IOC Report
3RBUJ4RX4a.exe

loading gif

Files

File Path
Type
Category
Malicious
3RBUJ4RX4a.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\Gloved172\3RBUJ4RX4a.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\Gloved172\3RBUJ4RX4a.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\Nonfecund.pel
ASCII text, with very long lines (65536), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nq2d2de0.50i.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zcr3uy2k.swf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhv1690.tmp
Extensible storage engine DataBase, version 0x620, checksum 0xb20b6b62, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\elanfuaqikmdbmdy
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\Flavors.fif
data
dropped
C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\Folioformaters.Nap
data
dropped
C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\Gloved172\catenoid.syg
TeX font metric data
dropped
C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\Gloved172\goddises.hov
data
dropped
C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\Gloved172\grssers.sol
data
dropped
C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\Gloved172\lugworm.cep
data
dropped
C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\Gloved172\saddeltaskerne.wit
data
dropped
C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\Gloved172\variabelnavn.san
data
dropped
C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\Haanendes.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\adoptanten.fig
data
dropped
C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\blokindskuddenes.uns
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\udskaaret.ini
ASCII text, with CRLF line terminators
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\3RBUJ4RX4a.exe
"C:\Users\user\Desktop\3RBUJ4RX4a.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden " $Demele=cat 'C:\Users\user\AppData\Local\forfrdelige\begyndervanskelighederne\Nonfecund.pel';$Selvbetjeningslokaler=$Demele.substring(18427,3);.$Selvbetjeningslokaler($Demele)"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\elanfuaqikmdbmdy"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\goffgnlsvseqesrcrjy"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\qikqhfwlrawvozngjuscbe"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\qikqhfwlrawvozngjuscbe"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\qikqhfwlrawvozngjuscbe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
kezdns.pro
malicious
http://nuget.org/NuGet.exe
unknown
http://www.imvu.comr
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://geoplugin.net/json.gpl
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://login.li
unknown
https://contoso.com/License
unknown
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
http://www.nirsoft.net
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://zakk.co.za/QiUyUWVQVU67.bin
102.218.215.35
https://github.com/Pester/Pester
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://zakk.co.za/
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://www.google.com
unknown
http://nsis.sf.net/NSIS_Error
unknown
http://geoplugin.net/json.gpRL
unknown
https://aka.ms/pscore6lB
unknown
https://zakk.co.za/QiUyUWVQVU67.binQ
unknown
https://zakk.co.za/_Q
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
https://zakk.co.za/QiUyUWVQVU67.binm
unknown
http://www.nirsoft.net/
unknown
http://www.imvu.comata
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.ebuddy.com
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
kezdns.pro
95.216.5.32
malicious
geoplugin.net
178.237.33.50
zakk.co.za
102.218.215.35

IPs

IP
Domain
Country
Malicious
95.216.5.32
kezdns.pro
Germany
malicious
102.218.215.35
zakk.co.za
unknown
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-KRPMMI
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-KRPMMI
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-KRPMMI
time
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
635C000
heap
page read and write
malicious
6350000
heap
page read and write
malicious
8E9E000
direct allocation
page execute and read and write
malicious
6332000
heap
page read and write
malicious
400000
unkown
page readonly
2F61000
heap
page read and write
21F6E000
