IOC Report
Inventory_list.img.exe

loading gif

Files

File Path
Type
Category
Malicious
Inventory_list.img.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\nsaD080.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\nslC408.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\nslC409.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nstCA93.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsuCDA1.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsxC7F2.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\rhinocerian\Innovating.lis
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\rhinocerian\Kroketkuglerne157.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\rhinocerian\Majoriteten.Rev
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\rhinocerian\Skifferoliens.Gho
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\rhinocerian\disburdens.cir
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\rhinocerian\kilns.hjk
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\rhinocerian\peise.mil
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\rhinocerian\tudehornets.unc
data
dropped
C:\Windows\SysWOW64\kaleb.ini
ASCII text, with CRLF line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Inventory_list.img.exe
"C:\Users\user\Desktop\Inventory_list.img.exe"
malicious
C:\Users\user\Desktop\Inventory_list.img.exe
"C:\Users\user\Desktop\Inventory_list.img.exe"
malicious

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.13.205
https://api.ipify.org
unknown
http://studentzindagi.za.com/bxbPiwfERAZWdsgPWBtUv3.binSv2
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://api.ipify.org/t
unknown
http://studentzindagi.za.com/bxbPiwfERAZWdsgPWBtUv3.bin
91.185.215.13
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://studentzindagi.za.com/bxbPiwfERAZWdsgPWBtUv3.bin.v_
unknown

Domains

Name
IP
Malicious
studentzindagi.za.com
91.185.215.13
api.ipify.org
104.26.13.205

