IOC Report
4v7myD9mN2OaWZp.exe

loading gif

Files

File Path
Type
Category
Malicious
4v7myD9mN2OaWZp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp3C3F.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\jgHHGmfF.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\4v7myD9mN2OaWZp.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\jgHHGmfF.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kxwtkhsm.bob.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o4c5dfhy.c4k.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pdwwyaxr.y0i.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zs0jdql5.2j5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp493F.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\jgHHGmfF.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\4v7myD9mN2OaWZp.exe
"C:\Users\user\Desktop\4v7myD9mN2OaWZp.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jgHHGmfF.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jgHHGmfF" /XML "C:\Users\user\AppData\Local\Temp\tmp3C3F.tmp"
malicious
C:\Users\user\Desktop\4v7myD9mN2OaWZp.exe
"C:\Users\user\Desktop\4v7myD9mN2OaWZp.exe"
malicious
C:\Users\user\AppData\Roaming\jgHHGmfF.exe
C:\Users\user\AppData\Roaming\jgHHGmfF.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jgHHGmfF" /XML "C:\Users\user\AppData\Local\Temp\tmp493F.tmp"
malicious
C:\Users\user\AppData\Roaming\jgHHGmfF.exe
"C:\Users\user\AppData\Roaming\jgHHGmfF.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://sectigo.com/CPS0
unknown
http://mail.pbjv.net
unknown
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://crl.cyo
unknown
http://pbjv.net
unknown

Domains

Name
IP
Malicious
mail.pbjv.net
unknown
malicious
pbjv.net
203.175.171.5

IPs

IP
Domain
Country
Malicious
203.175.171.5
pbjv.net
Singapore

Memdumps

Base Address
Regiontype
Protect
Malicious
297A000
trusted library allocation
page read and write
malicious
2901000
trusted library allocation
page read and write
malicious
415000
remote allocation
page execute and read and write
malicious
350E000
trusted library allocation
page read and write
malicious
34C1000
trusted library allocation
page read and write
malicious
294F000
trusted library allocation
page read and write
malicious
36CE000
trusted library allocation
page read and write
malicious
3539000
trusted library allocation
page read and write
malicious
2A30000
heap
page read and write
6264000
heap
page read and write
5AC3000
heap
page read and write
34AC000
stack
page read and write
8510000
trusted library allocation
page read and write
11F0000
heap
page read and write
4E40000
heap
page read and write
4F50000
trusted library allocation
page read and write
879E000
stack
page read and write
403000
remote allocation
page execute and read and write
2EF3000
trusted library allocation
page read and write
99CB000
trusted library allocation
page read and write
2E20000
heap
page read and write
B03000
trusted library allocation
page execute and read and write
902000
heap
page read and write
3430000
trusted library allocation
page read and write
2969000
trusted library allocation
page read and write
294F000
trusted library allocation
page read and write
2496000
trusted library allocation
page read and write
68C0000
trusted library allocation
page read and write
2EE5000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
2963000
trusted library allocation
page read and write
3DD9000
trusted library allocation
page read and write
4CD0000
trusted library allocation
page read and write
24F1000
trusted library allocation
page read and write
72AE000
stack
page read and write
68D6000
trusted library allocation
page read and write
5100000
heap
page read and write
2949000
trusted library allocation
page read and write
7F4000
trusted library allocation
page read and write
8520000
trusted library allocation
page read and write
900000
heap
page read and write
4930000
trusted library allocation
page read and write
9C4E000
stack
page read and write
3901000
trusted library allocation
page read and write
AF7000
stack
page read and write
6BD0000
heap
page read and write
248E000
trusted library allocation
page read and write
7F5A0000
trusted library allocation
page execute and read and write
8600000
trusted library allocation
page read and write
2959000
trusted library allocation
page read and write
4CE0000
trusted library allocation
page execute and read and write
B0D000
trusted library allocation
page execute and read and write
5AC0000
heap
page read and write
2976000
trusted library allocation
page read and write
C69000
heap
page read and write
50F0000
heap
page read and write
62A7000
heap
page read and write
6050000
trusted library allocation
page read and write
2ED1000
trusted library allocation
page read and write
2ED5000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
BBE000
stack
page read and write
294D000
trusted library allocation
page read and write
722F000
stack