heap
page read and write
21F88000
heap
page read and write
2DF0000
heap
page readonly
7137000
trusted library allocation
page read and write
63DE000
heap
page read and write
2F50000
heap
page read and write
2984000
heap
page read and write
425000
unkown
page read and write
63BD000
heap
page read and write
6560000
direct allocation
page read and write
62F0000
heap
page read and write
400000
system
page execute and read and write
4C01000
heap
page read and write
CDD000
trusted library allocation
page execute and read and write
660000
heap
page read and write
703000
heap
page read and write
2F41000
heap
page read and write
63E3000
heap
page read and write
2F49000
heap
page read and write
73D0000
trusted library allocation
page read and write
2A44000
heap
page read and write
29C3000
heap
page read and write
83E1000
heap
page read and write
83A0000
heap
page read and write
7570000
trusted library allocation
page read and write
2965000
heap
page read and write
21D71000
direct allocation
page execute and read and write
2903000
heap
page read and write
6367000
heap
page read and write
2C4F000
stack
page read and write
2A44000
heap
page read and write
50C9000
heap
page read and write
2A44000
heap
page read and write
2951000
heap
page read and write
703000
heap
page read and write
2910000
heap
page read and write
707000
heap
page read and write
2F61000
heap
page read and write
22182000
heap
page read and write
25E4000
heap
page read and write
840B000
heap
page read and write
293B000
heap
page read and write
50D4000
heap
page read and write
27BC000
stack
page read and write
2F57000
heap
page read and write
2F84000
heap
page read and write
63A3000
heap
page read and write
2A45000
heap
page read and write
2D7B000
stack
page read and write
7FA7000
stack
page read and write
2906000
heap
page read and write
25E4000
heap
page read and write
221BC000
heap
page read and write
65E0000
direct allocation
page read and write
80E0000
trusted library allocation
page read and write
4DFF000
stack
page read and write
2969000
heap
page read and write
2F7E000
heap
page read and write
290A000
heap
page read and write
2956000
heap
page read and write
292A000
heap
page read and write
2F56000
heap
page read and write
530A000
heap
page read and write
29B4000
heap
page read and write
25E4000
heap
page read and write
7510000
trusted library allocation
page read and write
25E4000
heap
page read and write
291C000
heap
page read and write
750000
heap
page read and write
7580000
trusted library allocation
page read and write
2F41000
heap
page read and write
71E000
heap
page read and write
6364000
heap
page read and write
470000
heap
page read and write
63B2000
heap
page read and write
AC9E000
direct allocation
page execute and read and write
2F4C000
heap
page read and write
6F7000
heap
page read and write
2967000
heap
page read and write
2F5E000
heap
page read and write
2F90000
heap
page read and write
2F51000
heap
page read and write
839C000
stack
page read and write
2F4C000
heap
page read and write
703000
heap
page read and write
295A000
heap
page read and write
2F57000
heap
page read and write
2F41000
heap
page read and write
2A44000
heap
page read and write
63D1000
heap
page read and write
21F4A000
heap
page read and write
831C000
stack
page read and write
2937000
heap
page read and write
29B6000
heap
page read and write
2B78000
heap
page read and write
70B000
heap
page read and write
2964000
heap
page read and write
21F11000
heap
page read and write
21BBE000
stack
page read and write
63A1000
heap
page read and write
74AE000
stack
page read and write
6F7000
heap
page read and write
63E2000
heap
page read and write
2A16000
heap
page read and write
6CA0000
direct allocation
page read and write
707000
heap
page read and write
2F74000
heap
page read and write
33F0000
heap
page read and write
462C000
stack
page read and write
6C8000
heap
page read and write
62E0000
heap
page read and write
707000
heap
page read and write
2948000
heap
page read and write
A48000
heap
page read and write
4C01000
heap
page read and write
6C70000
direct allocation
page read and write
5D48000
trusted library allocation
page read and write
292F000
heap
page read and write
75B0000
trusted library allocation
page read and write
468E000
stack
page read and write
2A57000
heap
page read and write
