IOC Report
P020241901.exe

loading gif

Files

File Path
Type
Category
Malicious
P020241901.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmpF9C9.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\VKkzqGUhsZwwm.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\P020241901.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\VKkzqGUhsZwwm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4gbcp5mo.svp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kukwo04m.elw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ngjuznog.vlp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ruetq44x.yc0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s1rydocn.w14.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_stcfywtp.z2r.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tijkny5d.u50.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ysdjgrp2.ove.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpBEA.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\VKkzqGUhsZwwm.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\P020241901.exe
C:\Users\user\Desktop\P020241901.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\P020241901.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VKkzqGUhsZwwm.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VKkzqGUhsZwwm" /XML "C:\Users\user\AppData\Local\Temp\tmpF9C9.tmp
malicious
C:\Users\user\Desktop\P020241901.exe
C:\Users\user\Desktop\P020241901.exe
malicious
C:\Users\user\AppData\Roaming\VKkzqGUhsZwwm.exe
C:\Users\user\AppData\Roaming\VKkzqGUhsZwwm.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VKkzqGUhsZwwm" /XML "C:\Users\user\AppData\Local\Temp\tmpBEA.tmp
malicious
C:\Users\user\AppData\Roaming\VKkzqGUhsZwwm.exe
C:\Users\user\AppData\Roaming\VKkzqGUhsZwwm.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://mail.cup.org.pk
unknown

Domains

Name
IP
Malicious
mail.cup.org.pk
203.82.48.116
malicious
_kerberos._tcp.dc._msdcs.cup.org.pk
unknown

IPs

IP
Domain
Country
Malicious
203.82.48.116
mail.cup.org.pk
Pakistan
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
375E000
trusted library allocation
page read and write
malicious
2A50000
trusted library allocation
page read and write
malicious
2A6A000
trusted library allocation
page read and write
malicious
2A01000
trusted library allocation
page read and write
malicious
2AF1000
trusted library allocation
page read and write
malicious
2B3E000
trusted library allocation
page read and write
malicious
2B59000
trusted library allocation
page read and write
malicious
431000
remote allocation
page execute and read and write
malicious
4F10000
heap
page read and write
96E000
stack
page read and write
6942000
trusted library allocation
page read and write
2BB0000
heap
page read and write
84CF000
stack
page read and write
700000
heap
page read and write
4A10000
trusted library allocation
page read and write
50C5000
heap
page read and write
2960000
trusted library allocation
page read and write
4FD6000
trusted library allocation
page read and write
4FFD000
trusted library allocation
page read and write
70E000
heap
page read and write
5DAF000
stack
page read and write
606E000
stack
page read and write
51C3000
heap
page read and write
602F000
stack
page read and write
A9E000
unkown
page read and write
6B80000
trusted library allocation
page execute and read and write
47E000
unkown
page read and write
6C90000
trusted library section
page read and write
576C000
trusted library allocation
page read and write
5030000
trusted library allocation
page read and write
4AF8000
trusted library allocation
page read and write
5766000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page read and write
1110000
heap
page read and write
E80000
heap
page read and write
2932000
trusted library allocation
page read and write
9D0000
heap
page read and write
B00000
trusted library allocation
page read and write
B37000
heap
page read and write
2F50000
heap
page read and write
4E70000
heap
page read and write
26CD000
trusted library allocation
page read and write
4F7000
stack
page read and write
BC0000
heap
page read and write
D7E000
stack
page read and write
625000
heap
page read and write
9E8E000
stack
page read and write
42E000
remote allocation
page execute and read and write
28F5000
trusted library allocation
page execute and read and write
2670000
trusted library allocation
page read and write
3673000
trusted library allocation
page read and write
CC0000
heap
page read and write
414000
remote allocation
page execute and read and write
545E000
stack
page read and write
4A90000
trusted library allocation
page execute and read and write
9CE000
stack
page read and write
1CA000
stack
page read and write
5B7E000
stack
page read and write
B40000
trusted library allocation
page read and write
25CE000
trusted library allocation
page read and write
6F7000
stack
page read and write
9E4E000
stack
page read and write
5080000
trusted library allocation
page read and write
4AC0000
heap
page read and write
2910000
trusted library allocation
page read and write
5F40000
trusted library allocation
page execute and read and write
B03000
trusted library allocation
page read and write
3581000
trusted library allocation
page read and write
26FE000
stack