page read and write
8930000
trusted library allocation
page read and write
4F7000
stack
page read and write
1AA0000
trusted library allocation
page read and write
22FD000
stack
page read and write
4960000
heap
page execute and read and write
1670000
heap
page read and write
608D000
stack
page read and write
2957000
trusted library allocation
page read and write
5ECE000
stack
page read and write
B60000
heap
page read and write
2ED3000
trusted library allocation
page read and write
B5EC000
stack
page read and write
B4AB000
stack
page read and write
5E0E000
stack
page read and write
335E000
stack
page read and write
E6A000
trusted library allocation
page execute and read and write
15A1000
heap
page read and write
2EEB000
trusted library allocation
page read and write
6A17000
trusted library allocation
page read and write
6840000
trusted library allocation
page execute and read and write
2A0E000
stack
page read and write
5F4E000
stack
page read and write
8305000
heap
page read and write
28E0000
trusted library allocation
page read and write
2A71000
trusted library allocation
page read and write
2ED9000
trusted library allocation
page read and write
85AE000
stack
page read and write
B26000
trusted library allocation
page execute and read and write
28D0000
trusted library allocation
page read and write
6FAE000
stack
page read and write
1690000
trusted library allocation
page read and write
D10000
heap
page read and write
4E43000
heap
page read and write
DAB000
heap
page read and write
E5D000
trusted library allocation
page execute and read and write
D50000
heap
page read and write
64CE000
stack
page read and write
5A6E000
stack
page read and write
14F9000
stack
page read and write
5180000
trusted library allocation
page read and write
35EF000
stack
page read and write
191E000
stack
page read and write
2A10000
trusted library allocation
page read and write
85C0000
trusted library allocation
page read and write
820000
heap
page read and write
816000
trusted library allocation
page execute and read and write
85D0000
trusted library section
page read and write
803000
trusted library allocation
page read and write
2EF1000
trusted library allocation
page read and write
55D0000
trusted library allocation
page execute and read and write
2971000
trusted library allocation
page read and write
D44000
heap
page read and write
BAA000
heap
page read and write
84AE000
stack
page read and write
413000
remote allocation
page execute and read and write
FFE000
stack
page read and write
1568000
heap
page read and write
2A60000
heap
page read and write
344A000
trusted library allocation
page read and write
5AB0000
heap
page read and write
B35000
trusted library allocation
page execute and read and write
5010000
trusted library allocation
page read and write
2EBD000
trusted library allocation
page read and write
16B5000
heap
page read and write
4C3C000
stack
page read and write
B70000
heap
page read and write
35E3000
trusted library allocation
page read and write
880E000
stack
page read and write
875E000
stack
page read and write
6250000
heap
page read and write
5029000
trusted library allocation
page read and write
33E0000
heap
page read and write
E60000
trusted library allocation
page read and write
88A0000
trusted library section
page read and write
D0E000
stack
page read and write
16A0000
trusted library allocation
page read and write
6ECE000
stack
page read and write
BF5000
heap
page read and write
24C0000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
68B6000
trusted library allocation
page read and write
6530000
heap
page read and write
28BD000
trusted library allocation
page read and write
1530000
heap
page read and write
812000
trusted library allocation
page read and write
9B2000
heap
page read and write
6C0000
heap
page read and write
296B000
trusted library allocation
page read and write
6930000
trusted library allocation
page execute and read and write
7150000
trusted library allocation
page execute and read and write
1537000
heap
page read and write
1AB0000
heap
page read and write
4AC9000
trusted library allocation
page read and write
5020000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
4E2E000
stack
page read and write
10FE000
stack
page read and write
4A40000
heap
page read and write
D82000
heap
page read and write
3528000
trusted library allocation
page read and write
4E40000
heap
page read and write
295B000
trusted library allocation
page read and write
4F76000
trusted library allocation
page read and write
34B0000
heap
page execute and read and write
5110000
trusted library allocation
page read and write
E77000
trusted library allocation
page execute and read and write
558E000
stack
page read and write
3A71000
trusted library allocation
page read and write
930000
heap
page read and write
69CE000
stack
page read and write
4FB0000
trusted library allocation
page read and write
28F0000
heap
page execute and read and write
350C000
