IOC Report
hloRQZmlfg.exe

loading gif

Files

File Path
Type
Category
Malicious
hloRQZmlfg.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files\RDP Wrapper\rdpwrap.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_hloRQZmlfg.exe_e14f1ae934bde6c6503b1e1bfaf2ffefa86c324_8c8de2e2_89409a0e-f3ad-4606-acec-29704ed3c812\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\RDPWInst.exe
PE32 executable (console) Intel 80386, for MS Windows
modified
malicious
C:\Program Files\RDP Wrapper\rdpwrap.ini
Generic INItialization configuration [SLPolicy]
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER91CD.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Oct 8 01:23:44 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER93C2.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9597.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\System32\rfxvmt.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
\Device\Mup\226546*\MAILSLOT\NET\NETLOGON
data
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\hloRQZmlfg.exe
"C:\Users\user\Desktop\hloRQZmlfg.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net user
malicious
C:\Windows\SysWOW64\net.exe
net user
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c "C:\Users\user\AppData\Local\Temp\RDPWInst.exe" -i
malicious
C:\Users\user\AppData\Local\Temp\RDPWInst.exe
C:\Users\user\AppData\Local\Temp\RDPWInst.exe -i
malicious
C:\Windows\System32\netsh.exe
netsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net user RDPUser_1e47a393 GEdtvn58rfdr /add
malicious
C:\Windows\SysWOW64\net.exe
net user RDPUser_1e47a393 GEdtvn58rfdr /add
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net localgroup
malicious
C:\Windows\SysWOW64\net.exe
net localgroup
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c netsh advfirewall firewall add rule name="RDP" dir=in action=allow protocol=tcp localport=3389
malicious
C:\Windows\SysWOW64\netsh.exe
netsh advfirewall firewall add rule name="RDP" dir=in action=allow protocol=tcp localport=3389
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net localgroup "Administrators" RDPUser_1e47a393 /add
malicious
C:\Windows\SysWOW64\net.exe
net localgroup "Administrators" RDPUser_1e47a393 /add
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 user
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\drivers\rdpvideominiport.sys
C:\Windows\System32\drivers\rdpdr.sys
C:\Windows\System32\drivers\tsusbhub.sys
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 user RDPUser_1e47a393 GEdtvn58rfdr /add
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 localgroup
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 localgroup "Administrators" RDPUser_1e47a393 /add
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 2756
There are 18 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://stascorp.com/load/1-1-0-62
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://147.45.44.104/prog/66f55533ca7d6_RDPWInst.exe
147.45.44.104
http://api.ipify.orgd
unknown
http://stascorp.comDVarFileInfo$
unknown
https://raw.githubusercontent.com/stascorp/rdpwrap/master/res/rdpwrap.iniU
unknown
http://hansgborn.eu
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/
unknown
https://github.com/lontivero/Open.Nat/issuesOAlso
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://raw.githubusercontent.com/stascorp/rdpwrap/master/res/rdpwrap.ini
unknown
http://api.ipify.org/
104.26.12.205
https://hansgborn.eu/receive.phpd
unknown
http://hansgborn.eud
unknown
http://upx.sf.net
unknown
http://147.45.44.104
unknown
https://hansgborn.eu/receive.php
188.114.96.3
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://hansgborn.eu
unknown
http://api.ipify.org
unknown
There are 11 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
hansgborn.eu
188.114.96.3
api.ipify.org
104.26.12.205

IPs

IP
Domain
Country
Malicious
8.46.123.33
unknown
United States
malicious
104.26.12.205
api.ipify.org
United States
239.255.255.250
unknown
Reserved
188.114.96.3
hansgborn.eu
European Union
147.45.44.104
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server\Licensing Core
EnableConcurrentSessions
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters
ServiceDll
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server
fDenyTSConnections
