IOC Report
scan_241205-801_draft_PO.exe

loading gif

Files

File Path
Type
Category
Malicious
scan_241205-801_draft_PO.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\ProgramData\remcos\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\retsplejelovenes\Bioassayed\Komlk.sis
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\retsplejelovenes\Bioassayed\Mantid65.cel
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\retsplejelovenes\Bioassayed\Montclair.Hys130
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\retsplejelovenes\Bioassayed\Rneblikkets.Nom
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\retsplejelovenes\Bioassayed\gabby.def
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\retsplejelovenes\Bioassayed\hell.fyr
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\retsplejelovenes\Bioassayed\shylocking.gri
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\retsplejelovenes\Bioassayed\teknikumingenirs.ung
data
dropped
C:\Users\user\AppData\Local\Temp\Settings.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhvB489.tmp
Extensible storage engine DataBase, version 0x620, checksum 0xcfacc3d9, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\nsc2347.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsi24EF.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\nso26E6.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\nss24DE.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nss257C.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsy2639.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\vxhtinfano
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
"C:\Users\user\Desktop\scan_241205-801_draft_PO.exe"
malicious
C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
"C:\Users\user\Desktop\scan_241205-801_draft_PO.exe"
malicious
C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
C:\Users\user\Desktop\scan_241205-801_draft_PO.exe /stext "C:\Users\user\AppData\Local\Temp\vxhtinfano"
malicious
C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
C:\Users\user\Desktop\scan_241205-801_draft_PO.exe /stext "C:\Users\user\AppData\Local\Temp\fzumjfqbbwepy"
malicious
C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
C:\Users\user\Desktop\scan_241205-801_draft_PO.exe /stext "C:\Users\user\AppData\Local\Temp\itzekyavpewuiglw"
malicious

URLs

Name
IP
Malicious
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=P
unknown
https://www.office.com/
unknown
http://geoplugin.net/json.gpmiW
unknown
http://www.imvu.comr
unknown
http://geoplugin.net/json.gpl
unknown
https://fp-afd.azurefd.us/apc/trans.gif?0cf92be82316943650f2ee723bc6949e
unknown
http://www.imvu.com
unknown
http://www.nirsoft.net
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://104.168.7.16/WonMNkIofA233.bin
104.168.7.16
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://www.google.com
unknown
https://fp-afd.azurefd.us/apc/trans.gif?94fb5ac9609bcb4cda0bf8acf1827073
unknown
https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-LAX31r5a&FrontEnd=AF
unknown
https://aefd.nelreports.net/api/report?cat=bingaot
unknown
https://maps.windows.com/windows-app-web-link
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
http://www.nirsoft.net/
unknown
http://www.imvu.comata
unknown
http://www.ebuddy.com
unknown
There are 15 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
162.251.122.87
unknown
Canada
malicious
104.168.7.16
unknown
United States
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\argentinsk\Uninstall\Afnationaliserendes
parameterlistes
HKEY_CURRENT_USER\SOFTWARE\Rmc-UOMZ21
exepath
HKEY_CURRENT_USER\SOFTWARE\Rmc-UOMZ21
licence
HKEY_CURRENT_USER\SOFTWARE\Rmc-UOMZ21
time

Memdumps

Base Address
Regiontype
Protect
Malicious
32C2000
heap
page read and write
malicious
19F000
stack
page read and write
malicious
6434000
direct allocation
page execute and read and write
malicious
32DF000
heap
page read and write
malicious
210C000
heap
page read and write
2118000
heap
page read and write
2ADF000
heap
page read and write
211E000
heap
page read and write
408000
unkown
page readonly
B00000
heap
page read and write
32FE000
heap
page read and write
2154000
heap
page read and write
400000
unkown
page readonly
333A0000
heap
page read and write
40A000
unkown
page write copy
408000
unkown
page readonly
3400B000
heap
page read and write
2196000
heap
page read and write
4F5000
heap
page read and write
2AE2000
heap
page read and write
3401E000
heap
page read and write
2220000
heap
page read and write
400000
unkown
page readonly
7D5000
unkown
page readonly
3166000
heap
page read and write
216D000
heap
page read and write
3220000
direct allocation
page read and write
5550000
heap
page read and write
2131000
heap
page read and write
3240000
heap
page read and write
514000
heap
page read and write
815000
unkown
page readonly
210F000
heap
page read and write
3313000
heap
page read and write
30D8000
heap
page read and write