trusted library allocation
page read and write
44C1000
trusted library allocation
page read and write
5CA000
stack
page read and write
6FEE000
stack
page read and write
3E55000
trusted library allocation
page read and write
2955000
trusted library allocation
page read and write
6E18000
heap
page read and write
6C12000
heap
page read and write
8270000
heap
page read and write
81A000
trusted library allocation
page execute and read and write
65CF000
stack
page read and write
5CA5000
heap
page read and write
2973000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
5190000
trusted library allocation
page execute and read and write
C00000
heap
page read and write
112000
unkown
page readonly
6E14000
heap
page read and write
6E16000
heap
page read and write
EE0000
trusted library allocation
page execute and read and write
32F0000
heap
page read and write
64E000
stack
page read and write
690000
heap
page read and write
E66000
trusted library allocation
page execute and read and write
AD0000
heap
page read and write
62000
unkown
page readonly
810000
trusted library allocation
page read and write
B368000
heap
page read and write
343E000
trusted library allocation
page read and write
3360000
trusted library allocation
page read and write
961000
heap
page read and write
24B0000
trusted library allocation
page read and write
B50000
trusted library allocation
page read and write
33F0000
heap
page read and write
28C2000
trusted library allocation
page read and write
846E000
stack
page read and write
3547000
trusted library allocation
page read and write
2947000
trusted library allocation
page read and write
18B5000
trusted library allocation
page execute and read and write
55E7000
trusted library allocation
page read and write
692D000
stack
page read and write
4F80000
trusted library allocation
page read and write
6BCD000
stack
page read and write
7F3000
trusted library allocation
page execute and read and write
28AE000
trusted library allocation
page read and write
2760000
heap
page read and write
2982000
trusted library allocation
page read and write
A20000
heap
page read and write
8E7000
heap
page read and write
51B0000
heap
page read and write
C76000
heap
page read and write
15F9000
heap
page read and write
E7B000
trusted library allocation
page execute and read and write
C4E000
stack
page read and write
2A33000
heap
page read and write
7CE000
stack
page read and write
7140000
heap
page read and write
2870000
heap
page read and write
2AD6000
trusted library allocation
page read and write
3541000
trusted library allocation
page read and write
7260000
trusted library allocation
page execute and read and write
2EF7000
trusted library allocation
page read and write
688E000
stack
page read and write
34F1000
trusted library allocation
page read and write
3442000
trusted library allocation
page read and write
4A30000
heap
page read and write
4ACC000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
8290000
heap
page read and write
2566000
trusted library allocation
page read and write
2EDD000
trusted library allocation
page read and write
E90000
heap
page read and write
352E000
unkown
page read and write
402000
remote allocation
page execute and read and write
2977000
trusted library allocation
page read and write
3436000
trusted library allocation
page read and write
C03000
heap
page read and write
24E0000
heap
page execute and read and write
4DEE000
stack
page read and write
5590000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
55B6000
trusted library allocation
page read and write
2EDF000
trusted library allocation
page read and write
28B6000
trusted library allocation
page read and write
4D35000
heap
page read and write
D1A000
heap
page read and write
2EDB000
trusted library allocation
page read and write
246C000
stack
page read and write
2717000
trusted library allocation
page read and write
860E000
stack
page read and write
6A0D000
stack
page read and write
2EC3000
trusted library allocation
page read and write
889F000
stack
page read and write
7E0000
trusted library allocation
page read and write
B9E000
heap
page read and write
9CAF000
stack
page read and write
5D0B000
stack
page read and write
3462000
trusted library allocation
page read and write
ABE000
stack
page read and write
18AA000
trusted library allocation
page execute and read and write
16A3000
trusted library allocation
page execute and read and write
12E4000
trusted library allocation
page read and write
2A25000
trusted library allocation
page read and write
295D000
trusted library allocation
page read and write
4A6B000
trusted library allocation
page read and write
E53000
trusted library allocation
page read and write
6DB0000
heap
page read and write
35AE000
stack
page read and write
B22000
trusted library allocation
page read and write
12D0000
trusted library allocation
page read and write
6C5000
heap
page read and write
2C97000
trusted library allocation
