IOC Report
SimpleLoader v2.1.exe1.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SimpleLoader v2.1.exe1.exe
"C:\Users\user\Desktop\SimpleLoader v2.1.exe1.exe"
malicious
C:\Users\user\Desktop\SimpleLoader v2.1.exe1.exe
"C:\Users\user\Desktop\SimpleLoader v2.1.exe1.exe"
malicious
C:\Users\user\Desktop\SimpleLoader v2.1.exe1.exe
"C:\Users\user\Desktop\SimpleLoader v2.1.exe1.exe"
malicious
C:\Users\user\Desktop\SimpleLoader v2.1.exe1.exe
"C:\Users\user\Desktop\SimpleLoader v2.1.exe1.exe"
malicious

URLs

Name
IP
Malicious
decorathnome.icu/ABbss
malicious
crosshairc.life/dAnjhw
malicious
https://t.me/
unknown
https://duckduckgo.com/ac/?q=
unknown
https://web.telegram.org
unknown
https://decorathnome.icu/ABbssC
unknown
https://decorathnome.icu/ABbssF
unknown
bugildbett.top/bAuz
https://decorathnome.icu/ABbssA
unknown
https://decorathnome.icu/x8
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://decorathnome.icu/s
unknown
https://decorathnome.icu/ABbss
172.67.144.37
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
https://decorathnome.icu/ABbssW
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://decorathnome.icu/ABbssm
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://decorathnome.icu/ABbssQvQ
unknown
https://www.mozilla.or
unknown
cjlaspcorne.icu/DbIps
mrodularmall.top/aNzS
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://duckduckgo.com/chrome_newtabv20-
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ac.ecosia.org?q=
unknown
https://decorathnome.icu/sows
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://decorathnome.icu//
unknown
jowinjoinery.icu/bdWUa
legenassedk.top/bdpWO
https://decorathnome.icu/ABbssTs
unknown
https://decorathnome.icu:443/ABbss
unknown
https://decorathnome.icu/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://decorathnome.icu/Windows
unknown
https://t.me/kz_prokla1
149.154.167.99
https://www.ecosia.org/newtab/v20
unknown
https://decorathnome.icu/ABbssPM=
unknown
htardwarehu.icu/Sbdsa
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://web.telegram.orgX-Frame-OptionsALLOW-FROM
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://web.telegram.orgPersistent-AuthWWW-AuthenticateVarystel_ssid=a88ac38d923dcffb84_785111170565
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://gemini.google.com/app?q=
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
https://decorathnome.icu/W
unknown
There are 45 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
decorathnome.icu
172.67.144.37
malicious
t.me
149.154.167.99

IPs

IP
Domain
Country
Malicious
172.67.144.37
decorathnome.icu
United States
malicious
149.154.167.99
t.me
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
1147000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
FD4000
heap
page read and write
1097000
heap
page read and write
391B000
trusted library allocation
page read and write
392B000
trusted library allocation
page read and write
101B000
heap
page read and write
38AF000
trusted library allocation
page read and write
10A4000
heap
page read and write
38D4000
trusted library allocation
page read and write
38C3000
trusted library allocation
page read and write
FD4000
heap
page read and write
390A000
trusted library allocation
page read and write
10BE000
heap
page read and write
10E1000
heap
page read and write
38BB000
trusted library allocation
page read and write
16A0000
heap
page read and write
FD0000
heap
page read and write
101B000
heap
page read and write
109C000
heap
page read and write
3641000
trusted library allocation
page execute read
10BE000
heap
page read and write
105D000
heap
page read and write
3902000
trusted library allocation
page read and write
FD4000
heap
page read and write
10D0000
heap
page read and write
FD4000
heap
page read and write
105D000
heap
page read and write
634000
unkown
page readonly
102A000
heap
page read and write
10D0000
heap
page read and write
634000
unkown
page readonly
FD4000
heap
page read and write
10A0000
heap
page read and write
10D5000
heap
page read and write
38E6000
trusted library allocation
page read and write
38D2000
trusted library allocation
page read and write
FD4000
heap
page read and write
10A8000
heap
page read and write
38CA000
trusted library allocation
page read and write
3909000
trusted library allocation
page read and write
1040000
heap
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
12FA000
heap
page read and write
