library allocation
page read and write
3850000
trusted library allocation
page read and write
3880000
trusted library allocation
page read and write
37B2000
trusted library allocation
page read and write
3B17000
trusted library allocation
page read and write
378B000
trusted library allocation
page read and write
753000
heap
page read and write
6ED000
heap
page read and write
6E9000
heap
page read and write
6E7000
heap
page read and write
37F8000
trusted library allocation
page read and write
37E5000
trusted library allocation
page read and write
3786000
trusted library allocation
page read and write
379A000
trusted library allocation
page read and write
6BB000
heap
page read and write
3741000
trusted library allocation
page read and write
9F0000
heap
page read and write
703D000
stack
page read and write
37E3000
trusted library allocation
page read and write
745000
trusted library allocation
page execute and read and write
3742000
trusted library allocation
page read and write
374C000
trusted library allocation
page read and write
3879000
trusted library allocation
page read and write
3771000
trusted library allocation
page read and write
708000
heap
page read and write
5809000
trusted library allocation
page read and write
37BE000
trusted library allocation
page read and write
3B56000
trusted library allocation
page read and write
754000
heap
page read and write
377C000
trusted library allocation
page read and write
346B000
trusted library allocation
page read and write
3851000
trusted library allocation
page read and write
3850000
trusted library allocation
page read and write
807000
heap
page read and write
737000
heap
page read and write
37D8000
trusted library allocation
page read and write
3861000
trusted library allocation
page read and write
70D000
heap
page read and write
37B3000
trusted library allocation
page read and write
375D000
trusted library allocation
page read and write
63E000
stack
page read and write
3761000
trusted library allocation
page read and write
3777000
trusted library allocation
page read and write
749000
heap
page read and write
378D000
trusted library allocation
page read and write
3B1F000
trusted library allocation
page read and write
6AF000
stack
page read and write
9AE000
stack
page read and write
6A2000
heap
page read and write
5BE000
stack
page read and write
695E000
stack
page read and write
37AF000
trusted library allocation
page read and write
604000
heap
page read and write
6F7E000
stack
page read and write
6C0000
heap
page read and write
375C000
trusted library allocation
page read and write
3ADE000
trusted library allocation
page read and write
4843000
trusted library allocation
page read and write
6DF2000
heap
page read and write
376A000
trusted library allocation
page read and write
375A000
trusted library allocation
page read and write
379F000
trusted library allocation
page read and write
3866000
trusted library allocation
page read and write
1EC000
stack
page read and write
7B10000
trusted library allocation
page execute and read and write
3AEF000
trusted library allocation
page read and write
47E1000
trusted library allocation
page read and write
3797000
trusted library allocation
page read and write
6DA7000
heap
page read and write
3775000
trusted library allocation
page read and write
3861000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
3750000
trusted library allocation
page read and write
3848000
trusted library allocation
page read and write
604000
heap
page read and write
70E0000
trusted library allocation
page read and write
34AE000
stack
page read and write
7B70000
trusted library allocation
page execute and read and write
755000
heap
page read and write
665000
heap
page read and write
3781000
trusted library allocation
page read and write
5FE000
stack
page read and write
6F9000
heap
page read and write
3792000
trusted library allocation
page read and write
37B1000
trusted library allocation
page read and write
4A34000
trusted library allocation
page read and write
3744000
trusted library allocation
page read and write
3757000
trusted library allocation
page read and write
3770000
trusted library allocation
page read and write
707000
heap
page read and write
755000
heap
page read and write
6C8E000
stack
page read and write
37A2000
trusted library allocation
page read and write
3789000
trusted library allocation
page read and write
4450000
heap
page read and write
749000
heap
page read and write
7C0000
heap
page readonly
6C0E000
stack
page read and write
284E000
stack
page read and write
70B0000
trusted library allocation
page read and write
6FF000
heap
page read and write
7050000
trusted library allocation
page execute and read and write
3755000
trusted library allocation
page read and write
32F0000
remote allocation
page read and write
754000
heap
page read and write
3782000
trusted library allocation
page read and write
375B000
trusted library allocation
page read and write
6F7000
heap
page read and write
70C000
heap
page read and write
3752000
trusted library allocation
page read and write
376D000
trusted library allocation
page read and write
689F000
stack
page read and write
3791000
trusted library allocation
page read and write
37DB000
trusted library allocation
page read and write
604000
heap
page read and write
3750000
trusted library allocation
page read and write
6C7000
heap
page read and write
6DB000
heap
page read and write
2950000
heap
page read and write
5E0000
heap
page read and write
24C5000
heap
page read and write
3770000
trusted library allocation
page read and write
733000