page read and write
26F8000
trusted library allocation
page read and write
7FA000
stack
page read and write
C17000
heap
page read and write
7FD000
trusted library allocation
page execute and read and write
4A20000
trusted library section
page readonly
5C30000
trusted library allocation
page execute and read and write
85B0000
trusted library allocation
page execute and read and write
6BEC000
heap
page read and write
B2AE000
stack
page read and write
E43000
trusted library allocation
page execute and read and write
85F0000
trusted library allocation
page read and write
98C000
heap
page read and write
82E4000
heap
page read and write
289E000
trusted library allocation
page read and write
3CD5000
trusted library allocation
page read and write
515B000
stack
page read and write
2688000
trusted library allocation
page read and write
49D0000
trusted library allocation
page execute and read and write
72E0000
heap
page read and write
2CAC000
trusted library allocation
page read and write
295F000
trusted library allocation
page read and write
97D000
heap
page read and write
18BB000
trusted library allocation
page execute and read and write
3B63000
trusted library allocation
page read and write
49C3000
heap
page read and write
2EEF000
trusted library allocation
page read and write
18B7000
trusted library allocation
page execute and read and write
28D4000
trusted library allocation
page read and write
68B2000
trusted library allocation
page read and write
4A00000
trusted library allocation
page read and write
54F1000
trusted library allocation
page read and write
85E0000
trusted library allocation
page execute and read and write
B5C0000
trusted library allocation
page execute and read and write
296D000
trusted library allocation
page read and write
B0DD000
stack
page read and write
4FE0000
heap
page read and write
4D8C000
stack
page read and write
6DFA000
heap
page read and write
4E50000
heap
page read and write
325D000
stack
page read and write
C8F000
stack
page read and write
12CB000
stack
page read and write
3300000
heap
page read and write
2EF5000
trusted library allocation
page read and write
343B000
trusted library allocation
page read and write
83B000
trusted library allocation
page execute and read and write
8F4000
heap
page read and write
1A9C000
stack
page read and write
B3B000
trusted library allocation
page execute and read and write
4AAE000
stack
page read and write
2ECB000
trusted library allocation
page read and write
2470000
trusted library allocation
page read and write
28AA000
trusted library allocation
page read and write
832000
trusted library allocation
page read and write
2941000
trusted library allocation
page read and write
3398000
trusted library allocation
page read and write
2300000
trusted library allocation
page execute and read and write
800000
trusted library allocation
page read and write
547E000
stack
page read and write
C90000
heap
page read and write
6CB0000
heap
page read and write
296F000
trusted library allocation
page read and write
2556000
trusted library allocation
page read and write
2EE1000
trusted library allocation
page read and write
294B000
trusted library allocation
page read and write
2975000
trusted library allocation
page read and write
BF0000
heap
page read and write
5C7E000
stack
page read and write
2968000
trusted library allocation
page read and write
EF0000
heap
page read and write
516E000
trusted library allocation
page read and write
5900000
heap
page read and write
DEC000
heap
page read and write
559C000
trusted library allocation
page read and write
68B0000
trusted library allocation
page read and write
697000
heap
page read and write
B32000
trusted library allocation
page read and write
7F0000
trusted library allocation
page read and write
68E000
stack
page read and write
289B000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page execute and read and write
5018000
trusted library allocation
page read and write
249D000
trusted library allocation
page read and write
5E8F000
stack
page read and write
5AAE000
stack
page read and write
6292000
heap
page read and write
2F40000
heap
page read and write
24D5000
trusted library allocation
page read and write
E72000
trusted library allocation
page read and write
E44000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
E90000
trusted library allocation
page read and write
12F0000
heap
page read and write
4F7D000
stack
page read and write
6B20000
trusted library section
page read and write
2F4B000
heap
page read and write
22B0000
trusted library allocation
page read and write
293D000
trusted library allocation
page read and write
33FB000
heap
page read and write
538E000
stack
page read and write
B3DF000
stack
page read and write
3A79000
trusted library allocation
page read and write
936000
heap
page read and write
5000000
trusted library allocation
page execute and read and write
8C0000
heap
page read and write
2957000
trusted library allocation