page read and write
2450000
trusted library allocation
page read and write
5090000
trusted library section
page read and write
4F00000
heap
page read and write
B8C000
heap
page read and write
430000
remote allocation
page execute and read and write
4AED000
trusted library allocation
page read and write
4A05000
trusted library allocation
page read and write
3639000
trusted library allocation
page read and write
2946000
trusted library allocation
page read and write
5E2E000
stack
page read and write
3723000
trusted library allocation
page read and write
1F0000
heap
page read and write
29F0000
heap
page execute and read and write
2430000
heap
page read and write
268A000
trusted library allocation
page execute and read and write
4B30000
trusted library allocation
page read and write
4EC0000
heap
page read and write
236B000
stack
page read and write
4FE2000
trusted library allocation
page read and write
83CE000
stack
page read and write
293A000
trusted library allocation
page read and write
5CB6000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
5D0E000
stack
page read and write
ADF000
unkown
page read and write
5020000
trusted library allocation
page read and write
A7A000
heap
page read and write
5F36000
trusted library allocation
page read and write
4FD4000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
830000
heap
page read and write
68C0000
trusted library allocation
page read and write
E79000
heap
page read and write
4EBE000
stack
page read and write
B8E000
stack
page read and write
528C000
stack
page read and write
3883000
trusted library allocation
page read and write
42B000
remote allocation
page execute and read and write
4FE5000
trusted library allocation
page read and write
4A30000
trusted library allocation
page read and write
5D10000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
5F30000
trusted library allocation
page read and write
50A0000
trusted library section
page read and write
AA0000
heap
page read and write
A50000
heap
page read and write
5002000
trusted library allocation
page read and write
28C3000
trusted library allocation
page execute and read and write
5040000
heap
page read and write
28FB000
trusted library allocation
page execute and read and write
6C0000
trusted library allocation
page read and write
28EA000
trusted library allocation
page execute and read and write
6130000
heap
page read and write
3625000
trusted library allocation
page read and write
EE4000
heap
page read and write
A11000
heap
page read and write
741000
heap
page read and write
2581000
trusted library allocation
page read and write
CC5000
heap
page read and write
850E000
stack
page read and write
4AB0000
trusted library allocation
page read and write
A53000
heap
page read and write
830000
heap
page read and write
2370000
trusted library allocation
page read and write
49E1000
trusted library allocation
page read and write
5DF7000
trusted library allocation
page read and write
3911000
trusted library allocation
page read and write
E37000
heap
page read and write
6E0000
trusted library allocation
page read and write
8DA000
stack
page read and write
5760000
trusted library allocation
page read and write
266D000
trusted library allocation
page execute and read and write
2820000
trusted library allocation
page read and write
3BA000
stack
page read and write
B1F000
heap
page read and write
3848000
trusted library allocation
page read and write
2800000
trusted library allocation
page execute and read and write
2952000
trusted library allocation
page read and write
2607000
trusted library allocation
page read and write
1C0000
heap
page read and write
6ED000
trusted library allocation
page execute and read and write
4C0000
heap
page read and write
9F0000
heap
page read and write
2A9C000
stack
page read and write
5014000
trusted library allocation
page read and write
61B2000
heap
page read and write
49ED000
trusted library allocation
page read and write
2970000
trusted library allocation
page read and write
4C53000
heap
page read and write
403000
remote allocation
page execute and read and write
413000
remote allocation
page execute and read and write
4ADE000
trusted library allocation
page read and write
4B04000
trusted library allocation
page read and write
EB1000
heap
page read and write
9F8000
heap
page read and write
269B000
trusted library allocation
page execute and read and write
874C000
stack
page read and write
24AE000
stack
page read and write
2848000
trusted library allocation
page read and write
2690000
trusted library allocation
page read and write
61D2000
heap
page read and write
EA0000
heap
page read and write
4F20000
heap
page read and write
6F5E000
stack
page read and write
AE0000
trusted library allocation
page read and write
6077000
trusted library allocation
page read and write
B2B000
trusted library allocation
page execute and read and write
262F000
stack
page read and write
4EB0000
trusted library allocation
page execute and read and write
73F000
heap
page read and write
E08000
heap
page read and write
6DD000
trusted library allocation
page execute and read and write
1100000
trusted library allocation
page read and write
E39000
heap
page read and write
28F2000
trusted library allocation
page read and write
AF3000
