IOC Report
datasheet.exe

loading gif

Files

File Path
Type
Category
Malicious
datasheet.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\datasheet.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp43D7.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\rjBdvmaV.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\rjBdvmaV.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rjBdvmaV.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0odxasgc.us5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bvisiq4t.l2b.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dznmcvfj.0vw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h3px5hxy.gii.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jjauzphc.mdy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tyhg0xp4.m2z.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vsfqmzec.tjr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x1yz35e1.3vz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp5B67.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\datasheet.exe
"C:\Users\user\Desktop\datasheet.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\datasheet.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rjBdvmaV.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rjBdvmaV" /XML "C:\Users\user\AppData\Local\Temp\tmp43D7.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\rjBdvmaV.exe
C:\Users\user\AppData\Roaming\rjBdvmaV.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rjBdvmaV" /XML "C:\Users\user\AppData\Local\Temp\tmp5B67.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.13.205
http://microsoft.co3f
unknown
https://api.ipify.org
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://crl.gl
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://smtp.yandex.com
unknown

Domains

Name
IP
Malicious
smtp.yandex.ru
77.88.21.158
api.ipify.org
104.26.13.205
smtp.yandex.com
unknown

IPs

IP
Domain
Country
Malicious
77.88.21.158
smtp.yandex.ru
Russian Federation
104.26.13.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3F89000
trusted library allocation
page read and write
malicious
22CC000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
22A1000
trusted library allocation
page read and write
malicious
2BDB000
trusted library allocation
page read and write
malicious
3C97000
trusted library allocation
page read and write
77C0000
trusted library allocation
page execute and read and write
169D000
trusted library allocation
page execute and read and write
9EDD000
stack
page read and write
499D000
trusted library allocation
page read and write
301B000
trusted library allocation
page read and write
56D0000
heap
page read and write
608E000
stack
page read and write
50B6000
trusted library allocation
page read and write
2134000
trusted library allocation
page read and write
12A0000
heap
page read and write
51B4000
heap
page read and write
81FF000
stack
page read and write
224F000
stack
page read and write
5430000
trusted library allocation
page read and write
5090000
trusted library allocation
page read and write
1170000
heap
page execute and read and write
498E000
trusted library allocation
page read and write
7B62000
trusted library allocation
page read and write
62E0000
heap
page read and write
35D9000
trusted library allocation
page read and write
2DF0000
heap
page execute and read and write
1120000
heap
page read and write
2A5B000
heap
page read and write
359D000
trusted library allocation
page read and write
54D0000
heap
page read and write
7C96000
trusted library allocation
page read and write
31FF000
stack
page read and write
A97E000
stack
page read and write
AB7E000
stack
page read and write
255A000
stack
page read and write
3D26000
trusted library allocation
page read and write
7A0000
trusted library allocation
page read and write
5D6D000
trusted library allocation
page read and write
2BD7000
trusted library allocation
page read and write
69C0000
heap
page read and write
AE2C000
stack
page read and write
2C0F000
trusted library allocation
page read and write
6E54000
trusted library allocation
page read and write
870000
heap
page read and write
595000
heap
page read and write
2E50000
trusted library allocation
page read and write
2F2A000
heap
page read and write
243F000
stack
page read and write
126B000
unkown
page read and write
13EE000
stack
page read and write
6A60000
heap
page read and write
3C57000
trusted library allocation
page read and write
2BCF000
trusted library allocation
page read and write
7F7000
trusted library allocation
page execute and read and write
1010000
heap
page read and write
5540000
trusted library allocation
page read and write
567000
stack
page read and write
2C6F000
trusted library allocation
page read and write
3C1F000
trusted library allocation
page read and write
2CF4000
trusted library allocation
page read and write
5482000
trusted library allocation
