IOC Report
FYCC new order S460013746-560121121.exe

loading gif

Files

File Path
Type
Category
Malicious
FYCC new order S460013746-560121121.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\FYCC new order S460013746-560121121.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpF74B.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\zriEHRxkd.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\zriEHRxkd.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\zriEHRxkd.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fe2r200w.yhc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jcafdcfa.5jz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mdycztaz.hqd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ppqd0hcd.2qn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r5up10i1.s32.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tnfhr2ps.efj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ujec2vvu.5ib.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yeatg0jm.ngw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp8B0.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\FYCC new order S460013746-560121121.exe
"C:\Users\user\Desktop\FYCC new order S460013746-560121121.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FYCC new order S460013746-560121121.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\zriEHRxkd.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zriEHRxkd" /XML "C:\Users\user\AppData\Local\Temp\tmpF74B.tmp"
malicious
C:\Users\user\Desktop\FYCC new order S460013746-560121121.exe
"C:\Users\user\Desktop\FYCC new order S460013746-560121121.exe"
malicious
C:\Users\user\AppData\Roaming\zriEHRxkd.exe
C:\Users\user\AppData\Roaming\zriEHRxkd.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zriEHRxkd" /XML "C:\Users\user\AppData\Local\Temp\tmp8B0.tmp"
malicious
C:\Users\user\AppData\Roaming\zriEHRxkd.exe
"C:\Users\user\AppData\Roaming\zriEHRxkd.exe"
malicious
C:\Users\user\AppData\Roaming\zriEHRxkd.exe
"C:\Users\user\AppData\Roaming\zriEHRxkd.exe"
malicious
C:\Users\user\AppData\Roaming\zriEHRxkd.exe
"C:\Users\user\AppData\Roaming\zriEHRxkd.exe"
malicious
C:\Users\user\AppData\Roaming\zriEHRxkd.exe
"C:\Users\user\AppData\Roaming\zriEHRxkd.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://account.dyn.com/
unknown
http://www.fontbureau.com/designers?
unknown
http://mail.iaa-airferight.com
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 18 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.iaa-airferight.com
46.175.148.58
malicious

IPs

IP
Domain
Country
Malicious
46.175.148.58
mail.iaa-airferight.com
Ukraine
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2BB1000
trusted library allocation
page read and write
malicious
48EA000
trusted library allocation
page read and write
malicious
2C00000
trusted library allocation
page read and write
malicious
3051000
trusted library allocation
page read and write
malicious
309E000
trusted library allocation
page read and write
malicious
BE5000
heap
page read and write
6397000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
3091000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
1626000
trusted library allocation
page read and write
1124000
trusted library allocation
page read and write
5573000
heap
page read and write
12F1000
heap
page read and write
131E000
heap
page read and write
1020000
trusted library allocation
page read and write
4E91000
trusted library allocation
page read and write
29D1000
trusted library allocation
page read and write
1253000
trusted library allocation
page read and write
1612000
trusted library allocation
page read and write
BAE000
stack
page read and write
7F890000
trusted library allocation
page execute and read and write
77C0000
trusted library section
page read and write
4F50000
trusted library allocation
page execute and read and write
585F000
stack
page read and write
CA4E000
stack
page read and write
403000
remote allocation
page execute and read and write
150E000
stack
page read and write
EAE000
heap
page read and write
C65E000
stack
page read and write
1305000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
FE0000
trusted library allocation
page read and write
10D6000
trusted library allocation
page read and write
1644000
trusted library allocation
page read and write
2F06000
trusted library allocation
page read and write
E90000
heap
page read and write
51BD000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
426000
remote allocation
page execute and read and write
12E0000
heap
page read and write
1244000
trusted library allocation
page read and write
12D0000
trusted library allocation
page read and write
1339000
heap
page read and write
5570000
heap
page read and write
32DA000
trusted library allocation
page read and write
4E74000
trusted library allocation
page read and write
6AC0000
heap
page read and write
15AC000
stack
page read and write
FCB000
trusted library allocation
page execute and read and write
66D2000
heap
page read and write
79D0000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
1392000
heap
page read and write
5560000
trusted library allocation
