IOC Report
DATASHEET.exe

loading gif

Files

File Path
Type
Category
Malicious
DATASHEET.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DATASHEET.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp8AFA.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\jwvzGqkYNEejno.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\jwvzGqkYNEejno.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\jwvzGqkYNEejno.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0idfn5sd.sey.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4ohgw5pf.2pt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_foo002tp.i5k.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qfghmcx1.3of.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r5k3ypuk.01i.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xmbm2xhz.loo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xxrvomvr.trt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yonm3dkw.rzk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp9C6E.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DATASHEET.exe
"C:\Users\user\Desktop\DATASHEET.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DATASHEET.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jwvzGqkYNEejno.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jwvzGqkYNEejno" /XML "C:\Users\user\AppData\Local\Temp\tmp8AFA.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\jwvzGqkYNEejno.exe
C:\Users\user\AppData\Roaming\jwvzGqkYNEejno.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jwvzGqkYNEejno" /XML "C:\Users\user\AppData\Local\Temp\tmp9C6E.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.org/
172.67.74.152
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://account.dyn.com/
unknown
https://www.globalsign.
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
https://api.ipify.org/t
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://api.ipify.org
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://crl.gl
unknown
http://crl.gl(
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://crl.globalsign?
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
smtp.yandex.ru
77.88.21.158
api.ipify.org
172.67.74.152

IPs

IP
Domain
Country
Malicious
77.88.21.158
smtp.yandex.ru
Russian Federation
172.67.74.152
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
331B000
trusted library allocation
page read and write
malicious
2FA1000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3CA9000
trusted library allocation
page read and write
malicious
2FCC000
trusted library allocation
page read and write
malicious
5540000
trusted library allocation
page read and write
14B0000
trusted library allocation
page read and write
591C000
stack
page read and write
DA0000
heap
page read and write
3977000
trusted library allocation
page read and write
707C000
stack
page read and write
546D000
stack
page read and write
16E0000
heap
page execute and read and write
1461000
heap
page read and write
11AE000
stack
page read and write
5534000
trusted library allocation
page read and write
F90000
trusted library allocation
page read and write
7FAA000
heap
page read and write
71C0000
heap
page read and write
6A1D000
trusted library allocation
page read and write
50E000
stack
page read and write
15AE000
stack
page read and write
5E7B000
stack
page read and write
35ED000
trusted library allocation
page read and write
2DC8000
trusted library allocation
page read and write
4D60000
heap
page read and write
4F70000
heap
page execute and read and write
4CF0000
trusted library allocation
page read and write
1720000
heap
page read and write
309B000
trusted library allocation
page read and write
5E90000
trusted library allocation
page read and write
2871000
trusted library allocation
page read and write
6CB7000
trusted library allocation
page read and write
55F000
stack
page read and write
FF4000
heap
page read and write
FA2000
trusted library allocation
page read and write
7A01000
heap
page read and write
6B2F000
stack
page read and write
9206000
trusted library allocation
page read and write
4D20000
trusted library allocation
page read and write
AC0000
trusted library allocation
page read and write
675F000
stack
page read and write
2860000
heap
page execute and read and write
723E000
stack
page read and write
DFA000
trusted library allocation
page execute and read and write
4EC0000
trusted library allocation
page read and write
7F3F000
stack
page read and write
3F1D000
trusted library allocation
page read and write
FAB000
trusted library allocation
page execute and read and write
5EF5000
heap
page read and write
6100000
heap
page read and write
3AEE000
trusted library allocation
page read and write
3593000
trusted library allocation
page read and write
11C0000
trusted library allocation
page read and write
3F79000
trusted library allocation
page read and write
5B6F000
stack
page read and write
6CFD000
stack
page read and write
34E5000
trusted library allocation
page read and write
68EE000
stack
page read and write
6A00000
trusted library allocation
page read and write
1125000
heap
page read and write
82B0000
heap
