IOC Report
LisectAVT_2403002A_348.exe

loading gif

Files

File Path
Type
Category
Malicious
LisectAVT_2403002A_348.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\LisectAVT_2403002A_348.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exe.bat
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exe.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Jul 25 00:17:17 2024, mtime=Thu Jul 25 00:17:17 2024, atime=Thu Jul 25 00:17:07 2024, length=18539223, window=showminimized
dropped
malicious
C:\Users\user\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Profile
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\taskhost.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LisectAVT_2403002A_348.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_348.exe"
malicious
C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exe
"C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exe"
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\user~1\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exe.lnk" /f
malicious
C:\Users\user\AppData\Local\Temp\taskhost.exe
"C:\Users\user~1\AppData\Local\Temp\taskhost.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\taskhost.exe" "taskhost.exe" ENABLE
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c copy "C:/Users/user/Desktop/LisectAVT_2403002A_348.exe" "%temp%\Profile Remcos\Update_Lock_Remcos.exe" /Y
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%temp%\Profile Remcos\Update_Lock_Remcos.exe.lnk" /f
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %temp%\Profile Remcos\Update_Lock_Remcos.exe:Zone.Identifier
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.geoplugin.net
unknown
https://Breaking-Security.netpf
unknown
https://breaking-security.net
unknown
http://www.geoplugin.net/json.gp?ip=
unknown
https://breaking-security.net/keylogger
unknown
https://breaking-security.netopenU
unknown
https://breaking-security.net/remcos/changelogopenCongratulations
unknown
https://breaking-security.net/remcos/manualopenU
unknown
https://breaking-security.net/remcosopenU
unknown
https://breaking-security.net/shop/remcos/
unknown
https://breaking-security.net/remcos
unknown
https://breaking-security.net/octopus
unknown
http://breakingsec02.co.nf/Remcos/logaccess.php?DATA=
unknown
https://breaking-security.net/viotto-binder
unknown
https://breaking-security.net/keyloggeropenU
unknown
https://breaking-security.net/meteorite-downloader
unknown
https://breaking-security.net/remcos/changelog
unknown
https://breaking-security.net/forum
unknown
http://breaking-security.net/terms
unknown
https://breaking-security.net/source-codes/delphisources
unknown
https://breaking-security.net/poseidon
unknown
https://breaking-security.net/viotto-binderopenU
unknown
http://breaking-security.net/termsopenU
unknown
https://breaking-security.net/shop/remcos/open
unknown
https://breaking-security.net/source-codes/delphisourcesopenU
unknown
https://breaking-security.net/clientarea/support
unknown
http://breakingsec02.co.nf/Remcos/upd_free.txtU
unknown
https://breaking-security.net/contactopenU
unknown
https://breaking-security.net/poseidonopenU
unknown
https://breaking-security.net/meteorite-downloaderopenU
unknown
http://www.geoplugin.netU
unknown
https://breaking-security.net/contact
unknown
https://breaking-security.net/remcos/manual
unknown
https://Breaking-Security.net
unknown
https://breaking-security.net/octopusopenU
unknown
https://breaking-security.net/terms
unknown
https://breaking-security.net/termsopenU
unknown
https://breaking-security.net/forumopenU
unknown
https://breaking-security.net/clientarea/supportopenU
unknown
There are 29 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
dllsys.duckdns.org
84.220.8.178
malicious

IPs

IP
Domain
Country
Malicious
84.220.8.178
dllsys.duckdns.org
Italy
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
Load
malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\3b570ffeeb3d34249b9a5ce0ee58a328
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
3CE4000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2ED1000
trusted library allocation
page read and write
malicious
ECD000
heap
