IOC Report
RN# D7521-RN-00353 REV-2.exe

loading gif

Files

File Path
Type
Category
Malicious
RN# D7521-RN-00353 REV-2.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RN# D7521-RN-003_fe7c22bab8f2bb1b237e989214cbd58e6a8ae26d_5620e956_6b757824-e979-46a1-a72f-f10a4cd95fad\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF40C.tmp.dmp
Mini DuMP crash report, 16 streams, Thu Sep 26 12:23:05 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF7F5.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF854.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\23X395L
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RN# D7521-RN-00353 REV-2.exe
"C:\Users\user\Desktop\RN# D7521-RN-00353 REV-2.exe"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\Windows Mail\wab.exe"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\Windows Mail\wab.exe"
malicious
C:\Program Files (x86)\xMTNUwHQkrAETKAtNDqDEHOgjBwWiRwPzmBRVIWIhFMClGyOYqfJAtaCrYmwMXlmIjkSNlfAlbxdtf\uIklAoJgpkP.exe
"C:\Program Files (x86)\xMTNUwHQkrAETKAtNDqDEHOgjBwWiRwPzmBRVIWIhFMClGyOYqfJAtaCrYmwMXlmIjkSNlfAlbxdtf\uIklAoJgpkP.exe"
malicious
C:\Windows\SysWOW64\auditpol.exe
"C:\Windows\SysWOW64\auditpol.exe"
malicious
C:\Program Files (x86)\xMTNUwHQkrAETKAtNDqDEHOgjBwWiRwPzmBRVIWIhFMClGyOYqfJAtaCrYmwMXlmIjkSNlfAlbxdtf\uIklAoJgpkP.exe
"C:\Program Files (x86)\xMTNUwHQkrAETKAtNDqDEHOgjBwWiRwPzmBRVIWIhFMClGyOYqfJAtaCrYmwMXlmIjkSNlfAlbxdtf\uIklAoJgpkP.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6796 -s 1020

URLs

Name
IP
Malicious
http://www.theclydefund.info/pt4m/?sL9tFJ=gto6zAZEImMHeJ+LpJq54hk6oy5OM0JeZOEv9IoNosKW45cXkvVUXc/PKOyk1O8wCdnCAQISoXLeySDC7Pr7VLt7iUiMsNXrOKCvlG99AM7B8PQExMggQoQ=&gB7t=xFqX1hC8
3.33.130.190
malicious
http://www.inf30027group23.xyz/ljdj/
221.121.144.149
malicious
http://www.comrade.lol/oigd/?sL9tFJ=XnrNo/zlUnrEuFxFTUYkG7ae+f7+plKfKKk7EkLGEdvHK0jxala+8MCeNIwWRYprQHn5WBVAcJl6ovxdzs+7zbqSxrzmMB33zbmHRpf7OsMcrqzoZipyUU4=&gB7t=xFqX1hC8
3.33.130.190
malicious
http://www.mudanya-nakliyat.xyz/51hg/
85.159.66.93
malicious
http://www.airtech365.net/87wq/
3.33.130.190
malicious
http://www.x100.shop/uaxy/
13.248.252.114
malicious
http://www.comrade.lol/oigd/
3.33.130.190
malicious
http://www.luxe.guru/s9un/
13.248.169.48
malicious
http://www.theclydefund.info/pt4m/
3.33.130.190
malicious
http://www.x100.shop/uaxy/?sL9tFJ=jCoxKbndYFu2rVUc2fNf8o1DCs+xE29ELzrRYPIrNX671AzrKUsZ0ekHPlezV1wvKt2FOH2y7yDiMlHHG1j7pH9tJsj87FCdBv0goUpKNozmpGwQ2nrx39s=&gB7t=xFqX1hC8
13.248.252.114
malicious
http://www.crowsecurity.cloud/dt20/
3.33.130.190
malicious
http://www.mudanya-nakliyat.xyz/51hg/?sL9tFJ=lzb8Q+1ZkRYL+ndO3j5PVMDGwV51DFPdeivGsnVW/hUSyu5WpgLMVT/2ZD9ppe7fxW6d+w7xhCgyU1oioUeFR6Wo19Fxr1GQyE0P1h5QkDnbWNzfENeGUo8=&gB7t=xFqX1hC8
85.159.66.93
malicious
http://www.solargridxx.shop/m4jf/?sL9tFJ=0TgQC1Luv9cVf1TCKLCdjgzht3H610PutW8Pu5k4ZnbC5HUSntLYriRCMSQSDyNJ5vKB93oSdDtzFOKGboJdJ4jxO8kQzN3YuKmjgHKVRyz7ENXIVwzZU4M=&gB7t=xFqX1hC8
50.3.111.89
malicious
http://www.crowsecurity.cloud/dt20/?sL9tFJ=jMzfQmQmIDSzouF6Lox+3L2FgGYq5APQ95A7i7hmDDVLCGCM44ipqB5JCC3ZLSV4hUu+HvHwJbctiEvq8GXK62TkioYWTvl/FFz4Ja2JDvEPYzlsAsi7VtI=&gB7t=xFqX1hC8
3.33.130.190
malicious
http://www.languyenthuyduyen.xyz/ctkk/
103.255.237.233
malicious
http://www.63582.photo/i70z/?gB7t=xFqX1hC8&sL9tFJ=ggo41uDwxRIOOoeP1Oo5p7RDznCtlfKlzUAj4DLPY1E55MlxYQjRP3RbpEn9FapIu2dLvf4ZjTINa65Ki93S9Jq8KjMoDKqt4A2Swb3ejqHfvRtW1ozGZVs=
147.92.40.174
malicious
http://www.airtech365.net/87wq/?sL9tFJ=7bLn2toYuHgKY4svyzPVudTtlla1bf7PpnNwFD1LjHXMN8tsWMAuSdGiuKH0HcFEBqk44V2BEBEKz59MOu/v9Tn1fU8u33FZ8GhyTM58dtSMSWcfKlkKKIE=&gB7t=xFqX1hC8
3.33.130.190
malicious
http://www.stayup.top/gubb/?sL9tFJ=oPjgdHtcRwBFU1aA9ZOuj8Coc4bNSQhA+Z/l/vbVu6gyzA9FNnh3E8/0K3U760fP/mUdrl6a4REPJue/mxKU4Ri2QVEaCVjMmKnjA5rRPYPki2Nnm5W7gsk=&gB7t=xFqX1hC8
203.161.43.245
malicious
