IOC Report
tmjGCGOEGMinVPD.exe

loading gif

Files

File Path
Type
Category
Malicious
tmjGCGOEGMinVPD.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp2292.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\IeagOAdQiUHWi.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\IeagOAdQiUHWi.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\tmjGCGOEGMinVPD.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eec3ihtp.sgc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ga15zrqr.yav.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gyngporp.a2d.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mf3dbaxa.o3m.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nheterxz.liq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wlj5ufqp.412.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xqdpq0es.io3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ypduttnl.tuu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp31D4.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\IeagOAdQiUHWi.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\tmjGCGOEGMinVPD.exe
"C:\Users\user\Desktop\tmjGCGOEGMinVPD.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\tmjGCGOEGMinVPD.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IeagOAdQiUHWi.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IeagOAdQiUHWi" /XML "C:\Users\user\AppData\Local\Temp\tmp2292.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\IeagOAdQiUHWi.exe
C:\Users\user\AppData\Roaming\IeagOAdQiUHWi.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IeagOAdQiUHWi" /XML "C:\Users\user\AppData\Local\Temp\tmp31D4.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.13.205
https://api.ipify.org
unknown
https://sectigo.com/CPS0
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://mail.morabitur.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
mail.morabitur.com
198.46.88.214
malicious
api.ipify.org
104.26.13.205

IPs

IP
Domain
Country
Malicious
198.46.88.214
mail.morabitur.com
United States
malicious
104.26.13.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2D2C000
trusted library allocation
page read and write
malicious
300C000
trusted library allocation
page read and write
malicious
3014000
trusted library allocation
page read and write
malicious
2D01000
trusted library allocation
page read and write
malicious
3B0A000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3CDB000
trusted library allocation
page read and write
malicious
2FE1000
trusted library allocation
page read and write
malicious
4FB2000
trusted library allocation
page read and write
1306000
trusted library allocation
page read and write
261B000
heap
page read and write
50D0000
heap
page read and write
4FA6000
trusted library allocation
page read and write
F58000
heap
page read and write
895D000
stack
page read and write
5C40000
heap
page read and write
CD0000
trusted library allocation
page read and write
669D000
stack
page read and write
87BD000
stack
page read and write
FD5000
heap
page read and write
3D17000
trusted library allocation
page read and write
8B9E000
stack
page read and write
A3A000
stack
page read and write
6105000
heap
page read and write
10D0000
trusted library allocation
page read and write
5310000
heap
page execute and read and write
DA000
stack
page read and write
F4A000
heap
page read and write
10A0000
trusted library allocation
page read and write
257E000
unkown
page read and write
2460000
heap
page read and write
3008000
trusted library allocation
page read and write
F20000
heap
page read and write
91CE000
stack
page read and write
270E000
stack
page read and write
67F0000
trusted library allocation
page read and write
2B64000
trusted library allocation
page read and write
4ADE000
stack
page read and write
8DD0000
heap
page read and write
B1E000
heap
page read and write
535B000
stack
page read and write
25BF000
stack
page read and write
50D3000
heap
page read and write
69FF000
stack
page read and write
6C30000
heap
page read and write
D10000
heap
page read and write
6BD0000
heap
page read and write
5A30000
heap
page read and write
116B000
trusted library allocation
page execute and read and write
1140000
trusted library allocation
page read and write
11E0000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
1320000
heap
page read and write
2D34000
trusted library allocation
page read and write
4F84000
trusted library allocation
page read and write
21EA000
stack
page read and write
5DC0000
trusted library allocation
page execute and read and write
71AE000
stack
page read and write
FF3000
heap
page read and write
2D9C000
stack
page read and write
1326000
trusted library allocation
page execute and read and write
4E00000
trusted library allocation
page read and write
88FD000
stack
page read and write
1332000
trusted library allocation
page read and write
536E000
stack
page read and write
300A000
trusted library allocation
page read and write
F45000
heap
page read and write