page read and write
E70000
heap
page read and write
5A60000
heap
page read and write
E91000
heap
page read and write
29B8000
heap
page read and write
6250000
heap
page read and write
2A1E000
heap
page read and write
5426000
heap
page read and write
3B2E000
heap
page read and write
2F3E000
stack
page read and write
1012000
unkown
page readonly
2AF0000
heap
page read and write
2B24000
heap
page read and write
2B24000
heap
page read and write
E2B000
heap
page read and write
29F1000
heap
page read and write
1E90000
trusted library allocation
page read and write
5420000
heap
page read and write
E56000
heap
page read and write
540C000
stack
page read and write
6ACE000
stack
page read and write
3B20000
heap
page read and write
298E000
unkown
page readonly
2A31000
heap
page read and write
E93000
heap
page read and write
1270000
heap
page read and write
12A7000
heap
page read and write
10CE000
stack
page read and write
DF0000
heap
page read and write
2B24000
heap
page read and write
2D30000
heap
page read and write
2B24000
heap
page read and write
2DAD000
trusted library allocation
page read and write
2FFE000
unkown
page read and write
2A0F000
heap
page read and write
2D84000
trusted library allocation
page read and write
2D46000
heap
page read and write
48B3000
direct allocation
page read and write
2D0C000
stack
page read and write
2B24000
heap
page read and write
E2C000
heap
page read and write
E71000
heap
page read and write
2DC0000
heap
page read and write
2B24000
heap
page read and write
5680000
trusted library allocation
page execute and read and write
E69000
heap
page read and write
485B000
direct allocation
page read and write
2B24000
heap
page read and write
E74000
heap
page read and write
2E3D000
stack
page read and write
E17000
heap
page read and write
2D86000
trusted library allocation
page read and write
2F0E000
stack
page read and write
E93000
heap
page read and write
610000
unkown
page readonly
340F000
stack
page read and write
2B24000
heap
page read and write
E73000
heap
page read and write
2D8E000
trusted library allocation
page read and write
1EA6000
trusted library allocation
page execute and read and write
4B70000
heap
page read and write
2B20000
heap
page read and write
E84000
heap
page read and write
E28000
heap
page read and write
2B24000
heap
page read and write
1E80000
trusted library allocation
page read and write
12A9000
heap
page read and write
37CF000
stack
page read and write
BE0000
heap
page read and write
2BF0000
heap
page read and write
E64000
heap
page read and write
2B24000
heap
page read and write
17B8000
unkown
page readonly
2B24000
heap
page read and write
452E000
stack
page read and write
3B25000
heap
page read and write
2EFD000
stack
page read and write
3ED1000
trusted library allocation
page read and write
37D0000
heap
page read and write
E69000
heap
page read and write
E75000
heap
page read and write
DDB000
heap
page read and write
4631000
heap
page read and write
E83000
heap
page read and write
401000
unkown
page execute read
2EFD000
stack
page read and write
2B24000
heap
page read and write
47AA000
direct allocation
page read and write
E73000
heap
page read and write
2DA1000
trusted library allocation
page read and write
3118000
heap
page read and write
6D47000
direct allocation
page read and write
761000
unkown
page readonly
4BA0000
heap
page read and write
3C60000
trusted library allocation
page read and write
4BA3000
heap
page read and write
18D000
stack
page read and write
4790000
direct allocation
page read and write
8E0E000
stack
page read and write
1EE0000
trusted library allocation
page execute and read and write
479A000
direct allocation
page read and write
40A000
remote allocation
page execute and read and write
E84000
heap
page read and write
2DA6000
trusted library allocation
page read and write
33E0000
heap
page read and write
EBE000
heap
page read and write
489D000
direct allocation
page read and write
6D88000
direct allocation
page read and write
5411000
heap
page read and write
47D9000
direct allocation
page read and write
7820000
trusted library allocation
page read and write
1F95000
heap
page read and write
E28000
heap
page read and write
