IOC Report
REMITTANCE COPY.exe

loading gif

Files

File Path
Type
Category
Malicious
REMITTANCE COPY.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmpEBC.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\CNqCubHKvlzbGo.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\CNqCubHKvlzbGo.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\REMITTANCE COPY.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1bm1gfd0.v4w.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b35eofy5.2rh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h0j0r0ga.coo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hwkahjeg.gvv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mafaltug.kxg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ucxesdxz.ono.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vcz4ovjx.hcb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zghntjoj.vi5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp20AE.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\CNqCubHKvlzbGo.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\REMITTANCE COPY.exe
"C:\Users\user\Desktop\REMITTANCE COPY.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\REMITTANCE COPY.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\CNqCubHKvlzbGo.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CNqCubHKvlzbGo" /XML "C:\Users\user\AppData\Local\Temp\tmpEBC.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Users\user\AppData\Roaming\CNqCubHKvlzbGo.exe
C:\Users\user\AppData\Roaming\CNqCubHKvlzbGo.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CNqCubHKvlzbGo" /XML "C:\Users\user\AppData\Local\Temp\tmp20AE.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://tempuri.org/x.xsd?MultiGames.Properties.Resources
unknown
http://mail.tabcoeng.com
unknown
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/zuppao).
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com
unknown

Domains

Name
IP
Malicious
mail.tabcoeng.com
135.181.124.14
malicious
bg.microsoft.map.fastly.net
199.232.214.172
ip-api.com
208.95.112.1
fp2e7a.wpc.phicdn.net
192.229.211.108

IPs

IP
Domain
Country
Malicious
135.181.124.14
mail.tabcoeng.com
Germany
malicious
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2FC6000
trusted library allocation
page read and write
malicious
3CC6000
trusted library allocation
page read and write
malicious
2F64000
trusted library allocation
page read and write
malicious
2FC0000
trusted library allocation
page read and write
malicious
2F94000
trusted library allocation
page read and write
malicious
2F32000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2F5E000
trusted library allocation
page read and write
malicious
3A75000
trusted library allocation
page read and write
malicious
54AB000
trusted library allocation
page read and write
D30000
trusted library allocation
page read and write
134C000
heap
page read and write
5A30000
heap
page read and write
D5D000
trusted library allocation
page execute and read and write
492F000
trusted library allocation
page read and write
1492000
trusted library allocation
page read and write
3F61000
trusted library allocation
page read and write
2910000
heap
page read and write
2E98000
trusted library allocation
page read and write
2E0B000
trusted library allocation
page read and write
15CE000
stack
page read and write
E87000
trusted library allocation
page execute and read and write
59F0000
trusted library allocation
page read and write
7F210000
trusted library allocation
page execute and read and write
E30000
trusted library allocation
page read and write
2960000
heap
page read and write
8050000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
4EC3000
heap
page read and write
2C21000
trusted library allocation
page read and write
2DDF000
stack
page read and write
2A3D000
stack
page read and write
11B5000
heap
page read and write
1133000
trusted library allocation
page execute and read and write
290E000
stack
page read and write
5121000
trusted library allocation
page read and write
A1F000
heap
page read and write
2970000
trusted library allocation
page read and write
B0A000
stack
page read and write
5FAE000
stack
page read and write
60B2000
heap
page read and write
6C6E000
stack
page read and write
F40000
heap
page read and write
6850000
trusted library allocation
page read and write
7BE0000
heap
page read and write
DE0000
heap
page read and write
54BE000
trusted library allocation
page read and write
6870000
trusted library allocation
page read and write
626C000
stack
page read and write
69C0000
trusted library allocation
page execute and read and write
12D7000
heap
page read and write
627E000
heap
page read and write
2CC0000
trusted library allocation
page read and write
434A000
trusted library allocation
page read and write
5443000
heap
page read and write
E10000
trusted library allocation
page read and write
54A6000
trusted library allocation
page read and write
422000
unkown
page readonly
488A000
trusted library allocation
page read and write
510B000
trusted library allocation
page read and write
149A000
trusted library allocation
page execute and read and write
59DE000
stack
page read and write
120D000
heap
page read and write
E23000
trusted library allocation