7834000
direct allocation
page execute and read and write
2111000
heap
page read and write
2530000
heap
page read and write
25DF000
heap
page read and write
51A9000
heap
page read and write
47F3000
heap
page read and write
29A0000
trusted library allocation
page read and write
798000
heap
page read and write
211F000
heap
page read and write
212D000
heap
page read and write
333C000
heap
page read and write
B3A000
heap
page read and write
CFF000
stack
page read and write
27A9000
heap
page read and write
5187000
heap
page read and write
32EF000
heap
page read and write
33C0A000
heap
page read and write
34019000
heap
page read and write
815000
unkown
page readonly
530000
heap
page read and write
29AB000
heap
page read and write
212B000
heap
page read and write
2FF2000
heap
page read and write
4DCC000
heap
page read and write
2CFC000
heap
page read and write
2178000
heap
page read and write
2123000
heap
page read and write
2119000
heap
page read and write
2130000
heap
page read and write
48FD000
heap
page read and write
4F7C000
heap
page read and write
211F000
heap
page read and write
790000
heap
page read and write
940000
heap
page read and write
32AD000
heap
page read and write
4F4000
heap
page read and write
2D90000
direct allocation
page read and write
2FB0000
heap
page read and write
32EF000
heap
page read and write
5283000
heap
page read and write
2120000
heap
page read and write
815000
unkown
page readonly
550E000
heap
page read and write
514000
heap
page read and write
DFF000
stack
page read and write
40A000
unkown
page write copy
29A0000
trusted library allocation
page read and write
2531000
heap
page read and write
4AF8000
heap
page read and write
2121000
heap
page read and write
25D4000
remote allocation
page execute and read and write
514000
heap
page read and write
4D70000
direct allocation
page read and write
408000
unkown
page readonly
506B000
heap
page read and write
31F0000
direct allocation
page read and write
4D2B000
heap
page read and write
401000
unkown
page execute read
9E000
stack
page read and write
341A0000
unclassified section
page execute and read and write
7C7000
unkown
page read and write
2111000
heap
page read and write
341D1000
direct allocation
page execute and read and write
514000
heap
page read and write
4F5000
heap
page read and write
211F000
heap
page read and write
53C4000
heap
page read and write
401000
unkown
page execute read
520000
heap
page read and write
2D2C000
heap
page read and write
334C000
stack
page read and write
3250000
direct allocation
page read and write
3280000
heap
page read and write
7D8000
unkown
page readonly
211F000
heap
page read and write
3303000
heap
page read and write
26A1000
heap
page read and write
2118000
heap
page read and write
590000
heap
page read and write
5644000
heap
page read and write
7AB000
unkown
page read and write
7D8000
unkown
page readonly
33E21000
heap
page read and write
A6E000
stack
page read and write
34186000
unclassified section
page execute and read and write
212D000
heap
page read and write
3280000
heap
page read and write
510000
heap
page read and write
2125000
heap
page read and write
4931000
heap
page read and write
19A000
stack
page read and write
177000
stack
page read and write
5A05000
heap
page read and write
7A50000
trusted library allocation
page read and write
4D90000
direct allocation
page read and write
910000
heap
page read and write
788000
unkown
page read and write
4AD6000
heap
page read and write
408000
unkown
page readonly
4F4000
heap
page read and write
5448000
heap
page read and write
3401D000
heap
page read and write
70F000
stack
page read and write
2196000
heap
page read and write
27A9000
heap
page read and write
3303000
heap
page read and write
1BD4000
remote allocation
page execute and read and write
2C5F000
stack
page read and write
55C9000
heap
page read and write
340B0000
unclassified section
page execute and read and write
514000
heap
page read and write
2B5E000
stack
page read and write
3400B000
heap
page read and write
5B75000
heap
page read and write
B08000
heap
page read and write
33C08000
heap
page read and write
4F0000
heap
page read and write
94E000
heap
page read and write
337CF000
stack
page read and write
5981000
heap
page read and write
211F000
heap
page read and write
2B0F000
stack
page read and write
4F4000
heap
page read and write
2813000
heap
page read and write
2131000
heap
page read and write
400000
unkown
page readonly
57DE000
heap
page read and write
2142000
heap
page read and write
473000
system
page execute and read and write
3322B000
stack
page read and write
3303000
heap
page read and write
98C000
heap
page read and write
33A8E000
stack
page read and write
4D80000
direct allocation
page read and write
2111000
heap
page read and write
213B000
heap
page read and write
980000
heap
page read and write
5A49000
heap
page read and write
1FF8000
heap
page read and write
3288000
heap
page read and write