page execute and read and write
1352000
heap
page read and write
4BB8000
trusted library allocation
page read and write
94AE000
stack
page read and write
1110000
trusted library allocation
page read and write
6F9F000
stack
page read and write
5FFD000
stack
page read and write
41E000
remote allocation
page execute and read and write
53E000
stack
page read and write
F6E000
heap
page read and write
F7F000
heap
page read and write
4FB0000
heap
page read and write
52B0000
trusted library allocation
page read and write
2C08000
trusted library allocation
page read and write
FB2000
trusted library allocation
page read and write
11BE000
stack
page read and write
EA0000
trusted library allocation
page read and write
6694000
heap
page read and write
58C0000
heap
page read and write
12F0000
trusted library allocation
page read and write
76C3000
heap
page read and write
5190000
heap
page execute and read and write
51AE000
trusted library allocation
page read and write
2F20000
trusted library allocation
page read and write
9C8D000
trusted library allocation
page read and write
66D0000
trusted library allocation
page execute and read and write
F9D000
trusted library allocation
page execute and read and write
4E8E000
trusted library allocation
page read and write
52F0000
heap
page read and write
1142000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page read and write
5500000
trusted library allocation
page execute and read and write
6007000
trusted library allocation
page read and write
C6C000
heap
page read and write
BBE000
heap
page read and write
4079000
trusted library allocation
page read and write
1152000
trusted library allocation
page read and write
609E000
stack
page read and write
519B000
trusted library allocation
page read and write
E50000
heap
page read and write
160E000
stack
page read and write
30B4000
trusted library allocation
page read and write
1640000
trusted library allocation
page read and write
CFA000
stack
page read and write
161A000
trusted library allocation
page read and write
5330000
heap
page read and write
4EF0000
trusted library allocation
page read and write
FA0000
trusted library allocation
page read and write
1D0000
heap
page read and write
140000
heap
page read and write
1123000
trusted library allocation
page execute and read and write
77A000
stack
page read and write
1240000
trusted library allocation
page read and write
C90E000
stack
page read and write
30E2000
trusted library allocation
page read and write
4465000
trusted library allocation
page read and write
54F2000
trusted library allocation
page read and write
51B1000
trusted library allocation
page read and write
62E2000
heap
page read and write
9F0000
heap
page read and write
514D000
stack
page read and write
10CC000
stack
page read and write
519E000
trusted library allocation
page read and write
108E000
stack
page read and write
F60000
heap
page read and write
30E4000
trusted library allocation
page read and write
16BC000
stack
page read and write
106E000
stack
page read and write
2F40000
trusted library allocation
page read and write
634E000
stack
page read and write
42F7000
trusted library allocation
page read and write
B60000
heap
page read and write
10C0000
heap
page read and write
402000
remote allocation
page execute and read and write
1337000
heap
page read and write
1000000
trusted library allocation
page read and write
1146000
trusted library allocation
page execute and read and write
B98E000
stack
page read and write
5535000
heap
page read and write
76C0000
heap
page read and write
2EE4000
trusted library allocation
page read and write
595E000
stack
page read and write
425000
remote allocation
page execute and read and write
FC2000
trusted library allocation
page read and write
5900000
trusted library allocation
page execute and read and write
126A000
trusted library allocation
page execute and read and write
6390000
trusted library allocation
page read and write
5760000
heap
page read and write
EA4000
trusted library allocation
page read and write
298E000
stack
page read and write
60E0000
trusted library allocation
page read and write
6000000
trusted library allocation
page read and write
2B6C000
stack
page read and write
BA8E000
stack
page read and write
5190000
trusted library allocation
page read and write
52DE000
stack
page read and write
FC7000
trusted library allocation
page execute and read and write
CB8C000
stack
page read and write
E90000
trusted library allocation
page read and write
1290000
heap
page read and write
58D0000
trusted library allocation
page read and write
124D000
trusted library allocation
page execute and read and write
62A0000
heap
page read and write
518B000
stack
page read and write
1660000
trusted library allocation
page read and write
10E0000
heap
page read and write
1344000
heap
page read and write
5490000
heap
page read and write
160E000
trusted library allocation
page read and write
57F000
stack
page read and write
569F000
stack
page read and write
51A2000
trusted library allocation
page read and write
10E7000
heap
page read and write
3BB9000
trusted library allocation
page read and write
BF9C000
stack
page read and write