page read and write
6490000
trusted library allocation
page execute and read and write
53C0000
trusted library allocation
page read and write
DE4000
trusted library allocation
page read and write
98BD000
stack
page read and write
AA7E000
stack
page read and write
9ABE000
stack
page read and write
A840000
heap
page read and write
76A0000
heap
page read and write
62DF000
stack
page read and write
49A2000
trusted library allocation
page read and write
54BE000
stack
page read and write
B12E000
stack
page read and write
3524000
trusted library allocation
page read and write
3257000
trusted library allocation
page read and write
209E000
stack
page read and write
4974000
trusted library allocation
page read and write
4A00000
heap
page read and write
305E000
unkown
page read and write
B19E000
trusted library allocation
page read and write
4D9E000
stack
page read and write
5E60000
heap
page read and write
DFD000
trusted library allocation
page execute and read and write
4D1E000
stack
page read and write
D90000
trusted library allocation
page read and write
1130000
heap
page read and write
64AD000
trusted library allocation
page read and write
2E5A000
trusted library allocation
page read and write
2E5D000
stack
page read and write
A40000
heap
page execute and read and write
20C0000
trusted library allocation
page read and write
5E6A000
heap
page read and write
5810000
heap
page read and write
610000
heap
page read and write
5D48000
trusted library allocation
page read and write
5564000
heap
page read and write
E0A000
trusted library allocation
page execute and read and write
6E00000
trusted library allocation
page read and write
4C8B000
stack
page read and write
B6C0000
trusted library allocation
page read and write
29EF000
stack
page read and write
4C5E000
stack
page read and write
1098000
heap
page read and write
10B7000
heap
page read and write
990000
heap
page read and write
E02000
trusted library allocation
page read and write
604F000
stack
page read and write
5E0000
heap
page read and write
997000
heap
page read and write
5E6E000
heap
page read and write
50A2000
trusted library allocation
page read and write
76B5000
heap
page read and write
1690000
trusted library allocation
page read and write
30F8000
trusted library allocation
page read and write
7EF000
stack
page read and write
5E80000
heap
page read and write
576E000
stack
page read and write
2C99000
trusted library allocation
page read and write
4910000
heap
page execute and read and write
5A25000
heap
page read and write
16B0000
trusted library allocation
page read and write
581D000
heap
page read and write
25C0000
heap
page read and write
64A0000
trusted library allocation
page read and write
509E000
trusted library allocation
page read and write
1684000
trusted library allocation
page read and write
247C000
stack
page read and write
109E000
heap
page read and write
1A8000
stack
page read and write
2480000
heap
page read and write
10D2000
heap
page read and write
44EE000
stack
page read and write
5486000
trusted library allocation
page read and write
56E0000
heap
page execute and read and write
1683000
trusted library allocation
page execute and read and write
6960000
trusted library allocation
page read and write
61DE000
stack
page read and write
4CC0000
heap
page read and write
7F2000
trusted library allocation
page read and write
11D0000
trusted library allocation
page read and write
4840000
trusted library allocation
page read and write
EB0000
heap
page read and write
595E000
stack
page read and write
84BB000
stack
page read and write
2140000
heap
page read and write
5BFE000
stack
page read and write
842000
heap
page read and write
1FEA000
trusted library allocation
page execute and read and write
7B0000
trusted library allocation
page read and write
5D70000
trusted library allocation
page read and write
50AE000
trusted library allocation
page read and write
7A00000
trusted library allocation
page execute and read and write
65E0000
trusted library allocation
page read and write
3060000
heap
page read and write
41C1000
trusted library allocation
page read and write
2010000
trusted library allocation
page read and write
5070000
heap
page read and write
112B000
heap
page read and write
3DD8000
trusted library allocation
page read and write
122B000
unkown
page read and write
106E000
stack
page read and write
636E000
stack
page read and write
6C50000
heap
page read and write
3B91000
trusted library allocation
page read and write
36D1000
trusted library allocation
page read and write
A30000
trusted library allocation
page read and write
57E000
stack
page read and write
4DDD000
stack
page read and write
5DBD000
stack
page read and write
5560000
trusted library allocation
page read and write
60E000
heap
page read and write
899000
heap
page read and write
7460000
heap
page read and write
2F05000