1073000
trusted library allocation
page execute and read and write
1070000
trusted library allocation
page read and write
110B000
heap
page read and write
F0E000
stack
page read and write
F10000
heap
page read and write
3C9E000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
1134000
trusted library allocation
page read and write
CE2000
trusted library allocation
page read and write
5200000
heap
page read and write
559E000
stack
page read and write
8E4B000
stack
page read and write
5C64000
heap
page read and write
CD2000
trusted library allocation
page read and write
82BD000
stack
page read and write
10F3000
heap
page read and write
EF9000
stack
page read and write
532E000
trusted library allocation
page read and write
490E000
stack
page read and write
4E4E000
stack
page read and write
11E0000
trusted library allocation
page read and write
5D40000
heap
page read and write
573D000
stack
page read and write
CB4000
trusted library allocation
page read and write
2F9C000
trusted library allocation
page read and write
FA3000
heap
page read and write
496E000
stack
page read and write
865F000
stack
page read and write
5473000
heap
page read and write
6650000
trusted library allocation
page read and write
D30000
heap
page read and write
285C000
stack
page read and write
1350000
trusted library allocation
page read and write
84BE000
stack
page read and write
1337000
trusted library allocation
page execute and read and write
91D0000
trusted library allocation
page read and write
5E40000
trusted library allocation
page execute and read and write
2580000
heap
page read and write
38D7000
trusted library allocation
page read and write
66BD000
stack
page read and write
6677000
trusted library allocation
page read and write
697E000
stack
page read and write
AD4000
heap
page read and write
5C30000
heap
page read and write
691E000
stack
page read and write
2B8F000
trusted library allocation
page read and write
2B54000
trusted library allocation
page read and write
66DE000
stack
page read and write
CDA000
trusted library allocation
page execute and read and write
C70000
heap
page read and write
1065000
heap
page read and write
131D000
trusted library allocation
page execute and read and write
6870000
trusted library allocation
page read and write
D35000
heap
page read and write
293B000
stack
page read and write
CEB000
trusted library allocation
page execute and read and write
3927000
trusted library allocation
page read and write
2450000
heap
page read and write
EEE000
stack
page read and write
5150000
trusted library allocation
page read and write
1140000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
1152000
trusted library allocation
page read and write
2979000
trusted library allocation
page read and write
3020000
trusted library allocation
page read and write
1080000
trusted library allocation
page read and write
3B93000
trusted library allocation
page read and write
67DE000
stack
page read and write
2590000
heap
page read and write
607D000
stack
page read and write
4CB8000
trusted library allocation
page read and write
653E000
stack
page read and write
6108000
heap
page read and write
4FAE000
stack
page read and write
1012000
heap
page read and write
8CDF000
stack
page read and write
5680000
trusted library allocation
page read and write
54DE000
stack
page read and write
AA0000
heap
page read and write
1162000
trusted library allocation
page read and write
10EE000
stack
page read and write
82F0000
trusted library allocation
page read and write
8A9E000
stack
page read and write
D95000
heap
page read and write
F28000
heap
page read and write
281E000
stack
page read and write
115A000
trusted library allocation
page execute and read and write
2950000
heap
page execute and read and write
D90000
heap
page read and write
2DB0000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
63FE000
stack
page read and write
9D000
stack
page read and write
5C1E000
stack
page read and write
6DE1000
trusted library allocation
page read and write
1120000
trusted library allocation
page read and write
585E000
stack
page read and write
89FE000
stack
page read and write
2F91000
trusted library allocation
page read and write
133B000
trusted library allocation
page execute and read and write
5B60000
trusted library section
page read and write
4DD6000
trusted library allocation
page read and write
6C20000
trusted library allocation
page execute and read and write
2970000
trusted library allocation
page read and write
10C0000
heap
page read and write
2D5F000
stack
page read and write
6810000
trusted library allocation
page read and write
13B0000
heap
page read and write
5ECE000
stack
page read and write
7F5E0000
trusted library allocation
page execute and read and write
2D2A000
trusted library allocation
page read and write
5B70000
trusted library section
page read and write
5331000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
8BDE000
stack
page read and write
2B4C000
stack