2F4C000
heap
page read and write
2910000
heap
page read and write
6C30000
direct allocation
page read and write
2911000
heap
page read and write
2F63000
heap
page read and write
4B1E000
stack
page read and write
63E2000
heap
page read and write
2F6E000
heap
page read and write
22182000
heap
page read and write
75D0000
trusted library allocation
page read and write
4C01000
heap
page read and write
4B13000
heap
page read and write
2FC3000
heap
page read and write
22293000
unclassified section
page execute and read and write
2F5E000
heap
page read and write
2F50000
heap
page read and write
4BEE000
stack
page read and write
2F41000
heap
page read and write
25B0000
heap
page read and write
22182000
heap
page read and write
6F7000
heap
page read and write
22177000
heap
page read and write
21F11000
heap
page read and write
2F5E000
heap
page read and write
252A000
stack
page read and write
AFE000
stack
page read and write
29A4000
heap
page read and write
5010000
trusted library allocation
page read and write
2F41000
heap
page read and write
21EF6000
unclassified section
page execute and read and write
2923000
heap
page read and write
2F20000
heap
page read and write
2F48000
heap
page read and write
2F87000
heap
page read and write
A29E000
direct allocation
page execute and read and write
2F6E000
heap
page read and write
7195000
heap
page read and write
2F4C000
heap
page read and write
2D70000
heap
page read and write
4C01000
heap
page read and write
7530000
trusted library allocation
page read and write
4C00000
heap
page read and write
746F000
stack
page read and write
742E000
stack
page read and write
63C5000
heap
page read and write
2F69000
heap
page read and write
2939000
heap
page read and write
2D73000
heap
page read and write
2410000
heap
page read and write
4C01000
heap
page read and write
22021000
heap
page read and write
5BB9000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
21F40000
heap
page read and write
70B000
heap
page read and write
21D5B000
unclassified section
page execute and read and write
2919000
heap
page read and write
29BD000
heap
page read and write
21D40000
unclassified section
page execute and read and write
2945000
heap
page read and write
2F4E000
heap
page read and write
2F50000
heap
page read and write
2F4C000
heap
page read and write
22142000
heap
page read and write
8680000
direct allocation
page execute and read and write
CE9000
trusted library allocation
page read and write
75C0000
trusted library allocation
page read and write
8640000
heap
page read and write
2A44000
heap
page read and write
83DA000
heap
page read and write
290C000
heap
page read and write
2903000
heap
page read and write
25E4000
heap
page read and write
4710000
heap
page read and write
2F7E000
heap
page read and write
2904000
heap
page read and write
6C80000
direct allocation
page read and write
2A29000
heap
page read and write
41C000
unkown
page read and write
2A44000
heap
page read and write
2F57000
heap
page read and write
2F41000
heap
page read and write
ABA000
heap
page read and write
2F61000
heap
page read and write
2930000
heap
page read and write
27EF000
stack
page read and write
703000
heap
page read and write
21B80000
remote allocation
page read and write
80D0000
heap
page read and write
63CE000
heap
page read and write
43B000
unkown
page readonly
21DB0000
heap
page read and write
2F7B000
heap
page read and write
2F5E000
heap
page read and write
21F88000
heap
page read and write
27F2000
stack
page read and write
2F61000
heap
page read and write
29A5000
heap
page read and write
2F4C000
heap
page read and write
2F6E000
heap
page read and write
4C01000
heap
page read and write
70B000
heap
page read and write
705E000
stack
page read and write
22177000
heap
page read and write
807E000
stack
page read and write
2971000
heap
page read and write
293B000
heap
page read and write
21A4E000
stack
page read and write
25E4000
heap
page read and write
2B70000
heap
page read and write
3040000
heap
page read and write
2913000
heap
page read and write
2F61000
heap
page read and write
2A44000
heap
page read and write
2575000
heap
page read and write
8441000
heap
page read and write
6580000
direct allocation
page read and write
2F5B000
heap
page read and write
2A44000
heap
page read and write
4C01000
heap
page read and write