page read and write
ADAF000
stack
page read and write
1470000
heap
page read and write
4D70000
trusted library allocation
page read and write
922E000
trusted library allocation
page read and write
F3D000
stack
page read and write
A580000
heap
page read and write
1696000
trusted library allocation
page execute and read and write
7DB0000
trusted library allocation
page execute and read and write
1950000
heap
page read and write
16A7000
trusted library allocation
page execute and read and write
70DE000
stack
page read and write
3628000
trusted library allocation
page read and write
7D7D000
stack
page read and write
2B00000
heap
page read and write
7EC4000
heap
page read and write
43DD000
trusted library allocation
page read and write
65C6000
heap
page read and write
14D0000
trusted library allocation
page read and write
AE8000
heap
page read and write
7A09000
heap
page read and write
9A0000
unkown
page readonly
6FBC000
stack
page read and write
FF6000
heap
page read and write
15F6000
trusted library allocation
page read and write
1186000
heap
page read and write
58D4000
heap
page read and write
2ABE000
stack
page read and write
7EE4000
heap
page read and write
265C000
stack
page read and write
7EDF000
heap
page read and write
6663000
heap
page read and write
182C000
stack
page read and write
51C3000
heap
page read and write
437D000
trusted library allocation
page read and write
A57D000
stack
page read and write
5F0000
heap
page read and write
1358000
stack
page read and write
7240000
trusted library allocation
page read and write
50EE000
stack
page read and write
1940000
trusted library allocation
page read and write
1AE000
unkown
page read and write
6A27000
trusted library allocation
page read and write
7F9A000
heap
page read and write
4CB4000
trusted library allocation
page read and write
3B09000
trusted library allocation
page read and write
1184000
heap
page read and write
2C9E000
stack
page read and write
4F40000
heap
page read and write
A44E000
stack
page read and write
276E000
stack
page read and write
552F000
stack
page read and write
3624000
trusted library allocation
page read and write
A6FD000
stack
page read and write
338A000
trusted library allocation
page read and write
39B2000
trusted library allocation
page read and write
596E000
stack
page read and write
81AC000
stack
page read and write
5A7E000
stack
page read and write
AA0E000
stack
page read and write
9229000
trusted library allocation
page read and write
FA000
stack
page read and write
4F50000
heap
page read and write
14C4000
trusted library allocation
page read and write
62DE000
stack
page read and write
3496000
trusted library allocation
page read and write
5EF0000
heap
page read and write
FB0000
heap
page read and write
4F2E000
stack
page read and write
2840000
trusted library allocation
page read and write
1680000
trusted library allocation
page read and write
A2CC000
stack
page read and write
37B0000
trusted library allocation
page read and write
7F78000
heap
page read and write
55F000
stack
page read and write
FE5000
heap
page read and write
667F000
heap
page read and write
4EE0000
trusted library allocation
page execute and read and write
73B0000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
2B90000
heap
page read and write
42F9000
trusted library allocation
page read and write
439D000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page read and write
2B50000
trusted library allocation
page read and write
1259000
stack
page read and write
A18F000
stack
page read and write
A20000
heap
page read and write
160000
heap
page read and write
150B000
trusted library allocation
page execute and read and write
6A3E000
stack
page read and write
5470000
trusted library section
page readonly
6D2E000
stack
page read and write
65E0000
heap
page read and write
2660000
heap
page read and write
ADD000
trusted library allocation
page execute and read and write
3902000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
323F000
stack
page read and write
2F40000
heap
page read and write
6665000
heap
page read and write
679E000
stack
page read and write
6E00000
trusted library allocation
page execute and read and write
1570000
heap
page read and write
5C0000
heap
page read and write
5A3E000
stack
page read and write
3F57000
trusted library allocation
page read and write
F63000
trusted library allocation
page execute and read and write
D37000
stack
page read and write
6DBE000
stack
page read and write
14E6000
trusted library allocation
page execute and read and write
5A50000
heap
page execute and read and write
1F0000
heap
page read and write
79D8000
heap
page read and write
6E0000
heap
page read and write
F60000
trusted library allocation
page read and write
71B0000
trusted library allocation
page execute and read and write
9210000
trusted library allocation
page read and write
3302000
trusted library allocation
page read and write
9F0E000
stack
page read and write
2B76000
trusted library allocation
page read and write
2855000
trusted library allocation
page read and write
4E3C000
stack
page read and write
5CDF000
stack
page read and write
7EFF000
