IOC Report
1m181Ru74o.exe

loading gif

Files

File Path
Type
Category
Malicious
1m181Ru74o.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\remcos\logs.dat
data
dropped
malicious
C:\Users\Public\Libraries\Ntmftfld
data
dropped
malicious
C:\Users\Public\Libraries\Ntmftfld.PIF
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Ntmftfld.url
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Ntmftfld.PIF">), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\Public\Libraries\PNO
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Libraries\dlftfmtN.cmd
DOS batch file, Unicode text, UTF-8 text, with very long lines (324), with CRLF line terminators
dropped
C:\Users\Public\alpha.pif
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\Public\xpha.pif
PE32 executable (console) Intel 80386, for MS Windows
dropped
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped
\Device\Null
ASCII text, with CRLF, CR line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1m181Ru74o.exe
"C:\Users\user\Desktop\1m181Ru74o.exe"
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl.exe /y C:\Users\user\Desktop\1m181Ru74o.exe /d C:\\Users\\Public\\Libraries\\Ntmftfld.PIF /o
malicious
C:\Windows\SysWOW64\SndVol.exe
C:\Windows\System32\SndVol.exe
malicious
C:\Users\Public\Libraries\Ntmftfld.PIF
"C:\Users\Public\Libraries\Ntmftfld.PIF"
malicious
C:\Windows\SysWOW64\colorcpl.exe
C:\Windows\System32\colorcpl.exe
malicious
C:\Users\Public\Libraries\Ntmftfld.PIF
"C:\Users\Public\Libraries\Ntmftfld.PIF"
malicious
C:\Windows\SysWOW64\colorcpl.exe
C:\Windows\System32\colorcpl.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\dlftfmtN.cmd" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://aarzoomarine.com/wp-content/plugins/231_Ntmftfldhfc
103.101.59.23
malicious
craekuro.duckdns.org
malicious
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
unknown
http://geoplugin.net/json.gp
unknown
http://crl.mJ
unknown
https://sectigo.com/CPS0
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
http://geoplugin.net/json.gp/C
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
unknown
http://www.microsoft.co
unknown
https://aarzoomarine.com:443/wp-content/plugins/231_Ntmftfldhfc
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://www.pmail.com
unknown
https://aarzoomarine.com/owa
unknown
http://ocsp.sectigo.com0C
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
aarzoomarine.com
103.101.59.23
malicious
craekuro.duckdns.org
172.111.212.138
malicious

IPs

IP
Domain
Country
Malicious
172.111.212.138
craekuro.duckdns.org
United States
malicious
103.101.59.23
aarzoomarine.com
India
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Ntmftfld
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-YHG91Z
exepath
HKEY_CURRENT_USER\SOFTWARE\Rmc-YHG91Z
licence
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%systemroot%\system32\colorui.dll,-1400
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ICM\ProfileAssociations\Print\Fax
UsePerUserProfiles

Memdumps

Base Address
Regiontype
Protect
Malicious
6D30000
remote allocation
page execute and read and write
malicious
30F9000
heap
page read and write
malicious
2ADD000
heap
page read and write
malicious
2AC7000
heap
page read and write
malicious
305C000
heap
page read and write
malicious
48E0000
remote allocation
page execute and read and write
malicious
302F000
heap
page read and write
malicious
400000
direct allocation
page execute and read and write
malicious
25A3F000
stack
page read and write
malicious
3062000
heap
page read and write
malicious
30F9000
heap
page read and write
malicious
2AA7000
heap
page read and write
malicious
400000
direct allocation
page execute and read and write
malicious
7090000
remote allocation
page execute and read and write
malicious
400000
direct allocation
page execute and read and write
malicious
1514E000
stack
page read and write
3B750000
trusted library allocation
page read and write
2F9D000
heap
page read and write
2276000
direct allocation
page read and write
4F3B000
heap
page read and write
2F83000
heap
page read and write
307E000
stack
page read and write
4D10000
direct allocation
page read and write
475000
unkown
page readonly
3024000
heap
page read and write
2ADD000
heap
page read and write
7E850000
direct allocation
page read and write
2FB2000
direct allocation
page read and write
7E7B0000
direct allocation
page read and write
93F000
stack
page read and write
15F0E000
heap
page read and write
3730F000
stack
page read and write
24640000
trusted library allocation
page read and write
2DA0000
heap
page read and write
4B40000
heap
page read and write
2321000
direct allocation
page read and write
30EA000
heap
page read and write
21C0000
heap
page read and write
153FE000
stack
page read and write
7ED20000
direct allocation
page read and write