trusted library allocation
page execute and read and write
B22000
trusted library allocation
page read and write
864C000
stack
page read and write
BA3000
heap
page read and write
620000
heap
page read and write
4AF0000
heap
page read and write
5739000
trusted library allocation
page read and write
416000
remote allocation
page execute and read and write
4AF2000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
430000
heap
page read and write
C40000
heap
page read and write
60E000
stack
page read and write
6197000
heap
page read and write
C70000
heap
page read and write
6CE000
unkown
page read and write
5CA0000
trusted library allocation
page read and write
9A5000
heap
page read and write
860E000
stack
page read and write
23F0000
trusted library allocation
page read and write
976E000
stack
page read and write
2663000
trusted library allocation
page execute and read and write
2810000
trusted library allocation
page read and write
5DEE000
stack
page read and write
28F0000
trusted library allocation
page read and write
E2A000
heap
page read and write
4E7E000
stack
page read and write
69D0000
trusted library allocation
page read and write
5762000
trusted library allocation
page read and write
4AE0000
trusted library section
page readonly
49C0000
trusted library allocation
page read and write
3A6A000
trusted library allocation
page read and write
AEE000
stack
page read and write
4F10000
heap
page read and write
66E000
stack
page read and write
6ED0000
trusted library allocation
page execute and read and write
391B000
trusted library allocation
page read and write
4FDB000
trusted library allocation
page read and write
2B46000
trusted library allocation
page read and write
5FAE000
stack
page read and write
615A000
heap
page read and write
8890000
trusted library allocation
page read and write
AF0000
trusted library allocation
page read and write
30000
unkown
page readonly
28C4000
trusted library allocation
page read and write
18D000
stack
page read and write
5150000
heap
page execute and read and write
159000
stack
page read and write
50E0000
heap
page read and write
2926000
trusted library allocation
page read and write
3A91000
trusted library allocation
page read and write
7268000
heap
page read and write
25F0000
trusted library allocation
page read and write
4F13000
heap
page read and write
4A70000
heap
page read and write
2920000
trusted library allocation
page read and write
2470000
heap
page read and write
50C0000
heap
page read and write
6170000
heap
page read and write
5029000
trusted library allocation
page read and write
888E000
stack
page read and write
27FE000
stack
page read and write
2AD0000
trusted library allocation
page read and write
294D000
trusted library allocation
page read and write
4EEE000
stack
page read and write
2A72000
trusted library allocation
page read and write
293E000
trusted library allocation
page read and write
992E000
stack
page read and write
267D000
trusted library allocation
page execute and read and write
835000
heap
page read and write
3B59000
trusted library allocation
page read and write
49E6000
trusted library allocation
page read and write
6FA000
trusted library allocation
page execute and read and write
4FF1000
trusted library allocation
page read and write
507E000
stack
page read and write
4BB2000
trusted library allocation
page read and write
9D0000
heap
page read and write
8FE000
stack
page read and write
480000
heap
page read and write
4B00000
trusted library allocation
page read and write
6940000
trusted library allocation
page read and write
261D000
trusted library allocation
page read and write
4FCE000
stack
page read and write
4AE6000
trusted library allocation
page read and write
B8E000
stack
page read and write
4EF0000
trusted library allocation
page read and write
291C000
stack
page read and write
4CCB000
stack
page read and write
B16000
trusted library allocation
page execute and read and write
417000
remote allocation
page execute and read and write
5016000
trusted library allocation
page read and write
2A58000
trusted library allocation
page read and write
292E000
trusted library allocation
page read and write
85A000
stack
page read and write
6EC0000
heap
page read and write
2B3C000
trusted library allocation
page read and write
2A5E000
stack
page read and write
7B2000
heap
page read and write
4D00000
heap
page execute and read and write
AFD000
trusted library allocation
page execute and read and write
38E9000
trusted library allocation
page read and write
2510000
trusted library allocation
page execute and read and write
51C0000
heap
page read and write
A1CE000
stack
page read and write
295E000
stack
page read and write
6D8E000
stack
page read and write
2830000
heap
page read and write
42D000
remote allocation
page execute and read and write
402000
remote allocation
page execute and read and write
6C40000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page execute and read and write
2680000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
902000
trusted library allocation
page read and write
878E000
stack
page read and write
540C000
stack
page read and write
BFE000
heap
page read and write
4F20000
heap
page read and write
65A0000
heap
page read and write
4F40000
heap