heap
page read and write
72A000
heap
page read and write
733000
heap
page read and write
32F0000
remote allocation
page read and write
445F000
trusted library allocation
page read and write
377C000
trusted library allocation
page read and write
3B27000
trusted library allocation
page read and write
25D0000
trusted library allocation
page read and write
3797000
trusted library allocation
page read and write
32CF000
stack
page read and write
7040000
trusted library allocation
page read and write
377A000
trusted library allocation
page read and write
387D000
trusted library allocation
page read and write
3888000
trusted library allocation
page read and write
37B4000
trusted library allocation
page read and write
6A2000
heap
page read and write
3A67000
trusted library allocation
page read and write
3760000
trusted library allocation
page read and write
37AD000
trusted library allocation
page read and write
7080000
trusted library allocation
page read and write
37B7000
trusted library allocation
page read and write
3BB7000
trusted library allocation
page read and write
3793000
trusted library allocation
page read and write
37BB000
trusted library allocation
page read and write
755000
heap
page read and write
3760000
trusted library allocation
page read and write
3757000
trusted library allocation
page read and write
7110000
trusted library allocation
page read and write
604000
heap
page read and write
4B02000
trusted library allocation
page read and write
3744000
trusted library allocation
page read and write
37A4000
trusted library allocation
page read and write
3879000
trusted library allocation
page read and write
70D0000
trusted library allocation
page read and write
3778000
trusted library allocation
page read and write
375E000
trusted library allocation
page read and write
37D8000
trusted library allocation
page read and write
604000
heap
page read and write
377B000
trusted library allocation
page read and write
375D000
trusted library allocation
page read and write
35AE000
stack
page read and write
73A000
trusted library allocation
page execute and read and write
3851000
trusted library allocation
page read and write
3797000
trusted library allocation
page read and write
6FF000
heap
page read and write
6F6000
heap
page read and write
3A45000
trusted library allocation
page read and write
74F000
heap
page read and write
3748000
trusted library allocation
page read and write
71A000
heap
page read and write
739000
heap
page read and write
6CA2000
heap
page read and write
37B0000
trusted library allocation
page read and write
375C000
trusted library allocation
page read and write
749000
heap
page read and write
604000
heap
page read and write
3879000
trusted library allocation
page read and write
3841000
trusted library allocation
page read and write
69DE000
stack
page read and write
37BB000
trusted library allocation
page read and write
3769000
trusted library allocation
page read and write
4939000
trusted library allocation
page read and write
360E000
stack
page read and write
918000
trusted library allocation
page read and write
754000
heap
page read and write
745000
heap
page read and write
70A0000
trusted library allocation
page read and write
37AB000
trusted library allocation
page read and write
70B000
heap
page read and write
6B8000
heap
page read and write
3861000
trusted library allocation
page read and write
375C000
trusted library allocation
page read and write
604000
heap
page read and write
4A55000
trusted library allocation
page read and write
715000
heap
page read and write
3794000
trusted library allocation
page read and write
604000
heap
page read and write
3778000
trusted library allocation
page read and write
3757000
trusted library allocation
page read and write
3741000
trusted library allocation
page read and write
6BCE000
stack
page read and write
74B000
heap
page read and write
3753000
trusted library allocation
page read and write
4AC8000
trusted library allocation
page read and write
3796000
trusted library allocation
page read and write
19D000
stack
page read and write
3763000
trusted library allocation
page read and write
3840000
trusted library allocation
page read and write
70C0000
trusted library allocation
page read and write
6F7000
heap
page read and write
6F20000
heap
page execute and read and write
4B12000
trusted library allocation
page read and write
379B000
trusted library allocation
page read and write
3776000
trusted library allocation
page read and write
A7F000
stack
page read and write
7090000
trusted library allocation
page read and write
C3E000
stack
page read and write
3761000
trusted library allocation
page read and write
604000
heap
page read and write
375A000
trusted library allocation
page read and write
6CE000
heap
page read and write
3A9F000
trusted library allocation
page read and write
438000
stack
page read and write
96C000
stack
page read and write
6E03000
heap
page read and write
3741000
trusted library allocation
page read and write
740000
trusted library allocation
page read and write
3754000
trusted library allocation
page read and write
3754000
trusted library allocation
page read and write
6F1E000
stack
page read and write
745000
heap
page read and write
3780000
trusted library allocation
page read and write
729000
trusted library allocation
page read and write
3779000
trusted library allocation
page read and write
67A000
heap
page read and write
374D000
trusted library allocation
page read and write
713000
trusted library allocation
page execute and read and write
6E1C000
heap
page read and write