2F85000
heap
page read and write
7FC5F000
direct allocation
page read and write
4BD0000
heap
page read and write
2F9E000
heap
page read and write
2F83000
heap
page read and write
30F1000
heap
page read and write
D3E000
stack
page read and write
1AC0F000
stack
page read and write
65A000
heap
page read and write
15510000
heap
page read and write
7E8D0000
direct allocation
page read and write
2941000
heap
page read and write
2EB0000
direct allocation
page readonly
36F8E000
stack
page read and write
B40000
heap
page read and write
2341000
direct allocation
page read and write
1A49E000
stack
page read and write
7E8AF000
direct allocation
page read and write
29A0000
heap
page read and write
15BC1000
heap
page read and write
62E000
stack
page read and write
2995000
heap
page read and write
1555E000
stack
page read and write
2D95000
heap
page read and write
6DB000
heap
page read and write
2F9D000
heap
page read and write
2B2F000
heap
page read and write
1AC20000
heap
page read and write
2E1F000
heap
page read and write
4B0B000
stack
page read and write
4BD4000
heap
page read and write
4F5C000
heap
page read and write
19D000
stack
page read and write
7E860000
direct allocation
page read and write
2EF0000
heap
page read and write
475000
direct allocation
page execute and read and write
7E490000
direct allocation
page read and write
2520000
heap
page read and write
6790000
trusted library allocation
page read and write
636000
heap
page read and write
5A0000
heap
page read and write
36F2F000
stack
page read and write
24F3000
heap
page read and write
152BE000
stack
page read and write
7E8D0000
direct allocation
page read and write
7EE000
stack
page read and write
1A87E000
stack
page read and write
461000
unkown
page read and write
2DCF000
unkown
page read and write
19D000
stack
page read and write
461000
unkown
page read and write
4404000
heap
page read and write
15B4C000
heap
page read and write
2F84000
heap
page read and write
4F55000
heap
page read and write
3010000
heap
page read and write
1A59F000
stack
page read and write
36DFD000
direct allocation
page read and write
83B000
heap
page read and write
29CE000
stack
page read and write
1A9CE000
stack
page read and write
7FAE0000
direct allocation
page read and write
1A434000
direct allocation
page read and write
30A8000
heap
page read and write
14E01000
direct allocation
page read and write
2420000
heap
page read and write
2F84000
heap
page read and write
3165000
heap
page read and write
7F230000
direct allocation
page read and write
65E000
heap
page read and write
1AC27000
heap
page read and write
2A3F000
stack
page read and write
585000
unkown
page readonly
7F15B000
direct allocation
page read and write
C20000
heap
page read and write
3038000
heap
page read and write
25AFC000
stack
page read and write
7F1AE000
direct allocation
page read and write
63B000
heap
page read and write
304B000
heap
page read and write
7E6B0000
direct allocation
page read and write
2F9E000
heap
page read and write
7EF70000
direct allocation
page read and write
2CCE000
unkown
page read and write
590000
heap
page read and write
24CE000
stack
page read and write
15AEF000
heap
page read and write
461000
unkown
page read and write
2F9D000
heap
page read and write
15B0F000
heap
page read and write
15AB1000
heap
page read and write
303B000
heap
page read and write
1A418000
direct allocation
page read and write
63B000
heap
page read and write
D3E000
stack
page read and write
3BB000
stack
page read and write
15B13000
heap
page read and write
824000
heap
page read and write
4F55000
heap
page read and write
2F84000
heap
page read and write
7E3C0000
direct allocation
page read and write
2AA4000
heap
page read and write
670000
heap
page read and write
630000
heap
page read and write
2F85000
heap
page read and write
2D9F000
stack
page read and write
7EE30000
direct allocation
page read and write
4B09000
stack
page read and write
83D000
heap
page read and write
46E000
unkown
page read and write
7FD70000
direct allocation
page read and write
36E04000
direct allocation
page read and write
25D10000
heap
page read and write
2200000
heap
page read and write
36DEF000
direct allocation
page read and write
3070000
heap
page read and write
24F0000
heap
page read and write
2F7C000
heap
page read and write
1A5DE000
stack
page read and write
15BB0000
trusted library allocation
page read and write
2A8C000
stack
page read and write
7E940000
direct allocation
page read and write
502D000
stack
page read and write
25E40000
heap
page read and write
2333000
direct allocation
page read and write
2F9D000
heap
page read and write
4E7E000
direct allocation
page read and write
800000
heap
page read and write
3100000
heap
page read and write
9BB000
stack
page read and write
7F230000
direct allocation
page read and write
37D000