5E1000
unkown
page execute read
38D7000
trusted library allocation
page read and write
38D8000
trusted library allocation
page read and write
1099000
heap
page read and write
FD4000
heap
page read and write
10C7000
heap
page read and write
38DF000
trusted library allocation
page read and write
10D9000
heap
page read and write
38CA000
trusted library allocation
page read and write
38F5000
trusted library allocation
page read and write
10D0000
heap
page read and write
10A4000
heap
page read and write
3935000
trusted library allocation
page read and write
1130000
heap
page read and write
38A1000
trusted library allocation
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
63F000
unkown
page write copy
1028000
heap
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
38F7000
trusted library allocation
page read and write
1085000
heap
page read and write
38CE000
trusted library allocation
page read and write
38F3000
trusted library allocation
page read and write
FD4000
heap
page read and write
36D5000
trusted library allocation
page read and write
1027000
heap
page read and write
38C3000
trusted library allocation
page read and write
38A5000
trusted library allocation
page read and write
5E1000
unkown
page execute read
38CA000
trusted library allocation
page read and write
3908000
trusted library allocation
page read and write
3B82000
trusted library allocation
page read and write
FD4000
heap
page read and write
634000
unkown
page readonly
1096000
heap
page read and write
FD4000
heap
page read and write
1094000
heap
page read and write
10CD000
heap
page read and write
FD4000
heap
page read and write
38DB000
trusted library allocation
page read and write
FD4000
heap
page read and write
38FF000
trusted library allocation
page read and write
2CCE000
stack
page read and write
109C000
heap
page read and write
10BE000
heap
page read and write
38C6000
trusted library allocation
page read and write
FD4000
heap
page read and write
38D1000
trusted library allocation
page read and write
38C5000
trusted library allocation
page read and write
101B000
heap
page read and write
646000
unkown
page write copy
FD4000
heap
page read and write
10DA000
heap
page read and write
646000
unkown
page write copy
FD4000
heap
page read and write
2B4E000
stack
page read and write
FD4000
heap
page read and write
10DA000
heap
page read and write
3790000
heap
page read and write
1096000
heap
page read and write
1027000
heap
page read and write
2C8D000
stack
page read and write
3380000
remote allocation
page read and write
10D9000
heap
page read and write
38CA000
trusted library allocation
page read and write
10BE000
heap
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
39A1000
heap
page read and write
38CA000
trusted library allocation
page read and write
FD4000
heap
page read and write
1085000
heap
page read and write
38CF000
trusted library allocation
page read and write
5E1000
unkown
page execute read
FD4000
heap
page read and write
10D9000
heap
page read and write
101B000
heap
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
1041000
heap
page read and write
38BF000
trusted library allocation
page read and write
38F3000
trusted library allocation
page read and write
10E1000
heap
page read and write
FD4000
heap
page read and write
5E1000
unkown
page execute read
38A9000
trusted library allocation
page read and write
10C8000
heap
page read and write
38EB000
trusted library allocation
page read and write
FD4000
heap
page read and write
38FB000
trusted library allocation
page read and write
10AA000
heap
page read and write
1049000
heap
page read and write
38BB000
trusted library allocation
page read and write
EFB000
stack
page read and write
1049000
heap
page read and write
643000
unkown
page readonly
311D000
stack
page read and write
3AC2000
trusted library allocation
page read and write
FD4000
heap
page read and write
2B14000
trusted library allocation
page read and write
FD4000
heap
page read and write
1041000
heap
page read and write
38F7000
trusted library allocation
page read and write
10D5000
heap
page read and write
3AA1000
trusted library allocation
page read and write
FD4000
heap
page read and write
646000
unkown
page write copy
38D2000
trusted library allocation
page read and write
38D3000
trusted library allocation
page read and write
FD4000
heap
page read and write
646000
unkown
page write copy
FD4000
heap
page read and write
124E000
