IOC Report
20250328 PO AE_MECH_0581pdf(86KB).com.exe

loading gifFilesProcessesURLsRegistryMemdumps8642010010Label

Files

File Path
Type
Category
Malicious
Download
20250328 PO AE_MECH_0581pdf(86KB).com.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\MicroSoft Outlook\System.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\20250328 PO AE_MECH_0581pdf(86KB).com.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\install.vbs
data
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\20250328 PO AE_MECH_0581pdf(86KB).com.exe
"C:\Users\user\Desktop\20250328 PO AE_MECH_0581pdf(86KB).com.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Windows\system32\svchost.exe"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs"
malicious
C:\ProgramData\MicroSoft Outlook\System.exe
"C:\ProgramData\MicroSoft Outlook\System.exe"
malicious
C:\ProgramData\MicroSoft Outlook\System.exe
"C:\ProgramData\MicroSoft Outlook\System.exe"
malicious
C:\ProgramData\MicroSoft Outlook\System.exe
"C:\ProgramData\MicroSoft Outlook\System.exe"
malicious
C:\ProgramData\MicroSoft Outlook\System.exe
"C:\ProgramData\MicroSoft Outlook\System.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\MicroSoft Outlook\System.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
code1.ydns.eu
malicious
http://geoplugin.net/json.gp
unknown
rency.ydns.eu
http://geoplugin.net/json.gp/C
unknown
wqo9.firewall-gateway.de

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
MicroSoft
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
MicroSoft
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
4608000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
479C000
trusted library allocation
page read and write
malicious
5B60000
trusted library section
page read and write
malicious
4A45000
trusted library allocation
page read and write
malicious
3601000
trusted library allocation
page read and write
malicious
4870000
trusted library allocation
page read and write
malicious
2E00000
heap
page read and write
malicious
3AC3000
trusted library allocation
page read and write
53FC000
stack
page read and write
372D000
trusted library allocation
page read and write
3AF5000
trusted library allocation
page read and write
38D9000
trusted library allocation
page read and write
67E000
stack
page read and write
513E000
stack
page read and write
7D50000
heap
page read and write
39D6000
trusted library allocation
page read and write
2E36000
heap
page read and write
2E0C000
heap
page read and write
3921000
trusted library allocation
page read and write
3560000
trusted library allocation
page read and write
2DFB000
heap
page read and write
53BF000
stack
page read and write
5EA0000
trusted library allocation
page read and write
3938000
trusted library allocation
page read and write
370E000
trusted library allocation
page read and write
37C4000
trusted library allocation
page read and write
2E54000
heap
page read and write
3A8A000
trusted library allocation
page read and write
3BC7000
trusted library allocation
page read and write
B40000
unkown
page readonly
5180000
heap
page read and write
3BAE000
trusted library allocation
page read and write
896E000
stack
page read and write
18EE000
stack
page read and write
11E0000
heap
page read and write
39BF000
trusted library allocation
page read and write
39A9000
trusted library allocation
page read and write
6786000
heap
page read and write
3710000
trusted library allocation
page read and write
3AD2000
trusted library allocation
page read and write
16C0000
trusted library allocation
page read and write
557E000
stack
page read and write
7D03000
heap
page read and write
3A05000
trusted library allocation
page read and write
302D000
stack
page read and write
3210000
heap
page read and write
11F0000
heap
page read and write
2E0B000
heap
page read and write
3716000
trusted library allocation
page read and write
3A6B000
trusted library allocation
page read and write
2EEE000
stack
page read and write
3BCD000
trusted library allocation
page read and write
3853000
trusted library allocation
page read and write
7FFE000
stack
page read and write
B4B000
unkown
page readonly
3A3D000
trusted library allocation
page read and write
B4B000
unkown
page readonly
8210000
trusted library allocation
page execute and read and write
503E000
stack
page read and write
373E000
trusted library allocation
page read and write
3B6B000
trusted library allocation
page read and write
37B5000
trusted library allocation
page read and write
3855000
trusted library allocation
page read and write
39A4000
trusted library allocation
page read and write
8352000
trusted library allocation
page read and write
39D8000
trusted library allocation
