IOC Report
Telco 32pcs New Purchase Order.exe

loading gif

Files

File Path
Type
Category
Malicious
Telco 32pcs New Purchase Order.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Telco 32pcs New Purchase Order.exe.log
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\tmp4878.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\zBzzGAdzqF.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_432uztg2.dii.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4qeyzlb4.2uh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5xz2eenz.tcz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mvm4nvtf.0f2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q5sra2fq.eff.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s4k1gxl0.mbg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_szz10lyr.bj1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_udh5n3ix.poz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp5C8D.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe
"C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zBzzGAdzqF" /XML "C:\Users\user\AppData\Local\Temp\tmp4878.tmp"
malicious
C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe
"C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe"
malicious
C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe
"C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe"
malicious
C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe
C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zBzzGAdzqF" /XML "C:\Users\user\AppData\Local\Temp\tmp5C8D.tmp"
malicious
C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe
"C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.12.205
https://api.ipify.org
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
https://static.wikia.nocookie.net/mitologa/images/a/a3/Imagen_por_defecto.png/revision/latest/thumbn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.symauth.com/cps0(
unknown
http://www.symauth.com/rpa00
unknown
http://crl.mG
unknown
http://mail.iaa-airferight.com
unknown

Domains

Name
IP
Malicious
mail.iaa-airferight.com
46.175.148.58
malicious
api.ipify.org
104.26.12.205

IPs

IP
Domain
Country
Malicious
46.175.148.58
mail.iaa-airferight.com
Ukraine
malicious
104.26.12.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Telco 32pcs New Purchase Order_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Telco 32pcs New Purchase Order_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Telco 32pcs New Purchase Order_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Telco 32pcs New Purchase Order_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Telco 32pcs New Purchase Order_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Telco 32pcs New Purchase Order_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Telco 32pcs New Purchase Order_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Telco 32pcs New Purchase Order_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Telco 32pcs New Purchase Order_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Telco 32pcs New Purchase Order_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Telco 32pcs New Purchase Order_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Telco 32pcs New Purchase Order_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Telco 32pcs New Purchase Order_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Telco 32pcs New Purchase Order_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zBzzGAdzqF_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zBzzGAdzqF_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zBzzGAdzqF_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zBzzGAdzqF_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zBzzGAdzqF_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zBzzGAdzqF_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zBzzGAdzqF_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zBzzGAdzqF_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zBzzGAdzqF_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zBzzGAdzqF_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zBzzGAdzqF_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zBzzGAdzqF_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zBzzGAdzqF_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\zBzzGAdzqF_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3141000
trusted library allocation
page read and write
malicious
2BE1000
trusted library allocation
page read and write
malicious
2C0C000
trusted library allocation
page read and write
malicious
3165000
trusted library allocation
page read and write
malicious
435000
remote allocation
page execute and read and write
malicious
3B49000
trusted library allocation
page read and write
malicious
2D10000
heap
page execute and read and write
50F8000
trusted library allocation
page read and write
6D4E000
stack
page read and write
1160000
heap
page read and write
40D000
remote allocation