stack
page read and write
835000
heap
page read and write
2B2F000
stack
page read and write
7E720000
direct allocation
page read and write
625000
heap
page read and write
66E000
stack
page read and write
2F83000
heap
page read and write
636000
heap
page read and write
36E13000
direct allocation
page read and write
2F9D000
heap
page read and write
7E7D0000
direct allocation
page read and write
2396000
heap
page read and write
7E7AF000
direct allocation
page read and write
2318000
direct allocation
page read and write
29FE000
stack
page read and write
2830000
heap
page read and write
153BF000
stack
page read and write
21C6000
heap
page read and write
7FC6F000
direct allocation
page read and write
1AC10000
heap
page read and write
9B000
stack
page read and write
509F000
stack
page read and write
2F9D000
heap
page read and write
4F20000
heap
page read and write
28E0000
heap
page read and write
2F85000
heap
page read and write
2CF7000
heap
page read and write
2324000
direct allocation
page read and write
4B80000
heap
page read and write
637000
heap
page read and write
16580000
direct allocation
page execute and read and write
2F84000
heap
page read and write
2340000
heap
page read and write
30C4000
heap
page read and write
232C000
direct allocation
page read and write
7E6A0000
direct allocation
page read and write
1A3E3000
direct allocation
page read and write
25B7D000
stack
page read and write
3770F000
stack
page read and write
2F15000
heap
page read and write
835000
heap
page read and write
690000
heap
page read and write
7E620000
direct allocation
page read and write
4F45000
heap
page read and write
4F5C000
heap
page read and write
4400000
heap
page read and write
2F9D000
heap
page read and write
69D000
heap
page read and write
37820000
trusted library allocation
page read and write
7EE50000
direct allocation
page read and write
2470000
direct allocation
page execute and read and write
4F5C000
heap
page read and write
290C000
heap
page read and write
4E10000
direct allocation
page read and write
7EE50000
direct allocation
page read and write
81A000
heap
page read and write
3034000
heap
page read and write
7F14D000
direct allocation
page read and write
14DDD000
direct allocation
page read and write
4F3A000
heap
page read and write
2F31000
direct allocation
page execute read
30DD000
heap
page read and write
2F9D000
heap
page read and write
2F6F000
stack
page read and write
2F85000
direct allocation
page read and write
2F83000
heap
page read and write
4E8C000
direct allocation
page read and write
2304000
direct allocation
page read and write
22E0000
direct allocation
page read and write
7EEB0000
direct allocation
page read and write
302E000
direct allocation
page read and write
6D5000
heap
page read and write
294E000
stack
page read and write
420000
heap
page read and write
824000
heap
page read and write
46E000
stack
page read and write
4F55000
heap
page read and write
2F9D000
heap
page read and write
15690000
remote allocation
page read and write
4F29000
heap
page read and write
310E000
heap
page read and write
7F830000
direct allocation
page read and write
61A000
heap
page read and write
4BBE000
stack
page read and write
24EC000
stack
page read and write
471000
direct allocation
page execute and read and write
31A0000
heap
page read and write
2F5E000
direct allocation
page read and write
4B90000
heap
page read and write
2F83000
heap
page read and write
7EEB0000
direct allocation
page read and write
650000
heap
page read and write
36F2A000
stack
page read and write
2F9E000
heap
page read and write
C8B000
stack
page read and write
156DE000
stack
page read and write
7FBC0000
direct allocation
page read and write
437B000
stack
page read and write
7F9B0000
direct allocation
page read and write
63B000
heap
page read and write
2B2E000
stack
page execute and read and write
471000
direct allocation
page execute and read and write
1A42D000
direct allocation
page read and write
14DD6000
direct allocation
page read and write
7E990000
direct allocation
page read and write
3008000
heap
page read and write
1500F000
stack
page read and write
1A44A000
direct allocation
page read and write
684000
heap
page read and write
37720000
heap
page read and write
7E68F000
direct allocation
page read and write
4EE000
stack
page read and write
22C5000
direct allocation
page read and write
475000
direct allocation
page execute and read and write
30C4000
heap
page read and write
5B0000
heap
page read and write
15B1E000
heap
page read and write
1AD20000
trusted library allocation
page read and write
2CFC000
heap
page read and write
3771F000
trusted library allocation
page read and write
1F5000
heap
page read and write
2F9D000
heap
page read and write
2313000
direct allocation
page read and write
7E940000
direct allocation
page read and write