page read and write
3B0E000
trusted library allocation
page read and write
3826000
trusted library allocation
page read and write
B41000
unkown
page execute read
389E000
trusted library allocation
page read and write
2E54000
heap
page read and write
2E36000
heap
page read and write
2E22000
heap
page read and write
ACE000
stack
page read and write
3BD1000
trusted library allocation
page read and write
3A8C000
trusted library allocation
page read and write
FC0000
unkown
page readonly
2E5D000
stack
page read and write
10CC000
unkown
page readonly
396E000
trusted library allocation
page read and write
391B000
trusted library allocation
page read and write
471000
remote allocation
page execute and read and write
37DD000
trusted library allocation
page read and write
3B06000
trusted library allocation
page read and write
38F1000
trusted library allocation
page read and write
2C02000
heap
page read and write
56FE000
stack
page read and write
37B7000
trusted library allocation
page read and write
2E44000
heap
page read and write
2DF4000
heap
page read and write
5CCE000
stack
page read and write
105A000
unkown
page readonly
38A2000
trusted library allocation
page read and write
3926000
trusted library allocation
page read and write
6B9A000
heap
page read and write
2F01000
heap
page read and write
B48000
unkown
page readonly
1088000
unkown
page readonly
2DFD000
heap
page read and write
52BE000
stack
page read and write
3B95000
trusted library allocation
page read and write
16C6000
trusted library allocation
page execute and read and write
16FE000
heap
page read and write
3B12000
trusted library allocation
page read and write
108D000
unkown
page readonly
383A000
trusted library allocation
page read and write
3A5C000
trusted library allocation
page read and write
3836000
trusted library allocation
page read and write
1071000
unkown
page readonly
54D000
stack
page read and write
3972000
trusted library allocation
page read and write
531D000
stack
page read and write
7D36000
heap
page read and write
2DB0000
heap
page read and write
2C60000
heap
page read and write
1082000
unkown
page readonly
35B0000
trusted library allocation
page read and write
C70000
heap
page read and write
910000
heap
page read and write
3742000
trusted library allocation
page read and write
377F000
trusted library allocation
page read and write
398E000
trusted library allocation
page read and write
870000
heap
page read and write
6B1E000
stack
page read and write
97F000
stack
page read and write
37AD000
trusted library allocation
page read and write
3B04000
trusted library allocation
page read and write
1043000
unkown
page readonly
2DF1000
heap
page read and write
2B8C000
stack
page read and write
2E0A000
heap
page read and write
B4B000
unkown
page readonly
3BCB000
trusted library allocation
page read and write
3A84000
trusted library allocation
page read and write
10D2000
unkown
page readonly
2F12000
heap
page read and write
10B3000
unkown
page readonly
2E1A000
heap
page read and write
583C000
stack
page read and write
3B7A000
trusted library allocation
page read and write
B074000
trusted library allocation
page read and write
3970000
trusted library allocation
page read and write
3A8E000
trusted library allocation
page read and write
39B9000
trusted library allocation
page read and write
480000
heap
page read and write
377B000
trusted library allocation
page read and write
312E000
stack
page read and write
6B95000
heap
page read and write
2E44000
heap
page read and write
2E09000
heap
page read and write
2DFD000
heap
page read and write
3A1C000
trusted library allocation
page read and write
1049000
unkown
page readonly
3B61000
trusted library allocation
page read and write
6B73000
heap
page read and write
160E000
stack
page read and write
16DB000
trusted library allocation
page execute and read and write
3B08000
trusted library allocation
page read and write
3A3F000
trusted library allocation
page read and write
3AE0000
trusted library allocation
page read and write
66E5000
heap
page read and write
2E01000
heap
page read and write
3443000
heap
page read and write
5ED0000
heap
page read and write
777000
heap
page read and write
3851000
trusted library allocation
page read and write
3A86000
trusted library allocation
page read and write
7D1D000
heap
page read and write
11F5000
heap
page read and write
38EB000
trusted library allocation
page read and write
1B20000
trusted library allocation
page execute and read and write
3A1E000
trusted library allocation
page read and write
820D000
trusted library allocation
page read and write
39D2000
trusted library allocation
page read and write
1093000
unkown
page readonly
3AEF000
trusted library allocation