4E9E000
stack
page read and write
19A000
stack
page read and write
4F5000
heap
page read and write
45C000
system
page execute and read and write
34123000
unclassified section
page execute and read and write
4CCB000
heap
page read and write
45D000
system
page execute and read and write
514000
heap
page read and write
2100000
heap
page read and write
2127000
heap
page read and write
7D5000
unkown
page readonly
4E2E000
heap
page read and write
33B91000
heap
page read and write
401000
unkown
page execute read
58BD000
heap
page read and write
232F000
stack
page read and write
2178000
heap
page read and write
48BB000
heap
page read and write
401000
unkown
page execute read
40A000
unkown
page write copy
538000
heap
page read and write
5261000
heap
page read and write
B4F000
heap
page read and write
401000
unkown
page execute read
786000
unkown
page read and write
2130000
heap
page read and write
31C0000
direct allocation
page read and write
32FE000
heap
page read and write
2196000
heap
page read and write
AEE000
stack
page read and write
76F000
stack
page read and write
59C3000
heap
page read and write
4F5000
heap
page read and write
513E000
heap
page read and write
210C000
heap
page read and write
1AB0000
remote allocation
page execute and read and write
211C000
heap
page read and write
2812000
heap
page read and write
19C000
stack
page read and write
25D9000
heap
page read and write
5E0000
heap
page read and write
456000
system
page execute and read and write
50D4000
heap
page read and write
2159000
heap
page read and write
2131000
heap
page read and write
3210000
direct allocation
page read and write
4D60000
direct allocation
page read and write
2120000
heap
page read and write
213A000
heap
page read and write
50B2000
heap
page read and write
51F3000
heap
page read and write
34007000
heap
page read and write
34019000
heap
page read and write
33FCB000
heap
page read and write
2AD4000
heap
page read and write
3230000
direct allocation
page read and write
7D5000
unkown
page readonly
210C000
heap
page read and write
2123000
heap
page read and write
511C000
heap
page read and write
3260000
direct allocation
page read and write
2121000
heap
page read and write
401000
unkown
page execute read
7D8000
unkown
page readonly
40A000
unkown
page write copy
2DB0000
heap
page read and write
400000
system
page execute and read and write
7A4000
unkown
page read and write
9F0000
heap
page read and write
408000
unkown
page readonly
3313000
heap
page read and write
4D40000
direct allocation
page read and write
3301000
heap
page read and write
4F5000
heap
page read and write
514000
heap
page read and write
54F000
heap
page read and write
66E000
stack
page read and write
341BB000
unclassified section
page execute and read and write
2138000
heap
page read and write
96E000
stack
page read and write
214A000
heap
page read and write
A05000
heap
page read and write
4FE2000
heap
page read and write
33F8B000
heap
page read and write
3401D000
heap
page read and write
29A0000
trusted library allocation
page read and write
2125000
heap
page read and write
2128000
heap
page read and write
514000
heap
page read and write
5215000
heap
page read and write
4DA0000
direct allocation
page read and write
A10000
heap
page read and write
4C8C000
heap
page read and write
430000
heap
page read and write
7D8000
unkown
page readonly
400000
unkown
page readonly
4F4000
heap
page read and write
91D000
heap
page read and write
600000
heap
page read and write
4F4000
heap
page read and write
514000
heap
page read and write
4DD0000
direct allocation
page read and write
26AB000
heap
page read and write
400000
unkown
page readonly
2159000
heap
page read and write
2DC0000
heap
page read and write
32FE000
heap
page read and write
3410D000
unclassified section
page execute and read and write
3312D000
stack
page read and write
3400B000
heap
page read and write
344B000
stack
page read and write
33FBB000
heap
page read and write
815000
unkown
page readonly
341D0000
direct allocation
page read and write
7D5000
unkown
page readonly
3338F000
stack
page read and write
9F4000
heap
page read and write
3400B000
heap
page read and write
3054000
heap
page read and write
334FE000
stack
page read and write
26A0000
heap
page read and write
4973000
heap
page read and write
6E34000
direct allocation
page execute and read and write
2130000
heap
page read and write
336CC000
stack
page read and write
2BE3000
heap
page read and write
2120000
heap
page read and write
34004000
heap
page read and write
2153000
heap
page read and write
4EF5000
heap
page read and write
2141000
heap
page read and write
B36000
heap
page read and write
2531000
heap
page read and write
6C720000
unkown
page readonly
2130000
heap
page read and write
7B2000
unkown
page read and write
31E0000
direct allocation
page read and write
5049000
heap
page read and write
920000
heap
page read and write
575F000
heap
page read and write
4F4000
heap