stack
page read and write
10CD000
heap
page read and write
352E000
stack
page read and write
38C6000
trusted library allocation
page read and write
FD4000
heap
page read and write
B7B000
stack
page read and write
1098000
heap
page read and write
38B1000
trusted library allocation
page read and write
1093000
heap
page read and write
FF8000
heap
page read and write
39A0000
heap
page read and write
101B000
heap
page read and write
38F7000
trusted library allocation
page read and write
FD4000
heap
page read and write
38C0000
trusted library allocation
page read and write
38DC000
trusted library allocation
page read and write
38DB000
trusted library allocation
page read and write
128E000
stack
page read and write
3B72000
trusted library allocation
page read and write
10E1000
heap
page read and write
10E2000
heap
page read and write
3642000
trusted library allocation
page readonly
5E0000
unkown
page readonly
1085000
heap
page read and write
38BE000
trusted library allocation
page read and write
10D3000
heap
page read and write
38BB000
trusted library allocation
page read and write
362E000
stack
page read and write
10AA000
heap
page read and write
5E0000
unkown
page readonly
643000
unkown
page readonly
FD4000
heap
page read and write
38E7000
trusted library allocation
page read and write
FD4000
heap
page read and write
1049000
heap
page read and write
FD4000
heap
page read and write
1085000
heap
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
38C4000
trusted library allocation
page read and write
FD4000
heap
page read and write
63F000
unkown
page write copy
FD4000
heap
page read and write
3912000
trusted library allocation
page read and write
10DA000
heap
page read and write
1093000
heap
page read and write
38AF000
trusted library allocation
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
10BE000
heap
page read and write
38C4000
trusted library allocation
page read and write
10E5000
heap
page read and write
10D3000
heap
page read and write
5E1000
unkown
page execute read
1027000
heap
page read and write
6FF00000
unkown
page readonly
FD4000
heap
page read and write
3B4A000
trusted library allocation
page read and write
646000
unkown
page write copy
FD4000
heap
page read and write
103F000
heap
page read and write
10C8000
heap
page read and write
38BB000
trusted library allocation
page read and write
103F000
heap
page read and write
391B000
trusted library allocation
page read and write
1049000
heap
page read and write
10DA000
heap
page read and write
38B4000
trusted library allocation
page read and write
38CA000
trusted library allocation
page read and write
10BE000
heap
page read and write
5E0000
unkown
page readonly
FD4000
heap
page read and write
FD4000
heap
page read and write
10B5000
heap
page read and write
38C4000
trusted library allocation
page read and write
3640000
trusted library allocation
page readonly
38A9000
trusted library allocation
page read and write
10D0000
heap
page read and write
63F000
unkown
page write copy
FF0000
heap
page read and write
38E9000
trusted library allocation
page read and write
38BF000
trusted library allocation
page read and write
38A0000
trusted library allocation
page read and write
3907000
trusted library allocation
page read and write
FD4000
heap
page read and write
103D000
heap
page read and write
FD4000
heap
page read and write
1093000
heap
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
3C12000
trusted library allocation
page read and write
39A1000
heap
page read and write
1049000
heap
page read and write
10A0000
heap
page read and write
63F000
unkown
page write copy
1093000
heap
page read and write
10C5000
heap
page read and write
FD4000
heap
page read and write
38E4000
trusted library allocation
page read and write
14EF000
stack
page read and write
3935000
trusted library allocation
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
321F000
stack
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
38AD000
trusted library allocation
page read and write
10DA000
heap
page read and write
FD4000
heap
page read and write
38B7000
trusted library allocation
page read and write
10CE000
heap
page read and write
FD4000
heap
page read and write
1093000
heap
page read and write
3935000
trusted library allocation
page read and write
10E1000
heap
page read and write
3949000
trusted library allocation
page read and write
63F000
unkown
page write copy
15EF000
stack
