IOC Report
Shave.exe

loading gif

Files

File Path
Type
Category
Malicious
Shave.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\bayberry\krselsretningerne\Dacryocystitis.Sku69
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\bayberry\krselsretningerne\Sipunculoidea.ude
DIY-Thermocam raw data (Lepton 2.x), scale 0-12, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 649037107316853453566312041152512.000000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\bayberry\krselsretningerne\moccasins.ved
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\bayberry\krselsretningerne\sporostrote.dip
data
dropped
C:\Users\user\AppData\Local\Temp\nsa5D43.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Shave.exe
"C:\Users\user\Desktop\Shave.exe"
malicious
C:\Users\user\Desktop\Shave.exe
"C:\Users\user\Desktop\Shave.exe"
malicious

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://mail.cipmach.com
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://mertvinc.com.tr/oxzGOftLtQcGlWZ214.bin
185.244.144.68
https://api.telegram.org/bot
unknown
https://www.office.com/lB
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:899552%0D%0ADate%20a
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
https://reallyfreegeoip.org/xml/8.46.123.75
172.67.177.134
http://varders.kozow.com:8081
unknown
http://mertvinc.com.tr/oxzGOftLtQcGlWZ214.binQ
unknown
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://checkip.dyndns.org/
193.122.130.0
http://51.38.247.67:8081/_send_.php?L
unknown
http://anotherarmy.dns.army:8081
unknown
https://reallyfreegeoip.org/xml/8.46.123.75$
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://reallyfreegeoip.org
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:899552%0D%0ADate%20and%20Time:%2026/11/2024%20/%2019:05:29%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20899552%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://mertvinc.com.tr/oxzGOftLtQcGlWZ214.bin6
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.cipmach.com
199.79.63.24
malicious
mertvinc.com.tr
185.244.144.68
reallyfreegeoip.org
172.67.177.134
api.telegram.org
149.154.167.220
checkip.dyndns.com
193.122.130.0
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
199.79.63.24
mail.cipmach.com
United States
malicious
149.154.167.220
api.telegram.org
United Kingdom
185.244.144.68
mertvinc.com.tr
Turkey
193.122.130.0
checkip.dyndns.com
United States
172.67.177.134
reallyfreegeoip.org
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\allogeneity
Catabolite
HKEY_CURRENT_USER\Preformative\Uninstall\genitale
varicella
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Shave_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Shave_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Shave_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Shave_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Shave_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Shave_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Shave_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Shave_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Shave_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Shave_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Shave_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Shave_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Shave_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Shave_RASMANCS
FileDirectory
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3526B000
trusted library allocation
page read and write
malicious
35131000
trusted library allocation
page read and write
malicious
AAB000
heap
page read and write
malicious
4332000
direct allocation
page execute and read and write
malicious
AC3000
heap
page read and write
35001000
trusted library allocation
page read and write
3820E000
stack
page read and write
4B20000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
2F32000
direct allocation
page execute and read and write
352E2000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
4B50000
trusted library allocation
page read and write
35195000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
4C38000
heap
page read and write
401000
unkown
page execute read
80000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
4B70000
heap
page read and write
36312000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
37FCD000
stack
page read and write
35001000
trusted library allocation
page read and write
3800F000
stack
page read and write
352A4000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
3643F000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
268F000
stack
page read and write
378D1000
heap
page read and write
352E4000
trusted library allocation
page read and write
6620000
direct allocation
page read and write
4AE0000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
4B40000
trusted library allocation
page read and write
36538000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
34A7E000
stack
page read and write
4AE0000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
66D0000
direct allocation
page read and write
35000000
trusted library allocation
page read and write
150000
trusted library allocation
page execute and read and write
6630000
direct allocation
page read and write
35000000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
353B1000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
34F10000
trusted library allocation
page read and write
34EF0000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
34EF0000
trusted library allocation
page read and write
34EE0000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
94000
trusted library allocation
page read and write
7A6000
unkown
page read and write
4AF0000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
34FED000
stack
page read and write
4B40000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
788000
unkown
page read and write
361B8000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
34B7F000
stack
page read and write
35295000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
361B5000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
4E40000
trusted library allocation
page execute and read and write
35001000
trusted library allocation
page read and write
34EE0000
trusted library allocation
page read and write
351A8000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
176000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
353A2000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
BA000
trusted library allocation
page execute and read and write
3519F000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
3654E000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
1BA2000
remote allocation
page execute and read and write
35001000
trusted library allocation
page read and write
339A0000
direct allocation
page read and write
35001000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
3623E000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