page read and write
193000
stack
page read and write
40A000
unkown
page write copy
6310000
trusted library allocation
page read and write
9C000
stack
page read and write
4F5000
heap
page read and write
4C08000
heap
page read and write
6C723000
unkown
page readonly
34109000
unclassified section
page execute and read and write
17C000
stack
page read and write
32F3000
heap
page read and write
2125000
heap
page read and write
3394E000
stack
page read and write
21F0000
trusted library allocation
page read and write
3200000
direct allocation
page read and write
25D4000
heap
page read and write
5406000
heap
page read and write
4F39000
heap
page read and write
9C000
stack
page read and write
49D7000
heap
page read and write
1F9E000
stack
page read and write
4B1A000
heap
page read and write
7AC000
heap
page read and write
2123000
heap
page read and write
2135000
heap
page read and write
4899000
heap
page read and write
54CC000
heap
page read and write
31F0000
heap
page read and write
5382000
heap
page read and write
77C000
unkown
page read and write
29A0000
trusted library allocation
page read and write
2130000
heap
page read and write
983000
heap
page read and write
31D0000
direct allocation
page read and write
3303000
heap
page read and write
52B9000
heap
page read and write
58E000
stack
page read and write
2159000
heap
page read and write
3301000
heap
page read and write
217A000
heap
page read and write
3192000
heap
page read and write
27A1000
heap
page read and write
2111000
heap
page read and write
32EF000
heap
page read and write
213A000
heap
page read and write
4E2E000
stack
page read and write
34007000
heap
page read and write
514000
heap
page read and write
4F9E000
heap
page read and write
2280000
heap
page read and write
9B0000
heap
page read and write
4A3B000
heap
page read and write
4B40000
heap
page read and write
2FD4000
remote allocation
page execute and read and write
91F000
stack
page read and write
2133000
heap
page read and write
34007000
heap
page read and write
4ED3000
heap
page read and write
34007000
heap
page read and write
32FEF000
stack
page read and write
4F4000
heap
page read and write
4BE6000
heap
page read and write
2812000
heap
page read and write
94E000
heap
page read and write
4F4000
heap
page read and write
9AE000
stack
page read and write
2120000
heap
page read and write
2111000
heap
page read and write
5666000
heap
page read and write
33F13000
heap
page read and write
400000
system
page execute and read and write
98000
stack
page read and write
2127000
heap
page read and write
7D3000
unkown
page read and write
55EB000
heap
page read and write
548A000
heap
page read and write
408000
unkown
page readonly
2114000
heap
page read and write
AA0000
heap
page read and write
2135000
heap
page read and write
4E50000
heap
page read and write
946000
heap
page read and write
400000
unkown
page readonly
94E000
heap
page read and write
4740000
heap
page read and write
2130000
heap
page read and write
34007000
heap
page read and write
211E000
heap
page read and write
3418C000
unclassified section
page execute and read and write
815000
unkown
page readonly
56E2000
heap
page read and write
27A0000
heap
page read and write
4857000
heap
page read and write
B49000
heap
page read and write
29A0000
trusted library allocation
page read and write
9C000
stack
page read and write
3358C000
stack
page read and write
33FBC000
heap
page read and write
311A000
heap
page read and write
514000
heap
page read and write
210E000
heap
page read and write
4F4000
heap
page read and write
3390F000
stack
page read and write
33C08000
heap
page read and write
4C4A000
heap
page read and write
211C000
heap
page read and write
2196000
heap
page read and write
211C000
heap
page read and write
2120000
heap
page read and write
2125000
heap
page read and write
252F000
stack
page read and write
470000
heap
page read and write
2135000
heap
page read and write
330ED000
stack
page read and write
4D50000
direct allocation
page read and write
33A4F000
stack
page read and write
2130000
heap
page read and write
850000
heap
page read and write
214B000
heap
page read and write
34007000
heap
page read and write
333FE000
stack
page read and write
4D0000
heap
page read and write
459000
system
page execute and read and write
2111000
heap
page read and write
5FF000
heap
page read and write
4D30000
direct allocation
page read and write
2C0D000
heap
page read and write
4DB0000
direct allocation
page read and write
514000
heap
page read and write
2121000
heap
page read and write
2111000
heap
page read and write
29A0000
trusted library allocation
page read and write
815000
unkown
page readonly
401000
unkown
page execute read
26C5000
heap
page read and write
782000
unkown
page read and write
593F000
heap
page read and write
400000
unkown
page readonly
26C0000
heap
page read and write
2153000
heap
page read and write
269F000
stack
page read and write
5A8B000
heap
page read and write