page read and write
38C7000
trusted library allocation
page read and write
3927000
trusted library allocation
page read and write
38CE000
trusted library allocation
page read and write
2C4C000
stack
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
5E0000
unkown
page readonly
38A8000
trusted library allocation
page read and write
10DA000
heap
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
DED000
stack
page read and write
FD4000
heap
page read and write
3908000
trusted library allocation
page read and write
FD4000
heap
page read and write
38B5000
trusted library allocation
page read and write
38B0000
trusted library allocation
page read and write
390D000
trusted library allocation
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
38A7000
trusted library allocation
page read and write
FD4000
heap
page read and write
10C7000
heap
page read and write
10DB000
heap
page read and write
FD4000
heap
page read and write
38D2000
trusted library allocation
page read and write
643000
unkown
page readonly
FD4000
heap
page read and write
394A000
trusted library allocation
page read and write
3908000
trusted library allocation
page read and write
FD4000
heap
page read and write
1027000
heap
page read and write
640000
unkown
page read and write
38BE000
trusted library allocation
page read and write
1097000
heap
page read and write
10CE000
heap
page read and write
3908000
trusted library allocation
page read and write
38DB000
trusted library allocation
page read and write
103D000
heap
page read and write
FD4000
heap
page read and write
10C7000
heap
page read and write
FD4000
heap
page read and write
38E9000
trusted library allocation
page read and write
374C000
stack
page read and write
643000
unkown
page readonly
38BA000
trusted library allocation
page read and write
1085000
heap
page read and write
FD4000
heap
page read and write
6FF1D000
unkown
page read and write
643000
unkown
page readonly
FD4000
heap
page read and write
10A4000
heap
page read and write
63F000
unkown
page write copy
12FE000
heap
page read and write
38DC000
trusted library allocation
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
38D7000
trusted library allocation
page read and write
3ADA000
trusted library allocation
page read and write
1027000
heap
page read and write
325E000
stack
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
5E0000
unkown
page readonly
10B6000
heap
page read and write
10A1000
heap
page read and write
FD4000
heap
page read and write
38BA000
trusted library allocation
page read and write
38BA000
trusted library allocation
page read and write
10CD000
heap
page read and write
38F9000
trusted library allocation
page read and write
FD4000
heap
page read and write
38CE000
trusted library allocation
page read and write
10DA000
heap
page read and write
FD4000
heap
page read and write
3908000
trusted library allocation
page read and write
FD4000
heap
page read and write
335F000
stack
page read and write
38EB000
trusted library allocation
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
3CAE000
stack
page read and write
38EA000
trusted library allocation
page read and write
38B0000
trusted library allocation
page read and write
1049000
heap
page read and write
10C7000
heap
page read and write
646000
unkown
page write copy
FD4000
heap
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
634000
unkown
page readonly
FD4000
heap
page read and write
10BE000
heap
page read and write
10BC000
heap
page read and write
10A0000
heap
page read and write
38FD000
trusted library allocation
page read and write
38F2000
trusted library allocation
page read and write
FD4000
heap
page read and write
38CA000
trusted library allocation
page read and write
38DB000
trusted library allocation
page read and write
10A8000
heap
page read and write
38B2000
trusted library allocation
page read and write
101B000
heap
page read and write
FD4000
heap
page read and write
10CB000
heap
page read and write
391B000
trusted library allocation
page read and write
6FF1F000
unkown
page readonly
38A8000
trusted library allocation
page read and write
103D000
heap
page read and write
1085000
heap
page read and write
3B7A000
trusted library allocation
page read and write
109A000
heap
page read and write
10C4000
heap
page read and write
10A0000
heap
page read and write
104C000
heap
page read and write
FD4000
heap
page read and write
3AA3000
trusted library allocation
page read and write