339E0000
direct allocation
page read and write
34EE0000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
34F00000
heap
page read and write
35010000
trusted library allocation
page read and write
3634F000
trusted library allocation
page read and write
7C5000
unkown
page read and write
25A2000
remote allocation
page execute and read and write
6690000
direct allocation
page read and write
26CE000
stack
page read and write
3622B000
trusted library allocation
page read and write
361B2000
trusted library allocation
page read and write
6650000
direct allocation
page read and write
4B50000
trusted library allocation
page read and write
36408000
trusted library allocation
page read and write
34EF0000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
379D0000
trusted library allocation
page read and write
34D40000
direct allocation
page read and write
35001000
trusted library allocation
page read and write
4B50000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
3512F000
stack
page read and write
36135000
trusted library allocation
page read and write
4B10000
heap
page read and write
34A30000
trusted library allocation
page read and write
339D0000
direct allocation
page read and write
2470000
heap
page read and write
4B20000
trusted library allocation
page read and write
34FC0000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
7C7000
unkown
page readonly
C5000
trusted library allocation
page execute and read and write
4C31000
heap
page read and write
3649C000
trusted library allocation
page read and write
352BB000
trusted library allocation
page read and write
351E9000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
379F0000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
34FB0000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
378D1000
heap
page read and write
35001000
trusted library allocation
page read and write
35010000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
35322000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
34EE0000
trusted library allocation
page read and write
35238000
trusted library allocation
page read and write
36131000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
36480000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
35020000
heap
page read and write
3830F000
stack
page read and write
4B20000
trusted library allocation
page read and write
34EE0000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
24BE000
stack
page read and write
361C0000
trusted library allocation
page read and write
4C4F000
heap
page read and write
401000
unkown
page execute read
379D0000
trusted library allocation
page read and write
34EA4000
trusted library allocation
page read and write
870000
heap
page read and write
364C2000
trusted library allocation
page read and write
6680000
direct allocation
page read and write
3722E000
stack
page read and write
4AF0000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
7C3000
unkown
page read and write
400000
unkown
page readonly
35000000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
4BF4000
heap
page read and write
4B20000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
339F0000
direct allocation
page read and write
35215000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
38310000
trusted library allocation
page execute and read and write
4B20000
trusted library allocation
page read and write
379D0000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
353B6000
trusted library allocation
page read and write
C2000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
6750000
heap
page read and write
34EE0000
trusted library allocation
page read and write
672E000
stack
page read and write
4E60000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
2475000
heap
page read and write
4AED000
trusted library allocation
page read and write
351E1000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
38B55000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
36144000
trusted library allocation
page read and write
34B90000
heap
page read and write
4B20000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
39A2000
remote allocation
page execute and read and write
4AF0000
trusted library allocation
page read and write
362FD000
trusted library allocation
page read and write
4B30000
trusted library allocation
page execute and read and write
379D0000
trusted library allocation
page read and write
385EF000
stack
page read and write
34EE0000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
34E97000
stack
page read and write
379F0000
trusted library allocation
page read and write
4AC5000
heap
page read and write
9D000
trusted library allocation
page execute and read and write
364B1000
trusted library allocation
page read and write
379D0000
trusted library allocation
page read and write
353A8000
trusted library allocation
page read and write
3540D000
trusted library allocation
page read and write
5D80000
direct allocation
page read and write
4AE0000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
4B50000
trusted library allocation
page read and write
3518A000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
35382000
trusted library allocation
page read and write
4C4D000
heap
page read and write
4B20000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
362A0000
trusted library allocation
page read and write
A5E000
stack
page read and write
35290000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
A70000
heap
page read and write
34FF0000
heap
page execute and read and write
4AE0000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
885000
heap
page read and write
408000
unkown
page readonly
35001000
trusted library allocation
page read and write
3541B000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
40A000
unkown
page write copy
35000000
trusted library allocation
page read and write
40A000
unkown
page write copy
34EE0000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
401000
unkown
page execute read
6610000
direct allocation
page read and write
4AE0000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
CB000
trusted library allocation
page execute and read and write
4B20000
trusted library allocation
page read and write
352B0000
trusted library allocation
page read and write
7C7000
unkown
page readonly
35001000
trusted library allocation
page read and write
379F0000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
2580000
heap
page read and write
4BCC000
heap
page read and write
35010000
trusted library allocation
page read and write
37902000
heap
page read and write
352DE000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
7C7000
unkown
page readonly
34EE0000
trusted library allocation
page read and write
34EE0000
trusted library allocation
page read and write
4AD4000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
3517D000
trusted library allocation
page read and write
351CD000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
4C2D000
heap
page read and write