2F41000
heap
page read and write
65F0000
direct allocation
page read and write
85DD000
stack
page read and write
989E000
direct allocation
page execute and read and write
500000
heap
page read and write
21F4A000
heap
page read and write
19A000
stack
page read and write
6F7000
heap
page read and write
2A45000
heap
page read and write
CD0000
trusted library allocation
page read and write
6550000
heap
page readonly
299D000
heap
page read and write
2928000
heap
page read and write
2A08000
heap
page read and write
6C20000
direct allocation
page read and write
4690000
trusted library allocation
page read and write
25E4000
heap
page read and write
29E5000
heap
page read and write
21F17000
heap
page read and write
502B000
heap
page read and write
6590000
direct allocation
page read and write
2FA5000
heap
page read and write
2A22000
heap
page read and write
21F53000
heap
page read and write
29F5000
heap
page read and write
21B80000
remote allocation
page read and write
98000
stack
page read and write
21C4C000
stack
page read and write
6CB0000
direct allocation
page read and write
7200000
heap
page read and write
707000
heap
page read and write
25E4000
heap
page read and write
8435000
heap
page read and write
2F49000
heap
page read and write
408000
unkown
page readonly
2B0F000
stack
page read and write
45BE000
stack
page read and write
4FAE000
stack
page read and write
63CE000
heap
page read and write
65E000
stack
page read and write
70B000
heap
page read and write
25E4000
heap
page read and write
42A000
unkown
page read and write
29A2000
heap
page read and write
24BD000
stack
page read and write
502F000
heap
page read and write
422000
unkown
page read and write
2914000
heap
page read and write
7F150000
trusted library allocation
page execute and read and write
4860000
heap
page read and write
65D0000
direct allocation
page read and write
2F41000
heap
page read and write
83C0000
heap
page read and write
2A40000
heap
page read and write
5010000
heap
page read and write
6F7000
heap
page read and write
41B000
system
page execute and read and write
8445000
heap
page read and write
22099000
heap
page read and write
520F000
heap
page read and write
2F41000
heap
page read and write
2F59000
heap
page read and write
2F4C000
heap
page read and write
21DA0000
heap
page read and write
70B000
heap
page read and write
7225000
heap
page read and write
22177000
heap
page read and write
8670000
trusted library allocation
page read and write
4A9F000
stack
page read and write
65A0000
direct allocation
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
63B4000
heap
page read and write
707000
heap
page read and write
2F61000
heap
page read and write
4C0F000
trusted library allocation
page read and write
CCE000
stack
page read and write
2F7B000
heap
page read and write
25B0000
heap
page read and write
835E000
stack
page read and write
5020000
trusted library allocation
page read and write
400000
system
page execute and read and write
7172000
heap
page read and write
2924000
heap
page read and write
2A70000
heap
page read and write
2F63000
heap
page read and write
2F5D000
heap
page read and write
4BB1000
trusted library allocation
page read and write
22182000
heap
page read and write
29AD000
heap
page read and write
6C0000
heap
page read and write
65C0000
direct allocation
page read and write
74F0000
trusted library allocation
page read and write
703000
heap
page read and write
21F15000
heap
page read and write
2954000
heap
page read and write
D05000
trusted library allocation
page execute and read and write
33FC000
heap
page read and write
8420000
heap
page read and write
5424000
heap
page read and write
2A44000
heap
page read and write
73B0000
trusted library allocation
page read and write
2F40000
heap
page read and write
C8E000
stack
page read and write
29BD000
heap
page read and write
597E000
remote allocation
page execute and read and write
B76000
heap
page read and write
8090000
trusted library allocation
page read and write
2F6C000
heap
page read and write
703000
heap
page read and write
83C2000
heap
page read and write
63E2000
heap
page read and write
6367000
heap
page read and write
22279000
unclassified section
page execute and read and write
4C01000
heap
page read and write
A30000
heap
page read and write
21B80000
remote allocation