http://www.luxe.guru/s9un/?sL9tFJ=yV7TdkxfDhjd90B0KSEuK0Kqfi+wDaIV0zBeo1/164guPJfW3iKC9HyL21G52/AKQq5uaAr+ytnoQTz6UIOzVvXcy/Dczt/UyMTK+ZYHHCEGw8ax0ZASRvI=&gB7t=xFqX1hC8
13.248.169.48
malicious
http://www.newdaydawning.net/paa2/
44.213.25.70
malicious
http://www.stayup.top/gubb/
203.161.43.245
malicious
http://www.solargridxx.shop/m4jf/
50.3.111.89
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.x100.shop
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
http://newdaydawning.net/paa2/?sL9tFJ=n7l4pK2vJUox4BGRRaSHHdo
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://inf30027group23.xyz/ljdj/?sL9tFJ=ZICPfDYGGExxFAxCww1xwUjvDbJY85yXQI6dp2kJB8RnqeyNXlFMy7FVDhew
unknown
http://www.languyenthuyduyen.xyz/cgi-sys/suspendedpage.cgi?sL9tFJ=kPi1sGtrrK6MgvdeecyTfrcQSpO0wr028E
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 25 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
theclydefund.info
3.33.130.190
malicious
www.languyenthuyduyen.xyz
103.255.237.233
malicious
crowsecurity.cloud
3.33.130.190
malicious
newdaydawning.net
44.213.25.70
malicious
www.x100.shop
13.248.252.114
malicious
www.stayup.top
203.161.43.245
malicious
natroredirect.natrocdn.com
85.159.66.93
malicious
www.luxe.guru
13.248.169.48
malicious
airtech365.net
3.33.130.190
malicious
azkwupgf.as66588.com
147.92.40.174
malicious
comrade.lol
3.33.130.190
malicious
solargridxx.shop
50.3.111.89
malicious
inf30027group23.xyz
221.121.144.149
malicious
www.popin.space
unknown
malicious
www.mudanya-nakliyat.xyz
unknown
malicious
www.newdaydawning.net
unknown
malicious
www.crowsecurity.cloud
unknown
malicious
www.airtech365.net
unknown
malicious
www.inf30027group23.xyz
unknown
malicious
www.comrade.lol
unknown
malicious
www.13149200.xyz
unknown
malicious
www.theclydefund.info
unknown
malicious
www.63582.photo
unknown
malicious
www.bonusgame2024.online
unknown
malicious
www.solargridxx.shop
unknown
malicious
There are 15 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
13.248.169.48
www.luxe.guru
United States
malicious
103.255.237.233
www.languyenthuyduyen.xyz
Viet Nam
malicious
44.213.25.70
newdaydawning.net
United States
malicious
221.121.144.149
inf30027group23.xyz
Australia
malicious
50.3.111.89
solargridxx.shop
United States
malicious
203.161.43.245
www.stayup.top
Malaysia
malicious
147.92.40.174
azkwupgf.as66588.com
Hong Kong
malicious
3.33.130.190
theclydefund.info
United States
malicious
85.159.66.93
natroredirect.natrocdn.com
Turkey
malicious
13.248.252.114
www.x100.shop
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{e52184d7-6a39-3423-48dd-a71f9634da9b}\Root\InventoryApplicationFile\rn# d7521-rn-003|a8aba1e078983af2
ProgramId
\REGISTRY\A\{e52184d7-6a39-3423-48dd-a71f9634da9b}\Root\InventoryApplicationFile\rn# d7521-rn-003|a8aba1e078983af2
FileId
\REGISTRY\A\{e52184d7-6a39-3423-48dd-a71f9634da9b}\Root\InventoryApplicationFile\rn# d7521-rn-003|a8aba1e078983af2
LowerCaseLongPath
\REGISTRY\A\{e52184d7-6a39-3423-48dd-a71f9634da9b}\Root\InventoryApplicationFile\rn# d7521-rn-003|a8aba1e078983af2
LongPathHash
\REGISTRY\A\{e52184d7-6a39-3423-48dd-a71f9634da9b}\Root\InventoryApplicationFile\rn# d7521-rn-003|a8aba1e078983af2
Name
\REGISTRY\A\{e52184d7-6a39-3423-48dd-a71f9634da9b}\Root\InventoryApplicationFile\rn# d7521-rn-003|a8aba1e078983af2
OriginalFileName
\REGISTRY\A\{e52184d7-6a39-3423-48dd-a71f9634da9b}\Root\InventoryApplicationFile\rn# d7521-rn-003|a8aba1e078983af2
Publisher
\REGISTRY\A\{e52184d7-6a39-3423-48dd-a71f9634da9b}\Root\InventoryApplicationFile\rn# d7521-rn-003|a8aba1e078983af2
Version
\REGISTRY\A\{e52184d7-6a39-3423-48dd-a71f9634da9b}\Root\InventoryApplicationFile\rn# d7521-rn-003|a8aba1e078983af2
BinFileVersion
\REGISTRY\A\{e52184d7-6a39-3423-48dd-a71f9634da9b}\Root\InventoryApplicationFile\rn# d7521-rn-003|a8aba1e078983af2
BinaryType
\REGISTRY\A\{e52184d7-6a39-3423-48dd-a71f9634da9b}\Root\InventoryApplicationFile\rn# d7521-rn-003|a8aba1e078983af2
ProductName