page execute and read and write
6C4E000
stack
page read and write
5790000
heap
page read and write
7220000
trusted library allocation
page execute and read and write
2E1F000
unkown
page read and write
402000
remote allocation
page execute and read and write
BACE000
stack
page read and write
5350000
trusted library section
page readonly
5360000
trusted library allocation
page read and write
FB5000
heap
page read and write
548D000
stack
page read and write
50E9000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
5650000
heap
page read and write
1790000
trusted library allocation
page execute and read and write
7EFA0000
trusted library allocation
page execute and read and write
ED0000
heap
page read and write
2B91000
trusted library allocation
page read and write
DE0000
heap
page read and write
59EB000
stack
page read and write
BBCE000
stack
page read and write
2BA1000
trusted library allocation
page read and write
10A7000
heap
page read and write
FF3000
heap
page read and write
55C0000
trusted library allocation
page read and write
50D0000
heap
page read and write
412D000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
1154000
trusted library allocation
page read and write
1028000
heap
page read and write
56D0000
trusted library allocation
page read and write
3BB9000
trusted library allocation
page read and write
5704000
heap
page read and write
2520000
heap
page read and write
66BE000
stack
page read and write
71CC000
trusted library allocation
page read and write
1040000
trusted library allocation
page read and write
1176000
trusted library allocation
page execute and read and write
1244000
trusted library allocation
page read and write
28DA000
heap
page read and write
16F0000
trusted library allocation
page read and write
517B000
trusted library allocation
page read and write
11D0000
heap
page read and write
5860000
trusted library allocation
page read and write
2B1B000
stack
page read and write
640E000
stack
page read and write
52B0000
heap
page read and write
1132000
trusted library allocation
page read and write
1305000
heap
page read and write
B40E000
stack
page read and write
6A77000
trusted library allocation
page read and write
772000
unkown
page readonly
1187000
trusted library allocation
page execute and read and write
5A60000
trusted library allocation
page read and write
6F1E000
stack
page read and write
5880000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
5725000
trusted library allocation
page read and write
313D000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
5736000
trusted library allocation
page read and write
B60E000
stack
page read and write
71C0000
trusted library allocation
page read and write
2F7B000
heap
page read and write
6B18000
heap
page read and write
7870000
trusted library allocation
page read and write
53A0000
heap
page read and write
8FA000
stack
page read and write
637D000
stack
page read and write
8D20000
heap
page read and write
BC0C000
stack
page read and write
7270000
heap
page read and write
40F1000
trusted library allocation
page read and write
2F70000
heap
page read and write
BE0E000
stack
page read and write
562B000
stack
page read and write
2BC7000
trusted library allocation
page read and write
1475000
heap
page read and write
107A000
trusted library allocation
page execute and read and write
1250000
heap
page read and write
5090000
trusted library allocation
page read and write
5133000
heap
page read and write
FDE000
heap
page read and write
2510000
heap
page read and write
434000
remote allocation
page execute and read and write
1232000
heap
page read and write
12C0000
heap
page read and write
10B8000
heap
page read and write
5070000
trusted library allocation
page read and write
3F6C000
trusted library allocation
page read and write
40F2000
trusted library allocation
page read and write
55B0000
trusted library allocation
page execute and read and write
786E000
stack
page read and write
5870000
trusted library allocation
page execute and read and write
F75000
heap
page read and write
6480000
heap
page read and write
1087000
trusted library allocation
page execute and read and write
17B0000
heap
page read and write
5380000
heap
page execute and read and write
1050000
trusted library allocation
page read and write
10F0000
trusted library allocation
page read and write
571B000
trusted library allocation
page read and write
1225000
heap
page read and write
B44E000
stack
page read and write
13A3000
trusted library allocation
page execute and read and write
1082000
trusted library allocation
page read and write
2BA3000
trusted library allocation
page read and write
749E000
stack
page read and write
54DC000
stack
page read and write
1182000
trusted library allocation
page read and write
6A5E000
stack
page read and write
2CBC000
stack
page read and write
2EE0000
heap
page read and write
108B000
trusted library allocation
page execute and read and write
5710000
trusted library allocation
page read and write