trusted library allocation
page read and write
3C77000
trusted library allocation
page read and write
76B1000
heap
page read and write
666000
heap
page read and write
53E6000
trusted library allocation
page read and write
229D000
trusted library allocation
page read and write
7D0000
trusted library allocation
page read and write
49D5000
trusted library allocation
page read and write
7C9E000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page execute and read and write
A50000
heap
page read and write
D86000
heap
page read and write
129E000
stack
page read and write
5C3E000
stack
page read and write
6BF7000
heap
page read and write
2505000
trusted library allocation
page read and write
3F81000
trusted library allocation
page read and write
60CE000
stack
page read and write
5410000
trusted library allocation
page read and write
56B0000
trusted library allocation
page execute and read and write
E06000
trusted library allocation
page execute and read and write
7B3000
trusted library allocation
page execute and read and write
1020000
heap
page read and write
72E000
stack
page read and write
6D5E000
stack
page read and write
E28000
heap
page read and write
2F29000
trusted library allocation
page read and write
4A66000
trusted library allocation
page read and write
5D50000
trusted library allocation
page execute and read and write
64A8000
trusted library allocation
page read and write
3054000
trusted library allocation
page read and write
53E1000
trusted library allocation
page read and write
DB0000
trusted library allocation
page read and write
2FF5000
trusted library allocation
page read and write
8D8000
heap
page read and write
6DCE000
stack
page read and write
5B2E000
stack
page read and write
1FF7000
trusted library allocation
page execute and read and write
2120000
trusted library allocation
page read and write
7AA5000
trusted library allocation
page read and write
79CE000
stack
page read and write
9FDE000
stack
page read and write
56C0000
heap
page read and write
800000
heap
page read and write
49B6000
trusted library allocation
page read and write
770000
heap
page read and write
56A0000
heap
page read and write
759E000
stack
page read and write
29AE000
stack
page read and write
1FB0000
trusted library allocation
page read and write
2E3B000
stack
page read and write
69B0000
trusted library allocation
page execute and read and write
51AE000
stack
page read and write
567B000
stack
page read and write
2ED9000
trusted library allocation
page read and write
631D000
stack
page read and write
16BB000
trusted library allocation
page execute and read and write
A9BE000
stack
page read and write
65CE000
stack
page read and write
1FE0000
trusted library allocation
page read and write
1680000
trusted library allocation
page read and write
2DE0000
trusted library allocation
page execute and read and write
51D0000
heap
page read and write
5E4E000
stack
page read and write
AB000
stack
page read and write
D50000
heap
page read and write
46A000
stack
page read and write
9D9C000
stack
page read and write
6CF000
heap
page read and write
AF2C000
stack
page read and write
4996000
trusted library allocation
page read and write
49A0000
trusted library allocation
page read and write
5120000
heap
page execute and read and write
56FC000
stack
page read and write
4865000
trusted library allocation
page read and write
5960000
heap
page read and write
4844000
trusted library allocation
page read and write
E55000
heap
page read and write
658F000
stack
page read and write
6E50000
trusted library allocation
page read and write
2B8E000
stack
page read and write
1FFB000
trusted library allocation
page execute and read and write
22C6000
trusted library allocation
page read and write
F03000
heap
page read and write
434F000
stack
page read and write
5F0000
heap
page read and write
1FD0000
trusted library allocation
page read and write
2B91000
trusted library allocation
page read and write
5D3E000
stack
page read and write
596E000
stack
page read and write
507C000
stack
page read and write
592D000
stack
page read and write
370F000
trusted library allocation
page read and write
2F81000
trusted library allocation
page read and write
6E4000
heap
page read and write
8070000
trusted library section
page read and write
D97000
stack
page read and write
49C0000
trusted library allocation
page read and write
50B1000
trusted library allocation
page read and write
769E000
stack
page read and write
80E000
heap
page read and write
7C7000
heap
page read and write
287F000
unkown
page read and write
309E000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
251D000
stack
page read and write
7B4000
trusted library allocation
page read and write
A20000
trusted library allocation
page execute and read and write
2C49000
trusted library allocation
page read and write
31BE000
stack
page read and write
6E4E000
stack
page read and write