\REGISTRY\A\{e52184d7-6a39-3423-48dd-a71f9634da9b}\Root\InventoryApplicationFile\rn# d7521-rn-003|a8aba1e078983af2
ProductVersion
\REGISTRY\A\{e52184d7-6a39-3423-48dd-a71f9634da9b}\Root\InventoryApplicationFile\rn# d7521-rn-003|a8aba1e078983af2
LinkDate
\REGISTRY\A\{e52184d7-6a39-3423-48dd-a71f9634da9b}\Root\InventoryApplicationFile\rn# d7521-rn-003|a8aba1e078983af2
BinProductVersion
\REGISTRY\A\{e52184d7-6a39-3423-48dd-a71f9634da9b}\Root\InventoryApplicationFile\rn# d7521-rn-003|a8aba1e078983af2
AppxPackageFullName
\REGISTRY\A\{e52184d7-6a39-3423-48dd-a71f9634da9b}\Root\InventoryApplicationFile\rn# d7521-rn-003|a8aba1e078983af2
AppxPackageRelativeId
\REGISTRY\A\{e52184d7-6a39-3423-48dd-a71f9634da9b}\Root\InventoryApplicationFile\rn# d7521-rn-003|a8aba1e078983af2
Size
\REGISTRY\A\{e52184d7-6a39-3423-48dd-a71f9634da9b}\Root\InventoryApplicationFile\rn# d7521-rn-003|a8aba1e078983af2
Language
\REGISTRY\A\{e52184d7-6a39-3423-48dd-a71f9634da9b}\Root\InventoryApplicationFile\rn# d7521-rn-003|a8aba1e078983af2
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2ED0000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2F20000
trusted library allocation
page read and write
malicious
4F90000
unclassified section
page execute and read and write
malicious
1C000340000
trusted library allocation
page read and write
malicious
4870000
unkown
page execute and read and write
malicious
4A90000
system
page execute and read and write
malicious
570000
unclassified section
page execute and read and write
malicious
29A0000
system
page execute and read and write
malicious
2DC0000
heap
page read and write
32C1000
heap
page read and write
302F000
heap
page read and write
32C1000
heap
page read and write
359F000
heap
page read and write
32C1000
heap
page read and write
680000
heap
page read and write
8250000
heap
page read and write
32C1000
heap
page read and write
3470000
trusted library allocation
page execute and read and write
530000
heap
page read and write
32C1000
heap
page read and write
1C076D8C000
heap
page read and write
2AFF000
stack
page read and write
4FE8000
unclassified section
page read and write
2A70000
unkown
page execute and read and write
2DF4000
heap
page read and write
32C1000
heap
page read and write
850000
unkown
page readonly
2DF4000
heap
page read and write
CF0000
unkown
page read and write
32C1000
heap
page read and write
2924000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
249C000
unkown
page read and write
4358000
unclassified section
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
7A0000
unkown
page readonly
32C1000
heap
page read and write
865000
unkown
page read and write
7FF477380000
trusted library allocation
page execute and read and write
2970000
heap
page read and write
DA0000
heap
page read and write
97C000
stack
page read and write
2BB0000
heap
page read and write
2F69000
direct allocation
page execute and read and write
32C1000
heap
page read and write
851000
unkown
page execute read
1C000001000
trusted library allocation
page read and write
7FBD000
heap
page read and write
2BC0000
heap
page read and write
4CBC000
unkown
page read and write
7F8B000
heap
page read and write
851000
unkown
page execute read
3A32000
unclassified section
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
3084000
heap
page read and write
899F000
stack
page read and write
867000
unkown
page readonly
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9B930000
trusted library allocation
page read and write
1C076F60000
trusted library allocation
page read and write
32C1000
heap
page read and write
7F86000
heap
page read and write
38F1000
direct allocation
page execute and read and write
32C1000
heap
page read and write
35A3000
heap
page read and write
1513DC10000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
32C1000
heap
page read and write
3014000
heap
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