1172000
trusted library allocation
page read and write
1840000
heap
page read and write
2540000
heap
page read and write
B9CE000
stack
page read and write
78E2000
heap
page read and write
2EAF000
stack
page read and write
6A1E000
stack
page read and write
6B10000
heap
page read and write
65BE000
stack
page read and write
13C6000
trusted library allocation
page execute and read and write
5630000
trusted library section
page readonly
51A2000
trusted library allocation
page read and write
74D0000
heap
page read and write
FEF000
heap
page read and write
52E0000
heap
page read and write
683E000
stack
page read and write
17E4000
trusted library allocation
page read and write
6E00000
trusted library allocation
page execute and read and write
8D7A000
heap
page read and write
2D26000
trusted library allocation
page read and write
30EE000
stack
page read and write
2D30000
trusted library allocation
page read and write
12C7000
heap
page read and write
13C0000
trusted library allocation
page read and write
7FBB0000
trusted library allocation
page execute and read and write
13B0000
trusted library allocation
page read and write
13DB000
trusted library allocation
page execute and read and write
7210000
trusted library allocation
page read and write
F10000
heap
page read and write
674E000
stack
page read and write
B88B000
stack
page read and write
11A0000
heap
page read and write
2D40000
trusted library allocation
page read and write
2E81000
trusted library allocation
page read and write
1070000
trusted library allocation
page read and write
BD0C000
stack
page read and write
7200000
trusted library allocation
page read and write
1100000
heap
page read and write
1480000
trusted library allocation
page execute and read and write
5B2E000
stack
page read and write
10FD000
trusted library allocation
page execute and read and write
2B20000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
7913000
heap
page read and write
6B0E000
stack
page read and write
623D000
stack
page read and write
B98C000
stack
page read and write
73F0000
trusted library allocation
page read and write
F30000
heap
page read and write
693F000
stack
page read and write
B94E000
stack
page read and write
526E000
stack
page read and write
11B0000
trusted library allocation
page read and write
6C9E000
stack
page read and write
2BCD000
trusted library allocation
page read and write
2ECC000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
5A2E000
stack
page read and write
4B48000
trusted library allocation
page read and write
5041000
trusted library allocation
page read and write
71E0000
trusted library section
page read and write
145E000
stack
page read and write
6C5E000
stack
page read and write
4E88000
trusted library allocation
page read and write
403000
remote allocation
page execute and read and write
2D24000
trusted library allocation
page read and write
28D0000
heap
page read and write
118B000
trusted library allocation
page execute and read and write
50E0000
trusted library allocation
page read and write
5695000
heap
page read and write
502B000
trusted library allocation
page read and write
519D000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
2CC0000
trusted library allocation
page read and write
53D0000
trusted library allocation
page execute and read and write
5060000
trusted library allocation
page read and write
2D90000
heap
page read and write
53C9000
trusted library allocation
page read and write
571E000
stack
page read and write
1113000
trusted library allocation
page read and write
1169000
stack
page read and write
42A000
remote allocation
page execute and read and write
10B0000
heap
page read and write
117A000
trusted library allocation
page execute and read and write
6947000
trusted library allocation
page read and write
3B91000
trusted library allocation
page read and write
115D000
trusted library allocation
page execute and read and write
2E20000
heap
page read and write
7250000
trusted library allocation
page read and write
770000
unkown
page readonly
1230000
trusted library allocation
page read and write
556E000
stack
page read and write
42B000
remote allocation
page execute and read and write
EF5000
heap
page read and write
DCE000
stack
page read and write
46A000
stack
page read and write
111D000
trusted library allocation
page execute and read and write
1409000
heap
page read and write
312F000
trusted library allocation
page read and write
EF7000
stack
page read and write
561E000
stack
page read and write
ECE000
stack
page read and write
17E6000
trusted library allocation
page read and write
3BFB000
trusted library allocation
page read and write
3EB2000
trusted library allocation
page read and write
2C08000
trusted library allocation
page read and write
BB0E000
stack
page read and write
1053000
trusted library allocation
page execute and read and write
2C06000
trusted library allocation
page read and write
10F4000
trusted library allocation
page read and write