B6E000
stack
page read and write
3ADC000
stack
page read and write
48C1000
direct allocation
page read and write
2B24000
heap
page read and write
14B7000
trusted library allocation
page execute and read and write
8A90000
heap
page read and write
E72000
heap
page read and write
541F000
heap
page read and write
18F000
stack
page read and write
E2B000
heap
page read and write
2D50000
trusted library allocation
page read and write
E8A000
heap
page read and write
2F40000
heap
page read and write
2D40000
heap
page read and write
2A13000
heap
page read and write
E9F1000
trusted library allocation
page read and write
14A6000
trusted library allocation
page execute and read and write
298E000
unkown
page readonly
3CC1000
trusted library allocation
page read and write
132D000
heap
page read and write
309E000
stack
page read and write
29E5000
heap
page read and write
E60000
heap
page read and write
2B24000
heap
page read and write
2ECE000
stack
page read and write
34F0000
direct allocation
page read and write
4ED8000
trusted library allocation
page read and write
2C80000
trusted library allocation
page read and write
6D7A000
direct allocation
page read and write
1CDD000
stack
page read and write
5479000
stack
page read and write
2F3A000
trusted library allocation
page read and write
5430000
heap
page read and write
5412000
heap
page read and write
2B24000
heap
page read and write
9430000
trusted library allocation
page read and write
2B24000
heap
page read and write
1F18000
heap
page read and write
149D000
trusted library allocation
page execute and read and write
5A90000
heap
page read and write
4631000
heap
page read and write
E73000
heap
page read and write
E5F000
heap
page read and write
2A13000
heap
page read and write
29DD000
heap
page read and write
E70000
heap
page read and write
155E000
stack
page read and write
1484000
trusted library allocation
page read and write
5433000
heap
page read and write
29F0000
heap
page read and write
E7F000
heap
page read and write
A7B000
stack
page read and write
E88000
heap
page read and write
3CB0000
heap
page execute and read and write
4844000
direct allocation
page read and write
8BF6000
heap
page read and write
32BE000
unkown
page read and write
E67000
heap
page read and write
2B3D000
stack
page read and write
1BB0000
heap
page read and write
2F80000
heap
page read and write
2B24000
heap
page read and write
218E000
stack
page read and write
1480000
trusted library allocation
page read and write
14D0000
heap
page read and write
2B24000
heap
page read and write
54C0000
trusted library allocation
page read and write
2CFF000
stack
page read and write
2D40000
heap
page execute and read and write
4770000
trusted library allocation
page read and write
EC6000
heap
page read and write
2A07000
heap
page read and write
3AE0000
trusted library allocation
page execute and read and write
9FF1000
trusted library allocation
page read and write
181E000
unkown
page execute read
97000
stack
page read and write
165F000
stack
page read and write
2B24000
heap
page read and write
2EC0000
heap
page read and write
D36000
heap
page read and write
E3D000
heap
page read and write
1FA9000
heap
page read and write
2B24000
heap
page read and write
E2B000
heap
page read and write
E7C000
heap
page read and write
482C000
direct allocation
page read and write
584F000
stack
page read and write
6100000
heap
page read and write
2A07000
heap
page read and write
2B24000
heap
page read and write
35D0000
heap
page read and write
E83000
heap
page read and write
4BBB000
heap
page read and write
1EA0000
trusted library allocation
page read and write
2A09000
heap
page read and write
2F4D000
stack
page read and write
1EB7000
trusted library allocation
page execute and read and write
E2A000
heap
page read and write
1B57000
stack
page read and write
908E000
stack
page read and write
2D9E000
trusted library allocation
page read and write
E76000
heap
page read and write
54C7000
trusted library allocation
page read and write
11EE000
stack
page read and write
2A31000
heap
page read and write
2B24000
heap
page read and write
2F80000
heap
page read and write
2B24000
heap
page read and write
E7B000