page read and write
113D000
trusted library allocation
page execute and read and write
38D1000
trusted library allocation
page read and write
D80000
heap
page read and write
5B10000
trusted library allocation
page execute and read and write
4925000
trusted library allocation
page read and write
1074000
trusted library allocation
page read and write
3CB7000
trusted library allocation
page read and write
845D000
stack
page read and write
E96000
heap
page read and write
1090000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page read and write
274F000
stack
page read and write
555F000
stack
page read and write
13B6000
heap
page read and write
E6E000
heap
page read and write
541C000
stack
page read and write
4E05000
trusted library allocation
page read and write
7FA30000
trusted library allocation
page execute and read and write
2860000
heap
page read and write
3CB1000
trusted library allocation
page read and write
C3B000
stack
page read and write
4DD1000
trusted library allocation
page read and write
5A3D000
heap
page read and write
5A7F000
heap
page read and write
1027000
heap
page read and write
2DD0000
heap
page read and write
5C94000
heap
page read and write
655F000
stack
page read and write
1156000
trusted library allocation
page execute and read and write
2944000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
797000
stack
page read and write
90CE000
stack
page read and write
1180000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
2F80000
heap
page execute and read and write
569E000
stack
page read and write
B2E000
heap
page read and write
50A0000
trusted library allocation
page read and write
5F5A000
trusted library allocation
page read and write
107D000
trusted library allocation
page execute and read and write
E68000
heap
page read and write
CB0000
trusted library allocation
page read and write
3E86000
trusted library allocation
page read and write
645D000
stack
page read and write
CC0000
trusted library allocation
page read and write
2AA1000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
2A9E000
stack
page read and write
5F50000
trusted library allocation
page read and write
6860000
trusted library allocation
page execute and read and write
F5C000
heap
page read and write
2B79000
trusted library allocation
page read and write
5470000
heap
page read and write
56DD000
stack
page read and write
85BF000
stack
page read and write
685D000
stack
page read and write
581E000
stack
page read and write
D00000
heap
page read and write
B90000
heap
page read and write
FD8000
heap
page read and write
A10000
heap
page read and write
1320000
trusted library allocation
page read and write
583E000
stack
page read and write
4DDD000
trusted library allocation
page read and write
6803000
trusted library allocation
page read and write
AAA000
heap
page read and write
FB9000
heap
page read and write
5316000
trusted library allocation
page read and write
1100000
heap
page read and write
1084000
heap
page read and write
108D000
trusted library allocation
page execute and read and write
CB3000
trusted library allocation
page execute and read and write
EF9000
heap
page read and write
10E0000
trusted library allocation
page execute and read and write
612E000
heap
page read and write
57DE000
stack
page read and write
1130000
trusted library allocation
page read and write
5B30000
trusted library section
page read and write
5B40000
trusted library allocation
page read and write
564D000
trusted library allocation
page read and write
87C0000
heap
page read and write
A9E000
stack
page read and write
11C0000
heap
page execute and read and write
5640000
trusted library allocation
page read and write
CBD000
trusted library allocation
page execute and read and write
4DBB000
trusted library allocation
page read and write
552000
unkown
page readonly
659E000
stack
page read and write
8C10000
heap
page read and write
10AB000
trusted library allocation
page execute and read and write
533D000
trusted library allocation
page read and write
67F8000
trusted library allocation
page read and write
BAA000
stack
page read and write
4DB0000
trusted library allocation
page read and write
4C3C000
stack
page read and write
2530000
heap
page read and write
3975000
trusted library allocation
page read and write
2975000
trusted library allocation
page read and write
53A0000
trusted library allocation
page execute and read and write
1150000
heap
page read and write
26CF000
unkown
page read and write
6658000
trusted library allocation
page read and write
527F000
stack
page read and write
1330000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
FA0000
heap
page read and write
6817000
trusted library allocation
page read and write
111F000
stack
page read and write
8C8E000
stack
page read and write
21CE000
unkown
page read and write
CA0000
trusted library allocation
page read and write
1160000
trusted library allocation
page read and write
11B0000
heap
page read and write
532A000
trusted library allocation