page read and write
1473000
trusted library allocation
page execute and read and write
707E000
stack
page read and write
4E70000
trusted library allocation
page read and write
4F00000
trusted library allocation
page execute and read and write
15D0000
trusted library allocation
page read and write
678B000
trusted library allocation
page read and write
24FA000
stack
page read and write
A6A000
heap
page read and write
54C8000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
DC0000
heap
page read and write
3F67000
trusted library allocation
page read and write
1474000
trusted library allocation
page read and write
549C000
stack
page read and write
4435000
trusted library allocation
page read and write
E96000
heap
page read and write
2F5C000
trusted library allocation
page read and write
F4A000
heap
page read and write
117E000
stack
page read and write
670F000
stack
page read and write
145F000
stack
page read and write
1130000
trusted library allocation
page read and write
1250000
heap
page read and write
F2C000
stack
page read and write
150E000
stack
page read and write
7FE0000
trusted library allocation
page read and write
14A7000
trusted library allocation
page execute and read and write
2976000
trusted library allocation
page read and write
DE5000
heap
page read and write
E8B000
trusted library allocation
page execute and read and write
FF5A0000
trusted library allocation
page execute and read and write
5620000
heap
page read and write
6883000
trusted library allocation
page read and write
5100000
heap
page execute and read and write
E80000
heap
page read and write
54CD000
trusted library allocation
page read and write
25F0000
heap
page read and write
558E000
stack
page read and write
6660000
trusted library allocation
page read and write
295F000
stack
page read and write
2F30000
trusted library allocation
page read and write
F2B000
heap
page read and write
1377000
heap
page read and write
122E000
heap
page read and write
296A000
heap
page read and write
805A000
trusted library allocation
page read and write
4735000
trusted library allocation
page read and write
E76000
trusted library allocation
page execute and read and write
1165000
trusted library allocation
page execute and read and write
2EBC000
stack
page read and write
2AAF000
stack
page read and write
2CA1000
trusted library allocation
page read and write
770D000
stack
page read and write
5450000
heap
page execute and read and write
2B90000
heap
page read and write
3F89000
trusted library allocation
page read and write
54D5000
trusted library allocation
page read and write
29C0000
heap
page read and write
14A2000
trusted library allocation
page read and write
EA0000
trusted library allocation
page read and write
5E1F000
heap
page read and write
5440000
heap
page read and write
15D4000
trusted library allocation
page read and write
1496000
trusted library allocation
page execute and read and write
4E10000
trusted library allocation
page read and write
D2E000
stack
page read and write
5510000
heap
page read and write
EEE000
stack
page read and write
6650000
trusted library allocation
page execute and read and write
71BD000
stack
page read and write
400000
remote allocation
page execute and read and write
54A2000
trusted library allocation
page read and write
134F000
heap
page read and write
5DF9000
heap
page read and write
54F0000
heap
page execute and read and write
6890000
trusted library allocation
page read and write
787D000
stack
page read and write
3C29000
trusted library allocation
page read and write
52D0000
trusted library section
page read and write
748F000
stack
page read and write
4E3D000
trusted library allocation
page read and write
120A000
heap
page read and write
4CA0000
trusted library allocation
page read and write
57FA000
trusted library allocation
page read and write
7BDE000
stack
page read and write
29A0000
trusted library allocation
page read and write
D53000
trusted library allocation
page read and write
6786000
trusted library allocation
page read and write
662E000
stack
page read and write
D30000
heap
page read and write
CF7000
stack
page read and write
B70000
heap
page read and write
E42000
trusted library allocation
page read and write
7DC1000
trusted library allocation
page read and write
FEE40000
trusted library allocation
page execute and read and write
128A000
heap
page read and write
616E000
stack
page read and write
4EF0000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page execute and read and write
2E0E000
trusted library allocation
page read and write
E3A000
trusted library allocation
page execute and read and write
9EE000
heap
page read and write
512D000
trusted library allocation
page read and write
1279000
heap
page read and write
1260000
heap
page read and write
6CAE000
stack
page read and write
54A4000
trusted library allocation
page read and write
4EC0000
heap
page read and write
576E000
stack
page read and write
58DE000
stack
page read and write
F5D000
heap
page read and write
1120000
trusted library allocation
page read and write
745D000
stack
page read and write
12FC000
heap
page read and write
6B80000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
2990000
heap
page execute and read and write