page read and write
37CA000
trusted library allocation
page read and write
8EB000
stack
page read and write
393C000
trusted library allocation
page read and write
3B88000
trusted library allocation
page read and write
30FF000
stack
page read and write
7D42000
heap
page read and write
5F0000
heap
page read and write
38CA000
trusted library allocation
page read and write
1680000
trusted library allocation
page read and write
2E44000
heap
page read and write
8AAE000
stack
page read and write
355D000
stack
page read and write
2E17000
heap
page read and write
3859000
trusted library allocation
page read and write
2DF5000
heap
page read and write
3781000
trusted library allocation
page read and write
3AED000
trusted library allocation
page read and write
57FF000
stack
page read and write
9EB000
stack
page read and write
6B45000
heap
page read and write
2E30000
heap
page read and write
383E000
trusted library allocation
page read and write
980000
heap
page readonly
527E000
stack
page read and write
3889000
trusted library allocation
page read and write
5DC000
stack
page read and write
39CE000
trusted library allocation
page read and write
3ABF000
trusted library allocation
page read and write
3AB7000
trusted library allocation
page read and write
3A5A000
trusted library allocation
page read and write
B40000
unkown
page readonly
567E000
stack
page read and write
16D2000
trusted library allocation
page read and write
2E36000
heap
page read and write
3AF7000
trusted library allocation
page read and write
B4B000
unkown
page readonly
3AD6000
trusted library allocation
page read and write
2DF0000
heap
page read and write
3BB2000
trusted library allocation
page read and write
3A41000
trusted library allocation
page read and write
104E000
unkown
page readonly
39D4000
trusted library allocation
page read and write
89AE000
stack
page read and write
106B000
unkown
page readonly
B41000
unkown
page execute read
67A0000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page execute and read and write
2E54000
heap
page read and write
6B8E000
heap
page read and write
3440000
heap
page read and write
1054000
unkown
page readonly
3A88000
trusted library allocation
page read and write
1B38000
heap
page read and write
16A0000
heap
page read and write
2DE0000
heap
page read and write
31AC000
heap
page read and write
5F0000
heap
page read and write
2E1C000
heap
page read and write
6860000
heap
page read and write
3B21000
trusted library allocation
page read and write
90E000
stack
page read and write
E44E000
stack
page read and write
39B5000
trusted library allocation
page read and write
38CC000
trusted library allocation
page read and write
7D53000
heap
page read and write
2E54000
heap
page read and write
9CD000
stack
page read and write
6B20000
trusted library allocation
page read and write
515F000
stack
page read and write
2B90000
heap
page read and write
3B80000
trusted library allocation
page read and write
C35000
heap
page read and write
389A000
trusted library allocation
page read and write
3987000
trusted library allocation
page read and write
3A90000
trusted library allocation
page read and write
3834000
trusted library allocation
page read and write
1726000
heap
page read and write
1B30000
heap
page read and write
2DB8000
heap
page read and write
39E9000
trusted library allocation
page read and write
E400000
trusted library allocation
page execute and read and write
3740000
trusted library allocation
page read and write
E3F0000
trusted library allocation
page read and write
3932000
trusted library allocation
page read and write
2EF0000
heap
page read and write
6B9F000
heap
page read and write
3B65000
trusted library allocation
page read and write
2E7A000
heap
page read and write
3581000
trusted library allocation
page read and write
3A26000
trusted library allocation
page read and write
3B51000
trusted library allocation
page read and write
517E000
stack
page read and write
31A8000
heap
page read and write
35F0000
heap
page execute and read and write
4B40000
heap
page read and write
6B30000
trusted library allocation
page read and write
2E22000
heap
page read and write
3917000
trusted library allocation
page read and write
7CCD000
heap
page read and write
B48000
unkown
page readonly
5B5E000
stack
page read and write
38CE000
trusted library allocation
page read and write
35DE000
trusted library allocation
page read and write
3989000
trusted library allocation
page read and write
2E10000
heap
page read and write
3BAC000
trusted library allocation
page read and write
3866000
trusted library allocation
page read and write
16D0000
trusted library allocation
page read and write
B4B000
unkown
page readonly
882E000