page read and write
D39000
stack
page read and write
EA4000
heap
page read and write
5F7C000
stack
page read and write
63BE000
stack
page read and write
10A7000
trusted library allocation
page execute and read and write
1335000
trusted library allocation
page execute and read and write
5BDE000
stack
page read and write
4FAD000
trusted library allocation
page read and write
F20000
heap
page read and write
1096000
trusted library allocation
page execute and read and write
1068000
heap
page read and write
5610000
trusted library allocation
page execute and read and write
6808000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page read and write
908E000
stack
page read and write
13A0000
trusted library allocation
page execute and read and write
700F000
stack
page read and write
AAE000
heap
page read and write
2CE6000
trusted library allocation
page read and write
1167000
trusted library allocation
page execute and read and write
2CEF000
trusted library allocation
page read and write
F40000
heap
page read and write
51BC000
stack
page read and write
296F000
trusted library allocation
page read and write
EEE000
heap
page read and write
5230000
heap
page read and write
885E000
stack
page read and write
5200000
trusted library allocation
page execute and read and write
CBE000
stack
page read and write
4EA0000
heap
page execute and read and write
545E000
stack
page read and write
5B80000
trusted library allocation
page read and write
F55000
heap
page read and write
8FCF000
stack
page read and write
B37000
stack
page read and write
12FF000
stack
page read and write
5300000
heap
page execute and read and write
21AD000
stack
page read and write
509E000
stack
page read and write
10F0000
heap
page read and write
5DBA000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
5342000
trusted library allocation
page read and write
7D5000
heap
page read and write
66E0000
trusted library allocation
page execute and read and write
6967000
trusted library allocation
page read and write
2DE8000
trusted library allocation
page read and write
2FCF000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
2AF1000
trusted library allocation
page read and write
AE4000
heap
page read and write
64FE000
stack
page read and write
5A20000
heap
page read and write
1078000
heap
page read and write
259A000
heap
page read and write
2840000
heap
page read and write
50B0000
trusted library section
page read and write
2B60000
trusted library allocation
page read and write
FA8000
heap
page read and write
2DC4000
trusted library allocation
page read and write
67BE000
stack
page read and write
587E000
stack
page read and write
28C0000
heap
page read and write
2990000
heap
page read and write
8DCC000
stack
page read and write
8AFE000
stack
page read and write
589D000
stack
page read and write
11B0000
trusted library allocation
page execute and read and write
6124000
heap
page read and write
5322000
trusted library allocation
page read and write
2946000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
5A12000
heap
page read and write
5DB0000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
663F000
stack
page read and write
8F8E000
stack
page read and write
55FE000
stack
page read and write
611D000
heap
page read and write
60E0000
heap
page read and write
6800000
trusted library allocation
page read and write
5600000
heap
page read and write
E3E000
stack
page read and write
43E000
remote allocation
page execute and read and write
132A000
trusted library allocation
page execute and read and write
50AF000
stack
page read and write
55F0000
trusted library allocation
page read and write
2F7D000
stack
page read and write
CFE000
stack
page read and write
2B48000
trusted library allocation
page read and write
4DFF000
trusted library allocation
page read and write
1304000
trusted library allocation
page read and write
28A0000
heap
page read and write
5350000
heap
page read and write
3FF6000
trusted library allocation
page read and write
4F80000
trusted library allocation
page read and write
69A000
stack
page read and write
6F81000
trusted library allocation
page read and write
3ACE000
trusted library allocation
page read and write
2880000
heap
page execute and read and write
10A2000
trusted library allocation
page read and write
53D0000
heap
page read and write
4DE2000
trusted library allocation
page read and write
28A0000
trusted library allocation
page read and write
FCA000
heap
page read and write
2921000
trusted library allocation
page read and write
11D0000
trusted library allocation
page read and write
1133000
trusted library allocation
page execute and read and write
8F4C000
stack
page read and write
4DB4000
trusted library allocation
page read and write
105E000
stack
page read and write
EA1000
heap
page read and write
1322000
trusted library allocation
page read and write
7EE70000
trusted library allocation
page execute and read and write
56FE000
stack
page read and write
58C0000
heap