page read and write
A6D000
heap
page read and write
4CE0000
heap
page read and write
4B20000
trusted library allocation
page read and write
6D3000
trusted library allocation
page execute and read and write
2631000
trusted library allocation
page read and write
4F05000
heap
page read and write
569E000
stack
page read and write
49F2000
trusted library allocation
page read and write
880000
heap
page read and write
35D7000
trusted library allocation
page read and write
548E000
stack
page read and write
A80000
heap
page read and write
9D9000
stack
page read and write
690E000
stack
page read and write
B0D000
trusted library allocation
page execute and read and write
9D8000
heap
page read and write
4FD0000
trusted library allocation
page read and write
4FEE000
trusted library allocation
page read and write
AF4000
trusted library allocation
page read and write
5CC0000
trusted library allocation
page execute and read and write
4BD0000
trusted library allocation
page read and write
250E000
stack
page read and write
2679000
trusted library allocation
page read and write
4C50000
heap
page read and write
49DE000
trusted library allocation
page read and write
466C000
stack
page read and write
9A0000
heap
page read and write
2964000
trusted library allocation
page read and write
63E0000
heap
page read and write
6080000
trusted library allocation
page read and write
467C000
stack
page read and write
6AE000
stack
page read and write
9DE000
heap
page read and write
6630000
trusted library allocation
page read and write
4AE1000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
4E80000
heap
page read and write
3631000
trusted library allocation
page read and write
9D4E000
stack
page read and write
559E000
stack
page read and write
632E000
stack
page read and write
970000
trusted library allocation
page execute and read and write
6862000
trusted library allocation
page read and write
B2A000
heap
page read and write
CCE000
stack
page read and write
4CD0000
heap
page read and write
28DD000
trusted library allocation
page execute and read and write
3B19000
trusted library allocation
page read and write
6660000
heap
page read and write
2A4E000
trusted library allocation
page read and write
4A82000
trusted library allocation
page read and write
B90000
heap
page read and write
2682000
trusted library allocation
page read and write
29CC000
stack
page read and write
B9E000
heap
page read and write
5020000
trusted library allocation
page read and write
980000
heap
page read and write
3A01000
trusted library allocation
page read and write
A0CC000
stack
page read and write
61BE000
heap
page read and write
5082000
trusted library allocation
page read and write
7240000
heap
page read and write
6C80000
trusted library allocation
page read and write
28E2000
trusted library allocation
page read and write
2660000
trusted library allocation
page read and write
6C8E000
stack
page read and write
B1E000
stack
page read and write
A13000
heap
page read and write
2664000
trusted library allocation
page read and write
3999000
trusted library allocation
page read and write
51A0000
heap
page read and write
838F000
stack
page read and write
6D37000
trusted library allocation
page read and write
2FFB000
heap
page read and write
6184000
heap
page read and write
23D0000
trusted library allocation
page read and write
9E9000
stack
page read and write
6670000
trusted library allocation
page execute and read and write
B35000
heap
page read and write
959000
stack
page read and write
70E000
stack
page read and write
418000
remote allocation
page execute and read and write
63B0000
trusted library allocation
page read and write
B10000
trusted library allocation
page read and write
AF0000
heap
page read and write
74F000
stack
page read and write
6EBF000
stack
page read and write
98E000
stack
page read and write
26B7000
trusted library allocation
page read and write
2692000
trusted library allocation
page read and write
9AD000
stack
page read and write
6ED8000
heap
page read and write
4EFE000
stack
page read and write
6070000
trusted library allocation
page read and write
69F6000
trusted library allocation
page read and write
800000
heap
page read and write
815F000
stack
page read and write
28CD000
trusted library allocation
page execute and read and write
9FCB000
stack
page read and write
2AE0000
heap
page read and write
2520000
heap
page read and write
78F000
heap
page read and write
38BD000
trusted library allocation
page read and write
70A000
heap
page read and write
50D0000
heap
page read and write
708F000
stack
page read and write
666E000
heap
page read and write
6184000
heap
page read and write
723F000
stack
page read and write
BC7000
heap
page read and write
BA7000
heap
page read and write
2650000
trusted library allocation
page read and write
4BA0000
heap
page read and write
9A30000
heap
page read and write
5F90000
trusted library allocation
page execute and read and write
87E000
stack
page read and write
257F000
stack
page read and write
476C000
stack
page read and write
28D0000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
90B000
trusted library allocation
page execute and read and write
42C000
remote allocation
page execute and read and write
4AFE000
stack
page read and write
42F000
