IOC Report
proforma invoice.exe

loading gif

Files

File Path
Type
Category
Malicious
proforma invoice.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmpC632.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\zsHSBdyxHEzyp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\proforma invoice.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\zsHSBdyxHEzyp.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4emd4izv.juo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_acibnpvi.ybg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o5xajurp.2hi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rhc0gjp4.xgy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD17D.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\zsHSBdyxHEzyp.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\proforma invoice.exe
"C:\Users\user\Desktop\proforma invoice.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\zsHSBdyxHEzyp.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zsHSBdyxHEzyp" /XML "C:\Users\user\AppData\Local\Temp\tmpC632.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\zsHSBdyxHEzyp.exe
C:\Users\user\AppData\Roaming\zsHSBdyxHEzyp.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zsHSBdyxHEzyp" /XML "C:\Users\user\AppData\Local\Temp\tmpD17D.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.org/
172.67.74.152
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://account.dyn.com/
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.microsoft.
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
https://api.ipify.org/t
unknown
http://www.carterandcone.coml
unknown
http://r3.i.lencr.org/0
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://api.ipify.org
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://r3.o.lencr.org0
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://mail.satsllc.ae
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.satsllc.ae
92.205.14.36
malicious
api.ipify.org
172.67.74.152

IPs

IP
Domain
Country
Malicious
92.205.14.36
mail.satsllc.ae
Germany
malicious
172.67.74.152
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2FB1000
trusted library allocation
page read and write
malicious
2FE4000
trusted library allocation
page read and write
malicious
330C000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2971000
trusted library allocation
page read and write
malicious
7510000
trusted library section
page read and write
malicious
32E1000
trusted library allocation
page read and write
malicious
3CB2000
trusted library allocation
page read and write
malicious
2FDC000
trusted library allocation
page read and write
malicious
3B53000
trusted library allocation
page read and write
malicious
45D2000
trusted library allocation
page read and write
malicious
2811000
trusted library allocation
page read and write
malicious
2FEF000
trusted library allocation
page read and write
6558000
heap
page read and write
2EC1000
trusted library allocation
page read and write
5825000
trusted library allocation
page read and write
70C0000
trusted library allocation
page execute and read and write
A28000
heap
page read and write
4E90000
heap
page read and write
66A9000
trusted library allocation
page read and write
87AE000
stack
page read and write
1040000
heap
page read and write
53A0000
heap
page read and write
6E95000
heap
page read and write
5460000
trusted library allocation
page read and write
17AB000
heap
page read and write
26F0000
trusted library allocation
page read and write
4DD1000
trusted library allocation
page read and write
536C000
stack
page read and write
4DB0000
heap
page read and write
4EC0000
trusted library allocation
page read and write
10E0000
trusted library allocation
page read and write
A81000
heap
page read and write
1164000
heap
page read and write
BED000
trusted library allocation
page execute and read and write
616A000
heap
page read and write
6B4E000
stack
page read and write
940000
heap
page read and write
2FCF000
stack
page read and write
70A0000
trusted library allocation
page execute and read and write
11A3000
heap
page read and write
1728000
heap
page read and write
3B4E000
trusted library allocation
page read and write
26DB000
trusted library allocation
page execute and read and write
BF0000
heap
page read and write
16D7000
trusted library allocation
page execute and read and write
4FEE000
stack
page read and write
2EBE000
trusted library allocation
page read and write
2ACA000
trusted library allocation
page read and write
5C70000
heap
page read and write
1450000
trusted library allocation
page read and write
3903000
trusted library allocation
page read and write
26D7000
trusted library allocation
page execute and read and write
F0E000
stack
page read and write
5AFB000
trusted library allocation
page read and write
2ECD000
trusted library allocation
page read and write
955000
heap
page read and write
4EA0000
trusted library allocation
page execute and read and write
4E00000
trusted library allocation
page read and write
6E65000
heap
page read and write
644E000
stack
page read and write
43E000
remote allocation
page execute and read and write
32C6000
trusted library allocation
page read and write
8B6E000
stack
page read and write
685D000
stack
page read and write
1470000
heap
page read and write
E90000
trusted library allocation
page read and write
531B000
stack