4F5000
heap
page read and write
2154000
heap
page read and write
6310000
direct allocation
page execute and read and write
2D70000
heap
page read and write
2133000
heap
page read and write
6C721000
unkown
page execute read
2130000
heap
page read and write
5EE000
stack
page read and write
2131000
heap
page read and write
5340000
heap
page read and write
4F4000
heap
page read and write
81E000
stack
page read and write
26A1000
heap
page read and write
20F0000
heap
page read and write
33E20000
heap
page read and write
4F5000
heap
page read and write
7D5000
unkown
page readonly
2120000
heap
page read and write
4F17000
heap
page read and write
400000
system
page execute and read and write
213E000
heap
page read and write
3380C000
stack
page read and write
2EB0000
heap
page read and write
214C000
heap
page read and write
2130000
heap
page read and write
212D000
heap
page read and write
7A6000
unkown
page read and write
4F4000
heap
page read and write
4F4000
heap
page read and write
1FE0000
heap
page read and write
34022000
heap
page read and write
32FE000
heap
page read and write
212D000
heap
page read and write
4B82000
heap
page read and write
2130000
heap
page read and write
31B0000
direct allocation
page read and write
815000
unkown
page readonly
40A000
unkown
page read and write
7D8000
unkown
page readonly
4CE000
stack
page read and write
3400B000
heap
page read and write
2813000
heap
page read and write
33FFB000
heap
page read and write
BA6000
heap
page read and write
94D000
heap
page read and write
4F4000
heap
page read and write
29A5000
heap
page read and write
550000
heap
page read and write
211C000
heap
page read and write
4F4000
heap
page read and write
514000
heap
page read and write
583C000
heap
page read and write
514000
heap
page read and write
213A000
heap
page read and write
33B8F000
stack
page read and write
21F0000
trusted library allocation
page read and write
5E8000
heap
page read and write
5572000
heap
page read and write
2111000
heap
page read and write
2142000
heap
page read and write
6C725000
unkown
page readonly
27A8000
heap
page read and write
2130000
heap
page read and write
4A7D000
heap
page read and write
94D000
heap
page read and write
2119000
heap
page read and write
7DF000
stack
page read and write
A00000
heap
page read and write
585E000
heap
page read and write
58DF000
heap
page read and write
2166000
heap
page read and write
2125000
heap
page read and write
7D5000
unkown
page readonly
57BC000
heap
page read and write
2120000
heap
page read and write
18F000
stack
page read and write
3400B000
heap
page read and write
3368D000
stack
page read and write
49B5000
heap
page read and write
3313000
heap
page read and write
214C000
heap
page read and write
2133000
heap
page read and write
33E9A000
heap
page read and write
33F13000
heap
page read and write
3270000
heap
page read and write
2121000
heap
page read and write
91D000
heap
page read and write
34130000
unclassified section
page execute and read and write
7D5000
unkown
page readonly
33B91000
heap
page read and write
7D8000
unkown
page readonly
5AD2000
heap
page read and write
408000
unkown
page readonly
4BA4000
heap
page read and write
47A4000
heap
page read and write
210C000
heap
page read and write
4DD6000
heap
page read and write
33C83000
heap
page read and write
4DC0000
direct allocation
page read and write
2AEE000
heap
page read and write
41B000
system
page execute and read and write
4A19000
heap
page read and write
33C08000
heap
page read and write
514000
heap
page read and write
514000
heap
page read and write
6310000
trusted library allocation
page read and write
341E6000
direct allocation
page execute and read and write
2111000
heap
page read and write
3303000
heap
page read and write
4782000
heap
page read and write
913000
heap
page read and write
33F8B000
heap
page read and write
5004000
heap
page read and write
4EA0000
heap
page read and write
2120000
heap
page read and write
56C0000
heap
page read and write
26A1000
heap
page read and write
33B90000
heap
page read and write
30B6000
heap
page read and write
4F4000
heap
page read and write
573D000
heap
page read and write
33F12000
heap
page read and write
33E21000
heap
page read and write
2120000
heap
page read and write
211F000
heap
page read and write
4835000
heap
page read and write
98C000
heap
page read and write
480000
heap
page read and write
2120000
heap
page read and write
211E000
heap
page read and write
211E000
heap
page read and write
2131000
heap
page read and write
4E70000
heap
page read and write
214D000
heap
page read and write
4F4000
heap
page read and write
4D6B000
heap
page read and write
2154000
heap
page read and write
3328E000
stack
page read and write
3275000
heap
page read and write
40A000
unkown
page write copy
3240000
direct allocation
page read and write
7D8000
unkown
page readonly
514000
heap
page read and write
There are 590 hidden memdumps, click here to show them.