heap
page read and write
10E0000
heap
page read and write
14B0000
trusted library allocation
page read and write
10D0000
heap
page read and write
30DF000
stack
page read and write
E3D000
heap
page read and write
2B24000
heap
page read and write
56C1000
trusted library allocation
page read and write
2A09000
heap
page read and write
FCE000
unkown
page read and write
E3D000
heap
page read and write
53D1000
heap
page read and write
FB0000
heap
page read and write
1F44000
heap
page read and write
1D35000
heap
page read and write
6EDF1000
unkown
page execute read
2FF0000
heap
page read and write
1364000
heap
page read and write
53B0000
trusted library allocation
page read and write
4862000
direct allocation
page read and write
E94000
heap
page read and write
1F3B000
heap
page read and write
2B24000
heap
page read and write
6090000
heap
page execute and read and write
2A0C000
heap
page read and write
2F4E000
stack
page read and write
B7E000
stack
page read and write
2B24000
heap
page read and write
2B24000
heap
page read and write
5416000
heap
page read and write
2B24000
heap
page read and write
54BC000
stack
page read and write
6D71000
direct allocation
page read and write
1E84000
trusted library allocation
page read and write
3C2E000
stack
page read and write
2F30000
heap
page read and write
2B24000
heap
page read and write
E6C000
heap
page read and write
2B24000
heap
page read and write
E75000
heap
page read and write
DD0000
heap
page read and write
2F90000
heap
page read and write
38D1000
heap
page read and write
2B24000
heap
page read and write
2B24000
heap
page read and write
92CE000
stack
page read and write
2B24000
heap
page read and write
E17000
heap
page read and write
2B24000
heap
page read and write
2B24000
heap
page read and write
4CDE000
stack
page read and write
48AC000
direct allocation
page read and write
1E40000
heap
page read and write
6EE0D000
unkown
page read and write
1F91000
heap
page read and write
2FB0000
heap
page read and write
2B24000
heap
page read and write
2B24000
heap
page read and write
1E70000
trusted library allocation
page read and write
1EB0000
trusted library allocation
page read and write
744000
unkown
page read and write
1F1E000
heap
page read and write
2B24000
heap
page read and write
109F1000
trusted library allocation
page read and write
8BE6000
heap
page read and write
2B24000
heap
page read and write
48BA000
direct allocation
page read and write
2A11000
heap
page read and write
E6A000
heap
page read and write
E2B000
heap
page read and write
55B9000
stack
page read and write
2B24000
heap
page read and write
E66000
heap
page read and write
2D60000
trusted library allocation
page read and write
E88000
heap
page read and write
940C000
stack
page read and write
33C0000
heap
page read and write
47D2000
direct allocation
page read and write
91CE000
stack
page read and write
1E3E000
stack
page read and write
29C2000
heap
page read and write
6EDF0000
unkown
page readonly
1483000
trusted library allocation
page execute and read and write
1C90000
heap
page read and write
4631000
heap
page read and write
E9A000
heap
page read and write
4B6E000
stack
page read and write
53CF000
stack
page read and write
E08000
heap
page read and write
1470000
trusted library allocation
page read and write
E56000
heap
page read and write
221E000
unkown
page execute read
2B24000
heap
page read and write
214E000
stack
page read and write
E96000
heap
page read and write
1EF0000
trusted library allocation
page read and write
2E7D000
stack
page read and write
8271000
trusted library allocation
page read and write
3134000
heap
page read and write
16D0000
heap
page read and write
2D10000
heap
page read and write
E5B000
heap
page read and write
E88000
heap
page read and write
ECD000
heap
page read and write
8DCE000
stack
page read and write
6110000
heap
page read and write
918E000
stack
page read and write
E7C000
heap
page read and write
2D30000
trusted library allocation
page execute and read and write
48A4000
direct allocation
page read and write
2A13000
heap
page read and write
6810000
trusted library allocation
page read and write
2FFC000
heap
page read and write
4765000
heap