16A6000
trusted library allocation
page execute and read and write
4FAE000
trusted library allocation
page read and write
7865000
trusted library allocation
page read and write
4D60000
heap
page read and write
4E80000
heap
page read and write
25D0000
heap
page read and write
DE0000
trusted library allocation
page read and write
4498000
trusted library allocation
page read and write
5558000
heap
page read and write
A11F000
stack
page read and write
4920000
heap
page read and write
53C4000
trusted library allocation
page read and write
4E5E000
stack
page read and write
7E6000
trusted library allocation
page execute and read and write
5B0000
heap
page read and write
4870000
trusted library allocation
page read and write
2A30000
heap
page read and write
2B9C000
trusted library allocation
page read and write
83BC000
stack
page read and write
6DB0000
heap
page read and write
1100000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
70DE000
stack
page read and write
25AA000
trusted library allocation
page read and write
49E0000
trusted library allocation
page read and write
2BCB000
trusted library allocation
page read and write
2C51000
trusted library allocation
page read and write
2E2F000
trusted library allocation
page read and write
50EE000
trusted library allocation
page read and write
7DD000
trusted library allocation
page execute and read and write
5780000
heap
page read and write
5AFE000
stack
page read and write
2F00000
heap
page read and write
E20000
heap
page read and write
2D44000
trusted library allocation
page read and write
615000
heap
page read and write
3D77000
trusted library allocation
page read and write
5A20000
heap
page read and write
1125000
heap
page read and write
22D4000
trusted library allocation
page read and write
69A0000
trusted library allocation
page read and write
E58000
heap
page read and write
72BE000
stack
page read and write
77A0000
trusted library allocation
page read and write
7D3000
trusted library allocation
page read and write
1FC0000
trusted library allocation
page read and write
7EA000
trusted library allocation
page execute and read and write
7F9F0000
trusted library allocation
page execute and read and write
51C0000
heap
page read and write
5F8000
heap
page read and write
228F000
trusted library allocation
page read and write
64B7000
trusted library allocation
page read and write
97A000
stack
page read and write
3630000
trusted library allocation
page read and write
16D0000
trusted library allocation
page read and write
61A000
heap
page read and write
E15000
trusted library allocation
page execute and read and write
4A50000
heap
page read and write
566E000
stack
page read and write
54DE000
heap
page read and write
2C4D000
trusted library allocation
page read and write
4E9D000
stack
page read and write
36B1000
trusted library allocation
page read and write
4859000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
1FF2000
trusted library allocation
page read and write
2A50000
heap
page read and write
B199000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
9E0000
heap
page read and write
624000
heap
page read and write
D55000
heap
page read and write
585E000
stack
page read and write
A130000
trusted library allocation
page execute and read and write
9E9C000
stack
page read and write
11BC000
stack
page read and write
A83D000
stack
page read and write
C9A000
stack
page read and write
1270000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
80A000
heap
page read and write
98C0000
heap
page read and write
2E80000
trusted library allocation
page read and write
49D0000
trusted library allocation
page read and write
DE5000
heap
page read and write
211C000
stack
page read and write
41FF000
trusted library allocation
page read and write
16A2000
trusted library allocation
page read and write
4834000
trusted library allocation
page read and write
6DBA000
heap
page read and write
3251000
trusted library allocation
page read and write
B196000
trusted library allocation
page read and write
1110000
trusted library allocation
page execute and read and write
49B4000
trusted library allocation
page read and write
7E0000
trusted library allocation
page read and write
10EC000
stack
page read and write
77B0000
trusted library allocation
page execute and read and write
1FE2000
trusted library allocation
page read and write
64B0000
trusted library allocation
page read and write
684C000
stack
page read and write
E1B000
trusted library allocation
page execute and read and write
3023000
trusted library allocation
page read and write
2491000
trusted library allocation
page read and write
7C0000
heap
page read and write
2D95000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
DE0000
heap
page read and write
5470000
heap
page read and write
DF0000
trusted library allocation
page read and write
827000
heap
page read and write
10CF000
heap