stack
page read and write
393E000
trusted library allocation
page read and write
38E9000
trusted library allocation
page read and write
2DF8000
heap
page read and write
47F000
stack
page read and write
B4B000
unkown
page readonly
B48000
unkown
page readonly
1021000
unkown
page readonly
2DD7000
heap
page read and write
B40000
unkown
page readonly
3796000
trusted library allocation
page read and write
37E9000
trusted library allocation
page read and write
3934000
trusted library allocation
page read and write
2E44000
heap
page read and write
6B60000
heap
page read and write
3AB9000
trusted library allocation
page read and write
3A28000
trusted library allocation
page read and write
803E000
stack
page read and write
850000
heap
page read and write
6A5D000
stack
page read and write
399C000
trusted library allocation
page read and write
6BF000
stack
page read and write
164E000
stack
page read and write
19EE000
stack
page read and write
505E000
stack
page read and write
107C000
unkown
page readonly
B48000
unkown
page readonly
2E04000
heap
page read and write
3902000
trusted library allocation
page read and write
3A73000
trusted library allocation
page read and write
5D5D000
stack
page read and write
1735000
heap
page read and write
3A46000
trusted library allocation
page read and write
6850000
trusted library allocation
page execute and read and write
B48000
unkown
page readonly
102C000
unkown
page readonly
475000
remote allocation
page execute and read and write
3B84000
trusted library allocation
page read and write
370C000
trusted library allocation
page read and write
2DF4000
heap
page read and write
6B50000
heap
page read and write
886E000
stack
page read and write
B48000
unkown
page readonly
64A0000
heap
page read and write
37C2000
trusted library allocation
page read and write
3400000
trusted library allocation
page read and write
31A0000
heap
page read and write
3A20000
trusted library allocation
page read and write
2E21000
heap
page read and write
390B000
trusted library allocation
page read and write
3ADC000
trusted library allocation
page read and write
E5AE000
stack
page read and write
399E000
trusted library allocation
page read and write
2B30000
heap
page read and write
4F0E000
stack
page read and write
6B40000
heap
page read and write
398B000
trusted library allocation
page read and write
3840000
trusted library allocation
page read and write
B48000
unkown
page readonly
2E36000
heap
page read and write
377D000
trusted library allocation
page read and write
3586000
trusted library allocation
page read and write
16CA000
trusted library allocation
page execute and read and write
3A71000
trusted library allocation
page read and write
3AC5000
trusted library allocation
page read and write
2E17000
heap
page read and write
6C0000
heap
page read and write
5F7000
heap
page read and write
B41000
unkown
page execute read
5BC0000
heap
page execute and read and write
8200000
trusted library allocation
page read and write
396C000
trusted library allocation
page read and write
6820000
trusted library section
page readonly
37B3000
trusted library allocation
page read and write
2DF4000
heap
page read and write
3CE000
stack
page read and write
11D0000
heap
page read and write
58E000
stack
page read and write
2E36000
heap
page read and write
4758000
trusted library allocation
page read and write
3BCF000
trusted library allocation
page read and write
14F8000
stack
page read and write
3B63000
trusted library allocation
page read and write
16D5000
trusted library allocation
page execute and read and write
E3F2000
trusted library allocation
page read and write
38D000
stack
page read and write
6B84000
heap
page read and write
3B0A000
trusted library allocation
page read and write
3985000
trusted library allocation
page read and write
3AD8000
trusted library allocation
page read and write
2DF5000
heap
page read and write
669D000
stack
page read and write
3450000
heap
page read and write
4EA0000
heap
page read and write
35A0000
trusted library allocation
page read and write
37F8000
trusted library allocation
page read and write
8B47000
heap
page read and write
39BD000
trusted library allocation
page read and write
3BC9000
trusted library allocation
page read and write
37AF000
trusted library allocation
page read and write
3730000
trusted library allocation
page read and write
10BB000
unkown
page readonly
3B27000
trusted library allocation
page read and write
7D49000
heap
page read and write
169D000
trusted library allocation
page execute and read and write
3A58000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
3AC1000
trusted library allocation
page read and write
3729000
trusted library allocation