10D4000
trusted library allocation
page read and write
58CC000
trusted library allocation
page read and write
113D000
trusted library allocation
page execute and read and write
4E70000
trusted library allocation
page read and write
146F000
stack
page read and write
F23000
heap
page read and write
654E000
stack
page read and write
6D91000
heap
page read and write
112D000
trusted library allocation
page execute and read and write
EAD000
trusted library allocation
page execute and read and write
13B9000
heap
page read and write
FF0000
trusted library allocation
page execute and read and write
446C000
trusted library allocation
page read and write
3039000
trusted library allocation
page read and write
70DE000
stack
page read and write
4EB0000
trusted library allocation
page read and write
10E0000
heap
page read and write
FAD000
trusted library allocation
page execute and read and write
771D000
heap
page read and write
6AD0000
trusted library allocation
page execute and read and write
629E000
stack
page read and write
5B80000
trusted library allocation
page read and write
114A000
trusted library allocation
page execute and read and write
62A8000
heap
page read and write
529E000
stack
page read and write
1080000
heap
page read and write
16C0000
heap
page execute and read and write
93A000
stack
page read and write
1297000
heap
page read and write
301E000
stack
page read and write
2C7A000
heap
page read and write
2991000
trusted library allocation
page read and write
12AA000
heap
page read and write
1310000
heap
page read and write
C09C000
stack
page read and write
9A0000
heap
page read and write
58C4000
heap
page read and write
B66000
heap
page read and write
3BB1000
trusted library allocation
page read and write
2BDA000
trusted library allocation
page read and write
1270000
heap
page read and write
118E000
stack
page read and write
400000
remote allocation
page execute and read and write
1278000
heap
page read and write
4D4E000
stack
page read and write
10E5000
heap
page read and write
15C0000
trusted library allocation
page read and write
5300000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
BF5E000
stack
page read and write
54F0000
trusted library allocation
page read and write
9D000
stack
page read and write
15F0000
trusted library allocation
page read and write
7F0000
heap
page read and write
41F000
remote allocation
page execute and read and write
529D000
stack
page read and write
EBD000
trusted library allocation
page execute and read and write
4F94000
trusted library section
page readonly
5B8C000
trusted library allocation
page read and write
2F0D000
trusted library allocation
page read and write
66D9000
heap
page read and write
1CE000
unkown
page read and write
58E0000
trusted library allocation
page read and write
71DE000
stack
page read and write
10D0000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
2FDE000
stack
page read and write
2EE0000
trusted library allocation
page read and write
6C5E000
stack
page read and write
ECA000
trusted library allocation
page execute and read and write
12A7000
heap
page read and write
4E7B000
trusted library allocation
page read and write
AF7000
stack
page read and write
6D5F000
stack
page read and write
DF7000
stack
page read and write
12C0000
trusted library allocation
page read and write
1010000
trusted library allocation
page execute and read and write
75BE000
stack
page read and write
638E000
stack
page read and write
CC8C000
stack
page read and write
5BFD000
stack
page read and write
7F600000
trusted library allocation
page execute and read and write
5560000
heap
page read and write
4099000
trusted library allocation
page read and write
F93000
trusted library allocation
page execute and read and write
620000
heap
page read and write
52E0000
trusted library allocation
page read and write
BCDE000
stack
page read and write
39D1000
trusted library allocation
page read and write
76E2000
heap
page read and write
1200000
heap
page read and write
3BD9000
trusted library allocation
page read and write
EC6000
trusted library allocation
page execute and read and write
1277000
trusted library allocation
page execute and read and write
1299000
heap
page read and write
F8E000
heap
page read and write
EC5000
heap
page read and write
BB0000
heap
page read and write
8CA000
stack
page read and write
575C000
stack
page read and write
2F80000
heap
page execute and read and write
E40000
heap
page read and write
2F50000
heap
page execute and read and write
520C000
stack
page read and write
52C0000
trusted library allocation
page execute and read and write
436000
remote allocation
page execute and read and write
115B000
trusted library allocation
page execute and read and write
5530000
heap
page read and write
52F0000
trusted library allocation
page read and write
BF7000
heap
page read and write
6B2E000
heap
page read and write
2B70000
trusted library allocation
page read and write
5196000
trusted library allocation
page read and write
DA000
stack
page read and write
EA3000
trusted library allocation
page execute and read and write
5510000
trusted library allocation
page read and write
EE0000
heap