IPs

IP
Domain
Country
Malicious
91.185.215.13
studentzindagi.za.com
Slovenia
104.26.13.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\kursusmoduls\Uninstall\forureningsbegrnsning
reacquisitions
HKEY_CURRENT_USER\vagotropism\Uninstall\formgive
unrefracting
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Inventory_list_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Inventory_list_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Inventory_list_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Inventory_list_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Inventory_list_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Inventory_list_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Inventory_list_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Inventory_list_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Inventory_list_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Inventory_list_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Inventory_list_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Inventory_list_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Inventory_list_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Inventory_list_RASMANCS
FileDirectory
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5147000
direct allocation
page execute and read and write
malicious
36060000
trusted library allocation
page execute and read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38300000
trusted library allocation
page read and write
7740000
direct allocation
page read and write
5CAF000
stack
page read and write
27BF000
stack
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
3846D000
stack
page read and write
1D4000
heap
page read and write
4650000
direct allocation
page execute and read and write
35B2E000
stack
page read and write
1D4000
heap
page read and write
384C6000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
7710000
direct allocation
page read and write
32EC000
stack
page read and write
1D4000
heap
page read and write
4D0000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D5000
heap
page read and write
36060000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38300000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38840000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
384D0000
trusted library allocation
page read and write
36060000
trusted library allocation
page read and write
384D0000
trusted library allocation
page read and write
38300000
trusted library allocation
page read and write
1D4000
heap
page read and write
38300000
trusted library allocation
page read and write
3625C000
stack
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
36060000
trusted library allocation
page read and write
1D4000
heap
page read and write
7770000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38300000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
36088000
trusted library allocation
page read and write
1D4000
heap
page read and write
38300000
trusted library allocation
page read and write
190000
remote allocation
page read and write
1D5000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
3605F000
stack
page read and write
38300000
trusted library allocation
page read and write
1D4000
heap
page read and write
38300000
trusted library allocation
page read and write
1D4000
heap
page read and write
35F50000
heap
page read and write
1D4000
heap
page read and write
401000
unkown
page execute read
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
372A9000
trusted library allocation
page read and write
38300000
trusted library allocation
page read and write
5A75000
heap
page read and write
38320000
heap
page read and write
38300000
trusted library allocation
page read and write
36281000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D5000
heap
page read and write
38300000
trusted library allocation
page read and write
1D4000
heap
page read and write
38848000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
384B0000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38310000
trusted library allocation
page read and write
1D4000
heap
page read and write
37281000
trusted library allocation
page read and write
362D1000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D5000
heap
page read and write
1D4000
heap
page read and write
16F0000
remote allocation
page execute and read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
401000
unkown
page execute read
1D4000
heap
page read and write
38CB0000
trusted library allocation
page read and write
1D4000
heap
page read and write
9D000
trusted library allocation
page execute and read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38331000
heap
page read and write
1D4000
heap
page read and write
5A27000
heap
page read and write
4747000
direct allocation
page execute and read and write
1D4000
heap
page read and write
3606D000
trusted library allocation
page read and write
384C0000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
5DB0000
heap
page read and write
38300000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38300000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
460000
unkown
page readonly
190000
trusted library allocation
page read and write
1D5000
heap
page read and write
1D4000
heap
page read and write
2BE7000
remote allocation
page execute and read and write
C7000
trusted library allocation
page execute and read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38300000
trusted library allocation
page read and write
384C0000
trusted library allocation
page read and write
38300000
trusted library allocation
page read and write
38300000
trusted library allocation
page read and write
384C7000
trusted library allocation
page read and write
1D5000
heap
page read and write
38300000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
437000
unkown
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
416000
unkown
page read and write
90000
trusted library allocation
page read and write
38310000
trusted library allocation
page read and write
38310000
trusted library allocation
page read and write
38310000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
A0000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
384C0000
trusted library allocation
page read and write
7947000
direct allocation
page execute and read and write
400000
unkown
page readonly
38302000
trusted library allocation
page read and write
7730000
direct allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
36070000
heap
page read and write
384CF000
trusted library allocation
page read and write
38301000
trusted library allocation
page read and write
1D4000
heap
page read and write
384B0000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38310000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
2A80000
direct allocation
page read and write
1D5000
heap
page read and write
38300000
trusted library allocation
page read and write
1D4000
heap
page read and write
38300000
trusted library allocation
page read and write
38B6E000
stack
page read and write
94000
trusted library allocation
page read and write
38301000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
7777000
heap
page read and write
1D4000
heap
page read and write
1D0000
heap
page read and write
42F000
unkown
page read and write
384C0000
trusted library allocation
page read and write
1D4000
heap
page read and write