32C1000
heap
page read and write
7F80000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
2CF8000
stack
page read and write
3055000
heap
page read and write
32C1000
heap
page read and write
2FC0000
heap
page read and write
32C1000
heap
page read and write
1C076DD7000
heap
page read and write
6B0000
unkown
page read and write
2B33000
heap
page read and write
D4E000
stack
page read and write
2F90000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
2D40000
heap
page read and write
2A0A000
heap
page read and write
7FAD000
heap
page read and write
F60000
heap
page read and write
308C000
unkown
page read and write
32C1000
heap
page read and write
850000
unkown
page readonly
2FCF000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
32C1000
heap
page read and write
3025000
heap
page read and write
32C1000
heap
page read and write
1513BFF0000
heap
page read and write
32C1000
heap
page read and write
4AD9000
system
page execute and read and write
1C076CE0000
heap
page read and write
32C1000
heap
page read and write
3C534000
system
page read and write
32C1000
heap
page read and write
1513BF54000
system
page execute and read and write
32C1000
heap
page read and write
F3CAF3000
stack
page read and write
3038000
heap
page read and write
32C1000
heap
page read and write
3045000
heap
page read and write
2FE0000
heap
page read and write
CE1000
unkown
page readonly
538000
heap
page read and write
7FA4000
heap
page read and write
33B0000
unkown
page read and write
3749000
direct allocation
page execute and read and write
32C1000
heap
page read and write
2FDA000
heap
page read and write
7FFD9B919000
trusted library allocation
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
1513DC03000
trusted library allocation
page read and write
32C1000
heap
page read and write
2AC000
stack
page read and write
32C1000
heap
page read and write
2E40000
direct allocation
page execute and read and write
F3D0FE000
stack
page read and write
4AFE000
system
page execute and read and write
2BC4000
heap
page read and write
3067000
heap
page read and write
980000
unkown
page readonly
32C1000
heap
page read and write
2D4A000
heap
page read and write
1513C140000
heap
page read and write
302F000
heap
page read and write
32C1000
heap
page read and write
850000
unkown
page readonly
32C1000
heap
page read and write
32C1000
heap
page read and write
7F98000
heap
page read and write
1C000042000
trusted library allocation
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
6400000
unclassified section
page execute and read and write
2980000
unkown
page readonly
32C1000
heap
page read and write
3032000
heap
page read and write
32C1000
heap
page read and write
1513C0E0000
heap
page read and write
54F000
heap
page read and write
2FDA000
heap
page read and write
D50000
unkown
page readonly
32C1000
heap
page read and write
C0000
unkown
page readonly
2DF0000
heap
page read and write
F68000
heap
page read and write
6D6000
heap
page read and write
1C076FE0000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
3064000
heap
page read and write
3092000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
7FFD9B93E000
trusted library allocation
page read and write
32C1000
heap
page read and write
3BE72000
system
page read and write
32C1000
heap
page read and write
598E000
unclassified section
page execute and read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
1C076D6C000
heap
page read and write
190000
unkown
page readonly
32C1000
heap
page read and write
3054000
heap
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
7FB9000
heap
page read and write
32C1000
heap
page read and write
32C0000
heap
page read and write
1513DC00000
trusted library allocation
page read and write
1513DD01000
trusted library allocation
page read and write
1C076D00000
heap
page read and write
2FDA000
heap
page read and write
2980000
unkown
page readonly
30AE000
heap