page read and write
3535000
trusted library allocation
page read and write
BB5000
heap
page read and write
528C000
stack
page read and write
970000
heap
page read and write
4F6E000
trusted library allocation
page read and write
2ECD000
trusted library allocation
page read and write
2EE3000
trusted library allocation
page read and write
344E000
trusted library allocation
page read and write
356F000
unkown
page read and write
681E000
stack
page read and write
4E3D000
stack
page read and write
AF0000
trusted library allocation
page read and write
2EBF000
trusted library allocation
page read and write
D1E000
heap
page read and write
7110000
trusted library allocation
page read and write
B80000
heap
page read and write
12E6000
trusted library allocation
page read and write
712E000
stack
page read and write
B10000
trusted library allocation
page read and write
8CE000
heap
page read and write
2C5E000
trusted library allocation
page read and write
44E9000
trusted library allocation
page read and write
242E000
stack
page read and write
3456000
trusted library allocation
page read and write
B1D000
trusted library allocation
page execute and read and write
604E000
stack
page read and write
2945000
trusted library allocation
page read and write
2ED7000
trusted library allocation
page read and write
2AC3000
trusted library allocation
page read and write
D37000
heap
page read and write
3D10000
trusted library allocation
page read and write
4E50000
heap
page read and write
548E000
stack
page read and write
68D0000
trusted library allocation
page read and write
68E0000
trusted library allocation
page execute and read and write
4D30000
heap
page read and write
E50000
trusted library allocation
page read and write
B60000
trusted library allocation
page execute and read and write
4F7D000
trusted library allocation
page read and write
B350000
heap
page read and write
18A6000
trusted library allocation
page execute and read and write
16A4000
trusted library allocation
page read and write
267E000
stack
page read and write
6A10000
trusted library allocation
page read and write
4CC0000
trusted library allocation
page read and write
B5AC000
stack
page read and write
5CA0000
heap
page read and write
34F9000
trusted library allocation
page read and write
C3B000
heap
page read and write
2EE9000
trusted library allocation
page read and write
49E0000
trusted library allocation
page execute and read and write
B04000
trusted library allocation
page read and write
55BE000
stack
page read and write
4A60000
trusted library allocation
page read and write
1950000
heap
page read and write
60000
unkown
page readonly
3969000
trusted library allocation
page read and write
2AD9000
trusted library allocation
page read and write
2EED000
trusted library allocation
page read and write
3D4B000
trusted library allocation
page read and write
275C000
stack
page read and write
6660000
heap
page read and write
6ACE000
stack
page read and write
18B2000
trusted library allocation
page read and write
49B0000
heap
page read and write
293F000
trusted library allocation
page read and write
15C5000
heap
page read and write
12F7000
heap
page read and write
E4D000
trusted library allocation
page execute and read and write
5A10000
heap
page execute and read and write
85C0000
trusted library section
page read and write
1940000
trusted library allocation
page read and write
294D000
trusted library allocation
page read and write
22BA000
trusted library allocation
page read and write
1565000
heap
page read and write
2953000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
229E000
stack
page read and write
6FCF000
stack
page read and write
2491000
trusted library allocation
page read and write
89E000
stack
page read and write
2943000
trusted library allocation
page read and write
698F000
stack
page read and write
A10000
heap
page read and write
1BA000
stack
page read and write
8920000
trusted library allocation
page execute and read and write
5DED000
stack
page read and write
69CE000
stack
page read and write
65E0000
trusted library allocation
page execute and read and write
A25000
heap
page read and write
2EC5000
trusted library allocation
page read and write
8A0000
heap
page read and write
4AC0000
trusted library allocation
page read and write
1AA4000
trusted library allocation
page read and write
DBB000
heap
page read and write
3451000
trusted library allocation
page read and write
49FE000
stack
page read and write
5DF0000
trusted library allocation
page read and write
2ACE000
trusted library allocation
page read and write
3C4E000
trusted library allocation
page read and write
65D0000
heap
page read and write
26DE000
trusted library allocation
page read and write
18A2000
trusted library allocation
page read and write
3595000
trusted library allocation
page read and write
70EF000
stack
page read and write
90A000
stack
page read and write
DE9000
heap
page read and write
EDE000