7FC10000
direct allocation
page read and write
7EC90000
direct allocation
page read and write
15BC5000
heap
page read and write
5120000
trusted library allocation
page read and write
7E910000
direct allocation
page read and write
14CD0000
direct allocation
page read and write
637000
heap
page read and write
2380000
direct allocation
page execute and read and write
15690000
remote allocation
page read and write
22ED000
direct allocation
page read and write
7FA50000
direct allocation
page read and write
7E740000
direct allocation
page read and write
2F83000
heap
page read and write
635000
heap
page read and write
15AEC000
heap
page read and write
5FE000
stack
page read and write
15AB0000
heap
page read and write
2303000
direct allocation
page read and write
4D79000
direct allocation
page read and write
2360000
heap
page read and write
7F899000
direct allocation
page read and write
293F000
stack
page read and write
2F70000
heap
page read and write
3100000
heap
page read and write
19D000
stack
page read and write
3080000
heap
page read and write
2E1C000
heap
page read and write
5D0000
heap
page read and write
3068000
heap
page read and write
2F9D000
heap
page read and write
30CF000
heap
page read and write
2E2F000
stack
page read and write
374BE000
stack
page read and write
3052000
heap
page read and write
1A41F000
direct allocation
page read and write
2348000
direct allocation
page read and write
2B2F000
heap
page read and write
2FB7000
direct allocation
page execute and read and write
2AD6000
heap
page read and write
14DF3000
direct allocation
page read and write
2F83000
heap
page read and write
2F9D000
heap
page read and write
286A000
heap
page read and write
230A000
direct allocation
page read and write
16260000
trusted library allocation
page read and write
2311000
direct allocation
page read and write
259BB000
stack
page read and write
2DEE000
stack
page read and write
46C000
unkown
page read and write
4B70000
heap
page read and write
83B000
heap
page read and write
36E21000
direct allocation
page read and write
305A000
heap
page read and write
2E30000
heap
page read and write
36DF6000
direct allocation
page read and write
2F9D000
heap
page read and write
297B000
heap
page read and write
25B3F000
stack
page read and write
233A000
direct allocation
page read and write
2423000
heap
page read and write
6F90000
heap
page read and write
C45000
stack
page read and write
2AA0000
heap
page read and write
7E860000
direct allocation
page read and write
9B000
stack
page read and write
4BC0000
heap
page read and write
43A0000
heap
page read and write
15BC0000
heap
page read and write
2F9D000
heap
page read and write
22FC000
direct allocation
page read and write
2990000
heap
page read and write
2300000
direct allocation
page read and write
7AE000
stack
page read and write
1F7000
heap
page read and write
83B000
heap
page read and write
2F9E000
heap
page read and write
14DEC000
direct allocation
page read and write
14F0A000
stack
page read and write
2E0E000
stack
page read and write
1A458000
direct allocation
page read and write
14F0F000
stack
page read and write
302B000
direct allocation
page read and write
CF0000
heap
page read and write
2EDE000
direct allocation
page read and write
7F230000
direct allocation
page read and write
303D000
heap
page read and write
22C2000
direct allocation
page read and write
2328000
direct allocation
page read and write
14D07000
direct allocation
page read and write
3B75F000
trusted library allocation
page read and write
2BDE000
heap
page read and write
30D7000
heap
page read and write
60E000
heap
page read and write
2F83000
heap
page read and write
2904000
heap
page read and write
1A426000
direct allocation
page read and write
1524F000
stack
page read and write
1510F000
stack
page read and write
7ECF0000
direct allocation
page read and write
22F2000
direct allocation
page read and write
7EEB0000
direct allocation
page read and write
15CEE000
heap
page read and write
63B000
heap
page read and write
60A000
heap
page read and write
15B42000
heap
page read and write
15AB1000
heap
page read and write
46B000
unkown
page write copy
577000
unkown
page readonly
4FEB000
stack
page read and write
505E000
stack
page read and write
81C000
heap
page read and write
15AB4000
heap
page read and write
16264000
heap
page read and write
1AB0E000
stack
page read and write
3160000
heap
page read and write
1A71E000
stack
page read and write
7E940000
direct allocation
page read and write
37710000
trusted library allocation
page read and write
15B46000
heap
page read and write
625000
heap
page read and write
659000
heap
page read and write
7EDC0000
direct allocation
page read and write
835000
heap
page read and write
4380000
heap
page read and write
93F000
stack
page read and write
53E0000
direct allocation