page read and write
6A0E000
stack
page read and write
6D20000
trusted library allocation
page execute and read and write
6800000
trusted library allocation
page read and write
4291000
trusted library allocation
page read and write
6E60000
heap
page read and write
960000
heap
page read and write
430000
heap
page read and write
2B4A000
stack
page read and write
1758000
heap
page read and write
2D40000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
2F97000
trusted library allocation
page read and write
535E000
stack
page read and write
56F000
unkown
page read and write
690D000
stack
page read and write
4F90000
trusted library allocation
page execute and read and write
7551000
heap
page read and write
79E0000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
10ED000
trusted library allocation
page execute and read and write
2600000
heap
page execute and read and write
27CE000
stack
page read and write
4D1D000
trusted library allocation
page read and write
5970000
heap
page read and write
270F000
stack
page read and write
6A4E000
stack
page read and write
616F000
heap
page read and write
2B0D000
stack
page read and write
16A4000
trusted library allocation
page read and write
2EA6000
trusted library allocation
page read and write
E96000
trusted library allocation
page execute and read and write
A050000
trusted library allocation
page execute and read and write
11FF000
heap
page read and write
10F0000
trusted library allocation
page read and write
10E3000
trusted library allocation
page execute and read and write
5B10000
trusted library allocation
page execute and read and write
596C000
stack
page read and write
39EE000
trusted library allocation
page read and write
5BF0000
trusted library allocation
page execute and read and write
940000
heap
page read and write
115A000
heap
page read and write
5D90000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
970000
heap
page read and write
BC0000
trusted library allocation
page read and write
16A3000
trusted library allocation
page execute and read and write
489D000
stack
page read and write
2E90000
heap
page read and write
5BB0000
trusted library allocation
page execute and read and write
315E000
stack
page read and write
6120000
heap
page read and write
1720000
heap
page read and write
A10000
trusted library allocation
page read and write
3A15000
trusted library allocation
page read and write
67EE000
stack
page read and write
EA7000
trusted library allocation
page execute and read and write
167E000
stack
page read and write
42FB000
trusted library allocation
page read and write
2E3F000
unkown
page read and write
3291000
trusted library allocation
page read and write
5980000
heap
page execute and read and write
968000
heap
page read and write
111B000
trusted library allocation
page execute and read and write
5C20000
heap
page read and write
4DE0000
trusted library allocation
page read and write
1112000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
4850000
trusted library allocation
page read and write
16D5000
trusted library allocation
page execute and read and write
4DC0000
trusted library allocation
page execute and read and write
2780000
heap
page execute and read and write
54DE000
stack
page read and write
AD000
stack
page read and write
16A0000
trusted library allocation
page read and write
5A60000
trusted library allocation
page execute and read and write
2E8E000
stack
page read and write
1106000
trusted library allocation
page execute and read and write
1970000
heap
page read and write
AC6000
heap
page read and write
3A75000
trusted library allocation
page read and write
950000
heap
page read and write
AB4F000
stack
page read and write
4A6C000
stack
page read and write
896D000
stack
page read and write
4DDD000
trusted library allocation
page read and write
125B000
stack
page read and write
2E80000
trusted library allocation
page read and write
24E0000
trusted library allocation
page read and write
657E000
stack
page read and write
EAB000
trusted library allocation
page execute and read and write
5BA0000
heap
page read and write
252E000
stack
page read and write
4E70000
heap
page read and write
E0E000
stack
page read and write
1130000
heap
page read and write
2EAB000
trusted library allocation
page read and write
E92000
trusted library allocation
page read and write
2890000
heap
page read and write
CFF000
stack
page read and write
7530000
heap
page read and write
8F7000
stack
page read and write
903D000
stack
page read and write
5AF0000
trusted library allocation
page read and write
26C6000
trusted library allocation
page execute and read and write
1115000
trusted library allocation
page execute and read and write
2850000
trusted library allocation
page read and write
16DB000
trusted library allocation
page execute and read and write
8C6F000
stack
page read and write
6FA0000
heap
page read and write
A84B000
stack
page read and write
1530000
heap
page read and write
703F000
stack
page read and write
BD0000
trusted library allocation
page read and write
25E4000
trusted library allocation
page read and write
6F9E000
stack
page read and write
2EB0000
heap
page read and write
96E000
heap
page read and write
5A7B000
stack
page read and write
6EB7000
heap
page read and write
1A0000
heap
page read and write
5800000
trusted library allocation
page read and write
97F000
heap
page read and write