heap
page read and write
11D0000
heap
page read and write
7EAC000
stack
page read and write
F88000
heap
page read and write
2F20000
heap
page read and write
3A8A000
trusted library allocation
page read and write
58FE000
stack
page read and write
CDE000
stack
page read and write
5B70000
heap
page read and write
A0E000
stack
page read and write
689E000
stack
page read and write
79E7000
heap
page read and write
63E0000
heap
page read and write
67BE000
stack
page read and write
6E70000
heap
page read and write
6B6E000
stack
page read and write
66BE000
heap
page read and write
6000000
heap
page read and write
6E10000
trusted library allocation
page read and write
AD4000
trusted library allocation
page read and write
79D0000
heap
page read and write
169A000
trusted library allocation
page execute and read and write
AE0000
heap
page read and write
A30E000
stack
page read and write
4CCE000
trusted library allocation
page read and write
6D6E000
stack
page read and write
43FD000
trusted library allocation
page read and write
6EC0000
heap
page read and write
921F000
trusted library allocation
page read and write
16D0000
trusted library allocation
page execute and read and write
5250000
trusted library allocation
page read and write
6B7E000
stack
page read and write
496B000
stack
page read and write
68A0000
heap
page read and write
B21000
heap
page read and write
A7CE000
stack
page read and write
4ED0000
trusted library section
page readonly
A90D000
stack
page read and write
42D1000
trusted library allocation
page read and write
5565000
trusted library allocation
page read and write
2820000
trusted library allocation
page read and write
33E8000
trusted library allocation
page read and write
361C000
trusted library allocation
page read and write
14FC000
stack
page read and write
ABAC000
stack
page read and write
356D000
trusted library allocation
page read and write
4D00000
heap
page read and write
4D76000
trusted library allocation
page read and write
3B88000
trusted library allocation
page read and write
13C0000
heap
page read and write
5460000
trusted library allocation
page read and write
DFE000
stack
page read and write
1226000
heap
page read and write
82AC000
stack
page read and write
337A000
trusted library allocation
page read and write
3348000
trusted library allocation
page read and write
2CA1000
trusted library allocation
page read and write
A40F000
stack
page read and write
3871000
trusted library allocation
page read and write
32AD000
trusted library allocation
page read and write
3662000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
7EF9000
heap
page read and write
5480000
heap
page read and write
1505000
trusted library allocation
page execute and read and write
7EEE0000
trusted library allocation
page execute and read and write
3761000
trusted library allocation
page read and write
117A000
heap
page read and write
5FFE000
stack
page read and write
327C000
stack
page read and write
F7D000
trusted library allocation
page execute and read and write
7260000
trusted library allocation
page read and write
32A1000
trusted library allocation
page read and write
3664000
trusted library allocation
page read and write
924C000
trusted library allocation
page read and write
1502000
trusted library allocation
page read and write
160000
heap
page read and write
9242000
trusted library allocation
page read and write
6FFE000
stack
page read and write
1944000
trusted library allocation
page read and write
3647000
trusted library allocation
page read and write
5F7C000
stack
page read and write
A54E000
stack
page read and write
338E000
trusted library allocation
page read and write
FBE000
heap
page read and write
1500000
heap
page read and write
1670000
trusted library allocation
page read and write
6147000
heap
page read and write
5EE0000
heap
page read and write
2996000
trusted library allocation
page read and write
A550000
trusted library allocation
page execute and read and write
362C000
trusted library allocation
page read and write
A80000
heap
page read and write
3292000
trusted library allocation
page read and write
145E000
stack
page read and write
51E000
stack
page read and write
1930000
trusted library allocation
page read and write
F80000
heap
page read and write
9256000
trusted library allocation
page read and write
5EFA000
heap
page read and write
4F30000
heap
page read and write
DDF000
stack
page read and write
7282000
trusted library allocation
page read and write
1120000
heap
page read and write
E37000
heap
page read and write
376C000
trusted library allocation
page read and write
2B54000
trusted library allocation
page read and write
7DC0000
trusted library section
page read and write
3386000
trusted library allocation
page read and write
AEE000
heap
page read and write
66B6000
heap
page read and write
9E0E000
stack
page read and write
9233000
trusted library allocation
page read and write
7E0000
heap
page read and write
1560000
heap
page execute and read and write
ACAC000
stack
page read and write
DF6000
trusted library allocation
page execute and read and write
1150000
heap
page read and write
2F86000