page read and write
5E0000
heap
page read and write
2F83000
heap
page read and write
154FD000
stack
page read and write
7F048000
direct allocation
page read and write
775000
heap
page read and write
1BB000
stack
page read and write
2370000
direct allocation
page execute and read and write
3760E000
stack
page read and write
7F8A0000
direct allocation
page read and write
7ECFF000
direct allocation
page read and write
7FC20000
direct allocation
page read and write
7EE50000
direct allocation
page read and write
7EC30000
direct allocation
page read and write
2440000
heap
page read and write
30CF000
heap
page read and write
748000
heap
page read and write
4ACD000
stack
page read and write
2860000
heap
page read and write
375C0000
heap
page read and write
8CF000
stack
page read and write
7F830000
direct allocation
page read and write
808000
heap
page read and write
7E910000
direct allocation
page read and write
7ECEF000
direct allocation
page read and write
287A000
heap
page read and write
5A0000
heap
page read and write
3B9000
stack
page read and write
163F0000
heap
page read and write
5EE000
stack
page read and write
14DC8000
direct allocation
page read and write
7EF20000
direct allocation
page read and write
1591E000
stack
page read and write
2F9D000
heap
page read and write
30F1000
heap
page read and write
7E5A0000
direct allocation
page read and write
7F1BC000
direct allocation
page read and write
1F0000
heap
page read and write
7E550000
direct allocation
page read and write
2F10000
heap
page read and write
313E000
stack
page read and write
609000
heap
page read and write
61A000
heap
page read and write
693000
heap
page read and write
44A6000
heap
page read and write
2AA4000
heap
page read and write
4B60000
heap
page read and write
7EEB0000
direct allocation
page read and write
3720E000
stack
page read and write
2F9D000
heap
page read and write
461000
unkown
page write copy
370CE000
stack
page read and write
15BD0000
heap
page read and write
7E71F000
direct allocation
page read and write
2FB0000
heap
page read and write
2F9D000
heap
page read and write
302F000
heap
page read and write
30AB000
direct allocation
page read and write
AFC000
stack
page read and write
2F84000
heap
page read and write
30DA000
heap
page read and write
600000
heap
page read and write
3107000
heap
page read and write
46C000
unkown
page read and write
14D37000
direct allocation
page read and write
4BF0000
heap
page read and write
2F5E000
direct allocation
page read and write
2E36000
heap
page read and write
2F9D000
heap
page read and write
7E850000
direct allocation
page read and write
7EEA0000
direct allocation
page read and write
16260000
direct allocation
page execute and read and write
7EE50000
direct allocation
page read and write
2523000
heap
page read and write
2A0E000
stack
page read and write
1AACE000
stack
page read and write
2585000
stack
page read and write
375BE000
stack
page read and write
2206000
heap
page read and write
475000
direct allocation
page execute and read and write
32A6000
heap
page read and write
6AB000
heap
page read and write
7F890000
direct allocation
page read and write
3030000
heap
page read and write
5110000
heap
page read and write
7FA30000
direct allocation
page read and write
975000
stack
page read and write
2F9D000
heap
page read and write
73E000
stack
page read and write
44A0000
heap
page read and write
72E000
stack
page read and write
2D9F000
stack
page read and write
7FC00000
direct allocation
page read and write
2E60000
heap
page read and write
620000
heap
page read and write
4F55000
heap
page read and write
25D00000
heap
page read and write
4E8E000
stack
page read and write
690000
heap
page read and write
1A81F000
stack
page read and write
825000
heap
page read and write
298F000
stack
page read and write
1A6DF000
stack
page read and write
4F20000
trusted library allocation
page read and write
14DC0000
direct allocation
page read and write
25BBF000
stack
page read and write
4F45000
heap
page read and write
7E846000
direct allocation
page read and write
2EB1000
direct allocation
page execute read
7E840000
direct allocation
page read and write
7DD000
stack
page read and write
2908000
heap
page read and write
1581E000
stack
page read and write
470000
unkown
page write copy
25A40000
heap
page read and write
30AB000
direct allocation
page execute and read and write
4F0000
heap
page read and write
2597D000
stack
page read and write
4E4B000
stack
page read and write
159A4000
heap
page read and write
81A000
heap
page read and write
2DA0000
heap
page read and write
7E91A000
direct allocation
page read and write
64AF000
stack
page read and write
1A97F000
stack
page read and write
7E8AF000
direct allocation
page read and write
36D7A000
direct allocation
page read and write
6530000
trusted library allocation
page read and write