5D48000
trusted library allocation
page read and write
5046000
trusted library allocation
page read and write
5A5E000
stack
page read and write
2A7C000
stack
page read and write
52D0000
heap
page read and write
3B41000
trusted library allocation
page read and write
585E000
stack
page read and write
5700000
heap
page read and write
4119000
trusted library allocation
page read and write
2BDD000
trusted library allocation
page read and write
518E000
trusted library allocation
page read and write
678E000
stack
page read and write
13A4000
trusted library allocation
page read and write
149F000
heap
page read and write
D8E000
stack
page read and write
2B8C000
trusted library allocation
page read and write
70FE000
stack
page read and write
1163000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
2DDE000
unkown
page read and write
6A70000
trusted library allocation
page read and write
3EE3000
trusted library allocation
page read and write
2CD0000
trusted library allocation
page read and write
5580000
heap
page read and write
2E6E000
stack
page read and write
105D000
trusted library allocation
page execute and read and write
647F000
stack
page read and write
572E000
trusted library allocation
page read and write
EF0000
heap
page read and write
6DE0000
trusted library allocation
page read and write
3E89000
trusted library allocation
page read and write
6A60000
heap
page read and write
4074000
trusted library allocation
page read and write
113B000
trusted library allocation
page execute and read and write
571E000
trusted library allocation
page read and write
F8D000
stack
page read and write
1150000
trusted library allocation
page read and write
1054000
trusted library allocation
page read and write
1072000
trusted library allocation
page read and write
1187000
heap
page read and write
739E000
stack
page read and write
78B0000
heap
page read and write
F0E000
stack
page read and write
6D50000
trusted library allocation
page read and write
52D0000
trusted library allocation
page execute and read and write
6D5D000
trusted library allocation
page read and write
6E97000
trusted library allocation
page read and write
4CDC000
stack
page read and write
13D2000
trusted library allocation
page read and write
579D000
stack
page read and write
71D0000
trusted library allocation
page execute and read and write
BACF000
stack
page read and write
8D26000
heap
page read and write
517E000
trusted library allocation
page read and write
55E0000
heap
page read and write
578C000
stack
page read and write
3E81000
trusted library allocation
page read and write
71FE000
stack
page read and write
53C0000
trusted library allocation
page read and write
10E0000
trusted library allocation
page read and write
575E000
stack
page read and write
1126000
trusted library allocation
page execute and read and write
5020000
trusted library allocation
page read and write
2B30000
heap
page read and write
721B000
trusted library allocation
page read and write
66FE000
stack
page read and write
13D7000
trusted library allocation
page execute and read and write
B64D000
stack
page read and write
2BCF000
trusted library allocation
page read and write
78A4000
heap
page read and write
13C2000
trusted library allocation
page read and write
135E000
stack
page read and write
6E3E000
stack
page read and write
739E000
stack
page read and write
1300000
heap
page read and write
5D50000
trusted library allocation
page execute and read and write
5170000
trusted library allocation
page read and write
F3A000
heap
page read and write
8DCE000
stack
page read and write
52A0000
heap
page execute and read and write
2D45000
trusted library allocation
page read and write
BC0E000
stack
page read and write
4170000
trusted library allocation
page read and write
1170000
trusted library allocation
page read and write
112F000
stack
page read and write
1413000
heap
page read and write
6D60000
trusted library allocation
page read and write
7260000
trusted library allocation
page execute and read and write
5182000
trusted library allocation
page read and write
1460000
heap
page read and write
1210000
trusted library allocation
page read and write
7F460000
trusted library allocation
page execute and read and write
6E40000
trusted library allocation
page execute and read and write
117E000
heap
page read and write
2CFD000
trusted library allocation
page read and write
317A000
trusted library allocation
page read and write
729E000
stack
page read and write
701E000
stack
page read and write
6CA0000
heap
page read and write
74DE000
stack
page read and write
D59000
stack
page read and write
D40000
heap
page read and write
138E000
stack
page read and write
2C7A000
stack
page read and write
4167000
trusted library allocation
page read and write
503E000
trusted library allocation
page read and write
73E0000
trusted library allocation
page execute and read and write
C59000
stack
page read and write
5052000
trusted library allocation
page read and write