3730E000
stack
page read and write
5D70000
direct allocation
page read and write
400000
unkown
page readonly
401000
unkown
page execute read
4B20000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
14C000
stack
page read and write
C7000
trusted library allocation
page execute and read and write
33A00000
direct allocation
page read and write
378D0000
heap
page read and write
351D5000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
4AC7000
heap
page read and write
379F0000
trusted library allocation
page execute and read and write
364DE000
trusted library allocation
page read and write
352EC000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
379E0000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
2C1F000
stack
page read and write
180000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
352F1000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
6F971000
unkown
page execute read
364D3000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
34EE0000
trusted library allocation
page read and write
36159000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
66B0000
direct allocation
page read and write
35001000
trusted library allocation
page read and write
361BA000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
10E000
stack
page read and write
4B20000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
384EE000
stack
page read and write
4E60000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
37DDE000
heap
page read and write
782000
unkown
page read and write
4E60000
trusted library allocation
page read and write
353D9000
trusted library allocation
page read and write
34EE0000
trusted library allocation
page read and write
37310000
heap
page read and write
6F975000
unkown
page readonly
26D4000
heap
page read and write
4AF0000
trusted library allocation
page read and write
6670000
direct allocation
page read and write
34EF0000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
6660000
direct allocation
page read and write
351E5000
trusted library allocation
page read and write
348DF000
stack
page read and write
4B20000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
3619C000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
35427000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
4E50000
trusted library allocation
page read and write
36151000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
379E4000
trusted library allocation
page read and write
381CF000
stack
page read and write
35010000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
40A000
unkown
page write copy
4B20000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
379D0000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
34EE0000
trusted library allocation
page read and write
2570000
heap
page read and write
38B80000
trusted library allocation
page read and write
37F8F000
stack
page read and write
4B20000
trusted library allocation
page read and write
4B2F000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
170000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
34EF0000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
34CEE000
stack
page read and write
4AE0000
trusted library allocation
page read and write
4B00000
trusted library allocation
page read and write
36194000
trusted library allocation
page read and write
37D92000
heap
page read and write
35313000
trusted library allocation
page read and write
353AB000
trusted library allocation
page read and write
4B50000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
351A3000
trusted library allocation
page read and write
37E8E000
stack
page read and write
37D4E000
stack
page read and write
3626A000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
2DD0000
direct allocation
page execute and read and write
7AB000
unkown
page read and write
4B20000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
35317000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
7A4000
unkown
page read and write
4B50000
trusted library allocation
page read and write
2D10000
heap
page read and write
4AE0000
trusted library allocation
page read and write
35010000
trusted library allocation
page read and write
4AC0000
heap
page read and write
36518000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
34F18000
trusted library allocation
page read and write
36215000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
34EF0000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
4C31000
heap
page read and write
3642A000
trusted library allocation
page read and write
37A00000
heap
page execute and read and write
4E60000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
86E000
stack
page read and write
B6000
trusted library allocation
page execute and read and write
364EC000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
36384000
trusted library allocation
page read and write
ABE000
heap
page read and write
38B90000
trusted library allocation
page read and write
3527B000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
363F9000
trusted library allocation
page read and write
4B50000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
351D9000
trusted library allocation
page read and write
33A10000
direct allocation
page read and write
4AF0000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
4AD6000
trusted library allocation
page read and write
379E0000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
90000
trusted library allocation
page read and write
34EF0000
trusted library allocation
page read and write
3542D000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
38B70000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
379E0000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
24FE000
stack
page read and write
38B70000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
4B50000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
4B40000
trusted library allocation
page execute and read and write
35001000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
C6F000
stack
page read and write
4E60000
trusted library allocation
page read and write
351DD000
trusted library allocation
page read and write
93000
trusted library allocation
page execute and read and write
4B20000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
37D54000
heap
page read and write
96000
stack
page read and write
160000
trusted library allocation
page read and write
A0000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
3636F000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
34EE0000
trusted library allocation
page read and write
3479F000
stack
page read and write
35564000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
379E0000
trusted library allocation
page read and write
352E6000
trusted library allocation
page read and write
35010000
trusted library allocation
page read and write
38B80000
trusted library allocation
page read and write
A9E000
heap
page read and write
3531D000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