page read and write
32C1000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
9A0000
unkown
page readonly
2FD1000
heap
page read and write
2290000
unkown
page readonly
4590000
unclassified section
page execute and read and write
2FCF000
heap
page read and write
2A44000
unkown
page read and write
13A000
stack
page read and write
2651000
heap
page read and write
38ED000
direct allocation
page execute and read and write
28FF000
stack
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
1513DDC4000
trusted library allocation
page read and write
2CCF000
stack
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
570000
direct allocation
page read and write
510000
unkown
page read and write
32C1000
heap
page read and write
F68000
heap
page read and write
7FFD9B764000
trusted library allocation
page read and write
980000
unkown
page readonly
32C1000
heap
page read and write
3097000
heap
page read and write
9FE000
stack
page read and write
7FFD9B920000
trusted library allocation
page read and write
44EA000
unclassified section
page read and write
2280000
heap
page read and write
4FC000
stack
page read and write
867000
unkown
page readonly
32C1000
heap
page read and write
32C1000
heap
page read and write
1C079110000
heap
page execute and read and write
2BC4000
heap
page read and write
684000
heap
page read and write
990000
unkown
page readonly
321E000
unkown
page read and write
13A000
stack
page read and write
680000
heap
page read and write
D10000
unkown
page readonly
C157FE000
stack
page read and write
2778000
heap
page read and write
1C077190000
heap
page read and write
1513C13A000
heap
page read and write
32C1000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
7F7E000
heap
page read and write
32C1000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
32C1000
heap
page read and write
85E000
unkown
page readonly
3972000
unclassified section
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
3190000
unclassified section
page execute and read and write
1EE000
stack
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
7FC6000
heap
page read and write
1C076E56000
heap
page read and write
7FD1000
heap
page read and write
32C1000
heap
page read and write
CE1000
unkown
page readonly
570000
direct allocation
page read and write
32C1000
heap
page read and write
CF0000
unkown
page read and write
7FFD9B816000
trusted library allocation
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
5CE0000
unkown
page execute and read and write
3032000
heap
page read and write
2B37000
heap
page read and write
32C1000
heap
page read and write
1C010007000
trusted library allocation
page read and write
2651000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
66E000
stack
page read and write
170000
unkown
page readonly
7FC7000
heap
page read and write
1513C130000
heap
page read and write
296B000
stack
page read and write
32C1000
heap
page read and write
480E000
unclassified section
page read and write
32C1000
heap
page read and write
6A0000
unkown
page read and write
3111000
direct allocation
page execute and read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
190000
unkown
page readonly
2D48000
heap
page read and write
7F81000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
F3D1FF000
stack
page read and write
538000
heap
page read and write
2BC4000
heap
page read and write
32C1000
heap
page read and write
2FDB000
heap
page read and write
C13FFC000
stack
page read and write
32C1000
heap
page read and write
2382000
unkown
page read and write
3D1C000
unkown
page read and write
2D45000
heap
page read and write
7B0000
unkown
page readonly
7FFD9B810000
trusted library allocation
page read and write
D11000
unkown
page readonly
32C1000
heap
page read and write
1513DC0A000
trusted library allocation
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
D0000
unkown
page readonly
2F6D000
direct allocation