stack
page read and write
2F70000
trusted library allocation
page read and write
1930000
trusted library allocation
page read and write
2EC9000
trusted library allocation
page read and write
1920000
trusted library allocation
page execute and read and write
3380000
heap
page read and write
2C78000
trusted library allocation
page read and write
B2A000
trusted library allocation
page execute and read and write
2EC1000
trusted library allocation
page read and write
68BC000
trusted library allocation
page read and write
28D6000
trusted library allocation
page read and write
96A000
heap
page read and write
2EC7000
trusted library allocation
page read and write
24D0000
trusted library allocation
page read and write
BD0000
heap
page read and write
18A0000
trusted library allocation
page read and write
16AD000
trusted library allocation
page execute and read and write
45EC000
stack
page read and write
272C000
trusted library allocation
page read and write
2961000
trusted library allocation
page read and write
2320000
heap
page read and write
520000
heap
page read and write
50E0000
trusted library section
page readonly
4F71000
trusted library allocation
page read and write
600000
heap
page read and write
5F0F000
stack
page read and write
870E000
stack
page read and write
E30000
trusted library allocation
page read and write
6B0E000
stack
page read and write
B37000
trusted library allocation
page execute and read and write
6831000
trusted library allocation
page read and write
55C0000
trusted library allocation
page execute and read and write
16B0000
heap
page read and write
6058000
trusted library allocation
page read and write
7F2E0000
trusted library allocation
page execute and read and write
E40000
trusted library allocation
page read and write
B4EB000
stack
page read and write
5AC0000
heap
page read and write
B00000
trusted library allocation
page read and write
3D85000
trusted library allocation
page read and write
856D000
stack
page read and write
837000
trusted library allocation
page execute and read and write
E0B000
heap
page read and write
4F8E000
stack
page read and write
85C5000
trusted library allocation
page read and write
2ECF000
trusted library allocation
page read and write
2967000
trusted library allocation
page read and write
329A000
stack
page read and write
2A20000
trusted library allocation
page read and write
80D000
trusted library allocation
page execute and read and write
345D000
trusted library allocation
page read and write
49C0000
heap
page read and write
D52000
heap
page read and write
6A20000
trusted library allocation
page read and write
865E000
stack
page read and write
155A000
heap
page read and write
2965000
trusted library allocation
page read and write
2310000
trusted library allocation
page read and write
8CD000
stack
page read and write
3929000
trusted library allocation
page read and write
8CA000
heap
page read and write
28A2000
trusted library allocation
page read and write
113A000
stack
page read and write
2A40000
heap
page execute and read and write
35F0000
heap
page read and write
55F0000
trusted library allocation
page read and write
4529000
trusted library allocation
page read and write
11A0000
heap
page read and write
4C0C000
stack
page read and write
68C4000
trusted library allocation
page read and write
4E70000
heap
page read and write
189D000
trusted library allocation
page execute and read and write
B88000
heap
page read and write
5280000
heap
page execute and read and write
9BE000
unkown
page read and write
55E0000
trusted library allocation
page read and write
8F9000
stack
page read and write
995D000
trusted library allocation
page read and write
516B000
trusted library allocation
page read and write
B2DE000
stack
page read and write
6C32000
trusted library allocation
page read and write
2890000
trusted library allocation
page read and write
9FF000
unkown
page read and write
6CBE000
heap
page read and write
286F000
stack
page read and write
2EE7000
trusted library allocation
page read and write
E62000
trusted library allocation
page read and write
2951000
trusted library allocation
page read and write
850000
trusted library allocation
page read and write
3516000
trusted library allocation
page read and write
5040000
heap
page execute and read and write
18D0000
trusted library allocation
page read and write
49A0000
heap
page read and write
7EF80000
trusted library allocation
page execute and read and write
B70000
trusted library allocation
page read and write
7EFC0000
trusted library allocation
page execute and read and write
18B0000
trusted library allocation
page read and write
BB7000
heap
page read and write
5170000
trusted library allocation
page read and write
4970000
trusted library allocation
page read and write
1890000
trusted library allocation
page read and write
28B1000
trusted library allocation
page read and write
There are 594 hidden memdumps, click here to show them.