2ADD000
heap
page read and write
5D7000
heap
page read and write
2350000
heap
page read and write
7E8C0000
direct allocation
page read and write
14DFA000
direct allocation
page read and write
2F84000
heap
page read and write
231D000
direct allocation
page read and write
636000
heap
page read and write
23FC000
stack
page read and write
7F8EF000
direct allocation
page read and write
22FD000
direct allocation
page read and write
28E4000
heap
page read and write
2A19000
heap
page read and write
7FABF000
direct allocation
page read and write
A1F000
stack
page read and write
22D0000
direct allocation
page read and write
2F9E000
heap
page read and write
2B2A000
stack
page read and write
2460000
heap
page read and write
471000
direct allocation
page execute and read and write
14DCF000
direct allocation
page read and write
7E8AF000
direct allocation
page read and write
15CE0000
heap
page read and write
7EEF0000
direct allocation
page read and write
400000
unkown
page readonly
46C000
unkown
page read and write
2866000
heap
page read and write
9B000
stack
page read and write
1A451000
direct allocation
page read and write
7F1C0000
direct allocation
page read and write
14E08000
direct allocation
page read and write
4F5C000
heap
page read and write
371CF000
stack
page read and write
7E860000
direct allocation
page read and write
3708F000
stack
page read and write
3101000
heap
page read and write
15690000
remote allocation
page read and write
15BBF000
trusted library allocation
page read and write
2908000
heap
page read and write
37721000
heap
page read and write
2C60000
heap
page read and write
5D0000
heap
page read and write
15B17000
heap
page read and write
2DEE000
stack
page read and write
6C3000
heap
page read and write
2F9E000
heap
page read and write
22F4000
direct allocation
page read and write
401000
unkown
page execute read
2F9D000
heap
page read and write
3052000
heap
page read and write
6EE000
stack
page read and write
824000
heap
page read and write
1B9000
stack
page read and write
5A0000
heap
page read and write
1AC21000
heap
page read and write
5D5000
heap
page read and write
625000
heap
page read and write
4D10000
heap
page read and write
16226000
direct allocation
page read and write
30F8000
heap
page read and write
46E000
unkown
page read and write
157DF000
stack
page read and write
679000
heap
page read and write
2F9D000
heap
page read and write
2FB4000
direct allocation
page read and write
15B3E000
heap
page read and write
32A0000
heap
page read and write
1A443000
direct allocation
page read and write
7E620000
direct allocation
page read and write
90E000
stack
page read and write
A0F000
stack
page read and write
7FC90000
direct allocation
page read and write
2E3A000
heap
page read and write
2B3E000
heap
page read and write
2F9E000
heap
page read and write
3737E000
stack
page read and write
231A000
direct allocation
page read and write
7EF3F000
direct allocation
page read and write
25CC000
stack
page read and write
36E28000
direct allocation
page read and write
740000
heap
page read and write
C20000
heap
page read and write
7E8D0000
direct allocation
page read and write
1565E000
stack
page read and write
3100000
heap
page read and write
2F9D000
heap
page read and write
2F9D000
heap
page read and write
30A0000
heap
page read and write
4B40000
direct allocation
page read and write
2F9D000
heap
page read and write
259FD000
stack
page read and write
32AA000
heap
page read and write
36E1A000
direct allocation
page read and write
3747F000
stack
page read and write
81C000
heap
page read and write
7EEFF000
direct allocation
page read and write
30FB000
heap
page read and write
78A000
heap
page read and write
91F000
stack
page read and write
3024000
heap
page read and write
2F85000
direct allocation
page read and write
7EF70000
direct allocation
page read and write
2F83000
heap
page read and write
7E520000
direct allocation
page read and write
2F9D000
heap
page read and write
2390000
heap
page read and write
4F5C000
heap
page read and write
14F0E000
stack
page execute and read and write
36F2E000
stack
page execute and read and write
43ED000
stack
page read and write
5830000
trusted library allocation
page read and write
17D000
stack
page read and write
4AF000
stack
page read and write
A3F000
stack
page read and write
3000000
heap
page read and write
294F000
heap
page read and write
600000
heap
page read and write
230C000
direct allocation
page read and write
14D7E000
direct allocation
page read and write
4F0F000
stack
page read and write
590000
heap
page read and write
7E8D0000
direct allocation
page read and write
3070000
heap
page read and write
14DE4000
direct allocation
page read and write
2370000
heap
page read and write
83B000
heap
page read and write
There are 664 hidden memdumps, click here to show them.