page execute and read and write
990000
unkown
page readonly
2924000
heap
page read and write
2FC8000
heap
page read and write
9A0000
unkown
page readonly
350000
heap
page read and write
2BC4000
heap
page read and write
1C076D9F000
heap
page read and write
32C1000
heap
page read and write
81A000
stack
page read and write
2EB000
stack
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
1513DDBE000
trusted library allocation
page read and write
170000
unkown
page readonly
3520000
trusted library allocation
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
39F8000
unkown
page read and write
32C1000
heap
page read and write
1C076D60000
heap
page read and write
33C0000
trusted library allocation
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
851000
unkown
page execute read
510000
unkown
page read and write
6D0000
heap
page read and write
F3CBFE000
stack
page read and write
2BC4000
heap
page read and write
32C1000
heap
page read and write
308C000
heap
page read and write
F3D2FE000
stack
page read and write
2BC4000
heap
page read and write
32C1000
heap
page read and write
307A000
heap
page read and write
1C076F70000
trusted library allocation
page read and write
1513DC12000
trusted library allocation
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
2970000
heap
page read and write
13F0000
unkown
page readonly
2D20000
heap
page read and write
1513DB00000
trusted library allocation
page read and write
32C1000
heap
page read and write
670000
unkown
page readonly
7FFD9B900000
trusted library allocation
page read and write
3614000
heap
page read and write
1513D910000
trusted library allocation
page read and write
32C1000
heap
page read and write
2FE2000
heap
page read and write
32C1000
heap
page read and write
3A8C000
unclassified section
page read and write
1C076C42000
unkown
page readonly
2651000
heap
page read and write
1513DDCE000
trusted library allocation
page read and write
2FD6000
heap
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
32C1000
heap
page read and write
32CC000
heap
page read and write
32C1000
heap
page read and write
1513C162000
heap
page read and write
1A0000
heap
page read and write
1A0000
heap
page read and write
2DB0000
heap
page read and write
7FBF000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
4B55000
system
page execute and read and write
7FFD9B762000
trusted library allocation
page read and write
32C1000
heap
page read and write
851000
unkown
page execute read
32C1000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
2BC4000
heap
page read and write
B0000
unkown
page readonly
32C1000
heap
page read and write
374D000
direct allocation
page execute and read and write
2290000
unkown
page readonly
7F81000
heap
page read and write
33EF000
heap
page read and write
3B90000
unclassified section
page execute and read and write
3470000
unkown
page execute and read and write
7FFD9B940000
trusted library allocation
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
359E000
stack
page read and write
32C1000
heap
page read and write
F3CDFE000
stack
page read and write
32C1000
heap
page read and write
1513C110000
heap
page read and write
1C078910000
trusted library allocation
page read and write
35B000
unkown
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
520000
direct allocation
page read and write
2280000
heap
page read and write
2DF4000
heap
page read and write
F3CEFB000
stack
page read and write
32C1000
heap
page read and write
3E70000
unkown
page execute and read and write
630000
stack
page read and write
7B0000
unkown
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
305A000
heap
page read and write
823E000
stack
page read and write
4FC000
stack
page read and write
7F95000
heap
page read and write
2BC4000
heap
page read and write
2FDA000
heap
page read and write
81A000
stack
page read and write
3182000
direct allocation
page execute and read and write
1513DDA9000