page read and write
5010000
trusted library allocation
page read and write
302A000
heap
page read and write
CFA000
trusted library allocation
page execute and read and write
D6E000
stack
page read and write
2A44000
heap
page read and write
2992000
heap
page read and write
2F63000
heap
page read and write
4B5E000
stack
page read and write
8660000
trusted library allocation
page execute and read and write
703000
heap
page read and write
4C01000
heap
page read and write
63D7000
heap
page read and write
8650000
trusted library allocation
page read and write
473000
system
page execute and read and write
2A45000
heap
page read and write
2F61000
heap
page read and write
25E4000
heap
page read and write
2F4C000
heap
page read and write
73E0000
trusted library allocation
page read and write
2A45000
heap
page read and write
2F61000
heap
page read and write
2900000
heap
page read and write
75A0000
trusted library allocation
page read and write
2209A000
heap
page read and write
2993000
heap
page read and write
4E3E000
stack
page read and write
21F2F000
heap
page read and write
83A6000
heap
page read and write
2F84000
heap
page read and write
2F41000
heap
page read and write
4ADE000
stack
page read and write
22172000
heap
page read and write
3258000
heap
page read and write
2DE0000
heap
page read and write
21D86000
direct allocation
page execute and read and write
2F55000
heap
page read and write
4640000
heap
page read and write
A40000
heap
page read and write
2903000
heap
page read and write
214D0000
direct allocation
page read and write
2F5E000
heap
page read and write
2F41000
heap
page read and write
2F57000
heap
page read and write
6D85000
heap
page execute and read and write
290E000
stack
page read and write
2A44000
heap
page read and write
25E4000
heap
page read and write
6C10000
direct allocation
page read and write
21BFF000
stack
page read and write
63E2000
heap
page read and write
8080000
heap
page read and write
63B4000
heap
page read and write
2A44000
heap
page read and write
2F54000
heap
page read and write
5D61000
trusted library allocation
page read and write
2D3C000
stack
page read and write
2F59000
heap
page read and write
27F4000
stack
page read and write
2944000
heap
page read and write
2C68000
heap
page read and write
22113000
heap
page read and write
21F8A000
heap
page read and write
2F65000
heap
page read and write
2F61000
heap
page read and write
7157000
heap
page read and write
7FC0000
trusted library allocation
page execute and read and write
63E2000
heap
page read and write
83EC000
heap
page read and write
B1D000
heap
page read and write
635A000
heap
page read and write
2B4E000
stack
page read and write
2932000
heap
page read and write
25E4000
heap
page read and write
4BA0000
heap
page execute and read and write
4C01000
heap
page read and write
2F57000
heap
page read and write
2987000
heap
page read and write
7500000
trusted library allocation
page execute and read and write
63B4000
heap
page read and write
291B000
heap
page read and write
2A44000
heap
page read and write
21EFC000
unclassified section
page execute and read and write
2F41000
heap
page read and write
2F69000
heap
page read and write
4630000
trusted library allocation
page execute and read and write
33F3000
heap
page read and write
63A7000
heap
page read and write
707000
heap
page read and write
D20000
trusted library allocation
page read and write
21D0F000
stack
page read and write
27D6000
stack
page read and write
5BD9000
trusted library allocation
page read and write
6F7000
heap
page read and write
439000
unkown
page read and write
63CF000
heap
page read and write
63E1000
heap
page read and write
2960000
heap
page read and write
2F41000
heap
page read and write
2F7F000
heap
page read and write
293E000
heap
page read and write
2F85000
heap
page read and write
3020000
heap
page read and write
2919000
heap
page read and write
43B000
unkown
page readonly
2F49000
heap
page read and write
2F61000
heap
page read and write
4D07000
trusted library allocation
page read and write
22172000
heap
page read and write
2F61000
heap
page read and write
5010000
trusted library allocation
page read and write
4C01000
heap
page read and write
703000
heap
page read and write
457E000
remote allocation
page execute and read and write
2F74000
heap
page read and write