trusted library allocation
page read and write
60FE000
stack
page read and write
557E000
stack
page read and write
7EB0000
heap
page read and write
BD8000
heap
page read and write
A6BD000
stack
page read and write
10F9000
stack
page read and write
AEAE000
stack
page read and write
A1CB000
stack
page read and write
3802000
trusted library allocation
page read and write
1673000
trusted library allocation
page execute and read and write
14CD000
trusted library allocation
page execute and read and write
510000
heap
page read and write
79CE000
stack
page read and write
5A9E000
stack
page read and write
337E000
trusted library allocation
page read and write
715E000
stack
page read and write
1727000
heap
page read and write
1029000
heap
page read and write
DE3000
trusted library allocation
page read and write
51A5000
trusted library allocation
page read and write
7660000
heap
page read and write
920B000
trusted library allocation
page read and write
3688000
trusted library allocation
page read and write
AD0000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
8F7000
stack
page read and write
3620000
trusted library allocation
page read and write
2D15000
trusted library allocation
page read and write
63F2000
heap
page read and write
F9A000
trusted library allocation
page execute and read and write
FA7000
trusted library allocation
page execute and read and write
2F9D000
trusted library allocation
page read and write
2B30000
trusted library allocation
page read and write
35E9000
trusted library allocation
page read and write
6F80000
trusted library allocation
page execute and read and write
3F51000
trusted library allocation
page read and write
E20000
heap
page read and write
2B40000
heap
page execute and read and write
5400000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
52D8000
trusted library allocation
page read and write
524E000
stack
page read and write
14EA000
trusted library allocation
page execute and read and write
14F0000
heap
page read and write
4D80000
trusted library allocation
page execute and read and write
32A6000
trusted library allocation
page read and write
433D000
trusted library allocation
page read and write
1507000
trusted library allocation
page execute and read and write
A90000
heap
page read and write
AD3000
trusted library allocation
page execute and read and write
4CD1000
trusted library allocation
page read and write
168D000
trusted library allocation
page execute and read and write
7F32000
heap
page read and write
8DB0000
trusted library allocation
page read and write
16AB000
trusted library allocation
page execute and read and write
6CA3000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
55EE000
stack
page read and write
328B000
trusted library allocation
page read and write
717C000
stack
page read and write
65C0000
heap
page read and write
13EA000
heap
page read and write
79E4000
heap
page read and write
6F60000
trusted library allocation
page read and write
BD000
stack
page read and write
4D72000
trusted library allocation
page read and write
4CA8000
trusted library allocation
page read and write
5E0000
heap
page read and write
2836000
trusted library allocation
page read and write
2D78000
trusted library allocation
page read and write
32DC000
trusted library allocation
page read and write
6DFB000
stack
page read and write
7F43000
heap
page read and write
6E7D000
heap
page read and write
51A0000
trusted library allocation
page read and write
6B3E000
stack
page read and write
16A0000
trusted library allocation
page read and write
F96000
trusted library allocation
page execute and read and write
13F5000
heap
page read and write
7F62000
heap
page read and write
1130000
heap
page read and write
7EE9000
heap
page read and write
A25000
heap
page read and write
2FCA000
trusted library allocation
page read and write
9224000
trusted library allocation
page read and write
2FC8000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
2834000
trusted library allocation
page read and write
4E50000
trusted library allocation
page read and write
E30000
heap
page read and write
54F0000
heap
page execute and read and write
4D0000
heap
page read and write
6E77000
heap
page read and write
2AFC000
stack
page read and write
900000
unkown
page readonly
2EBE000
stack
page read and write
2778000
trusted library allocation
page read and write
3CA1000
trusted library allocation
page read and write
5559000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
4F58000
trusted library allocation
page read and write
16A5000
trusted library allocation
page execute and read and write
619E000
stack
page read and write
1550000
trusted library allocation
page read and write
1600000
trusted library allocation
page read and write
6E8E000
heap
page read and write
7F56000
heap
page read and write
5232000
trusted library allocation
page read and write
3879000
trusted library allocation
page read and write
6F6E000
trusted library allocation
page read and write
A8CE000
stack
page read and write
73CD000
stack
page read and write
7110000
trusted library allocation
page read and write
37B8000
trusted library allocation