trusted library allocation
page read and write
CD0000
unkown
page read and write
7FFD9B910000
trusted library allocation
page read and write
6A0000
unkown
page read and write
32C1000
heap
page read and write
3025000
heap
page read and write
32C1000
heap
page read and write
1C076D8A000
heap
page read and write
180000
unkown
page readonly
D0000
unkown
page readonly
850000
unkown
page readonly
2D44000
heap
page read and write
C147FE000
stack
page read and write
85E000
unkown
page readonly
3045000
heap
page read and write
7B0000
unkown
page readonly
85E000
unkown
page readonly
32C1000
heap
page read and write
501000
unkown
page readonly
32C1000
heap
page read and write
2FE0000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
7FB2000
heap
page read and write
4AF2000
system
page execute and read and write
D70000
unkown
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
D70000
unkown
page read and write
1C0788D0000
heap
page read and write
790000
unkown
page readonly
309C000
heap
page read and write
1C076DCA000
heap
page read and write
6D0000
heap
page read and write
1C076DD2000
heap
page read and write
790000
unkown
page readonly
5630000
unclassified section
page read and write
1513D910000
trusted library allocation
page read and write
32C1000
heap
page read and write
DA0000
heap
page read and write
2BC4000
heap
page read and write
1513DA80000
heap
page read and write
32C1000
heap
page read and write
3020000
heap
page read and write
1C079260000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
31BF000
stack
page read and write
467C000
unclassified section
page read and write
30B1000
heap
page read and write
1C076D20000
heap
page read and write
7FC2000
heap
page read and write
3BF32000
system
page read and write
32C1000
heap
page read and write
C14FFE000
stack
page read and write
1C077195000
heap
page read and write
97C000
stack
page read and write
3476000
heap
page read and write
2D6E000
stack
page read and write
1ED000
stack
page read and write
2920000
heap
page read and write
2D4F000
heap
page read and write
2ED0000
trusted library allocation
page read and write
C15FFE000
stack
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
684000
heap
page read and write
1513DC16000
trusted library allocation
page read and write
2382000
unkown
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
3038000
heap
page read and write
526E000
unkown
page execute and read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
1060000
unkown
page readonly
2BC4000
heap
page read and write
1513C14C000
heap
page read and write
32C1000
heap
page read and write
310D000
direct allocation
page execute and read and write
32C1000
heap
page read and write
6450000
trusted library allocation
page read and write
530000
heap
page read and write
501000
unkown
page readonly
32C1000
heap
page read and write
980000
unkown
page readonly
3053000
heap
page read and write
32C1000
heap
page read and write
3542000
unkown
page read and write
1513BF57000
system
page execute and read and write
32C1000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
670000
unkown
page readonly
3962000
direct allocation
page execute and read and write
980000
unkown
page readonly
97F000
stack
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
EAF000
stack
page read and write
32C1000
heap
page read and write
530C000
unclassified section
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
1C079010000
trusted library section
page read and write
32C1000
heap
page read and write
7FFD9B772000
trusted library allocation
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
865000
unkown
page read and write
1C076CD0000
heap
page read and write
2442000
unkown
page read and write
1513DC21000
trusted library allocation
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
570000
direct allocation
page read and write
32C1000
heap
page read and write
1C076F40000