CED000
stack
page read and write
10DB000
heap
page read and write
3907000
trusted library allocation
page read and write
FD4000
heap
page read and write
105D000
heap
page read and write
646000
unkown
page write copy
3FAD000
trusted library allocation
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
3911000
trusted library allocation
page read and write
10D5000
heap
page read and write
FD4000
heap
page read and write
6FF16000
unkown
page readonly
10D9000
heap
page read and write
38C0000
trusted library allocation
page read and write
10A3000
heap
page read and write
3932000
trusted library allocation
page read and write
FD4000
heap
page read and write
38C5000
trusted library allocation
page read and write
3922000
trusted library allocation
page read and write
3944000
trusted library allocation
page read and write
38CA000
trusted library allocation
page read and write
38BA000
trusted library allocation
page read and write
FD4000
heap
page read and write
38D3000
trusted library allocation
page read and write
38BA000
trusted library allocation
page read and write
389F000
stack
page read and write
643000
unkown
page readonly
646000
unkown
page write copy
38E5000
trusted library allocation
page read and write
38BB000
trusted library allocation
page read and write
10BE000
heap
page read and write
634000
unkown
page readonly
38F7000
trusted library allocation
page read and write
63F000
unkown
page write copy
634000
unkown
page readonly
38F3000
trusted library allocation
page read and write
1094000
heap
page read and write
38C4000
trusted library allocation
page read and write
38AF000
trusted library allocation
page read and write
1085000
heap
page read and write
38C2000
trusted library allocation
page read and write
38D7000
trusted library allocation
page read and write
2CD0000
heap
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
103F000
heap
page read and write
FD4000
heap
page read and write
BE0000
heap
page read and write
10BE000
heap
page read and write
FD4000
heap
page read and write
38A9000
trusted library allocation
page read and write
1049000
heap
page read and write
FD4000
heap
page read and write
34EF000
stack
page read and write
38AF000
trusted library allocation
page read and write
38F8000
trusted library allocation
page read and write
FD4000
heap
page read and write
10DA000
heap
page read and write
FD4000
heap
page read and write
1049000
heap
page read and write
44BD000
trusted library allocation
page read and write
394E000
trusted library allocation
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
38F2000
trusted library allocation
page read and write
370E000
stack
page read and write
FD4000
heap
page read and write
33EE000
stack
page read and write
103E000
heap
page read and write
38A1000
trusted library allocation
page read and write
38CA000
trusted library allocation
page read and write
10D5000
heap
page read and write
390A000
trusted library allocation
page read and write
38B0000
trusted library allocation
page read and write
FD4000
heap
page read and write
103D000
heap
page read and write
10D5000
heap
page read and write
10BE000
heap
page read and write
3380000
remote allocation
page read and write
38E3000
trusted library allocation
page read and write
103D000
heap
page read and write
3AA9000
trusted library allocation
page read and write
5E0000
unkown
page readonly
FD4000
heap
page read and write
38C7000
trusted library allocation
page read and write
38D6000
trusted library allocation
page read and write
FD4000
heap
page read and write
5E0000
unkown
page readonly
FD4000
heap
page read and write
FD4000
heap
page read and write
38F7000
trusted library allocation
page read and write
FD4000
heap
page read and write
38A1000
trusted library allocation
page read and write
38B9000
trusted library allocation
page read and write
10DB000
heap
page read and write
38BD000
trusted library allocation
page read and write
10BE000
heap
page read and write
1120000
heap
page read and write
38D6000
trusted library allocation
page read and write
103D000
heap
page read and write
38E9000
trusted library allocation
page read and write
10AA000
heap
page read and write
38AF000
trusted library allocation
page read and write
3907000
trusted library allocation
page read and write
109D000
heap
page read and write
38F5000
trusted library allocation
page read and write
38D2000
trusted library allocation
page read and write