page read and write
1030000
heap
page execute and read and write
52F9000
trusted library allocation
page read and write
4990000
trusted library allocation
page read and write
C7CE000
stack
page read and write
1262000
trusted library allocation
page read and write
88D000
stack
page read and write
2B2F000
unkown
page read and write
1354000
heap
page read and write
1060000
heap
page read and write
1120000
trusted library allocation
page read and write
51C2000
trusted library allocation
page read and write
1346000
heap
page read and write
1170000
trusted library allocation
page read and write
127B000
trusted library allocation
page execute and read and write
5880000
heap
page read and write
54E0000
heap
page read and write
EB3000
trusted library allocation
page read and write
309C000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
7700000
heap
page read and write
FEE000
stack
page read and write
76BE000
stack
page read and write
C8CE000
stack
page read and write
1010000
trusted library allocation
page read and write
4059000
trusted library allocation
page read and write
586E000
stack
page read and write
1331000
heap
page read and write
4051000
trusted library allocation
page read and write
2B6E000
stack
page read and write
442B000
trusted library allocation
page read and write
1020000
heap
page read and write
A1B0000
trusted library section
page read and write
EC2000
trusted library allocation
page read and write
2EDC000
stack
page read and write
7E0000
heap
page read and write
6D8F000
heap
page read and write
2F12000
trusted library allocation
page read and write
2B2E000
stack
page read and write
30D1000
trusted library allocation
page read and write
4F42000
trusted library allocation
page read and write
2E90000
heap
page read and write
525E000
stack
page read and write
40B9000
trusted library allocation
page read and write
1650000
heap
page execute and read and write
15D0000
heap
page read and write
3C19000
trusted library allocation
page read and write
1606000
trusted library allocation
page read and write
4F90000
trusted library section
page readonly
2DEE000
stack
page read and write
2E3E000
stack
page read and write
FB6000
trusted library allocation
page execute and read and write
11D8000
trusted library allocation
page read and write
16F0000
heap
page read and write
58E6000
trusted library allocation
page read and write
438000
remote allocation
page execute and read and write
51B6000
trusted library allocation
page read and write
5650000
heap
page read and write
160B000
trusted library allocation
page read and write
7BBE000
stack
page read and write
FC5000
trusted library allocation
page execute and read and write
4FB3000
heap
page read and write
9F5000
heap
page read and write
161E000
trusted library allocation
page read and write
ED7000
trusted library allocation
page execute and read and write
4E9D000
trusted library allocation
page read and write
1140000
heap
page read and write
CF9000
stack
page read and write
5350000
heap
page read and write
2DF5000
trusted library allocation
page read and write
5320000
heap
page read and write
6E9E000
stack
page read and write
1070000
trusted library allocation
page read and write
5B82000
trusted library allocation
page read and write
1243000
trusted library allocation
page execute and read and write
30A6000
trusted library allocation
page read and write
CB4F000
stack
page read and write
59FE000
heap
page read and write
58F0000
trusted library allocation
page execute and read and write
ED2000
trusted library allocation
page read and write
4FA0000
heap
page read and write
4E7E000
trusted library allocation
page read and write
107E000
stack
page read and write
55CE000
stack
page read and write
8E0000
heap
page read and write
1270000
trusted library allocation
page read and write
BD7000
heap
page read and write
C41E000
stack
page read and write
12E4000
heap
page read and write
4F0000
heap
page read and write
58AE000
heap
page read and write
579E000
stack
page read and write
4270000
trusted library allocation
page read and write
5194000
trusted library allocation
page read and write
66C0000
heap
page read and write
2BFE000
trusted library allocation
page read and write
5353000
heap
page read and write
2C16000
trusted library allocation
page read and write
BBA000
heap
page read and write
9440000
trusted library section
page read and write
1266000
trusted library allocation
page execute and read and write
6D60000
heap
page read and write
3999000
trusted library allocation
page read and write
437000
remote allocation
page execute and read and write
18E000
unkown
page read and write
5300000
heap
page execute and read and write
F01000
heap
page read and write
4EC5000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
B80000
unkown
page readonly
6B20000
heap
page read and write
EDB000
trusted library allocation
page execute and read and write
5C00000
trusted library allocation
page execute and read and write
60F0000
trusted library allocation
page read and write
5550000
trusted library section
page readonly
2BA0000
heap
page execute and read and write
13DF000
heap
page read and write
BE5E000
stack