page read and write
2B24000
heap
page read and write
E5E000
heap
page read and write
B73000
stack
page read and write
294A000
unkown
page readonly
E5E000
heap
page read and write
29EE000
heap
page read and write
4630000
heap
page read and write
4878000
direct allocation
page read and write
E5E000
heap
page read and write
12E1000
heap
page read and write
612000
unkown
page readonly
698E000
stack
page read and write
29DD000
heap
page read and write
2B24000
heap
page read and write
5425000
heap
page read and write
34C0000
heap
page read and write
6EE0F000
unkown
page readonly
75A000
unkown
page read and write
1A5B000
stack
page read and write
2B24000
heap
page read and write
480E000
direct allocation
page read and write
2BCD000
stack
page read and write
1493000
trusted library allocation
page read and write
6D81000
direct allocation
page read and write
355E000
stack
page read and write
2B24000
heap
page read and write
5424000
heap
page read and write
30CE000
stack
page read and write
2B24000
heap
page read and write
2B24000
heap
page read and write
E7C000
heap
page read and write
35DC000
heap
page read and write
397F000
heap
page read and write
47C9000
direct allocation
page read and write
2B24000
heap
page read and write
53B9000
trusted library allocation
page read and write
E8F000
heap
page read and write
118D000
unkown
page execute read
2B24000
heap
page read and write
B82000
unkown
page readonly
4AF0000
heap
page read and write
47F9000
direct allocation
page read and write
EBB000
heap
page read and write
21F0000
heap
page read and write
E93000
heap
page read and write
1277000
heap
page read and write
10E5000
heap
page read and write
330F000
unkown
page read and write
E94000
heap
page read and write
2B24000
heap
page read and write
E7E000
heap
page read and write
1FF7000
heap
page read and write
E5B000
heap
page read and write
2B24000
heap
page read and write
2B24000
heap
page read and write
E9A000
heap
page read and write
95F1000
trusted library allocation
page read and write
2AEE000
stack
page read and write
33D0000
heap
page read and write
2B24000
heap
page read and write
258D000
unkown
page execute read
D7E000
stack
page read and write
75F000
unkown
page readonly
294A000
unkown
page readonly
4770000
trusted library allocation
page read and write
2A0F000
heap
page read and write
2B24000
heap
page read and write
E63000
heap
page read and write
D10000
heap
page read and write
E7F000
heap
page read and write
78D000
unkown
page execute read
E7E000
heap
page read and write
E1E000
heap
page read and write
2A19000
heap
page read and write
5A70000
trusted library allocation
page read and write
B80000
unkown
page readonly
2A07000
heap
page read and write
E04000
heap
page read and write
2B24000
heap
page read and write
2B24000
heap
page read and write
484C000
direct allocation
page read and write
694F000
stack
page read and write
2F43000
trusted library allocation
page read and write
2A31000
heap
page read and write
E2B000
heap
page read and write
1475000
trusted library allocation
page read and write
3936000
heap
page read and write
2B24000
heap
page read and write
898F000
stack
page read and write
2A18000
heap
page read and write
56A0000
heap
page execute and read and write
5420000
heap
page read and write
E66000
heap
page read and write
2A0C000
heap
page read and write
3110000
heap
page read and write
2B24000
heap
page read and write
C271000
trusted library allocation
page read and write
8BA2000
heap
page read and write
2B24000
heap
page read and write
2B24000
heap
page read and write
34EF000
unkown
page read and write
E99000
heap
page read and write
11F0000
heap
page read and write
5C26000
trusted library allocation
page read and write
E96000
heap
page read and write
E91000
heap
page read and write
3A9E000
stack
page read and write
48C8000
direct allocation
page read and write
4D80000
heap
page read and write
2A09000
heap
page read and write
5424000
heap
page read and write
E2A000
heap
page read and write
E2A000
heap
page read and write
E60000
heap
page read and write
EC6000
heap
page read and write
6C85000
direct allocation
page read and write
400000
unkown
page readonly
4834000
direct allocation