36325000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
3530F000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
33990000
direct allocation
page read and write
383AE000
stack
page read and write
34EF0000
trusted library allocation
page read and write
35000000
remote allocation
page read and write
35001000
trusted library allocation
page read and write
361AC000
trusted library allocation
page read and write
38B50000
trusted library allocation
page read and write
4B50000
trusted library allocation
page read and write
4B00000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
3647C000
trusted library allocation
page read and write
26D0000
heap
page read and write
66C0000
direct allocation
page read and write
35000000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
35000000
remote allocation
page read and write
4B20000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
4C3B000
heap
page read and write
35001000
trusted library allocation
page read and write
37DDC000
heap
page read and write
35429000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
33A20000
direct allocation
page read and write
A78000
heap
page read and write
4B78000
heap
page read and write
4B20000
trusted library allocation
page read and write
34EE0000
trusted library allocation
page read and write
3804E000
stack
page read and write
4B20000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
B0000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
35010000
trusted library allocation
page read and write
3814F000
stack
page read and write
38B26000
trusted library allocation
page read and write
4BB2000
heap
page read and write
4AF0000
trusted library allocation
page read and write
6F970000
unkown
page readonly
34EE0000
trusted library allocation
page read and write
5732000
direct allocation
page execute and read and write
34D50000
direct allocation
page read and write
34EF6000
trusted library allocation
page read and write
384AF000
stack
page read and write
4B50000
trusted library allocation
page execute and read and write
35283000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
34ED5000
trusted library allocation
page read and write
34D9C000
stack
page read and write
408000
unkown
page readonly
364C9000
trusted library allocation
page read and write
1A40000
remote allocation
page execute and read and write
4AF0000
trusted library allocation
page read and write
353DE000
trusted library allocation
page read and write
38B52000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
38B60000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
35423000
trusted library allocation
page read and write
34EE0000
trusted library allocation
page read and write
4D32000
direct allocation
page execute and read and write
38B90000
trusted library allocation
page read and write
361A2000
trusted library allocation
page read and write
4BE7000
heap
page read and write
34EF0000
trusted library allocation
page read and write
6F973000
unkown
page readonly
35001000
trusted library allocation
page read and write
408000
unkown
page readonly
408000
unkown
page readonly
4B20000
trusted library allocation
page read and write
3491D000
stack
page read and write
4AF0000
trusted library allocation
page read and write
2FA2000
remote allocation
page execute and read and write
400000
unkown
page readonly
379D0000
trusted library allocation
page read and write
3541E000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
3818E000
stack
page read and write
4B50000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
ABB000
heap
page read and write
352B5000
trusted library allocation
page read and write
353AD000
trusted library allocation
page read and write
351ED000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
36353000
trusted library allocation
page read and write
35010000
trusted library allocation
page read and write
379E0000
trusted library allocation
page read and write
4B50000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
43A2000
remote allocation
page execute and read and write
4E60000
trusted library allocation
page read and write
7E0000
heap
page read and write
4AE0000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
363E3000
trusted library allocation
page read and write
361A9000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
786000
unkown
page read and write
34EF0000
trusted library allocation
page read and write
37C4F000
stack
page read and write
6640000
direct allocation
page read and write
7C7000
unkown
page readonly
347DE000
stack
page read and write
4AE0000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
B2000
trusted library allocation
page read and write
34A1B000
stack
page read and write
19A000
stack
page read and write
35000000
remote allocation
page read and write
364CE000
trusted library allocation
page read and write
3614B000
trusted library allocation
page read and write
351D1000
trusted library allocation
page read and write
339C0000
direct allocation
page read and write
34EF0000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
3932000
direct allocation
page execute and read and write
34EE0000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
82E000
stack
page read and write
4AF0000
trusted library allocation
page read and write
35000000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
4B50000
trusted library allocation
page read and write
77C000
unkown
page read and write
7B3000
unkown
page read and write
3628A000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
34EE0000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
34FB0000
trusted library allocation
page read and write
880000
heap
page read and write
4AF0000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
34EE0000
trusted library allocation
page read and write
400000
unkown
page readonly
36452000
trusted library allocation
page read and write
2430000
heap
page read and write
35001000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
37D50000
heap
page read and write
35001000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
66A0000
heap
page read and write
379E0000
trusted library allocation
page read and write
35001000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
339B0000
direct allocation
page read and write
4ADA000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
3529A000
trusted library allocation
page read and write
49E0000
heap
page read and write
40A000
unkown
page read and write
35001000
trusted library allocation
page read and write
379D0000
trusted library allocation
page read and write
34BED000
stack
page read and write
35001000
trusted library allocation
page read and write
4B00000
trusted library allocation
page execute and read and write
35001000
trusted library allocation
page read and write
35315000
trusted library allocation
page read and write
4AC7000
heap
page read and write
2B1F000
stack
page read and write
4B50000
trusted library allocation
page read and write
There are 691 hidden memdumps, click here to show them.