8620000
trusted library allocation
page execute and read and write
294F000
heap
page read and write
4FE000
stack
page read and write
29AF000
heap
page read and write
45C000
system
page execute and read and write
2A45000
heap
page read and write
7520000
trusted library allocation
page read and write
2F80000
heap
page read and write
2A44000
heap
page read and write
221BB000
heap
page read and write
22220000
unclassified section
page execute and read and write
2F87000
heap
page read and write
B50000
trusted library section
page read and write
294A000
heap
page read and write
2B60000
heap
page read and write
2959000
heap
page read and write
40A000
unkown
page write copy
2F61000
heap
page read and write
4649000
heap
page read and write
214C0000
direct allocation
page read and write
2927000
heap
page read and write
302D000
heap
page read and write
8175000
trusted library allocation
page read and write
51F5000
heap
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
4FEF000
stack
page read and write
6F7000
heap
page read and write
2907000
heap
page read and write
70B000
heap
page read and write
2955000
heap
page read and write
4C01000
heap
page read and write
73A0000
trusted library allocation
page read and write
2F57000
heap
page read and write
2A45000
heap
page read and write
4C01000
heap
page read and write
2F40000
heap
page read and write
703000
heap
page read and write
2A44000
heap
page read and write
2A45000
heap
page read and write
2227D000
unclassified section
page execute and read and write
2A45000
heap
page read and write
2A44000
heap
page read and write
2F57000
heap
page read and write
2940000
heap
page read and write
400000
unkown
page readonly
4BE000
stack
page read and write
29B2000
heap
page read and write
2EEF000
stack
page read and write
29B0000
heap
page read and write
2F40000
heap
page read and write
5C1C000
trusted library allocation
page read and write
2F49000
heap
page read and write
2560000
heap
page read and write
22021000
heap
page read and write
6E10000
heap
page read and write
80A0000
trusted library allocation
page execute and read and write
707000
heap
page read and write
4F7E000
remote allocation
page execute and read and write
6F7000
heap
page read and write
2FA5000
heap
page read and write
420000
unkown
page read and write
70B000
heap
page read and write
4C01000
heap
page read and write
5BB1000
trusted library allocation
page read and write
7281000
heap
page read and write
7FB0000
heap
page read and write
CE0000
trusted library allocation
page read and write
2430000
heap
page read and write
2F87000
heap
page read and write
63DB000
heap
page read and write
2420000
heap
page read and write
7DF000
stack
page read and write
80C0000
trusted library allocation
page read and write
63BD000
heap
page read and write
22113000
heap
page read and write
4C01000
heap
page read and write
456000
system
page execute and read and write
2440000
heap
page read and write
2A44000
heap
page read and write
B40000
trusted library section
page read and write
2B50000
heap
page readonly
63A3000
heap
page read and write
29E2000
heap
page read and write
ABF000
stack
page read and write
7130000
trusted library allocation
page read and write
21F10000
heap
page read and write
A37000
heap
page read and write
2F55000
heap
page read and write
408000
unkown
page readonly
2DAE000
stack
page read and write
2FC3000
heap
page read and write
B15000
heap
page read and write
2909000
heap
page read and write
25E4000
heap
page read and write
2F58000
heap
page read and write
B60000
trusted library allocation
page read and write
2A44000
heap
page read and write
29BD000
heap
page read and write
2F86000
heap
page read and write
63B6000
heap
page read and write
29C9000
heap
page read and write
2F87000
heap
page read and write
2F55000
heap
page read and write
6F2000
heap
page read and write
2F88000
heap
page read and write
7390000
trusted library allocation
page read and write
2A44000
heap
page read and write
2F61000
heap
page read and write
29C8000
heap
page read and write
2A44000
heap
page read and write
4F3F000
stack
page read and write
3070000
heap
page read and write
2F57000
heap
page read and write
7E0000
heap
page read and write
707000
heap
page read and write
4B10000
heap
page read and write
290D000
heap
page read and write
23BF000