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hloRQZmlfg_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hloRQZmlfg_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hloRQZmlfg_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hloRQZmlfg_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hloRQZmlfg_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hloRQZmlfg_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hloRQZmlfg_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hloRQZmlfg_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hloRQZmlfg_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hloRQZmlfg_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hloRQZmlfg_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hloRQZmlfg_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hloRQZmlfg_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hloRQZmlfg_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
AllowMultipleTSSessions
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}
Class
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}
NoDisplayClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}
NoUseClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}
Class
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}
NoDisplayClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}
NoUseClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}
Class
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}
NoDisplayClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}
NoUseClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tsusbhub\Parameters\Wdf
WdfMajorVersion
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tsusbhub\Parameters\Wdf
WdfMinorVersion
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{191a5137-7c9d-43c0-a943-de4411f424f7}\##?#TS_USB_HUB_Enumerator#UMB#2&30d3618&0&TS_USB_HUB#{191a5137-7c9d-43c0-a943-de4411f424f7}
DeviceInstance
\REGISTRY\A\{4e394f00-8a62-d5c6-a6ed-c22cf812bb03}\Root\InventoryApplicationFile\hlorqzmlfg.exe|601857e986b857a5
ProgramId
\REGISTRY\A\{4e394f00-8a62-d5c6-a6ed-c22cf812bb03}\Root\InventoryApplicationFile\hlorqzmlfg.exe|601857e986b857a5
FileId
\REGISTRY\A\{4e394f00-8a62-d5c6-a6ed-c22cf812bb03}\Root\InventoryApplicationFile\hlorqzmlfg.exe|601857e986b857a5
LowerCaseLongPath
\REGISTRY\A\{4e394f00-8a62-d5c6-a6ed-c22cf812bb03}\Root\InventoryApplicationFile\hlorqzmlfg.exe|601857e986b857a5
LongPathHash
\REGISTRY\A\{4e394f00-8a62-d5c6-a6ed-c22cf812bb03}\Root\InventoryApplicationFile\hlorqzmlfg.exe|601857e986b857a5
Name
\REGISTRY\A\{4e394f00-8a62-d5c6-a6ed-c22cf812bb03}\Root\InventoryApplicationFile\hlorqzmlfg.exe|601857e986b857a5
OriginalFileName
\REGISTRY\A\{4e394f00-8a62-d5c6-a6ed-c22cf812bb03}\Root\InventoryApplicationFile\hlorqzmlfg.exe|601857e986b857a5
Publisher
\REGISTRY\A\{4e394f00-8a62-d5c6-a6ed-c22cf812bb03}\Root\InventoryApplicationFile\hlorqzmlfg.exe|601857e986b857a5
Version
\REGISTRY\A\{4e394f00-8a62-d5c6-a6ed-c22cf812bb03}\Root\InventoryApplicationFile\hlorqzmlfg.exe|601857e986b857a5
BinFileVersion
\REGISTRY\A\{4e394f00-8a62-d5c6-a6ed-c22cf812bb03}\Root\InventoryApplicationFile\hlorqzmlfg.exe|601857e986b857a5
BinaryType
\REGISTRY\A\{4e394f00-8a62-d5c6-a6ed-c22cf812bb03}\Root\InventoryApplicationFile\hlorqzmlfg.exe|601857e986b857a5
ProductName
\REGISTRY\A\{4e394f00-8a62-d5c6-a6ed-c22cf812bb03}\Root\InventoryApplicationFile\hlorqzmlfg.exe|601857e986b857a5
ProductVersion
\REGISTRY\A\{4e394f00-8a62-d5c6-a6ed-c22cf812bb03}\Root\InventoryApplicationFile\hlorqzmlfg.exe|601857e986b857a5
LinkDate
\REGISTRY\A\{4e394f00-8a62-d5c6-a6ed-c22cf812bb03}\Root\InventoryApplicationFile\hlorqzmlfg.exe|601857e986b857a5
BinProductVersion
\REGISTRY\A\{4e394f00-8a62-d5c6-a6ed-c22cf812bb03}\Root\InventoryApplicationFile\hlorqzmlfg.exe|601857e986b857a5
AppxPackageFullName
\REGISTRY\A\{4e394f00-8a62-d5c6-a6ed-c22cf812bb03}\Root\InventoryApplicationFile\hlorqzmlfg.exe|601857e986b857a5
AppxPackageRelativeId
\REGISTRY\A\{4e394f00-8a62-d5c6-a6ed-c22cf812bb03}\Root\InventoryApplicationFile\hlorqzmlfg.exe|601857e986b857a5
Size
\REGISTRY\A\{4e394f00-8a62-d5c6-a6ed-c22cf812bb03}\Root\InventoryApplicationFile\hlorqzmlfg.exe|601857e986b857a5
Language
\REGISTRY\A\{4e394f00-8a62-d5c6-a6ed-c22cf812bb03}\Root\InventoryApplicationFile\hlorqzmlfg.exe|601857e986b857a5
Usn
There are 44 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
882000
unkown
page readonly
malicious
450000
unkown
page readonly
malicious
450000
unkown
page readonly
malicious
2CF1000
trusted library allocation
page read and write
malicious
2CDE000
stack
page read and write
92D000
stack
page read and write
60CE000
stack
page read and write
5CDE000
stack
page read and write
7FE000
heap
page read and write
3227000
heap
page read and write
2DB5000
trusted library allocation
page read and write
7E0000
heap