page read and write
6C90000
trusted library allocation
page read and write
13F8000
heap
page read and write
9247000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page execute and read and write
9CCD000
stack
page read and write
7F19000
heap
page read and write
F64000
trusted library allocation
page read and write
16A2000
trusted library allocation
page read and write
1692000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
3EDA000
trusted library allocation
page read and write
435D000
trusted library allocation
page read and write
14E2000
trusted library allocation
page read and write
71F0000
heap
page read and write
1EF000
unkown
page read and write
5600000
heap
page read and write
6690000
heap
page read and write
116E000
heap
page read and write
E02000
trusted library allocation
page read and write
703E000
stack
page read and write
1575000
heap
page read and write
4D03000
heap
page read and write
B08000
heap
page read and write
3FBD000
trusted library allocation
page read and write
902000
unkown
page readonly
5490000
trusted library allocation
page execute and read and write
2F51000
trusted library allocation
page read and write
1140000
heap
page read and write
6F90000
trusted library allocation
page read and write
6DAE000
stack
page read and write
5180000
trusted library allocation
page read and write
65C2000
heap
page read and write
330B000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
520E000
stack
page read and write
7ECD000
heap
page read and write
DE0000
trusted library allocation
page read and write
9204000
trusted library allocation
page read and write
51C0000
heap
page read and write
4CE0000
trusted library allocation
page read and write
5A6E000
stack
page read and write
A08E000
stack
page read and write
57FC000
stack
page read and write
7160000
trusted library allocation
page read and write
3382000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
923D000
trusted library allocation
page read and write
5E2E000
stack
page read and write
B24000
heap
page read and write
192D000
stack
page read and write
1AE000
unkown
page read and write
C39000
stack
page read and write
5240000
trusted library allocation
page execute and read and write
55AC000
stack
page read and write
5760000
trusted library section
page read and write
66AF000
heap
page read and write
32D1000
trusted library allocation
page read and write
9251000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
5EF0000
heap
page read and write
7F5C000
heap
page read and write
6CFE000
heap
page read and write
593E000
stack
page read and write
1540000
trusted library allocation
page read and write
FB8000
heap
page read and write
1660000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
2B82000
trusted library allocation
page read and write
9B90000
heap
page read and write
2994000
trusted library allocation
page read and write
149A000
heap
page read and write
3630000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
4EB0000
heap
page read and write
43BD000
trusted library allocation
page read and write
DB0000
heap
page read and write
32C0000
heap
page read and write
71A0000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page execute and read and write
2B6E000
trusted library allocation
page read and write
1F0000
heap
page read and write
5220000
heap
page read and write
55F0000
heap
page execute and read and write
A6E000
stack
page read and write
378C000
trusted library allocation
page read and write
293A000
trusted library allocation
page read and write
313E000
stack
page read and write
2B71000
trusted library allocation
page read and write
14C3000
trusted library allocation
page execute and read and write
9238000
trusted library allocation
page read and write
E07000
trusted library allocation
page execute and read and write
1610000
heap
page read and write
57D0000
heap
page read and write
5E0000
heap
page read and write
6A08000
trusted library allocation
page read and write
925B000
trusted library allocation
page read and write
629C000
stack
page read and write
4CD6000
trusted library allocation
page read and write
9215000
trusted library allocation
page read and write
660C000
heap
page read and write
2EFE000
stack
page read and write
328E000
trusted library allocation
page read and write
6A6D000
stack
page read and write
329E000
trusted library allocation
page read and write
2FD4000
trusted library allocation
page read and write
6E8B000
heap
page read and write
7EBD000
heap
page read and write
57A000
stack
page read and write
11DE000
heap
page read and write
6CAD000
trusted library allocation
page read and write
57E0000
heap
page read and write
393D000
trusted library allocation
page read and write
343C000
trusted library allocation
page read and write
F73000
trusted library allocation
page read and write
334D000
trusted library allocation
page read and write
553E000
stack
page read and write
F70000
trusted library allocation
page read and write
666F000
heap
page read and write
6A90000
trusted library allocation
page execute and read and write
167D000
trusted library allocation
page execute and read and write