1470000
trusted library allocation
page read and write
5DC5000
heap
page read and write
E2D000
trusted library allocation
page execute and read and write
1370000
heap
page read and write
7D9D000
stack
page read and write
3C89000
trusted library allocation
page read and write
F30000
trusted library allocation
page execute and read and write
BC0000
heap
page read and write
EA3000
heap
page read and write
7C5C000
stack
page read and write
57F0000
trusted library allocation
page read and write
51C0000
trusted library allocation
page execute and read and write
5240000
heap
page read and write
147D000
trusted library allocation
page execute and read and write
4E60000
trusted library allocation
page read and write
2FBE000
trusted library allocation
page read and write
4E5F000
trusted library allocation
page read and write
1290000
trusted library allocation
page read and write
51A0000
heap
page read and write
69D0000
trusted library allocation
page read and write
1170000
heap
page read and write
2C54000
trusted library allocation
page read and write
2E70000
heap
page execute and read and write
2BA0000
heap
page read and write
2BFF000
trusted library allocation
page read and write
E72000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
511E000
trusted library allocation
page read and write
4DBC000
stack
page read and write
674E000
stack
page read and write
4E90000
trusted library allocation
page read and write
560D000
stack
page read and write
975000
heap
page read and write
2F5A000
trusted library allocation
page read and write
A4F000
heap
page read and write
2E12000
trusted library allocation
page read and write
39D9000
trusted library allocation
page read and write
2B8E000
stack
page read and write
1320000
trusted library allocation
page execute and read and write
51B0000
trusted library allocation
page read and write
5460000
trusted library section
page read and write
1210000
heap
page read and write
663D000
trusted library allocation
page read and write
28EE000
stack
page read and write
67CD000
stack
page read and write
6633000
trusted library allocation
page read and write
5A54000
heap
page read and write
59F3000
trusted library allocation
page read and write
52BD000
stack
page read and write
7B2E000
stack
page read and write
688D000
trusted library allocation
page read and write
5C6E000
stack
page read and write
4E2E000
trusted library allocation
page read and write
1200000
heap
page read and write
5B6E000
stack
page read and write
5210000
trusted library allocation
page read and write
2F70000
heap
page read and write
2AB0000
trusted library allocation
page execute and read and write
2F61000
trusted library allocation
page read and write
1160000
trusted library allocation
page read and write
1188000
heap
page read and write
7EDE000
stack
page read and write
5104000
trusted library allocation
page read and write
60FB000
heap
page read and write
116B000
trusted library allocation
page execute and read and write
D50000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
DD0000
heap
page read and write
920000
heap
page read and write
6780000
trusted library allocation
page read and write
4CA5000
trusted library allocation
page read and write
543F000
stack
page read and write
39D1000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
47E5000
trusted library allocation
page read and write
4E42000
trusted library allocation
page read and write
9CA000
stack
page read and write
590E000
stack
page read and write
12F4000
heap
page read and write
D60000
heap
page read and write
5BA000
stack
page read and write
5126000
trusted library allocation
page read and write
2AA5000
trusted library allocation
page read and write
5500000
heap
page read and write
3F29000
trusted library allocation
page read and write
2C05000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
8040000
trusted library allocation
page execute and read and write
72D0000
heap
page read and write
5DB9000
heap
page read and write
57CE000
stack
page read and write
1490000
trusted library allocation
page read and write
15D6000
trusted library allocation
page read and write
EA1000
heap
page read and write
2DFE000
stack
page read and write
9BE000
stack
page read and write
2EE0000
heap
page read and write
54C6000
trusted library allocation
page read and write
5A50000
heap
page read and write
113D000
trusted library allocation
page execute and read and write
5A5E000
stack
page read and write
1510000
trusted library allocation
page execute and read and write
533E000
stack
page read and write
A07000
heap
page read and write
E82000
trusted library allocation
page read and write
EF9000
stack
page read and write
2E26000
trusted library allocation
page read and write
1294000
heap
page read and write
54B0000
trusted library allocation
page read and write
579E000
stack
page read and write
2B4F000
unkown
page read and write
68A0000
trusted library allocation
page execute and read and write
52F0000
heap
page read and write
125C000
heap
page read and write
E6E000
heap
page read and write
738E000
stack
page read and write
760D000
stack
page read and write
2EFC000
trusted library allocation
page read and write
57CF000
stack
page read and write
5440000
trusted library allocation