3889D000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
C2000
trusted library allocation
page read and write
550000
heap
page read and write
2A30000
direct allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D5000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
30000
heap
page read and write
6AE000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
36267000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
36270000
heap
page execute and read and write
2A50000
direct allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
400000
unkown
page readonly
1D4000
heap
page read and write
5AD8000
heap
page read and write
1D4000
heap
page read and write
29C0000
heap
page read and write
1D4000
heap
page read and write
384D0000
trusted library allocation
page read and write
1D4000
heap
page read and write
680000
heap
page read and write
10005000
unkown
page readonly
36060000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
98000
stack
page read and write
1D4000
heap
page read and write
38300000
trusted library allocation
page read and write
1D4000
heap
page read and write
408000
unkown
page readonly
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
36060000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38300000
trusted library allocation
page read and write
14C000
stack
page read and write
36063000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
3885E000
heap
page read and write
38300000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D5000
heap
page read and write
1D4000
heap
page read and write
170000
trusted library allocation
page read and write
1D4000
heap
page read and write
53E7000
remote allocation
page execute and read and write
38300000
trusted library allocation
page read and write
38310000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D5000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38C80000
trusted library allocation
page read and write
1D4000
heap
page read and write
40A000
unkown
page write copy
1D4000
heap
page read and write
49E7000
remote allocation
page execute and read and write
5ACE000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
3889D000
heap
page read and write
1D4000
heap
page read and write
19A000
stack
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38CA0000
trusted library allocation
page read and write
31F0000
heap
page read and write
1D4000
heap
page read and write
1D5000
heap
page read and write
6F47000
direct allocation
page execute and read and write
1D4000
heap
page read and write
401000
unkown
page execute read
38300000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
59E0000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
59E8000
heap
page read and write
1D4000
heap
page read and write
7720000
direct allocation
page read and write
6B5000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38300000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
384B0000
trusted library allocation
page read and write
1D4000
heap
page read and write
35F29000
stack
page read and write
1D4000
heap
page read and write
408000
unkown
page readonly
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38302000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
40A000
unkown
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
36060000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38311000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
C5000
trusted library allocation
page execute and read and write
180000
trusted library allocation
page read and write
2374000
heap
page read and write
1D5000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
36060000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
8347000
direct allocation
page execute and read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
6ED000
heap
page read and write
1D4000
heap
page read and write
76F0000
direct allocation
page read and write
1D4000
heap
page read and write
2370000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
10001000
unkown
page execute read
38300000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
21E7000
remote allocation
page execute and read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D5000
heap
page read and write
38310000
trusted library allocation
page read and write
232E000
stack
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
35C2F000
stack
page read and write
362C0000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
40A000
unkown
page write copy
1D4000
heap
page read and write
1D4000
heap
page read and write
1D5000
heap
page read and write
38300000
trusted library allocation
page read and write
1D4000
heap
page read and write
6C3000
heap
page read and write
1D4000
heap
page read and write
38300000
trusted library allocation
page read and write
5AD3000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
7FDF0000
trusted library allocation
page execute and read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38C70000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
3872C000
stack
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
30000
heap
page read and write
1D4000
heap
page read and write
2A10000
direct allocation
page read and write
38300000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
5ABB000
heap
page read and write
1D4000
heap
page read and write
3884C000
heap
page read and write
1D4000
heap
page read and write
1D5000
heap
page read and write
1D4000
heap
page read and write
36060000
trusted library allocation
page read and write
1D4000
heap
page read and write
384B0000
trusted library allocation
page read and write
1D4000
heap
page read and write
7700000
direct allocation
page read and write
1D4000
heap
page read and write
38310000
trusted library allocation
page read and write
1D4000
heap
page read and write
160000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D5000
heap
page read and write
1D4000
heap
page read and write
1D5000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
190000
remote allocation
page read and write
1D4000
heap
page read and write
2A00000
direct allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
5B47000
direct allocation
page execute and read and write
1D4000
heap
page read and write
597E000
stack
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
2A90000
direct allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
150000
trusted library allocation
page execute and read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
B0000
trusted library allocation
page read and write
AD000
trusted library allocation
page execute and read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D5000
heap
page read and write
45E000
unkown
page read and write
1D4000
heap
page read and write
2A20000
direct allocation
page read and write
36319000
trusted library allocation
page read and write
7890000
trusted library allocation
page read and write
22A5000
heap
page read and write
38300000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
460000
unkown
page readonly
36317000
trusted library allocation
page read and write
180000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38303000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D5000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
7750000
direct allocation
page read and write
1D4000
heap
page read and write
408000
unkown
page readonly
10003000
unkown
page readonly
1D4000
heap
page read and write