68CD000
stack
page read and write
FFE000
stack
page read and write
2C0A000
trusted library allocation
page read and write
30F1000
trusted library allocation
page read and write
17A0000
trusted library allocation
page read and write
13A0000
trusted library allocation
page read and write
7946000
heap
page read and write
2D70000
heap
page read and write
B68E000
stack
page read and write
F30000
heap
page read and write
DB0000
heap
page read and write
41EE000
trusted library allocation
page read and write
1230000
heap
page read and write
429000
remote allocation
page execute and read and write
FFD000
heap
page read and write
8FDF000
stack
page read and write
501B000
stack
page read and write
64FE000
heap
page read and write
25CF000
unkown
page read and write
2BD1000
trusted library allocation
page read and write
F3E000
heap
page read and write
5722000
trusted library allocation
page read and write
2CEE000
trusted library allocation
page read and write
5660000
trusted library allocation
page execute and read and write
51B0000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
13E8000
heap
page read and write
1257000
heap
page read and write
2EDD000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
1140000
trusted library allocation
page read and write
6CDE000
stack
page read and write
743E000
stack
page read and write
17D0000
trusted library allocation
page read and write
6B52000
heap
page read and write
5590000
heap
page read and write
428000
remote allocation
page execute and read and write
6509000
heap
page read and write
13BD000
trusted library allocation
page execute and read and write
134E000
stack
page read and write
2A10000
heap
page read and write
3FA6000
trusted library allocation
page read and write
1200000
trusted library allocation
page read and write
75DF000
stack
page read and write
3FF4000
trusted library allocation
page read and write
1800000
heap
page read and write
11F0000
trusted library allocation
page execute and read and write
6E80000
heap
page read and write
50F0000
trusted library allocation
page execute and read and write
56E0000
trusted library allocation
page execute and read and write
56C0000
trusted library allocation
page read and write
1122000
trusted library allocation
page read and write
55E0000
heap
page execute and read and write
1416000
heap
page read and write
4C98000
trusted library allocation
page read and write
55B1000
heap
page read and write
13D5000
trusted library allocation
page execute and read and write
6A0E000
stack
page read and write
5C6F000
stack
page read and write
2C24000
trusted library allocation
page read and write
1780000
heap
page execute and read and write
2C7E000
stack
page read and write
715E000
stack
page read and write
5065000
trusted library allocation
page read and write
6E30000
trusted library allocation
page read and write
2E7F000
stack
page read and write
1194000
heap
page read and write
512B000
trusted library allocation
page read and write
9F7000
stack
page read and write
121E000
stack
page read and write
10A0000
heap
page read and write
7260000
trusted library allocation
page read and write
419000
remote allocation
page execute and read and write
5731000
trusted library allocation
page read and write
698E000
stack
page read and write
1490000
heap
page read and write
5196000
trusted library allocation
page read and write
6DA0000
trusted library section
page read and write
1847000
heap
page read and write
116A000
heap
page read and write
55DE000
stack
page read and write
6DFB000
trusted library allocation
page read and write
2A5F000
stack
page read and write
52E0000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
FB0000
heap
page read and write
78A0000
heap
page read and write
1150000
trusted library allocation
page read and write
12B0000
heap
page read and write
8C00000
trusted library allocation
page execute and read and write
177C000
stack
page read and write
13E0000
heap
page read and write
5130000
heap
page read and write
2EDF000
trusted library allocation
page read and write
41A000
remote allocation
page execute and read and write
51BE000
trusted library allocation
page read and write
6E7E000
stack
page read and write
688F000
stack
page read and write
2A0E000
stack
page read and write
2CF6000
trusted library allocation
page read and write
8CCE000
stack
page read and write
2B41000
trusted library allocation
page read and write
5370000
heap
page read and write
1080000
trusted library allocation
page read and write
711F000
stack
page read and write
112A000
trusted library allocation
page execute and read and write
415A000
trusted library allocation
page read and write
6D67000
trusted library allocation
page read and write
6E50000
heap
page read and write
5120000
trusted library allocation
page read and write
78BC000
heap
page read and write
76E2000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
55D0000
heap
page read and write
73DC000
trusted library allocation
page read and write