page read and write
8D8F000
stack
page read and write
CE7000
trusted library allocation
page execute and read and write
550000
unkown
page readonly
400000
remote allocation
page execute and read and write
F97000
heap
page read and write
109A000
trusted library allocation
page execute and read and write
1092000
trusted library allocation
page read and write
10F0000
heap
page execute and read and write
6970000
trusted library allocation
page read and write
1327000
heap
page read and write
E88000
heap
page read and write
875F000
stack
page read and write
677F000
stack
page read and write
2960000
trusted library allocation
page read and write
6670000
trusted library allocation
page read and write
2B0E000
stack
page read and write
51F0000
heap
page read and write
2890000
trusted library allocation
page execute and read and write
55BC000
stack
page read and write
E0E000
stack
page read and write
1190000
heap
page read and write
4F9E000
trusted library allocation
page read and write
CD6000
trusted library allocation
page execute and read and write
1150000
trusted library allocation
page read and write
6080000
heap
page read and write
F3E000
heap
page read and write
5E8E000
stack
page read and write
113E000
stack
page read and write
E60000
heap
page read and write
39C3000
trusted library allocation
page read and write
54BC000
stack
page read and write
6960000
trusted library allocation
page read and write
28D1000
trusted library allocation
page read and write
3AA7000
trusted library allocation
page read and write
597F000
stack
page read and write
1300000
trusted library allocation
page read and write
51C0000
trusted library allocation
page read and write
3AA1000
trusted library allocation
page read and write
2180000
heap
page read and write
2D28000
trusted library allocation
page read and write
250F000
unkown
page read and write
AE1000
heap
page read and write
4A6C000
stack
page read and write
5310000
trusted library allocation
page read and write
10A0000
trusted library allocation
page read and write
90CE000
stack
page read and write
10CB000
heap
page read and write
666D000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
EAD000
stack
page read and write
2FC7000
trusted library allocation
page read and write
680D000
trusted library allocation
page read and write
531B000
trusted library allocation
page read and write
5F55000
trusted library allocation
page read and write
5B90000
trusted library allocation
page execute and read and write
A5D000
stack
page read and write
8960000
heap
page read and write
1304000
trusted library allocation
page read and write
55D0000
heap
page read and write
2DA0000
trusted library allocation
page read and write
4FA1000
trusted library allocation
page read and write
5C55000
heap
page read and write
1303000
trusted library allocation
page execute and read and write
CCD000
trusted library allocation
page execute and read and write
6880000
trusted library allocation
page execute and read and write
86BF000
stack
page read and write
1310000
trusted library allocation
page read and write
5240000
trusted library allocation
page read and write
3FB9000
trusted library allocation
page read and write
8ECC000
stack
page read and write
1008000
heap
page read and write
5A4B000
heap
page read and write
2B85000
trusted library allocation
page read and write
1165000
trusted library allocation
page execute and read and write
2610000
heap
page read and write
69BE000
stack
page read and write
4F8B000
trusted library allocation
page read and write
2CAE000
stack
page read and write
1096000
heap
page read and write
51CC000
stack
page read and write
5336000
trusted library allocation
page read and write
4B3E000
stack
page read and write
5D30000
trusted library section
page read and write
3E0A000
trusted library allocation
page read and write
3F91000
trusted library allocation
page read and write
5C20000
heap
page read and write
5260000
heap
page read and write
5A10000
heap
page read and write
28B0000
trusted library allocation
page read and write
2BA0000
heap
page read and write
B3B000
heap
page read and write
11F0000
heap
page read and write
A00000
heap
page read and write
531E000
trusted library allocation
page read and write
11F0000
heap
page read and write
257E000
stack
page read and write
2FDD000
trusted library allocation
page read and write
7F610000
trusted library allocation
page execute and read and write
ED7000
heap
page read and write
893E000
stack
page read and write
4920000
trusted library allocation
page read and write
D70000
heap
page read and write
5F60000
trusted library allocation
page execute and read and write
3CD9000
trusted library allocation
page read and write
139E000
stack
page read and write
7D0000
heap
page read and write
2CB1000
trusted library allocation
page read and write
130D000
trusted library allocation
page execute and read and write
21D0000
heap
page read and write
There are 514 hidden memdumps, click here to show them.