3317000
trusted library allocation
page read and write
13B0000
heap
page read and write
6110000
heap
page read and write
1956000
heap
page read and write
7164000
trusted library allocation
page read and write
758F000
stack
page read and write
1214000
heap
page read and write
5BDE000
stack
page read and write
261E000
stack
page read and write
6CA8000
trusted library allocation
page read and write
1710000
trusted library allocation
page read and write
63DD000
stack
page read and write
5580000
heap
page read and write
5EC0000
trusted library allocation
page execute and read and write
14E0000
trusted library allocation
page read and write
54E0000
heap
page read and write
15F0000
trusted library allocation
page read and write
1674000
trusted library allocation
page read and write
330F000
trusted library allocation
page read and write
1433000
heap
page read and write
16F0000
heap
page read and write
28E5000
trusted library allocation
page read and write
9B8D000
stack
page read and write
5E20000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
9DCE000
stack
page read and write
3313000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page read and write
2B7D000
trusted library allocation
page read and write
69FE000
stack
page read and write
54DE000
stack
page read and write
2810000
trusted library allocation
page execute and read and write
665D000
stack
page read and write
5A1C000
stack
page read and write
7EFE0000
trusted library allocation
page execute and read and write
6C7E000
stack
page read and write
15EC000
stack
page read and write
DF2000
trusted library allocation
page read and write
58D0000
heap
page read and write
1617000
heap
page read and write
383E000
trusted library allocation
page read and write
FA000
stack
page read and write
7ED9000
heap
page read and write
1690000
trusted library allocation
page read and write
34F1000
trusted library allocation
page read and write
E0B000
trusted library allocation
page execute and read and write
1EF000
unkown
page read and write
33C9000
trusted library allocation
page read and write
6EA000
heap
page read and write
7A34000
heap
page read and write
82C0000
heap
page read and write
6D06000
trusted library allocation
page read and write
3A0B000
trusted library allocation
page read and write
6CF0000
heap
page read and write
6A20000
trusted library allocation
page read and write
7C5E000
stack
page read and write
15F4000
trusted library allocation
page read and write
382D000
trusted library allocation
page read and write
5230000
trusted library allocation
page read and write
545B000
stack
page read and write
2B20000
trusted library allocation
page execute and read and write
5E80000
trusted library allocation
page read and write
5FDE000
stack
page read and write
69EE000
stack
page read and write
63E2000
heap
page read and write
6D20000
trusted library allocation
page execute and read and write
7F87000
heap
page read and write
3542000
trusted library allocation
page read and write
5B7E000
stack
page read and write
13DE000
heap
page read and write
5ED0000
trusted library allocation
page read and write
7F05000
heap
page read and write
BD000
stack
page read and write
4EAB000
stack
page read and write
2F8F000
trusted library allocation
page read and write
5236000
trusted library allocation
page read and write
1158000
heap
page read and write
E25000
heap
page read and write
F6D000
trusted library allocation
page execute and read and write
4CB0000
trusted library allocation
page read and write
766E000
heap
page read and write
2830000
trusted library allocation
page read and write
6D00000
trusted library allocation
page read and write
4CDD000
trusted library allocation
page read and write
3AAA000
trusted library allocation
page read and write
135E000
stack
page read and write
12DE000
stack
page read and write
921A000
trusted library allocation
page read and write
5B9E000
stack
page read and write
573D000
stack
page read and write
65F3000
heap
page read and write
6FDE000
stack
page read and write
5F3C000
stack
page read and write
1530000
trusted library allocation
page execute and read and write
4ED4000
trusted library section
page readonly
B00000
heap
page read and write
4CE2000
trusted library allocation
page read and write
7F15000
heap
page read and write
DED000
trusted library allocation
page execute and read and write
154B000
stack
page read and write
DBB000
stack
page read and write
16C0000
trusted library allocation
page read and write
7F90000
heap
page read and write
1520000
trusted library allocation
page read and write
5770000
trusted library allocation
page read and write
6EB0000
heap
page read and write
DF0000
trusted library allocation
page read and write
5B80000
heap
page read and write
5544000
trusted library allocation
page read and write
5C7000
heap
page read and write
4EB5000
heap
page read and write
528E000
stack
page read and write
5EDC000
stack
page read and write
6C98000
trusted library allocation
page read and write
6696000
heap
page read and write
F92000
trusted library allocation
page read and write
There are 646 hidden memdumps, click here to show them.