page read and write
5F12000
heap
page read and write
5730000
trusted library allocation
page execute and read and write
6DC0000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
B5E000
stack
page read and write
4FB0000
trusted library allocation
page execute and read and write
4B1C000
stack
page read and write
1FCD000
trusted library allocation
page execute and read and write
5750000
heap
page read and write
3D57000
trusted library allocation
page read and write
5970000
heap
page read and write
22C8000
trusted library allocation
page read and write
B62000
unkown
page readonly
7C99000
trusted library allocation
page read and write
3BF7000
trusted library allocation
page read and write
1FF0000
trusted library allocation
page read and write
4C9E000
stack
page read and write
1090000
heap
page read and write
3360000
heap
page read and write
7810000
trusted library allocation
page read and write
DED000
trusted library allocation
page execute and read and write
509B000
trusted library allocation
page read and write
DE3000
trusted library allocation
page execute and read and write
4D5E000
stack
page read and write
3499000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
2F20000
heap
page read and write
48CC000
stack
page read and write
61DE000
stack
page read and write
4F8D000
stack
page read and write
E4A000
heap
page read and write
4991000
trusted library allocation
page read and write
1FC3000
trusted library allocation
page execute and read and write
5690000
trusted library section
page readonly
676000
heap
page read and write
2BC2000
trusted library allocation
page read and write
16E8000
heap
page read and write
5573000
heap
page read and write
2136000
trusted library allocation
page read and write
116E000
stack
page read and write
712D000
stack
page read and write
50D4000
trusted library allocation
page read and write
4358000
trusted library allocation
page read and write
ACBF000
stack
page read and write
3BB9000
trusted library allocation
page read and write
A01E000
stack
page read and write
678F000
stack
page read and write
4B5E000
stack
page read and write
572B000
stack
page read and write
7E2000
trusted library allocation
page read and write
6314000
heap
page read and write
B02E000
stack
page read and write
12E0000
heap
page read and write
6A6E000
heap
page read and write
573C000
stack
page read and write
3C17000
trusted library allocation
page read and write
3D17000
trusted library allocation
page read and write
557F000
stack
page read and write
834000
heap
page read and write
6BD0000
heap
page read and write
462B000
stack
page read and write
2D6F000
trusted library allocation
page read and write
2BD3000
trusted library allocation
page read and write
5490000
trusted library allocation
page execute and read and write
4C90000
trusted library allocation
page read and write
50BD000
trusted library allocation
page read and write
D80000
heap
page read and write
EEA000
heap
page read and write
4900000
heap
page read and write
4970000
trusted library allocation
page read and write
62F0000
heap
page read and write
2E8A000
trusted library allocation
page read and write
5755000
heap
page read and write
1FE6000
trusted library allocation
page execute and read and write
37B3000
trusted library allocation
page read and write
2130000
trusted library allocation
page read and write
14EF000
stack
page read and write
4AA0000
trusted library allocation
page read and write
6480000
trusted library allocation
page read and write
3C37000
trusted library allocation
page read and write
5ABF000
stack
page read and write
6CB000
heap
page read and write
3732000
trusted library allocation
page read and write
4CA0000
trusted library section
page readonly
22D6000
trusted library allocation
page read and write
572E000
stack
page read and write
5F0D000
heap
page read and write
233E000
stack
page read and write
64FE000
stack
page read and write
5E1D000
stack
page read and write
580000
heap
page read and write
51B0000
heap
page read and write
2E40000
trusted library allocation
page read and write
3DB8000
trusted library allocation
page read and write
11E0000
heap
page read and write
9FF000
stack
page read and write
460000
heap
page read and write
2D48000
trusted library allocation
page read and write
590000
heap
page read and write
516C000
stack
page read and write
3CD7000
trusted library allocation
page read and write
20D0000
heap
page execute and read and write
694C000
stack
page read and write
6B0000
heap
page read and write
12C0000
heap
page read and write
1FC4000
trusted library allocation
page read and write
53DE000
trusted library allocation
page read and write
3CF7000
trusted library allocation
page read and write
11C0000
trusted library allocation
page read and write
E17000
trusted library allocation
page execute and read and write
5D40000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