page read and write
4ED0000
trusted library allocation
page read and write
5870000
heap
page read and write
7102000
trusted library allocation
page read and write
E98000
heap
page read and write
F85000
heap
page read and write
4B2C000
stack
page read and write
589E000
stack
page read and write
15B0000
trusted library allocation
page execute and read and write
FBA000
trusted library allocation
page execute and read and write
4995000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
52E2000
trusted library allocation
page read and write
52A0000
heap
page read and write
4E96000
trusted library allocation
page read and write
59F0000
heap
page read and write
EF9000
stack
page read and write
B3E000
stack
page read and write
628000
heap
page read and write
1272000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
F94000
trusted library allocation
page read and write
3991000
trusted library allocation
page read and write
52F5000
heap
page read and write
1632000
trusted library allocation
page read and write
62EA000
heap
page read and write
5B00000
trusted library allocation
page execute and read and write
915B000
trusted library allocation
page read and write
2F30000
heap
page read and write
A10000
heap
page read and write
1157000
trusted library allocation
page execute and read and write
1230000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
5750000
heap
page read and write
FB0000
trusted library allocation
page read and write
574B000
stack
page read and write
308E000
stack
page read and write
2BFC000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
42AA000
trusted library allocation
page read and write
1310000
heap
page read and write
1074000
trusted library allocation
page read and write
A30000
heap
page read and write
518C000
stack
page read and write
12B0000
trusted library allocation
page execute and read and write
BBDE000
stack
page read and write
BD1E000
stack
page read and write
5BA0000
trusted library allocation
page read and write
CA0E000
stack
page read and write
5B86000
trusted library allocation
page read and write
BE1E000
stack
page read and write
DD0000
heap
page read and write
EC3000
heap
page read and write
11E0000
heap
page read and write
C51E000
stack
page read and write
1646000
trusted library allocation
page read and write
70E0000
trusted library allocation
page read and write
F90000
trusted library allocation
page read and write
F77000
heap
page read and write
2C70000
heap
page read and write
791E000
stack
page read and write
A7E000
unkown
page read and write
125D000
trusted library allocation
page execute and read and write
6D70000
heap
page read and write
1155000
trusted library allocation
page execute and read and write
E80000
trusted library allocation
page read and write
41EA000
trusted library allocation
page read and write
2F9F000
stack
page read and write
B82000
unkown
page readonly
68D0000
heap
page read and write
6B20000
heap
page read and write
4EA2000
trusted library allocation
page read and write
2EFE000
trusted library allocation
page read and write
C230000
trusted library allocation
page execute and read and write
781E000
stack
page read and write
118F000
stack
page read and write
6FA0000
heap
page read and write
EB0000
trusted library allocation
page read and write
2EEB000
trusted library allocation
page read and write
6690000
heap
page read and write
49FD000
stack
page read and write
559C000
stack
page read and write
11CE000
stack
page read and write
5B20000
trusted library allocation
page read and write
1205000
heap
page read and write
1621000
trusted library allocation
page read and write
BF9000
stack
page read and write
5BB0000
trusted library allocation
page execute and read and write
2F01000
trusted library allocation
page read and write
5A5E000
stack
page read and write
41D000
remote allocation
page execute and read and write
60DE000
stack
page read and write
4F30000
heap
page read and write
C34000
unkown
page readonly
C55E000
stack
page read and write
1250000
trusted library allocation
page read and write
39B9000
trusted library allocation
page read and write
5310000
heap
page read and write
4EC0000
trusted library allocation
page read and write
3030000
trusted library allocation
page read and write
930000
heap
page read and write
E7F000
stack
page read and write
5653000
heap
page read and write
52ED000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
7704000
heap
page read and write
4F60000
trusted library allocation
page read and write
BF4000
heap
page read and write
3040000
heap
page read and write
EB9000
heap
page read and write
1140000
trusted library allocation
page read and write
2BAF000
stack
page read and write
162D000
trusted library allocation
page read and write
5BA6000
trusted library allocation
page read and write
9EE000
stack
page read and write
1040000
heap
page read and write
4374000
trusted library allocation
page read and write
11C0000
heap
page read and write
4091000
trusted library allocation
page read and write
1600000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
5090000
heap
page read and write
There are 515 hidden memdumps, click here to show them.