page read and write
2E70000
heap
page read and write
7F0000
heap
page read and write
577A000
heap
page read and write
5F0E000
stack
page read and write
30EE000
unkown
page read and write
63CD000
stack
page read and write
2720000
heap
page read and write
3555000
heap
page read and write
2ACF000
stack
page read and write
22D7000
direct allocation
page read and write
DED000
stack
page read and write
281E000
stack
page read and write
2E77000
heap
page read and write
E30000
heap
page read and write
92C000
stack
page read and write
6B80000
trusted library allocation
page read and write
2B9F000
stack
page read and write
5B1E000
stack
page read and write
29C0000
heap
page read and write
5792000
heap
page read and write
3660000
heap
page read and write
2BC1000
heap
page read and write
CF5000
stack
page read and write
2E21000
trusted library allocation
page read and write
2E2B000
trusted library allocation
page read and write
3208000
heap
page read and write
44D000
unkown
page write copy
6530000
heap
page read and write
285E000
stack
page read and write
22D0000
heap
page read and write
EB0000
trusted library allocation
page read and write
3250000
heap
page read and write
2BFE000
stack
page read and write
6A3E000
stack
page read and write
317E000
stack
page read and write
307E000
stack
page read and write
305D000
stack
page read and write
31B2000
heap
page read and write
2D40000
heap
page read and write
7A0000
heap
page read and write
5B0000
heap
page read and write
3130000
heap
page read and write
7EE000
unkown
page read and write
863000
heap
page read and write
34AE000
stack
page read and write
EC2000
trusted library allocation
page read and write
2D9F000
trusted library allocation
page read and write
23AF000
direct allocation
page read and write
2300000
heap
page read and write
2F3D000
stack
page read and write
3480000
heap
page read and write
F5D000
heap
page read and write
5ADE000
stack
page read and write
32BC000
heap
page read and write
3258000
trusted library allocation
page read and write
3010000
heap
page read and write
EB6000
trusted library allocation
page execute and read and write
524E000
stack
page read and write
7FD00000
direct allocation
page read and write
5833000
heap
page read and write
5836000
heap
page read and write
5C0000
heap
page read and write
32DD000
heap
page read and write
657D000
stack
page read and write
1FD000
stack
page read and write
75E000
stack
page read and write
2980000
trusted library allocation
page read and write
3491000
heap
page read and write
3FE000
stack
page read and write
5DDF000
stack
page read and write
38F5000
heap
page read and write
6B7C000
stack
page read and write
2E3D000
stack
page read and write
6EE000
stack
page read and write
5760000
heap
page read and write
E94000
trusted library allocation
page read and write
2FC0000
heap
page read and write
236E000
direct allocation
page read and write
2B10000
heap
page read and write
5830000
heap
page read and write
3000000
heap
page read and write
30D000
stack
page read and write
2AD0000
trusted library allocation
page execute and read and write
64CD000
stack
page read and write
2BF0000
heap
page read and write
67FC000
stack
page read and write
3668000
heap
page read and write
2C13000
heap
page read and write
2B08000
trusted library allocation
page read and write
6FD000
stack
page read and write
693E000
stack
page read and write
31FF000
stack
page read and write
EBA000
trusted library allocation
page execute and read and write
2E09000
trusted library allocation
page read and write
23F0000
heap
page read and write
3220000
heap
page read and write
E90000
heap
page read and write
2E1F000
trusted library allocation
page read and write
5788000
heap
page read and write
2F10000
heap
page read and write
CE0000
heap
page read and write
2B9F000
unkown
page read and write
27DE000
stack
page read and write
5DF0000
trusted library allocation
page read and write
DE7000
heap
page read and write
238D000
stack
page read and write
38F0000
heap
page read and write
C90000
heap
page read and write
2280000
heap
page read and write
63D000
stack
page read and write
2500000
direct allocation
page read and write
E80000
trusted library allocation
page read and write
230D000
stack
page read and write
57EA000
heap
page read and write
32BE000
stack
page read and write
338F000
unkown
page read and write
51D000
stack
page read and write
E90000
trusted library allocation
page read and write
31B0000
heap
page read and write
2E70000
heap
page read and write
E70000
heap
page read and write
9A5000
heap
page read and write