stack
page read and write
21830000
heap
page read and write
6570000
direct allocation
page read and write
532B000
heap
page read and write
80B0000
trusted library allocation
page read and write
51F6000
heap
page read and write
2F57000
heap
page read and write
3250000
heap
page read and write
21D70000
direct allocation
page read and write
7140000
heap
page execute and read and write
21F11000
heap
page read and write
29BE000
heap
page read and write
74ED000
stack
page read and write
703000
heap
page read and write
A7A000
heap
page read and write
2F61000
heap
page read and write
65B0000
direct allocation
page read and write
63D8000
heap
page read and write
7560000
trusted library allocation
page read and write
4C01000
heap
page read and write
2F61000
heap
page read and write
62F8000
heap
page read and write
292A000
heap
page read and write
21F88000
heap
page read and write
A6E000
heap
page read and write
71EA000
heap
page read and write
21E16000
heap
page read and write
293F000
heap
page read and write
4B9E000
stack
page read and write
861D000
stack
page read and write
2F4C000
heap
page read and write
7550000
trusted library allocation
page read and write
8BF000
stack
page read and write
63B0000
heap
page read and write
2F4C000
heap
page read and write
40A000
unkown
page read and write
6C60000
direct allocation
page read and write
6C40000
direct allocation
page read and write
2F40000
heap
page read and write
401000
unkown
page execute read
21F4C000
heap
page read and write
4B6E000
stack
page read and write
29F3000
heap
page read and write
4C01000
heap
page read and write
6D80000
heap
page execute and read and write
2D7D000
heap
page read and write
79E000
stack
page read and write
45C0000
heap
page readonly
29AC000
heap
page read and write
22177000
heap
page read and write
7FD0000
trusted library allocation
page read and write
2F84000
heap
page read and write
299F000
heap
page read and write
2906000
heap
page read and write
302A000
heap
page read and write
803E000
stack
page read and write
510000
heap
page read and write
63E2000
heap
page read and write
25B4000
heap
page read and write
302C000
heap
page read and write
2F50000
heap
page read and write
4C01000
heap
page read and write
2F87000
heap
page read and write
7182000
heap
page read and write
D00000
trusted library allocation
page read and write
25FF000
stack
page read and write
2F41000
heap
page read and write
2FC3000
heap
page read and write
2F56000
heap
page read and write
515000
heap
page read and write
46EE000
stack
page read and write
302E000
heap
page read and write
25E4000
heap
page read and write
4C01000
heap
page read and write
2977000
heap
page read and write
2400000
heap
page read and write
2F53000
heap
page read and write
294A000
heap
page read and write
6C50000
direct allocation
page read and write
296C000
heap
page read and write
2CAE000
stack
page read and write
2A44000
heap
page read and write
2F6C000
heap
page read and write
3A60000
remote allocation
page execute and read and write
703000
heap
page read and write
2994000
heap
page read and write
401000
unkown
page execute read
70B000
heap
page read and write
2F41000
heap
page read and write
69C000
stack
page read and write
290C000
heap
page read and write
6C00000
direct allocation
page read and write
709E000
stack
page read and write
400000
system
page execute and read and write
5010000
trusted library allocation
page read and write
22172000
heap
page read and write
4BAF000
stack
page read and write
2F4F000
heap
page read and write
21C8C000
stack
page read and write
80F0000
trusted library allocation
page read and write
4C01000
heap
page read and write
CD4000
trusted library allocation
page read and write
2F5A000
heap
page read and write
2937000
heap
page read and write
707000
heap
page read and write
2A44000
heap
page read and write
CD3000
trusted library allocation
page execute and read and write
2F41000
heap
page read and write
2F4C000
heap
page read and write
2952000
heap
page read and write
22007000
heap
page read and write
2FC3000
heap
page read and write
21F2F000
heap
page read and write
7204000
heap
page read and write
724C000
heap
page read and write
2940000
heap
page read and write
2F41000
heap
page read and write
D02000
trusted library allocation
page read and write
2F69000
heap
page read and write