2890000
heap
page read and write
2E6C000
trusted library allocation
page read and write
64A3000
trusted library allocation
page read and write
E12000
trusted library allocation
page read and write
2E88000
trusted library allocation
page read and write
5570000
heap
page read and write
7860000
trusted library allocation
page read and write
840000
heap
page read and write
C02000
unkown
page readonly
54C0000
heap
page read and write
DD0000
trusted library allocation
page read and write
59AE000
stack
page read and write
556A000
heap
page read and write
168D000
trusted library allocation
page execute and read and write
16AA000
trusted library allocation
page execute and read and write
4A10000
trusted library allocation
page read and write
4A03000
heap
page read and write
16B7000
trusted library allocation
page execute and read and write
12BE000
stack
page read and write
1693000
trusted library allocation
page read and write
577D000
stack
page read and write
5D77000
trusted library allocation
page read and write
4A60000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
9AFD000
stack
page read and write
4D2D000
stack
page read and write
16B2000
trusted library allocation
page read and write
20B0000
trusted library allocation
page execute and read and write
10C5000
heap
page read and write
7FB000
trusted library allocation
page execute and read and write
3CB7000
trusted library allocation
page read and write
DC0000
trusted library allocation
page execute and read and write
3D37000
trusted library allocation
page read and write
5780000
trusted library section
page read and write
283E000
unkown
page read and write
8BA000
heap
page read and write
5680000
trusted library allocation
page read and write
50D0000
trusted library allocation
page read and write
2E60000
trusted library allocation
page read and write
2E70000
heap
page read and write
317F000
unkown
page read and write
2E9A000
stack
page read and write
4CD0000
heap
page execute and read and write
626000
heap
page read and write
2286000
trusted library allocation
page read and write
5D60000
trusted library allocation
page read and write
4B98000
trusted library allocation
page read and write
76E000
stack
page read and write
11E7000
heap
page read and write
3279000
trusted library allocation
page read and write
6320000
heap
page read and write
5405000
trusted library allocation
page read and write
7F0000
heap
page read and write
76D7000
heap
page read and write
621E000
stack
page read and write
5D0000
heap
page read and write
16E0000
heap
page read and write
6950000
trusted library allocation
page execute and read and write
3560000
trusted library allocation
page read and write
5480000
trusted library allocation
page read and write
2CF2000
trusted library allocation
page read and write
2F03000
trusted library allocation
page read and write
2251000
trusted library allocation
page read and write
2F10000
heap
page read and write
9BFF000
stack
page read and write
77D0000
trusted library allocation
page read and write
53BC000
stack
page read and write
5E8E000
stack
page read and write
20A0000
heap
page read and write
4A80000
trusted library allocation
page read and write
53F2000
trusted library allocation
page read and write
646E000
stack
page read and write
7EF30000
trusted library allocation
page execute and read and write
205E000
stack
page read and write
2D3E000
stack
page read and write
7CD0000
heap
page read and write
3491000
trusted library allocation
page read and write
60DE000
stack
page read and write
1FF5000
trusted library allocation
page execute and read and write
9F0000
heap
page read and write
4E5E000
stack
page read and write
A10000
trusted library allocation
page read and write
D3C000
stack
page read and write
2F7F000
stack
page read and write
65D0000
trusted library allocation
page execute and read and write
114B000
heap
page read and write
5E5F000
stack
page read and write
7CC0000
heap
page read and write
4A70000
trusted library allocation
page execute and read and write
32B8000
trusted library allocation
page read and write
7BD000
trusted library allocation
page execute and read and write
89C000
heap
page read and write
6970000
trusted library allocation
page read and write
22CA000
trusted library allocation
page read and write
ABBE000
stack
page read and write
12D0000
trusted library allocation
page read and write
3D98000
trusted library allocation
page read and write
4E1E000
stack
page read and write
CF8000
stack
page read and write
6488000
trusted library allocation
page read and write
B60000
unkown
page readonly
49B0000
trusted library allocation
page read and write
4A62000
trusted library allocation
page read and write
6C17000
heap
page read and write
50C2000
trusted library allocation
page read and write
785E000
stack
page read and write
There are 604 hidden memdumps, click here to show them.