FD4000
heap
page read and write
38D1000
trusted library allocation
page read and write
103D000
heap
page read and write
10D9000
heap
page read and write
10A0000
heap
page read and write
12F0000
heap
page read and write
38AC000
trusted library allocation
page read and write
1085000
heap
page read and write
390A000
trusted library allocation
page read and write
FD4000
heap
page read and write
10D9000
heap
page read and write
36D8000
trusted library allocation
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
38D8000
trusted library allocation
page read and write
101C000
heap
page read and write
1085000
heap
page read and write
38BF000
trusted library allocation
page read and write
3942000
trusted library allocation
page read and write
10DA000
heap
page read and write
3908000
trusted library allocation
page read and write
38CA000
trusted library allocation
page read and write
FD4000
heap
page read and write
10D6000
heap
page read and write
10E1000
heap
page read and write
38BF000
trusted library allocation
page read and write
105D000
heap
page read and write
FD4000
heap
page read and write
1027000
heap
page read and write
643000
unkown
page readonly
394B000
trusted library allocation
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
105D000
heap
page read and write
38A4000
trusted library allocation
page read and write
BD0000
heap
page read and write
10D0000
heap
page read and write
101C000
heap
page read and write
1027000
heap
page read and write
10C7000
heap
page read and write
634000
unkown
page readonly
105D000
heap
page read and write
3DAE000
stack
page read and write
38D0000
trusted library allocation
page read and write
FD4000
heap
page read and write
103D000
heap
page read and write
5E1000
unkown
page execute read
5E1000
unkown
page execute read
1085000
heap
page read and write
FD4000
heap
page read and write
104B000
heap
page read and write
462000
remote allocation
page execute and read and write
1049000
heap
page read and write
38B0000
trusted library allocation
page read and write
1027000
heap
page read and write
38A3000
trusted library allocation
page read and write
10D9000
heap
page read and write
10D3000
heap
page read and write
5E1000
unkown
page execute read
3380000
remote allocation
page read and write
38A9000
trusted library allocation
page read and write
38E7000
trusted library allocation
page read and write
FD4000
heap
page read and write
38AF000
trusted library allocation
page read and write
38DB000
trusted library allocation
page read and write
38E3000
trusted library allocation
page read and write
38DB000
trusted library allocation
page read and write
100C000
heap
page read and write
10A4000
heap
page read and write
10A0000
heap
page read and write
FD4000
heap
page read and write
38E0000
trusted library allocation
page read and write
5E0000
unkown
page readonly
38D6000
trusted library allocation
page read and write
63F000
unkown
page execute and read and write
3935000
trusted library allocation
page read and write
10DB000
heap
page read and write
369E000
stack
page read and write
634000
unkown
page readonly
FD4000
heap
page read and write
10C7000
heap
page read and write
10CD000
heap
page read and write
1040000
heap
page read and write
10BE000
heap
page read and write
FD4000
heap
page read and write
38C7000
trusted library allocation
page read and write
38CB000
trusted library allocation
page read and write
38F5000
trusted library allocation
page read and write
38CA000
trusted library allocation
page read and write
1041000
heap
page read and write
10A4000
heap
page read and write
3938000
trusted library allocation
page read and write
643000
unkown
page readonly
38DB000
trusted library allocation
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
38A8000
trusted library allocation
page read and write
FD4000
heap
page read and write
10A4000
heap
page read and write
38DB000
trusted library allocation
page read and write
6FF01000
unkown
page execute read
FD4000
heap
page read and write
FD4000
heap
page read and write
3912000
trusted library allocation
page read and write
FD4000
heap
page read and write
1085000
heap
page read and write
38FA000
trusted library allocation
page read and write
103F000
heap
page read and write
10BE000
heap
page read and write
FD4000
heap
page read and write
38A1000
trusted library allocation
page read and write
There are 609 hidden memdumps, click here to show them.