70B000
heap
page read and write
6F7000
heap
page read and write
2902000
heap
page read and write
2954000
heap
page read and write
70B000
heap
page read and write
29C7000
heap
page read and write
4C01000
heap
page read and write
25BE000
stack
page read and write
2A45000
heap
page read and write
82DC000
stack
page read and write
27DB000
stack
page read and write
21A8F000
stack
page read and write
2914000
heap
page read and write
2A44000
heap
page read and write
4C01000
heap
page read and write
6D7000
stack
page read and write
25E4000
heap
page read and write
83FD000
heap
page read and write
21F40000
heap
page read and write
B10000
heap
page read and write
2F9B000
heap
page read and write
29C6000
heap
page read and write
70B000
heap
page read and write
2F57000
heap
page read and write
7150000
heap
page read and write
63D7000
heap
page read and write
2F41000
heap
page read and write
29E9000
heap
page read and write
25E4000
heap
page read and write
21F88000
heap
page read and write
25A0000
heap
page readonly
2A44000
heap
page read and write
21CCE000
stack
page read and write
21F64000
heap
page read and write
73A4000
trusted library allocation
page read and write
21F11000
heap
page read and write
22020000
heap
page read and write
6F7000
heap
page read and write
7540000
trusted library allocation
page read and write
2DEE000
stack
page read and write
5010000
trusted library allocation
page read and write
5205000
heap
page read and write
70B000
heap
page read and write
707000
heap
page read and write
29C1000
heap
page read and write
63E3000
heap
page read and write
4D00000
trusted library allocation
page read and write
6CC0000
direct allocation
page read and write
3B7E000
remote allocation
page execute and read and write
24EC000
stack
page read and write
733000
heap
page read and write
29C9000
heap
page read and write
291E000
heap
page read and write
2F99000
heap
page read and write
5D5B000
trusted library allocation
page read and write
292E000
heap
page read and write
24FF000
stack
page read and write
4717000
heap
page read and write
2F59000
heap
page read and write
809D000
trusted library allocation
page read and write
83CC000
heap
page read and write
5445000
heap
page read and write
2F86000
heap
page read and write
2F5E000
heap
page read and write
459000
system
page execute and read and write
703000
heap
page read and write
25E0000
heap
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
5010000
trusted library allocation
page read and write
45D8000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
8D80000
direct allocation
page execute and read and write
29EC000
heap
page read and write
221EC000
heap
page read and write
703000
heap
page read and write
707000
heap
page read and write
6F7000
heap
page read and write
70B000
heap
page read and write
2A44000
heap
page read and write
2F4C000
heap
page read and write
25E4000
heap
page read and write
4BFE000
heap
page read and write
6CD0000
direct allocation
page read and write
294D000
heap
page read and write
2F4C000
heap
page read and write
6F0000
heap
page read and write
63B6000
heap
page read and write
2961000
heap
page read and write
302B000
heap
page read and write
707000
heap
page read and write
761B000
stack
page read and write
9BF000
stack
page read and write
3029000
heap
page read and write
63D3000
heap
page read and write
2F61000
heap
page read and write
A10000
heap
page read and write
45D000
system
page execute and read and write
6C90000
direct allocation
page read and write
2F41000
heap
page read and write
6600000
heap
page read and write
8630000
trusted library allocation
page read and write
2F40000
heap
page read and write
707000
heap
page read and write
2984000
heap
page read and write
2F59000
heap
page read and write
2918000
heap
page read and write
2A44000
heap
page read and write
2944000
heap
page read and write
2F63000
heap
page read and write
2F84000
heap
page read and write
B70000
heap
page read and write
3029000
heap
page read and write
2900000
heap
page read and write
2901000
heap
page read and write
2570000
heap
page read and write
2590000
heap
page read and write
2959000
heap
page read and write
21EA0000
unclassified section
page execute and read and write
6F7000
heap
page read and write
There are 825 hidden memdumps, click here to show them.