33EB000
stack
page read and write
1D4000
heap
page read and write
BA000
trusted library allocation
page execute and read and write
1D4000
heap
page read and write
38300000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
400000
unkown
page readonly
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
5DAE000
stack
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
2AA0000
direct allocation
page read and write
1D4000
heap
page read and write
38300000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
5A4B000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
431000
unkown
page read and write
38300000
trusted library allocation
page read and write
2A40000
direct allocation
page read and write
1D4000
heap
page read and write
38300000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38301000
trusted library allocation
page read and write
6D8000
heap
page read and write
1D4000
heap
page read and write
36060000
trusted library allocation
page read and write
38300000
trusted library allocation
page read and write
372E6000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
35E7000
remote allocation
page execute and read and write
80000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
36060000
trusted library allocation
page read and write
1D4000
heap
page read and write
384E0000
heap
page execute and read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
59BC000
stack
page read and write
1D4000
heap
page read and write
38300000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38310000
trusted library allocation
page read and write
1D4000
heap
page read and write
422000
unkown
page read and write
28BF000
stack
page read and write
460000
unkown
page readonly
1D4000
heap
page read and write
36260000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
10000000
unkown
page readonly
1D4000
heap
page read and write
2AB0000
direct allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
7760000
direct allocation
page read and write
38300000
trusted library allocation
page read and write
35DD0000
direct allocation
page read and write
384B0000
trusted library allocation
page read and write
76E0000
direct allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38310000
trusted library allocation
page read and write
42C000
unkown
page read and write
38300000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D5000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
78A0000
heap
page read and write
38310000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
716000
heap
page read and write
B2000
trusted library allocation
page read and write
384B0000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
40A000
unkown
page write copy
38331000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D5000
heap
page read and write
1D4000
heap
page read and write
38300000
trusted library allocation
page read and write
460000
unkown
page readonly
1D5000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38310000
trusted library allocation
page read and write
38846000
heap
page read and write
35E2A000
stack
page read and write
6D2000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
2A60000
direct allocation
page read and write
10E000
stack
page read and write
1D4000
heap
page read and write
6BF000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38300000
trusted library allocation
page read and write
362B7000
trusted library allocation
page read and write
1D4000
heap
page read and write
22A0000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38300000
trusted library allocation
page read and write
35DE0000
direct allocation
page read and write
5A72000
heap
page read and write
1D4000
heap
page read and write
38300000
trusted library allocation
page read and write
2A70000
direct allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
2280000
heap
page read and write
1D4000
heap
page read and write
1D5000
heap
page read and write
38300000
trusted library allocation
page read and write
1D5000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
5A4E000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38310000
trusted library allocation
page read and write
1D4000
heap
page read and write
384D0000
trusted library allocation
page read and write
38310000
trusted library allocation
page read and write
362CD000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38300000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D5000
heap
page read and write
38300000
trusted library allocation
page read and write
38C90000
trusted library allocation
page read and write
1D5000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
17E7000
remote allocation
page execute and read and write
1D4000
heap
page read and write
38300000
trusted library allocation
page read and write
190000
remote allocation
page read and write
38300000
trusted library allocation
page read and write
382C0000
heap
page read and write
38C70000
trusted library allocation
page read and write
1D4000
heap
page read and write
6B2000
heap
page read and write
1D4000
heap
page read and write
687000
heap
page read and write
3FE7000
remote allocation
page execute and read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38300000
trusted library allocation
page read and write
38330000
heap
page read and write
1D4000
heap
page read and write
7780000
direct allocation
page read and write
1D4000
heap
page read and write
384B0000
trusted library allocation
page read and write
1D4000
heap
page read and write
5ACA000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38310000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
6547000
direct allocation
page execute and read and write
408000
unkown
page readonly
384D0000
trusted library allocation
page read and write
43F000
unkown
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
180000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
B6000
trusted library allocation
page execute and read and write
93000
trusted library allocation
page execute and read and write
1D4000
heap
page read and write
38300000
trusted library allocation
page read and write
36060000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38C6F000
stack
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
5A45000
heap
page read and write
CB000
trusted library allocation
page execute and read and write
384B0000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38C80000
trusted library allocation
page read and write
36060000
trusted library allocation
page read and write
36060000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
400000
unkown
page readonly
38300000
trusted library allocation
page read and write
401000
unkown
page execute read
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D5000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
22EE000
stack
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D5000
heap
page read and write
38300000
trusted library allocation
page read and write
3621E000
stack
page read and write
1D4000
heap
page read and write
5A67000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
38300000
trusted library allocation
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
180000
trusted library allocation
page read and write
1D4000
heap
page read and write
38A2F000
stack
page read and write
38830000
heap
page read and write
3883C000
heap
page read and write
There are 860 hidden memdumps, click here to show them.