26CA000
trusted library allocation
page execute and read and write
32DD000
trusted library allocation
page read and write
16C6000
trusted library allocation
page execute and read and write
521E000
stack
page read and write
259E000
stack
page read and write
4D0E000
trusted library allocation
page read and write
2E93000
heap
page read and write
E9A000
trusted library allocation
page execute and read and write
6CFD000
stack
page read and write
25E0000
trusted library allocation
page read and write
4DB4000
trusted library allocation
page read and write
52DE000
stack
page read and write
1535000
heap
page read and write
A261000
heap
page read and write
710A000
trusted library allocation
page read and write
292F000
trusted library allocation
page read and write
1936000
trusted library allocation
page read and write
5BD0000
trusted library allocation
page read and write
5080000
heap
page read and write
501E000
stack
page read and write
2830000
trusted library allocation
page execute and read and write
691F000
stack
page read and write
2EB2000
trusted library allocation
page read and write
4DF3000
heap
page read and write
1167000
heap
page read and write
4472000
trusted library allocation
page read and write
A6A0000
heap
page read and write
5000000
trusted library allocation
page read and write
2FD8000
trusted library allocation
page read and write
9FE000
stack
page read and write
26BD000
trusted library allocation
page execute and read and write
4D11000
trusted library allocation
page read and write
2EBA000
trusted library allocation
page read and write
709E000
stack
page read and write
6FFE000
stack
page read and write
3AF1000
trusted library allocation
page read and write
5D4E000
stack
page read and write
4ED0000
heap
page read and write
1930000
trusted library allocation
page read and write
1710000
trusted library allocation
page read and write
1430000
trusted library allocation
page read and write
2F6C000
trusted library allocation
page read and write
4CF0000
trusted library allocation
page read and write
4DE2000
trusted library allocation
page read and write
16CA000
trusted library allocation
page execute and read and write
2F9F000
trusted library allocation
page read and write
A69E000
stack
page read and write
A3D000
trusted library allocation
page execute and read and write
2882000
trusted library allocation
page read and write
3306000
trusted library allocation
page read and write
270F000
stack
page read and write
280E000
stack
page read and write
330A000
trusted library allocation
page read and write
25DC000
stack
page read and write
400000
remote allocation
page execute and read and write
4DE0000
trusted library allocation
page read and write
519E000
stack
page read and write
ADA000
heap
page read and write
546E000
stack
page read and write
29E2000
trusted library allocation
page read and write
5830000
heap
page read and write
5B7D000
stack
page read and write
6970000
trusted library allocation
page read and write
17F7000
heap
page read and write
6D10000
heap
page read and write
5BC0000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page read and write
6D20000
trusted library allocation
page execute and read and write
10D0000
trusted library allocation
page read and write
3BF5000
trusted library allocation
page read and write
5B55000
heap
page read and write
4DD4000
trusted library allocation
page read and write
6588000
heap
page read and write
584E000
stack
page read and write
3971000
trusted library allocation
page read and write
560C000
stack
page read and write
9140000
trusted library allocation
page execute and read and write
6100000
heap
page read and write
5B50000
heap
page read and write
49AC000
stack
page read and write
8EBC000
stack
page read and write
3FCB000
trusted library allocation
page read and write
5B90000
heap
page read and write
2C68000
trusted library allocation
page read and write
4E30000
heap
page read and write
17B9000
heap
page read and write
3C72000
trusted library allocation
page read and write
570E000
stack
page read and write
5C00000
heap
page read and write
110A000
trusted library allocation
page execute and read and write
16AD000
trusted library allocation
page execute and read and write
4D70000
trusted library allocation
page read and write
2C5E000
stack
page read and write
BDD000
trusted library allocation
page execute and read and write
2FF6000
trusted library allocation
page read and write
25E6000
trusted library allocation
page read and write
2FAD000
trusted library allocation
page read and write
A39D000
stack
page read and write
174A000
heap
page read and write
5A8C000
stack
page read and write
505E000
stack
page read and write
F10000
heap
page read and write
3314000
trusted library allocation
page read and write
680D000
trusted library allocation
page read and write
54F0000
heap
page read and write
5ACE000
stack
page read and write
2E40000
heap
page read and write
16C0000
trusted library allocation
page read and write
6808000
trusted library allocation
page read and write
1700000
trusted library allocation
page execute and read and write
7100000
trusted library allocation
page read and write
740E000
stack
page read and write
A19000
heap
page read and write
668E000
stack
page read and write
3F61000
trusted library allocation
page read and write
1476000
heap
page read and write
A59E000
stack