page read and write
16D7000
trusted library allocation
page execute and read and write
3790000
trusted library allocation
page read and write
E6AD000
stack
page read and write
6840000
heap
page read and write
66A0000
heap
page read and write
3A6F000
trusted library allocation
page read and write
770000
heap
page read and write
3410000
trusted library allocation
page read and write
5E5D000
stack
page read and write
3B7E000
trusted library allocation
page read and write
19F0000
trusted library allocation
page read and write
B40000
unkown
page readonly
B40000
unkown
page readonly
B41000
unkown
page execute read
3070000
heap
page read and write
38EF000
trusted library allocation
page read and write
3A56000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
3B99000
trusted library allocation
page read and write
37F4000
trusted library allocation
page read and write
B0E000
stack
page read and write
2E44000
heap
page read and write
3050000
heap
page read and write
3A6D000
trusted library allocation
page read and write
3744000
trusted library allocation
page read and write
3712000
trusted library allocation
page read and write
10C1000
unkown
page readonly
3217000
heap
page read and write
38D6000
trusted library allocation
page read and write
37E3000
trusted library allocation
page read and write
39A2000
trusted library allocation
page read and write
2E22000
heap
page read and write
2DF2000
heap
page read and write
388E000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
3A2B000
trusted library allocation
page read and write
681B000
stack
page read and write
E54D000
stack
page read and write
6BB3000
heap
page read and write
2E0F000
heap
page read and write
35D0000
trusted library allocation
page read and write
2E0A000
heap
page read and write
3A24000
trusted library allocation
page read and write
3A22000
trusted library allocation
page read and write
2DE1000
heap
page read and write
1A7D000
stack
page read and write
3A77000
trusted library allocation
page read and write
B41000
unkown
page execute read
37E5000
trusted library allocation
page read and write
16C2000
trusted library allocation
page read and write
C60000
heap
page read and write
3B10000
trusted library allocation
page read and write
3872000
trusted library allocation
page read and write
2E2A000
heap
page read and write
39A6000
trusted library allocation
page read and write
FC2000
unkown
page readonly
593C000
stack
page read and write
37CD000
trusted library allocation
page read and write
1B1C000
stack
page read and write
4601000
trusted library allocation
page read and write
393A000
trusted library allocation
page read and write
3BB8000
trusted library allocation
page read and write
6B67000
heap
page read and write
12D000
stack
page read and write
2FEE000
stack
page read and write
3868000
trusted library allocation
page read and write
3ADE000
trusted library allocation
page read and write
33E0000
heap
page read and write
3A3B000
trusted library allocation
page read and write
3919000
trusted library allocation
page read and write
3BB0000
trusted library allocation
page read and write
3798000
trusted library allocation
page read and write
2E1C000
heap
page read and write
16D000
stack
page read and write
358D000
trusted library allocation
page read and write
2E44000
heap
page read and write
5BB0000
trusted library allocation
page read and write
388B000
trusted library allocation
page read and write
3BB4000
trusted library allocation
page read and write
B4B000
unkown
page readonly
384F000
trusted library allocation
page read and write
2E4E000
heap
page read and write
16B0000
trusted library allocation
page read and write
2DF9000
heap
page read and write
8220000
trusted library section
page read and write
103D000
unkown
page readonly
2E0E000
heap
page read and write
37AB000
trusted library allocation
page read and write
372B000
trusted library allocation
page read and write
3B5F000
trusted library allocation
page read and write
6F0000
heap
page read and write
3923000
trusted library allocation
page read and write
2E12000
heap
page read and write
8A0000
heap
page read and write
379D000
trusted library allocation
page read and write
38D2000
trusted library allocation
page read and write
38D4000
trusted library allocation
page read and write
813E000
stack
page read and write
391D000
trusted library allocation
page read and write
3ABB000
trusted library allocation
page read and write
386A000
trusted library allocation
page read and write
6B8A000
heap
page read and write
4CDA000
stack
page read and write
37E7000
trusted library allocation
page read and write
2DF6000
heap
page read and write
2E12000
heap
page read and write
3885000
trusted library allocation