page read and write
2B24000
heap
page read and write
F57000
stack
page read and write
2B24000
heap
page read and write
6BCF000
stack
page read and write
E8F000
heap
page read and write
D870000
trusted library section
page read and write
EBB000
heap
page read and write
3975000
heap
page read and write
2B24000
heap
page read and write
E7E000
heap
page read and write
3510000
heap
page read and write
12E8000
heap
page read and write
E72000
heap
page read and write
2B24000
heap
page read and write
EBC000
heap
page read and write
E2A000
heap
page read and write
FFDF0000
direct allocation
page read and write
E5B000
heap
page read and write
14E0000
heap
page read and write
E9A000
heap
page read and write
14BB000
trusted library allocation
page execute and read and write
8BB0000
heap
page read and write
D00000
heap
page read and write
400000
remote allocation
page execute and read and write
EBB000
heap
page read and write
29A0000
heap
page read and write
6EE06000
unkown
page readonly
E28000
heap
page read and write
2B24000
heap
page read and write
930B000
stack
page read and write
E17000
heap
page read and write
E8A000
heap
page read and write
2B24000
heap
page read and write
E88000
heap
page read and write
148D000
trusted library allocation
page execute and read and write
1E8D000
trusted library allocation
page execute and read and write
2A0C000
heap
page read and write
5420000
heap
page read and write
E558000
trusted library section
page read and write
E76000
heap
page read and write
EBC000
heap
page read and write
55FE000
stack
page read and write
8F0E000
stack
page read and write
E69000
heap
page read and write
2A0F000
heap
page read and write
E77000
heap
page read and write
53F0000
heap
page read and write
5413000
heap
page read and write
29F2000
heap
page read and write
47E0000
direct allocation
page read and write
4760000
heap
page read and write
EBB000
heap
page read and write
53D0000
heap
page read and write
2B24000
heap
page read and write
E21000
heap
page read and write
134E000
heap
page read and write
1F00000
trusted library allocation
page read and write
2BEE000
unkown
page read and write
21F7000
heap
page read and write
1E83000
trusted library allocation
page execute and read and write
E26000
heap
page read and write
E8F000
heap
page read and write
1EBB000
trusted library allocation
page execute and read and write
680F000
stack
page read and write
2B24000
heap
page read and write
5426000
heap
page read and write
1EAA000
trusted library allocation
page execute and read and write
ECD000
heap
page read and write
3133000
heap
page read and write
3188000
heap
page read and write
210F000
stack
page read and write
E56000
heap
page read and write
5410000
trusted library allocation
page read and write
E0E000
heap
page read and write
32FB000
stack
page read and write
2B24000
heap
page read and write
2F7E000
unkown
page read and write
E18000
heap
page read and write
21DE000
stack
page read and write
B7B000
stack
page read and write
1774000
unkown
page readonly
EBB000
heap
page read and write
EC57000
trusted library allocation
page read and write
2B24000
heap
page read and write
6261000
trusted library allocation
page read and write
6CC5000
direct allocation
page read and write
2B24000
heap
page read and write
EBB000
heap
page read and write
E95000
heap
page read and write
2B24000
heap
page read and write
E75000
heap
page read and write
E83000
heap
page read and write
14B2000
trusted library allocation
page read and write
2B24000
heap
page read and write
47BA000
direct allocation
page read and write
1D1E000
stack
page read and write
1ED0000
trusted library allocation
page read and write
ECD000
heap
page read and write
9470000
trusted library allocation
page execute and read and write
E61000
heap
page read and write
FFC40000
trusted library allocation
page execute and read and write
2B24000
heap
page read and write
E5A000
stack
page read and write
2F50000
heap
page read and write
29EB000
heap
page read and write
2B24000
heap
page read and write
3AF0000
trusted library allocation
page read and write
33BF000
stack
page read and write
8990000
heap
page read and write
29CD000
heap