page read and write
E68000
heap
page read and write
1300000
heap
page read and write
2BDE000
stack
page read and write
5A1D000
stack
page read and write
2A5D000
trusted library allocation
page read and write
652E000
stack
page read and write
E6E000
stack
page read and write
4E36000
trusted library allocation
page read and write
D40000
trusted library allocation
page read and write
580D000
stack
page read and write
1460000
trusted library allocation
page read and write
703E000
stack
page read and write
7470000
trusted library allocation
page read and write
112E000
stack
page read and write
5AAE000
stack
page read and write
6770000
trusted library allocation
page execute and read and write
9E0000
heap
page read and write
49D3000
trusted library allocation
page read and write
1134000
trusted library allocation
page read and write
2FCF000
trusted library allocation
page read and write
64EE000
stack
page read and write
14A5000
trusted library allocation
page execute and read and write
119E000
heap
page read and write
764E000
stack
page read and write
51BB000
stack
page read and write
54DE000
stack
page read and write
4E50000
trusted library allocation
page read and write
2E1A000
trusted library allocation
page read and write
FD0000
heap
page read and write
1540000
heap
page read and write
14A0000
trusted library allocation
page read and write
12DE000
stack
page read and write
5500000
heap
page read and write
4ACB000
stack
page read and write
754E000
stack
page read and write
6AAE000
stack
page read and write
2E21000
trusted library allocation
page read and write
7F5F0000
trusted library allocation
page execute and read and write
56CD000
stack
page read and write
E7A000
trusted library allocation
page execute and read and write
68EE000
stack
page read and write
D4D000
trusted library allocation
page execute and read and write
6861000
trusted library allocation
page read and write
14AB000
trusted library allocation
page execute and read and write
1152000
trusted library allocation
page read and write
2E2D000
trusted library allocation
page read and write
51F0000
trusted library allocation
page execute and read and write
7E9E000
stack
page read and write
797E000
stack
page read and write
3FC6000
trusted library allocation
page read and write
D50000
heap
page read and write
DC0000
heap
page read and write
5230000
trusted library allocation
page read and write
1274000
heap
page read and write
75CF000
stack
page read and write
2CAC000
trusted library allocation
page read and write
4E31000
trusted library allocation
page read and write
3C21000
trusted library allocation
page read and write
132E000
heap
page read and write
10F9000
stack
page read and write
2B50000
heap
page read and write
792B000
stack
page read and write
E1D000
trusted library allocation
page execute and read and write
E4B000
trusted library allocation
page execute and read and write
2CF0000
heap
page read and write
1150000
trusted library allocation
page read and write
E60000
heap
page read and write
768E000
stack
page read and write
1520000
trusted library allocation
page read and write
60D0000
heap
page read and write
2BE0000
trusted library allocation
page read and write
8212000
trusted library allocation
page read and write
930000
heap
page read and write
4EE0000
heap
page read and write
CEE000
stack
page read and write
2AC0000
trusted library allocation
page read and write
29B0000
trusted library allocation
page read and write
25EF000
unkown
page read and write
72BD000
stack
page read and write
59CD000
stack
page read and write
7C2E000
stack
page read and write
8000000
trusted library allocation
page read and write
F05000
heap
page read and write
131C000
stack
page read and write
420000
unkown
page readonly
2E1E000
trusted library allocation
page read and write
589E000
stack
page read and write
DC5000
heap
page read and write
4F40000
trusted library allocation
page execute and read and write
29D1000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
5DB0000
heap
page read and write
1480000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
2C10000
heap
page execute and read and write
2BE6000
trusted library allocation
page read and write
AD0000
heap
page read and write
3A39000
trusted library allocation
page read and write
DD0000
heap
page read and write
158C000
stack
page read and write
15E0000
heap
page read and write
57D0000
trusted library allocation
page read and write
9EA000
heap
page read and write
7FDE000
stack
page read and write
2560000
heap
page read and write
104E000
stack
page read and write
8430000
trusted library section
page read and write
6820000
heap
page read and write
2E00000
trusted library allocation
page read and write
1530000
trusted library allocation
page read and write
A21000
heap
page read and write
2CAD000
trusted library allocation
page read and write
6F3E000
stack
page read and write
6CEF000
stack
page read and write
D44000
trusted library allocation
page read and write
121E000
heap
page read and write
59E7000
trusted library allocation
page read and write
EF5000
heap
page read and write
127E000
heap
page read and write
E70000
trusted library allocation
page read and write
3F01000
trusted library allocation
page read and write