2E19000
trusted library allocation
page read and write
565D000
stack
page read and write
3677000
heap
page read and write
2375000
direct allocation
page read and write
315E000
unkown
page read and write
2E25000
trusted library allocation
page read and write
3355000
heap
page read and write
325E000
unkown
page read and write
11CF000
stack
page read and write
608E000
stack
page read and write
2DEF000
stack
page read and write
31B4000
heap
page read and write
445000
unkown
page write copy
2D47000
trusted library allocation
page read and write
2F80000
heap
page read and write
7F0000
heap
page read and write
323D000
stack
page read and write
6A0000
heap
page read and write
2B9F000
unkown
page read and write
2DCF000
trusted library allocation
page read and write
59DE000
stack
page read and write
44C000
unkown
page write copy
7FD70000
direct allocation
page read and write
CC0000
heap
page read and write
2AF0000
heap
page read and write
23E1000
direct allocation
page read and write
E77000
heap
page read and write
EDE000
heap
page read and write
ECB000
trusted library allocation
page execute and read and write
343D000
stack
page read and write
2E2D000
trusted library allocation
page read and write
A0E000
stack
page read and write
5C1E000
stack
page read and write
CE8000
heap
page read and write
3290000
heap
page read and write
C9D000
stack
page read and write
2BB0000
heap
page read and write
344E000
stack
page read and write
2858000
heap
page read and write
3135000
heap
page read and write
3495000
heap
page read and write
342E000
stack
page read and write
E7D000
stack
page read and write
E6D000
stack
page read and write
861000
heap
page read and write
7D0000
heap
page read and write
E2E000
stack
page read and write
E95000
heap
page read and write
3260000
heap
page read and write
29C5000
heap
page read and write
2660000
heap
page read and write
551D000
stack
page read and write
2F90000
heap
page read and write
27DF000
stack
page read and write
34D0000
heap
page read and write
667A000
stack
page read and write
865000
heap
page read and write
E93000
trusted library allocation
page execute and read and write
2F5E000
stack
page read and write
2F20000
heap
page read and write
2392000
direct allocation
page read and write
29CE000
stack
page read and write
83E000
stack
page read and write
2E1D000
trusted library allocation
page read and write
5FE000
unkown
page read and write
24BB000
direct allocation
page read and write
2B15000
heap
page read and write
2FEE000
stack
page read and write
2F2E000
stack
page read and write
C5D000
stack
page read and write
2850000
heap
page read and write
3BE000
unkown
page read and write
9B0000
heap
page read and write
2E27000
trusted library allocation
page read and write
400000
unkown
page readonly
446000
unkown
page write copy
348F000
stack
page read and write
2E23000
trusted library allocation
page read and write
57A1000
heap
page read and write
352E000
stack
page read and write
3310000
heap
page read and write
2358000
direct allocation
page read and write
8FD000
stack
page read and write
84C000
heap
page read and write
870000
heap
page read and write
A3F000
unkown
page read and write
34A0000
heap
page read and write
3315000
heap
page read and write
347C000
heap
page read and write
7FA000
heap
page read and write
237C000
direct allocation
page read and write
30FF000
stack
page read and write
312E000
stack
page read and write
C10000
heap
page read and write
270E000
stack
page read and write
2E05000
trusted library allocation
page read and write
2FD0000
heap
page read and write
2FF0000
heap
page read and write
EB2000
trusted library allocation
page read and write
22B4000
direct allocation
page read and write
EF7000
heap
page read and write
53DE000
stack
page read and write
23A8000
direct allocation
page read and write
CB0000
heap
page read and write
319F000
stack
page read and write
3530000
heap
page read and write
29CF000
stack
page read and write
577C000
heap
page read and write
238B000
direct allocation
page read and write
610E000
stack
page read and write
330E000
unkown
page read and write
2BFB000
heap
page read and write
400000
unkown
page readonly
CA0000
heap
page read and write
5110000
trusted library allocation
page read and write
324E000
stack
page read and write
23E8000
direct allocation
page read and write
7FC20000
direct allocation
page read and write
2ACD000
stack
page read and write
F13000
heap
page read and write
2D9F000
stack
page read and write
5795000
heap
page read and write
9FE000
stack
page read and write
620F000
stack