page read and write
308A000
heap
page read and write
2BFE000
unkown
page read and write
9A0000
heap
page read and write
7F1B0000
trusted library allocation
page execute and read and write
150000
heap
page read and write
10E4000
trusted library allocation
page read and write
B80000
heap
page read and write
4D20000
trusted library allocation
page read and write
6570000
heap
page read and write
5A70000
trusted library allocation
page read and write
6B8E000
stack
page read and write
5C10000
heap
page read and write
FF0000
heap
page read and write
A40000
heap
page read and write
27D0000
trusted library allocation
page read and write
6803000
trusted library allocation
page read and write
5090000
heap
page execute and read and write
4DB0000
trusted library allocation
page read and write
4D35000
trusted library allocation
page read and write
A25D000
stack
page read and write
328E000
stack
page read and write
930000
heap
page read and write
BD3000
trusted library allocation
page execute and read and write
7290000
trusted library section
page read and write
1490000
heap
page read and write
1950000
heap
page read and write
7190000
heap
page read and write
EB7000
heap
page read and write
277B000
stack
page read and write
653E000
stack
page read and write
5FFE000
stack
page read and write
6DB2000
trusted library allocation
page read and write
19E000
unkown
page read and write
1976000
heap
page read and write
2F61000
trusted library allocation
page read and write
6CB7000
trusted library allocation
page read and write
4295000
trusted library allocation
page read and write
1117000
trusted library allocation
page execute and read and write
3A63000
trusted library allocation
page read and write
72C0000
trusted library allocation
page execute and read and write
4DD6000
trusted library allocation
page read and write
26CE000
stack
page read and write
2860000
heap
page read and write
72A0000
trusted library allocation
page execute and read and write
5BCE000
stack
page read and write
3180000
heap
page execute and read and write
6DBE000
stack
page read and write
A4E000
heap
page read and write
6E87000
heap
page read and write
2A91000
trusted library allocation
page read and write
2D50000
heap
page read and write
4D16000
trusted library allocation
page read and write
6C8E000
stack
page read and write
1934000
trusted library allocation
page read and write
2D3C000
stack
page read and write
16D0000
trusted library allocation
page read and write
5070000
trusted library section
page readonly
5C9000
stack
page read and write
2863000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
29C3000
trusted library allocation
page read and write
4D22000
trusted library allocation
page read and write
5804000
trusted library allocation
page read and write
1510000
heap
page read and write
5074000
trusted library section
page readonly
5470000
trusted library allocation
page read and write
3979000
trusted library allocation
page read and write
3811000
trusted library allocation
page read and write
5298000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
163E000
stack
page read and write
4DDB000
trusted library allocation
page read and write
545F000
stack
page read and write
57E0000
heap
page read and write
26D0000
trusted library allocation
page read and write
25F0000
trusted library allocation
page read and write
2E60000
heap
page read and write
66EE000
stack
page read and write
5E0000
heap
page read and write
1755000
heap
page read and write
BAA000
stack
page read and write
4FF0000
trusted library allocation
page read and write
7780000
trusted library allocation
page read and write
5020000
heap
page read and write
A33000
trusted library allocation
page execute and read and write
5020000
heap
page execute and read and write
506E000
stack
page read and write
A34000
trusted library allocation
page read and write
70B0000
trusted library allocation
page read and write
65F3000
heap
page read and write
2868000
heap
page read and write
4FDE000
stack
page read and write
6817000
trusted library allocation
page read and write
579000
stack
page read and write
750E000
stack
page read and write
913E000
stack
page read and write
3C71000
trusted library allocation
page read and write
9BE000
stack
page read and write
A3DD000
stack
page read and write
5C60000
heap
page read and write
E9000
stack
page read and write
995000
heap
page read and write
43B000
heap
page read and write
3B11000
trusted library allocation
page read and write
5C05000
heap
page read and write
4ED3000
heap
page read and write
7FCE0000
trusted library allocation
page execute and read and write
B6E000
stack
page read and write
42B9000
trusted library allocation
page read and write
2F50000
heap
page execute and read and write
281D000
stack
page read and write
4D60000
heap
page read and write
872E000
stack
page read and write
1460000
trusted library allocation
page read and write
16D2000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
8497000
trusted library allocation
page read and write
5F0000
heap
page read and write
3080000
heap
page read and write
6967000
trusted library allocation
page read and write
4DDD000
trusted library allocation
page read and write
529E000
stack
page read and write
3316000
trusted library allocation
page read and write
6960000
trusted library allocation
page read and write
430000
unkown
page readonly