528E000
stack
page read and write
5D40000
trusted library allocation
page read and write
664D000
stack
page read and write
57A0000
heap
page read and write
5868000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
116E000
heap
page read and write
B70E000
stack
page read and write
1000000
heap
page read and write
2ADE000
stack
page read and write
258E000
unkown
page read and write
534C000
stack
page read and write
6D53000
trusted library allocation
page read and write
2F0D000
trusted library allocation
page read and write
2CF1000
trusted library allocation
page read and write
13D0000
trusted library allocation
page read and write
13CA000
trusted library allocation
page execute and read and write
5360000
heap
page read and write
10F3000
trusted library allocation
page execute and read and write
563F000
trusted library section
page readonly
106D000
trusted library allocation
page execute and read and write
1085000
trusted library allocation
page execute and read and write
504D000
trusted library allocation
page read and write
5920000
heap
page read and write
11C0000
trusted library allocation
page execute and read and write
F40000
heap
page read and write
53C2000
trusted library allocation
page read and write
C60000
heap
page read and write
520C000
stack
page read and write
E05000
heap
page read and write
1180000
trusted library allocation
page read and write
418000
remote allocation
page execute and read and write
106A000
stack
page read and write
56BE000
stack
page read and write
1130000
trusted library allocation
page read and write
1160000
trusted library allocation
page read and write
5742000
trusted library allocation
page read and write
11EE000
stack
page read and write
71A0000
heap
page read and write
173E000
stack
page read and write
52F0000
heap
page read and write
1076000
trusted library allocation
page execute and read and write
1497000
heap
page read and write
10CE000
stack
page read and write
6DF0000
trusted library allocation
page read and write
2B8F000
stack
page read and write
1137000
trusted library allocation
page execute and read and write
F77000
heap
page read and write
69CE000
stack
page read and write
1220000
heap
page execute and read and write
57B0000
heap
page read and write
6DAD000
stack
page read and write
5570000
heap
page read and write
10E6000
heap
page read and write
13AD000
trusted library allocation
page execute and read and write
17E0000
trusted library allocation
page read and write
725E000
stack
page read and write
5510000
trusted library allocation
page execute and read and write
5640000
heap
page read and write
3126000
trusted library allocation
page read and write
6EB0000
trusted library section
page read and write
8EDE000
stack
page read and write
1110000
trusted library allocation
page read and write
B750000
heap
page read and write
573D000
trusted library allocation
page read and write
11A2000
heap
page read and write
4E2E000
stack
page read and write
1237000
heap
page read and write
50E2000
trusted library allocation
page read and write
2C3D000
stack
page read and write
116D000
trusted library allocation
page execute and read and write
5575000
heap
page read and write
52D4000
heap
page read and write
57A0000
heap
page execute and read and write
73D0000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
6DDE000
stack
page read and write
2C14000
trusted library allocation
page read and write
10DA000
heap
page read and write
1120000
trusted library allocation
page read and write
42D000
stack
page read and write
11A0000
trusted library allocation
page read and write
E00000
heap
page read and write
67FE000
stack
page read and write
703F000
stack
page read and write
6D58000
trusted library allocation
page read and write
10E4000
heap
page read and write
F66000
heap
page read and write
54B0000
heap
page read and write
17F0000
trusted library allocation
page read and write
588D000
trusted library allocation
page read and write
6940000
trusted library allocation
page read and write
2A80000
heap
page execute and read and write
5B6E000
stack
page read and write
427000
remote allocation
page execute and read and write
7440000
trusted library allocation
page execute and read and write
1153000
trusted library allocation
page execute and read and write
2CB0000
heap
page read and write
5191000
trusted library allocation
page read and write
54B3000
heap
page read and write
2D50000
trusted library allocation
page read and write
5690000
heap
page read and write
5670000
trusted library allocation
page read and write
113B000
heap
page read and write
633F000
stack
page read and write
8D71000
heap
page read and write
BCA000
stack
page read and write
5CAE000
stack
page read and write
11D0000
heap
page read and write
40E000
remote allocation
page execute and read and write
53B0000
heap
page read and write
64C7000
heap
page read and write
6C1D000
stack
page read and write
There are 562 hidden memdumps, click here to show them.