page read and write
39DB000
trusted library allocation
page read and write
1693000
trusted library allocation
page execute and read and write
3420000
trusted library allocation
page read and write
2C67000
heap
page read and write
1065000
unkown
page readonly
930000
heap
page read and write
630000
heap
page read and write
5960000
heap
page read and write
385B000
trusted library allocation
page read and write
1060000
unkown
page readonly
2E9E000
stack
page read and write
2DFB000
heap
page read and write
3748000
trusted library allocation
page read and write
3564000
trusted library allocation
page read and write
3B0C000
trusted library allocation
page read and write
3B97000
trusted library allocation
page read and write
389C000
trusted library allocation
page read and write
6B75000
heap
page read and write
1799000
heap
page read and write
3723000
trusted library allocation
page read and write
B48000
unkown
page readonly
B41000
unkown
page execute read
3B7C000
trusted library allocation
page read and write
1D0000
heap
page read and write
3821000
trusted library allocation
page read and write
2E21000
heap
page read and write
2E03000
heap
page read and write
66E2000
heap
page read and write
3870000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
1099000
unkown
page readonly
4E01000
heap
page read and write
B41000
unkown
page execute read
3A43000
trusted library allocation
page read and write
1690000
trusted library allocation
page read and write
7C50000
heap
page read and write
10A4000
unkown
page readonly
B41000
unkown
page execute read
2E36000
heap
page read and write
1694000
trusted library allocation
page read and write
B4B000
unkown
page readonly
39E7000
trusted library allocation
page read and write
3823000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page execute and read and write
54FC000
stack
page read and write
3A69000
trusted library allocation
page read and write
379A000
trusted library allocation
page read and write
396A000
trusted library allocation
page read and write
6830000
heap
page read and write
541E000
stack
page read and write
37FC000
trusted library allocation
page read and write
38F3000
trusted library allocation
page read and write
6BA1000
heap
page read and write
2E11000
heap
page read and write
2E54000
heap
page read and write
500F000
stack
page read and write
38D0000
trusted library allocation
page read and write
1026000
unkown
page readonly
10C7000
unkown
page readonly
1032000
unkown
page readonly
16F0000
heap
page read and write
3908000
trusted library allocation
page read and write
8AE0000
trusted library allocation
page read and write
383C000
trusted library allocation
page read and write
3B82000
trusted library allocation
page read and write
2E72000
heap
page read and write
2E21000
heap
page read and write
357E000
trusted library allocation
page read and write
3B25000
trusted library allocation
page read and write
3883000
trusted library allocation
page read and write
2E4A000
heap
page read and write
3727000
trusted library allocation
page read and write
3A54000
trusted library allocation
page read and write
3B9B000
trusted library allocation
page read and write
67AD000
trusted library allocation
page read and write
3794000
trusted library allocation
page read and write
37DF000
trusted library allocation
page read and write
2E54000
heap
page read and write
B40000
unkown
page readonly
C30000
heap
page read and write
59D0000
trusted library allocation
page execute and read and write
5E9D000
stack
page read and write
37F6000
trusted library allocation
page read and write
391F000
trusted library allocation
page read and write
33DF000
stack
page read and write
10AA000
unkown
page readonly
109F000
unkown
page readonly
3ABD000
trusted library allocation
page read and write
3435000
trusted library allocation
page read and write
B40000
unkown
page readonly
43E000
stack
page read and write
16BD000
trusted library allocation
page execute and read and write
83C000
stack
page read and write
3983000
trusted library allocation
page read and write
8240000
trusted library section
page read and write
2DF7000
heap
page read and write
B40000
unkown
page readonly
39EB000
trusted library allocation
page read and write
3881000
trusted library allocation
page read and write
39B3000
trusted library allocation
page read and write
3B1F000
trusted library allocation
page read and write
1E0000
heap
page read and write
1A3E000
stack
page read and write
117A000
stack
page read and write
8B20000
heap
page read and write
3B2A000
trusted library allocation
page read and write
3B6D000
trusted library allocation
page read and write
There are 599 hidden memdumps, click here to show them.