page read and write
E94000
heap
page read and write
29E5000
heap
page read and write
8B90000
heap
page read and write
53C0000
trusted library allocation
page read and write
2D9A000
trusted library allocation
page read and write
EBB000
heap
page read and write
2CCE000
stack
page read and write
D80000
heap
page read and write
2B24000
heap
page read and write
E8B000
heap
page read and write
E6B000
heap
page read and write
B871000
trusted library allocation
page read and write
14AA000
trusted library allocation
page execute and read and write
1B8D000
unkown
page execute read
5B00000
trusted library allocation
page execute and read and write
462F000
stack
page read and write
E65000
heap
page read and write
2B24000
heap
page read and write
34D0000
heap
page read and write
33E0000
heap
page read and write
5C62000
trusted library allocation
page read and write
E77000
heap
page read and write
E2A000
heap
page read and write
CFD000
unkown
page read and write
2FB0000
heap
page read and write
2B24000
heap
page read and write
2D92000
trusted library allocation
page read and write
2B24000
heap
page read and write
787000
unkown
page read and write
4B00000
direct allocation
page execute and read and write
3180000
heap
page read and write
4888000
direct allocation
page read and write
2D80000
trusted library allocation
page read and write
1490000
trusted library allocation
page read and write
EBE000
heap
page read and write
1F52000
heap
page read and write
2B24000
heap
page read and write
E17000
heap
page read and write
506E000
stack
page read and write
2B24000
heap
page read and write
14A0000
trusted library allocation
page read and write
D05000
heap
page read and write
10CF000
stack
page read and write
E3F000
heap
page read and write
E93000
heap
page read and write
684E000
stack
page read and write
8CCD000
stack
page read and write
2B24000
heap
page read and write
904E000
stack
page read and write
E6A000
heap
page read and write
400000
unkown
page readonly
6A8F000
stack
page read and write
94BD000
stack
page read and write
E6D000
heap
page read and write
8B9C000
heap
page read and write
95EF000
stack
page read and write
6C61000
trusted library allocation
page read and write
2A11000
heap
page read and write
762000
unkown
page execute read
2A11000
heap
page read and write
E7B000
heap
page read and write
2B24000
heap
page read and write
4800000
direct allocation
page read and write
D30000
heap
page read and write
47CB000
direct allocation
page read and write
734000
unkown
page read and write
E7E000
heap
page read and write
2B24000
heap
page read and write
383F000
heap
page read and write
E270000
trusted library section
page read and write
E64000
heap
page read and write
1F10000
heap
page read and write
5AE0000
heap
page read and write
2D4B000
heap
page read and write
5414000
heap
page read and write
2B24000
heap
page read and write
E10000
heap
page read and write
2D70000
trusted library allocation
page read and write
2B24000
heap
page read and write
E79000
heap
page read and write
E70000
heap
page read and write
2D8B000
trusted library allocation
page read and write
8F4E000
stack
page read and write
F657000
trusted library allocation
page read and write
E93000
heap
page read and write
1EB2000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
EBB000
heap
page read and write
8B99000
heap
page read and write
E70000
heap
page read and write
E5E000
heap
page read and write
E5E000
heap
page read and write
E94000
heap
page read and write
E91000
heap
page read and write
2B24000
heap
page read and write
4CC1000
trusted library allocation
page read and write
E3D000
heap
page read and write
19B000
stack
page read and write
1D30000
heap
page read and write
E3D000
heap
page read and write
29B0000
heap
page read and write
4E90000
heap
page read and write
E2A000
heap
page read and write
6CD6000
direct allocation
page read and write
E1B000
heap
page read and write
EBB000
heap
page read and write
2B24000
heap
page read and write
2BA0000
heap
page read and write
47E7000
direct allocation
page read and write
2B24000
heap
page read and write
21E0000
heap
page read and write
There are 667 hidden memdumps, click here to show them.