646D000
stack
page read and write
5DCE000
heap
page read and write
680E000
stack
page read and write
6640000
trusted library allocation
page read and write
24BD000
stack
page read and write
2F01000
trusted library allocation
page read and write
2AD0000
heap
page read and write
4C5E000
stack
page read and write
564C000
stack
page read and write
5140000
trusted library allocation
page read and write
4E14000
trusted library allocation
page read and write
2BE4000
trusted library allocation
page read and write
549F000
stack
page read and write
505E000
stack
page read and write
114D000
trusted library allocation
page execute and read and write
6270000
heap
page read and write
2B0E000
unkown
page read and write
E32000
trusted library allocation
page read and write
6A6E000
stack
page read and write
51D0000
trusted library allocation
page read and write
950000
heap
page read and write
135A000
heap
page read and write
4F30000
heap
page read and write
E13000
trusted library allocation
page execute and read and write
5340000
heap
page read and write
970000
heap
page read and write
5239000
trusted library allocation
page read and write
574C000
stack
page read and write
1156000
trusted library allocation
page execute and read and write
1360000
trusted library allocation
page read and write
1297000
heap
page read and write
3F65000
trusted library allocation
page read and write
8F7000
stack
page read and write
6873000
trusted library allocation
page read and write
741D000
stack
page read and write
4C9E000
stack
page read and write
15E7000
heap
page read and write
6290000
heap
page read and write
62BB000
heap
page read and write
11FA000
heap
page read and write
11BE000
stack
page read and write
4685000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
2C00000
trusted library allocation
page read and write
1340000
heap
page read and write
2C28000
trusted library allocation
page read and write
3C69000
trusted library allocation
page read and write
11AA000
heap
page read and write
D40000
heap
page read and write
4EF2000
trusted library allocation
page read and write
2CD0000
trusted library allocation
page read and write
2A04000
trusted library allocation
page read and write
2CC4000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
1167000
trusted library allocation
page execute and read and write
2BD0000
heap
page read and write
7D5C000
stack
page read and write
E36000
trusted library allocation
page execute and read and write
7A2C000
stack
page read and write
2A7A000
stack
page read and write
627C000
heap
page read and write
25AE000
unkown
page read and write
5A4A000
heap
page read and write
778E000
stack
page read and write
2F6C000
trusted library allocation
page read and write
6867000
trusted library allocation
page read and write
62E7000
heap
page read and write
1162000
trusted library allocation
page read and write
54B8000
trusted library allocation
page read and write
FD5000
heap
page read and write
E14000
trusted library allocation
page read and write
2E8E000
stack
page read and write
7730000
heap
page read and write
E47000
trusted library allocation
page execute and read and write
54D2000
trusted library allocation
page read and write
6C70000
heap
page read and write
60AE000
stack
page read and write
684E000
stack
page read and write
1180000
heap
page read and write
5AB0000
heap
page read and write
D43000
trusted library allocation
page execute and read and write
D9E000
stack
page read and write
5243000
heap
page read and write
5470000
trusted library section
page read and write
4E1B000
trusted library allocation
page read and write
7ADE000
stack
page read and write
115A000
trusted library allocation
page execute and read and write
74CE000
stack
page read and write
2EF0000
heap
page execute and read and write
2CF5000
trusted library allocation
page read and write
54B4000
trusted library allocation
page read and write
2CF3000
trusted library allocation
page read and write
57E0000
trusted library allocation
page execute and read and write
292E000
stack
page read and write
1268000
heap
page read and write
2AC0000
heap
page read and write
554C000
stack
page read and write
51B2000
trusted library allocation
page read and write
78B0000
heap
page read and write
2F50000
heap
page execute and read and write
60B0000
heap
page read and write
D5B000
stack
page read and write
59E0000
trusted library allocation
page read and write
5132000
trusted library allocation
page read and write
459A000
trusted library allocation
page read and write
2BF0000
trusted library allocation
page read and write
296E000
stack
page read and write
572E000
stack
page read and write
11B8000
heap
page read and write
11FB000
stack
page read and write
4E65000
trusted library allocation
page read and write
60B6000
heap
page read and write
568F000
stack
page read and write
660E000
stack
page read and write
120E000
stack
page read and write
717E000
stack
page read and write
72C0000
heap
page read and write
CAE000
stack
page read and write
4FFD000
stack
page read and write
2BDB000
heap
page read and write
1330000
trusted library allocation
page read and write
1140000
trusted library allocation
page read and write
There are 535 hidden memdumps, click here to show them.