remote allocation
page execute and read and write
4ACB000
trusted library allocation
page read and write
6F1E000
stack
page read and write
E40000
heap
page read and write
4B70000
heap
page execute and read and write
490000
heap
page read and write
2AB0000
heap
page execute and read and write
519C000
stack
page read and write
A55000
heap
page read and write
2FF0000
heap
page read and write
5770000
trusted library allocation
page read and write
6D4000
trusted library allocation
page read and write
CA0000
heap
page read and write
B1A000
trusted library allocation
page execute and read and write
A8E000
stack
page read and write
727000
heap
page read and write
5730000
trusted library allocation
page read and write
4C3B000
stack
page read and write
4A80000
trusted library allocation
page read and write
419000
remote allocation
page execute and read and write
BB0000
heap
page execute and read and write
380E000
trusted library allocation
page read and write
4B06000
trusted library allocation
page read and write
2695000
trusted library allocation
page execute and read and write
28F7000
trusted library allocation
page execute and read and write
4BB0000
trusted library allocation
page read and write
B00000
heap
page read and write
6F0000
trusted library allocation
page read and write
6E3000
trusted library allocation
page read and write
23D3000
trusted library allocation
page read and write
BB0000
heap
page read and write
28E6000
trusted library allocation
page execute and read and write
23CE000
stack
page read and write
503C000
trusted library allocation
page read and write
828E000
stack
page read and write
63F0000
trusted library allocation
page execute and read and write
292B000
trusted library allocation
page read and write
49C4000
trusted library allocation
page read and write
25C9000
trusted library allocation
page read and write
7EEE0000
trusted library allocation
page execute and read and write
415000
remote allocation
page execute and read and write
4AC0000
trusted library allocation
page read and write
4C40000
trusted library section
page readonly
538E000
stack
page read and write
EDB000
heap
page read and write
1F7000
heap
page read and write
42A000
remote allocation
page execute and read and write
4FF6000
trusted library allocation
page read and write
6880000
heap
page read and write
26B0000
trusted library allocation
page read and write
2689000
trusted library allocation
page read and write
B08000
heap
page read and write
5F8E000
stack
page read and write
2460000
trusted library allocation
page read and write
4C8D000
stack
page read and write
2941000
trusted library allocation
page read and write
B87000
heap
page read and write
5010000
trusted library allocation
page read and write
E00000
heap
page read and write
9D0E000
stack
page read and write
4FDE000
trusted library allocation
page read and write
B27000
trusted library allocation
page execute and read and write
A06000
heap
page read and write
28C0000
trusted library allocation
page read and write
2BAF000
stack
page read and write
6F6000
trusted library allocation
page execute and read and write
B83000
heap
page read and write
2686000
trusted library allocation
page execute and read and write
25DC000
trusted library allocation
page read and write
6D0000
trusted library allocation
page read and write
4B50000
trusted library allocation
page read and write
56DE000
stack
page read and write
32000
unkown
page readonly
B20000
heap
page read and write
3AF1000
trusted library allocation
page read and write
4AC4000
trusted library allocation
page read and write
67C0000
heap
page read and write
2AA0000
trusted library allocation
page execute and read and write
555F000
stack
page read and write
C90000
heap
page read and write
9F8E000
stack
page read and write
2697000
trusted library allocation
page execute and read and write
26A0000
trusted library allocation
page read and write
6660000
heap
page read and write
2380000
heap
page execute and read and write
7253000
heap
page read and write
907000
trusted library allocation
page execute and read and write
4B25000
trusted library allocation
page read and write
9C0E000
stack
page read and write
618C000
heap
page read and write
5E00000
trusted library allocation
page read and write
4CA000
heap
page read and write
49CB000
trusted library allocation
page read and write
4EA0000
trusted library allocation
page execute and read and write
3589000
trusted library allocation
page read and write
5040000
heap
page execute and read and write
3A29000
trusted library allocation
page read and write
4FEA000
trusted library allocation
page read and write
28E0000
trusted library allocation
page read and write
720000
heap
page read and write
4A00000
trusted library allocation
page read and write
3A15000
trusted library allocation
page read and write
1D0000
heap
page read and write
4E90000
trusted library section
page read and write
920000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
4AF3000
heap
page read and write
429000
remote allocation
page execute and read and write
9A2F000
stack
page read and write
4E0E000
stack
page read and write
7F760000
trusted library allocation
page execute and read and write
There are 528 hidden memdumps, click here to show them.