4EB4000
trusted library allocation
page read and write
678D000
stack
page read and write
191E000
stack
page read and write
93E000
stack
page read and write
1100000
trusted library allocation
page read and write
9A3000
heap
page read and write
2E5E000
stack
page read and write
2550000
heap
page read and write
4CF4000
trusted library allocation
page read and write
53A0000
heap
page read and write
4E40000
trusted library allocation
page read and write
11B3000
heap
page read and write
6CE0000
trusted library allocation
page read and write
2BB0000
heap
page read and write
4FA0000
trusted library allocation
page execute and read and write
5500000
heap
page execute and read and write
8DBB000
stack
page read and write
AA4E000
stack
page read and write
432000
unkown
page readonly
4E10000
trusted library allocation
page read and write
3290000
heap
page read and write
14C0000
heap
page read and write
4DCE000
trusted library allocation
page read and write
A94C000
stack
page read and write
6880000
trusted library allocation
page execute and read and write
1440000
trusted library allocation
page execute and read and write
6860000
trusted library allocation
page execute and read and write
6D60000
heap
page read and write
4DE000
unkown
page readonly
13B0000
heap
page read and write
655A000
heap
page read and write
A30000
trusted library allocation
page read and write
6104000
heap
page read and write
EA2000
trusted library allocation
page read and write
4D40000
trusted library allocation
page read and write
2EAE000
trusted library allocation
page read and write
2530000
trusted library allocation
page execute and read and write
150E000
stack
page read and write
3F89000
trusted library allocation
page read and write
2F2C000
stack
page read and write
6FBE000
stack
page read and write
6CAD000
trusted library allocation
page read and write
2D44000
trusted library allocation
page read and write
2540000
trusted library allocation
page read and write
6870000
trusted library allocation
page read and write
16B0000
trusted library allocation
page read and write
1045000
heap
page read and write
5C5E000
stack
page read and write
531E000
stack
page read and write
1359000
stack
page read and write
D0F000
stack
page read and write
57F4000
trusted library allocation
page read and write
A55E000
stack
page read and write
610E000
heap
page read and write
6DFE000
stack
page read and write
1050000
heap
page read and write
3308000
trusted library allocation
page read and write
A4A000
heap
page read and write
1690000
trusted library allocation
page read and write
32CF000
trusted library allocation
page read and write
1D0000
heap
page read and write
2EC6000
trusted library allocation
page read and write
8EFE000
stack
page read and write
296E000
stack
page read and write
1102000
trusted library allocation
page read and write
7960000
trusted library section
page read and write
A84000
heap
page read and write
876E000
stack
page read and write
26D2000
trusted library allocation
page read and write
4E05000
trusted library allocation
page read and write
7110000
trusted library allocation
page read and write
5A5F000
stack
page read and write
2A35000
trusted library allocation
page read and write
8F7000
stack
page read and write
594E000
stack
page read and write
EB0000
heap
page read and write
484E000
stack
page read and write
26C2000
trusted library allocation
page read and write
39C7000
trusted library allocation
page read and write
2FDA000
trusted library allocation
page read and write
1940000
trusted library allocation
page read and write
A0AE000
stack
page read and write
10FD000
trusted library allocation
page execute and read and write
16F0000
trusted library allocation
page read and write
6E8E000
heap
page read and write
3819000
trusted library allocation
page read and write
8CAE000
stack
page read and write
A20000
heap
page read and write
A3C000
heap
page read and write
4EBB000
trusted library allocation
page read and write
8FFE000
stack
page read and write
273E000
stack
page read and write
5D99000
trusted library allocation
page read and write
27DA000
trusted library allocation
page read and write
5D0F000
stack
page read and write
1920000
trusted library allocation
page read and write
BE0000
trusted library allocation
page read and write
26C0000
trusted library allocation
page read and write
6550000
heap
page read and write
61AD000
heap
page read and write
5C57000
heap
page read and write
4DF0000
heap
page read and write
8A08000
trusted library allocation
page read and write
16C2000
trusted library allocation
page read and write
5C0E000
stack
page read and write
5D8E000
stack
page read and write
BD4000
trusted library allocation
page read and write
26B0000
trusted library allocation
page read and write
5B80000
trusted library section
page readonly
4D30000
trusted library allocation
page read and write
1110000
trusted library allocation
page read and write
588D000
stack
page read and write
66A0000
trusted library allocation
page read and write
667D000
stack
page read and write
8970000
heap
page read and write
A77000
heap
page read and write
2558000
heap
page read and write
654B000
stack
page read and write
574E000
stack
page read and write
5819000
trusted library allocation
page read and write
EF9000
stack
page read and write
There are 545 hidden memdumps, click here to show them.