trusted library allocation
page read and write
1060000
unkown
page readonly
7FFD9B763000
trusted library allocation
page execute and read and write
7F81000
heap
page read and write
9B0000
heap
page read and write
360000
direct allocation
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
2650000
heap
page read and write
32C1000
heap
page read and write
2EFA000
unkown
page read and write
32C1000
heap
page read and write
3E0000
heap
page read and write
2FD1000
heap
page read and write
1513DC0E000
trusted library allocation
page read and write
867000
unkown
page readonly
7FFD9B780000
trusted library allocation
page read and write
517A000
unclassified section
page read and write
865000
unkown
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
97E000
stack
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
D50000
unkown
page readonly
2D50000
heap
page read and write
4AE2000
system
page execute and read and write
1513BEE0000
system
page execute and read and write
3520000
trusted library allocation
page read and write
32C1000
heap
page read and write
4040000
unkown
page read and write
1513C15B000
heap
page read and write
13F0000
unkown
page readonly
F3CFFD000
stack
page read and write
4034000
unclassified section
page read and write
2FDE000
direct allocation
page execute and read and write
7FFD9B914000
trusted library allocation
page read and write
1C076FE5000
heap
page read and write
67CE000
stack
page read and write
7F90000
heap
page read and write
32C1000
heap
page read and write
1C076C40000
unkown
page readonly
3DE000
stack
page read and write
4B32000
unclassified section
page read and write
7F70000
trusted library allocation
page read and write
3520000
trusted library allocation
page read and write
1513C15F000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
1F0000
unkown
page read and write
2FDA000
heap
page read and write
F3CCFE000
stack
page read and write
32C1000
heap
page read and write
2BC4000
heap
page read and write
32C1000
heap
page read and write
1F0000
unkown
page read and write
32C1000
heap
page read and write
39E000
stack
page read and write
1C076DCC000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
8080000
trusted library allocation
page read and write
32C1000
heap
page read and write
37BE000
direct allocation
page execute and read and write
306D000
heap
page read and write
2D68000
unkown
page read and write
1C010001000
trusted library allocation
page read and write
3620000
direct allocation
page execute and read and write
1C076FB0000
heap
page execute and read and write
2BA8000
heap
page read and write
867000
unkown
page readonly
865000
unkown
page read and write
32C1000
heap
page read and write
2D50000
heap
page read and write
F60000
heap
page read and write
CD0000
unkown
page read and write
7A0000
unkown
page readonly
32C1000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
C0000
unkown
page readonly
9B0000
heap
page read and write
1C076F73000
trusted library allocation
page read and write
80C000
unkown
page read and write
2BC4000
heap
page read and write
32C1000
heap
page read and write
221F000
stack
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
32C1000
heap
page read and write
52E0000
unkown
page execute and read and write
32C1000
heap
page read and write
36D4000
unkown
page read and write
B0000
unkown
page readonly
32C1000
heap
page read and write
180000
unkown
page readonly
49A0000
unclassified section
page read and write
5A00000
unclassified section
page execute and read and write
32C1000
heap
page read and write
7F81000
heap
page read and write
85E000
unkown
page readonly
4CC4000
unclassified section
page read and write
3B8A000
unkown
page read and write
1513D910000
trusted library allocation
page read and write
2BC4000
heap
page read and write
2655000
heap
page read and write
2920000
heap
page read and write
There are 647 hidden memdumps, click here to show them.