386E000
trusted library allocation
page read and write
3746000
trusted library allocation
page read and write
71A000
heap
page read and write
3030000
heap
page read and write
4AF2000
trusted library allocation
page read and write
370F000
stack
page read and write
7070000
trusted library allocation
page read and write
3748000
trusted library allocation
page read and write
750000
heap
page read and write
604000
heap
page read and write
4B0A000
trusted library allocation
page read and write
6EA000
heap
page read and write
90E000
stack
page read and write
712000
heap
page read and write
345F000
stack
page read and write
3761000
trusted library allocation
page read and write
6F4000
heap
page read and write
3776000
trusted library allocation
page read and write
600000
heap
page read and write
438E000
stack
page read and write
3795000
trusted library allocation
page read and write
6E10000
heap
page read and write
604000
heap
page read and write
875000
heap
page read and write
727000
heap
page read and write
376F000
trusted library allocation
page read and write
6C4E000
stack
page read and write
737000
heap
page read and write
3763000
trusted library allocation
page read and write
260E000
stack
page read and write
3747000
trusted library allocation
page read and write
3770000
trusted library allocation
page read and write
3773000
trusted library allocation
page read and write
4430000
heap
page execute and read and write
37B4000
trusted library allocation
page read and write
37F4000
trusted library allocation
page read and write
3871000
trusted library allocation
page read and write
37AA000
trusted library allocation
page read and write
749000
heap
page read and write
37FA000
trusted library allocation
page read and write
6A20000
heap
page read and write
378E000
trusted library allocation
page read and write
74B000
heap
page read and write
699B000
stack
page read and write
6EA000
heap
page read and write
3859000
trusted library allocation
page read and write
37D8000
trusted library allocation
page read and write
3798000
trusted library allocation
page read and write
274C000
stack
page read and write
3766000
trusted library allocation
page read and write
3F45000
trusted library allocation
page read and write
67E000
heap
page read and write
3880000
trusted library allocation
page read and write
704000
heap
page read and write
377C000
trusted library allocation
page read and write
384A000
trusted library allocation
page read and write
6E0B000
heap
page read and write
6D7000
heap
page read and write
6DAE000
heap
page read and write
3783000
trusted library allocation
page read and write
3861000
trusted library allocation
page read and write
3748000
trusted library allocation
page read and write
6FFE000
stack
page read and write
73B000
heap
page read and write
75A000
heap
page read and write
4A0000
heap
page read and write
3776000
trusted library allocation
page read and write
68DD000
stack
page read and write
6C1000
heap
page read and write
37FA000
trusted library allocation
page read and write
604000
heap
page read and write
71D000
trusted library allocation
page execute and read and write
6FD000
heap
page read and write
3746000
trusted library allocation
page read and write
401000
unkown
page execute read
24C2000
heap
page read and write
4B19000
trusted library allocation
page read and write
726000
heap
page read and write
37A5000
trusted library allocation
page read and write
3761000
trusted library allocation
page read and write
400000
unkown
page readonly
93F000
stack
page read and write
46A000
unkown
page readonly
6A1B000
stack
page read and write
4490000
heap
page read and write
37AA000
trusted library allocation
page read and write
3752000
trusted library allocation
page read and write
377A000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
770000
heap
page execute and read and write
3783000
trusted library allocation
page read and write
377A000
trusted library allocation
page read and write
9B000
stack
page read and write
C7F000
stack
page read and write
37A0000
trusted library allocation
page read and write
715000
heap
page read and write
24D0000
heap
page read and write
6E5000
heap
page read and write
681B000
stack
page read and write
6B2000
heap
page read and write
2A6B000
trusted library allocation
page read and write
3770000
trusted library allocation
page read and write
3740000
trusted library allocation
page read and write
6E9000
heap
page read and write
751000
heap
page read and write
3763000
trusted library allocation
page read and write
37AF000
trusted library allocation
page read and write
7120000
trusted library allocation
page read and write
660000
heap
page read and write
705000
heap
page read and write
37EC000
trusted library allocation
page read and write
7B50000
trusted library allocation
page read and write
3A7F000
trusted library allocation
page read and write
375C000
trusted library allocation
page read and write
25C0000
heap
page read and write
746000
heap
page read and write
3789000
trusted library allocation
page read and write
6F7000
heap
page read and write
5B0000
heap
page read and write
378B000
trusted library allocation
page read and write
37F5000
trusted library allocation
page read and write
6EDE000
stack
page read and write
374D000
trusted library allocation
page read and write
3742000
trusted library allocation
page read and write
3770000
trusted library allocation
page read and write
7B60000
trusted library allocation
page read and write
64E000
stack
page read and write
There are 538 hidden memdumps, click here to show them.