page read and write
249C000
direct allocation
page read and write
2C11000
heap
page read and write
2C15000
heap
page read and write
590000
heap
page read and write
54DE000
stack
page read and write
366E000
stack
page read and write
5C9E000
stack
page read and write
599E000
stack
page read and write
990000
heap
page read and write
34AF000
stack
page read and write
AEF000
stack
page read and write
3200000
heap
page read and write
2E3E000
stack
page read and write
2E40000
heap
page read and write
2CE0000
heap
page execute and read and write
347D000
stack
page read and write
5C5D000
stack
page read and write
EA0000
trusted library allocation
page read and write
329E000
stack
page read and write
44B000
unkown
page read and write
5140000
heap
page execute and read and write
3780000
heap
page read and write
2BFD000
stack
page read and write
2D37000
trusted library allocation
page read and write
6A7E000
stack
page read and write
302F000
stack
page read and write
2DF3000
trusted library allocation
page read and write
370000
heap
page read and write
2491000
direct allocation
page read and write
9A0000
heap
page read and write
319C000
heap
page read and write
3320000
heap
page read and write
2750000
heap
page read and write
2FAE000
stack
page read and write
3200000
heap
page read and write
3CF1000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
2E50000
heap
page read and write
2CAD000
stack
page read and write
EDA000
heap
page read and write
840000
heap
page read and write
2367000
direct allocation
page read and write
2F60000
heap
page read and write
2E29000
trusted library allocation
page read and write
FFD10000
trusted library allocation
page execute and read and write
7FDE0000
direct allocation
page read and write
315D000
stack
page read and write
E5E000
stack
page read and write
311E000
stack
page read and write
EAD000
trusted library allocation
page execute and read and write
32B0000
heap
page read and write
CFB000
heap
page read and write
880000
unkown
page readonly
30F0000
heap
page read and write
9EF000
stack
page read and write
401000
unkown
page execute read
578B000
heap
page read and write
575E000
stack
page read and write
5F8E000
stack
page read and write
22E0000
heap
page read and write
401000
unkown
page execute read
2DD3000
trusted library allocation
page read and write
3110000
heap
page read and write
2DAD000
stack
page read and write
EC7000
trusted library allocation
page execute and read and write
19B000
stack
page read and write
2FA0000
heap
page read and write
2BAB000
heap
page read and write
57FC000
heap
page read and write
2BA0000
heap
page read and write
3008000
heap
page read and write
BFD000
stack
page read and write
22CE000
stack
page read and write
73D000
stack
page read and write
2BDC000
stack
page read and write
2B4D000
stack
page read and write
3550000
heap
page read and write
3490000
heap
page read and write
2E1B000
trusted library allocation
page read and write
580000
heap
page read and write
2EE0000
heap
page read and write
ED0000
heap
page read and write
447000
unkown
page read and write
2FFD000
stack
page read and write
589E000
stack
page read and write
2DF5000
trusted library allocation
page read and write
50EE000
stack
page read and write
6B90000
heap
page read and write
2668000
heap
page read and write
22B0000
direct allocation
page read and write
445000
unkown
page read and write
32C0000
heap
page read and write
263E000
stack
page read and write
2E7D000
stack
page read and write
35AF000
stack
page read and write
9AE000
stack
page read and write
DE0000
heap
page read and write
10CE000
stack
page read and write
9C000
stack
page read and write
24F1000
direct allocation
page read and write
E9D000
trusted library allocation
page execute and read and write
561F000
stack
page read and write
F16000
heap
page read and write
17D000
stack
page read and write
3350000
heap
page read and write
340F000
unkown
page read and write
2710000
heap
page read and write
6520000
heap
page read and write
3190000
heap
page read and write
2FB0000
heap
page read and write
710000
heap
page read and write
2E01000
trusted library allocation
page read and write
68F8000
stack
page read and write
3030000
heap
page read and write
50F0000
trusted library section
page read and write
3470000
heap
page read and write
3000000
heap
page read and write
2DAD000
trusted library allocation
page read and write
2360000
direct allocation
page read and write
3010000
heap
page read and write
2399000
direct allocation
page read and write
There are 369 hidden memdumps, click here to show them.